Research Article
BibTex RIS Cite

Data Security and Remote Access in Communication Technologies: A Case Study on the Use of VPN

Year 2023, Volume: 6 Issue: 2, 376 - 392, 31.12.2023
https://doi.org/10.33721/by.1275605

Abstract

Communication technologies, which constitute an important area of the new media system, are the media where intensive information flow takes place. There are various examples of applications in data management in recent years. Since the field of communication has turned into an eclectic and virtual interactive structure via the Internet, legal and illegal uses make the security field conflictual. Media use is usually shaped by the needs and orientations of the social system, except for the media where it takes place on an individual scale. Today, trends are increasing in terms of accessing information, providing unlimited and remote access. The subject of communication is decoupled from the interpersonal processes to the human-machine interaction field. At this point, there are important solution tools in data security and access policies. VPN applications provide important benefits to end users in the transfer or remote access of encrypted data through account activations. The fact that information sources and databases in the relevant field contain a significant degree of sensitivity is determined by various authority matrices, especially for remote access policies, for a period of time or indefinitely. The formatting of corporate data security with supervision mechanisms such as KVKK, ISO27001 and Presidential DDO also makes cyber security solutions mandatory in the management of network services related to tools such as servers and firewalls. This study analyzes the structure of an enterprise VPN through a scenario developed for system and device security using the architecture and application interface case study method.

