National and international cybersecurity strategies of the United States : a securitization attempt?

Küçükaydın, Duygu
This thesis aims to explore how cybersecurity has become a national security issue for the United States. It will analyze the issue by trying to answer the question of whether this process, which started with the Clinton Administration, is a successful ‘securitization.’ In this line, this thesis, firstly, tries to conceptua lize the cyberspace as a new domain for international politics through examining its rise in the information age. Then, it emphasizes the major debates between cyber-pessimists and cyber-skeptics concerning the effects of cyberspace on major security concepts such as warfare, power, attack, offense-defense balance and security dilemma. In the light of this conceptualization, the thesis will try to answer the research question through concentrating on both internal and international cybersecurity strategies of the last three presidents, namely of Bill Clinton, George W. Bush and Barack Obama. At the domestic level, it analyzes securitization of the issue and the policymaking process which involves the main bureaucratic agencies of the US. At international level, it examines evolution of the bilateral and multilateral cybersecurity strategies.


Homomorphic encryption based on the ring learning with errors (RLWE) problem
Keskinkurt, İrem; Cenk, Murat; Department of Cryptography (2017)
The encryption techniques used to ensure data secrecy have been evolving in compliance with the developments in technology and reforming according to need. Nowadays, the increase in the amount of data that should be stored in encrypted form, has led to the need for encryption schemes that provide both the safety and the efficient usability of data. Homomorphic encryption, which enables the ability to make computations on encrypted data, is seen as one of the solutions that can meet this need. In this thesis...
Automatic detection of cyber security events from Turkish twitter stream and Turkish newspaper data
Ural, Özgür; Acartürk, Cengiz; Department of Cyber Security (2019)
Cybersecurity experts scan the internet and face security events that influence users, institutions, and governments. An information security analyst regularly examines sources to stay up to date on security events in her/his domain of expertise. This may lead to a heavy workload for the information analysts if they do not have proper tools for security event investigation. For example, an information analyst may want to stay aware of cybersecurity events, such as a DDoS (Distributed Denial of Service) atta...
Detection of malicious web pages
Süren, Emre; Özkan Yıldırım, Sevgi; Department of Information Systems (2014)
Cyber-attacks have been shaking the virtual world and malicious web pages have become a major weapon for Internet crimes. They host a number of malicious contents; such as spam, phishing, and drive-by download. Drive-by download technique exploits the victim’s machine and downloads a malware without any notice or consent. After infection, victim’s private data is stolen or encrypted and even worse the compromised machine is instrumented to mount further attacks. To this end, researchers have focused on prot...
Political and security dimensions of the U.S. ballistic missile defense
Sağ, Hakkı Burak; Bağcı, Hüseyin; Department of International Relations (2003)
This thesis analyzes the political and security dimensions of the U.S. ballistic missile defense. The development and deployment of missile defenses are examined within the context of the 1972 Anti-Ballistic Missile (ABM) Treaty, the technical feasibility and effectiveness of the proposed system to counter the missiles launched by the states of concern and the fundamental concerns and official policies of Russia, China and some European NATO members that turn out to be key actors in the controversial missil...
Trusted mail gateway
Ayla, Erkut Sinan; Özgit, Attila; Department of Computer Engineering (2004)
The study aims to make contribution to solve mail security problems. The Trusted Mail Gateway provides a domain with the basic security services that are message integrity, confidentiality, non-repudiation, origin authentication and availability while message (e-mail) being delivered through the Internet. It generates S/MIME digital signatures and performs S/MIME encryption on behalf of the domain using secret key cryptography and public-key techniques and generating Cryptographic Message Syntax (CMS) data ...
Citation Formats
D. Küçükaydın, “National and international cybersecurity strategies of the United States : a securitization attempt?,” M.S. - Master of Science, Middle East Technical University, 2016.