{"id":2732,"date":"2022-12-02T13:50:01","date_gmt":"2022-12-02T10:50:01","guid":{"rendered":"https:\/\/uzmanposta.com\/blog\/?p=2732"},"modified":"2023-04-13T10:07:56","modified_gmt":"2023-04-13T07:07:56","slug":"siber-saldiri","status":"publish","type":"post","link":"https:\/\/uzmanposta.com\/blog\/siber-saldiri\/","title":{"rendered":"Siber Sald\u0131r\u0131 Nedir? \u0130\u015fletmeler E-Posta Verilerini Siber Sald\u0131r\u0131dan Nas\u0131l Korumal\u0131d\u0131r?"},"content":{"rendered":"\n<p><strong>Siber sald\u0131r\u0131<\/strong>, yetkisiz eri\u015fim elde etmeye, verileri \u00e7almaya veya bilgisayarlara, bilgisayar a\u011flar\u0131na veya di\u011fer bilgi i\u015flem sistemlerine zarar vermeye \u00e7al\u0131\u015fan bilgisayar korsanlar\u0131 taraf\u0131ndan ger\u00e7ekle\u015ftirilen bir dizi eylemdir. Siber sald\u0131r\u0131 herhangi bir yerden ba\u015flat\u0131labilir, bir veya daha fazla taktik, teknik ve prosed\u00fcr (TTP&#8217;ler) kullan\u0131larak bir ki\u015fi veya grup taraf\u0131ndan ger\u00e7ekle\u015ftirilebilir.<\/p>\n\n\n\n<p>Siber sald\u0131r\u0131 ba\u015flatan ki\u015filere genellikle siber su\u00e7lular, bilgisayar korsanlar\u0131 veya tehdit akt\u00f6rleri denir. Tek ba\u015flar\u0131na, di\u011fer bilgisayar korsanlar\u0131 ile i\u015fbirli\u011fi i\u00e7inde veya organize bir su\u00e7 \u00f6rg\u00fct\u00fcn\u00fcn par\u00e7as\u0131 olarak \u00e7al\u0131\u015fabilirler. Bilgisayar sistemlerindeki g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 (sorunlar veya zay\u0131fl\u0131klar) belirlemeye ve hedeflerini ilerletmek i\u00e7in bunlardan yararlanmaya \u00e7al\u0131\u015f\u0131rlar.<\/p>\n\n\n\n<p>Siber su\u00e7lular, siber sald\u0131r\u0131lar ba\u015flat\u0131rken \u00e7e\u015fitli motivasyonlara sahip olabilir. Baz\u0131lar\u0131 ki\u015fisel veya mali kazan\u00e7 i\u00e7in sald\u0131r\u0131lar ger\u00e7ekle\u015ftirir. Baz\u0131lar\u0131 ise sosyal veya politik ama\u00e7lar ad\u0131na hareket eden \u201chaktivistler\u201ddir. Baz\u0131 sald\u0131r\u0131lar, ulus devletler taraf\u0131ndan rakiplerine kar\u015f\u0131 y\u00fcr\u00fct\u00fclen veya bilinen ter\u00f6rist gruplar\u0131n bir par\u00e7as\u0131 olarak y\u00fcr\u00fct\u00fclen siber sava\u015f operasyonlar\u0131n\u0131n bir par\u00e7as\u0131d\u0131r.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Siber Sald\u0131r\u0131 \u0130statistikleri<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">\u0130\u015fletmeler i\u00e7in siber sald\u0131r\u0131lar\u0131n maliyeti ve etkisi nedir?<\/h3>\n\n\n\n<p>Siber sald\u0131r\u0131lar\u0131n k\u00fcresel maliyetinin her y\u0131l <a href=\"https:\/\/cybersecurityventures.com\/hackerpocalypse-cybercrime-report-2016\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">%15 artmas\u0131<\/a> ve 10 trilyon dolar\u0131n \u00fczerine \u00e7\u0131kmas\u0131 bekleniyor. <\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/12\/2019dan-2030a-kadar-dunya-capinda-siber-guvenlik-pazarinin-boyutu.jpg\" alt=\"\" class=\"wp-image-2772\" width=\"750\" height=\"472\" srcset=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/12\/2019dan-2030a-kadar-dunya-capinda-siber-guvenlik-pazarinin-boyutu.jpg 1000w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/12\/2019dan-2030a-kadar-dunya-capinda-siber-guvenlik-pazarinin-boyutu-300x189.jpg 300w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/12\/2019dan-2030a-kadar-dunya-capinda-siber-guvenlik-pazarinin-boyutu-768x483.jpg 