{"id":4031,"date":"2023-10-18T07:38:43","date_gmt":"2023-10-18T07:38:43","guid":{"rendered":"https:\/\/bulutistan.com\/blog\/?p=4031"},"modified":"2024-01-20T10:15:00","modified_gmt":"2024-01-20T10:15:00","slug":"siber-guvenlik-nedir","status":"publish","type":"post","link":"https:\/\/bulutistan.com\/blog\/siber-guvenlik-nedir\/","title":{"rendered":"Siber G\u00fcvenlik Nedir?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Siber g\u00fcvenlik yani cyber security, internete ba\u011fl\u0131 sistemleri \u00e7evrimi\u00e7i tehditlerden korumay\u0131 ifade eder. Bunlardan baz\u0131lar\u0131 i\u015f a\u00e7\u0131s\u0131ndan olduk\u00e7a kritiktir. Bir i\u015fletmenin yaz\u0131l\u0131m\u0131n\u0131, verilerini ve donan\u0131m\u0131n\u0131 korumay\u0131 i\u00e7erir ve siber su\u00e7lular\u0131n cihazlara veya a\u011flar\u0131na eri\u015fmesini \u00f6nlemeye yard\u0131mc\u0131 olur.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Dijital d\u00fcnyada siber g\u00fcvenli\u011fin \u00f6nemi \u00e7ok b\u00fcy\u00fckt\u00fcr. Bunun nedeni, siber sald\u0131r\u0131lar\u0131n hacminin ve karma\u015f\u0131kl\u0131\u011f\u0131n\u0131n s\u00fcrekli artmas\u0131d\u0131r. Teknolojiye ba\u011f\u0131ml\u0131l\u0131\u011f\u0131m\u0131z artt\u0131k\u00e7a, siber sald\u0131r\u0131lara kar\u015f\u0131 savunmas\u0131zl\u0131\u011f\u0131m\u0131z da artmaktad\u0131r. Bu noktada siber g\u00fcvenlik, veri ve sistemlerimizi bu tehditlerden korumaya yard\u0131mc\u0131 olur.<\/span><\/p>\n<h2 id=\"siber-guvenlik-neden-onemlidir\"><b>Siber G\u00fcvenlik Neden \u00d6nemlidir?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Ki\u015fisel verilerin neredeyse tamam\u0131 art\u0131k \u00e7evrimi\u00e7i olarak depoland\u0131\u011f\u0131ndan, siber sald\u0131r\u0131lar, bu s\u00fcre\u00e7te i\u015fletmeleri \u00e7ok zor s\u00fcre\u00e7lere sokma potansiyeline sahiptir.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">NHS, Yahoo ve LinkedIn gibi pop\u00fcler \u015firketlerin bile y\u00fcksek profilli siber sald\u0131r\u0131lardan etkilenmesi ile birlikte bir\u00e7ok \u015firket, meydana gelebilecek herhangi bir olas\u0131 s\u0131z\u0131nt\u0131yla giderek daha fazla ilgilenmeye ba\u015flam\u0131\u015ft\u0131r.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Bu, bir\u00e7ok \u015firketin, m\u00fc\u015fterilerinin bilgilerini g\u00fcvende tutmalar\u0131na yard\u0131mc\u0131 olmas\u0131 i\u00e7in siber g\u00fcvenlik \u015firketlerine y\u00f6neldi\u011fi anlam\u0131na gelir.<\/p>\n<p>Bulutistan siber g\u00fcvenlik hizmetinin detaylar\u0131na ula\u015fmak i\u00e7in <a href=\"https:\/\/bulutistan.com\/cloud-guvenligi\/\">t\u0131klay\u0131n\u0131z<\/a>.<br \/>\n<\/span><\/p>\n<h2 id=\"siber-guvenlikteki-zorluklar\"><b>Siber G\u00fcvenlikteki Zorluklar<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Siber sald\u0131r\u0131lar\u0131n say\u0131s\u0131n\u0131n \u00e7ok yak\u0131nda azalmas\u0131 pek olas\u0131 de\u011fildir, hatta g\u00fcn ge\u00e7tik\u00e7e daha da artmaktad\u0131r. Bu noktada veri kayb\u0131, gizlilik ve risk y\u00f6netimi; siber g\u00fcvenli\u011fe y\u00f6nelik s\u00fcrekli tehditler olarak \u015firketlerin kar\u015f\u0131s\u0131na \u00e7\u0131kmaktad\u0131r.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">G\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131n s\u00fcrekli de\u011fi\u015fen do\u011fas\u0131, siber g\u00fcvenli\u011fin en zor y\u00f6nlerinden biridir. Yeni teknolojiler ortaya \u00e7\u0131kt\u0131k\u00e7a ve teknoloji yeni veya farkl\u0131 \u015fekillerde kullan\u0131ld\u0131k\u00e7a, gelecekte yeni siber sald\u0131r\u0131 kanallar\u0131 da ortaya \u00e7\u0131kacakt\u0131r.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Bu noktada siber sald\u0131r\u0131lardaki s\u00fcrekli de\u011fi\u015fim ve geli\u015fmelere ayak uydurmak ve bunlara kar\u015f\u0131 korunmak i\u00e7in uygulamalar\u0131 g\u00fcncellemek zor olabilir.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00c7al\u0131\u015fanlar, diz\u00fcst\u00fc bilgisayarlar\u0131nda veya mobil cihazlar\u0131nda ofise k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m getirebilir, bu nedenle siber g\u00fcvenlik stratejileri son kullan\u0131c\u0131 e\u011fitimini de i\u00e7ermelidir. D\u00fczenli olarak g\u00fcvenlik fark\u0131ndal\u0131\u011f\u0131 e\u011fitimi alan \u00e7al\u0131\u015fanlar, \u015firketlerini siber tehditlerden korumaya daha iyi katk\u0131da bulunabilir.