IAD Index of Academic Documents
  • Home Page
  • About
    • About Izmir Academy Association
    • About IAD Index
    • IAD Team
    • IAD Logos and Links
    • Policies
    • Contact
  • Submit A Journal
  • Submit A Conference
  • Submit Paper/Book
    • Submit a Preprint
    • Submit a Book
  • Contact
  • International Journal of Information Security Science
  • Volume:5 Issue:1
  • Institutional Cybersecurity from Military Perspective

Institutional Cybersecurity from Military Perspective

Authors : Muhammer KARAMAN, Hayrettin ÇATALKAYA, Celil AYBAR
Pages : 1-7
View : 25 | Download : 9
Publication Date : 2016-03-01
Article Type : Research Paper
Abstract :In the time we are living in, the nonlinear increase, usage and reliability on information communication technologies ICT are going to move forward. In this digital environment, people, institutions and government take necessary precautions ranging from personal to strategic level and adapt themselves to live or operate in that new form of environment. When we consider a country` cybersecurity efforts as a whole, it starts with individuals at the bottom, institutions, firms and military organizations at middle and government at the top. Ensuring a robust cybersecurity policy in a country, requires all levels individual, institution, government to be at the same standard. While the government level cybersecurity strategy documents generally present a comprehensive approach, the institutional level cybersecurity roadmaps, action plans are generally not present or overlooked. Being one of the main elements of a country, military organizations should be prepared to operate in this new form of operational environment that is full of malwares, advance persistent threats APT and cyber espionage software. In this study, institutional cybersecurity from the military perspective is analysed in the light of possible challenges, organizational structure, the military decision making process MDMP and cybersecurity workforce.
Keywords : Institutional Cybersecurity, military organizations, MDMP, cyber operations, cybersecurity workforce

ORIGINAL ARTICLE URL

* There may have been changes in the journal, article,conference, book, preprint etc. informations. Therefore, it would be appropriate to follow the information on the official page of the source. The information here is shared for informational purposes. IAD is not responsible for incorrect or missing information.


Index of Academic Documents
İzmir Academy Association
CopyRight © 2023-2026