" />
 
BibTex RIS Kaynak Göster

Cyber Security Analysis of Turkey

Yıl 2012, Cilt: 1 Sayı: 4, 112 - 125, 30.12.2012

Öz

Considering the criticality of the cyber security threat in the 21st century, it is presumed that the nations are busy with series of activities in order to protect their security in the cyber space domain. In this paper, in light of the recent developments in the cyber security field, Turkey’s cyber security analysis is performed using a macro analysis model. We researched for the measures taken in Turkey with respect to those in the other countries, reviewed the posture, the activities and actions taken in the last ten years and provided recommendations deemed necessary to enhance national cyber security. The paper aims to contribute to the cyber security literature on governance issues as well as to the security preparedness of Turkey.

Kaynakça

  • ITU web site, accessed 23 December 2012, T/studygroups/com17/Pages/cybersecurity.aspx />
  • UK Cabinet Office, “Cyber Security Strategy of the United Kingdom”, June 2009, accessed 02 November 2012, 6.pdf/> [3] Ayers, R., “The New Threat: Information Warfare, RUSI Journal”, 144:5 (1999:Oct.) p.23
  • Symantec “Internet Security Threat Report, 2011 Trends. Vol. 17”, April, 2012
  • TrendMicro 3rd Quarter 2012 Security Roundup Report, accessed content/us/pdfs/security-intelligence/reports/rpt-3q- 2012-security-roundup-android-under-siege-popularity- comes-at-a-price.pdf/> October 2012,
  • Paganini, P., “The Rise of Cyber Weapons and Relative Impact on Cyberspace”, 05 October 2012, accessed 31 October 2012, October 2012
  • Star Gazete web site, accessed 08 October 2012, siber-guvenlikte-isbirligi-var/haber-631491/>
  • US White House, “Cyberspace Policy Review”, May 2009
  • Interpromedya News Center, “No Cyber Security without Awareness”, accessed 02 November 2012,
  • Tettersall, A., Düven, A., “Russia and China: Against Cyber Space Conference”, accessed 02 November 2012, 5/>
  • Şentürk, H., Çil, C. Z., Sağıroğlu, Ş., “A Proposal for a Cyber Security Macro Analysis Model and Analysis of Turkey”, 5th International Conference on Information Security and Cryptology, 15-17 May 2012, Ankara, Turkey.
  • Marsan, C. D. “10 Things You Didn't Know About Cyber Warfare”, Network World, June 08 2009, accessed cyberwarfare.html/> November 2012,
  • Gökpınar, E. S. “Networks and War”, Cyber Warfare Symposium, Ankara, Turkey, 10 December 2009
  • Arquilla, J., Ronfeldt, D., “In Athena's Camp, Preparing for Conflict in the Information Age Ch.2 : Cyberwar is Coming”, RAND Corporation, 1997
  • Libicki, M. C. “Cyberdeterrence and Cyberwar”, RAND Corporation, 2009
  • Mulligan, D. K., Schneider, F. B., “Doctrine for Cybersecurity”, 15 May 2011