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Siber g\u00fcvenlikle ilgili bir di\u011fer zorluk, yetkin siber g\u00fcvenlik uzmanlar\u0131n\u0131n azl\u0131\u011f\u0131ndan kaynaklan\u0131r. \u0130\u015fletmeler daha fazla veri edinip kulland\u0131k\u00e7a, olaylar\u0131 de\u011ferlendirmek, y\u00f6netmek ve bunlara m\u00fcdahale etmek i\u00e7in siber g\u00fcvenlik uzmanlar\u0131na olan talep artmaktad\u0131r.<\/span><\/p>\n<h2 id=\"siber-guvenlik-turleri-nelerdir\"><b>Siber G\u00fcvenlik T\u00fcrleri Nelerdir?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">A\u015fa\u011f\u0131da mevcut en yayg\u0131n siber g\u00fcvenlik t\u00fcrlerinin bir listesini bulabilirsiniz:<\/span><\/p>\n<h3 id=\"1-security-information-and-event-management-siem\"><b>1. Security information and event management (SIEM)<\/b><\/h3>\n<p><a href=\"https:\/\/bulutistan.com\/blog\/siem-nedir\/\"><span style=\"font-weight: 400;\">SIEM<\/span><\/a><span style=\"font-weight: 400;\">, bir i\u015fletme i\u00e7indeki tehditleri alg\u0131lamak ve bunlara yan\u0131t vermek i\u00e7in kullan\u0131lan bir siber g\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fcd\u00fcr. G\u00fcvenlik analistleri, s\u00fcrekli izleme, tehdit av\u0131 ve olay incelemesi ve m\u00fcdahalesi gibi geli\u015fmi\u015f siber g\u00fcvenlik kullan\u0131m durumlar\u0131n\u0131 ele almak i\u00e7in SIEM \u00e7\u00f6z\u00fcmlerini kullanabilir.<\/span><\/p>\n<h3 id=\"2-uc-nokta-guvenligi\"><b>2. U\u00e7 nokta g\u00fcvenli\u011fi<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">U\u00e7 nokta g\u00fcvenli\u011fi, diz\u00fcst\u00fc bilgisayarlar, sunucular ve mobil cihazlar gibi bir a\u011fa ba\u011flanan cihazlar\u0131 koruma uygulamas\u0131d\u0131r. \u0130deal u\u00e7 nokta g\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fc, fidye yaz\u0131l\u0131mlar\u0131n\u0131 ve k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131 \u00f6nler ve geli\u015fmi\u015f tehditleri alg\u0131lar.<\/span><\/p>\n<h3 id=\"3-uygulama-guvenligi\"><b>3. Uygulama G\u00fcvenli\u011fi<\/b><\/h3>\n<p><a href=\"https:\/\/bulutistan.com\/blog\/uygulama-guvenligi-application-security\/\"><span style=\"font-weight: 400;\">Uygulama g\u00fcvenli\u011fi<\/span><\/a><span style=\"font-weight: 400;\">, uygulama i\u00e7indeki verilerin veya kodun \u00e7al\u0131nmas\u0131n\u0131 veya ele ge\u00e7irilmesini \u00f6nlemek i\u00e7in uygulamalar taraf\u0131ndan kullan\u0131lan g\u00fcvenli\u011fi tan\u0131mlar. Bu g\u00fcvenlik sistemleri, uygulama geli\u015ftirme s\u0131ras\u0131nda uygulan\u0131r.<\/span><\/p>\n<h3 id=\"4-bulut-guvenligi\"><b>4. Bulut G\u00fcvenli\u011fi<\/b><\/h3>\n<p><a href=\"https:\/\/bulutistan.com\/blog\/bulut-guvenligi-nedir\/\"><span style=\"font-weight: 400;\">Bulut g\u00fcvenli\u011fi<\/span><\/a><span style=\"font-weight: 400;\">, bulut teknolojilerini yanl\u0131\u015f yap\u0131land\u0131rmalardan ve ihlallerden koruma uygulamas\u0131d\u0131r. Do\u011fru bulut g\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fc, bulut duru\u015funa ili\u015fkin zengin g\u00f6r\u00fcn\u00fcrl\u00fck sa\u011flayarak bulut da\u011f\u0131t\u0131mlar\u0131n\u0131 korur. \u00d6nleme, alg\u0131lama ve yan\u0131t verme \u00f6zellikleriyle bulut i\u015f y\u00fcklerini tek bir entegre \u00e7\u00f6z\u00fcmde korur.<\/span><\/p>\n<h3 id=\"5-altyapi-guvenligi\"><b>5. Altyap\u0131 G\u00fcvenli\u011fi<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Kritik altyap\u0131 g\u00fcvenli\u011fi, CISA&#8217;ya g\u00f6re, yetersizlikleri fiziksel, ekonomik ve g\u00fcvenli\u011fimiz \u00fczerinde zay\u0131flat\u0131c\u0131 bir etkiye sahip olacak kadar toplum i\u00e7in hayati \u00f6nem ta\u015f\u0131yan fiziksel ve siber sistemleri tan\u0131mlar.<\/span><\/p>\n<h3 id=\"6-nesnelerin-interneti-iot-guvenligi\"><b>6. Nesnelerin \u0130nterneti (IoT) G\u00fcvenli\u011fi<\/b><\/h3>\n<p><a href=\"https:\/\/bulutistan.com\/blog\/nesnelerin-interneti-iot-nedir\/#:~:text=IoT%20(Internet%20of%20Things)%20kavram%C4%B1n%C4%B1n,ileti%C5%9Fim%20halinde%20olmas%C4%B1%20anlam%C4%B1na%20geliyor.\"><span style=\"font-weight: 400;\">IoT<\/span><\/a><span style=\"font-weight: 400;\">, herhangi bir cihaz\u0131 internete ve di\u011fer ba\u011fl\u0131 cihazlara ba\u011flama konseptidir. Bu cihazlar aras\u0131nda; sens\u00f6rler, televizyonlar, y\u00f6nlendiriciler, yaz\u0131c\u0131lar ve say\u0131s\u0131z di\u011fer ev a\u011f\u0131 cihazlar\u0131 bulunur. Bu cihazlar\u0131n g\u00fcvenli\u011fini sa\u011flamak \u00f6nemlidir. Bloomberg taraf\u0131ndan yap\u0131lan bir ara\u015ft\u0131rmaya g\u00f6re g\u00fcvenlik, yayg\u0131n IoT kullan\u0131m\u0131n\u0131n \u00f6n\u00fcndeki en b\u00fcy\u00fck engellerden biridir.