Friday, October 15, 2021

Turkey launches a 3-year Cybersecurity Strategy and action plan

Must Read

Finnish parliament says some lawmakers’ Mails hacked

Parliament stated it had been co-operating together with the NBI from the investigation into the assault. "The cyberattack on...

Americold hit by cyberattack services are downed

US cold storage company Americold has been struck by what seems to be a ransomware attack impacting business operations.The...

Firefox, Chrome, Edge Bugs Allows Remote System Hijacking

Major browsers get an upgrade to fix individual bugs which allow for remote attacks, which could potentially allow hackers...

The Notice about the national cybersecurity plan and action plan was published on Tuesday together with the Signature of President Recep Tayyip Erdoğan and underlined that communications and information technologies play crucial roles in states’ sustainable growth, while they could also pose risks associated with cybersecurity.

It said that cyber dangers may negatively influence all industries such as communications, transportation, banking, energy, finance, and health and that, consequently, in the face of increasing risks, measures were accelerated.

In this scope, the Transportation and Infrastructure Ministry has prepared an action plan to cover the decades 2020-2023 in communicating with the private and public businesses in addition to non-governmental organizations (NGOs) and universities.

“Information and communications technology which is becoming an integral part of our life by getting more widespread and growing by the day provide us many chances whereas they also bring together cybersecurity dangers,” Erdoğan was quoted as stating from the action plan published by the ministry.

“As in several different areas, we’ll carry our nation further in the global level in the area of cybersecurity as a portion of our 2023 targets,” he explained.

The main goals of the action plan are to protect the cybersecurity of critical infrastructure 24/7, to develop national technological tools for operational needs, and to enhance the competencies of teams fighting cyber threats.

The plan also envisages increasing awareness of cybersecurity and to invest in human capital interested in the fields.

The USOM, a subsidiary of this state-run Information Technologies and Communications Authority (BTK), was known as an outpost for the nation’s defense against cyberattacks.

With 150 specialists on board, the center works with teams in public agencies, businesses, and private businesses against the strikes. It pops into locally created applications like Avcı, Azad, and Kasırga to stave off dangers.

The USOM cooperates with net service providers and telecom operators, particularly against denial-of-service strikes.

The center is part of a community setup from the BTK that additionally comprises a data center and also an academy to train cybersecurity specialists. The center may also employ police and gendarmerie officers to set simple coordination between various branches of law enforcement.

By the minister’s written statement, the Avcı program developed from the BTK enables the control and command center to track risks and systems that could be influenced by harmful applications.

Azad, on the flip hand, detects servant computers via artificial intelligence and Kasırga supervises available tools online.

He added that the International Cybersecurity Index’s (GCI) 2019 report said that Turkey about the preceding year jumped 23 rows and turned into among the planet’s 20 most secure countries in this subject.

a2434345d63481a40f0d145881b41013?s=96&d=mm&r=g
Priyanshu Vijayvargiya
Founder and Editor-in-Chief of 'Virtualattacks Inc' Priyanshu Vijayvargiya is a cybersecurity analyst, Information Security professional, developer, and a white hat hacker.

Leave a reply

Please enter your comment!
Please enter your name here

Latest News

Unified endpoint management automation software to boost endpoint security

Endpoints are constantly connected to the internet, so they offer a gateway for cyberattacks. Endpoint security is simply the process...

Attackers Using Morse Code in phishing campaign to Evade Detection

Microsoft on Thursday revealed the techniques used by attackers to avoid detection using morse code in the phishing campaign.Microsoft also revealed the workings of...

Murata Manufacturing suffers data breach of employees and customer

Japanese electronic components manufacturer Murata has released an apology Notice for the data breach of thousands of files in June that contained bank account...

Everything about Signalling System 7(SS7)

Signaling System 7 (SS7) is an international telecommunication protocol standard that controls and regulates the network elements in a public switched telephone network (PSTN)....

Zimbra flaw lets attackers access the mail servers

Researchers discovered a flaw in the open-source Zimbra code. As a result, an attacker would gain unrestricted access to all sent and received emails...

More Articles Like This