{"id":3178,"date":"2022-12-23T23:13:14","date_gmt":"2022-12-23T23:13:14","guid":{"rendered":"https:\/\/bulutistan.com\/blog\/?p=3178"},"modified":"2023-09-08T18:20:06","modified_gmt":"2023-09-08T18:20:06","slug":"ag-guvenligi-network-security","status":"publish","type":"post","link":"https:\/\/bulutistan.com\/blog\/ag-guvenligi-network-security\/","title":{"rendered":"A\u011f G\u00fcvenli\u011fi Nedir? Network Security Hakk\u0131nda Bilmeniz Gerekenler"},"content":{"rendered":"<p>G\u00fcn\u00fcm\u00fczde pek \u00e7ok gizli ve hassas veri, \u00e7evrimi\u00e7i olarak depolan\u0131r ve a\u011flar arac\u0131l\u0131\u011f\u0131yla eri\u015filebilir durumdad\u0131r. Bu y\u00fczden, i\u015fletmelerin verilerini g\u00fcvence alt\u0131na almas\u0131na ve sadece yetkili personel ve i\u015fletmelere eri\u015fim izni vermesine olanak tan\u0131yan iyi bir a\u011f g\u00fcvenli\u011fine sahip olmas\u0131 \u00f6nemlidir.<\/p>\n<p>Veri tehditlerini tespit etmek veya \u00f6nlemek genellikle kolay bir s\u00fcre\u00e7 de\u011fildir. Bu y\u00fczden i\u015fletmelerin verilerinden \u00f6d\u00fcn vermesine ve mali kay\u0131plara yol a\u00e7abilir. Tam da bu noktada, a\u011f g\u00fcvenli\u011fi alan\u0131ndaki profesyoneller, bu tehditleri \u00f6nlemek ve yorumlamaktan sorumludur.<\/p>\n<h2 id=\"ag-guvenligi-nedir\">A\u011f G\u00fcvenli\u011fi Nedir?<\/h2>\n<p><b>A\u011f g\u00fcvenli\u011fi<\/b>, a\u011f altyap\u0131s\u0131n\u0131n ar\u0131za, yanl\u0131\u015f kullan\u0131m, imha, de\u011fi\u015fiklik, yetkisiz eri\u015fim vb. durumlara kar\u015f\u0131 korunmas\u0131na yard\u0131mc\u0131 olacak \u00f6nleyici tedbirler alman\u0131z\u0131 sa\u011flar. Verilerinizi internete y\u00fcklerken ve bunun g\u00fcvenli oldu\u011funu d\u00fc\u015f\u00fcn\u00fcrken bilgisayar korsanlar\u0131 bu verileri ihlal edebilir, gizli bilgileri s\u0131zd\u0131rabilir veya mali zarara yol a\u00e7abilir. Bu nedenle a\u011f\u0131n\u0131z\u0131n g\u00fcvenli\u011fini sa\u011flaman\u0131z gerekir.<\/p>\n<p>A\u011f g\u00fcvenli\u011fi, siber g\u00fcvenli\u011fin \u00f6nemli bir par\u00e7as\u0131d\u0131r. A\u011f\u0131n\u0131z\u0131n ve i\u00e7inde depolanan verilerin ihlallere, yaz\u0131l\u0131m ve donan\u0131m izinsiz giri\u015flerine ve daha fazlas\u0131na kar\u015f\u0131 korunmas\u0131na yard\u0131mc\u0131 olur.<\/p>\n<p>A\u011f g\u00fcvenli\u011fi; tehditlere, a\u011f kullan\u0131m\u0131na, eri\u015filebilirli\u011fe ve eksiksiz tehdit g\u00fcvenli\u011fine dayal\u0131 bir dizi \u00f6nemli kural, d\u00fczenleme ve yap\u0131land\u0131rma olarak tan\u0131mlanabilir.<\/p>\n<h2 id=\"ag-guvenligi-neden-onemlidir\">A\u011f G\u00fcvenli\u011fi Neden \u00d6nemlidir?<\/h2>\n<p>\u0130\u015fletmeniz ne kadar b\u00fcy\u00fck olursa olsun; internet, LAN veya ba\u015fka bir y\u00f6ntemle \u00e7al\u0131\u015f\u0131rken a\u011f g\u00fcvenli\u011fini g\u00f6z \u00f6n\u00fcnde bulundurman\u0131z gerekir. Sald\u0131r\u0131lara kar\u015f\u0131 istemci verilerini korumak i\u00e7in istikrarl\u0131 ve verimli bir a\u011f g\u00fcvenlik sistemi \u015fartt\u0131r. \u0130yi bir a\u011f g\u00fcvenlik sistemi, i\u015fletmelerin veri h\u0131rs\u0131zl\u0131\u011f\u0131 ve sabotaj kurban\u0131 olma riskini azaltmas\u0131na yard\u0131mc\u0131 olur.<\/p>\n<p>A\u011f g\u00fcvenli\u011fi ayr\u0131ca i\u015fletmenizi zararl\u0131 casus yaz\u0131l\u0131mlardan korumaya yard\u0131mc\u0131 olur, payla\u015f\u0131lan verilerin g\u00fcvende tutulmas\u0131n\u0131 sa\u011flar. A\u011f g\u00fcvenlik altyap\u0131s\u0131, bilgileri \u00e7ok say\u0131da par\u00e7aya b\u00f6lerek, bu par\u00e7alar\u0131 \u015fifreleyerek ve ba\u011f\u0131ms\u0131z yollardan ileterek MiM sald\u0131r\u0131lar\u0131n\u0131 \u00f6nlemek i\u00e7in \u00e7e\u015fitli d\u00fczeylerde koruma sa\u011flar. B\u00f6ylece gizlice dinleme gibi durumlar\u0131n \u00f6n\u00fcne ge\u00e7er.