Yönetim Bilgi Sistemlerinde (YBS) Siber Güvenliğin Önemi
Abstract
Keywords
References
- Boyd, B. L. (2009). Cyber warfare: Armageddon in a Teacup?. Army Command and General Staff Coll Fort Leavenworth KS.
- Cisco Annual Internet Report, 2018–2023 (https://www.cisco.com/c/en/us/solutions/collateral/executive-perspectives/annual-internet-report/white-paper-c11-741490.html) [Erişim Tarihi: 30.06.2022]
- Damar, M., & Coşkun, E. (2017). Üniversitelerde bilgi işlemden yönetim bilişim sistemlerine geçiş: Mevcut durum ve beklentiler. Bilişim Teknolojileri Dergisi, 10(1), 21.
- Darwish, M., Ouda, A., & Capretz, L. F. (2013, June). Cloud-based DDoS attacks and defens-es. In International Conference on Information Society (i-Society 2013) (pp. 67-71). IEEE.
- Fakeeh, K. A. (2016). An overview of DDoS attacks detection and prevention in the cloud. International Journal of Applied Information Systems (IJAIS), 11(7).
- Johnson, T. A. (Ed.). (2015). Cybersecurity: Protecting critical infrastructures from cyber attack and cyber warfare. CRC Press.
- Khan, N. A., Brohi, S. N., & Zaman, N. (2020). Ten deadly cyber security threats amid COVID-19 pandemic.
- Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., & Rajarajan, M. (2013). A survey of intrusion detection techniques in cloud. Journal of network and computer applications, 36(1), 42-57.
Details
Primary Language
Turkish
Subjects
Software Engineering (Other)
Journal Section
Review
Authors
Hakan Aydın
*
0000-0002-0122-8512
Türkiye
Publication Date
February 28, 2023
Submission Date
June 30, 2022
Acceptance Date
October 5, 2022
Published in Issue
Year 2022 Volume: 3 Number: 2
Cited By
Modelo de Autentificación de Doble Factor
Innovación y Software
https://doi.org/10.48168/innosoft.s11.a81