You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Interview<br />
Cyber attack threat<br />
Pointing out that the vacancy for quality personnel in cyber security was 59%,<br />
Tuna Taktak, Turkey Senior Advisor of Arbor Networks said that the human<br />
factor in safety talents had been continuing. The report highlights that the<br />
number of companies suffering commitment problems of personnel to service<br />
contracts had jumped and the number of attendees from 14% up to 59%. We<br />
asked questions to Tuna Taktak about the details of cyber safety.<br />
attackers can stay in the network<br />
for 200 days without anyone noticing.<br />
When attackers are in the internal<br />
network, they increase their<br />
access and steal the company’s<br />
confidential information. These<br />
types of attackers create impact<br />
by executing patient and informed<br />
attacks.<br />
Could you give us information<br />
about the types of cyber attacks<br />
and their definitions? What is the<br />
reason for the increase in cyber<br />
attacks in the world?<br />
Nowadays, there are two important<br />
types of cyber attack that are most<br />
common. The first is the most<br />
common type, DDoS attacks. The<br />
purpose of this type of attack is to<br />
make websites, applications, and<br />
all online services inaccessible.<br />
These attacks are constantly evolving,<br />
threatening the accessibility of<br />
websites and cloud services. These<br />
attacks also create a big impact<br />
because if a website collapses<br />
or is inaccessible, this problem<br />
is quickly discovered and news<br />
spread. This affects the reputation<br />
of the organization, and their opponents<br />
can use these disadvantages<br />
against them. The other types of<br />
attack are advanced attacks. These<br />
attacks target any organization,<br />
institution or company. As much<br />
information as possible about the<br />
target is gathered and security<br />
systems of the target are examined.<br />
The goal is to get inside the<br />
company’s internal network and<br />
stay there undetected and collect<br />
information from within. Researches<br />
show that in this type of attack,<br />
What are the vulnerabilities<br />
of Turkey in the field of cyber<br />
security?<br />
Cyber security issues in Turkey are<br />
the same with everywhere in the<br />
world. There are various security<br />
levels in the standard security<br />
model. This model was effective<br />
before cloud computing emerged<br />
because companies did not open<br />
any information to outside, so<br />
the protection policies were well<br />
determined and very rigid. But with<br />
cloud computing, companies need<br />
to share information with other<br />
organizations and to make company<br />
information accessible via the<br />
Internet. For example; they share<br />
sales software, CRM information,<br />
HR information or they outsource<br />
some parts of the company. For<br />
this reason, your safety is at most<br />
the safety of your weakest point.<br />
This provides more points for attackers<br />
to exploit.<br />
From which countries more<br />
attacks come to Turkey?<br />
Nowadays, cyber attacks are<br />
42<br />
Eylül <strong>2018</strong>