Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
Developing and verifying a set of principles for the cyber security of the critical infrastructures of Turkey
Download
index.pdf
Date
2015
Author
Karabacak, Bilge
Metadata
Show full item record
Item Usage Stats
213
views
86
downloads
Cite This
Critical infrastructures are vital assets for countries as a harm given to critical infrastructures may affect public order, economic welfare and/or national security. Today, cyber systems are extensively used to control and monitor critical infrastructures. Therefore, cyber threats have the potential to adversely affect the order of societies and countries. In this PhD study, the root causes of the susceptibility of the critical infrastructures of Turkey to the cyber threats are identified by analyzing the qualitative data with the grounded theory method. The extracted root causes are verified by two experts. The set of principles for the cyber security of the critical infrastructures are determined by introducing the root causes to six experts in a five-phased Delphi survey. A state-level cyber security maturity model to measure the readiness level of the critical infrastructure protection efforts is developed by using the set of principles. Because maturity criteria are grounded on the root causes of the susceptibility to cyber threats, the maturity model is named Vulnerability Driven National Cyber Security Maturity Model. The readiness level of the critical infrastructure protection efforts of Turkey is measured by the participation of ten former/current government officials in the maturity survey. The root causes, the set of principles, and the results of the maturity survey are compared with the relevant studies of the academia, non-profit organizations and governments.
Subject Keywords
Cyberinfrastructure.
,
Computer security.
,
Computer security
,
Firewalls (Computer security).
,
Cyber intelligence (Computer security).
,
Computer networks
URI
http://etd.lib.metu.edu.tr/upload/12618873/index.pdf
https://hdl.handle.net/11511/24729
Collections
Graduate School of Informatics, Thesis
Suggestions
OpenMETU
Core
A vulnerability-driven cyber security maturity model for measuring national critical infrastructure protection preparedness
Karabacak, Bilge; Özkan Yıldırım, Sevgi; Baykal, Nazife (2016-12-01)
Critical infrastructures are vital assets for the public safety, economic welfare and national security of countries. Cyber systems are used extensively to monitor and control critical infrastructures. A number of infrastructures are connected to the Internet via corporate networks. Cyber security is, therefore, an important item of the national security agenda of a country. The intense interest in cyber security has initiated research focusing on national cyber security maturity assessments. However, littl...
Regulatory approaches for cyber security of critical infrastructures: The case of Turkey
Karabacak, Bilge; Özkan Yıldırım, Sevgi; Baykal, Nazife (2016-06-01)
Critical infrastructures are vital assets for public safety, economic welfare and/or national security of countries. Today, cyber systems are extensively used to control and monitor critical infrastructures. A considerable amount of the infrastructures are connected to the Internet over corporate networks. Therefore, cyber security is an important item for the national security agendas of several countries. The enforcement of security principles on the critical infrastructure operators through the regulatio...
Security Sector Reform: Defence Reform in South Sudan between 2005 and 2013
McLean, Fiona; Baracco, Luciano; Political Science and International Relations (2018-4)
The internationally dominant framework for Security Sector Reform presents an integrated, holistic approach to national security sector management that claims to deliver, through international donors, a system for conflict-prone countries that will contribute to the stability required to enable sustainable peace and development. Security Sector Reform policy explains how a prescribed methodology, based on liberal democratic principles of good governance, contributes to long-term conflict prevention by addre...
A Comparative study of Turkey’s energy security policies towards Kazakhstan and Iraq
Yavuz, Halil Buğra; Tanrısever, Oktay Fırat; Department of Eurasian Studies (2018)
Energy security has started to take an important place in national security strategies of all countries. Energy security policies of countries take different characteristics for the energy importing and exporting countries. Therefore, countries formulate and implement their energy security policies according to their political, economic and geographical conditions. This thesis seeks to explore the energy security policies of Turkey towards Kazakhstan and Iraq in order to identify the similarities and differ...
A proposed model for Turkish land forces command software intensive systems acquisition process
Bilir, Nevzat; Bilgen, Semih; Department of Information Systems (2002)
Turkish Land Forces Command uses information technology opportunities to satisfy its needs arising from the obligation for being a strong army.One of the main difficulties in using information technologies is the acquisition of these systems. This thesis reviews the fundamentals of software intensive systems acquisition process and then proposes a new model for Turkish Land Forces Command.Software acquisition process models are discussed and compared with each other.The current Turkish Land Forces Com...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
B. Karabacak, “Developing and verifying a set of principles for the cyber security of the critical infrastructures of Turkey,” Ph.D. - Doctoral Program, Middle East Technical University, 2015.