{"id":2344,"date":"2022-06-03T12:25:29","date_gmt":"2022-06-03T09:25:29","guid":{"rendered":"https:\/\/uzmanposta.com\/blog\/?p=2344"},"modified":"2023-11-04T09:41:45","modified_gmt":"2023-11-04T06:41:45","slug":"siber-guvenlik-nedir-veri-guvenligini-nasil-saglariz","status":"publish","type":"post","link":"https:\/\/uzmanposta.com\/blog\/siber-guvenlik-nedir-veri-guvenligini-nasil-saglariz\/","title":{"rendered":"Siber G\u00fcvenlik Nedir? Veri G\u00fcvenli\u011fini Nas\u0131l Sa\u011flar\u0131z?"},"content":{"rendered":"\n<p>Pandemi, kripto para birimi ve uzaktan \u00e7al\u0131\u015fmadaki art\u0131\u015f gibi kavramlar, bilgisayar korsanlar\u0131n\u0131n yararlanabilece\u011fi hedef a\u00e7\u0131s\u0131ndan zengin bir ortam yaratt\u0131\u011f\u0131 i\u00e7in siber su\u00e7lar\u0131n i\u015fletmelere verebilece\u011fi zararlar g\u00fcnden g\u00fcne art\u0131yor.<\/p>\n\n\n\n<p>Cybercrime Magazine taraf\u0131ndan yap\u0131lan bir ara\u015ft\u0131rmaya g\u00f6re, siber su\u00e7lar\u0131n 2025 y\u0131l\u0131na kadar d\u00fcnyaya y\u0131lda 10.5 trilyon dolara mal olaca\u011f\u0131 \u00f6ng\u00f6r\u00fcl\u00fcyor. Ayr\u0131ca, k\u00fcresel siber su\u00e7 maliyetlerinin \u00f6n\u00fcm\u00fczdeki d\u00f6rt y\u0131l i\u00e7inde her y\u0131l yakla\u015f\u0131k %15 oran\u0131nda artmas\u0131 bekleniyor.<\/p>\n\n\n\n<p>Tam da bu noktada siber g\u00fcvenlik, i\u015fletmeleri BT a\u011flar\u0131na ve varl\u0131klar\u0131na y\u00f6nelik hem d\u0131\u015f hem de i\u00e7 tehditlerden korumak i\u00e7in t\u00fcm h\u0131z\u0131yla \u00e7al\u0131\u015fmaya devam ediyor.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Siber G\u00fcvenlik Nedir?<\/h2>\n\n\n\n<p>Siber g\u00fcvenlik; bilgisayar sistemlerini, a\u011flar\u0131, verileri ve programlar\u0131 dijital yollarla sald\u0131r\u0131ya u\u011framaktan koruma s\u00fcrecidir. \u00c7o\u011fu durumda, siber sald\u0131r\u0131lar bilgilere eri\u015fmek, bilgileri de\u011fi\u015ftirmek veya yok etmek ya da kullan\u0131c\u0131lardan para s\u0131zd\u0131rmak i\u00e7in tasarlan\u0131r. Siber g\u00fcvenlik, t\u00fcm bilgi sistemleri genelinde kontrol sa\u011flamak i\u00e7in \u00e7e\u015fitli y\u00f6ntemler, teknolojiler ve s\u00fcre\u00e7ler kullan\u0131r. Bu sayede siber sald\u0131r\u0131 ve sisteme yetkisiz eri\u015fim riskleri en aza indirilir.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Siber G\u00fcvenlik Ne \u0130\u015fe Yarar?<\/h2>\n\n\n\n<p>Siber g\u00fcvenlik, verilere ve kurumsal\/ki\u015fisel varl\u0131klara yetkisiz eri\u015fimin \u00f6nlenmesine yard\u0131mc\u0131 olur.<\/p>\n\n\n\n<p>Siber g\u00fcvenli\u011fin amac\u0131, bilgisayar korsanlar\u0131 taraf\u0131ndan risk alt\u0131nda olmayan ki\u015fi ve i\u015fletmelere g\u00fcvenli ve emniyetli bir ortam sa\u011flamakt\u0131r.<\/p>\n\n\n\n<p>Bireysel d\u00fczeyde siber g\u00fcvenlik, bireyin ki\u015fisel varl\u0131klar\u0131n\u0131 ve bilgilerini korumay\u0131 ama\u00e7lar.<\/p>\n\n\n\n<p>Kurumsal d\u00fczeyde siber g\u00fcvenlik ise, bilgisayar sistemlerini, a\u011flar\u0131, bilgileri, ticari s\u0131rlar\u0131 yetkisiz eri\u015fime ve zarara kar\u015f\u0131 korumay\u0131 ama\u00e7lar.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Siber G\u00fcvenlik Nas\u0131l \u00c7al\u0131\u015f\u0131r?<\/h2>\n\n\n\n<p>Siber g\u00fcvenlik, bir i\u015fletme taraf\u0131ndan kullan\u0131lan t\u00fcm bilgisayarlar, a\u011flar ve programlar genelinde birden \u00e7ok koruma katman\u0131 sa\u011flamak \u00fczere tasarlan\u0131r. Potansiyel siber sald\u0131r\u0131lara kar\u015f\u0131 birle\u015fik bir savunma olu\u015fturmak i\u00e7in i\u015fin, \u00e7al\u0131\u015fanlar\u0131n, s\u00fcre\u00e7lerin ve teknolojinin birlikte sorunsuz \u00e7al\u0131\u015facak \u015fekilde tasarlanmas\u0131 \u00f6nemlidir. D\u00fczg\u00fcn \u00e7al\u0131\u015fan siber g\u00fcvenlik sistemleri, bir bilgisayar korsan\u0131 veya k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m taraf\u0131ndan istismar edilmeden \u00f6nce sistemdeki olas\u0131 zay\u0131fl\u0131klar\u0131 ve g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 tespit eder, ara\u015ft\u0131r\u0131r ve \u00e7\u00f6zer.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Siber G\u00fcvenli\u011fin Faydalar\u0131 Nelerdir?<\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"750\" height=\"375\" src=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/06\/siber-guvenligin-faydalari-nelerdir.png\" alt=\"Siber G\u00fcvenli\u011fin Faydalar\u0131 Nelerdir?