Research Article
BibTex RIS Cite

YENİ NORMAL DÜNYA DÜZENİNİN SİBER GÜVENLİK VE BİLGİ GÜVENLİĞİNE ETKİLERİ

Year 2021, Volume: 7 Issue: 1, 44 - 60, 07.07.2021

Abstract

Hızla değişmekte olan dünya teknoloji sahası, Dünya Sağlık Örgütü’nün (DSÖ) 30 Ocak 2020 tarihinde küresel pandemi olarak ilan ettiği Covid-19 salgını ile yeniden şekillenmiştir. Yaşanan pandemi, teknoloji başta olmak üzere sosyal, sağlık, eğitim, ekonomi, güvenlik, gıda, tedarik zinciri, iletişim ve ulaşım vb. birçok sektörleri kritik seviyede etkilemekte, küresel ve ulusal ölçekte sıra dışı boyutta değişimlere sebebiyet vermektedir. Yeni normal düzende, bilinen siber güvenlik ve veri hırsızlığı saldırılarına farklı bilişim platformlarında yaşanan veri güvenliği ihlalleri eklenmiştir. Dijital ortamlarda veri güvenliğinin sağlanması, tüm iş modellerinin ve mevzuatlarla uyumluluğun kökenindedir. Veri güvenliğinin sağlanması konusunda birbirinden farklı yaklaşımlar, aynı amaçla denetim ve kontrol fonksiyonlarını sağlamaktadır. Veri güvenliği ancak, veri güvenliğinin bozulmasına sebep olan ya da olabilecek risk ve tehditlerin tayin edilmesi ve yönetilmesi ile mümkündür. Sürekli izlenebilir ve ölçümlenebilir veri güvenliği, kurumsal risk yönetimi modeli ile belirlenmiş risklerin yönetimi ve yeni tehditlerin öngörümlenebilmesi ile sağlanmalıdır. Yapılan çalışmada 2000’ler sonrasında şekillenen teknoloji sahasının, yaşanan olağan üstü şartlarda yeni dünya düzeni kuralları ile nasıl şekillendiği ele alınmış olup, daha dirençli bilgi güvenliği ve siber güvenlik yaklaşımlarına ilişkin öneriler sunulmaktadır.

