Ahmet KoltuksuzKoltuksuz, AhmetUF Aydogdu2025-10-062013978-1-61499-317-9, 978-1-61499-316-2978161499316297816149931791879-826810.3233/978-1-61499-317-9-106http://dx.doi.org/10.3233/978-1-61499-317-9-106https://gcris.yasar.edu.tr/handle/123456789/6451https://doi.org/10.3233/978-1-61499-317-9-106Terrorists are increasingly finding the Internet or cyberspace a valuable forum them to operate in. Not only can they use cyberspace to conduct attacks they can also use it to find recruits train recruits raise money organize activities and publicize the results. Although some of this activity is legal it still must be monitored to be able to prevent cyberterrorism.Englishinfo:eu-repo/semantics/closedAccesscyberterrorism, cyberattack, SCADA, cyberspaceCyberterrorismCyberspaceScadaCyberattackUse of Cyberspace and Technology by TerroristsConference Object