SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
A NOVEL CONCEPT FOR CYBERSECURITY: INSTITUTIONAL CYBERSECURITY 1
A novel concept for Cybersecurity: Institutional
Cybersecurity
Ibrahim S¸is¸aneci, Osman Akın, Muhammer Karaman, Mehmet Sag˘lam
Abstract—Broader use of digital technologies in all aspects
of our lives, exponential expansion of cyberspace, along with
complex and advanced cyber threats, lead us to reevaluate the
cybersecurity concept that has been involved in our documents
and directives differently or inadequately. One of the main issues
in this evolving cyberspace is the perception of cybersecurity.
Encapsulating a large scale of elements from individual to govern-
ment level, cybersecurity approach particularly has two outstand-
ing dimensions; national and institutional cybersecurity. Compli-
cating, shape shifting and stretching the imagination, emerging
cyber threats have demonstrated that traditional security needs
and approaches do not fulfill cybersecurity requirements and can
no longer withstand robustly to emerging cyber threats. In this
study, a novel concept, “Institutional Cybersecurity”, is suggested
instead of information security(InfoSec) processes being used in
present state by institutions.
Index Terms—Institutional Cybersecurity, Cyber risk, Dilem-
mas and Challenges of Cybersecurity, Evolution of cybersecurity
I. INTRODUCTION
Information technology has become widespread in our life
that contains from cell phones and computers to more complex
systems such as Information Technology(IT) infrastructures,
power grids, air traffic management systems, industrial manu-
facturing, and banking sectors. It seems they will continue to
be in upward trend in the future. Security of these information
technology components will be more important due to the
increase of cyber attacks day by day. The more the critical
infrastructures depend on the information system, the more
cyber risks we have to expect.
Previous cyber attacks, in particular the case in Estonia in
2007 [1], have showed that existing vulnerabilities in networks
and information systems host serious damage risks. In recent
years, in addition to traditional cyber attacks, new attack tech-
niques such as advanced persistent threat related attacks, using
zero-days, rootkit malwares and etc., have been used in many
incidents that have a specific target to be attacked. Therefore,
cyber attacks need to be handled comprehensively due to lack
of attribution and geographical boundaries, low costs, low-
risk for the attacker, and a large scale of applicability. Hence,
technical measures are not enough alone to cope with these
kind of complex cyber threats.
I.S¸ is¸aneci is with the Comp.Eng.Dept., Gebze Institude of Technology,
Gebze-Kocaeli,Turkey, (e-mail: sisaneci@gyte.edu.tr).
O.Akın is with the Comp.Eng.Dept., Hacettepe University, Ankara,Turkey,
(e-mail: oakin@hacettepe.edu.tr).
M. Karaman is a Cyber Security Expert, e-mail: (muammerkara-
man29@gmail.com)
M. Sag˘lam is with the Comp.Science Dept., VirginiaTech, Virginia, USA,
(e-mail: msaglam@vt.edu)
The terms as InfoSec, Information and Communication
Technology (ICT) security, cybersecurity, etc. have utilized
to define different concepts to address a wide variety of
risks. In traditional cybersecurity perception, familiar terms
are frequently used such as ICT security, InfoSec, information
assurance, cybersecurity and so forth. By the dramatic up-
growth in the complexity of malwares and computer viruses,
institutions could be vulnerable to cyber attacks due to the
emerging cyber risks. Therefore, from now on emerging cyber
risks should be elaborately redeemed and scrutinized in a
new sense of cybersecurity awareness. However, advanced
multi dimensional and complex cyber attacks necessitate and
implicitly bring forth some other definitions and concepts like
National Cybersecurity, Individual and Corporational Informa-
tion Security, Cybersecurity Awareness (c-saw) and so on.
In this study, the evolution of cybersecurity is reviewed
and the need of a new cybersecurity concept is emphasized.
Besides, a new concept to provide institution-level cyberse-
curity is also proposed . The term “institution” is used for
public and private sector companies that have infrastructures
under potential cyber risks and critical services. This new
concept enables us to understand cyber risks better than
traditional approaches and basically contains the cybersecurity
challenges, components and main principles in institutional
level.
The organization of this study is as follows. In Section 2,
we briefly define crucial terms as InfoSec, cyberspace and
cyber threats. In Section 3, we briefly review InfoSec approach
and evolution of cybersecurity, giving special emphasis on its
challenges and dilemmas. Next, in Section 4, we propose a
concept, “Institutional Cybersecurity”, in particular the main
features and principles of Institutional Cybersecurity, the top
down approach, and components of institutional cybersecurity.
Finally, the conclusions and future work are presented in
section 5.
II. CYBER ENVIRONMENT & SECURITY TERMS
Cyber environment and common cybersecurity terms are
briefly stated in this section to understand clearly the variety
of understanding the literature.
A. Cyber Environment
Cyberspace
The cyberspace defined as “the notional environment in
which communication over computer networks occurs.” or “A
global domain within the information environment consisting
A NOVEL CONCEPT FOR CYBERSECURITY: INSTITUTIONAL CYBERSECURITY 2
of the interdependent network of information systems infras-
tructures including the Internet, telecommunications networks,
computer systems, and embedded processors and controllers” Cyber Attack Trends
TABLE I
CYBER ATTAC K TRENDS
is growing rapidly [2].
Cyber Risk
Cyber risk, inherently exists in all IT assets, is a kind of risk
which occurs in a variety that from individuals to international
organizations that have critical IT assets. Cyber risk is spec-
ified as a group of risks, which differs in technology, attack
vectors, means, etc., rather than one specific risk. Moreover,
Cyber risks have two characteristics as having great potential
impact and low probability (Fig. 1) [3].
Fig. 1. Probability and Impact of Cyber Risk [3]
Cyber threats and attacks
After specifying the cyber risk, there is another crucial term,
cyber threat. Cyber threat can be defined as a potentional
situation that covers the distortion of information, changing
the information by unauthorized people, disclosing or stealing
information or interrupting its accessibility. The source of
cyber threat may be a single computer that is infected, or that
may be a bot-net which could consist millions of computers.
Therefore, even a single computer in the cyber environment,
both with the information it contains and its connection the
other systems, can be a source for hackers to reach critical
systems. A list of cyber attack trends is presented (in Table I)
conducted between 1990s and 2013.
Briefly, cyber attacks can be vary from a dummy computer
virus (Morris Worm) to an Advance Persistent Threat (APT),
and they are evolving continuously and exponentially. These
cyber attacks could be classified as: Cyber Crime, Hacktivisim,
Cyber Terrorism, Cyber Espionage and Cyber Warfare [4].
B. Security Terms
The question “How can an IT asset get secured in this
dangerous and complex cyberspace?” is origin of many secu-
rity terms.The terms InfoSec, information assurance(IA), and
computer security (Compu Sec) are key cyber related security
terms.
Information Security
Currently, the terms InfoSec and IA are frequently used.
InfoSec is defined as protecting the information or information
system from unauthorized access, modification or destruction
in NIST Glossary of Key Information Security Terms [5].
According to the international standard ISO/IEC 27002:2005,
Information Security is “preservation of confidentiality, in-
tegrity and availability of information; in addition, other prop-
Internet social engineering attacks
Network sniffers &Packet spoofing
Analysis of vulnerabilities in compiled software without source code
Cyber-threats & bullying (not illegal in all jurisdictions)
Automated probes and scans
GUI intrusion tools
Automated widespread attacks
Widespread, distributed denial-of-service attacks
Industrial espionage
Executable code attacks (against browsers)
Session-hijacking
Widespread attacks on DNS infrastructure & using NNTP to distribute attack
“Stealth” and other advanced scanning techniques
Windows-based remote access trojans (Back Orifice)
Email propagation of malicious code
Wide-scale trojan distribution
Targeting of specific users
Anti-forensic techniques
Wide-scale use of worms
Sophisticated botnet command and control attacks
Mobile device(phone) Android exploiting
Advance Persistent Threat (APT) [61]
Cloud Attacks
Embeded malwares
Hardware based malicious components
Old school malwares for spying (MiniDuke)
erties such as authenticity, accountability, non-repudiation and
reliability can also be involved”.
Information Assurance
A more comprehensive term than InfoSec is information
assurance that includes practice of InfoSec. IA is “the practice
of assuring information and managing risks related to the use,
processing, storage, and transmission of information or data
and the systems and processes used for those purposes. IA
includes protection of the integrity, availability, authenticity,
non-repudiation and confidentiality of user data. It uses phys-
ical, technical and administrative controls to accomplish these
tasks. While focused predominantly on information in digital
form, the full range of IA encompasses not only digital but
also analog or physical form” [6].
Cybersecurity
As we come to cybersecurity term, there are many defini-
tions in use, however we would present a couple of these:
First, cybersecurity is “the state of being protected against
the criminal or unauthorized use of electronic data, or the
measures taken to achieve this” [2] Second, “Cybersecurity
is the sum of efforts invested in addressing cyber risk, much
of which was, until recently, considered so improbable that it
hardly required our attention” [3]. Third, from International
Telecommunication Union‘s(ITU) point, it is “The collec-
tion of tools, policies, security concepts, security safeguards,
guidelines, risk management approaches, actions, training, best
practices, assurance and technologies that can be used to
protect the cyber environment and organization and user’s as-
sets. Organization and user’s assets include connected comput-
ing devices, personnel, infrastructure, applications, services,
telecommunications systems, and the totality of transmitted
and/or stored information in the cyber environment.”
A NOVEL CONCEPT FOR CYBERSECURITY: INSTITUTIONAL CYBERSECURITY 3
Institutional Cybersecurity
As a result of rapid changes in cyber environments, expan-
sion of cloud computing, and residual use of mobile devices
particularly in institutions, cybersecurity related terms should
be re-handled with a broader line of sight. Therefore, in
terms of institutional cybersecurity, a novel concept need has
emerged. We suggested a new concept, Institutional Cyberse-
curity, to symbolize and fit for all institution-level cyberse-
curity issues. The Institutional Cybersecurity is the capability
which consist of InfoSec components and cooperation with
other cybersecurity partners and cybersecurity awareness from
the cyber risk perspective.
III. INFORMATION SECURITY APPROACH AND
EVOLUTION OF CYBERSECURITY
