SİBER GÜVENLİKTE ÖNEMLİ NOKTALARIN İNCELENMESİ: HAVAALANLARINDA TERÖR SALDIRILARININ ÖNLENMESİ

Havaalanları elektromanyetik ve dijital bilgi açısından en gelişmiş yapılardan biridir. Etkin ve zamanında operasyonun sürdürülebilmesi için ilgili havacılık operasyon birimlerindeki yüksek miktardaki bilginin birbirlerine bağlanması gerekmektedir. Dolayısıyla, iletişim ağı hem makul, hem de iyi korunmuş olmalıdır. Havaalanları milyonlarca sistemle donatılmış olduğundan, sistemin ana noktalarını bulmak ve en iyi güvenlik hizmeti seviyesini geri yüklemek için inceleyecek doğru bileşeni seçmek esastır. Bu uygulamanın sonunda, havaalanının kritik noktalardaki olası hata türleri incelenecek ve tanımlanacaktır. Dolayısıyla, herhangi bir siber eylemin olması durumunda, kullanıcılara proaktif destek sistemi bilgisi verilecektir. Ayrıca, kullanıcılar bir siber saldırıdan kaynaklanabilecek muhtemel zararları önlemek veya en aza indirmek için nasıl tepki vereceği konusunda eğitilecektir. Makalenin ilk bölümünde, siber yapı ve muhtemel tehditler kuramsal olarak incelenmiştir. İkinci bölümde hükümet politikasıyla ilgili siber güvenlik şartları ve birimler belirlenmiştir. Çalışmanın son bölümünde havaalanı sistemlerine karşı olası siber saldırıların sınıflandırılmasında gizlilik, bütünlük ve erişilebilirlik ölçeği ile ele alınmış ve değerlendirilmiştir. Bu çalışmada, hata tipini ve seviyesini analiz etmek için FMEA (Hata Türleri ve Etkileri Analizi) yöntemi uygulanmıştır. Bu yöntem, hata belirleme ve önleme için en güçlü sayısal tekniklerden biridir ve yüksek riskli bileşenlerin güvenilir faktörlere dönüştürülmesini sağlar. Elde edilen sonuçları analiz ederek Atatürk Havalimanı'nda ölçeklendirme ve önemli proaktif eylemler için kullanılması planlanan bir sistem belirlenmiş ve sistemin iyileştirilmesi amacıyla bazı öneriler yapılmıştır.

INVESTIGATING CRITICAL POINTS OF CYBER SECURITY: PREVENTION TERROR ATTACKS IN AIRPORTS

Purpose: Research carried out within the scope of the airport cyber security. Changing life, technology and society conditions are leading to a shift in security perspective. While the number of electronic-based systems and virtual platforms that people and businesses use has increased, security needs and threats have changed accordingly. Design/Methodology/Approach: In this study, the failure type and level of its effect FMEA (Failure Mode Effect Analysis) method is used to analyze and investigate on critical points of airports cyber security. This method is one of the strongest numerical technique which prevent failures before they even exist and identify how to convert high risk components into reliable factors. In the scope of this research, firstly literature search related to cyber security has been done. In the second part of the study, measures taken by the state on cyber threats in public areas such as airports are explained. In the last part, a FEMA scale was developed which consisting three airport-relating steps. In the first dimension of the scale, the systems in the airports were analyzed with the help of literature research. A list of weak systems against cyber threats has been tried to be created. However, due to the unique nature of each airport, a questionnaire form was developed for each employee. The developed questionnaire forms the first dimension of the scale. The second dimension of the scale consists of face-to-face interviews. Faceto-face interviews determine the order of importance of airport systems. In the third dimension of the scale, Likelihood of Occurrence, Discoverability, Severity Scale and Confidentiality, Integrity, Accessibility Scale are assigned to the airport to determine the effect of probable cyberattacks on the airport. It is planned that the scale developed in the survey will be applied at airports. Findings/Results/Discussion: Airport systems and their threat level in terms of cyber security is identified with the framework of ISO 27001. Concept of cyber security is explained and the important information assets in terms of cyber threats in Airport Systems are defined. End of the research decision tree diagram which shows the steps of discoverability, the severity scale has been formed. People have felt the need to take measures against the elements that threaten them for years. Security is one of the most basic needs of an individual or an enterprise. Therefore, security is in the class of necessities. Changing life, technology and society conditions are leading to a shift in security perspective. While the number of electronic-based systems and virtual platforms that people and businesses use has increased, security needs and threats have changed accordingly. In general, it is necessary to determine the systems used in an airport. These systems vary depending on the size and structure of the airport. At least one unit manager should be contacted from all the units in the organization chart of the airport. Airport inventory should be overlooked. If airport systems are exposed to cyber terrorism, to determine the critical points of airport systems, possible effects should be taken orally and the systems should be ranked according to their importance. In the event of a possible cyber-attack on airport systems, the confidentiality of the information may be violated. Systems should be questioned for privacy reasons. However, in terms of integrity (unauthorized modification / incorrect replacement) each system should be evaluated. Airport critical systems should be questioned in terms of accessibility / availability. Research Limitations/Implications: Airports make hosting more than one systems. For this reason, there are many systems used in airports. The scope of the research is limited only to the systems under control of the airports. The systems used by other airport operators are not included in the survey. For example, the systems that ground services using have been ignored. Practical Implications: A FEMA scale was developed which consisting three airport-relating steps. It is planned that the scale developed in the survey will be applied at airports. A warning has been received that the sharing of this application by many airports would constitute a significant security breach when scales were sent to airports. With analyzing the obtained results, a system, which is aimed to be used in Atatürk Airport for scaling and taking considerable proactive actions, have been identified. On the purpose of improvement of system some recommendations have been made. Social Implications: Airports are one of the important substructures of aviation millions of the people use airport system to transportation. With the developed system airports companies can investigate on cyber security of the airport systems Originality/Value: The airports are under the threat of terrorist organizations for economic, socio-cultural and political reasons. Physical security threats have begun to evolve into threats in the virtual platform due to changing ways of doing business. It is thought that with this research, airports including current social, economic and cultural dynamics of the countries, make significant contribution to academic literature and will also include security analysis by presenting findings.

