TÜBİTAK ULAKBİM

Mustafa Kemal Mahallesi
2151. Cadde No: 154
06510 Çankaya/ANKARA

http://www.ulakbim.gov.tr

 

Contact Info
198 West 21th Street, Suite 721
New York, NY 10010
youremail@yourdomain.com
+88 (0) 101 0000 000
Follow Us

Ahtapot

Integrated Cyber Security System

What is an Ahtapot?

One of the important rules that must be followed in order for cyber security measures to be successful is to include all cyber security components that must be included in the information system.

“Defense-in-depth” or “multi-level defense” is the coordinated use of multiple security measures to ensure information security in an institution/company. Defense in depth minimizes the likelihood of attackers succeeding. When the attacker bypasses a security measure on his way to achieve his goal, he will encounter another, which will at least make the attacker’s job more difficult and increase the time it takes to reach his goal.

How does it work?

It is a system in which the cyber security components needed for defense in depth are integrated. Ahtapot has the following features;

Operating System is Pardus; In this way, open source national operating system distribution is used in cyber security components.
It consists of open source components; In this way, systems that we cannot control and that we cannot know with whom they share which information are avoided.
Ahtapot; It includes a central management system to facilitate installations, configurations and updates.
It has easy-to-understand installation and user manuals.

What are the Pros and Contributions?

Open Source Code components are used; thereby reducing the dependency on costly cybersecurity solutions that cannot be audited and are likely to have backdoors.
With the easy-to-understand installation and usage documents, it is ensured that the knowledge and support needed for the use of the components are reduced.
With its central management system, it facilitates the management and configuration of cyber security solutions that will be deployed at different points of the information system.

Who is the Target Audience?

All institutions and organizations with medium and large-scale information systems, especially public institutions, constitute the target audience of the project.

Share: