Uploaded by 1mkozyurek

Cybersecurity & National Software: KAAN Aircraft & Defense

advertisement
THE IMPORTANCE OF THE CYBER
WORLD AND NATIONAL SOFTWARE
Samet Taha ŞENGÜL, Mehmet Kadir ÖZYÜREK
Abstrack
This text addresses cybersecurity, the risks associated with it, and the importance of
software. It discusses cyber wars, cybersecurity vulnerabilities, and hardware and software
errors. In the new world order, where the primary goal is to create algorithms and protect
them, countries can control their own produced hardware as they wish, highlighting the
significance of national software. In this context, it examines the importance of the National
Combat Aircraft KAAN and the national weapons produced for the Air, Naval, and Land
Forces for national software and the Turkish Armed Forces.
Key Words: Cyber, National, Software, Security, Warfare
Index Terms = Enterprise Resource Planning (ERP)
INTRODUCTION
With the awakening of human consciousness, many needs have emerged, prompting
humanity to seek various solutions to meet these fundamental requirements. They invented
the wheel to carry heavy loads more easily. They attempted to depict the wild animals, trees,
and natural phenomena they observed around them. The invention of writing enabled the
transmission of knowledge from generation to generation. To ensure sustenance and to fight
against enemies, they worked with iron, producing more effective and durable weapons. By
creating the compass, they ventured out to sea, discovering new places, animals, and food.
An apple fell on their head, leading to the discovery of gravity. Gazing at the night sky, they
invented the telescope to observe those bright objects more closely. Over the years, conflicts
arose among people, leading to harm against one another. During these times, instead of
seeking food, humans invented gunpowder to protect themselves and attack others, split the
atom, produced bombs, invented the internet, created software, and developed various
systems to protect those software solutions.
In ancient times, humanity sought to sharpen the tips of their spears, while now they strive to
strengthen their defense systems. Just as shields were used against swords, today various
defense devices equipped with software are utilized to protect against missiles.
Today, billions of people use the internet. Thanks to the internet, we can communicate
instantly, order products, and transfer money. However, even the smallest vulnerability in the
applications we use can expose our credit card information and passwords. Malicious
individuals can exploit these vulnerabilities. This text will continue to discuss cybersecurity,
cyber attacks, national software, and the importance of national software.
CYBER SECURITY
CYBER SECURITY RISKS AND CYBER ATTACKS
There are three dimensions that contribute to the emergence of cyber threats:
vulnerabilities in internet design (such as flaws in the addressing system, management
deficiencies, the fact that many systems enabling the internet operate openly and
unencrypted, the ability to disseminate malware, and the decentralized nature of the
internet), errors in hardware and software, and online access to critical systems. [6]
The cyber attack process begins with scanning systems that have weak security
controls over the internet. Once a hacker infiltrates a system, they can remotely operate
the infected system or send commands for espionage purposes.
TYPES OF CYBER ATTACKS
• Information and Data Tampering:
It refers to the unauthorized alteration of data before or during access to a computer
system, and reverting it back to its original state after the process is completed. [3].
• Salami Technique: It is a technique used by cybercriminals to steal resources or
assets in such small amounts that they go unnoticed each time. [3].
• Hacking: It refers to unauthorized access to computer systems. [3].
• Virus Propagation: These are malicious software added to another system with the
intent of destroying the attacked system (Cybercrimechambers, 2021). They have the
ability to spread to other computers or files within a network. [3].
• Logic Bomb: A logic bomb is a program that is triggered at a pre-programmed date
and time or remains dormant until certain logical conditions are met. Once activated, a
logic bomb can cause damage to the targeted computer through data corruption, file
deletion, or wiping the hard disk. [3].
• Denial of Service (DoS)Attacks: These attacks overwhelm a system’s resources,
saturating them and preventing responses to service requests, significantly reducing
the system’s ability to operate. The goal of DoS attacks is often to deny service or to
create a secondary attack. [3].