General Security Concept & Technological Developments
Security concept contains components that are assets, risks,
threat, vulnerabilities and countermeasures. Generally, security
is a process of the selection and implementation of security
controls (also called countermeasures) which help to reduce
the risk posed via vulnerabilities [7]. The security process of
information and elements that are related to information is
evolving as the technology behind it. The motivations of this
evolution are mainly changing assets and risks that have pose
by the increase of dependency on Internet, the set of assets is
growing every day as mentioned above. Unfortunately, variety
of cyber risks is growing faster . Because of the highly
interconnected nature of these assets, every vulnerability has
impacts on the others that makes the evolution exponential.
On the other hand, the change in security side is inherently
behind this technological evolution. The new assets that are
connected to the network and their vulnerabilities must be
analyzed, or even in some cases they may get attacked by
competitors to be understood what the real consequences
could be. Then the solutions would be developed to address
this emerged risks. However, conceptualization, developing
strategies, and doctrines follow that.
Information Security Approach
Understanding Information Security approach and the evo-
lution of cybersecurity requires analyzing the question that
how/why the key concepts have emerged? The concepts that
must taken into account in this case are ICT security, InfoSec,
and cybersecurity.
Fig. 2. Area of interest for Information and Cybersecurity [7]
ICT security is the intersection area of InfoSec and cyber-
security. ICT security covers information technology infras-
tructure such as computers, computer networks, data centers
as its assets. Furthermore, these assets could be extended in
InfoSec to all sorts of information to be secured. By this
definition, InfoSec covers not only the data in ICT but also the
information which is not stored or transmitted via ICT2. Nev-
ertheless, as stated above, cybersecurity conceptually covers
both information and non-information based assets that have
posed risks via ICT. The types of these assets include a wide
variety of what that also covers critical national infrastructures,
household appliances, and even also human. As a matter of
fact, in cyberspace, the assets need to take consideration could
be anyone or anything that is accessible via cyberspace.
Briefly, InfoSec intends to secure whole IT infrastructures
and processes. But, due to its enormous size, that may not
possible to secure all cyberspace. Instead of this, cybersecurity
focuses on eliminating vulnerabilities on IT assets.
Evolution of Cybersecurity
The concept of cybersecurity, first appeared with cyber
breaches. And then, it has taken the name of cybersecurity
when cyber breaches damaged government networks. By the
expansion of cyberspace, the concept of InfoSec become
inadequate to address multi-dimensional and complex cyber
attacks. For instance, one of the advanced cyber espionage
malware, Red October, targeted diplomatic and government
institutions worldwide for at least five years which has been
detected in January 2013 [8]. Another example is the Industrial
Control Systems Computer Emergency Response Team (ICS-
CERT) report of the US Department of Homeland Security
[9] has shown that; In the first half of the fiscal year 2013,
(October 1, 2012–May 2013), the highest percentage of in-
cidents reported to ICS-CERT occurred in the energy sector
at 53%. For another example, as stated by Verizon 2013
security report [Verizon], which reported 2012 alone consists
of 47000 security incidents, show that the growth of recent
data breaches alarm that the organizations to take new actions.
These examples support the legitimacy of the new concepts
such as National Cybersecurity, Individual and Corporational
Information Security, Cyber Awareness (c-saw) and so forth.
That is the current result of the ongoing evolution.
The continuous national/international level InfoSec efforts
or recommendation publications may not adequately address
the risks of cyberspace. As the current situation, InfoSec
efforts were limited to their InfoSec management systems
which are developed in line with international standards such
as ISO 27001, NIST-800 series and COBIT. The current
versions of these international standards have failed to meet
completely cybersecurity requirements. Many countries and
international organizations have developed their cybersecu-
rity strategies that mainly focus governance, cooperation and
active defense. However, in institutional level, there is no
international standard or guideline which consists cooperation,
integration to national security and active defense to cope with
cyber threats, such as APTs.
Challenges and Dilemmas of Cybersecurity
Due to the complex nature of cybersecurity, many chal-
lenges and dilemmas have been emerged from both national
A NOVEL CONCEPT FOR CYBERSECURITY: INSTITUTIONAL CYBERSECURITY 4
and institutional perspectives. For instance, in National Cyber-
security Framework Manual, prepared by NATO Cooperative
Cyber Defense Centre of Excellence (NATO CCD COE),
dilemmas that nations face and have to deal with as establish-
ing, maintaining and enforcing cybersecurity are stated(Table
II) [10]. Similar to national level challenges, institutions also
need to cope with some dilemmas (Table III) that may be
filtered from national challenges or may be localized version of
national ones. Due to widely diversed cyber attacks, mentioned
in Table I, sustainable cybersecurity is no longer a solely
responsibility of cybersecurity personnel. But, it is a common
responsibility of all personnel, stakeholders and partners. For
instance, an employee, without having enough cybersecurity
knowledge and awareness or who underestimates cybersecurity
regulations taken by the institution, may anytime cause deadly
losses. Thus, this incident may result sometimes loss of
reputation, economic assets, and so forth. [1]
TABLE II
MAIN DILEMMAS OF NATIONAL CYBERSECURITY
M ain Dilemmas of National Cybersecurity [10]
Stimulate the Economy vs. Improve National Security
Infrastructure Modernization vs. Infrastructure Protection,
Private Sector vs. Public Sector,
Data Protection vs. Information Sharing
Freedom of Expression vs. Political Stability
cybersecurity challenge for both national and institutional
level is lack of broader perception of cybersecurity. And to
bring sectors and institutions to a level of security standard
depends heavily on national perception of cybersecurity issues,
that also makes that the challenge number one. For instance,
some governments may choose to centralize the majority of
decision-making mechanisms, while others may devolve this
to a lower level according to a particular need (e.g., to build
resilience and responsiveness into highly decentralized and
mostly privately-owned critical infrastructure) [10] [17]. This
decision would mainly effects the body of national cybersecu-
rity issue. The cybersecurity burden on private sector may not
desired however, even the government side of cybersecurity
is tightened, it is just as easy for a terrorist organizations or
other state-sponsored actors to take out a private-sector entity
that will really impact the nation [18].
IV. AN EMERGING CONCEPT: INSTITUTIONAL
CYBERSECURITY
With emerging new cyber risks and more complex mal-
wares, countries and international organizations like NATO,
ENISA, etc. have been looking for new ways to fight against
challenging issues [15], [19]. The essential step for countries
is to form a national cybersecurity strategy. Generally, in that
kind of strategies; the importance of policies, cybersecurity
countermeasures and some action plans are taken into account
at upper levels. Even though these strategies and policies
TABLE III
MAIN DILEMMAS OF INSTITUTIONAL CYBERSECURITY
Main Dilemmas of Institutional Cybersecurity
IT Security Cost vs. Institutional Cybersecurity
Privacy vs. Information sharing [11]
Homegrown human resource vs. Outsourcing [12]
Open source vs. Licensed software [13]
Cooperation vs. Loss of Reputation [14]
Along with national and institutional dilemmas, institu-
tional cybersecurtiy challenges must be analyzed to understand
the constraints. These challenges could be listed as; lack
of broader perception of cybersecurity, information sharing,
legal issues (legal suspense), leadership, cost, human resource,
expansion of cyberspace, infrastructure insufficiency, standards
addressing the majority, building common cybersecurity pic-
ture, lack of metrics of cybersecurity, lack of coordination and
information sharing, security and usability issues, bureaucracy,
insider threats, migration plan (unprotected systems to secure
systems), technological backward compatibility and the list
goes on [15].
Lack of broader perception of cybersecurity
The challenges of cybersecurity can be diversified endem-
ically to nations and institutions according to their line of
sight to cybersecurity. For example, according to Dmitriy
Ayrapetov, Director, Product Management, Dell SonicWALL;
the jor cybersecurity challenges for businesses through 2013
will come from: increase in exploit kits, increase in mobile
device cybersecurity threats and increase in sophistication of
threats [16]. However it may vary across analyses of experts
on cybersecurity field; from our perspective, the number one
cover intensively military, intelligence and critical infrastruc-
tures, the institution-level cybersecurity is ignored. In order to
provide a robust national level cybersecurity, we belive that
institution-level cybersecurity should be initial step to take
forward. When we look at the whole cybersecurity organi-
zation structure(Fig. 3), institution-level cybersecurity forms
the body part of cybersecurity organization which contains
the entities as individuals, public/private institutions, military,
government, and international organizations. Since the body
part has a critical role to interact with all other entities, it
effects the success of upper level cybersecurity.
Fig. 3. Cybersecurity Organization Structure
While the weakest link in InfoSec is human being, in terms
of national security the weakest link is the weakest institution
having critical infrastructures or cyber risks. Unlike stated
A NOVEL CONCEPT FOR CYBERSECURITY: INSTITUTIONAL CYBERSECURITY 5
in national cybersecurity strategies, in terms of institutional
cybersecurity, not only institutions which manages critical
infrastructure but also other companies having cyber risk
should be taken into account to ensure a robust cybersecurity.
For example, a software company, without having any critical
infrastructure, could be a target for cyber attacks due to stolen
software code or root driver(SIEMENS and STUXNET case)
[20]
Current attacks such as STUXNET case make the need
of a new concept inevitable. To address this need, our pro-
posed concept, Institutional Cybersecurity could be defined
as; A comprehensive concept for ensuring robust and resilient
institution-level cybersecurity by;
-Providing cyber situational awareness,
-Addressing emerging cyber risks,
-Encourage inter and intra institutional cooperation and
coordination,
-Presenting a flexible framework for its applicability,
for public/private institutions having critical infrastructures
or having cyber risks for their business continuity.
Components and Principles of Institutional Cybersecurity
Our proposed concept provides a generic manner that every
