Ek Kaynak/Ek Okuma
Alenezi, M. N., Alabdulrazzaq, H., & Mohammad, N. Q. (2020). Symmetric encryption algorithms: Review and evaluation study. International Journal of Communication Networks and Information Security, 12(2), 256–272.
Diakun-Thibault, N. (2014). Defining Cybersecurity. Technology Innovation Management Review, 2014.
Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., & Mahmood, S. (2020). Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study. Arabian Journal for Science and Engineering, 45. https://doi.org/10.1007/s13369-019-04319-2
Jang-Jaccard, J., & Nepal, S. (2014). A survey of emerging threats in cybersecurity. Journal of Computer and System Sciences, 80(5), 973–993. https://doi.org/https://doi.org/10.1016/j.jcss.2014.02.005
Joe Dibley. (2022). What are NIST Password Guidelines? Netwrix.
Li, Y., & Liu, Q. (2021). A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments. Energy Reports, 7, 8176–8186. https://doi.org/https://doi.org/10.1016/j.egyr.2021.08.126
Mustafa Hakan, S., & Seval, K. S. (2019). İşletmelerde Siber Risklerin Analizinde, Haritalanmasında Ve Değerlendirilmesinde İç Denetimin Rolü. Journal, 19(57), 1–18.
OWASP. (2023). OWASP Top 10 API Security Risks – 2023. Https://Owasp.Org/API-Security/Editions/2023/En/0x11-T10/.
Yıldırım, H. M. (2014). Bilgi güvenliği ve kriptoloji. Uluslararas Adli Bilişim Sempozyum. Ankara.
Yong-Xia, Z., & Ge, Z. (2010). MD5 research. 2010 Second International Conference on Multimedia and Information Technology, 2, 271–273.
OKUMA LİSTESİ
· Tunca, S. (2019). Modern Çağda Siber Güvenlik Kavramı . Dumlupınar Üniversitesi İİBF Dergisi , (3-4) , 1-7 .
· https://dsy.usom.gov.tr/usom/19/02/190211082958_siber_guvenlige_giris_ve_temel_kavramlar.pdf
· Aydın, H. (2022). Yönetim Bilgi Sistemlerinde (YBS) Siber Güvenliğin Önemi . Bilgisayar Bilimleri ve Teknolojileri Dergisi, 3 (2) , 38-45 . DOI: 10.54047/bibted.1138252
· https://www.kaspersky.com.tr/resource-center/threats/trojans
· https://www.trendmicro.com/tr_tr/what-is/ransomware.html