<\/span><\/p>\n<h3 id=\"7-ag-guvenligi\"><b>7. A\u011f G\u00fcvenli\u011fi<\/b><\/h3>\n<p><a href=\"https:\/\/bulutistan.com\/blog\/ag-guvenligi-network-security\/\"><span style=\"font-weight: 400;\">A\u011f g\u00fcvenli\u011fi<\/span><\/a><span style=\"font-weight: 400;\">, a\u011f altyap\u0131s\u0131na odaklan\u0131r. Geleneksel olarak, g\u00fcvenlik duvarlar\u0131, sald\u0131r\u0131 \u00f6nleme\/tespit sistemleri, a\u011f b\u00f6l\u00fcmleme, VPN&#8217;ler ve di\u011fer \u00e7\u00f6z\u00fcmler dahil (ancak bunlarla s\u0131n\u0131rl\u0131 olmamak \u00fczere) bir dizi farkl\u0131 taktik ve stratejiyi birle\u015ftirir.<\/span><\/p>\n<h3 id=\"8-guvenlik-duzenlemesi-otomasyonu-ve-yaniti-soar\"><b>8. G\u00fcvenlik d\u00fczenlemesi, otomasyonu ve yan\u0131t\u0131 (SOAR)<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">G\u00fcvenlik orkestrasyonu, otomasyonu ve m\u00fcdahalesi (SOAR), g\u00fcvenlik ekiplerinin i\u015fletmelerin siber sald\u0131r\u0131lara ve olaylara verdi\u011fi yan\u0131t\u0131 standartla\u015ft\u0131rmas\u0131na ve kolayla\u015ft\u0131rmas\u0131na olanak tan\u0131r. SOAR, g\u00fcvenlik operasyonlar\u0131 merkezi (SOC) i\u00e7indeki ve d\u0131\u015f\u0131ndaki i\u015f ak\u0131\u015flar\u0131n\u0131 optimize ederek analistlerin \u00e7abalar\u0131n\u0131 i\u015fletmelerin ekosistemini korumaya odaklamas\u0131na olanak tan\u0131r.<\/span><\/p>\n<h3 id=\"9-iot-guvenligi\"><b>9. IoT g\u00fcvenli\u011fi<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Bilgisayar korsanlar\u0131, bazen a\u011fa ba\u011fl\u0131 belirli fiziksel cihazlar\u0131 hedef al\u0131r. Bu cihazlar; arabalar, g\u00fcvenlik kameralar\u0131 ve ak\u0131ll\u0131 buzdolaplar\u0131 gibi WiFi \u00f6zellikli cihazlar\u0131 i\u00e7erir. Nesnelerin \u0130nterneti (IoT) g\u00fcvenli\u011fi, bu cihazlar\u0131n a\u011fa tehdit veya g\u00fcvenlik a\u00e7\u0131klar\u0131 getirmemesini sa\u011flayan siber g\u00fcvenlik uygulamalar\u0131d\u0131r.<\/span><\/p>\n<h3 id=\"10-tehdit-istihbarati\"><b>10. Tehdit istihbarat\u0131<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Tehdit istihbarat\u0131, bilgisayar korsanlar\u0131n\u0131n taktik ve hedefleri hakk\u0131nda i\u00e7g\u00f6r\u00fc sa\u011flayan toplanan verileri analiz ederek g\u00fcvenlik ekiplerinin siber sald\u0131r\u0131lara kar\u015f\u0131 koruma sa\u011flamas\u0131na yard\u0131mc\u0131 olur. Tehdit istihbarat\u0131 sayesinde ekipler, bilgisayar korsanlar\u0131n\u0131n faaliyet kal\u0131plar\u0131n\u0131 belirleyebilir ve i\u015fletmeleri i\u00e7in uygun savunma stratejileri olu\u015fturabilir.<\/span><\/p>\n<h3 id=\"11-kimlik-ve-erisim-yonetimi\"><b>11. Kimlik ve eri\u015fim y\u00f6netimi<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Kimlik ve eri\u015fim y\u00f6netimi (genellikle <\/span><a href=\"https:\/\/bulutistan.com\/blog\/iam-identity-access-management\/\"><span style=\"font-weight: 400;\">IAM<\/span><\/a><span style=\"font-weight: 400;\"> olarak bilinir), dijital kimlikleri ve kullan\u0131c\u0131 eri\u015fimini y\u00f6neten \u00e7er\u00e7eve ve teknolojilerdir. IAM, iki fakt\u00f6rl\u00fc veya \u00e7ok fakt\u00f6rl\u00fc kimlik do\u011frulama, ayr\u0131cal\u0131kl\u0131 eri\u015fim y\u00f6netimi ve bir sistem veya platform i\u00e7inde eri\u015fim seviyeleri atama gibi \u015feyleri i\u00e7erir. \u0130\u015fletmeler, IAM uygulayarak oturum a\u00e7ma i\u015flemlerinin g\u00fcvenli oldu\u011fundan ve hassas bilgilere yaln\u0131zca do\u011fru ki\u015filerin eri\u015febildi\u011finden emin olabilir.<\/span><\/p>\n<h3 id=\"12-sifir-guven-zero-trust\"><b>12. S\u0131f\u0131r g\u00fcven (Zero trust)<\/b><\/h3>\n<p><a href=\"https:\/\/bulutistan.com\/blog\/zero-trust-guvenlik-modeli-nedir-avantajlari-nelerdir\/\"><span style=\"font-weight: 400;\">S\u0131f\u0131r g\u00fcven<\/span><\/a><span style=\"font-weight: 400;\">, kim olursa olsun t\u00fcm kullan\u0131c\u0131lar\u0131n verilere, uygulamalara ve di\u011fer sistemlere eri\u015fmeden \u00f6nce kimliklerinin do\u011frulanmas\u0131n\u0131 gerektiren bir siber g\u00fcvenlik \u00e7er\u00e7evesidir. S\u0131f\u0131r g\u00fcven, g\u00fcn\u00fcm\u00fcz\u00fcn da\u011f\u0131t\u0131lm\u0131\u015f i\u015f g\u00fcc\u00fc nedeniyle olduk\u00e7a \u00f6nemlidir. Ak\u0131ll\u0131 telefonlar\u0131ndan, diz\u00fcst\u00fc bilgisayarlar\u0131ndan ve di\u011fer cihazlar\u0131ndan \u00e7al\u0131\u015fan uzaktaki \u00e7al\u0131\u015fanlar\u0131 hesaba katar.