institution can adapt it for its own security needs to develop
their institutional cybersecurity capability . To reach this goal,
the main principles of Institutional Cybersecurity are presented
as follows:
1-Cybersecurity approach must be holistic,
2-A flexible management style should be adopted,
3-Risk management-centered continuous improvement
methods should be implemented,
4-In addition to coordination of public, private, academic,
and non-governmental organization, international cooperation
and information sharing should be bottom lines for security
5- Transparency, accountability, ethical values, freedom of
speech must be endorsed,
6-Setting balance between security and applicability is im-
portant.
In the light of these principles, in order to have efficient
institutional cybersecurity, Institutional Cybersecurity should
have fundamental components as presented(Fig. 4).
Fig. 4. Institutional Cybersecurity Components
Policy, Strategy and Standards: Detailed cybersecurity
policy, strategy and secure system management principles can
help institutions to take the first step.
Cyber Risk Management: Cyber risks can be minimized and
managed by utilizing efficient risk management mechanism to
unveil all threats and vulnerabilities.
Vulnerability and Threat Management : According to
advances in cyberspace, vulnerability and threat management
could be handled under the cyber risk management. Vul-
nerability management should be supported by periodical
vulnerability analysis/tests and penetration tests.
Central Incident Management: Efficient prevention, fast re-
sponse and mitigation against to cyber attacks can be obtained
by central incident management. And, active cooperation and
collaboration to national cybersecurity can be achieved via the
ability to central incident management including Institutional
CIRT’s.
Cybersecurity Awareness and Education: Human being is
the weakest link in the security chain. Therefore, cybersecurity
awareness and education programs must focus mainly human
factor.
Log Management and Correlation: Possible attacks and
data leakage could be detected in advance and preventive
actions can be performed by utilizing efficient log management
and correlation.
Secure Architecture: All institutional information technol-
ogy infrastructures and architectures including business part-
ners should be reviewed and questioned from the perspective
of cybersecurity.
Legal Issues: The legal regulations always stand as the
most important factor to enforce and ensure cybersecurity. To
prevent privacy violation and to set liability processes, proper
legal regulations must be set. Otherwise, countermeasures for
providing cybersecurity such as monitoring personal informa-
tion may pose risks for institutions.
Technical Tools: Similar to ICT security, proper software
and hardware including firewalls, IPDS, anti-virus software,
etc. must be used to provide comprehensive cybersecurity.
Business Continuity: Business continuity plans must be har-
monized with Institutional cybersecurity strategies and plans.
Continuous Auditing and Monitoring: Auditing is a contin-
uous process that contains audit tests or review procedures.
Errors, policy violations, fraud, and misconducts should be
audited in a timely manner to fill the control gaps and
deficiencies. Monitoring is a mechanism that could be utilized
to automate manual controls and processes or regular and
frequent insights to avoid potential regulatory noncompliance,
cyber attacks and malicious activities.
Cooperation: Cooperation with other cybersecurity partners
and CIRT’s are vital for institutions in order to set early
warning mechanisms and effective resource sharing. Also,
due to confronting asymetric and organized cyber threats,
government coordination with institutions and particularly
with private sectors is inevitable.
Cyber Resilience: All efforts in the institutional cybersecu-
rity management should be flexible enough to adapt to the
dynamic developments in cyberspace.
Cyber resilience can be defined in literature as “The ability
of a nation, organization, or mission or business process to
anticipate, withstand, recover from, and evolve to improve
capabilities conditions, stresses, or attacks on the support-
ing cyber resources it needs to function.” [21]. A Resilient
Enterprise is able to withstand systematic discontinuities and
adapt to new risk environments [22] or dynamically reinvent
A NOVEL CONCEPT FOR CYBERSECURITY: INSTITUTIONAL CYBERSECURITY 6
business models and strategies as circumstances change [23].
According to [21] document a Resilince framework is able to
include anticipate, withstand, recover and evolve steps.
Reaching the goal of using all of these institutional secu-
rity components efficiently requires achieving cybersecurity
objectives in institutional level. Furthermore, main goal of
Institutional cybersecurity is to cooperate these components
into an integrated framework in a resilient perspective. While
securing the whole system, availability and usability could
be ignored unintentionally. In order to avoid this situation,
resilient management model should be performed. In this
perspective, our proposed institutional cybersecurity concept
contains resilient solutions for challenges. Another point is
to manage all these components as an integrated framework
requires a leadership. Through the principles and components
of proposed concept above, challenges and dilemmas for
institutional cybersecurity can be resolved considerably.
V. CONCLUSION AND FUTURE WORKS
All institutions, regardless of being public or private, should
definitely expect and envision emerging cyber threats. With
the help of revitalized InfoSec processes to fit a holistic cy-
bersecurity concept and a high level cybersecurity awareness,
assessing and analyzing the potential and possible effects of
complex and advanced threats will get less harder.
As a result of this research, it can be expressed that
unless cybersecurity for institutions are handled in a broader
perception, professional manner and presented as an integrated
solution, it will have a higher possibility to be exposured and
damaged by a cyber attack at any moment.
To date, many companies and institutions have had only
IT departments. However, now, institutions having cyber risks
should set up a cybersecurity or CIRTs. Hereby, the instituonal
cybersecurity could be taken up in a more generic manner and
encapsulates above-mentioned issues.
With the establishment of an institutional cybersecurity
organization; the exploitable points in the system can be
corrected by performing vulnerability test, the abnormality can
be detected in real-time by monitoring logs, the situational
awareness can be improved by applying scenarios, the risk as-
sessment can be carried out by establishing integrated systems
and probably the cyber attacks can be prevented before they
start.
Due to their field-based and structural differences, each in-
stitution can prepare and follow a different cybersecurity road
map peculiar to itself. But, as a first step, the recommended
concept can be evaluated as an inception guide for institutions
willing to start building a new cybersecurity capability.
In this study, we handled the cybersecurity issue from a new
perspective for institutions and discussed in details. This new
cybersecurity concept has also contributed and filled the con-
ceptual absence of lower-governmental levels in cybersecurity
organization structure.
Institutional cybersecuriy will be an emerging fertile re-
search area. There are many ways to extend this work in the
future. For instance, we are planning to propose a new road
map for institutions which is going to contain a transforming
guideline to set forward a new concept in cybersecurity
management processes.
REFERENCES
[1] H. Senturk, Z. C¸il, and S¸. Sag˘ırog˘lu, “Cyber security analysis of turkey,”
International Journal of Information Security Science, vol. 1, no. 4, pp.
112–125, 2012.
[2] (2013, Jun.) Oxford dictionaries. [Online]. Available:
http://oxforddictionaries.com/
[3] M. Barzilay. (2013, May) A simple definition of cy-
bersecurity. [Online]. Available: http://www.isaca.org/Knowledge-
Center/Blog/Lists/Posts/Post.aspx?ID=296
[4] C. M., “Arm yourself for cyber war – are you next?” in Sibos Conference
Panel 2012, 2012.
[5] R. Kissel, Glossary of key information security terms. DIANE
Publishing, 2011.
[6] N. Seddigh, P. Pieda, A. Matrawy, B. Nandy, I. Lambadaris, and
A. Hatfield, “Current trends and advances in information assurance
metrics.” in PST, 2004, pp. 197–205.
[7] R. von Solms and J. van Niekerk, “From information security to cyber
security,” Computers & Security, 2013.
[8] KasperskyLabratuaries. (2013, Jun.) Red october an ad-
vanced cyber espionage campaign targeting diplomatic
and government institutions worldwide. [Online]. Available:
http://www.kaspersky.com/about/news/virus/2013/
[9] ICS-CERT. (2013, Jun.) Ics-cert monitor report between
april-june 2013 of department of homeland security.
[Online]. Available: http://icscert.uscert.gov/sites/default/files/IC§-
CERT Monitor AprilJune2013 3.pdf
[10] A. Klimburg, Ed., National cyber security framework manual. NATO
CCD COE Publications, 2012.
[11] B. Adelmann, “Cispa is big brother‘s friend,” 2012.
[12] S. Alexander, “Rise of outsourcing poses new cybersecurity problems,”
2011.
[13] B. Gourley, “Open source software and cyber defense,” 2009.
[14] “Security task force: Public-private information sharing,” 2012.
[15] NATO. (2013, Jun.) Nato web site. [Online]. Available:
http://www.nato.int, June,2013
[16] Techrepublic. (2013, May) Cybersecurity challenges in 2013. [Online].
Available: http://www.techrepublic.com/blog/security/cybersecurity-
challenges-in-2013/9038
[17] B. Karabacak and S. OZKAN, “Critical infrastructure protection status
and action items of turkey,” 2009.
[18] APCOForum.com. (2013, Jun.) The cyber security challenge: The risk
of inaction. [Online]. Available: www.apcoforum.com
[19] ENISA. (2013, May) European network and information security agency
glossary. [Online]. Available: www.enisa.europa.eu/act/res/files/glossary
[20] A. Matrosov, E. Rodionov, D. Harley, and J. Malcho, “Stuxnet under
the microscope,” ESET LLC (September 2010), 2010.
[21] R. A. Caralli, J. H. Allen, and D. W. White, CERT Resilience Manage-
ment Model (CERT-RMM): A Maturity Model for Managing Operational
Resilience. Addison-Wesley Professional, 2010.
[22] R. Starr, J. Newfrock, and M. Delurey, “Enterprise resilience: managing
risk in the networked economy,” Strategy and Business, pp. 70–79, 2003.
[23] L. Va¨likangas and G. Hamel, “The quest for resilience,” 2009.
I˙brahim S¸is¸aneci is currently a PhD candidate in
Comp.Eng.Dept., Gebze Institute of Technology(GIT). He
received M.S. degree in Comp.Eng.Dept., GIT and BS degree
in Comp.Eng.Dept. from Marmara University. His research interest
are HCI, usability, InfoSec, Cybersecurity, data mining.
Osman Akın is currently a PhD student in Comp.Eng.Dept.,
Hacettepe University. His research interest are cybersecurity, web
based software, web based software security and computer vision.
Muhammer Karaman received his BS degree in Turkish Army
Academy in 2005. His research interests are cyber war, cyber
electronic war, cybersecurity.
Mehmet Sag˘lam received BS degree in Industrial Engineering
from Turkish Naval Academy in 2009. He is currently a M.S. degree
student in Department of Comp.Science, VirginiaTech. His research
interests are Critical Infrastructure Protection and Cyber Warfare. In
particular, his current research focuses on Power Grid Cyber Security.