<\/p>\n<p>A\u011f g\u00fcvenli\u011fi, sistemi sabote edebilecek herhangi bir \u015f\u00fcpheli i\u015flemin s\u00fcrekli izlenmesini sa\u011flayarak gecikmeleri ve kesintileri \u00f6nleyerek a\u011f\u0131n\u0131z\u0131n g\u00fcvenilirli\u011fini art\u0131r\u0131r.<\/p>\n<p>Bulutistan a\u011f g\u00fcvenli\u011fi hizmetinin detaylar\u0131na ula\u015fmak i\u00e7in <a href=\"https:\/\/bulutistan.com\/ag-guvenligi\/\" target=\"_blank\" rel=\"noopener\">t\u0131klay\u0131n\u0131z<\/a>.<\/p>\n<h2 id=\"ag-guvenligi-turleri-nelerdir\">A\u011f G\u00fcvenli\u011fi T\u00fcrleri Nelerdir?<\/h2>\n<p>A\u015fa\u011f\u0131daki listede farkl\u0131 a\u011f g\u00fcvenli\u011fi t\u00fcrlerini bulabilirsiniz:<\/p>\n<ul>\n<li>G\u00fcvenlik duvarlar\u0131 (<a href=\"https:\/\/bulutistan.com\/blog\/firewall\/\">Firewalls<\/a>)<\/li>\n<li>Giri\u015f kontrolu (Access control)<\/li>\n<li>Sanal \u00f6zel a\u011flar (VPN&#8217;ler)<\/li>\n<li>Sald\u0131r\u0131 \u00f6nleme sistemleri<\/li>\n<li>Kablosuz g\u00fcvenlik<\/li>\n<li>Uygulama g\u00fcvenli\u011fi<\/li>\n<li>Davran\u0131\u015fsal analiz<\/li>\n<\/ul>\n<h3 id=\"1-guvenlik-duvarlari-firewalls\">1. <b>G\u00fcvenlik Duvarlar\u0131 (Firewalls)<\/b><\/h3>\n<p>G\u00fcvenlik duvarlar\u0131, hangi web sayfas\u0131n\u0131n, a\u00e7\u0131l\u0131r pencerenin ve di\u011fer hizmetlerin bir a\u011fa girip \u00e7\u0131kaca\u011f\u0131na karar vermekten sorumlu olan, koruma g\u00f6revi g\u00f6ren hizmet veya cihazlard\u0131r. G\u00fcvenlik duvarlar\u0131, gereksinimlere ba\u011fl\u0131 olarak trafi\u011fi engellemeye veya izin vermeye yard\u0131mc\u0131 olan \u00f6nceden tan\u0131mlanm\u0131\u015f bir dizi kural kullan\u0131r. G\u00fcvenlik duvarlar\u0131, sistemin ihtiya\u00e7lar\u0131na ba\u011fl\u0131 olarak yaz\u0131l\u0131m, donan\u0131m veya her ikisi i\u00e7in de gerekli olabilir.<\/p>\n<h3 id=\"2-giris-kontrolu-access-control\">2. Giri\u015f Kontrolu (Access Control)<\/h3>\n<p>Giri\u015f kontrol\u00fc, i\u015fletmelerin potansiyel sald\u0131rganlar\u0131n gizli bilgilerini s\u0131zd\u0131rmas\u0131n\u0131 \u00f6nlemeye, yetkisiz cihaz ve kullan\u0131c\u0131lar\u0131n verilen a\u011fa eri\u015fmesini engellemeye olanak tan\u0131r. Bu, yaln\u0131zca verilen kaynaklarla \u00e7al\u0131\u015fmas\u0131na izin verilen kullan\u0131c\u0131lar\u0131n a\u011fa eri\u015fmesini sa\u011flar.<\/p>\n<h3 id=\"3-sanal-ozel-aglar-virtual-private-networks\">3. Sanal \u00d6zel A\u011flar (Virtual Private Networks)<\/h3>\n<p>VPN, genellikle bir u\u00e7 nokta cihaz\u0131 ile bir a\u011f aras\u0131ndaki ba\u011flant\u0131y\u0131 \u015fifrelemek i\u00e7in interneti kullan\u0131r. Ayr\u0131ca VPN, profesyonellerin a\u011f ve cihaz aras\u0131ndaki ileti\u015fimi do\u011frulamas\u0131n\u0131 sa\u011flar. Bu, internet \u00fczerinden \u015fifreli ve g\u00fcvenli bir t\u00fcnel olu\u015fturulmas\u0131na neden olur.<\/p>\n<h3 id=\"4-saldiri-onleme-sistemleri-intrusion-prevention-systems\">4. Sald\u0131r\u0131 \u00d6nleme Sistemleri (Intrusion Prevention Systems)<\/h3>\n<p>Sald\u0131r\u0131 \u00f6nleme sistemleri, a\u011f trafi\u011fini tarayarak sald\u0131r\u0131lar\u0131 bulur ve \u00f6nler. Bu, profesyonellerin a\u015fina oldu\u011fu sald\u0131r\u0131 teknikleri veri tabanlar\u0131n\u0131 kullanarak ve bunlar\u0131 a\u011f etkinlikleriyle ili\u015fkilendirerek yap\u0131l\u0131r.<\/p>\n<h3 id=\"5-kablosuz-guvenlik-wireless-security\">5. Kablosuz G\u00fcvenlik (Wireless Security)<\/h3>\n<p>Kablolu a\u011flar, kablosuz a\u011flar kadar g\u00fcvenli de\u011fildir. \u015eirketinizin a\u011f\u0131na eri\u015febilen cihazlar\u0131 ve kullan\u0131c\u0131lar\u0131 kontrol etmenizi gerektirir. Bu nedenle, \u00f6zellikle siber su\u00e7lular gizli bilgileri s\u0131zd\u0131rmak i\u00e7in h\u0131zla i\u015fletmenizi hedef ald\u0131\u011f\u0131nda kablosuz g\u00fcvenli\u011finizin olmas\u0131 \u00f6nemlidir.