\" class=\"wp-image-2362\" srcset=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/06\/siber-guvenligin-faydalari-nelerdir.png 750w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/06\/siber-guvenligin-faydalari-nelerdir-300x150.png 300w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/06\/siber-guvenligin-faydalari-nelerdir-360x180.png 360w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><\/figure><\/div>\n\n\n\n<p>Siber g\u00fcvenlik uygulamlar\u0131n\u0131n i\u015fletmelere \u00e7e\u015fitli faydalar\u0131 vard\u0131r. Bu faydalardan en \u00f6nemlileri a\u015fa\u011f\u0131daki \u015fekildedir:&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Veri h\u0131rs\u0131zl\u0131\u011f\u0131ndan korunma<\/h3>\n\n\n\n<p>Veri, muhtemelen bug\u00fcn var olan en de\u011ferli \u015feydir. Bu y\u00fczden kurumsal casusluktan toplu bilgisayar korsanl\u0131\u011f\u0131 olaylar\u0131na kadar, veri h\u0131rs\u0131zl\u0131\u011f\u0131n\u0131 \u00f6nlemek \u00e7ok \u00f6nemlidir. Tam da bu noktada siber g\u00fcvenlik, verilerin \u00e7al\u0131nmas\u0131n\u0131 ve yanl\u0131\u015f ellere ge\u00e7mesini \u00f6nleyen engellerin olu\u015fturulmas\u0131na yard\u0131mc\u0131 olur.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Geli\u015fmi\u015f mahremiyet<\/h3>\n\n\n\n<p>Y\u0131llar i\u00e7inde mahremiyet hem bireyler hem de i\u015fletmeler i\u00e7in b\u00fcy\u00fck bir endi\u015fe haline geldi. \u0130\u015fletmeler, rakiplerine kar\u015f\u0131 rekabet avantaj\u0131 elde etmek i\u00e7in gizlilik isterken, s\u0131radan insanlar kendilerini daha g\u00fcvenli hale getirdi\u011fi i\u00e7in mahremiyette daha \u00e7ok \u00f6nem vermeye ba\u015flad\u0131. Bu noktada siber g\u00fcvenlik, bilgisayar korsanlar\u0131n\u0131n verilerden uzak tutulmas\u0131n\u0131 sa\u011flayarak kullan\u0131c\u0131 ve i\u015fletme gizlili\u011fini koruman\u0131za yard\u0131mc\u0131 olabilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Azalt\u0131lm\u0131\u015f bilgisayar korsanl\u0131\u011f\u0131 olaylar\u0131<\/h3>\n\n\n\n<p>Bireysel ve ticari sistemler daha iyi korunursa, bilgisayar korsanlar\u0131n\u0131n bir giri\u015f noktas\u0131 bulmas\u0131 ve ard\u0131ndan bir sald\u0131r\u0131 ger\u00e7ekle\u015ftirmesi daha zor olacakt\u0131r.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Daha iyi sistem performans\u0131<\/h3>\n\n\n\n<p>Siber sald\u0131r\u0131lar bir\u00e7ok bi\u00e7imde olabilir. Sistemler bu tehditlerden daha iyi korundu\u011funda, k\u00f6t\u00fc ama\u00e7l\u0131 komut dosyalar\u0131 ve yaz\u0131l\u0131mlar sisteminizde bar\u0131namaz. Bu da sistem performans\u0131n\u0131 iyile\u015ftirilir.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Siber G\u00fcvenlik T\u00fcrleri Nelerdir?<\/h2>\n\n\n\n<p>Farkl\u0131 siber g\u00fcvenlik t\u00fcrleri a\u015fa\u011f\u0131dakileri i\u00e7erir:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Uygulama G\u00fcvenli\u011fi<\/h3>\n\n\n\n<p>Uygulama g\u00fcvenli\u011fi, bir dizi farkl\u0131 tehdide kar\u015f\u0131 koruma sa\u011flamak i\u00e7in i\u015f yaz\u0131l\u0131mlar\u0131 ve hizmetleri i\u00e7inde \u00e7e\u015fitli savunmalar\u0131n uygulanmas\u0131d\u0131r. Bu t\u00fcr siber g\u00fcvenlik, yetkisiz eri\u015fimi ve de\u011fi\u015fikli\u011fi en aza indirmek i\u00e7in g\u00fcvenli uygulamalar\u0131n tasarlanmas\u0131n\u0131 gerektirir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Veri G\u00fcvenli\u011fi<\/h3>\n\n\n\n<p>Veri g\u00fcvenli\u011fi, bilgilerin depolan\u0131rken ve aktar\u0131l\u0131rken g\u00fcvenli\u011fini sa\u011flamak i\u00e7in \u00f6zel olarak tasarlanm\u0131\u015f g\u00fc\u00e7l\u00fc veri depolama sistemlerinin uygulanmas\u0131n\u0131 i\u00e7erir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">A\u011f G\u00fcvenli\u011fi<\/h3>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/ag-guvenligi-nasil-saglanir\/\">A\u011f g\u00fcvenli\u011fi<\/a>, bir i\u015fletmenin a\u011f\u0131n\u0131 ve altyap\u0131s\u0131n\u0131 k\u00f6t\u00fcye kullan\u0131m, kesintiler ve yetkisiz eri\u015fimden korumak i\u00e7in \u00f6zel olarak tasarlanm\u0131\u015f donan\u0131m ve yaz\u0131l\u0131m sistemlerini uygulayarak bir i\u015fletmeyi hem d\u0131\u015f hem de i\u00e7 tehditlerden korumaya odaklan\u0131r.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Mobil G\u00fcvenlik<\/h3>\n\n\n\n<p>Cep telefonlar\u0131, diz\u00fcst\u00fc bilgisayarlar ve tabletler gibi mobil cihazlar\u0131 kullanan i\u015fletmeler, bu cihazlarda depolanan bilgileri bir dizi farkl\u0131 tehditten korumak i\u00e7in mobil g\u00fcvenlik \u00f6nlemleri kullan\u0131r.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Bulut G\u00fcvenli\u011fi<\/h3>\n\n\n\n<p>\u00c7o\u011fu bulut uygulamas\u0131 ve sistemi (AWS, Google, Microsoft vb.) kullan\u0131c\u0131lar\u0131 \u00e7e\u015fitli tehditlere kar\u015f\u0131 korumak i\u00e7in bulut g\u00fcvenlik \u00f6nlemleri kullan\u0131r.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\u200b\u200bSiber Sald\u0131r\u0131 Nedir?<\/h2>\n\n\n\n<p>Siber sald\u0131r\u0131lar, sisteme, a\u011flara ve verilere yetkisiz eri\u015fim sa\u011flama ve sald\u0131r\u0131ya u\u011frayan tarafa zarar verme giri\u015fimleridir.<\/p>\n\n\n\n<p>Siber sald\u0131r\u0131lar genel olarak finansal kazan\u00e7, sosyal veya politik motivasyonlar, k\u00f6t\u00fc \u015f\u00f6hret vb. ama\u00e7larla yap\u0131l\u0131r.