Research Article
BibTex RIS Cite
Year 2017, Volume: 3 Issue: 2, 33 - 41, 31.12.2017

Abstract

References

  • [1] Cyber Defence Exercise Locked Shields 2013 – After Action Report, NATO CCD COE, Tallinn, 2013.
  • [2] Cyber Defence Exercise Locked Shields 2014 – After Action Report, NATO CCD COE, Tallinn, 2014.
  • [3] Cyber Defence Exercise Locked Shields 2015 – After Action Report, NATO CCD COE, Tallinn, 2015.
  • [4] Cyber Defence Exercise Locked Shields 2016 – After Action Report, NATO CCD COE, Tallinn, 2016.
  • [5] The 2015 Report on National and International Cyber Security Exercises, ENISA, 2015.
  • [6] Locked Shields 2017, NATO CCD COE, Retrieved from: https://ccdcoe.org/locked-shields-2017.html, 2017.
  • [7] Cyber Coalition 16: NATOs Largest Cyber Defence Exercise, NATO SHAPE, Retrieved from: https://www.shape.nato.int/2016/cyber-coalition-16-ends-natos-largest-cyber-defence-exercise, 2017.
  • [8] Cyber Europe 2016, Retreived from: https://www.enisa.europa.eu/topics/cyber-exercises/cyber-europe- programme/ce-2016, 2017.
  • [9] Cyber Defense Exercises – Participant Information Package, ENISA, 2013. [10] Introduction to Cyber Exercises, National Cyber Security, Division Cyber Exercise Program, DHS, 2003. [11] N. Wilhelmson, T. Svensson, “Handbook for Planning, Running, and Evaluating Information Technology and Cyber Security Exercises”, CATS, 2013.
  • [12] C. A. M. Forero, Tabletop Exercise For Cybersecurity Educational Training; Theoretical Grounding And Development, Master’s Thesis, 2016.
  • [13] J. Kick, “Cyber Exercise Playbook”, The MITRE Corp., 2014.
  • [14] Cyber-Exercises Analysis Report, ENISA. 2016.
  • [15] Good Practice Guide on National Exercises, ENISA, 2009.
  • [16] Joint Training Manual for the Armed Forces of the United States, Chairman of the Joint Chiefs of Staff Manual, 2012.
  • [17] 2016 - 2019 Ulusal Siber Guvenlik Stratejisi, T.C. UDHB, 2016.
  • [18] R. Kissel (Ed.), “Glossary of Key Information Security Terms”, NIST, 2013.
  • [19] H. Watanbe, S. Fujimura, A. Nakadaira, Y. Miyazaki, A. Akutsu and J. Kishigami. “Blockchain Contract: Securing a Blockchain Applied to Smart Contracts”. IEEE International Conference on Consumer Electronics (ICCE), pp. 467-468, 2016.
  • [20] S. Singh and N. Singh. “Blockchain: Future of Financial and Cyber Security”. IEEE 2nd International Conference on Contemporary Computing and Informatics (IC3I), pp. 463-467, 2016.
  • [21] SecureChain: A Blockchain Security Gateway for SDN. http://www.reply.com/en/content/securechain (Erişim Tarihi: 30.08.2017).
  • [22] N.B. Barnas. “Blockchains in National Defense: Trustworthy Systems in a Trustless World”. A Research Report Submitted to the Faculty In Partial Fulfillment of the Graduation Requirements, Air University, 2016.
  • [23] K.J. O’Dwyer and D. Malone. “Bitcoin Mining and its Energy Footprint”. 25th IET Irish Signals & Systems Conference and China - Ireland International Conference on Information and Communications Technologies (ISSC 2014 / CIICT 2014), 2014.
  • [24] The Bitcoin and Blockchain: Energy Hogs. https://theconversation.com/the-bitcoin-and-blockchain-energy-hogs-77761 (Erişim Tarihi: 30.08.2017).
  • [25] J. Poon and T. Dryja. “The Bitcoin Lightning Network: Scalable Off-Chain Instant Payments”. 2016. DRAFT Version 0.5.9.2. https://lightning.network/lightning-network-paper.pdf (Erişim Tarihi:30.08.2017).
  • [26] Could a Blockchain-based Electricity Network Change the Energy Market? https://www.theguardian.com/sustainable-business/2017/jul/13/could-a-blockchain-based-electricity-network-change-the-energy-market (Erişim Tarihi: 30.08.2017).
  • [27] Proof of Work vs Proof of Stake: Basic Mining Guide. https://blockgeeks.com/guides/proof-of-work-vs-proof-of-stake (Erişim Tarihi: 30.08.2017).

SİBER SAVUNMA TATBİKATLARI: PLANLAMA, UYGULAMA VE DEĞERLENDİRME

Year 2017, Volume: 3 Issue: 2, 33 - 41, 31.12.2017

Abstract

Siber savunma tatbikatları, siber
güvenlik bilinirliliğini arttırmak, siber alanda meydana gelebilecek olası
farklı senaryolarda nasıl hareket edilmesi gerektiği konusunda gerekli ortamın
oluşturulması, ve konuyla ilgili uzmanların uygulamalı olarak eğitimleri
açısından bakıldığında çok önemli bir araçtır. Söz konusu tatbikatlar siber
alanda alınabilecek önlemler konusunda karar vericilere ve bu alan için
geliştirilebilecek araçlar, teknikler ve prosedürler konusunda siber savunma
ile görevli veya ilgili kurum, kuruluş, ve personele de fikirler
verebilmektedir. Siber savunma tatbikatlarında gerçeğe en yakın şekilde
oluşturulan senaryolarla özellikle siber saldırılar ile karşı karşıya iken
özellikle stres altında en iyi kararları verebilme ve takım olarak koordineli
hareket edebilmenin zorunluluğunu beraberinde getirerek çok önemli katkılar
sağlamaktadır. Bu makalenin amacı uluslararası siber savunma tatbikatları göz
önünde bulundurularak ve karşılaştırılarak bu tatbikatların planlama, uygulama
ve değerlendirme aşamalarını ortaya koyarak konuyu bilimsel açıdan ele
almaktır. Çalışmanın bir diğer amacı ise söz konusu süreçler her ne kadar yapılması
planlanan tatbikatın hedef kitlesine göre farklılıklar arz etse de, türüne
bakılmaksızın genel bir siber savunma tatbikatında olması gerekli süreçleri de
ortaya koyabilmektir.