<\/p>\n<h3 id=\"6-uygulama-guvenligi-application-security\">6. Uygulama G\u00fcvenli\u011fi (Application Security)<\/h3>\n<p>Uygulama g\u00fcvenli\u011fi, bir uygulaman\u0131n zay\u0131f noktalar\u0131n\u0131 izler ve kilitler. Bilgisayar korsanlar\u0131 taraf\u0131ndan a\u011f\u0131n\u0131za s\u0131zmak i\u00e7in kolayca hedeflenen bir dizi yaz\u0131l\u0131m, donan\u0131m ve s\u00fcreci i\u00e7erir.<\/p>\n<h3 id=\"7-davranis-analitigi-behavioral-analytics\">7. Davran\u0131\u015f Analiti\u011fi (Behavioral Analytics)<\/h3>\n<p>Anormallikleri ve \u00e7e\u015fitli a\u011f ihlallerini meydana geldikleri anda tespit edebilmek istiyorsan\u0131z, a\u011f\u0131n\u0131z\u0131n normal davran\u0131\u015f\u0131 hakk\u0131nda net bir fikre sahip olman\u0131z gerekir. Anormal faaliyetleri otomatik olarak tespit eden \u00e7e\u015fitli davran\u0131\u015fsal analiz ara\u00e7lar\u0131 mevcuttur.<\/p>\n<h2 id=\"ag-guvenligi-saldirisi\">A\u011f G\u00fcvenli\u011fi Sald\u0131r\u0131s\u0131<\/h2>\n<p><b>A\u011f g\u00fcvenli\u011fi sald\u0131r\u0131s\u0131<\/b>, siber su\u00e7lular taraf\u0131ndan bir a\u011f\u0131n g\u00fcvenli\u011fini tehlikeye atmak i\u00e7in ger\u00e7ekle\u015ftirilen k\u00f6t\u00fc niyetli giri\u015fimlerdir. Bu sald\u0131r\u0131lar, a\u011f g\u00fcvenli\u011fine ihtiya\u00e7 duyulmas\u0131n\u0131n en \u00f6nemli nedenidir. A\u011f altyap\u0131s\u0131na yap\u0131lan bu sald\u0131r\u0131lar\u0131n \u00f6nlenmesinden a\u011f g\u00fcvenli\u011fi sorumludur.<\/p>\n<h2 id=\"ag-guvenliginde-saldiri-turleri\">A\u011f G\u00fcvenli\u011finde Sald\u0131r\u0131 T\u00fcrleri<\/h2>\n<p>Farkl\u0131 <b>a\u011f g\u00fcvenli\u011fi sald\u0131r\u0131 t\u00fcrlerinden<\/b> baz\u0131lar\u0131 a\u015fa\u011f\u0131daki \u015fekildedir:<\/p>\n<p><b>Vir\u00fcs:<\/b> \u0130ndirilebilir k\u00f6t\u00fc ama\u00e7l\u0131 bir dosyad\u0131r ve bir kullan\u0131c\u0131 taraf\u0131ndan a\u00e7\u0131ld\u0131ktan sonra bilgisayardaki kodlar\u0131 kendi kod setleriyle de\u011fi\u015ftirmeye ba\u015flar. Yay\u0131ld\u0131\u011f\u0131nda, bilgisayardaki sistem dosyalar\u0131 bozulur ve bu a a\u011fdaki di\u011fer bilgisayar sistemlerinin dosyalar\u0131n\u0131n bozulmas\u0131na neden olabilir.<\/p>\n<p><b>K\u00f6t\u00fc Ama\u00e7l\u0131 Yaz\u0131l\u0131m:<\/b> Bir sisteme veya sistem a\u011f\u0131na yetkisiz eri\u015fim sa\u011flamaya yard\u0131mc\u0131 olan en zararl\u0131 ve h\u0131zl\u0131 k\u00f6t\u00fc ama\u00e7l\u0131 sald\u0131r\u0131 t\u00fcrleri aras\u0131ndad\u0131r. K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m genellikle kendi kendini kopyalar; yani bir sistem bozuldu\u011funda, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m internet \u00fczerinden a\u011fa internet \u00fczerinden ba\u011flanan t\u00fcm bilgisayar sistemlerini kolayca bozar. K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m olmas\u0131 durumunda, sisteme ba\u011fl\u0131 harici bir cihaz bile bozulabilir.<\/p>\n<p><b>Solucan:<\/b> Belirli bir sisteme kullan\u0131c\u0131ya ihtiya\u00e7 duymadan girer. Bir kullan\u0131c\u0131 \u00e7ok g\u00fc\u00e7l\u00fc olmayan bir uygulama \u00e7al\u0131\u015ft\u0131r\u0131yorsa, ayn\u0131 internet ba\u011flant\u0131s\u0131n\u0131 kullanan herhangi bir bilgisayar korsan\u0131 bu uygulamaya kolayca k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m g\u00f6nderebilir. Kullan\u0131c\u0131n\u0131n bilgisi olmadan, uygulama bu k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131 internet \u00fczerinden kabul edip \u00e7al\u0131\u015ft\u0131rabilir ve bu da bir solucan\u0131n olu\u015fmas\u0131na neden olabilir.<\/p>\n<p><b>Packet Sniffer:<\/b> Bir kullan\u0131c\u0131 kablosuz bir verici b\u00f6lgesine pasif bir al\u0131c\u0131 yerle\u015ftirirse, iletilen paketlerin bir kopyas\u0131n\u0131 g\u00f6r\u00fcr. Genellikle bu paketler, paket al\u0131c\u0131s\u0131na ula\u015fabilen gizli organizasyon verilerinden, ticari s\u0131rlardan vb. olu\u015fur. Kriptografi, bu t\u00fcr a\u011f g\u00fcvenli\u011fi sald\u0131r\u0131lar\u0131n\u0131 \u00f6nlemenin en iyi yoludur.