References

  • Aburdene, M. F., Mastascusa, E. J. ve Massengale, R. (1991). A Proposal For A Remotely Shared Control Systems Laboratory, Proceedings of the ASEE 1991 Frontiers in Education Conference, Session 24A3, 589-592.
  • Arslan, K. (2020). Eğitimde Yapay Zekâ ve Uygulamaları. Batı Anadolu Eğitim Bilimleri Dergisi, 11(1), 71-88.
  • Aydemir, M. (2018). Yeni Medyanın Kullanıcı Üzerinde Bağımlılık Etkisi: Fomo Kullanıcılar ve Genel Yönelimleri, 5. Uluslararası İletişim öğrencileri Sempozyumu, Community Ege, Tam Metin Bildiriler Kitabı, 440-455.
  • Batorski, D. (2011). An Ocean of Information, Academia Focus on the Internet, No:3, I:31,24-26.
  • Bitton R. ve Shabtai, A. (2021). A Machine Learning-Based Intrusion Detection System for Securing Remote Desktop Connections to Electronic Flight Bag Servers, in IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 3, 1164-1181, 1 May-June 2021, doi: 10.1109/TDSC.2019.2914035.
  • Blanco, JM., Cohen, J., Nitsch, H. (2020). Cyber intelligence against radicalisation and Violent extremism. In: Babak A, Douglas W, Blanco JM (eds) Investigating Radicalization Trends: Case Studies In Europe And Asia. Springer International Publishing, Cham, 55–80.
  • Briggs Asa, Peter Burke (2004), Medyanın Toplumsal Tarihi, Çev. İbrahim Şener, Ankara: İzdüşüm Yayınları.
  • Bright, L. F., Kleiser, S. B., ve Grau, S. L. (2015). Too Much Facebook? An Exploratory Examination of Social Media Fatigue, Computers in Human Behavior, Volume 44, Issue C, March 2015, 148-155, Amsterdam: Elsevier Science Publishers B. V.
  • CBDDO. (2020). Bilgi ve İletişim Güvenliği Rehberi, Erişim Adresi:https://cbddo.gov.tr/SharedFolderServer/Genel/File/bg_rehber.pdf
  • Crowe, et al. (2011). The Case Study Approach. BMC Medical Research Methodology 2011, 11-100. doi:10.1186/1471-2288
  • D. Ernest vd., (2015). A Comparative Study Of Remote Access Technologies and Implementation of a Smartphone App for Remote System Administration Based on a Proposed Secure RFB Protocol. International Journal of Science and Engineering Applications. Volume 4 Issue 4,163-168.
  • Du, W., Tan, Xi., Luo, T., Jayaraman, K., ve Zhu, Z. (2011). Re-designing the Web’s Access Control System, Y. Li (Ed.): Data and Applications Security and Privacy XXV, LNCS 6818, 4–11.
  • Ferguson, P. and Huston, G. (1998). What is a VPN? Erişim Adresi: https://www.potaroo.net/papers/vpn.pdf
  • Fujii, N. ve Koike, N., (2005). A Time-sharing Remote Laboratory for Hardware Design and Experiment with Shared Resources and Service Management, ITHET 6th Annual International Conference, Session T2B, 5-10.
  • George, AL., ve Bennett, A. (2005). Case Studies And Theory Development In The Social Sciences Cambridge, MA: MIT Press.
  • Green, J. ve Thorogood, N. (2009). Qualitative Methods For Health Research. 2. Edition. Los Angeles: Sage.
  • Güneş, B., Kayışoğlu, G., ve Bolat, P. (2021). Cyber Security Risk Assessment For Seaports: A Case Study Of A Container Port, Computers & Security, Volume 103, 2021, 102196, ISSN 0167-4048, https://doi.org/10.1016/j.cose.2021.102196.
  • Holmes, W., Bialik, M. ve Fadel, C. (2019). Artificial intelligence in education: Promises and implications for teaching and learning. Boston, MA: Center for Curriculum Redesign.
  • Huang, S., Lin, C., Luo, A., Chen, Z., Jiang, X., Wang, K., Zhang, H., ve Peng, X. (2009). Proxy-Based Security Audit System for Remote Desktop Access. 2009 Proceedings of 18th International Conference on Computer Communications and Networks, San Francisco, CA, USA, 2009, 1-5. doi: 10.1109/ICCCN.2009.5235336.
  • ITU-T (1998). Multipoint communication service-Service definition, T.122, Erişim Adresi: http://www.itu.int
  • Kennell, R., ve Jamieson, Leah H. (2003). Establishing the Genuinity of Remote Computer Systems, Proceedings of the 12th USENIX Security Symposium, August 4–8, 2003, Washington, DC, USA.
  • Kotkar, A., Nalawade, A., Gawas, S., Patwardhan, A., ve Mangale, S. (2013). Android Based Remote Desktop Client, International Journal of Innovative Research in Computer and Communication Engineering Vol. 1, Issue 2, April 2013, 345-348.
  • Krithikaa, M., Priyadharsini, M. ve Subha, C. (2016). Virtual Private Network- A Survey, International Journal of Trend in Research and Development, Volume 3(1), 78-81.
  • Longzheng, Cai., Shengsheng, Yu., ve Zhou, Jing-li. (2004). Research and implementation of remote desktop protocol service over SSL VPN, IEEE International Conference on Services Computing, 2004. (SCC 2004). Proceedings. 2004, Shanghai, China, 2004, 502-505, doi: 10.1109/SCC.2004.1358052.
  • Lubonski, M., Gay, V., ve Simmonds, A. (2005). A Conceptual Architecture for Adaptation in Remote Desktop Systems Driven by the User Perception of Multimedia, 2005 Asia-Pacific Conference on Communications, Perth, WA, Australia, 2005, 891-895, doi: 10.1109/APCC.2005.1554191.
  • Macnish, K., ve Van der Ham, J. (2020). Ethics in cybersecurity research and practice. Technol. Soc. 63, 101382 Malinowski, A., Dahlstrom, J., Cortez, P. F., Dempsey, G. ve Mattus, C., (2000). Web-based remote active presence, Proceedings of the 2000 ASEE Annual Conference & Exposition, Session 3232.
  • Minghao, J., Gou, G., Shi, J., ve Xiong, G. (2019). I Know What You Are Doing With Remote Desktop. 1-7. 10.1109/IPCCC47392.2019.8958721.
  • Palacin, V., Gilbert, S., Orchard, S., Eaton, A., Ferrario, M.A., ve Happonen, A. (2020). Drivers of Participation In Digital Citizen Science: Case Studies On Järviwiki And Safecast. Citizen Science: Theory Pract. 5(1), 1–20 Article: 22, https://doi.org/10.5334/cstp.290
  • Resmî Gazete (2019). Bilgi ve İletişim Güvenliği Tedbirleri Konulu 2019/12 Sayılı Cumhurbaşkanlığı Genelgesi 06.07.2019 tarih ve 30823 sayılı Resmî Gazete.
  • Tarek S. VE Yasser, A. (2011). Effective and Extensive Virtual Private Network. Journal of Information Security, 2011, 2, 39-49.
  • Turing, A. (1950). Computing Machinery and Intelligence. Mind, 49 (236), 433-460.
  • Wood, D., Stoss, V., Chan-Lizardo, L,. Papacostas, G. S., ve Stinson. M. E. (1988). Virtual Private Networks. In International Conference on Private Switching Systems and Networks. 132-136.