768w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/12\/2019dan-2030a-kadar-dunya-capinda-siber-guvenlik-pazarinin-boyutu-750x472.jpg 750w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><figcaption>2019&#8217;dan 2030&#8217;a kadar d\u00fcnya \u00e7ap\u0131nda siber g\u00fcvenlik pazar\u0131n\u0131n boyutu<\/figcaption><\/figure><\/div>\n\n\n\n<p>Bu maliyetin b\u00fcy\u00fck bir k\u0131sm\u0131, \u015fu anda i\u015fletmelere y\u0131lda 20 milyar dolara m\u00e2l olan fidye yaz\u0131l\u0131m\u0131 (ransomware) sald\u0131r\u0131lar\u0131d\u0131r.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/12\/2021-yilinda-secilen-kuresel-bolgelerdeki-siber-saldirilarin-kategoriye-gore-dagilimi.jpg\" alt=\"\" class=\"wp-image-2773\" width=\"750\" height=\"463\" srcset=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/12\/2021-yilinda-secilen-kuresel-bolgelerdeki-siber-saldirilarin-kategoriye-gore-dagilimi.jpg 1000w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/12\/2021-yilinda-secilen-kuresel-bolgelerdeki-siber-saldirilarin-kategoriye-gore-dagilimi-300x185.jpg 300w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/12\/2021-yilinda-secilen-kuresel-bolgelerdeki-siber-saldirilarin-kategoriye-gore-dagilimi-768x474.jpg 768w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/12\/2021-yilinda-secilen-kuresel-bolgelerdeki-siber-saldirilarin-kategoriye-gore-dagilimi-750x463.jpg 750w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><figcaption>2021 y\u0131l\u0131nda se\u00e7ilen k\u00fcresel b\u00f6lgelerdeki siber sald\u0131r\u0131lar\u0131n kategoriye g\u00f6re da\u011f\u0131l\u0131m\u0131<\/figcaption><\/figure><\/div>\n\n\n\n<p>ABD&#8217;de bir veri ihlalinin ortalama maliyeti 3,8 milyon dolard\u0131r. Bir ba\u015fka endi\u015fe verici istatistik ise, ba\u015far\u0131l\u0131 bir ihlalin ard\u0131ndan halka a\u00e7\u0131k \u015firketlerin hisse de\u011ferlerinin ortalama %8&#8217;ini kaybetmesidir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">\u0130\u015fletmeler siber sald\u0131r\u0131lara ne kadar haz\u0131rl\u0131kl\u0131d\u0131r?<\/h3>\n\n\n\n<p>Yak\u0131n zamanda yap\u0131lan bir ankette yan\u0131t verenlerin %78&#8217;i \u015firketlerinin siber g\u00fcvenlik \u00f6nlemlerinin iyile\u015ftirilmesi gerekti\u011fine inand\u0131klar\u0131n\u0131 s\u00f6ylerken, k\u00fc\u00e7\u00fck i\u015fletme sahiplerinin %43\u2019\u00fc herhangi bir siber savunmaya sahip olmad\u0131\u011f\u0131n\u0131 dile getirdi.<\/p>\n\n\n\n<p>Ayn\u0131 zamanda bir\u00e7ok i\u015fletme, d\u00fcnya \u00e7ap\u0131nda yakla\u015f\u0131k 3,5 milyon a\u00e7\u0131k i\u015f ile k\u00fcresel bir siber g\u00fcvenlik becerileri eksikli\u011fi ile kar\u015f\u0131 kar\u015f\u0131yad\u0131r.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Siber Sald\u0131r\u0131 T\u00fcrleri Nelerdir?<\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"750\" height=\"375\" src=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/11\/siber-saldiri-turleri-nelerdir.png\" alt=\"\" class=\"wp-image-2734\" srcset=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/11\/siber-saldiri-turleri-nelerdir.png 750w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/11\/siber-saldiri-turleri-nelerdir-300x150.png 300w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/11\/siber-saldiri-turleri-nelerdir-360x180.png 360w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><\/figure><\/div>\n\n\n\n<p>Bilinen binlerce <strong>siber sald\u0131r\u0131 