<\/p>\n<p><b>Kimlik Av\u0131: <\/b>Bu, a\u011f g\u00fcvenli\u011fine y\u00f6nelik en yayg\u0131n sald\u0131r\u0131 bi\u00e7imlerinden biridir. Bilgisayar korsanlar\u0131 yat\u0131r\u0131mc\u0131lar ve bankac\u0131lar gibi bilinen bir kaynaktan geliyormu\u015f gibi davranan ve kullan\u0131c\u0131lar\u0131n dikkatini \u00e7ekmek veya onlar\u0131 heyecanland\u0131rmak i\u00e7in bir aciliyet duygusu olu\u015fturarak kullan\u0131c\u0131lara e-posta\u2019lar g\u00f6nderir. Bu e-posta\u2019lar\u0131n, kullan\u0131c\u0131lardan gizli verileri payla\u015fmalar\u0131n\u0131 isteyen k\u00f6t\u00fc ama\u00e7l\u0131 ekler veya ba\u011flant\u0131lar i\u00e7erme olas\u0131l\u0131\u011f\u0131 vard\u0131r.<\/p>\n<p><b>G\u00fcvenli\u011fi \u0130hlal Edilmi\u015f Anahtar:<\/b> Bir bilgisayar korsan\u0131 bir a\u011f g\u00fcvenlik anahtar\u0131 ald\u0131\u011f\u0131nda, hassas verileri ay\u0131klamak i\u00e7in bir ara\u00e7 g\u00f6revi g\u00f6ren g\u00fcvenli\u011fi ihlal edilmi\u015f bir anahtar kullan\u0131r ve g\u00fcvenli verilere yetkisiz eri\u015fim elde eder. Bu anahtar, g\u00f6ndericiye veya al\u0131c\u0131ya herhangi bir bildirimde bulunmadan g\u00fcvenli verilerin yorumlanmas\u0131na yard\u0131mc\u0131 olan bir kod veya numaradan olu\u015fur.<\/p>\n<p><b>Botnet:<\/b> \u00d6zel bir a\u011f \u00fczerinden birbirine ba\u011fl\u0131 bir dizi bilgisayara sald\u0131ran k\u00f6t\u00fc ama\u00e7l\u0131 bir yaz\u0131l\u0131md\u0131r. Bilgisayar korsanlar\u0131, sahibinin bilgisi olmadan o a\u011fdaki t\u00fcm sistemlere eri\u015fir ve bunlar\u0131 kontrol eder. Bu a\u011fdaki t\u00fcm bilgisayarlar, bilgisayar korsan\u0131n\u0131n talimatlar\u0131na g\u00f6re \u00e7ok say\u0131da cihaz\u0131 bozan zombiler olarak adland\u0131r\u0131l\u0131r.<\/p>\n<p><b>DoS: <\/b>DoS, hizmet reddi olarak bilinir. Bu sald\u0131r\u0131, kullan\u0131c\u0131lar\u0131n a\u011flar\u0131n\u0131 k\u0131smen veya tamamen yok etme yetene\u011fine sahiptir. DoS ayr\u0131ca eksiksiz bir BT altyap\u0131s\u0131na bile sald\u0131rabilir ve bu da onu ger\u00e7ek kullan\u0131c\u0131lar i\u00e7in kullan\u0131lamaz hale getirir.<\/p>\n<h2 id=\"ag-guvenligi-mimarisi\">A\u011f G\u00fcvenli\u011fi Mimarisi<\/h2>\n<p><b>A\u011f g\u00fcvenli\u011fi modellerinin mimarisi<\/b>, iyi d\u00fc\u015f\u00fcn\u00fclm\u00fc\u015f sistematik bir s\u00fcrecin sonucudur. Mimariyi olu\u015ftururken, profesyonellerin i\u015fletmenin gerektirdi\u011fi g\u00fcvenlik t\u00fcr\u00fcn\u00fc ak\u0131llar\u0131nda tutmalar\u0131 gerekir. Ayr\u0131ca, her t\u00fcrl\u00fc a\u011f sald\u0131r\u0131s\u0131n\u0131 \u00f6nlemelerine yard\u0131mc\u0131 olacak \u00e7e\u015fitli s\u00fcre\u00e7ler, sistemler ve ara\u00e7lar tasarlamal\u0131d\u0131rlar. Mimari, eri\u015fim kontrol listeleri, g\u00fcvenlik duvarlar\u0131 ve di\u011fer a\u011f g\u00fcvenli\u011fi t\u00fcrleri gibi unsurlar\u0131 i\u00e7erebilir.<\/p>\n<h2 id=\"sisteminizi-ve-aginizi-nasil-guvenli-hale-getirirsiniz\">Sisteminizi ve A\u011f\u0131n\u0131z\u0131 Nas\u0131l G\u00fcvenli Hale Getirirsiniz?<\/h2>\n<p>Sisteminizi g\u00fcvenli hale getirmenize yard\u0131mc\u0131 olacak anahtar parametreler a\u015fa\u011f\u0131daki \u015fekildedir:<\/p>\n<h3 id=\"1-guclu-parolalar-ayarlayin\">1. G\u00fc\u00e7l\u00fc Parolalar Ayarlay\u0131n<\/h3>\n<p>Sisteminizi veya a\u011f\u0131n\u0131z\u0131 k\u00f6t\u00fc niyetli sald\u0131r\u0131lardan korumak i\u00e7in \u00f6ncelikle sisteminize giri\u015f ve eri\u015fim i\u00e7in g\u00fc\u00e7l\u00fc bir \u015fifre koyun. \u015eifrenizin \u00e7ok say\u0131da karakter, sembol ve rakamdan olu\u015fmas\u0131 gerekti\u011fini unutmay\u0131n. \u015eifreler bilgisayar korsanlar\u0131 taraf\u0131ndan kolayca k\u0131r\u0131labilece\u011finden, do\u011fum g\u00fcnleri gibi kolay tahmin edilebilir parolalar kullanmaktan ka\u00e7\u0131nman\u0131z gerekir.