Sayfa 45KAYNAKLAR
AHMETOGLU Huseyin/DAS Resul. “A Comprehensive Review on Detection of Cyber-Attacks: Data Sets, Methods, Challenges, and Future Research Directions.” Internet of Things 20 (November 1, 2022): 100615.
AL NAFEA Roaa/ALMAIAH Mohammed Amin. “Cyber Security Threats in Cloud: Literature Review,” in 2021 International Conference on Information Technology (ICIT), 2021, 779–786.
ANDERSON Ross/BÖHME Rainer/CLAYTON Richard/MOORE Tyler. “The Economics of Cybersecurity.” In Handbook on the Economics of the Internet, 11–40, 2016. https://hadiasghari.com/mirror/asghari16_econsec.pdf.
ANDERSON Ross. Security Engineering: A Guide to Building Dependable Distributed Systems. 3rd ed. Wiley, 2021.
ANDERSON Ross/BARTON Chris/BÖHME Rainer/CLAYTON Richard/VAN EETEN Michel J. G./LEVI Michael/MOORE Tyler/SAVAGE Stefan. “Measuring the Cost of Cybercrime.” In The Economics of Information Security and Privacy, edited by Rainer Böhme, 265–300. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013.
CHERDANTSEVA Yulia/HILTON Jeremy. “A Reference Model of Information Assurance & Security.” In 2013 International Conference on Availability, Reliability and Security, 546–555, 2013.
CICHONSKI Paul/MILLAR Thomas/GRANCE Tim/SCARFONE Karen. “Computer Security Incident Handling Guide.” National Institute of Standards and Technology, August 6, 2012.
CLARKE Richard A./KNAKE Robert. Cyber War: The Next Threat to National Security and What to Do About It. Reprint edition. New York: Ecco, 2011.
DELOITTE. “Responding to Cyber Threats in the New Reality: A Shift in Paradigm Is Vital,” 2015. https://www2.deloitte.com/content/dam/Deloitte/sg/Documents/risk/sea-risk-cyber-thought-leadership-noexp.pdf.
ELYAS Mohamed/MAYNARD Sean B./AHMAD Atif/LONIE Andrew. “Towards A Systemic Framework for Digital Forensic Readiness.” Journal of Computer Information Systems 54, no. 3 (March 1, 2014): 97–105.
ENISA. “Cyber Security Culture in Organisations.” Report/Study. Cyber Security Culture in organisations, 2018. https://www.enisa.europa.eu/publications/cyber-security-culture-in-organisations.
Sayfa 46
FADIA Ankit/NAYFEH Mahir/NOBLE John. “The Role of Government Cybersecurity Efforts in Combating Risks” McKinsey, September 16, 2020. https://www.mckinsey.com/industries/public-sector/our-insights/follow-the-leaders-how-governments-can-combat-intensifying-cybersecurity-risks.
FARAHMAND Fariborz/NAVATHE Shamkant B./SHARP Gunter P./ENSLOW Philip H. “A Management Perspective on Risk of Security Threats to Information Systems.” Information Technology and Management 6, no. 2 (April 1, 2005): 203–225.
FICHTNER Elizabeth. “Cybersecurity 101: Intro to the Top 10 Common Types of Cybersecurity Attacks,” January 31, 2022. https://www.datto.com/au/blog/cybersecurity-101-intro-to-the-top-10-common-types-of-cybersecurity-attacks?utm_medium=opengraph&utm_source=225.
GAIDOSCH, Tamas/ADELMANN Frank/MOROZOVA Anastasiia/WILSON Christopher. “Cybersecurity Risk Supervision.” Departmental Papers / Policy Papers 19, no. 15 (September 24, 2019).
GÜMÜŞBAŞ Dilara/YILDIRIM Tülay/GENOVESE Angelo/SCOTTI Fabio. “A Comprehensive Survey of Databases and Deep Learning Methods for Cybersecurity and Intrusion Detection Systems.” IEEE Systems Journal 15, no. 2 (June 2021): 1717–1731.
HADNAGY Christopher. Social Engineering: The Science of Human Hacking. 2nd edition. Newark: Wiley, 2018.
ISO. “UNE EN ISO/IEC 27002:2017 Information Technology - Security Techniques - Code of Practice for Information Security Controls (ISO/IEC 27002:2013 Including Cor 1:2014 and Cor 2:2015),” 2017. https://www.en-standard.eu/une-en-iso-iec-27002-2017-information-technology-security-techniques-code-of-practice-for-information-security-controls-iso-iec-27002-2013-including-cor-1-2014-and-cor-2-2015/.
KSHETRI Nir. “Can Blockchain Strengthen the Internet of Things?” IT Professional 19, no. 4 (2017): 68–72.
LI Yuchong/LIU Qinghui. “A Comprehensive Review Study of Cyber-Attacks and Cyber Security; Emerging Trends and Recent Developments.” Energy Reports 7 (November 1, 2021): 8176–86.
Sayfa 47
LOKESH Vikas/JAYARAMAN Srivathsan/GURUPRASAD H.S. “A Survey on Network Security and Cryptography,” 2014. https://www.semanticscholar.org/paper/A-Survey-On-Network-Security-And-Cryptography-Lokesh-Jayaraman/27a6767c2e72cc5326dd76dae1f41da8859fb3b4.
LOONAM John/ZWIEGELAAR Jeremy/KUMAR Vikas/BOOTH Charles. “Cyber-Resiliency for Digital Enterprises: A Strategic Leadership Perspective.” IEEE Transactions on Engineering Management 69, no. 6 (December 2022): 3757–3770.
MAPLE, Carsten. “Security and Privacy in the Internet of Things.” Journal of Cyber Policy 2 (May 4, 2017): 155–184.