İletişim Teknolojilerinde Veri Güvenliği ve Uzaktan Erişim: VPN Kullanımı Üzerine Bir Vaka Çalışması

Year 2023, Volume: 6 Issue: 2, 376 - 392, 31.12.2023
https://doi.org/10.33721/by.1275605

Abstract

Yeni medya sisteminin önemli bir alanını oluşturan iletişim teknolojileri, yoğun enformasyon akışının gerçekleştiği mecralardır. Son yıllarda veri yönetimi konusunda çeşitli uygulama örnekleri bulunmaktadır. İletişim alanı internet üzerinden eklektik ve sanal etkileşimli bir yapıya dönüştüğünden yasal ve yasadışı kullanımlar güvenlik alanını çatışmalı hale getirmektedir. Medya kullanımı, bireysel ölçekte gerçekleştiği mecralar dışında genellikle toplumsal sistemin ihtiyaçları ve yönelimleriyle şekillenmektedir. Günümüzde bilgiye ulaşma, sınırsız ve uzaktan erişim sağlayabilme konusunda eğilimler artış göstermektedir. İletişim konusu, bireyler arası süreçlerden insan-makine etkileşim alanına doğru gerçekleşmektedir. Bu noktada veri güvenliği ile erişim politikalarında önemli çözüm araçları bulunmaktadır. VPN uygulamaları, hesap aktivasyonları üzerinden şifrelenmiş verilerin aktarımı veya uzaktan erişimi konularında son kullanıcılara önemli kazanımlar sağlamaktadır. Bilgi kaynaklarının ve ilgili alandaki veri tabanlarının önemli derecede hassasiyet içermesi, özellikle uzaktan erişim politikaları konusunda süreli ya da süresiz olarak çeşitli yetki matrisleriyle belirlenmektedir. Kurumsal veri güvenliğinin KVKK, ISO27001 ve Cumhurbaşkanlığı DDO gibi denetleme mekanizmalarıyla biçimlendirilmesi, sunucu ve güvenlik duvarı gibi araçlar ile ilgili ağ servislerinin yönetiminde siber güvenlik çözümlerini de zorunlu hale getirmektedir. Bu çalışma, sistem ve cihaz güvenliği konusunda geliştirilen bir senaryo üzerinden kurumsal bir VPN yapısını mimari ve uygulama arayüzü vaka çalışması yöntemiyle analiz etmektedir.

