Abstract
Network technologies, which were created to serve military activities in the early days, have gained a civilized concept structure after the cold war period. In this context, the opening of internet technologies to civilian use has also made the use of information networks widespread. The spread of information networks has accelerated the information transformation in the social, commercial, military and cultural fields on a global scale. As an effect of this transformation, individuals and institutions perform almost all of their data storage, data transfer, instant communication and service provision in cyberspace. Although this situation creates advantages in terms of time, cost and energy, it has also brought important risks and security gaps due to the emergence of many attack methods, especially data theft, for cyber security. In parallel with this result, cyber attack methods have increased rapidly over time due to the rapid movement brought about by technological developments and have become a much larger, complicated and difficult to notice structure. Cyber security mechanisms developed to defend against attacks that seriously threaten personal data, such as cyber attacks, are also dynamic, just like cyber attacks. Today, it has become a necessity for every institution to develop and implement effective cyber security methods in order to be protected from cyber attacks and threats by structuring their own information systems in digital environments and to ensure the information and data security they have. Such unstoppable developments in technology result in the emergence of new types of threats to cyber security, just as it has been up to now. In this context, the sustainability and operability of cyber security mechanisms are essential. In the light of all this information, in this study, especially in the corporate field, the methods of activity that threaten cyber security, as well as legal and institutional infrastructures are discussed and the level of current cyber security awareness is tried to be determined. As the application dimension of the research, the format and standards determined by the Presidency Digital Transformation Office in military institutions and EYP-2.0 (Electronic Transformation) in the system in the background Correspondence Package) package examined and a demo of the relevant package program has been created. In addition to these issues, the methods that can be developed within the framework of cyber attacks and defense against these attacks are evaluated. It is foreseen that the study will contribute to the literature in this context and will be a useful resource for institutions and organizations in terms of gaining the functionality and sustainability of cyber security mechanisms.
Published Version (Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: Global Journal of Computer Sciences: Theory and Research
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.