t\u00fcr\u00fc<\/strong> olsa da, i\u015fletmelerin her g\u00fcn ya\u015fad\u0131\u011f\u0131 <strong>en yayg\u0131n siber sald\u0131r\u0131lardan <\/strong>birka\u00e7\u0131n\u0131 a\u015fa\u011f\u0131daki listede bulabilirsiniz:&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Fidye Yaz\u0131l\u0131m\u0131 (Ransomware)<\/h3>\n\n\n\n<p>Fidye yaz\u0131l\u0131m\u0131, genellikle hedeflenen ki\u015fiyi fidye \u00f6demeye zorlamak amac\u0131yla kaynaklara (kullan\u0131c\u0131n\u0131n dosyalar\u0131 gibi) eri\u015filememesi i\u00e7in \u015fifreleme kullanan k\u00f6t\u00fc ama\u00e7l\u0131 bir yaz\u0131l\u0131md\u0131r. Bir sisteme vir\u00fcs bula\u015ft\u0131\u011f\u0131nda, dosyalar geri al\u0131namayacak \u015fekilde \u015fifrelenir ve kurban\u0131n ya \u015fifrelenmi\u015f kaynaklar\u0131n kilidini a\u00e7mak i\u00e7in fidyeyi \u00f6demesi ya da onlar\u0131 geri y\u00fcklemek i\u00e7in yedekleri kullanmas\u0131 gerekir.<\/p>\n\n\n\n<p><strong>Fidye yaz\u0131l\u0131m\u0131 en yayg\u0131n sald\u0131r\u0131 t\u00fcrlerinden <\/strong>biridir ve hedefin fidyeyi \u00f6dememesi durumunda hassas verileri if\u015fa etmekle tehdit etmek gibi \u015fantaj teknikleri kullan\u0131labilir. \u00c7o\u011fu durumda, fidyeyi \u00f6demek etkisizdir ve kullan\u0131c\u0131n\u0131n verileri geri verilmez.<\/p>\n\n\n\n<p><strong>\u0130lgil \u0130\u00e7erik:<\/strong> <a href=\"https:\/\/uzmanposta.com\/blog\/ransomware\/\">Ransomware Nedir, Nas\u0131l \u00c7al\u0131\u015f\u0131r? Ransomware Vir\u00fcs\u00fcn\u00fcn Mail Yoluyla Bula\u015fmas\u0131n\u0131 Engelleme&nbsp;<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. K\u00f6t\u00fc Ama\u00e7l\u0131 Yaz\u0131l\u0131m (Malware)<\/h3>\n\n\n\n<p>Fidye yaz\u0131l\u0131m\u0131n\u0131n sadece bir \u00e7e\u015fidi oldu\u011fu bir\u00e7ok <strong>k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m t\u00fcr\u00fc<\/strong> vard\u0131r. K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar, bilgi \u00e7almaktan web i\u00e7eri\u011fini de\u011fi\u015ftirmeye ve bir bilgi i\u015flem sistemine kal\u0131c\u0131 olarak zarar vermeye kadar \u00e7e\u015fitli ama\u00e7lar i\u00e7in kullan\u0131labilir.<\/p>\n\n\n\n<p>K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m ortam\u0131 \u00e7ok h\u0131zl\u0131 bir \u015fekilde geli\u015fir, ancak en yayg\u0131n k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m bi\u00e7imleri a\u015fa\u011f\u0131dakileri i\u00e7erir:<\/p>\n\n\n\n<p><strong>Botnet K\u00f6t\u00fc Ama\u00e7l\u0131 Yaz\u0131l\u0131m\u0131<\/strong>\u2014Vir\u00fcsl\u00fc sistemleri bir botnet&#8217;e ekleyerek bilgisayar korsanlar\u0131n\u0131n bunlar\u0131 su\u00e7 faaliyetleri i\u00e7in kullanmas\u0131na izin verir.<\/p>\n\n\n\n<p><strong>Cryptominers<\/strong>\u2014Hedefin bilgisayar\u0131n\u0131 kullanarak kripto para madencili\u011fi yapar.<\/p>\n\n\n\n<p><strong>Infostealers &#8211; Bilgi h\u0131rs\u0131zlar\u0131<\/strong>\u2014Hedefin bilgisayar\u0131ndaki hassas bilgileri toplar.<\/p>\n\n\n\n<p><strong>Bankac\u0131l\u0131k Truva Atlar\u0131<\/strong>\u2014Bankac\u0131l\u0131k web siteleri i\u00e7in finansal bilgileri ve kimlik bilgilerini \u00e7alar.<\/p>\n\n\n\n<p><strong>Mobil K\u00f6t\u00fc Ama\u00e7l\u0131 Yaz\u0131l\u0131m<\/strong>\u2014 Uygulamalar veya SMS yoluyla cihazlar\u0131 hedefler.<\/p>\n\n\n\n<p><strong>Rootkit&#8217;ler<\/strong>\u2014Bilgisayar korsan\u0131na bir cihaz\u0131n i\u015fletim sistemi \u00fczerinde tam kontrol sa\u011flar.