<\/p>\n\n\n\n<p>Siber sald\u0131r\u0131lar cihazlar\u0131, bilgisayar sistemlerini ve hatta a\u011f\u0131n kendisini hedef alabilir. \u00c7o\u011fu durumda, bu cihazlar\u0131n dikkatli kullan\u0131m\u0131, bilgisayar korsanlar\u0131n\u0131n eri\u015fimini engellemenin en iyi yoludur.<\/p>\n\n\n\n<p>Siber sald\u0131r\u0131 \u00e7e\u015fitli nedenlerle yap\u0131labilir. Verilere eri\u015fimin engellenmesi, sabotaj, casusluk, sosyal m\u00fchendislik, sistem ve a\u011fa zarar verme, t\u00fcm\u00fc bir siber sald\u0131r\u0131n\u0131n ger\u00e7ekle\u015ftirilme nedenleridir.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Siber G\u00fcvenlik Tehdit T\u00fcrleri<\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"750\" height=\"375\" src=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/06\/siber-guvenlik-tehdit-turleri.png\" alt=\"Siber G\u00fcvenlik Tehdit T\u00fcrleri\" class=\"wp-image-2363\" srcset=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/06\/siber-guvenlik-tehdit-turleri.png 750w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/06\/siber-guvenlik-tehdit-turleri-300x150.png 300w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/06\/siber-guvenlik-tehdit-turleri-360x180.png 360w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><\/figure><\/div>\n\n\n\n<p>D\u00fczinelerce siber g\u00fcvenlik tehdidi t\u00fcr\u00fc vard\u0131r, ancak a\u015fa\u011f\u0131dakiler en yayg\u0131n olanlardan baz\u0131lar\u0131d\u0131r:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">DDoS Sald\u0131r\u0131s\u0131<\/h3>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/ddos\/\">DDoS<\/a> veya Da\u011f\u0131t\u0131lm\u0131\u015f Hizmet Reddi Sald\u0131r\u0131s\u0131, siber su\u00e7lular\u0131n \u00e7ok fazla trafik g\u00f6ndererek bir a\u011f\u0131 veya sunucular\u0131n\u0131 bunaltmas\u0131d\u0131r. Bu, a\u011f\u0131n ge\u00e7erli istekleri i\u015flemesini engeller ve t\u00fcm sistemi kullan\u0131lamaz hale getirir. \u0130\u015fletmelerin t\u00fcm operasyonlar\u0131n\u0131 tamamen durdurabilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Malware (K\u00f6t\u00fc Ama\u00e7l\u0131 Yaz\u0131l\u0131m)<\/h3>\n\n\n\n<p>K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m, <a href=\"https:\/\/uzmanposta.com\/blog\/en-iyi-antivirus-programi\/\">bilgisayar vir\u00fcslerini<\/a>, casus yaz\u0131l\u0131mlar\u0131, <a href=\"https:\/\/uzmanposta.com\/blog\/trojan\/\">Truva atlar\u0131n\u0131<\/a>, solucanlar\u0131 ve bilgisayara zarar verebilecek di\u011fer programlar\u0131 veya dosyalar\u0131 i\u00e7erebilir. K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar genellikle me\u015fru g\u00f6r\u00fcnen indirmeler veya e-posta\u2019lardaki ekler yoluyla yay\u0131l\u0131r.<\/p>\n\n\n\n<p>K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m kategorisinde birka\u00e7 t\u00fcr siber g\u00fcvenlik tehdidi vard\u0131r:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Adware, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m yayan reklam yaz\u0131l\u0131m\u0131d\u0131r.<\/li><li>Botnet&#8217;ler, bir a\u011f olu\u015fturan k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m bula\u015fm\u0131\u015f \u00e7ok say\u0131da bilgisayard\u0131r. Siber su\u00e7lular, cihaz sahiplerinin izni olmadan \u00e7evrimi\u00e7i g\u00f6revleri ger\u00e7ekle\u015ftirmek i\u00e7in bunlar\u0131 kullan\u0131r.<\/li><li>Fidye yaz\u0131l\u0131m\u0131, verileri ve dosyalar\u0131 kilitler. Hedeflenen ki\u015fi \u00f6deme g\u00f6ndermedik\u00e7e dosyalar\u0131 kilitli b\u0131rakarak silmekle tehdit eder.<\/li><li>Casus yaz\u0131l\u0131m, bir kullan\u0131c\u0131n\u0131n kredi kart\u0131 bilgilerini toplama gibi eylemlerini kaydeder.<\/li><li>Truva atlar\u0131 k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlard\u0131r ancak me\u015fru yaz\u0131l\u0131m olarak g\u00f6r\u00fcnmek i\u00e7in gizlenmi\u015ftir. Y\u00fcklendikten sonra verilerinizi toplarlar.<\/li><li>Vir\u00fcsler kendi kendini kopyalar. Kendilerini bir dosyaya eklerler, ard\u0131ndan bilgisayar sistemine yay\u0131l\u0131rlar.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Man-in-the-Middle Attack (Ortadaki Adam Sald\u0131r\u0131s\u0131)<\/h3>\n\n\n\n<p>Bu sald\u0131r\u0131 t\u00fcr\u00fc, siber su\u00e7lular\u0131n birden fazla ki\u015fi aras\u0131ndaki konu\u015fmalar\u0131 veya veri aktar\u0131mlar\u0131n\u0131 ele ge\u00e7irmesini i\u00e7erir.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Phishing<\/h3>\n\n\n\n<p>Bu t\u00fcr siber g\u00fcvenlik tehdidi, kredi kart\u0131 detaylar\u0131 veya \u015fifreler gibi bilgileri almak i\u00e7in g\u00f6r\u00fcn\u00fc\u015fte me\u015fru kaynaklardan sahte e-posta\u2019lar g\u00f6ndermeyi i\u00e7erir.<\/p>\n\n\n\n<p><strong>Okuman\u0131z\u0131 \u00f6neririz:<\/strong> <a href=\"https:\/\/uzmanposta.com\/blog\/phishing-nedir\/\">Phishing (Oltalama) Nedir? Phishing Sald\u0131r\u0131s\u0131 Nas\u0131l Engellenir?