Araştırma Makalesi
BibTex RIS Kaynak Göster
Yıl 2017, Cilt: 3 Sayı: 2, 33 - 41, 31.12.2017

Öz

Kaynakça

  • [1] Cyber Defence Exercise Locked Shields 2013 – After Action Report, NATO CCD COE, Tallinn, 2013.
  • [2] Cyber Defence Exercise Locked Shields 2014 – After Action Report, NATO CCD COE, Tallinn, 2014.
  • [3] Cyber Defence Exercise Locked Shields 2015 – After Action Report, NATO CCD COE, Tallinn, 2015.
  • [4] Cyber Defence Exercise Locked Shields 2016 – After Action Report, NATO CCD COE, Tallinn, 2016.
  • [5] The 2015 Report on National and International Cyber Security Exercises, ENISA, 2015.
  • [6] Locked Shields 2017, NATO CCD COE, Retrieved from: https://ccdcoe.org/locked-shields-2017.html, 2017.
  • [7] Cyber Coalition 16: NATOs Largest Cyber Defence Exercise, NATO SHAPE, Retrieved from: https://www.shape.nato.int/2016/cyber-coalition-16-ends-natos-largest-cyber-defence-exercise, 2017.
  • [8] Cyber Europe 2016, Retreived from: https://www.enisa.europa.eu/topics/cyber-exercises/cyber-europe- programme/ce-2016, 2017.
  • [9] Cyber Defense Exercises – Participant Information Package, ENISA, 2013. [10] Introduction to Cyber Exercises, National Cyber Security, Division Cyber Exercise Program, DHS, 2003. [11] N. Wilhelmson, T. Svensson, “Handbook for Planning, Running, and Evaluating Information Technology and Cyber Security Exercises”, CATS, 2013.
  • [12] C. A. M. Forero, Tabletop Exercise For Cybersecurity Educational Training; Theoretical Grounding And Development, Master’s Thesis, 2016.
  • [13] J. Kick, “Cyber Exercise Playbook”, The MITRE Corp., 2014.
  • [14] Cyber-Exercises Analysis Report, ENISA. 2016.
  • [15] Good Practice Guide on National Exercises, ENISA, 2009.
  • [16] Joint Training Manual for the Armed Forces of the United States, Chairman of the Joint Chiefs of Staff Manual, 2012.
  • [17] 2016 - 2019 Ulusal Siber Guvenlik Stratejisi, T.C. UDHB, 2016.
  • [18] R. Kissel (Ed.), “Glossary of Key Information Security Terms”, NIST, 2013.
  • [19] H. Watanbe, S. Fujimura, A. Nakadaira, Y. Miyazaki, A. Akutsu and J. Kishigami. “Blockchain Contract: Securing a Blockchain Applied to Smart Contracts”. IEEE International Conference on Consumer Electronics (ICCE), pp. 467-468, 2016.
  • [20] S. Singh and N. Singh. “Blockchain: Future of Financial and Cyber Security”. IEEE 2nd International Conference on Contemporary Computing and Informatics (IC3I), pp. 463-467, 2016.
  • [21] SecureChain: A Blockchain Security Gateway for SDN. http://www.reply.com/en/content/securechain (Erişim Tarihi: 30.08.2017).
  • [22] N.B. Barnas. “Blockchains in National Defense: Trustworthy Systems in a Trustless World”. A Research Report Submitted to the Faculty In Partial Fulfillment of the Graduation Requirements, Air University, 2016.
  • [23] K.J. O’Dwyer and D. Malone. “Bitcoin Mining and its Energy Footprint”. 25th IET Irish Signals & Systems Conference and China - Ireland International Conference on Information and Communications Technologies (ISSC 2014 / CIICT 2014), 2014.
  • [24] The Bitcoin and Blockchain: Energy Hogs. https://theconversation.com/the-bitcoin-and-blockchain-energy-hogs-77761 (Erişim Tarihi: 30.08.2017).
  • [25] J. Poon and T. Dryja. “The Bitcoin Lightning Network: Scalable Off-Chain Instant Payments”. 2016. DRAFT Version 0.5.9.2. https://lightning.network/lightning-network-paper.pdf (Erişim Tarihi:30.08.2017).
  • [26] Could a Blockchain-based Electricity Network Change the Energy Market? https://www.theguardian.com/sustainable-business/2017/jul/13/could-a-blockchain-based-electricity-network-change-the-energy-market (Erişim Tarihi: 30.08.2017).
  • [27] Proof of Work vs Proof of Stake: Basic Mining Guide. https://blockgeeks.com/guides/proof-of-work-vs-proof-of-stake (Erişim Tarihi: 30.08.2017).

