Corporate Cyber Security in Turkey Investigation Of Legal and Corporate Infrastructure : A Meta-Synthesis Study
Main Article Content
Abstract
Network technologies, which were created to serve military activities in the early days, have gained a civilized concept Network technologies, which were created to serve military activities in the early days, have gained a civilized concept structure after the cold war period. In this context, the opening of internet technologies to civilian use has also made the use of information networks widespread. The spread of information networks has accelerated the information transformation in the social, commercial, military and cultural fields on a global scale. As an effect of this transformation, individuals and institutions perform almost all of their data storage, data transfer, instant communication and service provision in cyberspace. Although this situation creates advantages in terms of time, cost and energy, it has also brought important risks and security gaps due to the emergence of many attack methods, especially data theft, for cyber security. In parallel with this result, cyber attack methods have increased rapidly over time due to the rapid movement brought about by technological developments and have become a much larger, complicated and difficult to notice structure. Cyber security mechanisms developed to defend against attacks that seriously threaten personal data, such as cyber attacks, are also dynamic, just like cyber attacks. Today, it has become a necessity for every institution to develop and implement effective cyber security methods in order to be protected from cyber attacks and threats by structuring their own information systems in digital
environments and to ensure the information and data security they have. Such unstoppable developments in technology result in the emergence of new types of threats to cyber security, just as it has been up to now. In this context, the sustainability and operability of cyber security mechanisms are essential. In the light of all this information, in this study, especially in the corporate field, the methods of activity that threaten cyber security, as well as legal and institutional infrastructures are discussed and the level of current cyber security awareness is tried to be determined. As the application dimension of the research, the format and standards determined by the Presidency Digital Transformation Office in military institutions and EYP-2.0 (Electronic Transformation) in the system in the background Correspondence Package) package examined and a demo of the relevant package program has been created. In addition to these issues, the methods that can be developed within the framework of cyber attacks and defense against these attacks are evaluated. It is foreseen that the study will contribute to the literature in this context and will be a useful resource for institutions and organizations in terms of gaining the functionality and sustainability of cyber security mechanisms.
Keywords: Corporate Cyber Security, Legal and Institutional Infrastructures, Risk and Vulnerabilities, Cyber Security
Mechanisms.
Downloads
Article Details
This work is licensed under a Creative Commons Attribution 4.0 International License.
Global Journal of Computer Sciences: Theory and Research is an Open Access Journal. All articles can be downloaded free of charge. Articles published in the Journal are Open-Access articles distributed under CC-BY license [Attribution 4.0 International (CC BY 4.0)]
Birlesik Dunya Yenilik Arastirma ve Yayincilik Merkezi (BD-Center) is a gold open access publisher. At the point of publication, all articles from our portfolio of journals are immediately and permanently accessible online free of charge. BD-Center articles are published under the CC-BY license [Attribution 4.0 International (CC BY 4.0)], which permits unrestricted use, distribution, and reproduction in any medium, provided the original authors and the source are credited.