<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Sosyal M\u00fchendislik<\/h3>\n\n\n\n<p>Sosyal m\u00fchendislik, kullan\u0131c\u0131lar\u0131 insan etkile\u015fimlerini kullanarak g\u00fcvenlik prosed\u00fcrlerini k\u0131rmaya odaklan\u0131r. Siber su\u00e7lular, hedeflenen ki\u015finin bir ba\u011flant\u0131ya t\u0131klama veya bir dosyay\u0131 indirme \u015fans\u0131n\u0131 art\u0131rmak i\u00e7in genellikle sosyal m\u00fchendislik sald\u0131r\u0131lar\u0131n\u0131 kimlik av\u0131 gibi ba\u015fka sald\u0131r\u0131larla birle\u015ftirir.<\/p>\n\n\n\n<p><strong>Okuman\u0131z\u0131 \u00f6neririz: <\/strong><a href=\"https:\/\/uzmanposta.com\/blog\/sosyal-muhendislik\/\">Sosyal M\u00fchendislik Nedir? Sosyal M\u00fchendislik Sald\u0131r\u0131lar\u0131 Nas\u0131l \u00d6nlenir?<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">SQL Injection (SQL Enjeksiyonu)<\/h3>\n\n\n\n<p>SQL,&nbsp; Structured Query Language anlam\u0131na gelir. Bir SQL enjeksiyonu, bir veri taban\u0131ndaki veriler \u00fczerinde eylemler ger\u00e7ekle\u015ftirmeyi ve potansiyel olarak onu \u00e7almay\u0131 ama\u00e7lar. Veriye dayal\u0131 uygulamalar\u0131n g\u00fcvenlik a\u00e7\u0131klar\u0131ndan yararlanarak SQL ifadeleri arac\u0131l\u0131\u011f\u0131yla k\u00f6t\u00fc ama\u00e7l\u0131 kod eklemeyi i\u00e7erir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Insider Threats (\u0130\u00e7eriden tehditler)<\/h3>\n\n\n\n<p>Bu tehditlere, g\u00fcvenli\u011fi ihlal edilmi\u015f bir i\u015fletme i\u00e7indeki bireyler neden olur.<\/p>\n\n\n\n<p>USB ayg\u0131t\u0131 gibi fiziksel ayg\u0131tlar\u0131 kullanmak, bilgisayar sistemlerine bula\u015fman\u0131n yayg\u0131n bir yoludur. Veriler ayr\u0131ca bu ki\u015filer taraf\u0131ndan yetkisiz bir \u015fekilde aktar\u0131labilir veya s\u0131zd\u0131r\u0131labilir.<\/p>\n\n\n\n<p>Kullan\u0131lan k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131n t\u00fcr\u00fcne ba\u011fl\u0131 olarak, bu sald\u0131r\u0131lar donan\u0131m sistemlerine ve varl\u0131klara zarar verebilir.<\/p>\n\n\n\n<p>\u00c7al\u0131\u015fanlar\u0131 bu riskler konusunda e\u011fitmek ve fark\u0131ndal\u0131\u011f\u0131 art\u0131rmak bu sald\u0131r\u0131lar\u0131 \u00f6nlemenin bir yoludur. Daha iyi y\u00f6netim ve \u015f\u00fcpheli etkinli\u011fin izlenmesini ve ara\u015ft\u0131r\u0131lmas\u0131n\u0131 sa\u011flamak, i\u015fletmenizi bu tehditten koruman\u0131n en iyi yoludur.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Siber G\u00fcvenlik Analizi Nedir?<\/h2>\n\n\n\n<p>Siber g\u00fcvenlik analizi, bir i\u015fletmenin <a href=\"https:\/\/uzmanposta.com\/blog\/siber-guvenlik-nedir-veri-guvenligini-nasil-saglariz\/\">siber g\u00fcvenlik<\/a> yeteneklerinin mevcut durumunu de\u011ferlendirme s\u00fcrecidir.<\/p>\n\n\n\n<p>Bu analiz, di\u011fer ayr\u0131nt\u0131lar\u0131n yan\u0131 s\u0131ra riskleri, yakla\u015fan tehditleri, \u015firket protokollerini ve g\u00fcvenlik prosed\u00fcrlerini de\u011ferlendirmekle ilgilidir.<\/p>\n\n\n\n<p>\u0130\u015fletmenizin verilerinin ve varl\u0131klar\u0131n\u0131n bir siber sald\u0131r\u0131ya kar\u015f\u0131 g\u00fcvende oldu\u011fundan emin olmak istiyorsan\u0131z, periyodik olarak bir siber g\u00fcvenlik analizi ve risk de\u011ferlendirmesi yapman\u0131z \u00e7ok \u00f6nemlidir.<\/p>\n\n\n\n<p>Bu sorunlar\u0131 \u00f6nceden ele almak istiyorsan\u0131z, siber g\u00fcvenlik plan\u0131n\u0131zdaki g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131n fark\u0131nda olman\u0131z gerekir. \u0130lk etapta sald\u0131r\u0131lar\u0131n meydana gelme olas\u0131l\u0131\u011f\u0131n\u0131 azaltmak istiyorsan\u0131z, reaktif bir yakla\u015f\u0131m yerine daha proaktif bir yakla\u015f\u0131m benimsemek \u00f6nemlidir.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Siber G\u00fcvenlik Yaz\u0131l\u0131m\u0131 Nedir?<\/h2>\n\n\n\n<p>Siber g\u00fcvenlik yaz\u0131l\u0131m\u0131, siber sald\u0131r\u0131lara kar\u015f\u0131 korunmaya yard\u0131mc\u0131 olmak i\u00e7in kullan\u0131lan t\u00fcm yaz\u0131l\u0131mlar\u0131 tan\u0131mlamak i\u00e7in kullan\u0131lan bir terimdir.<\/p>\n\n\n\n<p>Sisteminizin, uygulaman\u0131z\u0131n ve verilerinizin zarar g\u00f6rmemesini sa\u011flamaya yard\u0131mc\u0131 olmak i\u00e7in siber g\u00fcvenlik yaz\u0131l\u0131m\u0131 taraf\u0131ndan \u00e7e\u015fitli g\u00f6revler ger\u00e7ekle\u015ftirilir.<\/p>\n\n\n\n<p>Vir\u00fcsten ve k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mdan koruma, sisteminizdeki vir\u00fcsleri ve k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131 \u00f6nleme, tan\u0131mlama ve ortadan kald\u0131rma gibi g\u00f6revlerde i\u015fletmenize yard\u0131mc\u0131 olur. \u00c7o\u011fu siber g\u00fcvenlik yaz\u0131l\u0131m\u0131, k\u00f6t\u00fc niyetli ki\u015filer taraf\u0131ndan ele ge\u00e7irilse bile verileri g\u00fcvende tutmaya yard\u0131mc\u0131 olan bir t\u00fcr veri \u015fifreleme sa\u011flar.&nbsp;<\/p>\n\n\n\n<p>Ayr\u0131ca g\u00fcvenlik duvarlar\u0131 kurmak ve izleme yetenekleri sa\u011flamak da g\u00fcvenlik ara\u00e7lar\u0131n\u0131n en \u00f6nemli \u00f6zelliklerindendir.