References

  • Aburdene, M. F., Mastascusa, E. J. ve Massengale, R. (1991). A Proposal For A Remotely Shared Control Systems Laboratory, Proceedings of the ASEE 1991 Frontiers in Education Conference, Session 24A3, 589-592.
  • Arslan, K. (2020). Eğitimde Yapay Zekâ ve Uygulamaları. Batı Anadolu Eğitim Bilimleri Dergisi, 11(1), 71-88.
  • Aydemir, M. (2018). Yeni Medyanın Kullanıcı Üzerinde Bağımlılık Etkisi: Fomo Kullanıcılar ve Genel Yönelimleri, 5. Uluslararası İletişim öğrencileri Sempozyumu, Community Ege, Tam Metin Bildiriler Kitabı, 440-455.
  • Batorski, D. (2011). An Ocean of Information, Academia Focus on the Internet, No:3, I:31,24-26.
  • Bitton R. ve Shabtai, A. (2021). A Machine Learning-Based Intrusion Detection System for Securing Remote Desktop Connections to Electronic Flight Bag Servers, in IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 3, 1164-1181, 1 May-June 2021, doi: 10.1109/TDSC.2019.2914035.
  • Blanco, JM., Cohen, J., Nitsch, H. (2020). Cyber intelligence against radicalisation and Violent extremism. In: Babak A, Douglas W, Blanco JM (eds) Investigating Radicalization Trends: Case Studies In Europe And Asia. Springer International Publishing, Cham, 55–80.
  • Briggs Asa, Peter Burke (2004), Medyanın Toplumsal Tarihi, Çev. İbrahim Şener, Ankara: İzdüşüm Yayınları.
  • Bright, L. F., Kleiser, S. B., ve Grau, S. L. (2015). Too Much Facebook? An Exploratory Examination of Social Media Fatigue, Computers in Human Behavior, Volume 44, Issue C, March 2015, 148-155, Amsterdam: Elsevier Science Publishers B. V.
  • CBDDO. (2020). Bilgi ve İletişim Güvenliği Rehberi, Erişim Adresi:https://cbddo.gov.tr/SharedFolderServer/Genel/File/bg_rehber.pdf
  • Crowe, et al. (2011). The Case Study Approach. BMC Medical Research Methodology 2011, 11-100. doi:10.1186/1471-2288
  • D. Ernest vd., (2015). A Comparative Study Of Remote Access Technologies and Implementation of a Smartphone App for Remote System Administration Based on a Proposed Secure RFB Protocol. International Journal of Science and Engineering Applications. Volume 4 Issue 4,163-168.
  • Du, W., Tan, Xi., Luo, T., Jayaraman, K., ve Zhu, Z. (2011). Re-designing the Web’s Access Control System, Y. Li (Ed.): Data and Applications Security and Privacy XXV, LNCS 6818, 4–11.
  • Ferguson, P. and Huston, G. (1998). What is a VPN? Erişim Adresi: https://www.potaroo.net/papers/vpn.pdf
  • Fujii, N. ve Koike, N., (2005). A Time-sharing Remote Laboratory for Hardware Design and Experiment with Shared Resources and Service Management, ITHET 6th Annual International Conference, Session T2B, 5-10.
  • George, AL., ve Bennett, A. (2005). Case Studies And Theory Development In The Social Sciences Cambridge, MA: MIT Press.
  • Green, J. ve Thorogood, N. (2009). Qualitative Methods For Health Research. 2. Edition. Los Angeles: Sage.
  • Güneş, B., Kayışoğlu, G., ve Bolat, P. (2021). Cyber Security Risk Assessment For Seaports: A Case Study Of A Container Port, Computers & Security, Volume 103, 2021, 102196, ISSN 0167-4048, https://doi.org/10.1016/j.cose.2021.102196.
  • Holmes, W., Bialik, M. ve Fadel, C. (2019). Artificial intelligence in education: Promises and implications for teaching and learning. Boston, MA: Center for Curriculum Redesign.