SİBER SAVUNMA TATBİKATLARI: PLANLAMA, UYGULAMA VE DEĞERLENDİRME

Yıl 2017, Cilt: 3 Sayı: 2, 33 - 41, 31.12.2017

Öz

Siber savunma tatbikatları, siber
güvenlik bilinirliliğini arttırmak, siber alanda meydana gelebilecek olası
farklı senaryolarda nasıl hareket edilmesi gerektiği konusunda gerekli ortamın
oluşturulması, ve konuyla ilgili uzmanların uygulamalı olarak eğitimleri
açısından bakıldığında çok önemli bir araçtır. Söz konusu tatbikatlar siber
alanda alınabilecek önlemler konusunda karar vericilere ve bu alan için
geliştirilebilecek araçlar, teknikler ve prosedürler konusunda siber savunma
ile görevli veya ilgili kurum, kuruluş, ve personele de fikirler
verebilmektedir. Siber savunma tatbikatlarında gerçeğe en yakın şekilde
oluşturulan senaryolarla özellikle siber saldırılar ile karşı karşıya iken
özellikle stres altında en iyi kararları verebilme ve takım olarak koordineli
hareket edebilmenin zorunluluğunu beraberinde getirerek çok önemli katkılar
sağlamaktadır. Bu makalenin amacı uluslararası siber savunma tatbikatları göz
önünde bulundurularak ve karşılaştırılarak bu tatbikatların planlama, uygulama
ve değerlendirme aşamalarını ortaya koyarak konuyu bilimsel açıdan ele
almaktır. Çalışmanın bir diğer amacı ise söz konusu süreçler her ne kadar yapılması
planlanan tatbikatın hedef kitlesine göre farklılıklar arz etse de, türüne
bakılmaksızın genel bir siber savunma tatbikatında olması gerekli süreçleri de
ortaya koyabilmektir.