Contenu connexe

Tendances

PhD Thesis Writing Assistance - Manuscript
PhD Thesis Writing Assistance - ManuscriptPhD Thesis Writing Assistance - Manuscript
PhD Thesis Writing Assistance - Manuscriptkarishmakittu
 
Ea3212451252
Ea3212451252Ea3212451252
Ea3212451252IJMER
 
Mobile Device Users’ Susceptibility To Phishing Attacks
Mobile Device Users’ Susceptibility To Phishing AttacksMobile Device Users’ Susceptibility To Phishing Attacks
Mobile Device Users’ Susceptibility To Phishing AttacksAIRCC Publishing Corporation
 
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...IJNSA Journal
 
EMERGENCY RESPONSE COMMUNICATIONS AND ASSOCIATED SECURITY CHALLENGES
EMERGENCY RESPONSE COMMUNICATIONS AND ASSOCIATED SECURITY CHALLENGESEMERGENCY RESPONSE COMMUNICATIONS AND ASSOCIATED SECURITY CHALLENGES
EMERGENCY RESPONSE COMMUNICATIONS AND ASSOCIATED SECURITY CHALLENGESIJNSA Journal
 
Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...
Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...
Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...INSPIRIT BRASIL
 
Comparative review dele
Comparative review deleComparative review dele
Comparative review deleyoboy7
 
Paper id 25201417
Paper id 25201417Paper id 25201417
Paper id 25201417IJRAT
 
Trusting Smart Speakers: Understanding the Different Levels of Trust between ...
Trusting Smart Speakers: Understanding the Different Levels of Trust between ...Trusting Smart Speakers: Understanding the Different Levels of Trust between ...
Trusting Smart Speakers: Understanding the Different Levels of Trust between ...CSCJournals
 
Paper Florencio Cano - Patient data security in a wireless and mobile world
Paper Florencio Cano - Patient data security in a wireless and mobile worldPaper Florencio Cano - Patient data security in a wireless and mobile world
Paper Florencio Cano - Patient data security in a wireless and mobile worldWTHS
 
Deterring hacking strategies via
Deterring hacking strategies viaDeterring hacking strategies via
Deterring hacking strategies viaIJNSA Journal
 
DEVELOPMENT OF A MODEL OF CYBER SECURITY MANAGEMENT FOR AUTOMATED SYSTEMS
DEVELOPMENT OF A MODEL OF CYBER SECURITY MANAGEMENT FOR AUTOMATED SYSTEMSDEVELOPMENT OF A MODEL OF CYBER SECURITY MANAGEMENT FOR AUTOMATED SYSTEMS
DEVELOPMENT OF A MODEL OF CYBER SECURITY MANAGEMENT FOR AUTOMATED SYSTEMSIAEME Publication
 
IT Security and Management - Security Policies
IT Security and Management - Security PoliciesIT Security and Management - Security Policies
IT Security and Management - Security PoliciesMark John Lado, MIT
 
The Next Generation Cognitive Security Operations Center: Network Flow Forens...
The Next Generation Cognitive Security Operations Center: Network Flow Forens...The Next Generation Cognitive Security Operations Center: Network Flow Forens...
The Next Generation Cognitive Security Operations Center: Network Flow Forens...Konstantinos Demertzis
 
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSESE-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSESIJNSA Journal
 

Tendances (20)

PhD Thesis Writing Assistance - Manuscript
PhD Thesis Writing Assistance - ManuscriptPhD Thesis Writing Assistance - Manuscript
PhD Thesis Writing Assistance - Manuscript
 
Ea3212451252
Ea3212451252Ea3212451252
Ea3212451252
 
L010517180
L010517180L010517180
L010517180
 
Mobile Device Users’ Susceptibility To Phishing Attacks
Mobile Device Users’ Susceptibility To Phishing AttacksMobile Device Users’ Susceptibility To Phishing Attacks
Mobile Device Users’ Susceptibility To Phishing Attacks
 
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...
 
Modern Metrics on Computer Networking
Modern Metrics on Computer NetworkingModern Metrics on Computer Networking
Modern Metrics on Computer Networking
 
Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
 
EMERGENCY RESPONSE COMMUNICATIONS AND ASSOCIATED SECURITY CHALLENGES
EMERGENCY RESPONSE COMMUNICATIONS AND ASSOCIATED SECURITY CHALLENGESEMERGENCY RESPONSE COMMUNICATIONS AND ASSOCIATED SECURITY CHALLENGES
EMERGENCY RESPONSE COMMUNICATIONS AND ASSOCIATED SECURITY CHALLENGES
 
Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...
Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...
Watchguard - How Cloud‐based Security Delivers   Up‐to‐the‐Minute Network Pro...
 
Comparative review dele
Comparative review deleComparative review dele
Comparative review dele
 
Paper id 25201417
Paper id 25201417Paper id 25201417
Paper id 25201417
 
Trusting Smart Speakers: Understanding the Different Levels of Trust between ...
Trusting Smart Speakers: Understanding the Different Levels of Trust between ...Trusting Smart Speakers: Understanding the Different Levels of Trust between ...
Trusting Smart Speakers: Understanding the Different Levels of Trust between ...
 
