Conference Paper
BibTex RIS Cite

Cyber Attacks Directed Information Systems (IS) and Maintenance of Cyber Security

Year 2018, Volume: 7 Issue: 2, 24 - 33, 01.08.2018

Abstract



Abstract: The concept of cyber security and cyber attacks have been
playing a critical role in the achievement of both national security and
corporate competitiveness as a result of the increase of worldwide rapid spread
in the field of information and communication technologies, data storage and
data communication. 



Hacker attacks have severely damaged sometimes computer
users, sometimes companies and government institutions. These attacks have
confronted us in the forms of ransomwares, phishings, DDOS attacks, mobile
threats and etc.



Economic losses resulting from cyber attacks in recent
years have been threating corporations severely. It is mandatory for
corporations any longer to protect information systems through cyber security,
secure the data confidentiality, integrity and accessibility, detect cyber
attacks in advance and take counter measures against these attacks.



Within the scope of this study, Cyber Security Reports
and Surveys prepared by various institutions in some countries are examined. As
a result of this examination, cyber threats and practices, security risks and
weaknesses are analyzed, the recommendations regarding compulsory measure and
the security awareness are given in the article.



References

  • Akyıldız, M. A., (2015), Uygulamalarla Siber Güvenliğe Giriş, Gazi Yayınevi, ss.585, ISBN:9786053442745, Turkey.
  • Altundal Ö.F., (2013), “DDoS nedir, ne değildir?”, https://encokbilisimhukuku.wordpress.com/2013/04/16/ddos-saldirisi/ E.Tar:28.03.2018
  • Cyber Security Breaches Survey 2016, (2016), HM Government&Social Research Institute&University of Portsmouth,https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/521465/Cyber_Security_Breaches_Survey_2016_main_report_FINAL.pdf, E.Tar: 02.04.2018
  • Cybercrime Report 2017, (2017), Cybersecurity Ventures, https://cybersecurityventures.com/2015-wp/wp-content/uploads/2017/10/2017-Cybercrime-Report.pdf, E.Tar: 05.04.2018
  • EY Global Information Security Survey Report 2017-2018, (2017-2018), Ernst & Young, https://www.ey.com/gl/en/services/advisory/ey-global-information-security-survey-2017-18, E.Tar: 03.04.2018
  • Financial Times, (2017), “Hackers hit Macron campaign with ‘massive’ attack,”, https://www.ft.com/content/79341cc4-3233-11e7-bce4-9023f8c0fd2e, E.Tar: 05.04.2018Global Risks Report 2017 (2017), World Economic Forum, http://www3.weforum.org/docs/GRR17_Report_web.pdf, E.Tar: 05.04.2018
  • Global Attitudes Survey 2017, (2017), Pew Research Center, http://www.pewresearch.org/methodology/international-survey-research/international-methodology/global-attitudes-survey/indonesia/2017/, E.Tar: 29.03.2018
  • Investigation: WannaCry cyber attack and the NHS Report 2017, (2017), National Audit Office, https://www.nao.org.uk/wp-content/uploads/2017/10/Investigation-WannaCry-cyber-attack-and-the-NHS.pdf, E.Tar: 05.04.2018
  • Miller, K. L., (2016) , About Reasonable Cybersecurity: A Proactive and Adaptive Approach, The Florida Bar Journal, 90:22, USA.
  • Milliyet Gazetesi, (2017), http://www.milliyet.com.tr/sibel-saldiri-nedir--teknoloji-haber-1991343/ E. Tarihi: 04.04.2018
  • New York Times, (2017), “All 3 billion Yahoo Accounts Were Affected by 2013 Attack”, https://www.nytimes.com/2017/10/03/technology/yahoo-hack-3-billion-users.html, E.Tar: 06.04.2018
  • Singer, P.W., Friedman, A., (2015), Siber Güvenlik ve Savaş, Buzdağı Yayınları, Ankara, ss:182.
  • Ulusal Siber Guvenlik Stratejisi 2016 - 2019, (2018), http://www.udhb.gov.tr/doc/siberg/2016-2019guvenlik.pdf, E.Tar: 28.03.2018
  • The Global State of Information Security Survey 2017, (2017), PWC, https://www.pwc.com.tr/en/gsiss2017, E.Tar: 02.04.2018
  • The Global State of Information Security Survey 2018, (2018), PWC, https://www.pwc.com.tr/gsiss2018-en, E.Tar: 06.04.2018
  • The Global State of Information Security Survey 2017, Bold Steps to Manage Geopolitical Cyber Threats, (2017), PwC, https://www.pwc.com/gx/en/issues/assets/2017-gsisss-bold-steps-to-manage-geopolitical-threats-final.pdf, E.Tar: 29.03.2018
  • The Global State of Information Security Survey 2017, Uncovering the Potential of the Internet of Things, (2017), PwC, https://www.pwc.com/gx/en/issues/assets/pwc-GSISS-2017-uncovering-the-potential-of-iot.pdf, E.Tar: 26.03.2018
  • The State of Industrial Cybersecurity 2017, (2017), Kaspersky, https://go.kaspersky.com/rs/802-IJN-240/images/ICS%20WHITE%20PAPER.pdf, E.Tar: 25.03.2018TUİK (2013), http://www.tuik.gov.tr/UstMenu.do?metod=temelist, E.Tar: 24.03.2018
  • TUİK (2017), http://www.tuik.gov.tr/PreIstatistikTablo.do?istab_id=41, E.Tar:24.03.2018
  • Ulusal Siber Güvenlik Stratejisi 2016-2019, (2016-2019), Ulaştırma ve Denizcilik Bakanlığı, http://www.udhb.gov.tr/doc/siberg/2016-2019guvenlik.pdf, E.Tar: 26.03.2018
  • Vural, Y., Sağıroğlu, Ş., (2008), Kurumsal Bilgi Güvenliği ve Standartları Üzerine Bir İnceleme, Gazi Üniv. Müh. Mim. Fakültesi Dergisi, 23(2), 507-522.
  • Yeniman Yıldırım, E., Adalı, E., (2017), The Threats and Risks in Personal Data Security, 2017 International Conference on Computer Science and Engineering (UBMK), IEEE Xplor, Doi: 10.1109/UBMK.2017.8093478, 610-615, 5-8 Oct., Turkey.
  • Yeniman Yıldırım, E., Akalp, G., Aytaç, S., Bayram, N., (2011), Factors Influencing Information Security Management in Small and Medium-sized Enterprises: A Case Study from Turkey, International Journal of Information Management, 31(4):360-365, ISSN: 0268-4012, Doi: 10.1016/j.ijinfomgt.2010.10.006, USA.
  • Yildirim, E., (2016), Advances in Human Factors in Cybersecurity, The Importance of Information Security Awareness for the Success of Business Enterprises, 501:211-222, ISBN: 978-3-319-41931-2, Doi: 10.1007/978-3-319-41932-9_17, Springer, USA.