References

  • Bayraktar, G. (2015). Siber savaş ve ulusal güvenlik stratejisi. İstanbul: Yeniyüzıl Yayınevi.
  • Deloitte, Global siber güvenlik yönetici bilgilendirme raporu (2020).
  • https://www2.deloitte.com/content/dam/Deloitte/tr/Documents/risk/tr-web-kuresel-siber-guvenlik-yoneticibilgilendirme-raporu.pdf, (25.03.2021).
  • NATO CCDCOE, National cyber security framework manual (2018).
  • https://www.ccdcoe.org/uploads/2018/10/NCSFM_0.pdf, (26.03.2021).
  • Sağıroğlu, Ş. ve Alkan, M. (2012). Siber güvenlik siber savaşları, TBMM İnternet Komisyonu.
  • Cisco Annual Internet Report (2018-2023) White Paper (2020), https://www.cisco.com/c/en/us/solutions/collateral/executive-perspectives/annual-internet-report/white-paperc11-741490.html, (26.03.2021).
  • Kotenko, I. ve Chechulin, A. (2013). A cyber attack modeling and impact assessment framework, 5. International Conference on Cyber Conflict, CYCON 2013, IEEE, 1–24, 2013.
  • Hindy, H., Brosset, D., Bayne, E., Seeam, A., Tachtatzis, C., Atkinson, R. ve Bellekens, X. (2018). A taxonomy and survey of ıntrusion detection system design techniques, network threats and datasets, arXiv:1806.03517, vol. 1, no. 1, Article, 2018.
  • UK’s National Cyber Security Centre (NCSC), the US’ Department of Homeland Security (DHS) Cybersecurity, Infrastructure Security Agency (CISA), (2020). Advisory: COVID-19 exploited by malicious cyber actors. https://www.ncsc.gov.uk/news/Covid-19-exploited-by-cyber-actors-advisory, (25.03.2021).
  • Lallie, H. S., Shepherd, L.A., Nurse J. R. C., Erola, A., Epiphaniou, G., Maple, C., ve Bellekens, X. (2020).
  • Cyber security in the age of COVID-19: a timeline and analysis of cyber-crime and cyber-attacks during the pandemic, arXiv:2006.11929v1, cs.CR, (21.03.2021).
  • Kolomiyets, O., Bethard, S. ve Moens, M. F. (2012). Extracting narrative timelines as temporal dependency structures, proceedings of the 50th annual meeting of the association for computational linguistics: long papersAssociation for Computational Linguistics, vol:1, 88–97.
  • Van Heerden, R., Von Soms, S. ve Mooi, R. (2016) Classification of Cyber Attacks in South Africa”, IST-Africa Week Conference, IEEE, 1–16, 2016.
  • Horton N. ve DeSimone, A. (2018) Sony’s Nightmare Before Christmas: North Korean Cyber Attack on Sony and Lessons for us Government Actions in Cyberspace, JHUAPL, Tech. Rep., United States, 2018.
  • Falliere, N., Murchu, L. O. ve Chien, E. (2011) W32. Stuxnet Dossier,”, Security Response, 5 (6): 29. Yılmaz, Ö., Cömert, C. K. ve Güler, V. (2020) Havelsan Siber Güvenlik Bülteni, Siber Güvenlik Direktörlüğü. Stubbs, J.(2020) Exclusive: Suspected North Korean hackers targeted COVID vaccine maker AstraZeneca – sources, Reuters, https://uk.reuters.com/article/uk-healthcare-coronavirus-astrazeneca-no/exclusive-suspectednorth-korean-hackers-targeted-Covid-vaccine-maker-astrazeneca-sources-idUKKBN28719Y, (24.03.2021).
  • 2020 Vulnerability and Threat Trends, Skybox Security, https://www.skyboxsecurity.com/wpcontent/uploads/2020/07/2020-VT_Trends_Executive_Summary.pdf, (24.02.2021). 2020 Sonicwall Cyber Threat Report, Cyber Threat Intelligence for Navigating the New Business Normal, https://www.sonicwall.com/resources/2020-cyber-threat-report-mid-year-update-pdf/, (26.03.2021).
  • Cloudy with a Chance Of Malice, Forecasting the New Era of Cloud-Enabled Threats, Netskope, https://resources.netskope.com/cloud-threat-report/cloud-and-threat-report-february-2021, (26.03.2021). KPMG (2020) https://home.kpmg/tr/tr/home/medya/press-releases/2020/12/sirketler-teknolojiye-haftadafazladan-15milyar-dolar-harcadi.html, (26.03.2021). ISO 22301:2019, Business Continuity Management System, Social Security, 3-4.Korucu O. Yönetim Bilişim Sistemleri Dergisi Cilt:7 Sayı:1 60
  • Snedaker (2021) Information Technology Executive, United States, 3, Business Continuity–Pandemic Preparation, https://www.isaca.org/resources/news-and-trends, (20.03.2021).
  • Ernst&Young LLP (2021) COVID-19’un İç Denetim Fonksiyonu Üzerine Etkileri Araştırma Sonuçları, Ernst&Young LLP, https://www.ey.com/en_gl/consulting/how-chief-audit-executives-areresponding-to-Covid19-in-the-next, (21.03.2021).
  • Trendmicro (2020) Injecting Deception Mid-Pandemic: Covid-19 Vaccine Related Threats, https://www.trendmicro.com/en_us/research/21/c/injecting-deception-covid-19-vaccine-related-threats.html (14.06.2021) BBC (2021) Remote working: Is Big Tech going off work from home?, https://www.bbc.com/news/technology56614285 (14.06.2021

EFFECTS OF THE NEW NORMAL WORLD ORDER TO CYBER AND INFORMATION SECURITY

Year 2021, Volume: 7 Issue: 1, 44 - 60, 07.07.2021

Abstract

The fast-changing world's technology concept reshaped by the Covid-19 virus when World Health Organization (WHO) declared it as a global pandemic. The pandemic critically affected many different sectors particularly technology and others such as social, health, education, economic, security, food, logistics, communication, transportation, etc. It caused global and national unorthodox and critical changes. New data security violations are added to the known cybersecurity and data theft attacks in new normal. All business models and compliance practices with the regulations point out data security within a digital environment as a root action. When it comes to data privacy different approaches provide the same output using audit and control functions. Data security can only be maintained by identifying risks and threats that can exploit data and manage them. A continuously monitored and measured data security practice with corporate risk management model, can only be increased by the management of identified risks and forecasting new threats. This study provides suggestions in relation to more robust and consolidated information security and cyber security approaches by addressing how does the 2000's technology shaped with the new extraordinary conditions and the regulations of this new world.