Paper Florencio Cano - Patient data security in a wireless and mobile world
Paper Florencio Cano - Patient data security in a wireless and mobile worldPaper Florencio Cano - Patient data security in a wireless and mobile world
Paper Florencio Cano - Patient data security in a wireless and mobile world
 
Deterring hacking strategies via
Deterring hacking strategies viaDeterring hacking strategies via
Deterring hacking strategies via
 
DEVELOPMENT OF A MODEL OF CYBER SECURITY MANAGEMENT FOR AUTOMATED SYSTEMS
DEVELOPMENT OF A MODEL OF CYBER SECURITY MANAGEMENT FOR AUTOMATED SYSTEMSDEVELOPMENT OF A MODEL OF CYBER SECURITY MANAGEMENT FOR AUTOMATED SYSTEMS
DEVELOPMENT OF A MODEL OF CYBER SECURITY MANAGEMENT FOR AUTOMATED SYSTEMS
 
Introduction to the concept of it security
Introduction to the concept of it securityIntroduction to the concept of it security
Introduction to the concept of it security
 
IT Security and Management - Security Policies
IT Security and Management - Security PoliciesIT Security and Management - Security Policies
IT Security and Management - Security Policies
 
The Next Generation Cognitive Security Operations Center: Network Flow Forens...
The Next Generation Cognitive Security Operations Center: Network Flow Forens...The Next Generation Cognitive Security Operations Center: Network Flow Forens...
The Next Generation Cognitive Security Operations Center: Network Flow Forens...
 
Ijcatr04061002
Ijcatr04061002Ijcatr04061002
Ijcatr04061002
 
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSESE-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
 

En vedette (15)

Brain death
Brain deathBrain death
Brain death
 
Intb3 rtuvz
Intb3 rtuvzIntb3 rtuvz
Intb3 rtuvz
 
Commission autopilot
Commission autopilotCommission autopilot
Commission autopilot
 
Super News March 2015
Super News March 2015Super News March 2015
Super News March 2015
 
Seminario4
Seminario4Seminario4
Seminario4
 
ResumeUpdated
ResumeUpdatedResumeUpdated
ResumeUpdated
 
J
JJ
J
 
Brain death
Brain deathBrain death
Brain death
 
2011 Four State Teaching Conference - Using games, social media and mobile de...
2011 Four State Teaching Conference - Using games, social media and mobile de...2011 Four State Teaching Conference - Using games, social media and mobile de...
2011 Four State Teaching Conference - Using games, social media and mobile de...
 
Russian presentation final
Russian presentation finalRussian presentation final
Russian presentation final
 
Cartel constitución 2016
Cartel constitución 2016Cartel constitución 2016
Cartel constitución 2016
 
FSA presentation
FSA presentationFSA presentation
FSA presentation
 
Ulisses
UlissesUlisses
Ulisses
 
Predictive Analytics, AI and the Promise of Personalization
Predictive Analytics, AI and the Promise of PersonalizationPredictive Analytics, AI and the Promise of Personalization
Predictive Analytics, AI and the Promise of Personalization
 
Elaborar biografia
Elaborar biografiaElaborar biografia
Elaborar biografia
 

Similaire à A_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty

A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...
A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...
A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...ssuser793b4e
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Conkarenahmanny4c
 
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxJournal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxcroysierkathey
 
AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKS
AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKSAN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKS
AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKSDaphne Smith
 
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...ijtsrd
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Security
 
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...cyberprosocial
 
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...cyberprosocial
 
Cyber security: challenges for society- literature review
Cyber security: challenges for society- literature reviewCyber security: challenges for society- literature review
Cyber security: challenges for society- literature reviewIOSR Journals
 
A Systematic Literature Review On The Cyber Security
A Systematic Literature Review On The Cyber SecurityA Systematic Literature Review On The Cyber Security
A Systematic Literature Review On The Cyber SecurityAmy Cernava
 
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityThreat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityIRJET Journal
 
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...CSCJournals
 
The Future of Cybersecurity courses.pptx
The Future of Cybersecurity courses.pptxThe Future of Cybersecurity courses.pptx
The Future of Cybersecurity courses.pptxRykaBhatt
 
A Review of Information Security Issues and Techniques.pdf
A Review of Information Security  Issues and Techniques.pdfA Review of Information Security  Issues and Techniques.pdf
A Review of Information Security Issues and Techniques.pdfArlene Smith
 
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTIONAI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTIONChristopherTHyatt
 
CYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptxCYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptxtanyamudgal4
 
Information Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and ChallengesInformation Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and Challengesijtsrd
 
Enterprise Immune System
Enterprise Immune SystemEnterprise Immune System
Enterprise Immune SystemAustin Eppstein
 

Similaire à A_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty (20)

A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...
A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...
A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Con
 
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxJournal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
 
AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKS
AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKSAN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKS
AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKS
 
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
 
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
 
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...
 
Cyber security: challenges for society- literature review
Cyber security: challenges for society- literature reviewCyber security: challenges for society- literature review
Cyber security: challenges for society- literature review
 
A Systematic Literature Review On The Cyber Security
A Systematic Literature Review On The Cyber SecurityA Systematic Literature Review On The Cyber Security
A Systematic Literature Review On The Cyber Security
 
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityThreat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
 
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
 
C018131821
C018131821C018131821
C018131821
 
The Future of Cybersecurity courses.pptx
The Future of Cybersecurity courses.pptxThe Future of Cybersecurity courses.pptx
The Future of Cybersecurity courses.pptx
 
A Review of Information Security Issues and Techniques.pdf
A Review of Information Security  Issues and Techniques.pdfA Review of Information Security  Issues and Techniques.pdf
A Review of Information Security Issues and Techniques.pdf
 
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTIONAI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
 
CYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptxCYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptx
 
E04 05 2841
E04 05 2841E04 05 2841
E04 05 2841
 
Information Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and ChallengesInformation Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and Challenges
 
Enterprise Immune System
Enterprise Immune SystemEnterprise Immune System
Enterprise Immune System
 

Plus de Government

ELEKTRONİK KOPYANIN ALINMASI
ELEKTRONİK KOPYANIN ALINMASIELEKTRONİK KOPYANIN ALINMASI
ELEKTRONİK KOPYANIN ALINMASIGovernment
 
Institutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military PerspectiveInstitutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military PerspectiveGovernment
 
Cyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_YayımlandıCyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_YayımlandıGovernment
 
ISC Turkey 2013_CAPTURE THE FLAG
ISC Turkey 2013_CAPTURE THE FLAGISC Turkey 2013_CAPTURE THE FLAG
ISC Turkey 2013_CAPTURE THE FLAGGovernment
 
icmss-2015_Usage of Forensics Science In Intelligence Gathering (Forensics In...
icmss-2015_Usage of Forensics Science In Intelligence Gathering (Forensics In...icmss-2015_Usage of Forensics Science In Intelligence Gathering (Forensics In...
icmss-2015_Usage of Forensics Science In Intelligence Gathering (Forensics In...Government
 
2015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s022015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s02Government
 

Plus de Government (6)

ELEKTRONİK KOPYANIN ALINMASI
ELEKTRONİK KOPYANIN ALINMASIELEKTRONİK KOPYANIN ALINMASI
ELEKTRONİK KOPYANIN ALINMASI
 
Institutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military PerspectiveInstitutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military Perspective
 
Cyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_YayımlandıCyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_Yayımlandı
 
ISC Turkey 2013_CAPTURE THE FLAG
ISC Turkey 2013_CAPTURE THE FLAGISC Turkey 2013_CAPTURE THE FLAG
ISC Turkey 2013_CAPTURE THE FLAG
 
icmss-2015_Usage of Forensics Science In Intelligence Gathering (Forensics In...
icmss-2015_Usage of Forensics Science In Intelligence Gathering (Forensics In...icmss-2015_Usage of Forensics Science In Intelligence Gathering (Forensics In...
icmss-2015_Usage of Forensics Science In Intelligence Gathering (Forensics In...
 
2015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s022015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s02
 

