Kaynaklar [1] ISACA, “COBIT 5 for Information Security”, USA, 2012,
www.
isaca.org/COBIT/Pages/info-sec.aspx
[2] National Institute of Standards and Technology (NIST), NIST SP 800-53
Revision 4, Security and Privacy Controls for Federal Information
Systems and Organizations, USA, 2015, http://nvlpubs.nist.gov/
nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf
[3] Center for Internet Security (CIS), CIS Controls Library Resources,
www.cisecurity.org/critical-controls/Library.cfm
[4] International Organization for Standardization/International
Electrotechnical Commission (ISO/IEC) 27001, Information
technology—Security techniques—Information security
management systems— Requirements, 2013, https://webstore.
ansi.org/RecordDetail.aspx?sku=ISO%2fIEC+27001%3a2013&sou
rce=msn&adgroup=27001&keyword=iso%20iec%2027001&utm_
source=bing&utm_medium=cpc&utm_campaign=Campaign%20
%231&utm_term=iso%20iec%2027001&utm_content=27001
[5] The Information Security Forum (ISF) Standard of Good Practice for
Information Security, 2016, www.securityforum.org/tool/the-isf-
standardrmation-security/
[6] American Institute of Certified Public Accountants, Statements on
Standards for Attestation Engagements, 2016, www.aicpa.org/
Research/Standards/AuditAttest/Pages/SSAE.aspx
[7] Fitzgerald, Todd J. “Auditing Cyber Security: Evaluating Risk
and Auditing Controls”, ISACA Report, http://www.isaca.org/
knowledge-center/research/researchdeliverables/pages/auditing-
cyber-security.aspx
BÖLÜM 13 Duygu SİNANÇ TERZİ Prof. Dr. Şeref SAĞIROĞLU Siber Güvenlik İçin Büyük Veri Yaklaşımları