  • 3rd International Conference on Information Security and Cryptology, 25-27 December 2008, Ankara, Turkey, uc>
  • US White House, “The National Strategy to Secure Cyber Space”, February 2003
  • US White House, “The Comprehensive National Cybersecurity Initiative”, accessed 03 November 2012, ve-national-cybersecurity-initiative/> [21] US
  • White House, “International Strategy for
  • Cyberspace”, May 2011.
  • UK Office of Cyber Security, “Cyber Security Strategy of the United Kingdom: Safety, Security and Resilience in Cyber Space”, June 2009, accessed 03 November 2012, w.cabinetoffice.gov.uk/media/216620/css0906.pdf/>
  • UK Office of Cyber Security, Written Ministerial Statement regarding UK Cyber Security Strategy, 2011, accessed 03 November 2012, November 2012,
  • Turkish Cabinet Decision Nr. 2008/13685, published in Official Gazette of Republic of Turkey, 16 June 2008.
  • Symantec “Global Internet Security Threat Report, Trends for 2008. Vol. XIV”, April, 2009
  • Üneri, M., “Computer Security and Internet”, July 2009, accessed ulu/090715_IK27.ToplantisiInternetVeBilgisayarGuvenl igi.pdf/> November 2012,
  • Zetter, K., “State-Sponsored Malware ‘Flame’ Has Smaller, More Devious Cousin”, 15 October 2012, accessed espionage-tool/> October 2012,
  • Kaspersky Lab web site, “Kaspersky Lab Discovers “miniFlame,” a New Malicious Program Designed for Highly Targeted Cyber Espionage Operations”, 15 October persky_Lab_Discovers_miniFlame_a_New_Malicious_ Program_Designed_for_Highly_Targeted_Cyber_Espio nage_Operations/> 18 October
  • Hoover, N. J., “Defense Bill Approves Offensive Cyber Warfare”, Information Week, 05 January 2012
  • Özenç, K., Alkan, M., Acarer, T., “Legal and Technical Approach to International Security of a Nation”, 3rd International Conference on Information Security and Cryptology, 25-27 December 2008, Ankara
  • Cyber Security Law Workshop, 26-27 January 2012, Ankara, accessed 03 November
  • Hoover, N. J., “DARPA Boosts Cybersecurity Research Spending 50%”, Information Week, 07 November 2011
  • IT in Defense Conference, 07 February 2012, accessed 03 November 2012, =777/>
  • Vural, Y., Sağıroğlu, Ş., “National Information Security”, 3rd International Conference on Information Security and Cryptology, 25-27 December 2008, Ankara
  • Anıl, S., “Cyber Security in NATO and Nations”, Turkish Symposium on War on Digital Media, Ankara, Turkey. 10 December 2009.
  • Keith B. A., “Letter to Senator McCain”, accessed 20 October 2012, McCainLetter.pdf/>
  • Sung, K., J., "Cyber Warfare Command to Be Launched in January". Koreatimes.co.kr., accessed 22 October 2012,<http://www.koreatimes.co.kr/www/news/nation/2 009/12/205_56502.html/>
  • Gündoğan, M., “Cyber Weapon Industry and Turkey”, Cyber Security Conference, 22 December 2011, Ankara.
Yıl 2012, Cilt: 1 Sayı: 4, 112 - 125, 30.12.2012