<\/p>\n<h3 id=\"2-guvenlik-duvari-olusturun\">2. G\u00fcvenlik Duvar\u0131 Olu\u015fturun<\/h3>\n<p>\u0130stenmeyen eri\u015fim veya di\u011fer tehditlerden korumak i\u00e7in a\u011f sisteminize her zaman g\u00fc\u00e7l\u00fc bir g\u00fcvenlik duvar\u0131 yerle\u015ftirin.<\/p>\n<p><b>3. Antivir\u00fcs Korumas\u0131<\/b><\/p>\n<p>Sisteminizi ve diz\u00fcst\u00fc bilgisayarlar\u0131n\u0131z\u0131 her zaman antivir\u00fcs yaz\u0131l\u0131m\u0131 ile kurun. <b>Vir\u00fcsten koruma yaz\u0131l\u0131m\u0131<\/b>; vir\u00fcsl\u00fc dosyalar\u0131 tarar, tespit eder ve filtreler. Ayr\u0131ca sistemdeki vir\u00fcs sald\u0131r\u0131lar\u0131 nedeniyle ortaya \u00e7\u0131kan sorunu \u00e7\u00f6zer.<\/p>\n<h3 id=\"4-guncelleme\">4. G\u00fcncelleme<\/h3>\n<p>Sisteminizi ve a\u011f\u0131n\u0131z\u0131 antivir\u00fcs yaz\u0131l\u0131m\u0131n\u0131n en son s\u00fcr\u00fcm\u00fc ile g\u00fcncellemek ve sistemin ihtiyac\u0131na g\u00f6re sistem i\u00e7in en son yamalar\u0131 ve komut dosyalar\u0131n\u0131 y\u00fcklemek \u00e7ok \u00f6nemlidir. Bu, vir\u00fcs sald\u0131r\u0131 olas\u0131l\u0131\u011f\u0131n\u0131 en aza indirir ve a\u011f\u0131 daha g\u00fcvenli hale getirir.<\/p>\n<h3 id=\"5-koruyucu-dizustu-bilgisayarlar-ve-cep-telefonlari\">5. Koruyucu Diz\u00fcst\u00fc Bilgisayarlar ve Cep Telefonlar\u0131<\/h3>\n<p>Diz\u00fcst\u00fc bilgisayarlar ta\u015f\u0131nabilir cihazlard\u0131r ve a\u011f tehditlerine kar\u015f\u0131 \u00e7ok savunmas\u0131zd\u0131r. Benzer \u015fekilde, cep telefonlar\u0131 da kablosuz cihazlard\u0131r ve kolayca tehditlere maruz kalman\u0131za neden olur. Bu cihazlar\u0131 korumak i\u00e7in g\u00fc\u00e7l\u00fc bir parola kullanman\u0131z gerekir. Ak\u0131ll\u0131 cihazlara eri\u015fmek i\u00e7in biyometrik parmak izi \u015fifresi kullanmak da yine cihaz\u0131n\u0131z\u0131 koruyabilecek y\u00f6ntemler aras\u0131ndad\u0131r.<\/p>\n<h3 id=\"6-zamaninda-yedeklemeler\">6. Zaman\u0131nda Yedeklemeler<\/h3>\n<p>Sisteminizdeki veya sabit diskinizdeki dosyalar\u0131n, belgelerin ve di\u011fer \u00f6nemli verilerin periyodik olarak yedeklerini alman\u0131z ve bunlar\u0131 merkezi bir sunucuya veya g\u00fcvenli bir yere kaydetmeniz gerekir. Bu i\u015flem hatas\u0131z yap\u0131lmal\u0131d\u0131r. Acil bir durumda, yedekleme, sistemin h\u0131zl\u0131 bir \u015fekilde geri y\u00fcklenmesine yard\u0131mc\u0131 olacakt\u0131r.<\/p>\n<h3 id=\"7-guvenli-baglantilar\">7. G\u00fcvenli Ba\u011flant\u0131lar<\/h3>\n<p>\u0130nternetteki herhangi bir ba\u011flant\u0131 veya siteyi indirip t\u0131klamadan \u00f6nce yanl\u0131\u015f bir t\u0131klaman\u0131n a\u011f\u0131n\u0131za bir\u00e7ok vir\u00fcs\u00fc davet edebilece\u011finizi unutmay\u0131n. Bu nedenle, verileri yaln\u0131zca g\u00fcvenilir ve g\u00fcvenli ba\u011flant\u0131lardan indirin ve bilinmeyen ba\u011flant\u0131larda ve web sitelerinde gezinmekten ka\u00e7\u0131n\u0131n.<\/p>\n<p>Ayr\u0131ca, internete her giri\u015f yapt\u0131\u011f\u0131n\u0131zda web sayfas\u0131nda s\u0131kl\u0131kla g\u00f6r\u00fcnt\u00fclenen reklam ve tekliflere t\u0131klamaktan ka\u00e7\u0131n\u0131n.<\/p>\n<h3 id=\"8-guvenli-yapilandirma\">8. G\u00fcvenli Yap\u0131land\u0131rma<\/h3>\n<p>iOS veya y\u00f6nlendirici \u00fczerinde yap\u0131lan konfig\u00fcrasyon, benzersiz bir kullan\u0131c\u0131 kimli\u011fi ve \u015fifre kullan\u0131larak yap\u0131lmal\u0131d\u0131r.<\/p>\n<h3 id=\"9-harici-medya-kontrolu\">9. Harici Medya Kontrol\u00fc<\/h3>\n<p>Veri kartlar\u0131 gibi harici cihazlar, sistemde her zaman taranmal\u0131d\u0131r. Harici cihazlar\u0131n kullan\u0131m\u0131 s\u0131n\u0131rland\u0131r\u0131lmal\u0131 ve sistemden herhangi bir veri aktaramayaca\u011f\u0131 bir politika olu\u015fturulmal\u0131d\u0131r.