Kaynakça

  • [1] Cyber Defence Exercise Locked Shields 2013 – After Action Report, NATO CCD COE, Tallinn, 2013.
  • [2] Cyber Defence Exercise Locked Shields 2014 – After Action Report, NATO CCD COE, Tallinn, 2014.
  • [3] Cyber Defence Exercise Locked Shields 2015 – After Action Report, NATO CCD COE, Tallinn, 2015.
  • [4] Cyber Defence Exercise Locked Shields 2016 – After Action Report, NATO CCD COE, Tallinn, 2016.
  • [5] The 2015 Report on National and International Cyber Security Exercises, ENISA, 2015.
  • [6] Locked Shields 2017, NATO CCD COE, Retrieved from: https://ccdcoe.org/locked-shields-2017.html, 2017.
  • [7] Cyber Coalition 16: NATOs Largest Cyber Defence Exercise, NATO SHAPE, Retrieved from: https://www.shape.nato.int/2016/cyber-coalition-16-ends-natos-largest-cyber-defence-exercise, 2017.
  • [8] Cyber Europe 2016, Retreived from: https://www.enisa.europa.eu/topics/cyber-exercises/cyber-europe- programme/ce-2016, 2017.
  • [9] Cyber Defense Exercises – Participant Information Package, ENISA, 2013. [10] Introduction to Cyber Exercises, National Cyber Security, Division Cyber Exercise Program, DHS, 2003. [11] N. Wilhelmson, T. Svensson, “Handbook for Planning, Running, and Evaluating Information Technology and Cyber Security Exercises”, CATS, 2013.
  • [12] C. A. M. Forero, Tabletop Exercise For Cybersecurity Educational Training; Theoretical Grounding And Development, Master’s Thesis, 2016.
  • [13] J. Kick, “Cyber Exercise Playbook”, The MITRE Corp., 2014.
  • [14] Cyber-Exercises Analysis Report, ENISA. 2016.
  • [15] Good Practice Guide on National Exercises, ENISA, 2009.
  • [16] Joint Training Manual for the Armed Forces of the United States, Chairman of the Joint Chiefs of Staff Manual, 2012.
  • [17] 2016 - 2019 Ulusal Siber Guvenlik Stratejisi, T.C. UDHB, 2016.
  • [18] R. Kissel (Ed.), “Glossary of Key Information Security Terms”, NIST, 2013.
  • [19] H. Watanbe, S. Fujimura, A. Nakadaira, Y. Miyazaki, A. Akutsu and J. Kishigami. “Blockchain Contract: Securing a Blockchain Applied to Smart Contracts”. IEEE International Conference on Consumer Electronics (ICCE), pp. 467-468, 2016.
  • [20] S. Singh and N. Singh. “Blockchain: Future of Financial and Cyber Security”. IEEE 2nd International Conference on Contemporary Computing and Informatics (IC3I), pp. 463-467, 2016.
  • [21] SecureChain: A Blockchain Security Gateway for SDN. http://www.reply.com/en/content/securechain (Erişim Tarihi: 30.08.2017).
  • [22] N.B. Barnas. “Blockchains in National Defense: Trustworthy Systems in a Trustless World”. A Research Report Submitted to the Faculty In Partial Fulfillment of the Graduation Requirements, Air University, 2016.
  • [23] K.J. O’Dwyer and D. Malone. “Bitcoin Mining and its Energy Footprint”. 25th IET Irish Signals & Systems Conference and China - Ireland International Conference on Information and Communications Technologies (ISSC 2014 / CIICT 2014), 2014.
  • [24] The Bitcoin and Blockchain: Energy Hogs. https://theconversation.com/the-bitcoin-and-blockchain-energy-hogs-77761 (Erişim Tarihi: 30.08.2017).
  • [25] J. Poon and T. Dryja. “The Bitcoin Lightning Network: Scalable Off-Chain Instant Payments”. 2016. DRAFT Version 0.5.9.2. https://lightning.network/lightning-network-paper.pdf (Erişim Tarihi:30.08.2017).
  • [26] Could a Blockchain-based Electricity Network Change the Energy Market? https://www.theguardian.com/sustainable-business/2017/jul/13/could-a-blockchain-based-electricity-network-change-the-energy-market (Erişim Tarihi: 30.08.2017).
  • [27] Proof of Work vs Proof of Stake: Basic Mining Guide. https://blockgeeks.com/guides/proof-of-work-vs-proof-of-stake (Erişim Tarihi: 30.08.2017).
Toplam 25 adet kaynakça vardır.

Ayrıntılar

Birincil Dil Türkçe
Konular Mühendislik
Bölüm Makaleler
Yazarlar

ENSAR Şeker Bu kişi benim

Yayımlanma Tarihi 31 Aralık 2017
Gönderilme Tarihi 3 Ekim 2017
Yayımlandığı Sayı Yıl 2017 Cilt: 3 Sayı: 2

Kaynak Göster

IEEE E. Şeker, “SİBER SAVUNMA TATBİKATLARI: PLANLAMA, UYGULAMA VE DEĞERLENDİRME”, UBGMD, c. 3, sy. 2, ss. 33–41, 2017.