Bilişim Sistemlerine Yönelik Siber Saldırılar ve Siber Güvenliğin Sağlanması

Year 2018, Volume: 7 Issue: 2, 24 - 33, 01.08.2018

Abstract



Özet: Dünyada bilgi ve iletişim teknolojilerinin hızla
yaygınlaşması, internet kullanımının artması, bilgi depolanması ve
iletilmesinin çoğalması sonucunda Siber Güvenlik ve Siber Saldırı kavramı hem
ulusal güvenliğin hem de kurumların rekabet gücünün sağlanmasında önemli rol
oynamaktadır. 



Siber Güvenlik kavramıyla birlikte bilgisayar korsanlarının
sürdürdüğü saldırılar kimi zaman kullanıcıları, kimi zaman da şirketleri ve
devlet kurumlarını hedef alarak büyük zarara uğratmaktadır. Bu saldırılar
genellikle fidye yazılımları, olta saldırıları, DDOS saldırıları, mobil
tehditler vb. olarak karşımıza çıkmaktadır.



Son yıllarda Siber Saldırılar dolayısı ile ortaya çıkan
zararlar kurumları ciddi olarak tehdit etmektedir. Siber Güvenlikle bilişim
sistemlerinin Siber Saldırılardan korunması, işlenen bilgilerin gizlilik,
bütünlük ve erişilebilirliğinin güvence altına alınması, Siber Saldırıların
önceden tespit edilmesi ve bu tespitlere karşı önlemlerin alınması kurumlar
için artık bir zorunluluktur.



Bu çalışma kapsamında, dünyadaki bazı ülkelerde farklı
kurumlar tarafından hazırlanan Siber Güvenlik Raporları ve yapılan Siber
Güvenlik anketleri incelenmiştir. Bu inceleme sonucunda siber tehditler ve bu
konuda neler yapıldığı, güvenlik riskleri, güvenlik zafiyetleri analiz edilmiş,
alınması gereken önlemler ve farkındalık konusunda önerilere makalede yer
verilmiştir. 



