Research Article
BibTex RIS Cite

Kuzey Atlantik Antlaşma Örgütü’nün (NATO) Siber Güvenlik Stratejisinin İncelenmesi

Year 2017, Volume: 5 Issue: 2, 632 - 656, 31.07.2017

Abstract

Son yıllarda bilgi ve iletişim
teknolojilerinde gerçekleşen gelişmeler ile coğrafik sınırların yerini sanal
ortamda belirlenen dijital sınırlar almıştır. Siber saldırılara karşı ulusal
çıkarların korunması ve siber uzayın sınır güvenliğinin sağlanması hususunda
karşılaşılan zorluklar, devletlerin uluslararası anlaşmalar yapmasını
kaçınılmaz hale getirmiştir. Bu çalışmada, küreselleşen dünyada ülkeleri aynı
çatı altında birleştiren en büyük organizasyonlardan biri olan NATO’nun
uyguladığı siber güvenlik stratejisi incelenerek, Türkiye’nin uyguladığı siber
güvenlik stratejisine olumlu katkılar yapmak amaçlanmıştır.

References

  • [1] B. Schneier, Secrets and Lies, Digital Security In A Networked World, Indiana, Wiley Publishing, 2000.
  • [2] “The National Strategy to Secure Cyberspace”, The White House, Washington, 2007.
  • [3] M.C. Libicki, Cyberdeterrence and Cyberwar, USA, RAND Corporation, 2009, Sf.12-13.
  • [4] R. Hill, “Dealing With Cyber Security Threats: International Coorporation, ITU and WCIT”, 7th International Conference on Cyber Conflict, sf.119-134, 2015.
  • [5] FACT SHEET: Cybersecurity Legislative Proposal, (29 Nisan 2016). Erişim: https://www.whitehouse.gov/the-press-office/2011/05/12/fact-sheet-cybersecurity-legislative proposal.
  • [6] General James Cartwright, “Memorandum for Chiefs of the Military Servs., Commanders of the Combatant Commands, Dirs. of the Joint Staff Directories on Joint Terminology for Cyberspace Operations 5”, Depatment of Defense, Washington DC, 2011
  • [7] R. Clarke, R.Knake, Cyber War. HarperCollins e-books. Sf 11.
  • [8] P.Cornish, D.Livingstone, D.Clemente, C.Yorke, “On Cyber Warfare” A Clatham House Report, Sf.1, 2010.
  • [9] C. Stallard, C. (2011). “At The Crossroads of Cyber Warfare: Signposts For The Royal Australian Air Force” Yüksek Lisans Tezi, School of Advanced Air and Space Studies, Maxwell Air Force Base, Alabama, USA, 2011, Sf 47.
  • [10] Anonim, (20 Haziran 2016). [Online]. Erişim: http://www.nato.int/cps/en/natohq/natocountries.htm
  • [11] Anonim, (25 Haziran 2016). [Online]. Erişim: http://www.nato.int/cps/en/natohq/structure.htm
  • [12] J.Arquilla, D.Ronfeldt, Networks and Netwars The Future of Terror, Crime, and Militancy. USA, RAND Corporation, 2001, Sf.240-248.
  • [13] R.Kaiser, “The birth of cyberwar”, Political Geography 46, Sf.11-20, 2015
  • [14] P.Shakarian, J.Shakarian, A.Ruef, Introduction To Cyber-Warfare: A Multidisciplinary Approach, USA, Elsevier, 2013, Sf.16-20.
  • [15] S.Herzog, “Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses”, Journal of Strategic Security, Number 2, Volume 4, Sf.54-55, 2011.
  • [16] S.Bıçakcı, “NATO’nun Gelişen Tehdit Algısı: 21. Yüzyılda Siber Güvenlik”, Uluslararası İlişkiler Akademik Dergi, Cilt 10, Sayı 40, Sf.101-130, 2014.
  • [17] S.Bıçakcı, “Yeni Savaş Ve Siber Güvenlik Arasında NATO’nun Yeniden Doğuşu”, Uluslararası İlişkiler Akademik Dergi, Cilt 9, Sayı 34, Sf.205-226, 2012.
  • [18] J.Carr, (2010). Inside Cyber Warfare, O’Reilly Media, Second Edition, USA, 2012, Sf.31.
  • [19] T.Check, “Book Review: Analyzing the Effectiveness of the Tallinn Manual’s Jus Ad Bellum Doctrine on Cyberconflict: A NATO-Centric Approach”, Cleveland State University Law Journals, Sf.495-512, 2015.
  • [20] NATO CCDCOE, (2016, 10 Temmuz), 2008 NATO Bucharest Summit Declaration, Erişim: https://ccdcoe.org/sites/default/files/documents/NATO-080403BucharestSummitDeclaration.pdf
  • [21] Anonim, (10 Temmuz 2016) [Online]. Erişim: https://ccdcoe.org/history.html
  • [22] NATO CCDCOE, (2016, 8 Temmuz), Lisbon Summit Declaration, Erişim: http://www.nato.int/cps/en/natolive/official_ texts_68828.htm
  • [23] Anonim, (8 Temmuz 2016) [Online]. Erişim: http://www.nato.int/nato_static_fl2014/assets/pdf/ pdf_publications/20120214_strategic-concept-2010-eng.pdf
  • [24] Rapporteur R.Noshiravani, “NATO and Cyber Security: Building on the Strategic Concept”, Chatham House Report, 2011.
  • [25] NATO Document, “Defending the Networks: The NATO Policy on Cyber Defence”, Brüksel, 2011.
  • [26] A.Klimburg, National Cyber Security Framework Manual, NATO CCDCOE Publication, Talinn, Sf.180-188, 2012.
  • [27] International Group of Experts at the Invitation of The NATO Cooparative Cyber Defence Centre of Excellence, Talinn Manual On The International Law Applicable to Cyber Warfare, Cambridge University Press. 2013.
  • [28] M.Ünver, C.Canbay, A.G.Mirzaoğlu, “Siber Güvenliğin Sağlanması: Türkiye'deki Mevcut Durum ve Alınması Gereken Tedbirler”, Bilgi Teknolojileri ve Koordinasyon Dairesi Başkanlığı, Sf.22-52, 2009.
  • [29] F.Wamala, ITU National Cybersecurity Strategy Guide, Sf.25-65, 2011.
  • [30] H.I.Toure, “ITU Global Cybersecurity Agenda (GCA) High-Level Experts Group (HLEG) Global Strategic Report”, Sf.92-101, 2008.
  • [31] Anonim, (10 Şubat 2017) [Online]. Erişim: https://www.first.org/about/mission