<\/p>\n\n\n\n<p>Karma\u015f\u0131k siber g\u00fcvenlik yaz\u0131l\u0131mlar\u0131, i\u015fletmelere veri kurtarma ve ola\u011fan\u00fcst\u00fc durum kurtarma konular\u0131nda da yard\u0131mc\u0131 olur.<\/p>\n\n\n\n<p>Siber g\u00fcvenli\u011fi art\u0131rman\u0131za yard\u0131mc\u0131 olabilecek \u00e7e\u015fitli ara\u00e7lar vard\u0131r. En pop\u00fcler siber g\u00fcvenlik yaz\u0131l\u0131mlar\u0131 a\u015fa\u011f\u0131daki \u015fekildedir:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>SiteLock.<\/li><li>Teramind.<\/li><li>AppTrana.<\/li><li>JumpCloud DaaS.<\/li><li>DNIF.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Siber G\u00fcvenlik Mimarisi Nedir?<\/h2>\n\n\n\n<p>Kendilerini ve varl\u0131klar\u0131n\u0131 siber sald\u0131r\u0131lardan korumak isteyen i\u015fletmeler i\u00e7in sa\u011flam bir siber g\u00fcvenlik mimarisi \u00e7ok \u00f6nemlidir.<\/p>\n\n\n\n<p>Siber g\u00fcvenlik mimarisi, i\u00e7 ve d\u0131\u015f tehditlere kar\u015f\u0131 koruyucu altyap\u0131 sa\u011flar. Konsolide bir siber g\u00fcvenlik mimarisi, siber g\u00fcvenlik y\u00f6netimini kolayla\u015ft\u0131rmaya, riskleri azaltmaya, geli\u015fmi\u015f g\u00fcvenlik sa\u011flamaya ve \u015firketin g\u00fcvenlik altyap\u0131s\u0131 \u00fczerinde daha fazla g\u00f6zetim sa\u011flamaya yard\u0131mc\u0131 olur.<\/p>\n\n\n\n<p>Siber g\u00fcvenlik mimarisinin kapsad\u0131\u011f\u0131 ortamlar aras\u0131nda a\u011flar, u\u00e7 noktalar, bulut, <a href=\"https:\/\/uzmanposta.com\/blog\/iot\/\">IoT<\/a>, mobil vb. ortamlar bulunur.<\/p>\n\n\n\n<p>Modern ve kapsaml\u0131 bir siber g\u00fcvenlik mimarisine sahip olman\u0131n en b\u00fcy\u00fck avantaj\u0131, bir\u00e7ok kurumsal tehdidin i\u015fletme taraf\u0131ndan herhangi bir hasar al\u0131nmadan \u00f6nlenebilmesidir.<\/p>\n\n\n\n<p>Tehditleri tahmin etmek, siber g\u00fcvenlik sald\u0131r\u0131lar\u0131 ile m\u00fccadele etmek, g\u00fcvenlik protokollerinin daha iyi y\u00f6netimi, g\u00fcvenlik otomasyonu; siber g\u00fcvenlik mimarisi sayesinde m\u00fcmk\u00fcn hale gelir.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\u0130\u015fletmeler ve Bireyler Siber Tehditlere Kar\u015f\u0131 Nas\u0131l Korunabilir?<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>T\u00fcm hassas verilerinizin bir envanterini \u00e7\u0131kar\u0131n.<\/li><li>Verilerin yedekli g\u00fcvenlik kontrolleriyle korundu\u011fundan emin olun.<\/li><li>\u0130\u015fletmenizin kar\u015f\u0131 kar\u015f\u0131ya oldu\u011fu t\u00fcm potansiyel riskleri ve her bir risk i\u00e7in t\u00fcm potansiyel sonu\u00e7lar\u0131 anlad\u0131\u011f\u0131n\u0131zdan emin olmak i\u00e7in bir risk de\u011ferlendirmesi yap\u0131n.<\/li><li>T\u00fcm potansiyel risk sonu\u00e7lar\u0131n\u0131 azaltmak, bunlara yan\u0131t vermek ve bunlardan kurtulmak i\u00e7in bir plan\u0131n\u0131z olsun.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Veri G\u00fcvenli\u011fini Sa\u011flamak \u0130\u00e7in Kullanabilece\u011finiz Siber G\u00fcvenlik Uygulamalar\u0131<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">1. Siber g\u00fcvenlik e\u011fitimleri ile \u00e7al\u0131\u015fan fark\u0131ndal\u0131\u011f\u0131n\u0131 art\u0131r\u0131n<\/h3>\n\n\n\n<p>\u00c7al\u0131\u015fanlar siber g\u00fcvenlik, \u015firket politikalar\u0131 ve olay raporlama konular\u0131nda e\u011fitilmezse, g\u00fc\u00e7l\u00fc bir siber g\u00fcvenlik stratejisi ba\u015far\u0131l\u0131 olamaz. En iyi teknik savunmalar bile, \u00e7al\u0131\u015fanlar kas\u0131ts\u0131z veya kas\u0131tl\u0131 olarak k\u00f6t\u00fc niyetli eylemlerde bulundu\u011funda, maliyetli bir g\u00fcvenlik ihlaline neden olabilir. \u00c7al\u0131\u015fanlar\u0131 e\u011fitmek ve seminerler, dersler, \u00e7evrimi\u00e7i kurslar arac\u0131l\u0131\u011f\u0131yla \u015firket politikalar\u0131 ve en iyi g\u00fcvenlik uygulamalar\u0131 hakk\u0131nda fark\u0131ndal\u0131k yaratmak, ihmali ve g\u00fcvenlik ihlali potansiyelini azaltman\u0131n en iyi yoludur.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Risk de\u011ferlendirmeleri yap\u0131n <\/h3>\n\n\n\n<p>\u0130\u015fletmeler, t\u00fcm de\u011ferli varl\u0131klar\u0131 belirlemek i\u00e7in resmi bir risk de\u011ferlendirmesi yapmal\u0131 ve bir varl\u0131\u011f\u0131n tehlikeye girdi\u011finde neden oldu\u011fu etkiye dayal\u0131 olarak bunlara \u00f6ncelik vermelidir. Bu, i\u015fletmelerin kaynaklar\u0131n\u0131 her bir de\u011ferli varl\u0131\u011f\u0131 g\u00fcvence alt\u0131na almak i\u00e7in en iyi \u015fekilde nas\u0131l harcayacaklar\u0131na karar vermelerine yard\u0131mc\u0131 olacakt\u0131r.