References

  • Bayraktar, G. (2015). Siber savaş ve ulusal güvenlik stratejisi. İstanbul: Yeniyüzıl Yayınevi.
  • Deloitte, Global siber güvenlik yönetici bilgilendirme raporu (2020).
  • https://www2.deloitte.com/content/dam/Deloitte/tr/Documents/risk/tr-web-kuresel-siber-guvenlik-yoneticibilgilendirme-raporu.pdf, (25.03.2021).
  • NATO CCDCOE, National cyber security framework manual (2018).
  • https://www.ccdcoe.org/uploads/2018/10/NCSFM_0.pdf, (26.03.2021).
  • Sağıroğlu, Ş. ve Alkan, M. (2012). Siber güvenlik siber savaşları, TBMM İnternet Komisyonu.
  • Cisco Annual Internet Report (2018-2023) White Paper (2020), https://www.cisco.com/c/en/us/solutions/collateral/executive-perspectives/annual-internet-report/white-paperc11-741490.html, (26.03.2021).
  • Kotenko, I. ve Chechulin, A. (2013). A cyber attack modeling and impact assessment framework, 5. International Conference on Cyber Conflict, CYCON 2013, IEEE, 1–24, 2013.
  • Hindy, H., Brosset, D., Bayne, E., Seeam, A., Tachtatzis, C., Atkinson, R. ve Bellekens, X. (2018). A taxonomy and survey of ıntrusion detection system design techniques, network threats and datasets, arXiv:1806.03517, vol. 1, no. 1, Article, 2018.
  • UK’s National Cyber Security Centre (NCSC), the US’ Department of Homeland Security (DHS) Cybersecurity, Infrastructure Security Agency (CISA), (2020). Advisory: COVID-19 exploited by malicious cyber actors. https://www.ncsc.gov.uk/news/Covid-19-exploited-by-cyber-actors-advisory, (25.03.2021).
  • Lallie, H. S., Shepherd, L.A., Nurse J. R. C., Erola, A., Epiphaniou, G., Maple, C., ve Bellekens, X. (2020).
  • Cyber security in the age of COVID-19: a timeline and analysis of cyber-crime and cyber-attacks during the pandemic, arXiv:2006.11929v1, cs.CR, (21.03.2021).
  • Kolomiyets, O., Bethard, S. ve Moens, M. F. (2012). Extracting narrative timelines as temporal dependency structures, proceedings of the 50th annual meeting of the association for computational linguistics: long papersAssociation for Computational Linguistics, vol:1, 88–97.
  • Van Heerden, R., Von Soms, S. ve Mooi, R. (2016) Classification of Cyber Attacks in South Africa”, IST-Africa Week Conference, IEEE, 1–16, 2016.
  • Horton N. ve DeSimone, A. (2018) Sony’s Nightmare Before Christmas: North Korean Cyber Attack on Sony and Lessons for us Government Actions in Cyberspace, JHUAPL, Tech. Rep., United States, 2018.
  • Falliere, N., Murchu, L. O. ve Chien, E. (2011) W32. Stuxnet Dossier,”, Security Response, 5 (6): 29. Yılmaz, Ö., Cömert, C. K. ve Güler, V. (2020) Havelsan Siber Güvenlik Bülteni, Siber Güvenlik Direktörlüğü. Stubbs, J.(2020) Exclusive: Suspected North Korean hackers targeted COVID vaccine maker AstraZeneca – sources, Reuters, https://uk.reuters.com/article/uk-healthcare-coronavirus-astrazeneca-no/exclusive-suspectednorth-korean-hackers-targeted-Covid-vaccine-maker-astrazeneca-sources-idUKKBN28719Y, (24.03.2021).
  • 2020 Vulnerability and Threat Trends, Skybox Security, https://www.skyboxsecurity.com/wpcontent/uploads/2020/07/2020-VT_Trends_Executive_Summary.pdf, (24.02.2021). 2020 Sonicwall Cyber Threat Report, Cyber Threat Intelligence for Navigating the New Business Normal, https://www.sonicwall.com/resources/2020-cyber-threat-report-mid-year-update-pdf/, (26.03.2021).
  • Cloudy with a Chance Of Malice, Forecasting the New Era of Cloud-Enabled Threats, Netskope, https://resources.netskope.com/cloud-threat-report/cloud-and-threat-report-february-2021, (26.03.2021). KPMG (2020) https://home.kpmg/tr/tr/home/medya/press-releases/2020/12/sirketler-teknolojiye-haftadafazladan-15milyar-dolar-harcadi.html, (26.03.2021). ISO 22301:2019, Business Continuity Management System, Social Security, 3-4.Korucu O. Yönetim Bilişim Sistemleri Dergisi Cilt:7 Sayı:1 60
  • Snedaker (2021) Information Technology Executive, United States, 3, Business Continuity–Pandemic Preparation, https://www.isaca.org/resources/news-and-trends, (20.03.2021).
  • Ernst&Young LLP (2021) COVID-19’un İç Denetim Fonksiyonu Üzerine Etkileri Araştırma Sonuçları, Ernst&Young LLP, https://www.ey.com/en_gl/consulting/how-chief-audit-executives-areresponding-to-Covid19-in-the-next, (21.03.2021).
  • Trendmicro (2020) Injecting Deception Mid-Pandemic: Covid-19 Vaccine Related Threats, https://www.trendmicro.com/en_us/research/21/c/injecting-deception-covid-19-vaccine-related-threats.html (14.06.2021) BBC (2021) Remote working: Is Big Tech going off work from home?, https://www.bbc.com/news/technology56614285 (14.06.2021
There are 21 citations in total.