Investigation Of Cyber Security Strategy Of North Atlantic Treaty Organisation (NATO)

Year 2017, Volume: 5 Issue: 2, 632 - 656, 31.07.2017

Abstract

Because of the fact that developments taking place in recent years in information and communication technology, digital boundaries has taken the place of the geographical boundaries. The challenges of protecting national interests against cyber attacks and ensuring the border security of cyberspace has made it inevitable for governments to make international agreements.In this study, it is aimed to make a positive contribution to the cyber security strategy implemented by Turkey by examining the cyber security strategy applied by NATO, one of the biggest organizations that unite countries under the same roof in the globalizing world.

References

  • [1] B. Schneier, Secrets and Lies, Digital Security In A Networked World, Indiana, Wiley Publishing, 2000.
  • [2] “The National Strategy to Secure Cyberspace”, The White House, Washington, 2007.
  • [3] M.C. Libicki, Cyberdeterrence and Cyberwar, USA, RAND Corporation, 2009, Sf.12-13.
  • [4] R. Hill, “Dealing With Cyber Security Threats: International Coorporation, ITU and WCIT”, 7th International Conference on Cyber Conflict, sf.119-134, 2015.
  • [5] FACT SHEET: Cybersecurity Legislative Proposal, (29 Nisan 2016). Erişim: https://www.whitehouse.gov/the-press-office/2011/05/12/fact-sheet-cybersecurity-legislative proposal.
  • [6] General James Cartwright, “Memorandum for Chiefs of the Military Servs., Commanders of the Combatant Commands, Dirs. of the Joint Staff Directories on Joint Terminology for Cyberspace Operations 5”, Depatment of Defense, Washington DC, 2011
  • [7] R. Clarke, R.Knake, Cyber War. HarperCollins e-books. Sf 11.
  • [8] P.Cornish, D.Livingstone, D.Clemente, C.Yorke, “On Cyber Warfare” A Clatham House Report, Sf.1, 2010.
  • [9] C. Stallard, C. (2011). “At The Crossroads of Cyber Warfare: Signposts For The Royal Australian Air Force” Yüksek Lisans Tezi, School of Advanced Air and Space Studies, Maxwell Air Force Base, Alabama, USA, 2011, Sf 47.
  • [10] Anonim, (20 Haziran 2016). [Online]. Erişim: http://www.nato.int/cps/en/natohq/natocountries.htm
  • [11] Anonim, (25 Haziran 2016). [Online]. Erişim: http://www.nato.int/cps/en/natohq/structure.htm
  • [12] J.Arquilla, D.Ronfeldt, Networks and Netwars The Future of Terror, Crime, and Militancy. USA, RAND Corporation, 2001, Sf.240-248.
  • [13] R.Kaiser, “The birth of cyberwar”, Political Geography 46, Sf.11-20, 2015
  • [14] P.Shakarian, J.Shakarian, A.Ruef, Introduction To Cyber-Warfare: A Multidisciplinary Approach, USA, Elsevier, 2013, Sf.16-20.
  • [15] S.Herzog, “Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses”, Journal of Strategic Security, Number 2, Volume 4, Sf.54-55, 2011.
  • [16] S.Bıçakcı, “NATO’nun Gelişen Tehdit Algısı: 21. Yüzyılda Siber Güvenlik”, Uluslararası İlişkiler Akademik Dergi, Cilt 10, Sayı 40, Sf.101-130, 2014.
  • [17] S.Bıçakcı, “Yeni Savaş Ve Siber Güvenlik Arasında NATO’nun Yeniden Doğuşu”, Uluslararası İlişkiler Akademik Dergi, Cilt 9, Sayı 34, Sf.205-226, 2012.
  • [18] J.Carr, (2010). Inside Cyber Warfare, O’Reilly Media, Second Edition, USA, 2012, Sf.31.
  • [19] T.Check, “Book Review: Analyzing the Effectiveness of the Tallinn Manual’s Jus Ad Bellum Doctrine on Cyberconflict: A NATO-Centric Approach”, Cleveland State University Law Journals, Sf.495-512, 2015.
  • [20] NATO CCDCOE, (2016, 10 Temmuz), 2008 NATO Bucharest Summit Declaration, Erişim: https://ccdcoe.org/sites/default/files/documents/NATO-080403BucharestSummitDeclaration.pdf
  • [21] Anonim, (10 Temmuz 2016) [Online]. Erişim: https://ccdcoe.org/history.html
  • [22] NATO CCDCOE, (2016, 8 Temmuz), Lisbon Summit Declaration, Erişim: http://www.nato.int/cps/en/natolive/official_ texts_68828.htm
  • [23] Anonim, (8 Temmuz 2016) [Online]. Erişim: http://www.nato.int/nato_static_fl2014/assets/pdf/ pdf_publications/20120214_strategic-concept-2010-eng.pdf
  • [24] Rapporteur R.Noshiravani, “NATO and Cyber Security: Building on the Strategic Concept”, Chatham House Report, 2011.
  • [25] NATO Document, “Defending the Networks: The NATO Policy on Cyber Defence”, Brüksel, 2011.
  • [26] A.Klimburg, National Cyber Security Framework Manual, NATO CCDCOE Publication, Talinn, Sf.180-188, 2012.
  • [27] International Group of Experts at the Invitation of The NATO Cooparative Cyber Defence Centre of Excellence, Talinn Manual On The International Law Applicable to Cyber Warfare, Cambridge University Press. 2013.
  • [28] M.Ünver, C.Canbay, A.G.Mirzaoğlu, “Siber Güvenliğin Sağlanması: Türkiye'deki Mevcut Durum ve Alınması Gereken Tedbirler”, Bilgi Teknolojileri ve Koordinasyon Dairesi Başkanlığı, Sf.22-52, 2009.
  • [29] F.Wamala, ITU National Cybersecurity Strategy Guide, Sf.25-65, 2011.
  • [30] H.I.Toure, “ITU Global Cybersecurity Agenda (GCA) High-Level Experts Group (HLEG) Global Strategic Report”, Sf.92-101, 2008.
  • [31] Anonim, (10 Şubat 2017) [Online]. Erişim: https://www.first.org/about/mission
There are 31 citations in total.

