21.09.2018 Views

Medikal Teknik September 2018

Medikal Teknik September 2018

Medikal Teknik September 2018

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Interview<br />

Cyber attack threat<br />

Pointing out that the vacancy for quality personnel in cyber security was 59%,<br />

Tuna Taktak, Turkey Senior Advisor of Arbor Networks said that the human<br />

factor in safety talents had been continuing. The report highlights that the<br />

number of companies suffering commitment problems of personnel to service<br />

contracts had jumped and the number of attendees from 14% up to 59%. We<br />

asked questions to Tuna Taktak about the details of cyber safety.<br />

attackers can stay in the network<br />

for 200 days without anyone noticing.<br />

When attackers are in the internal<br />

network, they increase their<br />

access and steal the company’s<br />

confidential information. These<br />

types of attackers create impact<br />

by executing patient and informed<br />

attacks.<br />

Could you give us information<br />

about the types of cyber attacks<br />

and their definitions? What is the<br />

reason for the increase in cyber<br />

attacks in the world?<br />

Nowadays, there are two important<br />

types of cyber attack that are most<br />

common. The first is the most<br />

common type, DDoS attacks. The<br />

purpose of this type of attack is to<br />

make websites, applications, and<br />

all online services inaccessible.<br />

These attacks are constantly evolving,<br />

threatening the accessibility of<br />

websites and cloud services. These<br />

attacks also create a big impact<br />

because if a website collapses<br />

or is inaccessible, this problem<br />

is quickly discovered and news<br />

spread. This affects the reputation<br />

of the organization, and their opponents<br />

can use these disadvantages<br />

against them. The other types of<br />

attack are advanced attacks. These<br />

attacks target any organization,<br />

institution or company. As much<br />

information as possible about the<br />

target is gathered and security<br />

systems of the target are examined.<br />

The goal is to get inside the<br />

company’s internal network and<br />

stay there undetected and collect<br />

information from within. Researches<br />

show that in this type of attack,<br />

What are the vulnerabilities<br />

of Turkey in the field of cyber<br />

security?<br />

Cyber security issues in Turkey are<br />

the same with everywhere in the<br />

world. There are various security<br />

levels in the standard security<br />

model. This model was effective<br />

before cloud computing emerged<br />

because companies did not open<br />

any information to outside, so<br />

the protection policies were well<br />

determined and very rigid. But with<br />

cloud computing, companies need<br />

to share information with other<br />

organizations and to make company<br />

information accessible via the<br />

Internet. For example; they share<br />

sales software, CRM information,<br />

HR information or they outsource<br />

some parts of the company. For<br />

this reason, your safety is at most<br />

the safety of your weakest point.<br />

This provides more points for attackers<br />

to exploit.<br />

From which countries more<br />

attacks come to Turkey?<br />

Nowadays, cyber attacks are<br />

42<br />

Eylül <strong>2018</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!