1 / 8

NATIONAL CYBER SECURITY GOVERNANCE & EMERGING CYBER SECURITY THREATS Dr. Hayret t in B AHŞİ

NATIONAL CYBER SECURITY GOVERNANCE & EMERGING CYBER SECURITY THREATS Dr. Hayret t in B AHŞİ Director of Cyber Security Institute TÜBİTAK BİLGEM. Cyber Security Governance. Cyber Security Council. Cyber Security Strategy. Cyber Security Governance (2).

cecily
Download Presentation

NATIONAL CYBER SECURITY GOVERNANCE & EMERGING CYBER SECURITY THREATS Dr. Hayret t in B AHŞİ

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. NATIONAL CYBER SECURITY GOVERNANCE & EMERGINGCYBER SECURITY THREATS Dr. Hayrettin BAHŞİ Director of Cyber Security Institute TÜBİTAK BİLGEM

  2. Cyber Security Governance Cyber Security Council Cyber Security Strategy

  3. Cyber Security Governance (2) • Integration of domain knowledge and technical cyber security knowledge • Interdisiplinary area between engineering and social sciences • Policy creators have to have cyber security understanding

  4. Main Cyber Security Threats • Hidden attacking activities • Information stealing channels • Main aim: Know-how • Important sectors like defence industry • Effective tool for cyber espionage • Long durations of info stealing channels • Protection of Critical Infrastructure Information Systems • Finance, • Transportation • Energy • Water Supply etc. • Availability threats • Composed of rarly updated rarely • SCADA Security

  5. Attack Vectors

  6. Threats and Solutions • Traditional perimeter protection is dead! • Control the outbound data as well as inbound data • Dynamic analysis based malware analysis systems • Active defence mechanisms • Correlation of different logs • User security awareness • Rapid sharing of cyber threat intelligence

  7. Cyber Threat Intelligence Framework Investigations of malware analysis lab APT Analizi Honeypot Systems Private Cyber Threat Intelligence Databases • Virus Scanners Open Cyber Threat Intelligence Databases Cyber Threat Intelligence Warnings System Administrators Rule Lists Firewalls Spam Mail Addresses Actionable Intelligence Virus Signatures Intrusion Signatures SPAM Prevention Systems Intrusion Detecetion Systems Virus Scanners

  8. Thanks

More Related