National and international cybersecurity strategies of the United States : a securitization attempt?

Küçükaydın, Duygu
This thesis aims to explore how cybersecurity has become a national security issue for the United States. It will analyze the issue by trying to answer the question of whether this process, which started with the Clinton Administration, is a successful ‘securitization.’ In this line, this thesis, firstly, tries to conceptua lize the cyberspace as a new domain for international politics through examining its rise in the information age. Then, it emphasizes the major debates between cyber-pessimists and cyber-skeptics concerning the effects of cyberspace on major security concepts such as warfare, power, attack, offense-defense balance and security dilemma. In the light of this conceptualization, the thesis will try to answer the research question through concentrating on both internal and international cybersecurity strategies of the last three presidents, namely of Bill Clinton, George W. Bush and Barack Obama. At the domestic level, it analyzes securitization of the issue and the policymaking process which involves the main bureaucratic agencies of the US. At international level, it examines evolution of the bilateral and multilateral cybersecurity strategies.


Homomorphic encryption based on the ring learning with errors (RLWE) problem
Keskinkurt, İrem; Cenk, Murat; Department of Cryptography (2017)
The encryption techniques used to ensure data secrecy have been evolving in compliance with the developments in technology and reforming according to need. Nowadays, the increase in the amount of data that should be stored in encrypted form, has led to the need for encryption schemes that provide both the safety and the efficient usability of data. Homomorphic encryption, which enables the ability to make computations on encrypted data, is seen as one of the solutions that can meet this need. In this thesis...
Virtual penetration testing with phase based vulnerability analysis
Çalışkan, Emre; Baykal, Nazife; Department of Information Systems (2015)
Vulnerability scanning, penetration testing, and manual auditing are ways of finding vulnerabilities in organizations. However, they have some limitations like time, accuracy, testers’ ability, etc. Virtual penetration testing aims to alleviate these limitations. By virtual penetration testing, it is intended to assess security controls corresponding to the vulnerabilities found by vulnerability scanning, and correlating assessment result with vulnerabilities. Consequently, correlation will enable to find e...
Automatic detection of cyber security events from Turkish twitter stream and Turkish newspaper data
Ural, Özgür; Acartürk, Cengiz; Department of Cyber Security (2019)
Cybersecurity experts scan the internet and face security events that influence users, institutions, and governments. An information security analyst regularly examines sources to stay up to date on security events in her/his domain of expertise. This may lead to a heavy workload for the information analysts if they do not have proper tools for security event investigation. For example, an information analyst may want to stay aware of cybersecurity events, such as a DDoS (Distributed Denial of Service) atta...
Detection of malicious web pages
Süren, Emre; Özkan Yıldırım, Sevgi; Department of Information Systems (2014)
Cyber-attacks have been shaking the virtual world and malicious web pages have become a major weapon for Internet crimes. They host a number of malicious contents; such as spam, phishing, and drive-by download. Drive-by download technique exploits the victim’s machine and downloads a malware without any notice or consent. After infection, victim’s private data is stolen or encrypted and even worse the compromised machine is instrumented to mount further attacks. To this end, researchers have focused on prot...
Trusted mail gateway
Ayla, Erkut Sinan; Özgit, Attila; Department of Computer Engineering (2004)
The study aims to make contribution to solve mail security problems. The Trusted Mail Gateway provides a domain with the basic security services that are message integrity, confidentiality, non-repudiation, origin authentication and availability while message (e-mail) being delivered through the Internet. It generates S/MIME digital signatures and performs S/MIME encryption on behalf of the domain using secret key cryptography and public-key techniques and generating Cryptographic Message Syntax (CMS) data ...
Citation Formats
D. Küçükaydın, “National and international cybersecurity strategies of the United States : a securitization attempt?,” M.S. - Master of Science, Middle East Technical University, 2016.