<\/span><\/p>\n<h3 id=\"13-mobil-guvenlik\"><b>13. Mobil g\u00fcvenlik<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Mobil g\u00fcvenlik, diz\u00fcst\u00fc bilgisayarlar, ak\u0131ll\u0131 telefonlar ve tabletler gibi mobil cihazlar\u0131n g\u00fcvenli\u011fini sa\u011flamakla ilgilenen bir siber g\u00fcvenlik t\u00fcr\u00fcd\u00fcr. \u0130\u015f yerinde mobil kullan\u0131m\u0131n\u0131n artmas\u0131yla birlikte mobil g\u00fcvenlik giderek daha \u00f6nemli hale gelmi\u015ftir.<\/span><\/p>\n<h2 id=\"siber-guvenlik-riski-turleri-nelerdir\"><b>Siber G\u00fcvenlik Riski T\u00fcrleri Nelerdir?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">En yayg\u0131n ve maliyetli g\u00fcvenlik riskleri a\u015fa\u011f\u0131dakileri i\u00e7erir:<\/span><\/p>\n<h3 id=\"1-hassas-verilerin-kaybi\"><b>1. Hassas verilerin kayb\u0131<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Hassas veriler, a\u011f\u0131n\u0131zda bulunan bir bilgisayar korsan\u0131 i\u00e7in de\u011ferli olan her \u015feyi i\u00e7erebilir: ticari s\u0131rlar ve fikri m\u00fclkiyet, dahili belgeler ve e-postalar, sosyal g\u00fcvenlik ve kredi kart\u0131 numaralar\u0131 gibi \u00e7al\u0131\u015fan ve m\u00fc\u015fteri bilgilerinin yan\u0131 s\u0131ra hasta ve t\u0131bbi veriler. Risk, veri kayb\u0131ndan kaynaklanan y\u00fck\u00fcml\u00fcl\u00fcklere ek olarak uyum cezalar\u0131n\u0131 ve bir ihlalle ili\u015fkili di\u011fer cezalar\u0131 da i\u00e7erir.<\/span><\/p>\n<h3 id=\"2-guvenligi-ihlal-edilmis-sistemler-ve-bilgi-islem-kaynaklari\"><b>2. G\u00fcvenli\u011fi ihlal edilmi\u015f sistemler ve bilgi i\u015flem kaynaklar\u0131<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Bir i\u015fletmenin sistemlerine k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m bula\u015fmas\u0131, i\u015fletmenizi do\u011frudan bilgisayar korsanlar\u0131n\u0131n hizmetine sokar.<\/span><\/p>\n<h3 id=\"3-dogrudan-mali-kayip\"><b>3. Do\u011frudan mali kay\u0131p<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Ele ge\u00e7irilmi\u015f bir sistem, bir bilgisayar korsan\u0131n\u0131n bir i\u015fletmenin mali hesaplar\u0131na eri\u015fmesine olanak tan\u0131yarak \u00e7ok b\u00fcy\u00fck ve mali a\u00e7\u0131dan y\u0131k\u0131c\u0131 bir g\u00fcvenlik riski olu\u015fturur.<\/span><\/p>\n<h2 id=\"en-yaygin-siber-saldiri-turleri\"><b>En Yayg\u0131n Siber Sald\u0131r\u0131 T\u00fcrleri<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">En yayg\u0131n siber sald\u0131r\u0131 t\u00fcrlerinden baz\u0131lar\u0131 a\u015fa\u011f\u0131dakileri i\u00e7erir:<\/span><\/p>\n<h3 id=\"1-kimlik-avi-saldirilari-phishing-attacks\"><b>1. Kimlik Av\u0131 Sald\u0131r\u0131lar\u0131 (Phishing Attacks)<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Kimlik av\u0131, kullan\u0131c\u0131lar\u0131 k\u00f6t\u00fc ama\u00e7l\u0131 ba\u011flant\u0131 veya ekleri t\u0131klamalar\u0131 i\u00e7in kand\u0131rmay\u0131 i\u00e7eren bir siber sald\u0131r\u0131 t\u00fcr\u00fcd\u00fcr. Oturum a\u00e7ma kimlik bilgileri veya finansal veriler gibi hassas bilgilerin \u00e7al\u0131nmas\u0131na neden olabilir.<\/span><\/p>\n<h3 id=\"2-kotu-amacli-yazilim-saldirilari-malware-attacks\"><b>2. K\u00f6t\u00fc Ama\u00e7l\u0131 Yaz\u0131l\u0131m Sald\u0131r\u0131lar\u0131 (Malware Attacks)<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m, bilgisayarlar ve cihazlara bula\u015fabilen bir t\u00fcr k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131md\u0131r. Bu sald\u0131r\u0131lar sayesinde bilgisayar korsanlar\u0131, bilgileri \u00e7alabilir, cihazlar\u0131 ele ge\u00e7irebilir veya di\u011fer sistemlere siber sald\u0131r\u0131lar ba\u015flatabilir.<\/span><\/p>\n<h3 id=\"3-hizmet-reddi-saldirilari-denial-of-service-attacks\"><b>3. Hizmet Reddi Sald\u0131r\u0131lar\u0131 (Denial-of-service Attacks)<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Hizmet reddi sald\u0131r\u0131s\u0131, kullan\u0131c\u0131lar\u0131n bir sisteme veya hizmete eri\u015fmesini engelleyen bir sald\u0131r\u0131 t\u00fcr\u00fcd\u00fcr. Bu, sistemi trafik veya isteklerle doldurarak veya art\u0131k d\u00fczg\u00fcn \u00e7al\u0131\u015famayacak \u015fekilde sisteme zarar vererek yap\u0131labilir.