Details

Primary Language Turkish
Journal Section Articles
Authors

Onur Korucu 0000-0002-2209-4947

Early Pub Date July 8, 2021
Publication Date July 7, 2021
Published in Issue Year 2021 Volume: 7 Issue: 1

Cite

APA Korucu, O. (2021). YENİ NORMAL DÜNYA DÜZENİNİN SİBER GÜVENLİK VE BİLGİ GÜVENLİĞİNE ETKİLERİ. Yönetim Bilişim Sistemleri Dergisi, 7(1), 44-60.
AMA Korucu O. YENİ NORMAL DÜNYA DÜZENİNİN SİBER GÜVENLİK VE BİLGİ GÜVENLİĞİNE ETKİLERİ. Yönetim Bilişim Sistemleri Dergisi. July 2021;7(1):44-60.
Chicago Korucu, Onur. “YENİ NORMAL DÜNYA DÜZENİNİN SİBER GÜVENLİK VE BİLGİ GÜVENLİĞİNE ETKİLERİ”. Yönetim Bilişim Sistemleri Dergisi 7, no. 1 (July 2021): 44-60.
EndNote Korucu O (July 1, 2021) YENİ NORMAL DÜNYA DÜZENİNİN SİBER GÜVENLİK VE BİLGİ GÜVENLİĞİNE ETKİLERİ. Yönetim Bilişim Sistemleri Dergisi 7 1 44–60.
IEEE O. Korucu, “YENİ NORMAL DÜNYA DÜZENİNİN SİBER GÜVENLİK VE BİLGİ GÜVENLİĞİNE ETKİLERİ”, Yönetim Bilişim Sistemleri Dergisi, vol. 7, no. 1, pp. 44–60, 2021.
ISNAD Korucu, Onur. “YENİ NORMAL DÜNYA DÜZENİNİN SİBER GÜVENLİK VE BİLGİ GÜVENLİĞİNE ETKİLERİ”. Yönetim Bilişim Sistemleri Dergisi 7/1 (July 2021), 44-60.
JAMA Korucu O. YENİ NORMAL DÜNYA DÜZENİNİN SİBER GÜVENLİK VE BİLGİ GÜVENLİĞİNE ETKİLERİ. Yönetim Bilişim Sistemleri Dergisi. 2021;7:44–60.
MLA Korucu, Onur. “YENİ NORMAL DÜNYA DÜZENİNİN SİBER GÜVENLİK VE BİLGİ GÜVENLİĞİNE ETKİLERİ”. Yönetim Bilişim Sistemleri Dergisi, vol. 7, no. 1, 2021, pp. 44-60.
Vancouver Korucu O. YENİ NORMAL DÜNYA DÜZENİNİN SİBER GÜVENLİK VE BİLGİ GÜVENLİĞİNE ETKİLERİ. Yönetim Bilişim Sistemleri Dergisi. 2021;7(1):44-60.