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. G\u00fcvenlik a\u00e7\u0131\u011f\u0131 y\u00f6netimi ve yaz\u0131l\u0131m yama y\u00f6netimi\/g\u00fcncellemelerini sa\u011flay\u0131n<\/h3>\n\n\n\n<p>Kurumsal BT ekiplerinin, BT sistemlerine y\u00f6nelik tehditleri azaltmak i\u00e7in kulland\u0131\u011f\u0131 t\u00fcm yaz\u0131l\u0131m ve a\u011flardaki g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 belirleme, s\u0131n\u0131fland\u0131rma, iyile\u015ftirme ve azaltma i\u015flemlerini ger\u00e7ekle\u015ftirmesi \u00e7ok \u00f6nemlidir. Ayr\u0131ca, g\u00fcvenlik ara\u015ft\u0131rmac\u0131lar\u0131 ve sald\u0131rganlar, \u00e7e\u015fitli yaz\u0131l\u0131mlarda ara s\u0131ra yaz\u0131l\u0131m sat\u0131c\u0131lar\u0131na rapor edilen veya kamuya a\u00e7\u0131klanan yeni g\u00fcvenlik a\u00e7\u0131klar\u0131 tespit eder. Bu g\u00fcvenlik a\u00e7\u0131klar\u0131ndan genellikle k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar ve siber sald\u0131rganlar yararlan\u0131r. Yaz\u0131l\u0131m sat\u0131c\u0131lar\u0131, bu g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 yamalayan ve azaltan g\u00fcncellemeleri d\u00fczenli aral\u0131klarla yay\u0131nlar. Bu nedenle BT sistemlerini g\u00fcncel tutmak, kurumsal varl\u0131klar\u0131n korunmas\u0131na yard\u0131mc\u0131 olur.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. En az ayr\u0131cal\u0131k ilkesini kullan\u0131n<\/h3>\n\n\n\n<p>En az ayr\u0131cal\u0131k ilkesi, hem yaz\u0131l\u0131ma hem de personele g\u00f6revlerini yerine getirmeleri i\u00e7in gereken en az miktarda izin verilmesi gerektirir. Bu, daha d\u00fc\u015f\u00fck izinlere sahip kullan\u0131c\u0131 hesaplar\u0131\/yaz\u0131l\u0131mlar\u0131, daha y\u00fcksek d\u00fczeyde izinler gerektiren de\u011ferli varl\u0131klar\u0131 etkileyemeyece\u011finden, ba\u015far\u0131l\u0131 bir g\u00fcvenlik ihlalinin zarar\u0131n\u0131 s\u0131n\u0131rlamaya yard\u0131mc\u0131 olur. Ayr\u0131ca, s\u0131n\u0131rs\u0131z izinlere sahip t\u00fcm \u00fcst d\u00fczey kullan\u0131c\u0131 hesaplar\u0131 i\u00e7in iki fakt\u00f6rl\u00fc kimlik do\u011frulama kullan\u0131lmal\u0131d\u0131r.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. G\u00fcvenli ve g\u00fc\u00e7l\u00fc parolay\u0131 zorunlu k\u0131l\u0131n<\/h3>\n\n\n\n<p>T\u00fcm \u00e7al\u0131\u015fanlar\u0131n end\u00fcstri taraf\u0131ndan \u00f6nerilen standartlara uygun g\u00fc\u00e7l\u00fc parolalar kullanmas\u0131 zorunlu tutulmal\u0131d\u0131r. Ayr\u0131ca, g\u00fcvenli\u011fi ihlal edilmi\u015f parolalardan korunmaya yard\u0131mc\u0131 olmak i\u00e7in bu parolalar\u0131n periyodik olarak de\u011fi\u015ftirilmeleri gerekir.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">6. Sa\u011flam bir i\u015f s\u00fcreklili\u011fi ve olay m\u00fcdahalesi (BC-IR) plan\u0131 uygulay\u0131n<\/h3>\n\n\n\n<p>Sa\u011flam bir BC-IR plan\u0131na ve politikas\u0131na sahip olmak, bir i\u015fletmenin kritik i\u015f sistemlerinin \u00e7evrimi\u00e7i kalmas\u0131n\u0131 sa\u011flarken siber sald\u0131r\u0131lara ve g\u00fcvenlik ihlallerine etkin bir \u015fekilde yan\u0131t vermesine yard\u0131mc\u0131 olur.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">7. Periyodik g\u00fcvenlik incelemeleri ger\u00e7ekle\u015ftirin<\/h3>\n\n\n\n<p>T\u00fcm yaz\u0131l\u0131mlar\u0131n ve a\u011flar\u0131n periyodik g\u00fcvenlik incelemelerinden ge\u00e7mesi, g\u00fcvenlik sorunlar\u0131n\u0131n erken ve g\u00fcvenli bir ortamda belirlenmesine yard\u0131mc\u0131 olur. G\u00fcvenlik incelemeleri, uygulama ve a\u011f s\u0131zma testini, kaynak kodu incelemelerini, mimari tasar\u0131m incelemelerini, k\u0131rm\u0131z\u0131 ekip de\u011ferlendirmelerini vb. i\u00e7erir. G\u00fcvenlik a\u00e7\u0131klar\u0131 bulundu\u011funda, i\u015fletmeler bunlar\u0131 m\u00fcmk\u00fcn olan en k\u0131sa s\u00fcrede \u00f6nceliklendirmeli ve azaltmal\u0131d\u0131r.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">8. Verileri yedekleme<\/h3>\n\n\n\n<p>T\u00fcm verilerin periyodik olarak yedeklenmesi,&nbsp;bir g\u00fcvenlik ihlali sonras\u0131nda t\u00fcm hassas verilerin kaybolmamas\u0131n\u0131 sa\u011flayacakt\u0131r. Yedeklemeler, enjeksiyonlar ve fidye yaz\u0131l\u0131m\u0131 gibi sald\u0131r\u0131lar\u0131 durumlar\u0131nda verilerinizi korumaya yard\u0131mc\u0131 olacakt\u0131r.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">9. Bekleyen ve aktar\u0131m halindeki veriler i\u00e7in \u015fifreleme kullan\u0131n<\/h3>\n\n\n\n<p>T\u00fcm hassas bilgiler, g\u00fc\u00e7l\u00fc \u015fifreleme algoritmalar\u0131 kullan\u0131larak saklanmal\u0131 ve aktar\u0131lmal\u0131d\u0131r. Verilerin \u015fifrelenmesi gizlili\u011fi sa\u011flar. Bu y\u00fczden t\u00fcm web uygulamalar\u0131\/yaz\u0131l\u0131mlar\u0131 <a href=\"https:\/\/uzmanposta.com\/blog\/ssl-guvenlik-sertifikasi-nedir\/\">SSL<\/a>\/<a href=\"https:\/\/uzmanposta.com\/blog\/tls\/\">TLS<\/a> kullan\u0131m\u0131n\u0131 i\u00e7ermelidir.