<\/span><\/p>\n<h3 id=\"4-fidye-yazilim-saldirilari-ransomware-attacks\"><b>4. Fidye Yaz\u0131l\u0131m Sald\u0131r\u0131lar\u0131 (Ransomware Attacks)<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Fidye yaz\u0131l\u0131m\u0131, dosya veya sistemleri \u015fifreleyen ve bunlar\u0131n \u015fifresini \u00e7\u00f6zmek i\u00e7in fidye talep eden k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131md\u0131r. Temel verilerin kaybolmas\u0131na veya bir sistemin tamamen kapanmas\u0131na neden olabilir.<\/span><\/p>\n<h3 id=\"5-ortadaki-adam-mitm-saldirilari\"><b>5. Ortadaki Adam (MitM) Sald\u0131r\u0131lar\u0131<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Bir MitM sald\u0131r\u0131s\u0131, bir bilgisayar korsan\u0131n\u0131n iki taraf aras\u0131ndaki ileti\u015fimi engelledi\u011fi bir siber sald\u0131r\u0131 t\u00fcr\u00fcd\u00fcr. Bu, bir a\u011f ba\u011flant\u0131s\u0131n\u0131 dinleyerek veya trafi\u011fi k\u00f6t\u00fc ama\u00e7l\u0131 bir sunucuya y\u00f6nlendirerek yap\u0131labilir.<\/span><\/p>\n<h3 id=\"6-sql-enjeksiyonu\"><b>6. SQL Enjeksiyonu<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">SQL enjeksiyon sald\u0131r\u0131s\u0131, veri taban\u0131na k\u00f6t\u00fc ama\u00e7l\u0131 SQL kodu enjekte etmek i\u00e7in web uygulamalar\u0131ndaki g\u00fcvenlik a\u00e7\u0131klar\u0131ndan yararlanan bir siber sald\u0131r\u0131 t\u00fcr\u00fcd\u00fcr. Bu kod, veri taban\u0131ndaki verileri g\u00f6r\u00fcnt\u00fcleyebilir, silebilir veya de\u011fi\u015ftirebilir. SQL enjeksiyon sald\u0131r\u0131lar\u0131 ayr\u0131ca sunucunun kontrol\u00fcn\u00fc ele ge\u00e7irebilir veya ba\u015fka k\u00f6t\u00fc niyetli faaliyetler ger\u00e7ekle\u015ftirebilir.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Siber g\u00fcvenlik, i\u015fletmenizi bu ve bunun gibi di\u011fer tehditlerden korumaya yard\u0131mc\u0131 olur. Risklerin fark\u0131nda olarak ve bunlar\u0131 hafifletmek i\u00e7in ad\u0131mlar atarak verilerinizi ve sistemlerinizi g\u00fcvende tutmaya yard\u0131mc\u0131 olabilirsiniz.\u00a0<\/span><\/p>\n<h2 id=\"isletmenizi-siber-suclara-karsi-nasil-korursunuz\"><b>\u0130\u015fletmenizi Siber Su\u00e7lara Kar\u015f\u0131 Nas\u0131l Korursunuz?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">\u0130\u015fletmenizi siber su\u00e7lara kar\u015f\u0131 korumak i\u00e7in \u00e7e\u015fitli \u00f6nlemler alman\u0131z gerekir. \u0130lk olarak, sa\u011flam bir siber g\u00fcvenlik politikan\u0131z olmal\u0131d\u0131r. Bu politika; veri \u015fifreleme, g\u00fcvenlik duvarlar\u0131 ve izinsiz giri\u015f tespit sistemlerini i\u00e7ermelidir.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Ek olarak, \u00e7al\u0131\u015fanlar\u0131n\u0131z\u0131 olas\u0131 siber tehditleri tespit etme ve raporlama konusunda e\u011fitmeniz gerekir.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Son olarak, herhangi bir \u015f\u00fcpheli etkinlik i\u00e7in a\u011f\u0131n\u0131z\u0131 d\u00fczenli olarak izlemeniz \u015fartt\u0131r.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Bu ad\u0131mlar\u0131 atarak i\u015fletmenizin siber su\u00e7 hedefi olma \u015fans\u0131n\u0131 \u00f6nemli \u00f6l\u00e7\u00fcde azaltm\u0131\u015f olursunuz.<\/span><\/p>\n<h2 id=\"bireyler-verilerini-siber-saldirilardan-nasil-daha-iyi-koruyabilir\"><b>Bireyler Verilerini Siber Sald\u0131r\u0131lardan Nas\u0131l Daha \u0130yi Koruyabilir?<\/b><b>\u00a0<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">E\u011fer bireyler verilerini siber sald\u0131r\u0131lara kar\u015f\u0131 korumazsa, bu bilgiler kaybolabilir veya yok edilebilir. Bu da ciddi sorunlara ve hatta finansal zorluklara neden olabilir.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Bireylerin verilerini siber sald\u0131r\u0131lara kar\u015f\u0131 korumada daha iyi hale gelmesinin baz\u0131 yollar\u0131 a\u015fa\u011f\u0131dakileri i\u00e7erir:<\/span><\/p>\n<h3 id=\"1-guclu-parolalar-kullanin\"><b>1. G\u00fc\u00e7l\u00fc Parolalar Kullan\u0131n<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Parolalar en az sekiz karakter uzunlu\u011funda olmal\u0131 ve b\u00fcy\u00fck ve k\u00fc\u00e7\u00fck harfler, say\u0131lar ve simgelerden olu\u015fan bir kombinasyon i\u00e7ermelidir. Bu noktada ad\u0131n\u0131z veya do\u011fum tarihiniz gibi kolayca tahmin edilebilecek kelimeler kullanmaktan ka\u00e7\u0131nman\u0131z gerekir.<\/span><\/p>\n<h3 id=\"2-parola-yoneticisi-kullanin\"><b>2. Parola Y\u00f6neticisi Kullan\u0131n<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Parola y\u00f6neticisi, parolalar\u0131n\u0131z\u0131 takip etmenize ve g\u00fc\u00e7l\u00fc parolalar olu\u015fturman\u0131za yard\u0131mc\u0131 olabilir.