<\/p>\n<h2 id=\"ag-guvenligi-ve-siber-guvenlik-arasindaki-farklar-nelerdir\">A\u011f G\u00fcvenli\u011fi ve Siber G\u00fcvenlik Aras\u0131ndaki Farklar Nelerdir?<\/h2>\n<p>A\u011f g\u00fcvenli\u011fi, herhangi bir i\u015fletme taraf\u0131ndan bilgisayar a\u011f\u0131n\u0131 ve verilerini hem donan\u0131m hem de yaz\u0131l\u0131m sistemlerini kullanarak g\u00fcvence alt\u0131na almak i\u00e7in al\u0131nan \u00f6nlemlerdir. Bu, veri ve a\u011f\u0131n gizlili\u011fini ve eri\u015filebilirli\u011fini sa\u011flamay\u0131 ama\u00e7lar. B\u00fcy\u00fck miktarda veri i\u015fleyen her i\u015fletme, bir\u00e7ok siber tehdide kar\u015f\u0131 bir dereceye kadar \u00e7\u00f6z\u00fcme sahiptir.<\/p>\n<p>Siber g\u00fcvenlik ise sisteminizi siber ve k\u00f6t\u00fc niyetli sald\u0131r\u0131lardan korumak i\u00e7in al\u0131nan \u00f6nlemdir. Temel olarak, bilgisayar korsan\u0131n\u0131n sisteminize yetkisiz eri\u015fimi \u00f6nleyebilmeniz i\u00e7in sistemin g\u00fcvenli\u011fini artt\u0131rmay\u0131 ama\u00e7lar. Siber alan\u0131 sald\u0131r\u0131lara ve hasarlara kar\u015f\u0131 korur.<\/p>\n<h3 id=\"ag-guvenligi-ve-siber-guvenlik-arasindaki-fark\">A\u011f g\u00fcvenli\u011fi ve siber g\u00fcvenlik aras\u0131ndaki fark:<\/h3>\n<table>\n<tbody>\n<tr>\n<td><b>Parametreler<\/b><\/td>\n<td><b>A\u011f G\u00fcvenli\u011fi<\/b><\/td>\n<td><b>Siber G\u00fcvenlik<\/b><\/td>\n<\/tr>\n<tr>\n<td><b>Tan\u0131m<\/b><\/td>\n<td>A\u011f g\u00fcvenli\u011fi, verileri bir i\u015fletmenin a\u011f\u0131nda dola\u015f\u0131rken koruyan bir \u00f6zelliktir. Sonu\u00e7 olarak, i\u015fletme verilerini, belirli hassas bilgileri g\u00f6r\u00fcnt\u00fcleme yetkisi olmayan k\u00f6t\u00fc niyetli \u00e7al\u0131\u015fanlardan korur.<\/td>\n<td>Siber g\u00fcvenlik, bir i\u015fletmenin cihaz ve sunucu verilerini koruyan bir sistemdir. Ba\u015fka bir deyi\u015fle, siber su\u00e7lulara kar\u015f\u0131 ekstra bir savunma katman\u0131 g\u00f6revi g\u00f6r\u00fcr.<\/td>\n<\/tr>\n<tr>\n<td><b>Veri\u00a0<\/b><\/td>\n<td>A\u011f \u00fczerinden akan verileri korur. A\u011f g\u00fcvenli\u011fi, sadece ge\u00e7i\u015f verilerinin korunmas\u0131n\u0131 sa\u011flar. A\u011f alan\u0131ndaki her \u015feyi korur.<\/td>\n<td>Cihaz ve sunucularda bulunan verileri korur. Siber g\u00fcvenlik, t\u00fcm dijital verilerin korunmas\u0131n\u0131 sa\u011flar. Siber alemdeki her \u015feyi korur.<\/td>\n<\/tr>\n<tr>\n<td><b>Hiyerar\u015fi<\/b><\/td>\n<td>Siber g\u00fcvenli\u011fin bir alt k\u00fcmesidir.<\/td>\n<td>Bilgi g\u00fcvenli\u011finin bir alt k\u00fcmesidir.<\/td>\n<\/tr>\n<tr>\n<td><b>Vir\u00fcsler<\/b><\/td>\n<td>DOS sald\u0131r\u0131lar\u0131na, vir\u00fcslere ve solucanlara kar\u015f\u0131 koruma ile ilgilenir.<\/td>\n<td>Kimlik av\u0131 ve \u00f6n mesajla\u015fmay\u0131 i\u00e7eren siber sald\u0131r\u0131lara ve siber su\u00e7lara kar\u015f\u0131 koruma ile ilgilenir.<\/td>\n<\/tr>\n<tr>\n<td><b>Koruma<\/b><\/td>\n<td>A\u011f g\u00fcvenli\u011fi truva atlar\u0131na kar\u015f\u0131 korur.<\/td>\n<td>Siber g\u00fcvenlik, siber su\u00e7lara ve siber doland\u0131r\u0131c\u0131l\u0131klara kar\u015f\u0131 korur.<\/td>\n<\/tr>\n<tr>\n<td><b>G\u00fcvenlik<\/b><\/td>\n<td>A\u011fda dola\u015fan verilerin terminaller taraf\u0131ndan g\u00fcvenli\u011fini sa\u011flar.<\/td>\n<td>Dinlenen verilerin korunmas\u0131 ile ilgilenir.<\/td>\n<\/tr>\n<tr>\n<td><b>\u00d6rnekler<\/b><\/td>\n<td>\u00c7ok fakt\u00f6rl\u00fc kimlik do\u011frulama, yaz\u0131l\u0131m g\u00fcncellemeleri ve s\u0131k\u0131 parola d\u00fczenlemelerinin t\u00fcm\u00fc a\u011f g\u00fcvenli\u011finin bir par\u00e7as\u0131d\u0131r.<\/td>\n<td>G\u00fcvenli hassas veriler, \u00e7evrimi\u00e7i kimlik do\u011frulama ve g\u00fcncel bilgiler, siber g\u00fcvenlik \u00f6nlemlerinin \u00f6rnekleridir.