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pandemi, kripto para birimi ve uzaktan \u00e7al\u0131\u015fmadaki art\u0131\u015f gibi kavramlar, bilgisayar korsanlar\u0131n\u0131n yararlanabilece\u011fi hedef a\u00e7\u0131s\u0131ndan zengin bir ortam yaratt\u0131\u011f\u0131 i\u00e7in siber su\u00e7lar\u0131n i\u015fletmelere verebilece\u011fi zararlar g\u00fcnden g\u00fcne art\u0131yor. Cybercrime Magazine taraf\u0131ndan yap\u0131lan bir ara\u015ft\u0131rmaya g\u00f6re, siber su\u00e7lar\u0131n 2025 y\u0131l\u0131na kadar d\u00fcnyaya y\u0131lda 10.5 trilyon dolara mal olaca\u011f\u0131 \u00f6ng\u00f6r\u00fcl\u00fcyor. Ayr\u0131ca, k\u00fcresel siber su\u00e7 maliyetlerinin \u00f6n\u00fcm\u00fczdeki d\u00f6rt [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":2361,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-2344","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-nedir-nasil-yapilir"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Siber G\u00fcvenlik Nedir? Veri G\u00fcvenli\u011fini Nas\u0131l Sa\u011flar\u0131z? - Uzman Posta<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/uzmanposta.com\/blog\/siber-guvenlik-nedir-veri-guvenligini-nasil-saglariz\/\" \/>\n<meta property=\"og:locale\" content=\"tr_TR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Siber G\u00fcvenlik Nedir? Veri G\u00fcvenli\u011fini Nas\u0131l Sa\u011flar\u0131z? - Uzman Posta\" \/>\n<meta property=\"og:description\" content=\"Pandemi, kripto para birimi ve uzaktan \u00e7al\u0131\u015fmadaki art\u0131\u015f gibi kavramlar, bilgisayar korsanlar\u0131n\u0131n yararlanabilece\u011fi hedef a\u00e7\u0131s\u0131ndan zengin bir ortam yaratt\u0131\u011f\u0131 i\u00e7in siber su\u00e7lar\u0131n i\u015fletmelere verebilece\u011fi zararlar g\u00fcnden g\u00fcne art\u0131yor. Cybercrime Magazine taraf\u0131ndan yap\u0131lan bir ara\u015ft\u0131rmaya g\u00f6re, siber su\u00e7lar\u0131n 2025 y\u0131l\u0131na kadar d\u00fcnyaya y\u0131lda 10.5 trilyon dolara mal olaca\u011f\u0131 \u00f6ng\u00f6r\u00fcl\u00fcyor. Ayr\u0131ca, k\u00fcresel siber su\u00e7 maliyetlerinin \u00f6n\u00fcm\u00fczdeki d\u00f6rt [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/uzmanposta.com\/blog\/siber-guvenlik-nedir-veri-guvenligini-nasil-saglariz\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/uzmanposta\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-03T09:25:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-04T06:41:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/06\/siber-guvenlik-nedir-veri-guvenligini-nasil-saglariz.png\" \/>\n\t<meta property=\"og:image:width\" content=\"750\" \/>\n\t<meta property=\"og:image:height\" content=\"375\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Sibel Ho\u015f\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@uZmanPosta\" \/>\n<meta name=\"twitter:site\" content=\"@uZmanPosta\" \/>\n<meta name=\"twitter:label1\" content=\"Yazan:\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sibel Ho\u015f\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tahmini okuma s\u00fcresi\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 dakika\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Siber G\u00fcvenlik Nedir? Veri G\u00fcvenli\u011fini Nas\u0131l Sa\u011flar\u0131z? - Uzman Posta","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/uzmanposta.com\/blog\/siber-guvenlik-nedir-veri-guvenligini-nasil-saglariz\/","og_locale":"tr_TR","og_type":"article","og_title":"Siber G\u00fcvenlik Nedir? Veri G\u00fcvenli\u011fini Nas\u0131l Sa\u011flar\u0131z? - Uzman Posta","og_description":"Pandemi, kripto para birimi ve uzaktan \u00e7al\u0131\u015fmadaki art\u0131\u015f gibi kavramlar, bilgisayar korsanlar\u0131n\u0131n yararlanabilece\u011fi hedef a\u00e7\u0131s\u0131ndan zengin bir ortam yaratt\u0131\u011f\u0131 i\u00e7in siber su\u00e7lar\u0131n i\u015fletmelere verebilece\u011fi zararlar g\u00fcnden g\u00fcne art\u0131yor. Cybercrime Magazine taraf\u0131ndan yap\u0131lan bir ara\u015ft\u0131rmaya g\u00f6re, siber su\u00e7lar\u0131n 2025 y\u0131l\u0131na kadar d\u00fcnyaya y\u0131lda 10.5 trilyon dolara mal olaca\u011f\u0131 \u00f6ng\u00f6r\u00fcl\u00fcyor. Ayr\u0131ca, k\u00fcresel siber su\u00e7 maliyetlerinin \u00f6n\u00fcm\u00fczdeki d\u00f6rt [&hellip;]","og_url":"https:\/\/uzmanposta.com\/blog\/siber-guvenlik-nedir-veri-guvenligini-nasil-saglariz\/","og_site_name":"Blog","article_publisher":"https:\/\/www.facebook.com\/uzmanposta\/","article_published_time":"2022-06-03T09:25:29+00:00","article_modified_time":"2023-11-04T06:41:45+00:00","og_image":[{"width":750,"height":375,"url":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/06\/siber-guvenlik-nedir-veri-guvenligini-nasil-saglariz.png","type":"image\/png"}],"author":"Sibel Ho\u015f","twitter_card":"summary_large_image","twitter_creator":"@uZmanPosta","twitter_site":"@uZmanPosta","twitter_misc":{"Yazan:":"Sibel Ho\u015f","Tahmini okuma s\u00fcresi":"13 dakika"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/uzmanposta.com\/blog\/siber-guvenlik-nedir-veri-guvenligini-nasil-saglariz\/#article","isPartOf":{"@id":"https:\/\/uzmanposta.com\/blog\/siber-guvenlik-nedir-veri-guvenligini-nasil-saglariz\/"},"author":{"name":"Sibel Ho\u015f","@id":"https:\/\/uzmanposta.com\/blog\/#\/schema\/person\/ac85212a35ebcaaf56c92a7e051813d6"},"headline":"Siber G\u00fcvenlik Nedir? Veri G\u00fcvenli\u011fini Nas\u0131l