  • Huang, S., Lin, C., Luo, A., Chen, Z., Jiang, X., Wang, K., Zhang, H., ve Peng, X. (2009). Proxy-Based Security Audit System for Remote Desktop Access. 2009 Proceedings of 18th International Conference on Computer Communications and Networks, San Francisco, CA, USA, 2009, 1-5. doi: 10.1109/ICCCN.2009.5235336.
  • ITU-T (1998). Multipoint communication service-Service definition, T.122, Erişim Adresi: http://www.itu.int
  • Kennell, R., ve Jamieson, Leah H. (2003). Establishing the Genuinity of Remote Computer Systems, Proceedings of the 12th USENIX Security Symposium, August 4–8, 2003, Washington, DC, USA.
  • Kotkar, A., Nalawade, A., Gawas, S., Patwardhan, A., ve Mangale, S. (2013). Android Based Remote Desktop Client, International Journal of Innovative Research in Computer and Communication Engineering Vol. 1, Issue 2, April 2013, 345-348.
  • Krithikaa, M., Priyadharsini, M. ve Subha, C. (2016). Virtual Private Network- A Survey, International Journal of Trend in Research and Development, Volume 3(1), 78-81.
  • Longzheng, Cai., Shengsheng, Yu., ve Zhou, Jing-li. (2004). Research and implementation of remote desktop protocol service over SSL VPN, IEEE International Conference on Services Computing, 2004. (SCC 2004). Proceedings. 2004, Shanghai, China, 2004, 502-505, doi: 10.1109/SCC.2004.1358052.
  • Lubonski, M., Gay, V., ve Simmonds, A. (2005). A Conceptual Architecture for Adaptation in Remote Desktop Systems Driven by the User Perception of Multimedia, 2005 Asia-Pacific Conference on Communications, Perth, WA, Australia, 2005, 891-895, doi: 10.1109/APCC.2005.1554191.
  • Macnish, K., ve Van der Ham, J. (2020). Ethics in cybersecurity research and practice. Technol. Soc. 63, 101382 Malinowski, A., Dahlstrom, J., Cortez, P. F., Dempsey, G. ve Mattus, C., (2000). Web-based remote active presence, Proceedings of the 2000 ASEE Annual Conference & Exposition, Session 3232.
  • Minghao, J., Gou, G., Shi, J., ve Xiong, G. (2019). I Know What You Are Doing With Remote Desktop. 1-7. 10.1109/IPCCC47392.2019.8958721.
  • Palacin, V., Gilbert, S., Orchard, S., Eaton, A., Ferrario, M.A., ve Happonen, A. (2020). Drivers of Participation In Digital Citizen Science: Case Studies On Järviwiki And Safecast. Citizen Science: Theory Pract. 5(1), 1–20 Article: 22, https://doi.org/10.5334/cstp.290
  • Resmî Gazete (2019). Bilgi ve İletişim Güvenliği Tedbirleri Konulu 2019/12 Sayılı Cumhurbaşkanlığı Genelgesi 06.07.2019 tarih ve 30823 sayılı Resmî Gazete.
  • Tarek S. VE Yasser, A. (2011). Effective and Extensive Virtual Private Network. Journal of Information Security, 2011, 2, 39-49.
  • Turing, A. (1950). Computing Machinery and Intelligence. Mind, 49 (236), 433-460.
  • Wood, D., Stoss, V., Chan-Lizardo, L,. Papacostas, G. S., ve Stinson. M. E. (1988). Virtual Private Networks. In International Conference on Private Switching Systems and Networks. 132-136.
There are 32 citations in total.

Details

Primary Language Turkish
Subjects Information Security Management
Journal Section Peer- Reviewed Articles
Authors

Mustafa Aydemir 0000-0001-9414-4053

Vedat Fetah 0000-0001-9196-1875

Publication Date December 31, 2023
Submission Date April 2, 2023
Published in Issue Year 2023 Volume: 6 Issue: 2

Cite

APA Aydemir, M., & Fetah, V. (2023). İletişim Teknolojilerinde Veri Güvenliği ve Uzaktan Erişim: VPN Kullanımı Üzerine Bir Vaka Çalışması. Bilgi Yönetimi, 6(2), 376-392. https://doi.org/10.33721/by.1275605

15529