<\/td>\n<\/tr>\n<tr>\n<td><b>Pop\u00fcler \u0130\u015f Unvanlar\u0131<\/b><\/td>\n<td>A\u011f g\u00fcvenli\u011fi m\u00fchendisi ve a\u011f g\u00fcvenli\u011fi mimar\u0131 iki pop\u00fcler i\u015f unvan\u0131d\u0131r.<\/td>\n<td>Siber g\u00fcvenlik mimar\u0131 ve siber g\u00fcvenlik analisti iki pop\u00fcler i\u015f unvan\u0131d\u0131r.<\/td>\n<\/tr>\n<tr>\n<td><b>\u0130\u015f Rol\u00fc<\/b><\/td>\n<td>Bir a\u011f g\u00fcvenli\u011fi uzman\u0131n\u0131n rol\u00fc, bir i\u015fletmenin BT altyap\u0131s\u0131n\u0131 korumakt\u0131r.<\/td>\n<td>Siber g\u00fcvenlik uzman\u0131, siber g\u00fcvenlik tehditlerinin korunmas\u0131, tespiti ve kurtar\u0131lmas\u0131 konusunda uzmand\u0131r.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"G\u00fcn\u00fcm\u00fczde pek \u00e7ok gizli ve hassas veri, \u00e7evrimi\u00e7i olarak depolan\u0131r ve a\u011flar arac\u0131l\u0131\u011f\u0131yla eri\u015filebilir durumdad\u0131r. Bu y\u00fczden, i\u015fletmelerin&hellip;\n","protected":false},"author":1,"featured_media":3858,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"csco_singular_sidebar":"","csco_page_header_type":"","csco_appearance_grid":"","csco_page_load_nextpost":"","csco_post_video_location":[],"csco_post_video_location_hash":"","csco_post_video_url":"","csco_post_video_bg_start_time":0,"csco_post_video_bg_end_time":0},"categories":[11],"tags":[24],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>A\u011f G\u00fcvenli\u011fi Nedir? Network Security Hakk\u0131nda Bilmeniz Gerekenler - Bulutistan Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bulutistan.com\/blog\/ag-guvenligi-network-security\/\" \/>\n<meta property=\"og:locale\" content=\"tr_TR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A\u011f G\u00fcvenli\u011fi Nedir? Network Security Hakk\u0131nda Bilmeniz Gerekenler - Bulutistan Blog\" \/>\n<meta property=\"og:description\" content=\"G\u00fcn\u00fcm\u00fczde pek \u00e7ok gizli ve hassas veri, \u00e7evrimi\u00e7i olarak depolan\u0131r ve a\u011flar arac\u0131l\u0131\u011f\u0131yla eri\u015filebilir durumdad\u0131r. Bu y\u00fczden, i\u015fletmelerin&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bulutistan.com\/blog\/ag-guvenligi-network-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Bulutistan Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-23T23:13:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-08T18:20:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bulutistan.com\/blog\/wp-content\/uploads\/2022\/12\/Depositphotos_18880431_S.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"664\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bulutistan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Yazan:\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bulutistan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tahmini okuma s\u00fcresi\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 dakika\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/bulutistan.com\/blog\/ag-guvenligi-network-security\/\",\"url\":\"https:\/\/bulutistan.com\/blog\/ag-guvenligi-network-security\/\",\"name\":\"A\u011f G\u00fcvenli\u011fi Nedir? Network Security Hakk\u0131nda Bilmeniz Gerekenler - Bulutistan Blog\",\"isPartOf\":{\"@id\":\"https:\/\/bulutistan.com\/blog\/#website\"},\"datePublished\":\"2022-12-23T23:13:14+00:00\",\"dateModified\":\"2023-09-08T18:20:06+00:00\",\"author\":{\"@id\":\"https:\/\/bulutistan.com\/blog\/#\/schema\/person\/06a4312aff9f5a9fc23e25fe7a27076e\"},\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/bulutistan.com\/blog\/ag-guvenligi-network-security\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/bulutistan.com\/blog\/#website\",\"url\":\"https:\/\/bulutistan.com\/blog\/\",\"name\":\"Bulutistan Blog\",\"description\":\"Teknolojide Yol Arkada\u015f\u0131n\u0131z\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/bulutistan.