___

  • Ateş, S. S., & Üzülmez, M. (2016a). Airport Slot Coordination System: An Implementation at Ataturk Airport. Global Business Research Congress (Gbrc), 99-104, İstanbul: Pressacademia Procedia.
  • Ateş, S., & Üzülmez, M. (2016b). System Analysis of Airport Capacity and Slot Coordination at Ataturk Airport. Research Journal of Business and Management, 3(3), 248-249.
  • Aydın, F. (2012). Cyber Security in National Protection of Turkey. Çankaya Üniversitesi Fen Bilimleri Enstitüsü Yayımlanmamış Yüksek Lisans Tezi, Ankara.
  • Bilgi Teknolojileri ve İletişim Kurumu (2017). USOM ve Kurumsal SOME'ler. Retrieved from btk.gov.tr: https://www.btk.gov.tr/tr-tr/sayfalar/Sg-usom-ve-kurumsal-some, Accessed 12.10.2017.
  • Center, M. S. (2016). Microsoft Safety & Security Center. Retrieved from Microsoft Corporation: http://www.microsoft.com/Security/Pc-Security/Botnet.aspx, Accessed 26.10.2016.
  • Cesare, S., & Xiang, Y. (2010). Classification of Malware Using Structured Control Flow. Australasian Symposium on Parallel and Distributed Computing (pp.1-2). Brisbane, Australia: Central Queensland University.
  • Computerhope.com. (2016). Computerhope. Retrieved from Computerhope.com: http://www.computerhope.com/Jargon/H/Hacker.htm, Accessed 12.10.2016.
  • Çeliktaş, B. (2016). Siber Güvenlik Kavramının Gelişimi ve Türkiye Özelinde Bir Değerlendirme. Karadeniz Teknik Üniversitesi Sosyal Bilimler Üniversitesi Yayımlanmamış Yüksek Lisans Tezi, Trabzon.
  • Dijitalx.com. (2017). Siber Olaylarla Mücadele Ekibi Nasıl Eğitiliyor. Retrieved From dijitalx.com: http://www.dijitalx.com/2015/05/14/siber-olaylara-mudahale-ekipleri-nasil-egitiliyor/, Accessed 10.10.2017.
  • Doğantimur, F. (2009). ISO 27001 Standardı Çerçevesinde Kurumsal Bilgi Güvenliği. Ankara: T.C. Maliye Bakanlığı Strateji Geliştirme Başkanlığı.
  • E Byres, J. L. (2004). The Myths and Facts Behind Cyber Security Risks for Industrial Control Systems. Proceedings of the VDE Congress (pp. 5-6). Burnaby, Bc, Canada: British Columbia Institute of Technology.
  • Gandotra, E., Bansal, D., & Sofat, S. (2014). Malware Analysis and Classification: A Survey. Journal of Information Security, pp.56-64.
  • Gocen, U. (2015). Aladin Airports Landside and Air-Land Side Attacks' Detection and Prevention /Full Project Proposal. Eskişehir: Itea 3.
  • Gramatica, M. D., Fabio Massacci (Member, I., Shim, W., Tedeschi, A., & Williams, J. (2015). It Interdependence and the Economic Fairness of Cyber-Security Regulations for Civil Aviation. United Kingdom: Durham Research Online.
  • Haberleşme Genel Müdürlüğü (2014). Sektörel Some Kurulum ve Yönetim. Ankara: T.C. Ulaştırma Denizcilik ve Haberleşme Bakanlığı.
  • Havacılık Güvenliği Daire Başkanlığı (2016). Genelge Hgd - 2015/1. Konu : Kurumsal Siber Olaylara Müdahale Merkezi. Ankara: Sivil Havacılık Genel Müdürlüğü.
  • Herdem, A. Ş. (2017). Siber Saldırılar Havacılığı Tehdit Ediyor. Retrieved From Airporthaber: http://www.airporthaber.com/havacilik-haberleri/siber-saldirilar-havaciligi-tehditediyor.html, Accessed 07.09.2017.
  • Islam, R., Tian, R., Batten, L., & Versteeg, S. (2010). Classification of Malware Based on String and Function Feature Selection. Second Cybercrime and Trustworthy Computing Workshop (pp. 9-11). Melbourne: Deakin University.
