bg

Information Security Services

Solutions provided within the scope of CYBERSOFT's information security services can be grouped into three sub-categories:

  • Digital Signature Support
  • Information Security Management
  • Security Architecture and Technical Countermeasures

Digital Signature Support

Since the completion of regulation on digital signatures (Legislation no: 5070) in 2004, digital signatures have equivalent force with hand-written signatures in court proceedings.

A digital signature is not a standalone application, it is rather just an infrastructure. Digital signature infrastructure is a network that consists of legal and technical sides, therefore it is not possible to use applications without the required legal support. On the other hand, it is also not beneficial to have the legislation without the technical infrastructure.

CYBERSOFT, with its superior knowledge and experience in digital signature technology, has been developing various applications with digital signature support and giving consultancy support to its clients. Below are some links to our projects and productsthat include digital signature support:

  • Undersecreteriat of Foreign Trade of Turkey (DTM) - Internal Processing Regime Project Read more...
  • Republic of Turkey Ministry of Defense (MSB) - Web-based Interactive Coding System Read more...
  • Turkish Petroleum Corporation (TPAO) - Enterprise Resource Planning (ERP) System - 1 Read more...
  • HYPATIA - Document Management and Workflow Automation System Read more...

Information Security Management

"Information" is the most valuable asset for an enterprise. Therefore, security of information is crucial and should be provided, as appropriate. De facto way of achieving appropriate level of information security on institutional base is setting up an Information Security Management System by:

  • Writing information security policies specialized for the institution
  • Setting up required management mechanisms for Information Security Management
  • Defining daily operations and tasks with Operational Procedures
  • Providing training and awareness programs for various audiences (e.g. Managers, Programmers, Operators)
  • Auditing Information Security Policy
  • Vulnerability assessment of network infrastructure, operating systems, and application programs
  • Penetration tests to detect and repair security weaknesses of web-based applications

In January of 2009, CYBERSOFT has been officially certificated with ISO/IEC 27001 as a result of audits performed by SGS SA regarding its information security management policy and procedures. LIGHTHOUSE, besides being a well-proven Quality Management and Communication tool developed by CYBERSOFT, is used throughout the Company to answer the needs of its Information Security Management System.