Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
An Assessment Model to Improve National Cyber Security Governance
Date
2016-03-18
Author
Tatar, Unal
Karabacak, Bilge
Gheorghe, Adrian
Metadata
Show full item record
This work is licensed under a
Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License
.
Item Usage Stats
69
views
0
downloads
Cite This
Today, cyber space has been embraced by individuals, organizations and nations as an indispensable instrument of daily life. Accordingly, impact of cyber threats has continuously been increasing. Critical infrastructure protection and fighting against cyber threats are crucial elements of national security agendas of governments. In this regard, governments need to assess the roles and responsibilities of public and private organizations to address the problems of current cyber protection postures and to respond with reorganization and reauthorization of these postures. A risk management approach is critical in placing these efforts in an ongoing lifecycle process. In this paper, a model is proposed to be used in national cyber security risk management processes. We argue that this model simplifies and streamlines national risk management processes. For this purpose, a matrix is created to partition the problem space. Cyber threat detection and response activities constitute one dimension of the matrix. The second dimension divides the timeline of cyber incidents into three: before, during and after incidents. The resulting matrix is then populated with responsible bodies which need to address each case. As a result, a national cyber security responsibility model is proposed for policy/decision makers and academics. We believe that the proposed model would be useful for governments in analyzing their national responsibility distribution to address gaps and conflicts in their current cyber security postures and for academics in analyzing natural cyber security systems and comparative studies.
Subject Keywords
National security
,
National governance
,
National cyber security roles and responsibilities
,
Cyber thresholds
,
Risk analysis
,
Risk management
URI
https://hdl.handle.net/11511/67189
Collections
Graduate School of Informatics, Conference / Seminar
Suggestions
OpenMETU
Core
A Usability study on electronic document management system in Middle East Technical University
Karagöz, Alpay; Özkan Yıldırım, Sevgi; Department of Information Systems (2013)
The development of information technologies (IT) in recent years has started to affect the daily routines of the people. These technologies have changed the way that the things are done. One of these technologies is Electronic Document Management System. Considering the increasing amount of documents needed for the institutions, it could be said that there was a need for a system to manage this complexity. However, usability of such technologies depend on the people who would use the system. Usability probl...
A web service based trust and reputation system for transitory collaboration formation in supply chains
Taşyurt, İbrahim; Doğaç, Asuman; Department of Computer Engineering (2009)
Today, advancements in the information technologies increased the significance of electronic business in the world. Besides the numerous advantages provided by these advancements, competition has also increased for the enterprises. In this competitive environment, companies have to access information faster and response to the changes quickly. In a supply chain, it is a highly possible that one of the partners may defect in providing its services. When these exceptional cases occur, the pending parties have...
An Empirical Investigation of DDoS and Flash Event Detection Using Shannon Entropy, KOAD and SVM Combined
Daneshgadeh, Salva; Kemmerich, Thomas; Ahmed, Tarem; Baykal, Nazife (2019-01-01)
In the world of internet and communication technologies where our personal and business lives are inextricably tied to internet enabled services and applications, Distributed Denial of Service (DDoS) attacks continue to adversely affect the availability of these services and applications. Many frameworks have been presented in academia and industry to predict, detect and defend against DDoS attacks. The available solutions try to protect online services from DDoS attacks, but as yet there is no best-practic...
A Case for Societal Digital Security Culture
BEN OTHMANE, Lotfi; WEFFERS, Harold; RANCHAL, Rohit; Angın, Pelin; BHARGAVA, Bharat; MOHAMAD, Mohd M (2013-07-10)
Information and communication technology systems, such as remote health care monitoring and smart mobility applications, have become indispensable parts of our lives. Security vulnerabilities in these systems could cause financial losses, privacy/safety compromises, and operational interruptions. This paper demonstrates through examples, that technical security solutions for these information systems, alone, are not sufficient to protect individuals and their assets from attacks. It proposes to complement (...
Challenges of countering cyber terrorism in the hybrid war contexts
Tanrısever, Oktay Fırat (null; 2019-10-15)
This conference paper seeks to explore the characteristics of cyber terrorism and challenges of countering cyber terrorism in the hybrid war contexts. This conference paper also intends to highlight the difficulties of coping with the terrorist uses of the cyber space and social media when the perpetrators of cyber terrorist acts remain anonymous and the parties of hybrid warfare adhere to the principle of deniability constantly The conference paper puts forward the argument that the concept of cyber terror...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
U. Tatar, B. Karabacak, and A. Gheorghe, “An Assessment Model to Improve National Cyber Security Governance,” 2016, p. 312, Accessed: 00, 2020. [Online]. Available: https://hdl.handle.net/11511/67189.