References

  • Akyıldız, M. A., (2015), Uygulamalarla Siber Güvenliğe Giriş, Gazi Yayınevi, ss.585, ISBN:9786053442745, Turkey.
  • Altundal Ö.F., (2013), “DDoS nedir, ne değildir?”, https://encokbilisimhukuku.wordpress.com/2013/04/16/ddos-saldirisi/ E.Tar:28.03.2018
  • Cyber Security Breaches Survey 2016, (2016), HM Government&Social Research Institute&University of Portsmouth,https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/521465/Cyber_Security_Breaches_Survey_2016_main_report_FINAL.pdf, E.Tar: 02.04.2018
  • Cybercrime Report 2017, (2017), Cybersecurity Ventures, https://cybersecurityventures.com/2015-wp/wp-content/uploads/2017/10/2017-Cybercrime-Report.pdf, E.Tar: 05.04.2018
  • EY Global Information Security Survey Report 2017-2018, (2017-2018), Ernst & Young, https://www.ey.com/gl/en/services/advisory/ey-global-information-security-survey-2017-18, E.Tar: 03.04.2018
  • Financial Times, (2017), “Hackers hit Macron campaign with ‘massive’ attack,”, https://www.ft.com/content/79341cc4-3233-11e7-bce4-9023f8c0fd2e, E.Tar: 05.04.2018Global Risks Report 2017 (2017), World Economic Forum, http://www3.weforum.org/docs/GRR17_Report_web.pdf, E.Tar: 05.04.2018
  • Global Attitudes Survey 2017, (2017), Pew Research Center, http://www.pewresearch.org/methodology/international-survey-research/international-methodology/global-attitudes-survey/indonesia/2017/, E.Tar: 29.03.2018
  • Investigation: WannaCry cyber attack and the NHS Report 2017, (2017), National Audit Office, https://www.nao.org.uk/wp-content/uploads/2017/10/Investigation-WannaCry-cyber-attack-and-the-NHS.pdf, E.Tar: 05.04.2018
  • Miller, K. L., (2016) , About Reasonable Cybersecurity: A Proactive and Adaptive Approach, The Florida Bar Journal, 90:22, USA.
  • Milliyet Gazetesi, (2017), http://www.milliyet.com.tr/sibel-saldiri-nedir--teknoloji-haber-1991343/ E. Tarihi: 04.04.2018
  • New York Times, (2017), “All 3 billion Yahoo Accounts Were Affected by 2013 Attack”, https://www.nytimes.com/2017/10/03/technology/yahoo-hack-3-billion-users.html, E.Tar: 06.04.2018
  • Singer, P.W., Friedman, A., (2015), Siber Güvenlik ve Savaş, Buzdağı Yayınları, Ankara, ss:182.
  • Ulusal Siber Guvenlik Stratejisi 2016 - 2019, (2018), http://www.udhb.gov.tr/doc/siberg/2016-2019guvenlik.pdf, E.Tar: 28.03.2018
  • The Global State of Information Security Survey 2017, (2017), PWC, https://www.pwc.com.tr/en/gsiss2017, E.Tar: 02.04.2018
  • The Global State of Information Security Survey 2018, (2018), PWC, https://www.pwc.com.tr/gsiss2018-en, E.Tar: 06.04.2018
  • The Global State of Information Security Survey 2017, Bold Steps to Manage Geopolitical Cyber Threats, (2017), PwC, https://www.pwc.com/gx/en/issues/assets/2017-gsisss-bold-steps-to-manage-geopolitical-threats-final.pdf, E.Tar: 29.03.2018
  • The Global State of Information Security Survey 2017, Uncovering the Potential of the Internet of Things, (2017), PwC, https://www.pwc.com/gx/en/issues/assets/pwc-GSISS-2017-uncovering-the-potential-of-iot.pdf, E.Tar: 26.03.2018
  • The State of Industrial Cybersecurity 2017, (2017), Kaspersky, https://go.kaspersky.com/rs/802-IJN-240/images/ICS%20WHITE%20PAPER.pdf, E.Tar: 25.03.2018TUİK (2013), http://www.tuik.gov.tr/UstMenu.do?metod=temelist, E.Tar: 24.03.2018
  • TUİK (2017), http://www.tuik.gov.tr/PreIstatistikTablo.do?istab_id=41, E.Tar:24.03.2018
  • Ulusal Siber Güvenlik Stratejisi 2016-2019, (2016-2019), Ulaştırma ve Denizcilik Bakanlığı, http://www.udhb.gov.tr/doc/siberg/2016-2019guvenlik.pdf, E.Tar: 26.03.2018
  • Vural, Y., Sağıroğlu, Ş., (2008), Kurumsal Bilgi Güvenliği ve Standartları Üzerine Bir İnceleme, Gazi Üniv. Müh. Mim. Fakültesi Dergisi, 23(2), 507-522.
  • Yeniman Yıldırım, E., Adalı, E., (2017), The Threats and Risks in Personal Data Security, 2017 International Conference on Computer Science and Engineering (UBMK), IEEE Xplor, Doi: 10.1109/UBMK.2017.8093478, 610-615, 5-8 Oct., Turkey.
  • Yeniman Yıldırım, E., Akalp, G., Aytaç, S., Bayram, N., (2011), Factors Influencing Information Security Management in Small and Medium-sized Enterprises: A Case Study from Turkey, International Journal of Information Management, 31(4):360-365, ISSN: 0268-4012, Doi: 10.1016/j.ijinfomgt.2010.10.006, USA.
  • Yildirim, E., (2016), Advances in Human Factors in Cybersecurity, The Importance of Information Security Awareness for the Success of Business Enterprises, 501:211-222, ISBN: 978-3-319-41931-2, Doi: 10.1007/978-3-319-41932-9_17, Springer, USA.
There are 24 citations in total.

Details

Primary Language Turkish
Subjects Linguistics
Journal Section Research Article
Authors

Ebru Yeniman Yıldırım

Publication Date August 1, 2018
Published in Issue Year 2018 Volume: 7 Issue: 2

Cite

APA Yeniman Yıldırım, E. (2018). Bilişim Sistemlerine Yönelik Siber Saldırılar ve Siber Güvenliğin Sağlanması. Mesleki Bilimler Dergisi (MBD), 7(2), 24-33.