THE IMPORTANCE OF THE CYBER WORLD AND NATIONAL SOFTWARE Samet Taha ŞENGÜL, Mehmet Kadir ÖZYÜREK Abstrack This text addresses cybersecurity, the risks associated with it, and the importance of software. It discusses cyber wars, cybersecurity vulnerabilities, and hardware and software errors. In the new world order, where the primary goal is to create algorithms and protect them, countries can control their own produced hardware as they wish, highlighting the significance of national software. In this context, it examines the importance of the National Combat Aircraft KAAN and the national weapons produced for the Air, Naval, and Land Forces for national software and the Turkish Armed Forces. Key Words: Cyber, National, Software, Security, Warfare Index Terms = Enterprise Resource Planning (ERP) INTRODUCTION With the awakening of human consciousness, many needs have emerged, prompting humanity to seek various solutions to meet these fundamental requirements. They invented the wheel to carry heavy loads more easily. They attempted to depict the wild animals, trees, and natural phenomena they observed around them. The invention of writing enabled the transmission of knowledge from generation to generation. To ensure sustenance and to fight against enemies, they worked with iron, producing more effective and durable weapons. By creating the compass, they ventured out to sea, discovering new places, animals, and food. An apple fell on their head, leading to the discovery of gravity. Gazing at the night sky, they invented the telescope to observe those bright objects more closely. Over the years, conflicts arose among people, leading to harm against one another. During these times, instead of seeking food, humans invented gunpowder to protect themselves and attack others, split the atom, produced bombs, invented the internet, created software, and developed various systems to protect those software solutions. In ancient times, humanity sought to sharpen the tips of their spears, while now they strive to strengthen their defense systems. Just as shields were used against swords, today various defense devices equipped with software are utilized to protect against missiles. Today, billions of people use the internet. Thanks to the internet, we can communicate instantly, order products, and transfer money. However, even the smallest vulnerability in the applications we use can expose our credit card information and passwords. Malicious individuals can exploit these vulnerabilities. This text will continue to discuss cybersecurity, cyber attacks, national software, and the importance of national software. CYBER SECURITY CYBER SECURITY RISKS AND CYBER ATTACKS There are three dimensions that contribute to the emergence of cyber threats: vulnerabilities in internet design (such as flaws in the addressing system, management deficiencies, the fact that many systems enabling the internet operate openly and unencrypted, the ability to disseminate malware, and the decentralized nature of the internet), errors in hardware and software, and online access to critical systems. [6] The cyber attack process begins with scanning systems that have weak security controls over the internet. Once a hacker infiltrates a system, they can remotely operate the infected system or send commands for espionage purposes. TYPES OF CYBER ATTACKS • Information and Data Tampering: It refers to the unauthorized alteration of data before or during access to a computer system, and reverting it back to its original state after the process is completed. [3]. • Salami Technique: It is a technique used by cybercriminals to steal resources or assets in such small amounts that they go unnoticed each time. [3]. • Hacking: It refers to unauthorized access to computer systems. [3]. • Virus Propagation: These are malicious software added to another system with the intent of destroying the attacked system (Cybercrimechambers, 2021). They have the ability to spread to other computers or files within a network. [3]. • Logic Bomb: A logic bomb is a program that is triggered at a pre-programmed date and time or remains dormant until certain logical conditions are met. Once activated, a logic bomb can cause damage to the targeted computer through data corruption, file deletion, or wiping the hard disk. [3]. • Denial of Service (DoS)Attacks: These attacks overwhelm a system’s resources, saturating them and preventing responses to service requests, significantly reducing the system’s ability to operate. The goal of DoS attacks is often to deny service or to create a secondary attack. [3]. • E-Scams: These are attacks that appear to be from a legitimate organization and aim to extract sensitive information, such as credit card numbers and username-password combinations. [3] NATIONAL SOFTWARE AND ITS IMPORTANCE The foundation of achieving competitiveness in the economy lies within the software industry. The benefit of software development to us fundamentally depends on the applications we create ourselves. It is crucial that the data produced in our country remains within our borders, and the effective storage and interpretation of open-source data obtained from software exported to other countries is one of the most significant factors in our favor. Enterprise Resource Planning (ERP) software, which can consolidate all the information and data of companies or institutions into a single system, brings great convenience but also introduces a security problem. The ability of foreign software companies to access critical information poses a significant threat to our firms and especially to public institutions. While many companies do not worry about security by using their own software, numerous institutions still take risks by using foreign software. It is essential for public institutions to use entirely domestic software to protect themselves.[5] Moreover, foreign software controlling warplanes can easily manipulate friend/enemy definitions in the event of a possible war. Even if the planes are produced or modernized domestically in Turkey, it is difficult to speak of national integrity when the software that enables them to fly and perform necessary definitions is produced abroad. Therefore, having systems produced according to local and national standards helps eliminate threats to our national security.