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"tr\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/bulutistan.com\/blog\/#\/schema\/person\/06a4312aff9f5a9fc23e25fe7a27076e\",\"name\":\"Bulutistan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/bulutistan.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0b09f693645c754f52af6ce46e1749e1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0b09f693645c754f52af6ce46e1749e1?s=96&d=mm&r=g\",\"caption\":\"Bulutistan\"},\"sameAs\":[\"https:\/\/bulutistan.com\/blog\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A\u011f G\u00fcvenli\u011fi Nedir? Network Security Hakk\u0131nda Bilmeniz Gerekenler - Bulutistan Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bulutistan.com\/blog\/ag-guvenligi-network-security\/","og_locale":"tr_TR","og_type":"article","og_title":"A\u011f G\u00fcvenli\u011fi Nedir? Network Security Hakk\u0131nda Bilmeniz Gerekenler - Bulutistan Blog","og_description":"G\u00fcn\u00fcm\u00fczde pek \u00e7ok gizli ve hassas veri, \u00e7evrimi\u00e7i olarak depolan\u0131r ve a\u011flar arac\u0131l\u0131\u011f\u0131yla eri\u015filebilir durumdad\u0131r. Bu y\u00fczden, i\u015fletmelerin&hellip;","og_url":"https:\/\/bulutistan.com\/blog\/ag-guvenligi-network-security\/","og_site_name":"Bulutistan Blog","article_published_time":"2022-12-23T23:13:14+00:00","article_modified_time":"2023-09-08T18:20:06+00:00","og_image":[{"width":1000,"height":664,"url":"https:\/\/bulutistan.com\/blog\/wp-content\/uploads\/2022\/12\/Depositphotos_18880431_S.jpg","type":"image\/jpeg"}],"author":"Bulutistan","twitter_card":"summary_large_image","twitter_misc":{"Yazan:":"Bulutistan","Tahmini okuma s\u00fcresi":"11 dakika"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/bulutistan.com\/blog\/ag-guvenligi-network-security\/","url":"https:\/\/bulutistan.com\/blog\/ag-guvenligi-network-security\/","name":"A\u011f G\u00fcvenli\u011fi Nedir? Network Security Hakk\u0131nda Bilmeniz Gerekenler - Bulutistan Blog","isPartOf":{"@id":"https:\/\/bulutistan.com\/blog\/#website"},"datePublished":"2022-12-23T23:13:14+00:00","dateModified":"2023-09-08T18:20:06+00:00","author":{"@id":"https:\/\/bulutistan.com\/blog\/#\/schema\/person\/06a4312aff9f5a9fc23e25fe7a27076e"},"inLanguage":"tr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bulutistan.com\/blog\/ag-guvenligi-network-security\/"]}]},{"@type":"WebSite","@id":"https:\/\/bulutistan.com\/blog\/#website","url":"https:\/\/bulutistan.com\/blog\/","name":"Bulutistan Blog","description":"Teknolojide Yol Arkada\u015f\u0131n\u0131z","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bulutistan.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"tr"},{"@type":"Person","@id":"https:\/\/bulutistan.com\/blog\/#\/schema\/person\/06a4312aff9f5a9fc23e25fe7a27076e","name":"Bulutistan","image":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/bulutistan.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0b09f693645c754f52af6ce46e1749e1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0b09f693645c754f52af6ce46e1749e1?s=96&d=mm&r=g","caption":"Bulutistan"},"sameAs":["https:\/\/bulutistan.com\/blog"]}]}},"_links":{"self":[{"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/posts\/3178"}],"collection":[{"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/comments?post=3178"}],"version-history":[{"count":8,"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/posts\/3178\/revisions"}],"predecessor-version":[{"id":3958,"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/posts\/3178\/revisions\/3958"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/media\/3858"}],"wp:attachment":[{"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/media?parent=3178"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/categories?post=3178"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/tags?post=3178"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}