A_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty

  • 1. A NOVEL CONCEPT FOR CYBERSECURITY: INSTITUTIONAL CYBERSECURITY 1 A novel concept for Cybersecurity: Institutional Cybersecurity Ibrahim S¸is¸aneci, Osman Akın, Muhammer Karaman, Mehmet Sag˘lam Abstract—Broader use of digital technologies in all aspects of our lives, exponential expansion of cyberspace, along with complex and advanced cyber threats, lead us to reevaluate the cybersecurity concept that has been involved in our documents and directives differently or inadequately. One of the main issues in this evolving cyberspace is the perception of cybersecurity. Encapsulating a large scale of elements from individual to govern- ment level, cybersecurity approach particularly has two outstand- ing dimensions; national and institutional cybersecurity. Compli- cating, shape shifting and stretching the imagination, emerging cyber threats have demonstrated that traditional security needs and approaches do not fulfill cybersecurity requirements and can no longer withstand robustly to emerging cyber threats. In this study, a novel concept, “Institutional Cybersecurity”, is suggested instead of information security(InfoSec) processes being used in present state by institutions. Index Terms—Institutional Cybersecurity, Cyber risk, Dilem- mas and Challenges of Cybersecurity, Evolution of cybersecurity I. INTRODUCTION Information technology has become widespread in our life that contains from cell phones and computers to more complex systems such as Information Technology(IT) infrastructures, power grids, air traffic management systems, industrial manu- facturing, and banking sectors. It seems they will continue to be in upward trend in the future. Security of these information technology components will be more important due to the increase of cyber attacks day by day. The more the critical infrastructures depend on the information system, the more cyber risks we have to expect. Previous cyber attacks, in particular the case in Estonia in 2007 [1], have showed that existing vulnerabilities in networks and information systems host serious damage risks. In recent years, in addition to traditional cyber attacks, new attack tech- niques such as advanced persistent threat related attacks, using zero-days, rootkit malwares and etc., have been used in many incidents that have a specific target to be attacked. Therefore, cyber attacks need to be handled comprehensively due to lack of attribution and geographical boundaries, low costs, low- risk for the attacker, and a large scale of applicability. Hence, technical measures are not enough alone to cope with these kind of complex cyber threats. I.S¸ is¸aneci is with the Comp.Eng.Dept., Gebze Institude of Technology, Gebze-Kocaeli,Turkey, (e-mail: sisaneci@gyte.edu.tr). O.Akın is with the Comp.Eng.Dept., Hacettepe University, Ankara,Turkey, (e-mail: oakin@hacettepe.edu.tr). M. Karaman is a Cyber Security Expert, e-mail: (muammerkara- man29@gmail.com) M. Sag˘lam is with the Comp.Science Dept., VirginiaTech, Virginia, USA, (e-mail: msaglam@vt.edu) The terms as InfoSec, Information and Communication Technology (ICT) security, cybersecurity, etc. have utilized to define different concepts to address a wide variety of risks. In traditional cybersecurity perception, familiar terms are frequently used such as ICT security, InfoSec, information assurance, cybersecurity and so forth. By the dramatic up- growth in the complexity of malwares and computer viruses, institutions could be vulnerable to cyber attacks due to the emerging cyber risks. Therefore, from now on emerging cyber risks should be elaborately redeemed and scrutinized in a new sense of cybersecurity awareness. However, advanced multi dimensional and complex cyber attacks necessitate and implicitly bring forth some other definitions and concepts like National Cybersecurity, Individual and Corporational Informa- tion Security, Cybersecurity Awareness (c-saw) and so on. In this study, the evolution of cybersecurity is reviewed and the need of a new cybersecurity concept is emphasized. Besides, a new concept to provide institution-level cyberse- curity is also proposed . The term “institution” is used for public and private sector companies that have infrastructures under potential cyber risks and critical services. This new concept enables us to understand cyber risks better than traditional approaches and basically contains the cybersecurity challenges, components and main principles in institutional level. The organization of this study is as follows. In Section 2, we briefly define crucial terms as InfoSec, cyberspace and cyber threats. In Section 3, we briefly review InfoSec approach and evolution of cybersecurity, giving special emphasis on its challenges and dilemmas. Next, in Section 4, we propose a concept, “Institutional Cybersecurity”, in particular the main features and principles of Institutional Cybersecurity, the top down approach, and components of institutional cybersecurity. Finally, the conclusions and future work are presented in section 5. II. CYBER ENVIRONMENT & SECURITY TERMS Cyber environment and common cybersecurity terms are briefly stated in this section to understand clearly the variety of understanding the literature. A. Cyber Environment Cyberspace The cyberspace defined as “the notional environment in which communication over computer networks occurs.” or “A global domain within the information environment consisting
  • 2. A NOVEL CONCEPT FOR CYBERSECURITY: INSTITUTIONAL CYBERSECURITY 2 of the interdependent network of information systems infras- tructures including the Internet, telecommunications networks, computer systems, and embedded processors and controllers” Cyber Attack Trends TABLE I CYBER ATTAC K TRENDS is growing rapidly [2]. Cyber Risk Cyber risk, inherently exists in all IT assets, is a kind of risk which occurs in a variety that from individuals to international organizations that have critical IT assets. Cyber risk is spec- ified as a group of risks, which differs in technology, attack vectors, means, etc., rather than one specific risk. Moreover, Cyber risks have two characteristics as having great potential impact and low probability (Fig. 1) [3]. Fig. 1. Probability and Impact of Cyber Risk [3] Cyber threats and attacks After specifying the cyber risk, there is another crucial term, cyber threat. Cyber threat can be defined as a potentional situation that covers the distortion of information, changing the information by unauthorized people, disclosing or stealing information or interrupting its accessibility. The source of cyber threat may be a single computer that is infected, or that may be a bot-net which could consist millions of computers. Therefore, even a single computer in the cyber environment, both with the information it contains and its connection the other systems, can be a source for hackers to reach critical systems. A list of cyber attack trends is presented (in Table I) conducted between 1990s and 2013. Briefly, cyber attacks can be vary from a dummy computer virus (Morris Worm) to an Advance Persistent Threat (APT), and they are evolving continuously and exponentially. These cyber attacks could be classified as: Cyber Crime, Hacktivisim, Cyber Terrorism, Cyber Espionage and Cyber Warfare [4]. B. Security Terms The question “How can an IT asset get secured in this dangerous and complex cyberspace?” is origin of many secu- rity terms.The terms InfoSec, information assurance(IA), and computer security (Compu Sec) are key cyber related security terms. Information Security Currently, the terms InfoSec and IA are frequently used. InfoSec is defined as protecting the information or information system from unauthorized access, modification or destruction in NIST Glossary of Key Information Security Terms [5]. According to the international standard ISO/IEC 27002:2005, Information Security is “preservation of confidentiality, in- tegrity and availability of information; in addition, other prop- Internet social engineering attacks Network sniffers &Packet spoofing Analysis of vulnerabilities in compiled software without source code Cyber-threats & bullying (not illegal in all jurisdictions) Automated probes and scans GUI intrusion tools Automated widespread attacks Widespread, distributed denial-of-service attacks Industrial espionage Executable code attacks (against browsers) Session-hijacking Widespread attacks on DNS infrastructure & using NNTP to distribute attack “Stealth” and other advanced scanning techniques Windows-based remote access trojans (Back Orifice) Email propagation of malicious code Wide-scale trojan distribution Targeting of specific users Anti-forensic techniques Wide-scale use of worms Sophisticated botnet command and control attacks Mobile device(phone) Android exploiting Advance Persistent Threat (APT) [61] Cloud Attacks Embeded malwares Hardware based malicious components Old school malwares for spying (MiniDuke) erties such as authenticity, accountability, non-repudiation and reliability can also be involved”. Information Assurance A more comprehensive term than InfoSec is information assurance that includes practice of InfoSec. IA is “the practice of assuring information and managing risks related to the use, processing, storage, and transmission of information or data and the systems and processes used for those purposes. IA includes protection of the integrity, availability, authenticity, non-repudiation and confidentiality of user data. It uses phys- ical, technical and administrative controls to accomplish these tasks. While focused predominantly on information in digital form, the full range of IA encompasses not only digital but also analog or physical form” [6]. Cybersecurity As we come to cybersecurity term, there are many defini- tions in use, however we would present a couple of these: First, cybersecurity is “the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this” [2] Second, “Cybersecurity is the sum of efforts invested in addressing cyber risk, much of which was, until recently, considered so improbable that it hardly required our attention” [3]. Third, from International Telecommunication Union‘s(ITU) point, it is “The collec- tion of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s as- sets. Organization and user’s assets include connected comput- ing devices, personnel, infrastructure, applications, services, telecommunications systems, and the totality of transmitted and/or stored information in the cyber environment.”
