Information Security is the protection of information by applying the risk management process in line with the elements of confidentiality, integrity and accessibility. Within the scope of Information Security, it is aimed to protect and address technology, systems and infrastructures (network, software, device, data, etc.) in total and to be prepared for future threats.


  • Taking precautions and protecting systems against cyber threats that are frequently seen in our country in different sizes and with different methods
  • The technology and trend in the field of cyber security is new and national developments can be made in this field.
  • Raising awareness of ecosystem stakeholders against cyber threats and crimes
  • Protection of systems with domestic and national products
  • Elimination of legal gaps in the field of cyber security


  • Cyber Security Management System
  • Cyber Security Technical Protection System (Environmental Security, Device Security, System Security, Network Security)
  • Cyber Security Operational and Maintenance Systems
  • Backup in Cyber-Systems
  • Continuously Adaptive Risk and Protection Evaluation System
  • Smart Data Center Security
  • Management of Cyber Risks in Cloud Technologies
  • Security of IoT
  • M2M Communication Security
  • Protection from Electromagnetic Fields
  • Smart Password Management Applications
  • Fraud Detection
  • CERTs (Computer Emergency Response Teams)
  • Intrusion Detection Detection Systems (IDS)
  • Intrusion Prevention System (IPS)
  • Security Information and Event Management (SIEM)
  • Blockchain-Based Cyber Security System
  • Cyber Threat Tools and Prevention Methods
  • Safe Design and Engineering
  • Safe Disposal
  • ICT Comprehensive Identity Management
  • ICT Comprehensive Authentication and Authorization
  • Network Monitoring
  • Cyber Security Awareness Training


  • In cybersecurity, deficiencies in supporting, disseminating, and branding domestic and national products
  • New technologies and security measures, insufficient standardization, and legal infrastructure studies
  • Insufficient local equipment in the field of cybersecurity20
  • An insufficient workforce trained in cybersecurity
  • The deficiencies in directing the young, dynamic, and curious population to these areas
  • Failure to adequately address security issues in financing and transformation plans
  • Failure to create an environment for a holistic approach to cyber threats