S İ B E R G Ü V E N L İ K İ Ç İ N B Ü Y Ü K V E R İ Y A K L A Ş I M L A R I
385
rın sahip olmadığı bilindiğinden, yakın bir gelecekte bu konularda
etkin çözümlerin geliştirilmesi ne yazık ki beklenilmemektedir.
Kaynaklar
[1] Bart Custers, Jaap van den Herik, Cees T. A. M. de Laat, Michel Rade-
maker, Cor Veenman, “Enabling Big Data Applications for Security
- Responsible by Design”,
The Hague Security Delta, 2017.
[2] Mike Baccala, Chris Curran,
Dan Garrett; Scott Likens, Anand Rao,
Andy Ruggles, Michael Shehab, “2018 AI predictions 8 insights to
shape business strategy”, PwC, 2018.
[3] Tariq Mahmood, Uzma Afzal, “Security Analytics: Big Data Analytics
for cybersecurity: A
review of trends, techniques and tools”, 2nd
National Conference on Information Assurance (NCIA), 2013.
[4] Nir Kshetri, “Big data’s impact on privacy, security and consumer wel-
fare”, Telecommunications Policy, vol.38, no.11, pp.1134-1145, 2014.
[5] S. Sandeep Sekharan, Kamalanathan Kandasamy, “Profiling SIEM tools
and correlation engines for security analytics”, International Confe-
rence on Wireless Communications, Signal Processing and Networ-
king (WiSPNET), pp. 717-721, 2017.
[6] Christiaan Beek, Taylor Dunton, Steve Grobman, Mary Karlton, Niamh
Minihane, Chris Palm, Eric Peterson, Raj Samani, Craig Schmugar,
ReseAnne Sims, Dan Sommer, Bing Sun, “McAfee Labs Threats Re-
port - June 2018”, McAfee, 2018.
[7] Rossouw Von Solms, Johan Van Niekerk, “From information security
to cyber security”, Computers & Security, vol.38, pp. 97-102, 2013.
[8] Aftab Jamil, Brian Berning, Tim Clackett, Slade Fester, Demetrios Fran-
giskatos, Hank Galligan, Bryan Lorello,
Anthony Reh, David Ya-
sukochi, “8 Tech Predictions for 2018 Scaling Up the Disruption”,
BDO, 2018.
[9] Joey Cusimano, “The 6 D’s of Cyber Security”,
InfoSec Institute, 2015.
[10] Alvaro A. Cárdenas, Pratyusa K. Manadhata, Sreeranga P. Rajan, “Big
Data Analytics for Security”, IEEE Security & Privacy, vol.3, no.6,
pp.74-76, 2013.
[11] Duygu Sinanc Terzi, Ramazan Terzi, Seref Sagiroglu, “A survey on se-
curity and privacy issues in big data”, 10th International Conference
for Internet Technology and Secured Transactions (ICITST), pp. 202-
207, 2015.
D U Y G U S İ N A N Ç T E R Z İ - Ş E R E F S A Ğ I R O Ğ L U
386
[12] Gang Zeng, “Big Data and Information Security”, International Journal
of Computational Engineering Research, vol.5, no.6, pp.17-21, 2015.
[13] Mark Seward, Fred Wilmot, “Big Data and Security: At the Edge of
Prediction”,
RSA Conference, 2013.
[14] Renu Kesharwani, “Enhancing Information Security in Big Data”, In-
ternational Journal of Advanced Research in Computer and Com-
munication Engineering, vol.5, no.8, pp.323-327, 2016.
[15] Big Data Working Group, “Expanded Top Ten Big Data Security and
Privacy Challenges”, Cloud Security Alliance, 2013.
[16] Ernesto Damiani, Claudio Agostino Ardagna, Francesco Zavatarelli,
Evangelos Rekleitis,
Louis Marinos, “Big Data Threat Landscape
and Good Practice Guide”, European Union Agency For Network
And Information Security, 2016.