[4] NCA KAAN The construction of the MMU KAAN, the pride of the Turkish Air Force Command, began on August 5, 2016. It has been developed in collaboration with many developers, primarily TUSAŞ, the main developer. The project aims to equip Turkey with capabilities in areas such as maneuverability, low visibility, internal weapon bays, and sensor fusion, essential for a next-generation aircraft. This will position Turkey among the limited number of countries in the world, alongside the USA, Russia, and China, that have the infrastructure and technology to produce a fifth-generation combat aircraft. In the KAAN Development Project, the most advanced engineering tools and methods are utilized. TUSAŞ is striving to enhance its knowledge and experience by leveraging national resources in line with the project’s primary objectives. System Features • High Situational Awareness • Battle Damage Assessment • Joint Interoperability with Other Elements • Low Observability and Infrared Signature • Sustainable Life Cycle Support • Optimized Pilot Workload • Next-Generation Mission Systems • Short Turnaround Time • Easy Maintenance • Precision Strike Capability Technical Specifications Wingspan 14m (46 ft) Length 21m (69 ft) Thrust 2 x 29.0000 lb Maximum Speed 1,8 Mach (40.000 ft) Service Ceiling 55,000 ft Positive/Negative G Limit +9g / -3,5g THE IMPORTANCE OF KAAN The KAAN, which made its first flight on February 21, 2024, will provide us with a significant advantage on the battlefield by utilizing our own equipment in potential conflicts. We will be able to operate freely on the battlefield without encountering any obstacles. This project will reduce our dependence on external sources while increasing our level of knowledge. As our knowledge level rises, we will achieve even greater accomplishments. In this regard, the NCA KAAN will take us much further. The Turkish defense industry is not only developing the KAAN but also many other domestic projects. Some of these projects include: AIR FORCES NAVAL FORCES LAND FORCES Hürjet MİLGEM Altay AMT Hürkuş TF-2000 Batu Power Group Göksungur MİLGEM Corvette Otokar Tulpar Bayraktar Akıncı MİLDEN ZPTP Bayraktar TB2 Turkish Type Attack Boat FNSS Akıncı ZMA Bayraktar TB3 TCG Anadolu T-155 Fırtına Bayraktar Mini UAV G-40 Bayraktar VTOL ÇAFRAD T-629 Attack Helicopter Cruise Missile Vulture Missile TEI TJ300 TEI TS400 CYBER WARFARE Cyber warfare refers to attacks carried out by any state aimed at disrupting or controlling enemy resources, or to various levels of violence in physical or non-physical environments within the scope of military defense using information and communication technologies.[4] The most important feature that distinguishes cyber warfare from conventional wars is its ability to eliminate physical barriers. Cyber attacks aimed at causing devices that store data or information to lose their functionality obscure concrete targets in cyberspace and increase perceptions of risk related to threat detection.[7] Cyber warfare, which has emerged due to political tensions between countries, is perceived as a reality characterized by attacks targeting software resources and strategically important infrastructures deemed necessary in the information age. Furthermore, in what we refer to as the information age, the expansion of communication infrastructures and the transformation of social networks into integrated networks that connect individuals and societies reveal that cyber warfare can impact not only technical domains but also the human and social groups it encompasses.[7] Discussion Mehmet Kadir ÖZYÜREK: As mentioned, software and cyber networks have now become a part of our lives. Almost all of our personal data and private conversations are stored in this virtual environment, and they are at risk of disappearing. Therefore, if these data fall into the hands of spies due to even the smallest cybersecurity and software vulnerabilities, it can have significantly negative consequences in our lives. Recently, we have seen reports of some people's data being stolen in cafes and restaurants. The reason for this is the vulnerabilities created by shared networks and the spy networks that are established. The measures taken in this regard are very few. I believe that a software developed to be installed on phones could identify spy networks and alert people, preventing them from connecting to dangerous networks. Samet Taha ŞENGÜL: The cyber world, just as it is part of everyday human life, also plays a role in the military field. Vulnerabilities that arise here could lead to the loss of all the data, information, and software owned by a state, making the country very defenseless. The software of produced tools could be corrupted and rendered inoperable. For these reasons, it is just as important to protect an algorithm as it is to create one. I believe that a software system should be developed that not only avoids vulnerabilities but also prevents reverse engineering even if the device falls into enemy hands. Conclusion This article discusses cybersecurity risks and types of cyber attacks. It highlights the important roles of national software and national weapons during warfare. It emphasizes the need for personal data protection and the necessity for companies to have their own software. The article explains the definition, execution, and impacts of cyber warfare. It mentions both existing and future national tools. Additionally, the authors address their criticisms in the field of cybersecurity. REFERENCES [1] F.Aslay,” International Journal of Multidisciplinary Studies and Innovative Technologies”, Siber Saldırı Yöntemleri ve Türkiye’nin Siber Güvenlik Mevcut Durum Analizi, vol.1, no.1, pp 24-28, 2022. [2] S. E. Goodman, "Critical Information Infrastructure Protection", Terrorism (Ed.), Responses to Cyber Terrorism NATO Science for Piece and Security, IOS Press vol.34, Ankara, 25, 2008. [3] Ö.Akçakan, O.Özdemir, M.Mazak, “Journal of Applied Sciences of MAKU”, İşletmelerde Siber Güvenlik Riskleri ve Bilgi Teknolojileri Denetimi: Bankaların Siber Güvenlik Uygulamalarının İncelenmesi, vol.5, no.5, pp 246-270, 2021. [4] İsmail Şen, “Sektöre Bakış Dergisi”, 2019. [5] BT Haber, “Milli Yazılım Neden Bu Kadar Önemli?”, June 4, 2018. [6] R. Benzer. “Siber Suçlar ve Teorik Yaklaşımlar”, Güncel Tehdit: Siber Suçlar, Birinci Baskı, Ankara, Seçkin Yayıncılık, 21-41, 2014. [7] A.Çalışkan, SAVSAD Savunma ve Savaş Araştırma Dergisi,”Siber Savaş: Bilgi Krizi Mi Yoksa Güvenliğ Mi ?”, vol.33, no.1, pp.1-32, June 2023.