References

  • [1] Cyber Defence Exercise Locked Shields 2013 – After Action Report, NATO CCD COE, Tallinn, 2013.
  • [2] Cyber Defence Exercise Locked Shields 2014 – After Action Report, NATO CCD COE, Tallinn, 2014.
  • [3] Cyber Defence Exercise Locked Shields 2015 – After Action Report, NATO CCD COE, Tallinn, 2015.
  • [4] Cyber Defence Exercise Locked Shields 2016 – After Action Report, NATO CCD COE, Tallinn, 2016.
  • [5] The 2015 Report on National and International Cyber Security Exercises, ENISA, 2015.
  • [6] Locked Shields 2017, NATO CCD COE, Retrieved from: https://ccdcoe.org/locked-shields-2017.html, 2017.
  • [7] Cyber Coalition 16: NATOs Largest Cyber Defence Exercise, NATO SHAPE, Retrieved from: https://www.shape.nato.int/2016/cyber-coalition-16-ends-natos-largest-cyber-defence-exercise, 2017.
  • [8] Cyber Europe 2016, Retreived from: https://www.enisa.europa.eu/topics/cyber-exercises/cyber-europe- programme/ce-2016, 2017.
  • [9] Cyber Defense Exercises – Participant Information Package, ENISA, 2013. [10] Introduction to Cyber Exercises, National Cyber Security, Division Cyber Exercise Program, DHS, 2003. [11] N. Wilhelmson, T. Svensson, “Handbook for Planning, Running, and Evaluating Information Technology and Cyber Security Exercises”, CATS, 2013.
  • [12] C. A. M. Forero, Tabletop Exercise For Cybersecurity Educational Training; Theoretical Grounding And Development, Master’s Thesis, 2016.
  • [13] J. Kick, “Cyber Exercise Playbook”, The MITRE Corp., 2014.
  • [14] Cyber-Exercises Analysis Report, ENISA. 2016.
  • [15] Good Practice Guide on National Exercises, ENISA, 2009.
  • [16] Joint Training Manual for the Armed Forces of the United States, Chairman of the Joint Chiefs of Staff Manual, 2012.
  • [17] 2016 - 2019 Ulusal Siber Guvenlik Stratejisi, T.C. UDHB, 2016.
  • [18] R. Kissel (Ed.), “Glossary of Key Information Security Terms”, NIST, 2013.
  • [19] H. Watanbe, S. Fujimura, A. Nakadaira, Y. Miyazaki, A. Akutsu and J. Kishigami. “Blockchain Contract: Securing a Blockchain Applied to Smart Contracts”. IEEE International Conference on Consumer Electronics (ICCE), pp. 467-468, 2016.
  • [20] S. Singh and N. Singh. “Blockchain: Future of Financial and Cyber Security”. IEEE 2nd International Conference on Contemporary Computing and Informatics (IC3I), pp. 463-467, 2016.
  • [21] SecureChain: A Blockchain Security Gateway for SDN. http://www.reply.com/en/content/securechain (Erişim Tarihi: 30.08.2017).
  • [22] N.B. Barnas. “Blockchains in National Defense: Trustworthy Systems in a Trustless World”. A Research Report Submitted to the Faculty In Partial Fulfillment of the Graduation Requirements, Air University, 2016.
  • [23] K.J. O’Dwyer and D. Malone. “Bitcoin Mining and its Energy Footprint”. 25th IET Irish Signals & Systems Conference and China - Ireland International Conference on Information and Communications Technologies (ISSC 2014 / CIICT 2014), 2014.
  • [24] The Bitcoin and Blockchain: Energy Hogs. https://theconversation.com/the-bitcoin-and-blockchain-energy-hogs-77761 (Erişim Tarihi: 30.08.2017).
  • [25] J. Poon and T. Dryja. “The Bitcoin Lightning Network: Scalable Off-Chain Instant Payments”. 2016. DRAFT Version 0.5.9.2. https://lightning.network/lightning-network-paper.pdf (Erişim Tarihi:30.08.2017).
  • [26] Could a Blockchain-based Electricity Network Change the Energy Market? https://www.theguardian.com/sustainable-business/2017/jul/13/could-a-blockchain-based-electricity-network-change-the-energy-market (Erişim Tarihi: 30.08.2017).
  • [27] Proof of Work vs Proof of Stake: Basic Mining Guide. https://blockgeeks.com/guides/proof-of-work-vs-proof-of-stake (Erişim Tarihi: 30.08.2017).
There are 25 citations in total.

Details

Primary Language Turkish
Subjects Engineering
Journal Section Makaleler
Authors

ENSAR Şeker This is me

Publication Date December 31, 2017
Submission Date October 3, 2017
Published in Issue Year 2017 Volume: 3 Issue: 2

Cite

IEEE E. Şeker, “SİBER SAVUNMA TATBİKATLARI: PLANLAMA, UYGULAMA VE DEĞERLENDİRME”, UBGMD, vol. 3, no. 2, pp. 33–41, 2017.