<\/span><\/p>\n<h3 id=\"3-parolalari-yeniden-kullanmayin\"><b>3. Parolalar\u0131 Yeniden Kullanmay\u0131n<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Parolalar\u0131 yeniden kullanmak, bilgisayar korsanlar\u0131n\u0131n hesaplar\u0131n\u0131za eri\u015fmesini kolayla\u015ft\u0131r\u0131r.<\/span><\/p>\n<h3 id=\"4-yaziliminizi-guncel-tutun\"><b>4. Yaz\u0131l\u0131m\u0131n\u0131z\u0131 G\u00fcncel Tutun<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Yaz\u0131l\u0131m g\u00fcncellemeleri genellikle verilerinizin korunmas\u0131na yard\u0131mc\u0131 olabilecek g\u00fcvenlik yamalar\u0131 i\u00e7erir.<\/span><\/p>\n<h3 id=\"5-iki-faktorlu-kimlik-dogrulamayi-kullanin\"><b>5. \u0130ki Fakt\u00f6rl\u00fc Kimlik Do\u011frulamay\u0131 Kullan\u0131n<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">\u0130ki fakt\u00f6rl\u00fc kimlik do\u011frulama, parolan\u0131za ek olarak telefonunuzdan veya e-posta\u2019n\u0131zdan bir kod girmenizi gerektirerek ekstra bir g\u00fcvenlik katman\u0131 eklemenizi sa\u011flar.<\/span><\/p>\n<h3 id=\"6-kimlik-avi-dolandiriciliklarina-karsi-dikkatli-olun\"><b>6. Kimlik Av\u0131 Doland\u0131r\u0131c\u0131l\u0131klar\u0131na Kar\u015f\u0131 Dikkatli Olun<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Kimlik av\u0131 doland\u0131r\u0131c\u0131l\u0131klar\u0131, ki\u015fisel bilgilerinizi girmeniz i\u00e7in sizi kand\u0131rmak \u00fczere me\u015fru bir \u015firket gibi g\u00f6r\u00fcnen e-posta\u2019lar veya web siteleri arac\u0131l\u0131\u011f\u0131 ile yap\u0131l\u0131r. Bu y\u00fczden e-posta\u2019lardaki eklere t\u0131klarken ya da herhangi bir sitede bir form doldururken dikkatli olman\u0131z gerekir.<\/span><\/p>\n<h3 id=\"7-verilerinizi-yedekleyin\"><b>7. Verilerinizi Yedekleyin<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Verilerinizi yedeklemek, bilgisayar\u0131n\u0131z kaybolsa veya verilriniz \u00e7al\u0131nsa bile verilere eri\u015febilmenizi sa\u011flamaya yard\u0131mc\u0131 olur.<\/span><\/p>\n<h2 id=\"siber-guvenlik-savunmalari\"><b>Siber G\u00fcvenlik Savunmalar\u0131<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">\u0130\u015fletmelerin uygulayabilece\u011fi en etkili siber g\u00fcvenlik ara\u00e7lar\u0131 veya yeni nesil teknolojiler a\u015fa\u011f\u0131daki \u015fekildedir:<\/span><\/p>\n<h3 id=\"1-guvenlik-duvari\"><b>1. G\u00fcvenlik Duvar\u0131<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">G\u00fcvenlik duvar\u0131, herhangi bir say\u0131da siber sald\u0131r\u0131ya kar\u015f\u0131 ilk savunma hatt\u0131d\u0131r, a\u011f trafi\u011fini izleyen ve i\u015fletme ile internet aras\u0131nda bir bariyer g\u00f6revi g\u00f6ren bir a\u011f g\u00fcvenlik sistemidir.<\/span><\/p>\n<h3 id=\"2-kotu-amacli-yazilimdan-koruma\"><b>2. K\u00f6t\u00fc Ama\u00e7l\u0131 Yaz\u0131l\u0131mdan Koruma<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Bu paketler (genellikle vir\u00fcsten koruma yaz\u0131l\u0131m\u0131 olarak bilinir) genellikle istemci bilgisayarlarda bulunur ve truva atlar\u0131 ve di\u011fer APT&#8217;ler gibi k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131n genellikle k\u00f6t\u00fc ama\u00e7l\u0131 web siteleri \u00fczerinden y\u00fcklenmesini \u00f6nler.<\/span><\/p>\n<h3 id=\"3-kimlik-dogrulama\"><b>3. Kimlik Do\u011frulama<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Bu yaz\u0131l\u0131m, ola\u011fand\u0131\u015f\u0131 davran\u0131\u015f kal\u0131plar\u0131n\u0131 alg\u0131lamak ve a\u011f\u0131n\u0131za eri\u015fen ki\u015filerin iddia ettikleri ki\u015filer oldu\u011fundan emin olmak i\u00e7in ister iki fakt\u00f6rl\u00fc kimlik do\u011frulama ister \u00e7ok fakt\u00f6rl\u00fc kimlik do\u011frulama olsun, yeni nesil kimlik do\u011frulama teknolojilerini kullan\u0131r.<\/span><\/p>\n<h3 id=\"4-sifreleme\"><b>4. \u015eifreleme<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Bir siber sald\u0131rgan\u0131n a\u011f\u0131 ihlal etmesi durumunda i\u015fletmenizin verilerini koruman\u0131n en iyi yolu, verilerin hem depolama hem de aktar\u0131m s\u0131ras\u0131nda \u015fifrelenmesini sa\u011flamakt\u0131r.<\/span><\/p>\n<h3 id=\"5-sizma-testi-guvenlik-acigi-taramasi\"><b>5. S\u0131zma Testi\/G\u00fcvenlik A\u00e7\u0131\u011f\u0131 Taramas\u0131<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Bu ara\u00e7lar, bilinen en son istismarlar\u0131 kullanarak ve sistemlerinizin zay\u0131f oldu\u011fu noktalar konusunda sizi uyararak a\u011f\u0131n\u0131z\u0131 g\u00fcvenlik a\u00e7\u0131klar\u0131na kar\u015f\u0131 tarar.