Çankaya GCRIS Standart veritabanının içerik oluşturulması ve kurulumu Research Ecosystems (https://www.researchecosystems.com) tarafından devam etmektedir. Bu süreçte gördüğünüz verilerde eksikler olabilir.
 

Cyber Attacks and Preliminary Steps in Cyber Security in National Protection

dc.authorscopusid 57095531900
dc.authorscopusid 57821219800
dc.contributor.author Aydin, F.
dc.contributor.author Pusatlı, Özgür Tolga
dc.contributor.author Tolga Pusatli, O.
dc.contributor.authorID 51704 tr_TR
dc.contributor.other Yönetim Bilişim Sistemleri
dc.date.accessioned 2020-05-20T09:16:45Z
dc.date.available 2020-05-20T09:16:45Z
dc.date.issued 2018
dc.department Çankaya University en_US
dc.department-temp Aydin F., Turkish Air Force, Turkey; Tolga Pusatli O., Cankaya University, Turkey en_US
dc.description.abstract Cyber attacks launched by individuals and/or supported by nation states have increased due to the prevalence of information technologies at critical infrastructure of the states. In this chapter, such attacks and consecutive impacts are visited. In connection with this issue, evolution of cyber threats from annoying malware to serious weapons is studied by examples; hence, precautions against such threats are visited and usage of anti-malware applications as prevalent precautions is assessed within the scope. Selected information security standards and strategies of selected states and precautions for cyber security of Turkey are studied. Our findings underline that educated citizens and companies along with public institutions should cooperate to provide a nationwide cyber security. Consequently, it is defended that governments should play an affective role to protect, educate, and guide governmental and private companies and citizens on the cyber security by promoting the cyber security topic in the successive national development plans. © 2018 by IGI Global. All rights reserved. en_US
dc.description.publishedMonth 5
dc.identifier.citation Aydin, F.; Tolga Pusatli, O., "Cyber Attacks and Preliminary Steps in Cyber Security in National Protection", Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications, (2018). en_US
dc.identifier.doi 10.4018/978-1-5225-5634-3.ch013
dc.identifier.endpage 229 en_US
dc.identifier.isbn 9781522556350
dc.identifier.isbn 1522556346
dc.identifier.isbn 9781522556343
dc.identifier.scopus 2-s2.0-85049659211
dc.identifier.scopusquality N/A
dc.identifier.startpage 213 en_US
dc.identifier.uri https://doi.org/10.4018/978-1-5225-5634-3.ch013
dc.identifier.wosquality N/A
dc.language.iso en en_US
dc.publisher IGI Global en_US
dc.relation.ispartof Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications en_US
dc.relation.publicationcategory Kitap Bölümü - Uluslararası en_US
dc.rights info:eu-repo/semantics/closedAccess en_US
dc.scopus.citedbyCount 1
dc.title Cyber Attacks and Preliminary Steps in Cyber Security in National Protection tr_TR
dc.title Cyber Attacks and Preliminary Steps in Cyber Security in National Protection en_US
dc.type Book Part en_US
dspace.entity.type Publication
relation.isAuthorOfPublication 14474dfb-07d3-4bb1-b133-a7290cc5be9f
relation.isAuthorOfPublication.latestForDiscovery 14474dfb-07d3-4bb1-b133-a7290cc5be9f
relation.isOrgUnitOfPublication 907f32e8-a2ec-47a0-b274-af0eefc912b5
relation.isOrgUnitOfPublication.latestForDiscovery 907f32e8-a2ec-47a0-b274-af0eefc912b5

Files

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: