TY - STAND AB - In the time we are living in, the nonlinear increase, usage and reliability on information communication technologies (ICT) are going to move forward. In this digital environment, people, institutions and government take necessary precautions ranging from personal to strategic level and adapt themselves to live or operate in that new form of environment. When we consider a country' cybersecurity efforts as a whole, it starts with individuals at the bottom, institutions, firms and military organizations at middle and government at the top. Ensuring a robust cybersecurity policy in a country, requires all levels (individual, institution, government) to be at the same standard. While the government level cybersecurity strategy documents generally present a comprehensive approach, the institutional level cybersecurity roadmaps, action plans are generally not present or overlooked. Being one of the main elements of a country, military organizations should be prepared to operate in this new form of operational environment that is full of malwares, advanced persistent threats (APT) and cyber espionage software. In this study, institutional cybersecurity from the military perspective is analysed in the light of possible challenges, organizational structure, the military decision making process (MDMP) and cybersecurity workforce. BT - INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE N1 - The understanding and handling of the cyberspace, cybersecurity efforts vary from country to country. Some countries see the picture more comprehensively including national critical infrastructures, electromagnetic spectrum, electronic warfare and cyber intelligence activities in the big picture. Therefore, those countries see the cyberspace and cyber activities as a strategic means or a new domain within the operations environment. On the other hand, some other countries perceive cyberspace as equal to internet and therefore, they simply see the cybersecurity as equal to information security. In such a chaotic era, the military organizations need to prepare for the worst by establishing resilient and cyber command structure, interoperable and synchronized planning efforts with electronic warfare command. Due to the changing character of wars from conventional to unconventional, symmetric to asymmetric and hybrid wars, cyber operations need to be designed to defense and sustain the military assets. N2 - In the time we are living in, the nonlinear increase, usage and reliability on information communication technologies (ICT) are going to move forward. In this digital environment, people, institutions and government take necessary precautions ranging from personal to strategic level and adapt themselves to live or operate in that new form of environment. When we consider a country' cybersecurity efforts as a whole, it starts with individuals at the bottom, institutions, firms and military organizations at middle and government at the top. Ensuring a robust cybersecurity policy in a country, requires all levels (individual, institution, government) to be at the same standard. While the government level cybersecurity strategy documents generally present a comprehensive approach, the institutional level cybersecurity roadmaps, action plans are generally not present or overlooked. Being one of the main elements of a country, military organizations should be prepared to operate in this new form of operational environment that is full of malwares, advanced persistent threats (APT) and cyber espionage software. In this study, institutional cybersecurity from the military perspective is analysed in the light of possible challenges, organizational structure, the military decision making process (MDMP) and cybersecurity workforce. PY - 2016 T2 - INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE TI - Institutional Cybersecurity from Military Perspective UR - https://dergipark.org.tr/en/pub/ijiss/issue/67182/1048787 ER -