<\/span><\/p>\n<h3 id=\"6-izinsiz-giris-tespit-sistemleri\"><b>6. \u0130zinsiz Giri\u015f Tespit Sistemleri<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">\u0130zinsiz Giri\u015f Tespit Sistemleri, k\u00f6t\u00fc niyetli davran\u0131\u015flar\u0131 ger\u00e7ek zamanl\u0131 olarak izler ve ihlalleri siber g\u00fcvenlik uzmanlar\u0131na bildirir.<\/span><\/p>\n<h3 id=\"7-ag-izleme-araclari\"><b>7. A\u011f \u0130zleme Ara\u00e7lar\u0131<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">G\u00fcvenlik ihlallerine ek olarak a\u011f izleme, cihaz sa\u011fl\u0131\u011f\u0131 i\u00e7in testler yapar. Bu, k\u00f6t\u00fc ama\u00e7l\u0131 trafik art\u0131\u015f\u0131 veya basit cihaz ar\u0131zas\u0131 nedeniyle atfedilen kapal\u0131 kalma s\u00fcresinin \u00f6nlenmesine yard\u0131mc\u0131 olabilir.<\/span><\/p>\n<h2 id=\"isletmeler-siber-guvenlik-savunmalari-olusturmaya-nasil-baslayabilir\"><b>\u0130\u015fletmeler Siber G\u00fcvenlik Savunmalar\u0131 Olu\u015fturmaya Nas\u0131l Ba\u015flayabilir?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">\u0130\u015fletmeler, g\u00fcvenlik duru\u015funuzu geli\u015ftirmeye ve g\u00fcvenlik olaylar\u0131n\u0131n say\u0131s\u0131n\u0131 azaltmaya y\u00f6nelik tavsiyelere uyarak siber g\u00fcvenlik savunmalar\u0131 olu\u015fturmaya ba\u015flayabilir.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u0130lk olarak nerede durdu\u011funuzu tam olarak anlamak i\u00e7in mevcut donan\u0131m, yaz\u0131l\u0131m ve hizmet ekosisteminizi denetlemeniz gerekir. \u00d6zellikle siber sald\u0131r\u0131 riski en y\u00fcksek olan sistemleri (bulut sa\u011flay\u0131c\u0131lar gibi \u00fc\u00e7\u00fcnc\u00fc taraf hizmetleri dahil) korumak i\u00e7in olu\u015fturulmu\u015f ilkeler olu\u015fturman\u0131z, ard\u0131ndan bu sistemleri korumak i\u00e7in gereken uygun ara\u00e7lar\u0131 edinmeniz gerekir.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Uygulamadan sonra performans\u0131 izlemek i\u00e7in \u00f6l\u00e7\u00fcmler geli\u015ftirmeniz ve personelin politika beklentileriniz ve yukar\u0131da belirtilen siber g\u00fcvenlik ara\u00e7lar\u0131 konusunda uygun \u015fekilde e\u011fitildi\u011finden emin olman\u0131z \u015fartt\u0131r.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"Siber g\u00fcvenlik yani cyber security, internete ba\u011fl\u0131 sistemleri \u00e7evrimi\u00e7i tehditlerden korumay\u0131 ifade eder. Bunlardan baz\u0131lar\u0131 i\u015f a\u00e7\u0131s\u0131ndan olduk\u00e7a&hellip;\n","protected":false},"author":1,"featured_media":4032,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"csco_singular_sidebar":"","csco_page_header_type":"","csco_appearance_grid":"","csco_page_load_nextpost":"","csco_post_video_location":[],"csco_post_video_location_hash":"","csco_post_video_url":"","csco_post_video_bg_start_time":0,"csco_post_video_bg_end_time":0},"categories":[11],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Siber G\u00fcvenlik Nedir? - Bulutistan Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bulutistan.com\/blog\/siber-guvenlik-nedir\/\" \/>\n<meta property=\"og:locale\" content=\"tr_TR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Siber G\u00fcvenlik Nedir? - Bulutistan Blog\" \/>\n<meta property=\"og:description\" content=\"Siber g\u00fcvenlik yani cyber security, internete ba\u011fl\u0131 sistemleri \u00e7evrimi\u00e7i tehditlerden korumay\u0131 ifade eder. Bunlardan baz\u0131lar\u0131 i\u015f a\u00e7\u0131s\u0131ndan olduk\u00e7a&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bulutistan.com\/blog\/siber-guvenlik-nedir\/\" \/>\n<meta property=\"og:site_name\" content=\"Bulutistan Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-18T07:38:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-20T10:15:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bulutistan.com\/blog\/wp-content\/uploads\/2023\/10\/siber-guvenlik-nedir.