<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                    <journal-id></journal-id>
            <journal-title-group>
                                                                                    <journal-title>Yönetim Bilişim Sistemleri Dergisi</journal-title>
            </journal-title-group>
                            <issn pub-type="ppub">2630-550X</issn>
                                        <issn pub-type="epub">2630-550X</issn>
                                                                                            <publisher>
                    <publisher-name>Dokuz Eylul University</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id/>
                                                                                                                                                                                            <title-group>
                                                                                                                        <article-title>YENİ NORMAL DÜNYA DÜZENİNİN SİBER GÜVENLİK VE BİLGİ GÜVENLİĞİNE ETKİLERİ</article-title>
                                                                                                                                                                                                <trans-title-group xml:lang="en">
                                    <trans-title>EFFECTS OF THE NEW NORMAL WORLD ORDER TO CYBER AND INFORMATION SECURITY</trans-title>
                                </trans-title-group>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-2209-4947</contrib-id>
                                                                <name>
                                    <surname>Korucu</surname>
                                    <given-names>Onur</given-names>
                                </name>
                                                                    <aff>Knowledge Academy</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20210707">
                    <day>07</day>
                    <month>07</month>
                    <year>2021</year>
                </pub-date>
                                        <volume>7</volume>
                                        <issue>1</issue>
                                        <fpage>44</fpage>
                                        <lpage>60</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20210401">
                        <day>04</day>
                        <month>01</month>
                        <year>2021</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20210616">
                        <day>06</day>
                        <month>16</month>
                        <year>2021</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2015, </copyright-statement>
                    <copyright-year>2015</copyright-year>
                    <copyright-holder></copyright-holder>
                </permissions>
            
                                                                                                <abstract><p>Hızla değişmekte olan dünya teknoloji sahası, Dünya Sağlık Örgütü’nün (DSÖ) 30 Ocak 2020 tarihinde küresel pandemi olarak ilan ettiği Covid-19 salgını ile yeniden şekillenmiştir.  Yaşanan pandemi, teknoloji başta olmak üzere sosyal, sağlık, eğitim, ekonomi, güvenlik, gıda, tedarik zinciri, iletişim ve ulaşım vb. birçok sektörleri kritik seviyede etkilemekte, küresel ve ulusal ölçekte sıra dışı boyutta değişimlere sebebiyet vermektedir. Yeni normal düzende, bilinen siber güvenlik ve veri hırsızlığı saldırılarına farklı bilişim platformlarında yaşanan veri güvenliği ihlalleri eklenmiştir. Dijital ortamlarda veri güvenliğinin sağlanması, tüm iş modellerinin ve mevzuatlarla uyumluluğun kökenindedir. Veri güvenliğinin sağlanması konusunda birbirinden farklı yaklaşımlar, aynı amaçla denetim ve kontrol fonksiyonlarını sağlamaktadır. Veri güvenliği ancak, veri güvenliğinin bozulmasına sebep olan ya da olabilecek risk ve tehditlerin tayin edilmesi ve yönetilmesi ile mümkündür. Sürekli izlenebilir ve ölçümlenebilir veri güvenliği, kurumsal risk yönetimi modeli ile belirlenmiş risklerin yönetimi ve yeni tehditlerin öngörümlenebilmesi ile sağlanmalıdır. Yapılan çalışmada 2000’ler sonrasında şekillenen teknoloji sahasının, yaşanan olağan üstü şartlarda yeni dünya düzeni kuralları ile nasıl şekillendiği ele alınmış olup, daha dirençli bilgi güvenliği ve siber güvenlik yaklaşımlarına ilişkin öneriler sunulmaktadır.</p></abstract>
                                                                                                                                    <trans-abstract xml:lang="en">
                            <p>The fast-changing world&#039;s technology concept reshaped by the Covid-19 virus when World Health Organization (WHO) declared it as a global pandemic. The pandemic critically affected many different sectors particularly technology and others such as social, health, education, economic, security, food, logistics, communication, transportation, etc. It caused global and national unorthodox and critical changes. New data security violations are added to the known cybersecurity and data theft attacks in new normal. All business models and compliance practices with the regulations point out data security within a digital environment as a root action. When it comes to data privacy different approaches provide the same output using audit and control functions. Data security can only be maintained by identifying risks and threats that can exploit data and manage them. A continuously monitored and measured data security practice with corporate risk management model, can only be increased by the management of identified risks and forecasting new threats. This study provides suggestions in relation to more robust and consolidated information security and cyber security approaches by addressing how does the 2000&#039;s technology shaped with the new extraordinary conditions and the regulations of this new world.</p></trans-abstract>
                                                            
            
                                                            <kwd-group>
                                                    <kwd>Siber Güvenlik</kwd>
                                                    <kwd>  Bilgi Güvenliği</kwd>
                                                    <kwd>  Siber Dayanıklılık</kwd>
                                                    <kwd>  Risk Yönetimi</kwd>
                                                    <kwd>  Dijital Dönüşüm</kwd>
                                            </kwd-group>
                                                        