Sa\u011flar\u0131z?","datePublished":"2022-06-03T09:25:29+00:00","dateModified":"2023-11-04T06:41:45+00:00","mainEntityOfPage":{"@id":"https:\/\/uzmanposta.com\/blog\/siber-guvenlik-nedir-veri-guvenligini-nasil-saglariz\/"},"wordCount":2988,"publisher":{"@id":"https:\/\/uzmanposta.com\/blog\/#organization"},"image":{"@id":"https:\/\/uzmanposta.com\/blog\/siber-guvenlik-nedir-veri-guvenligini-nasil-saglariz\/#primaryimage"},"thumbnailUrl":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/06\/siber-guvenlik-nedir-veri-guvenligini-nasil-saglariz.png","articleSection":["Nedir? Nas\u0131l Yap\u0131l\u0131r?"],"inLanguage":"tr"},{"@type":"WebPage","@id":"https:\/\/uzmanposta.com\/blog\/siber-guvenlik-nedir-veri-guvenligini-nasil-saglariz\/","url":"https:\/\/uzmanposta.com\/blog\/siber-guvenlik-nedir-veri-guvenligini-nasil-saglariz\/","name":"Siber G\u00fcvenlik Nedir? Veri G\u00fcvenli\u011fini Nas\u0131l Sa\u011flar\u0131z? - Uzman Posta","isPartOf":{"@id":"https:\/\/uzmanposta.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/uzmanposta.com\/blog\/siber-guvenlik-nedir-veri-guvenligini-nasil-saglariz\/#primaryimage"},"image":{"@id":"https:\/\/uzmanposta.com\/blog\/siber-guvenlik-nedir-veri-guvenligini-nasil-saglariz\/#primaryimage"},"thumbnailUrl":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/06\/siber-guvenlik-nedir-veri-guvenligini-nasil-saglariz.png","datePublished":"2022-06-03T09:25:29+00:00","dateModified":"2023-11-04T06:41:45+00:00","breadcrumb":{"@id":"https:\/\/uzmanposta.com\/blog\/siber-guvenlik-nedir-veri-guvenligini-nasil-saglariz\/#breadcrumb"},"inLanguage":"tr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/uzmanposta.com\/blog\/siber-guvenlik-nedir-veri-guvenligini-nasil-saglariz\/"]}]},{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/uzmanposta.com\/blog\/siber-guvenlik-nedir-veri-guvenligini-nasil-saglariz\/#primaryimage","url":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/06\/siber-guvenlik-nedir-veri-guvenligini-nasil-saglariz.png","contentUrl":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/06\/siber-guvenlik-nedir-veri-guvenligini-nasil-saglariz.png","width":750,"height":375},{"@type":"BreadcrumbList","@id":"https:\/\/uzmanposta.com\/blog\/siber-guvenlik-nedir-veri-guvenligini-nasil-saglariz\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/uzmanposta.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Nedir? Nas\u0131l Yap\u0131l\u0131r?","item":"https:\/\/uzmanposta.com\/blog\/nedir-nasil-yapilir\/"},{"@type":"ListItem","position":3,"name":"Siber G\u00fcvenlik Nedir? Veri G\u00fcvenli\u011fini Nas\u0131l Sa\u011flar\u0131z?"}]},{"@type":"WebSite","@id":"https:\/\/uzmanposta.com\/blog\/#website","url":"https:\/\/uzmanposta.com\/blog\/","name":"Blog","description":"","publisher":{"@id":"https:\/\/uzmanposta.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/uzmanposta.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"tr"},{"@type":"Organization","@id":"https:\/\/uzmanposta.com\/blog\/#organization","name":"Uzman Posta","url":"https:\/\/uzmanposta.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/uzmanposta.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2020\/05\/logo.png","contentUrl":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2020\/05\/logo.png","width":131,"height":60,"caption":"Uzman Posta"},"image":{"@id":"https:\/\/uzmanposta.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/uzmanposta\/","https:\/\/x.com\/uZmanPosta","https:\/\/www.instagram.com\/uzmanposta\/","https:\/\/www.linkedin.com\/company\/uzmanposta\/","https:\/\/www.youtube.com\/channel\/UCk2n1vp1YJ0n3XaDRWBi88Q"]},{"@type":"Person","@id":"https:\/\/uzmanposta.com\/blog\/#\/schema\/person\/ac85212a35ebcaaf56c92a7e051813d6","name":"Sibel Ho\u015f","image":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/secure.gravatar.com\/avatar\/f925f03d20ff0803ddb37c96d39d3793c085014ce56421050f24823c23db1c2a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f925f03d20ff0803ddb37c96d39d3793c085014ce56421050f24823c23db1c2a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f925f03d20ff0803ddb37c96d39d3793c085014ce56421050f24823c23db1c2a?s=96&d=mm&r=g","caption":"Sibel Ho\u015f"},"sameAs":["https:\/\/sibelhos.com\/","https:\/\/www.instagram.com\/bismoothie\/","https:\/\/www.linkedin.com\/in\/sibelhos\/"]}]}},"_links":{"self":[{"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/posts\/2344","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/comments?post=2344"}],"version-history":[{"count":0,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/posts\/2344\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/media\/2361"}],"wp:attachment":[{"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/media?parent=2344"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/categories?post=2344"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/tags?post=2344"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}