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bulutistan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Yazan:\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bulutistan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tahmini okuma s\u00fcresi\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 dakika\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/bulutistan.com\/blog\/siber-guvenlik-nedir\/\",\"url\":\"https:\/\/bulutistan.com\/blog\/siber-guvenlik-nedir\/\",\"name\":\"Siber G\u00fcvenlik Nedir? - Bulutistan Blog\",\"isPartOf\":{\"@id\":\"https:\/\/bulutistan.com\/blog\/#website\"},\"datePublished\":\"2023-10-18T07:38:43+00:00\",\"dateModified\":\"2024-01-20T10:15:00+00:00\",\"author\":{\"@id\":\"https:\/\/bulutistan.com\/blog\/#\/schema\/person\/06a4312aff9f5a9fc23e25fe7a27076e\"},\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/bulutistan.com\/blog\/siber-guvenlik-nedir\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/bulutistan.com\/blog\/#website\",\"url\":\"https:\/\/bulutistan.com\/blog\/\",\"name\":\"Bulutistan Blog\",\"description\":\"Teknolojide Yol Arkada\u015f\u0131n\u0131z\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/bulutistan.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"tr\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/bulutistan.com\/blog\/#\/schema\/person\/06a4312aff9f5a9fc23e25fe7a27076e\",\"name\":\"Bulutistan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/bulutistan.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0b09f693645c754f52af6ce46e1749e1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0b09f693645c754f52af6ce46e1749e1?s=96&d=mm&r=g\",\"caption\":\"Bulutistan\"},\"sameAs\":[\"https:\/\/bulutistan.com\/blog\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Siber G\u00fcvenlik Nedir? - Bulutistan Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bulutistan.com\/blog\/siber-guvenlik-nedir\/","og_locale":"tr_TR","og_type":"article","og_title":"Siber G\u00fcvenlik Nedir? - Bulutistan Blog","og_description":"Siber g\u00fcvenlik yani cyber security, internete ba\u011fl\u0131 sistemleri \u00e7evrimi\u00e7i tehditlerden korumay\u0131 ifade eder. Bunlardan baz\u0131lar\u0131 i\u015f a\u00e7\u0131s\u0131ndan olduk\u00e7a&hellip;","og_url":"https:\/\/bulutistan.com\/blog\/siber-guvenlik-nedir\/","og_site_name":"Bulutistan Blog","article_published_time":"2023-10-18T07:38:43+00:00","article_modified_time":"2024-01-20T10:15:00+00:00","og_image":[{"width":1000,"height":500,"url":"https:\/\/bulutistan.com\/blog\/wp-content\/uploads\/2023\/10\/siber-guvenlik-nedir.jpeg","type":"image\/jpeg"}],"author":"Bulutistan","twitter_card":"summary_large_image","twitter_misc":{"Yazan:":"Bulutistan","Tahmini okuma s\u00fcresi":"12 dakika"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/bulutistan.com\/blog\/siber-guvenlik-nedir\/","url":"https:\/\/bulutistan.com\/blog\/siber-guvenlik-nedir\/","name":"Siber G\u00fcvenlik Nedir? - Bulutistan Blog","isPartOf":{"@id":"https:\/\/bulutistan.com\/blog\/#website"},"datePublished":"2023-10-18T07:38:43+00:00","dateModified":"2024-01-20T10:15:00+00:00","author":{"@id":"https:\/\/bulutistan.com\/blog\/#\/schema\/person\/06a4312aff9f5a9fc23e25fe7a27076e"},"inLanguage":"tr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bulutistan.com\/blog\/siber-guvenlik-nedir\/"]}]},{"@type":"WebSite","@id":"https:\/\/bulutistan.com\/blog\/#website","url":"https:\/\/bulutistan.com\/blog\/","name":"Bulutistan Blog","description":"Teknolojide Yol Arkada\u015f\u0131n\u0131z","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bulutistan.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"tr"},{"@type":"Person","@id":"https:\/\/bulutistan.com\/blog\/#\/schema\/person\/06a4312aff9f5a9fc23e25fe7a27076e","name":"Bulutistan","image":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/bulutistan.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0b09f693645c754f52af6ce46e1749e1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0b09f693645c754f52af6ce46e1749e1?s=96&d=mm&r=g","caption":"Bulutistan"},"sameAs":["https:\/\/bulutistan.com\/blog"]}]}},"_links":{"self":[{"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/posts\/4031"}],"collection":[{"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/comments?post=4031"}],"version-history":[{"count":4,"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/posts\/4031\/revisions"}],"predecessor-version":[{"id":4151,"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/posts\/4031\/revisions\/4151"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/media\/4032"}],"wp:attachment":[{"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/media?parent=4031"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/categories?post=4031"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bulutistan.com\/blog\/wp-json\/wp\/v2\/tags?post=4031"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}