  • Jinsoo Shin, H. S. (2016). Cyber Security Risk Evaluation of A Nuclear I&C System Using Bayesian Networks and Event Trees. Gyeonggi-Do, Republic of Korea: Kyung Hee University.
  • Koç, F. (2008). BGYS-Varlık Envanteri Oluşturma ve Sınıflandırma Kılavuzu. Kocaeli: Ulusal Elektronik ve Kriptoloji Araştırma Enstitüsü.
  • Lee H.L., Liu Y.T., Chen, S.C., Tang, S.K., Huang, C.P., Huang, C.H., Chang, Y.L. Chang, K.W. & Chen, K.Y. (2002). A Comparative Study of Protocol Analysis for Spatiality of A TextBased Cyberspace pp. 262-266, Hsinchu,Taiwan: Graduate Institute of Architecture, National Chiao Tung University
  • Lord, N. (2012). Common Malware Types: Cybersecurity 101. Retrieved from Veracode: https://www.veracode.com/Blog/2012/10/Common-Malware-Types-Cybersecurity-101, Accessed 15.10.2017.
  • Ulusal Siber Olaylarla Müdahale Merkezi (2017). USOM Hakkında. Retrieved from usom.gov.tr: https://www.usom.gov.tr/Hakkimizda.html
  • Miller, S., Wagner, C., Aickelin, U., & Garibaldi, J. M. (2016). Modelling Cyber-Security Experts' Decision Making Processes Using Aggregation Operators. Computer & Security, 62, 229- 232.
  • Normatürk. (2017). Siber Olaylara Müdahale Ekibi (SOME). Retrieved from Normatürk: http://normaturk.com/some/, Accessed 14.09.2017.
  • Oxforddictionaries (2016). Retrieved from Oxforddictionaries: https://en.oxforddictionaries.com/definition/Us/Cyberspace, Accessed 11.11.2017.
  • Park, Y., Reeves, D., Mulukutla, V., & Sundaravel, B. (2010). Fast Malware Classification by Automated Behavioral Graph Matching. Raleigh, Nc: Department o Computer Science Department.
  • SHGM (Sivil Havacılık Genel Müdürlüğü) (2014). Kurumsal Some Kurulum ve Yönetim Rehberi. Ankara: T.C. Ulaştırma Denizcilik ve Haberleşme Bakanlığı.
  • Taş, Y., & Koç, K. H. (2017). Hata Türü ve Etkileri Analizi (FMEA) Tekniğinin Mobilya Endüstrisine Yönelik Uygulaması. Retrieved from aydin.edu.tr: http://iaud.aydin.edu.tr/makaleler/yil2sayi5/iaud_yil_2_sayi_5_makale_9.pdf, Accessed 09.10.2017.
  • TechTarget (2016). Retrieved from Techtarget: http://searchsoa.techtarget.com/definition/cyberspace, Accessed 12.09.2017.
  • Tosun, A. (2016). A Survey about the Integration of Social Engineering Attacks with Cyber Security Exploiting Turkish Vulnerabilities in Turkey. Middle East Technical University The Department of Information Systems Master Degree' Thesis, Ankara.
  • Ulusal Siber Olaylara Müdahale Merkezi (2017). Retrieved from Wikipedi: https://tr.wikipedia.org/wiki/ulusal_siber_olaylara_m%c3%bcdahale_merkezi, Accessed 10.09.2017.
  • Wert, M. (2016). Study.com. Retrieved from study.com: http://study.com/academy/lesson/cyberthreats-definition-types.html, Accessed 18.10.2017.
  • Willson, D. (2016). Chapter 3 - Who are the Hackers? Cyber Security Awareness for Ceos and Management, 25-29.
  • Yagoda, B. (2014). A Short History of "Hack". Retrieved from The New Yorker: http://www.newyorker.com/tech/elements/a-short-history-of-hack, Accessed 09.09.2017.
Turkish Studies (Elektronik)-Cover
  • ISSN: 1308-2140
  • Yayın Aralığı: Yılda 4 Sayı
  • Başlangıç: 2006
  • Yayıncı: Mehmet Dursun Erdem