• E-Scams: These are attacks that appear to be from a legitimate organization and aim
to extract sensitive information, such as credit card numbers and username-password
combinations. [3]
NATIONAL SOFTWARE AND ITS IMPORTANCE
The foundation of achieving competitiveness in the economy lies within the software
industry. The benefit of software development to us fundamentally depends on the
applications we create ourselves.
It is crucial that the data produced in our country remains within our borders, and the
effective storage and interpretation of open-source data obtained from software
exported to other countries is one of the most significant factors in our favor.
Enterprise Resource Planning (ERP) software, which can consolidate all the
information and data of companies or institutions into a single system, brings great
convenience but also introduces a security problem. The ability of foreign software
companies to access critical information poses a significant threat to our firms and
especially to public institutions. While many companies do not worry about security by
using their own software, numerous institutions still take risks by using foreign
software. It is essential for public institutions to use entirely domestic software to
protect themselves.[5]
Moreover, foreign software controlling warplanes can easily manipulate friend/enemy
definitions in the event of a possible war. Even if the planes are produced or
modernized domestically in Turkey, it is difficult to speak of national integrity when the
software that enables them to fly and perform necessary definitions is produced
abroad. Therefore, having systems produced according to local and national standards
helps eliminate threats to our national security.[4]
NCA KAAN
The construction of the MMU KAAN, the pride of the Turkish Air Force Command,
began on August 5, 2016. It has been developed in collaboration with many developers,
primarily TUSAŞ, the main developer.
The project aims to equip Turkey with capabilities in areas such as maneuverability,
low visibility, internal weapon bays, and sensor fusion, essential for a next-generation
aircraft.
This will position Turkey among the limited number of countries in the world, alongside
the USA, Russia, and China, that have the infrastructure and technology to produce a
fifth-generation combat aircraft.
In the KAAN Development Project, the most advanced engineering tools and methods
are utilized. TUSAŞ is striving to enhance its knowledge and experience by leveraging
national resources in line with the project’s primary objectives.
System Features
• High Situational Awareness
• Battle Damage Assessment
• Joint Interoperability with Other Elements
• Low Observability and Infrared Signature
• Sustainable Life Cycle Support
• Optimized Pilot Workload
• Next-Generation Mission Systems
• Short Turnaround Time
• Easy Maintenance
• Precision Strike Capability
Technical Specifications
Wingspan
14m (46 ft)
Length
21m (69 ft)
Thrust
2 x 29.0000 lb
Maximum Speed
1,8 Mach (40.000 ft)
Service Ceiling
55,000 ft
Positive/Negative G Limit
+9g / -3,5g
THE IMPORTANCE OF KAAN
The KAAN, which made its first flight on February 21, 2024, will provide us with a
significant advantage on the battlefield by utilizing our own equipment in potential
conflicts. We will be able to operate freely on the battlefield without encountering any
obstacles. This project will reduce our dependence on external sources while
increasing our level of knowledge. As our knowledge level rises, we will achieve even
greater accomplishments. In this regard, the NCA KAAN will take us much further. The
Turkish defense industry is not only developing the KAAN but also many other domestic
projects. Some of these projects include:
AIR FORCES
NAVAL FORCES
LAND FORCES
Hürjet
MİLGEM
Altay AMT
Hürkuş
TF-2000
Batu Power Group
Göksungur
MİLGEM Corvette
Otokar Tulpar
Bayraktar Akıncı
MİLDEN
ZPTP
Bayraktar TB2
Turkish Type Attack Boat
FNSS Akıncı ZMA
Bayraktar TB3
TCG Anadolu
T-155 Fırtına
Bayraktar Mini UAV
G-40
Bayraktar VTOL
ÇAFRAD
T-629 Attack Helicopter
Cruise Missile
Vulture Missile
TEI TJ300
TEI TS400
CYBER WARFARE
Cyber warfare refers to attacks carried out by any state aimed at disrupting or
controlling enemy resources, or to various levels of violence in physical or non-physical
environments within the scope of military defense using information and
communication technologies.[4]
The most important feature that distinguishes cyber warfare from conventional wars is
its ability to eliminate physical barriers. Cyber attacks aimed at causing devices that
store data or information to lose their functionality obscure concrete targets in
cyberspace and increase perceptions of risk related to threat detection.[7]
Cyber warfare, which has emerged due to political tensions between countries, is
perceived as a reality characterized by attacks targeting software resources and
strategically important infrastructures deemed necessary in the information age.