                                                                            <kwd-group xml:lang="en">
                                                    <kwd>Cyber Security</kwd>
                                                    <kwd>  Information Security</kwd>
                                                    <kwd>  Cyber Resilience</kwd>
                                                    <kwd>  Risk Management</kwd>
                                                    <kwd>  Digital Transformation</kwd>
                                            </kwd-group>
                                                                                                            </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">Bayraktar, G. (2015). Siber savaş ve ulusal güvenlik stratejisi. İstanbul: Yeniyüzıl Yayınevi.</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">Deloitte, Global siber güvenlik yönetici bilgilendirme raporu (2020).</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">https://www2.deloitte.com/content/dam/Deloitte/tr/Documents/risk/tr-web-kuresel-siber-guvenlik-yoneticibilgilendirme-raporu.pdf, (25.03.2021).</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">NATO CCDCOE, National cyber security framework manual (2018).</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">https://www.ccdcoe.org/uploads/2018/10/NCSFM_0.pdf, (26.03.2021).</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">Sağıroğlu, Ş. ve Alkan, M. (2012). Siber güvenlik siber savaşları, TBMM İnternet Komisyonu.</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">Cisco Annual Internet Report (2018-2023) White Paper (2020), 
https://www.cisco.com/c/en/us/solutions/collateral/executive-perspectives/annual-internet-report/white-paperc11-741490.html, (26.03.2021).</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">Kotenko, I. ve Chechulin, A. (2013). A cyber attack modeling and impact assessment framework, 5.
International Conference on Cyber Conflict, CYCON 2013, IEEE, 1–24, 2013.</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">Hindy, H., Brosset, D., Bayne, E., Seeam, A., Tachtatzis, C., Atkinson, R. ve Bellekens, X. (2018). A taxonomy 
and survey of ıntrusion detection system design techniques, network threats and datasets, arXiv:1806.03517, vol. 
1, no. 1, Article, 2018.</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">UK’s National Cyber Security Centre (NCSC), the US’ Department of Homeland Security (DHS) Cybersecurity, 
Infrastructure Security Agency (CISA), (2020). Advisory: COVID-19 exploited by malicious cyber actors.
https://www.ncsc.gov.uk/news/Covid-19-exploited-by-cyber-actors-advisory, (25.03.2021).</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">Lallie, H. S., Shepherd, L.A., Nurse J. R. C., Erola, A., Epiphaniou, G., Maple, C., ve Bellekens, X. (2020).</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">Cyber security in the age of COVID-19: a timeline and analysis of cyber-crime and cyber-attacks during the 
pandemic, arXiv:2006.11929v1, cs.CR, (21.03.2021).</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">Kolomiyets, O., Bethard, S. ve Moens, M. F. (2012). Extracting narrative timelines as temporal dependency 
structures, proceedings of the 50th annual meeting of the association for computational linguistics: long papersAssociation for Computational Linguistics, vol:1, 88–97.</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">Van Heerden, R., Von Soms, S. ve Mooi, R. (2016) Classification of Cyber Attacks in South Africa”, IST-Africa 
Week Conference, IEEE, 1–16, 2016.</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">Horton N. ve DeSimone, A. (2018) Sony’s Nightmare Before Christmas: North Korean Cyber Attack on Sony 
and Lessons for us Government Actions in Cyberspace, JHUAPL, Tech. Rep., United States, 2018.</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">Falliere, N., Murchu, L. O. ve Chien, E. (2011) W32. Stuxnet Dossier,”, Security Response, 5 (6): 29.
Yılmaz, Ö., Cömert, C. K. ve Güler, V. (2020) Havelsan Siber Güvenlik Bülteni, Siber Güvenlik Direktörlüğü.
Stubbs, J.(2020) Exclusive: Suspected North Korean hackers targeted COVID vaccine maker AstraZeneca –
sources, Reuters, https://uk.reuters.com/article/uk-healthcare-coronavirus-astrazeneca-no/exclusive-suspectednorth-korean-hackers-targeted-Covid-vaccine-maker-astrazeneca-sources-idUKKBN28719Y, (24.03.2021).</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">2020 Vulnerability and Threat Trends, Skybox Security, https://www.skyboxsecurity.com/wpcontent/uploads/2020/07/2020-VT_Trends_Executive_Summary.pdf, (24.02.2021).
2020 Sonicwall Cyber Threat Report, Cyber Threat Intelligence for Navigating the New Business Normal, 
https://www.sonicwall.com/resources/2020-cyber-threat-report-mid-year-update-pdf/, (26.03.2021).</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">Cloudy with a Chance Of Malice, Forecasting the New Era of Cloud-Enabled Threats, Netskope, 
https://resources.netskope.com/cloud-threat-report/cloud-and-threat-report-february-2021, (26.03.2021).
KPMG (2020) https://home.kpmg/tr/tr/home/medya/press-releases/2020/12/sirketler-teknolojiye-haftadafazladan-15milyar-dolar-harcadi.html, (26.03.2021).
ISO 22301:2019, Business Continuity Management System, Social Security, 3-4.Korucu O. Yönetim Bilişim Sistemleri Dergisi Cilt:7 Sayı:1
60</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">Snedaker (2021) Information Technology Executive, United States, 3, Business Continuity–Pandemic 
Preparation, https://www.isaca.org/resources/news-and-trends, (20.03.2021).</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">Ernst&amp;Young LLP (2021) COVID-19’un İç Denetim Fonksiyonu Üzerine Etkileri Araştırma Sonuçları, 
Ernst&amp;Young LLP, https://www.ey.com/en_gl/consulting/how-chief-audit-executives-areresponding-to-Covid19-in-the-next, (21.03.2021).</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">Trendmicro (2020) Injecting Deception Mid-Pandemic: Covid-19 Vaccine Related Threats,
https://www.trendmicro.com/en_us/research/21/c/injecting-deception-covid-19-vaccine-related-threats.html
(14.06.2021)
BBC (2021) Remote working: Is Big Tech going off work from home?, https://www.bbc.com/news/technology56614285 (14.06.2021</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