Öz

Kaynakça

  • ITU web site, accessed 23 December 2012, T/studygroups/com17/Pages/cybersecurity.aspx />
  • UK Cabinet Office, “Cyber Security Strategy of the United Kingdom”, June 2009, accessed 02 November 2012, 6.pdf/> [3] Ayers, R., “The New Threat: Information Warfare, RUSI Journal”, 144:5 (1999:Oct.) p.23
  • Symantec “Internet Security Threat Report, 2011 Trends. Vol. 17”, April, 2012
  • TrendMicro 3rd Quarter 2012 Security Roundup Report, accessed content/us/pdfs/security-intelligence/reports/rpt-3q- 2012-security-roundup-android-under-siege-popularity- comes-at-a-price.pdf/> October 2012,
  • Paganini, P., “The Rise of Cyber Weapons and Relative Impact on Cyberspace”, 05 October 2012, accessed 31 October 2012, October 2012
  • Star Gazete web site, accessed 08 October 2012, siber-guvenlikte-isbirligi-var/haber-631491/>
  • US White House, “Cyberspace Policy Review”, May 2009
  • Interpromedya News Center, “No Cyber Security without Awareness”, accessed 02 November 2012,
  • Tettersall, A., Düven, A., “Russia and China: Against Cyber Space Conference”, accessed 02 November 2012, 5/>
  • Şentürk, H., Çil, C. Z., Sağıroğlu, Ş., “A Proposal for a Cyber Security Macro Analysis Model and Analysis of Turkey”, 5th International Conference on Information Security and Cryptology, 15-17 May 2012, Ankara, Turkey.
  • Marsan, C. D. “10 Things You Didn't Know About Cyber Warfare”, Network World, June 08 2009, accessed cyberwarfare.html/> November 2012,
  • Gökpınar, E. S. “Networks and War”, Cyber Warfare Symposium, Ankara, Turkey, 10 December 2009
  • Arquilla, J., Ronfeldt, D., “In Athena's Camp, Preparing for Conflict in the Information Age Ch.2 : Cyberwar is Coming”, RAND Corporation, 1997
  • Libicki, M. C. “Cyberdeterrence and Cyberwar”, RAND Corporation, 2009
  • Mulligan, D. K., Schneider, F. B., “Doctrine for Cybersecurity”, 15 May 2011
  • 3rd International Conference on Information Security and Cryptology, 25-27 December 2008, Ankara, Turkey, uc>
  • US White House, “The National Strategy to Secure Cyber Space”, February 2003
  • US White House, “The Comprehensive National Cybersecurity Initiative”, accessed 03 November 2012, ve-national-cybersecurity-initiative/> [21] US
  • White House, “International Strategy for
  • Cyberspace”, May 2011.
  • UK Office of Cyber Security, “Cyber Security Strategy of the United Kingdom: Safety, Security and Resilience in Cyber Space”, June 2009, accessed 03 November 2012, w.cabinetoffice.gov.uk/media/216620/css0906.pdf/>
  • UK Office of Cyber Security, Written Ministerial Statement regarding UK Cyber Security Strategy, 2011, accessed 03 November 2012, November 2012,
  • Turkish Cabinet Decision Nr. 2008/13685, published in Official Gazette of Republic of Turkey, 16 June 2008.
  • Symantec “Global Internet Security Threat Report, Trends for 2008. Vol. XIV”, April, 2009
  • Üneri, M., “Computer Security and Internet”, July 2009, accessed ulu/090715_IK27.ToplantisiInternetVeBilgisayarGuvenl igi.pdf/> November 2012,
  • Zetter, K., “State-Sponsored Malware ‘Flame’ Has Smaller, More Devious Cousin”, 15 October 2012, accessed espionage-tool/> October 2012,
  • Kaspersky Lab web site, “Kaspersky Lab Discovers “miniFlame,” a New Malicious Program Designed for Highly Targeted Cyber Espionage Operations”, 15 October persky_Lab_Discovers_miniFlame_a_New_Malicious_ Program_Designed_for_Highly_Targeted_Cyber_Espio nage_Operations/> 18 October
  • Hoover, N. J., “Defense Bill Approves Offensive Cyber Warfare”, Information Week, 05 January 2012
  • Özenç, K., Alkan, M., Acarer, T., “Legal and Technical Approach to International Security of a Nation”, 3rd International Conference on Information Security and Cryptology, 25-27 December 2008, Ankara
  • Cyber Security Law Workshop, 26-27 January 2012, Ankara, accessed 03 November
  • Hoover, N. J., “DARPA Boosts Cybersecurity Research Spending 50%”, Information Week, 07 November 2011
  • IT in Defense Conference, 07 February 2012, accessed 03 November 2012, =777/>
  • Vural, Y., Sağıroğlu, Ş., “National Information Security”, 3rd International Conference on Information Security and Cryptology, 25-27 December 2008, Ankara
  • Anıl, S., “Cyber Security in NATO and Nations”, Turkish Symposium on War on Digital Media, Ankara, Turkey. 10 December 2009.
  • Keith B. A., “Letter to Senator McCain”, accessed 20 October 2012, McCainLetter.pdf/>
  • Sung, K., J., "Cyber Warfare Command to Be Launched in January". Koreatimes.co.kr., accessed 22 October 2012,<http://www.koreatimes.co.kr/www/news/nation/2 009/12/205_56502.html/>
  • Gündoğan, M., “Cyber Weapon Industry and Turkey”, Cyber Security Conference, 22 December 2011, Ankara.
Toplam 37 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Bölüm Makaleler
Yazarlar

Hakan Senturk Bu kişi benim

Zaim Çil Bu kişi benim

Şeref Sağıroğlu

Yayımlanma Tarihi 30 Aralık 2012
Gönderilme Tarihi 30 Ocak 2016
Yayımlandığı Sayı Yıl 2012 Cilt: 1 Sayı: 4

Kaynak Göster

IEEE H. Senturk, Z. Çil, ve Ş. Sağıroğlu, “Cyber Security Analysis of Turkey”, IJISS, c. 1, sy. 4, ss. 112–125, 2012.