  • 3. A NOVEL CONCEPT FOR CYBERSECURITY: INSTITUTIONAL CYBERSECURITY 3 Institutional Cybersecurity As a result of rapid changes in cyber environments, expan- sion of cloud computing, and residual use of mobile devices particularly in institutions, cybersecurity related terms should be re-handled with a broader line of sight. Therefore, in terms of institutional cybersecurity, a novel concept need has emerged. We suggested a new concept, Institutional Cyberse- curity, to symbolize and fit for all institution-level cyberse- curity issues. The Institutional Cybersecurity is the capability which consist of InfoSec components and cooperation with other cybersecurity partners and cybersecurity awareness from the cyber risk perspective. III. INFORMATION SECURITY APPROACH AND EVOLUTION OF CYBERSECURITY General Security Concept & Technological Developments Security concept contains components that are assets, risks, threat, vulnerabilities and countermeasures. Generally, security is a process of the selection and implementation of security controls (also called countermeasures) which help to reduce the risk posed via vulnerabilities [7]. The security process of information and elements that are related to information is evolving as the technology behind it. The motivations of this evolution are mainly changing assets and risks that have pose by the increase of dependency on Internet, the set of assets is growing every day as mentioned above. Unfortunately, variety of cyber risks is growing faster . Because of the highly interconnected nature of these assets, every vulnerability has impacts on the others that makes the evolution exponential. On the other hand, the change in security side is inherently behind this technological evolution. The new assets that are connected to the network and their vulnerabilities must be analyzed, or even in some cases they may get attacked by competitors to be understood what the real consequences could be. Then the solutions would be developed to address this emerged risks. However, conceptualization, developing strategies, and doctrines follow that. Information Security Approach Understanding Information Security approach and the evo- lution of cybersecurity requires analyzing the question that how/why the key concepts have emerged? The concepts that must taken into account in this case are ICT security, InfoSec, and cybersecurity. Fig. 2. Area of interest for Information and Cybersecurity [7] ICT security is the intersection area of InfoSec and cyber- security. ICT security covers information technology infras- tructure such as computers, computer networks, data centers as its assets. Furthermore, these assets could be extended in InfoSec to all sorts of information to be secured. By this definition, InfoSec covers not only the data in ICT but also the information which is not stored or transmitted via ICT2. Nev- ertheless, as stated above, cybersecurity conceptually covers both information and non-information based assets that have posed risks via ICT. The types of these assets include a wide variety of what that also covers critical national infrastructures, household appliances, and even also human. As a matter of fact, in cyberspace, the assets need to take consideration could be anyone or anything that is accessible via cyberspace. Briefly, InfoSec intends to secure whole IT infrastructures and processes. But, due to its enormous size, that may not possible to secure all cyberspace. Instead of this, cybersecurity focuses on eliminating vulnerabilities on IT assets. Evolution of Cybersecurity The concept of cybersecurity, first appeared with cyber breaches. And then, it has taken the name of cybersecurity when cyber breaches damaged government networks. By the expansion of cyberspace, the concept of InfoSec become inadequate to address multi-dimensional and complex cyber attacks. For instance, one of the advanced cyber espionage malware, Red October, targeted diplomatic and government institutions worldwide for at least five years which has been detected in January 2013 [8]. Another example is the Industrial Control Systems Computer Emergency Response Team (ICS- CERT) report of the US Department of Homeland Security [9] has shown that; In the first half of the fiscal year 2013, (October 1, 2012–May 2013), the highest percentage of in- cidents reported to ICS-CERT occurred in the energy sector at 53%. For another example, as stated by Verizon 2013 security report [Verizon], which reported 2012 alone consists of 47000 security incidents, show that the growth of recent data breaches alarm that the organizations to take new actions. These examples support the legitimacy of the new concepts such as National Cybersecurity, Individual and Corporational Information Security, Cyber Awareness (c-saw) and so forth. That is the current result of the ongoing evolution. The continuous national/international level InfoSec efforts or recommendation publications may not adequately address the risks of cyberspace. As the current situation, InfoSec efforts were limited to their InfoSec management systems which are developed in line with international standards such as ISO 27001, NIST-800 series and COBIT. The current versions of these international standards have failed to meet completely cybersecurity requirements. Many countries and international organizations have developed their cybersecu- rity strategies that mainly focus governance, cooperation and active defense. However, in institutional level, there is no international standard or guideline which consists cooperation, integration to national security and active defense to cope with cyber threats, such as APTs. Challenges and Dilemmas of Cybersecurity Due to the complex nature of cybersecurity, many chal- lenges and dilemmas have been emerged from both national
  • 4. A NOVEL CONCEPT FOR CYBERSECURITY: INSTITUTIONAL CYBERSECURITY 4 and institutional perspectives. For instance, in National Cyber- security Framework Manual, prepared by NATO Cooperative Cyber Defense Centre of Excellence (NATO CCD COE), dilemmas that nations face and have to deal with as establish- ing, maintaining and enforcing cybersecurity are stated(Table II) [10]. Similar to national level challenges, institutions also need to cope with some dilemmas (Table III) that may be filtered from national challenges or may be localized version of national ones. Due to widely diversed cyber attacks, mentioned in Table I, sustainable cybersecurity is no longer a solely responsibility of cybersecurity personnel. But, it is a common responsibility of all personnel, stakeholders and partners. For instance, an employee, without having enough cybersecurity knowledge and awareness or who underestimates cybersecurity regulations taken by the institution, may anytime cause deadly losses. Thus, this incident may result sometimes loss of reputation, economic assets, and so forth. [1] TABLE II MAIN DILEMMAS OF NATIONAL CYBERSECURITY M ain Dilemmas of National Cybersecurity [10] Stimulate the Economy vs. Improve National Security Infrastructure Modernization vs. Infrastructure Protection, Private Sector vs. Public Sector, Data Protection vs. Information Sharing Freedom of Expression vs. Political Stability cybersecurity challenge for both national and institutional level is lack of broader perception of cybersecurity. And to bring sectors and institutions to a level of security standard depends heavily on national perception of cybersecurity issues, that also makes that the challenge number one. For instance, some governments may choose to centralize the majority of decision-making mechanisms, while others may devolve this to a lower level according to a particular need (e.g., to build resilience and responsiveness into highly decentralized and mostly privately-owned critical infrastructure) [10] [17]. This decision would mainly effects the body of national cybersecu- rity issue. The cybersecurity burden on private sector may not desired however, even the government side of cybersecurity is tightened, it is just as easy for a terrorist organizations or other state-sponsored actors to take out a private-sector entity that will really impact the nation [18]. IV. AN EMERGING CONCEPT: INSTITUTIONAL CYBERSECURITY With emerging new cyber risks and more complex mal- wares, countries and international organizations like NATO, ENISA, etc. have been looking for new ways to fight against challenging issues [15], [19]. The essential step for countries is to form a national cybersecurity strategy. Generally, in that kind of strategies; the importance of policies, cybersecurity countermeasures and some action plans are taken into account at upper levels. Even though these strategies and policies TABLE III MAIN DILEMMAS OF INSTITUTIONAL CYBERSECURITY Main Dilemmas of Institutional Cybersecurity IT Security Cost vs. Institutional Cybersecurity Privacy vs. Information sharing [11] Homegrown human resource vs. Outsourcing [12] Open source vs. Licensed software [13] Cooperation vs. Loss of Reputation [14] Along with national and institutional dilemmas, institu- tional cybersecurtiy challenges must be analyzed to understand the constraints. These challenges could be listed as; lack of broader perception of cybersecurity, information sharing, legal issues (legal suspense), leadership, cost, human resource, expansion of cyberspace, infrastructure insufficiency, standards addressing the majority, building common cybersecurity pic- ture, lack of metrics of cybersecurity, lack of coordination and information sharing, security and usability issues, bureaucracy, insider threats, migration plan (unprotected systems to secure systems), technological backward compatibility and the list goes on [15]. Lack of broader perception of cybersecurity The challenges of cybersecurity can be diversified endem- ically to nations and institutions according to their line of sight to cybersecurity. For example, according to Dmitriy Ayrapetov, Director, Product Management, Dell SonicWALL; the jor cybersecurity challenges for businesses through 2013 will come from: increase in exploit kits, increase in mobile device cybersecurity threats and increase in sophistication of threats [16]. However it may vary across analyses of experts on cybersecurity field; from our perspective, the number one cover intensively military, intelligence and critical infrastruc- tures, the institution-level cybersecurity is ignored. In order to provide a robust national level cybersecurity, we belive that institution-level cybersecurity should be initial step to take forward. When we look at the whole cybersecurity organi- zation structure(Fig. 3), institution-level cybersecurity forms the body part of cybersecurity organization which contains the entities as individuals, public/private institutions, military, government, and international organizations. Since the body part has a critical role to interact with all other entities, it effects the success of upper level cybersecurity. Fig. 3. Cybersecurity Organization Structure While the weakest link in InfoSec is human being, in terms of national security the weakest link is the weakest institution having critical infrastructures or cyber risks. Unlike stated