Details

Primary Language Turkish
Subjects Engineering
Journal Section Articles
Authors

Mehmet Ada This is me

Hüseyin Çakır This is me

Publication Date July 31, 2017
Published in Issue Year 2017 Volume: 5 Issue: 2

Cite

APA Ada, M., & Çakır, H. (2017). Kuzey Atlantik Antlaşma Örgütü’nün (NATO) Siber Güvenlik Stratejisinin İncelenmesi. Duzce University Journal of Science and Technology, 5(2), 632-656.
AMA Ada M, Çakır H. Kuzey Atlantik Antlaşma Örgütü’nün (NATO) Siber Güvenlik Stratejisinin İncelenmesi. DUBİTED. July 2017;5(2):632-656.
Chicago Ada, Mehmet, and Hüseyin Çakır. “Kuzey Atlantik Antlaşma Örgütü’nün (NATO) Siber Güvenlik Stratejisinin İncelenmesi”. Duzce University Journal of Science and Technology 5, no. 2 (July 2017): 632-56.
EndNote Ada M, Çakır H (July 1, 2017) Kuzey Atlantik Antlaşma Örgütü’nün (NATO) Siber Güvenlik Stratejisinin İncelenmesi. Duzce University Journal of Science and Technology 5 2 632–656.
IEEE M. Ada and H. Çakır, “Kuzey Atlantik Antlaşma Örgütü’nün (NATO) Siber Güvenlik Stratejisinin İncelenmesi”, DUBİTED, vol. 5, no. 2, pp. 632–656, 2017.
ISNAD Ada, Mehmet - Çakır, Hüseyin. “Kuzey Atlantik Antlaşma Örgütü’nün (NATO) Siber Güvenlik Stratejisinin İncelenmesi”. Duzce University Journal of Science and Technology 5/2 (July 2017), 632-656.
JAMA Ada M, Çakır H. Kuzey Atlantik Antlaşma Örgütü’nün (NATO) Siber Güvenlik Stratejisinin İncelenmesi. DUBİTED. 2017;5:632–656.
MLA Ada, Mehmet and Hüseyin Çakır. “Kuzey Atlantik Antlaşma Örgütü’nün (NATO) Siber Güvenlik Stratejisinin İncelenmesi”. Duzce University Journal of Science and Technology, vol. 5, no. 2, 2017, pp. 632-56.
Vancouver Ada M, Çakır H. Kuzey Atlantik Antlaşma Örgütü’nün (NATO) Siber Güvenlik Stratejisinin İncelenmesi. DUBİTED. 2017;5(2):632-56.