Upload
anne-douglas
View
226
Download
0
Tags:
Embed Size (px)
Citation preview
Difficulty in Detecting the Source of Attack
Asymmetric Cross-borders
Characteristics Of Cyber Attack
Cyber Law
Can existing International law be applied to cyber conflicts?
Use of Force? Armed Attack?
Response ?
Turkey’s Cyber Efforts
Transportation, Maritime and Telecommunication Ministry
Cyber Security Board
National Cyber Security Strategy and Action Plan 2013-2014
National Cyber Incident Response Center
Electronic Warfare & Cyber Warfare
Electromagnetic Spectrum
ElectronicWarfare
Cyber Warfare
Cyberspace