Furthermore, in what we refer to as the information age, the expansion of
communication infrastructures and the transformation of social networks into
integrated networks that connect individuals and societies reveal that cyber warfare
can impact not only technical domains but also the human and social groups it
encompasses.[7]
Discussion
Mehmet Kadir ÖZYÜREK: As mentioned, software and cyber networks have now become a
part of our lives. Almost all of our personal data and private conversations are stored in this
virtual environment, and they are at risk of disappearing. Therefore, if these data fall into the
hands of spies due to even the smallest cybersecurity and software vulnerabilities, it can have
significantly negative consequences in our lives. Recently, we have seen reports of some
people's data being stolen in cafes and restaurants. The reason for this is the vulnerabilities
created by shared networks and the spy networks that are established. The measures taken in
this regard are very few. I believe that a software developed to be installed on phones could
identify spy networks and alert people, preventing them from connecting to dangerous
networks.
Samet Taha ŞENGÜL: The cyber world, just as it is part of everyday human life, also plays a
role in the military field. Vulnerabilities that arise here could lead to the loss of all the data,
information, and software owned by a state, making the country very defenseless.
The software of produced tools could be corrupted and rendered inoperable. For these
reasons, it is just as important to protect an algorithm as it is to create one. I believe that a
software system should be developed that not only avoids vulnerabilities but also prevents
reverse engineering even if the device falls into enemy hands.
Conclusion
This article discusses cybersecurity risks and types of cyber attacks. It highlights the
important roles of national software and national weapons during warfare. It emphasizes the
need for personal data protection and the necessity for companies to have their own
software. The article explains the definition, execution, and impacts of cyber warfare. It
mentions both existing and future national tools. Additionally, the authors address their
criticisms in the field of cybersecurity.
REFERENCES
[1] F.Aslay,” International Journal of Multidisciplinary Studies and Innovative Technologies”, Siber Saldırı
Yöntemleri ve Türkiye’nin Siber Güvenlik Mevcut Durum Analizi, vol.1, no.1, pp 24-28, 2022.
[2] S. E. Goodman, "Critical Information Infrastructure Protection", Terrorism (Ed.), Responses to Cyber
Terrorism NATO Science for Piece and Security, IOS Press vol.34, Ankara, 25, 2008.
[3] Ö.Akçakan, O.Özdemir, M.Mazak, “Journal of Applied Sciences of MAKU”, İşletmelerde Siber
Güvenlik Riskleri ve Bilgi Teknolojileri Denetimi: Bankaların Siber Güvenlik Uygulamalarının İncelenmesi,
vol.5, no.5, pp 246-270, 2021.
[4] İsmail Şen, “Sektöre Bakış Dergisi”, 2019.
[5] BT Haber, “Milli Yazılım Neden Bu Kadar Önemli?”, June 4, 2018.
[6] R. Benzer. “Siber Suçlar ve Teorik Yaklaşımlar”, Güncel Tehdit: Siber Suçlar, Birinci Baskı, Ankara,
Seçkin Yayıncılık, 21-41, 2014.
[7] A.Çalışkan, SAVSAD Savunma ve Savaş Araştırma Dergisi,”Siber Savaş: Bilgi Krizi Mi Yoksa Güvenliğ
Mi ?”, vol.33, no.1, pp.1-32, June 2023.
Download