  • 5. A NOVEL CONCEPT FOR CYBERSECURITY: INSTITUTIONAL CYBERSECURITY 5 in national cybersecurity strategies, in terms of institutional cybersecurity, not only institutions which manages critical infrastructure but also other companies having cyber risk should be taken into account to ensure a robust cybersecurity. For example, a software company, without having any critical infrastructure, could be a target for cyber attacks due to stolen software code or root driver(SIEMENS and STUXNET case) [20] Current attacks such as STUXNET case make the need of a new concept inevitable. To address this need, our pro- posed concept, Institutional Cybersecurity could be defined as; A comprehensive concept for ensuring robust and resilient institution-level cybersecurity by; -Providing cyber situational awareness, -Addressing emerging cyber risks, -Encourage inter and intra institutional cooperation and coordination, -Presenting a flexible framework for its applicability, for public/private institutions having critical infrastructures or having cyber risks for their business continuity. Components and Principles of Institutional Cybersecurity Our proposed concept provides a generic manner that every institution can adapt it for its own security needs to develop their institutional cybersecurity capability . To reach this goal, the main principles of Institutional Cybersecurity are presented as follows: 1-Cybersecurity approach must be holistic, 2-A flexible management style should be adopted, 3-Risk management-centered continuous improvement methods should be implemented, 4-In addition to coordination of public, private, academic, and non-governmental organization, international cooperation and information sharing should be bottom lines for security 5- Transparency, accountability, ethical values, freedom of speech must be endorsed, 6-Setting balance between security and applicability is im- portant. In the light of these principles, in order to have efficient institutional cybersecurity, Institutional Cybersecurity should have fundamental components as presented(Fig. 4). Fig. 4. Institutional Cybersecurity Components Policy, Strategy and Standards: Detailed cybersecurity policy, strategy and secure system management principles can help institutions to take the first step. Cyber Risk Management: Cyber risks can be minimized and managed by utilizing efficient risk management mechanism to unveil all threats and vulnerabilities. Vulnerability and Threat Management : According to advances in cyberspace, vulnerability and threat management could be handled under the cyber risk management. Vul- nerability management should be supported by periodical vulnerability analysis/tests and penetration tests. Central Incident Management: Efficient prevention, fast re- sponse and mitigation against to cyber attacks can be obtained by central incident management. And, active cooperation and collaboration to national cybersecurity can be achieved via the ability to central incident management including Institutional CIRT’s. Cybersecurity Awareness and Education: Human being is the weakest link in the security chain. Therefore, cybersecurity awareness and education programs must focus mainly human factor. Log Management and Correlation: Possible attacks and data leakage could be detected in advance and preventive actions can be performed by utilizing efficient log management and correlation. Secure Architecture: All institutional information technol- ogy infrastructures and architectures including business part- ners should be reviewed and questioned from the perspective of cybersecurity. Legal Issues: The legal regulations always stand as the most important factor to enforce and ensure cybersecurity. To prevent privacy violation and to set liability processes, proper legal regulations must be set. Otherwise, countermeasures for providing cybersecurity such as monitoring personal informa- tion may pose risks for institutions. Technical Tools: Similar to ICT security, proper software and hardware including firewalls, IPDS, anti-virus software, etc. must be used to provide comprehensive cybersecurity. Business Continuity: Business continuity plans must be har- monized with Institutional cybersecurity strategies and plans. Continuous Auditing and Monitoring: Auditing is a contin- uous process that contains audit tests or review procedures. Errors, policy violations, fraud, and misconducts should be audited in a timely manner to fill the control gaps and deficiencies. Monitoring is a mechanism that could be utilized to automate manual controls and processes or regular and frequent insights to avoid potential regulatory noncompliance, cyber attacks and malicious activities. Cooperation: Cooperation with other cybersecurity partners and CIRT’s are vital for institutions in order to set early warning mechanisms and effective resource sharing. Also, due to confronting asymetric and organized cyber threats, government coordination with institutions and particularly with private sectors is inevitable. Cyber Resilience: All efforts in the institutional cybersecu- rity management should be flexible enough to adapt to the dynamic developments in cyberspace. Cyber resilience can be defined in literature as “The ability of a nation, organization, or mission or business process to anticipate, withstand, recover from, and evolve to improve capabilities conditions, stresses, or attacks on the support- ing cyber resources it needs to function.” [21]. A Resilient Enterprise is able to withstand systematic discontinuities and adapt to new risk environments [22] or dynamically reinvent
  • 6. A NOVEL CONCEPT FOR CYBERSECURITY: INSTITUTIONAL CYBERSECURITY 6 business models and strategies as circumstances change [23]. According to [21] document a Resilince framework is able to include anticipate, withstand, recover and evolve steps. Reaching the goal of using all of these institutional secu- rity components efficiently requires achieving cybersecurity objectives in institutional level. Furthermore, main goal of Institutional cybersecurity is to cooperate these components into an integrated framework in a resilient perspective. While securing the whole system, availability and usability could be ignored unintentionally. In order to avoid this situation, resilient management model should be performed. In this perspective, our proposed institutional cybersecurity concept contains resilient solutions for challenges. Another point is to manage all these components as an integrated framework requires a leadership. Through the principles and components of proposed concept above, challenges and dilemmas for institutional cybersecurity can be resolved considerably. V. CONCLUSION AND FUTURE WORKS All institutions, regardless of being public or private, should definitely expect and envision emerging cyber threats. With the help of revitalized InfoSec processes to fit a holistic cy- bersecurity concept and a high level cybersecurity awareness, assessing and analyzing the potential and possible effects of complex and advanced threats will get less harder. As a result of this research, it can be expressed that unless cybersecurity for institutions are handled in a broader perception, professional manner and presented as an integrated solution, it will have a higher possibility to be exposured and damaged by a cyber attack at any moment. To date, many companies and institutions have had only IT departments. However, now, institutions having cyber risks should set up a cybersecurity or CIRTs. Hereby, the instituonal cybersecurity could be taken up in a more generic manner and encapsulates above-mentioned issues. With the establishment of an institutional cybersecurity organization; the exploitable points in the system can be corrected by performing vulnerability test, the abnormality can be detected in real-time by monitoring logs, the situational awareness can be improved by applying scenarios, the risk as- sessment can be carried out by establishing integrated systems and probably the cyber attacks can be prevented before they start. Due to their field-based and structural differences, each in- stitution can prepare and follow a different cybersecurity road map peculiar to itself. But, as a first step, the recommended concept can be evaluated as an inception guide for institutions willing to start building a new cybersecurity capability. In this study, we handled the cybersecurity issue from a new perspective for institutions and discussed in details. This new cybersecurity concept has also contributed and filled the con- ceptual absence of lower-governmental levels in cybersecurity organization structure. Institutional cybersecuriy will be an emerging fertile re- search area. There are many ways to extend this work in the future. For instance, we are planning to propose a new road map for institutions which is going to contain a transforming guideline to set forward a new concept in cybersecurity management processes. REFERENCES [1] H. Senturk, Z. C¸il, and S¸. Sag˘ırog˘lu, “Cyber security analysis of turkey,” International Journal of Information Security Science, vol. 1, no. 4, pp. 112–125, 2012. [2] (2013, Jun.) Oxford dictionaries. [Online]. Available: http://oxforddictionaries.com/ [3] M. Barzilay. (2013, May) A simple definition of cy- bersecurity. [Online]. Available: http://www.isaca.org/Knowledge- Center/Blog/Lists/Posts/Post.aspx?ID=296 [4] C. M., “Arm yourself for cyber war – are you next?” in Sibos Conference Panel 2012, 2012. [5] R. Kissel, Glossary of key information security terms. DIANE Publishing, 2011. [6] N. Seddigh, P. Pieda, A. Matrawy, B. Nandy, I. Lambadaris, and A. Hatfield, “Current trends and advances in information assurance metrics.” in PST, 2004, pp. 197–205. [7] R. von Solms and J. van Niekerk, “From information security to cyber security,” Computers & Security, 2013. [8] KasperskyLabratuaries. (2013, Jun.) Red october an ad- vanced cyber espionage campaign targeting diplomatic and government institutions worldwide. [Online]. Available: http://www.kaspersky.com/about/news/virus/2013/ [9] ICS-CERT. (2013, Jun.) Ics-cert monitor report between april-june 2013 of department of homeland security. [Online]. Available: http://icscert.uscert.gov/sites/default/files/IC§- CERT Monitor AprilJune2013 3.pdf [10] A. Klimburg, Ed., National cyber security framework manual. NATO CCD COE Publications, 2012. [11] B. Adelmann, “Cispa is big brother‘s friend,” 2012. [12] S. Alexander, “Rise of outsourcing poses new cybersecurity problems,” 2011. [13] B. Gourley, “Open source software and cyber defense,” 2009. [14] “Security task force: Public-private information sharing,” 2012. [15] NATO. (2013, Jun.) Nato web site. [Online]. Available: http://www.nato.int, June,2013 [16] Techrepublic. (2013, May) Cybersecurity challenges in 2013. [Online]. Available: http://www.techrepublic.com/blog/security/cybersecurity- challenges-in-2013/9038 [17] B. Karabacak and S. OZKAN, “Critical infrastructure protection status and action items of turkey,” 2009. [18] APCOForum.com. (2013, Jun.) The cyber security challenge: The risk of inaction. [Online]. Available: www.apcoforum.com [19] ENISA. (2013, May) European network and information security agency glossary. [Online]. Available: www.enisa.europa.eu/act/res/files/glossary [20] A. Matrosov, E. Rodionov, D. Harley, and J. Malcho, “Stuxnet under the microscope,” ESET LLC (September 2010), 2010. [21] R. A. Caralli, J. H. Allen, and D. W. White, CERT Resilience Manage- ment Model (CERT-RMM): A Maturity Model for Managing Operational Resilience. Addison-Wesley Professional, 2010. [22] R. Starr, J. Newfrock, and M. Delurey, “Enterprise resilience: managing risk in the networked economy,” Strategy and Business, pp. 70–79, 2003. [23] L. Va¨likangas and G. Hamel, “The quest for resilience,” 2009. I˙brahim S¸is¸aneci is currently a PhD candidate in Comp.Eng.Dept., Gebze Institute of Technology(GIT). He received M.S. degree in Comp.Eng.Dept., GIT and BS degree in Comp.Eng.Dept. from Marmara University. His research interest are HCI, usability, InfoSec, Cybersecurity, data mining. Osman Akın is currently a PhD student in Comp.Eng.Dept., Hacettepe University. His research interest are cybersecurity, web based software, web based software security and computer vision. Muhammer Karaman received his BS degree in Turkish Army Academy in 2005. His research interests are cyber war, cyber electronic war, cybersecurity. Mehmet Sag˘lam received BS degree in Industrial Engineering from Turkish Naval Academy in 2009. He is currently a M.S. degree student in Department of Comp.Science, VirginiaTech. His research interests are Critical Infrastructure Protection and Cyber Warfare. In particular, his current research focuses on Power Grid Cyber Security.