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. DoS ve DDoS&nbsp;<\/h3>\n\n\n\n<p><strong>Hizmet Reddi (DoS) <\/strong>sald\u0131r\u0131lar\u0131nda, hedef sistem bunalt\u0131larak me\u015fru isteklere yan\u0131t veremesi sa\u011flan\u0131r. <strong>Da\u011f\u0131t\u0131lm\u0131\u015f hizmet reddi (DDoS) <\/strong>sald\u0131r\u0131lar\u0131 da DoS&#8217;a benzerdir ancak birden fazla ana makine i\u00e7erir. Hedef site, me\u015fru olmayan hizmet talepleriyle dolup ta\u015far ve me\u015fru kullan\u0131c\u0131lara hizmet vermeyi reddetmek zorunda kal\u0131r. Bunun nedeni, sunucular\u0131n istek a\u015f\u0131r\u0131 y\u00fcklemesine yan\u0131t vermek i\u00e7in mevcut t\u00fcm kaynaklar\u0131 t\u00fcketmesidir.<\/p>\n\n\n\n<p>Bu sald\u0131r\u0131lar, bilgisayar korsan\u0131na hedef sisteme eri\u015fim veya herhangi bir do\u011frudan fayda sa\u011flamaz. Sadece sabotaj amac\u0131yla veya bilgisayar korsanlar\u0131 ba\u015fka sald\u0131r\u0131lar ger\u00e7ekle\u015ftirirken g\u00fcvenlik ekiplerinin dikkatini da\u011f\u0131tmak i\u00e7in kullan\u0131lan bir \u015fa\u015f\u0131rtmaca olarak kullan\u0131l\u0131r.<\/p>\n\n\n\n<p>G\u00fcvenlik duvarlar\u0131 ve a\u011f g\u00fcvenlik \u00e7\u00f6z\u00fcmleri, k\u00fc\u00e7\u00fck \u00f6l\u00e7ekli DoS sald\u0131r\u0131lar\u0131na kar\u015f\u0131 korunmaya yard\u0131mc\u0131 olabilir. \u0130\u015fletmeler, b\u00fcy\u00fck \u00f6l\u00e7ekli <strong>DDoS&#8217;a kar\u015f\u0131 koruma <\/strong>sa\u011flamak i\u00e7in \u00e7ok say\u0131da k\u00f6t\u00fc ama\u00e7l\u0131 iste\u011fe yan\u0131t vermek \u00fczere iste\u011fe g\u00f6re \u00f6l\u00e7eklenebilen bulut tabanl\u0131 DDoS korumas\u0131ndan yararlan\u0131r.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Kimlik Av\u0131 (Phishing) ve Sosyal M\u00fchendislik (Social Engineering)<\/h3>\n\n\n\n<p>Sosyal m\u00fchendislik, siber sald\u0131r\u0131lar\u0131n %90&#8217;\u0131ndan fazlas\u0131nda kullan\u0131lan, b\u00fcy\u00fck \u00f6l\u00e7\u00fcde insan etkile\u015fimine dayanan bir sald\u0131r\u0131 vekt\u00f6r\u00fcd\u00fcr. G\u00fcvenilir bir ki\u015fi veya varl\u0131\u011f\u0131n kimli\u011fine b\u00fcr\u00fcnmeyi ve bireyleri bir bilgisayar korsan\u0131na hassas bilgiler vermeleri, para aktarmalar\u0131 veya sistemlere veya a\u011flara eri\u015fim sa\u011flamalar\u0131 i\u00e7in kand\u0131rmay\u0131 i\u00e7erir.<\/p>\n\n\n\n<p>Kimlik av\u0131 sald\u0131r\u0131lar\u0131, k\u00f6t\u00fc niyetli bir bilgisayar korsan\u0131 bir hedeften hassas bilgiler ald\u0131\u011f\u0131nda ve g\u00fcvenilir ve yasal bir kaynaktan geliyormu\u015f gibi g\u00f6r\u00fcnen bir mesaj g\u00f6nderdi\u011finde ger\u00e7ekle\u015fir.&nbsp;<\/p>\n\n\n\n<p>Bir kimlik av\u0131 mesaj\u0131n\u0131n par\u00e7as\u0131 olarak, bilgisayar korsanlar\u0131 genellikle k\u00f6t\u00fc ama\u00e7l\u0131 web sitelerine ba\u011flant\u0131lar g\u00f6nderir, kullan\u0131c\u0131dan k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m indirmesini ister veya do\u011frudan e-posta, k\u0131sa mesaj sistemleri veya sosyal medya platformlar\u0131 arac\u0131l\u0131\u011f\u0131yla hassas bilgiler ister. Kimlik av\u0131n\u0131n bir \u00e7e\u015fidi, bilgisayar korsanlar\u0131n\u0131n a\u011f y\u00f6neticileri, y\u00f6neticiler veya finansal rollerdeki \u00e7al\u0131\u015fanlar gibi \u00f6zel ayr\u0131cal\u0131klara sahip ki\u015filere \u00f6zenle haz\u0131rlanm\u0131\u015f mesajlar g\u00f6nderdi\u011fi &#8220;hedefli kimlik av\u0131&#8221;d\u0131r.<\/p>\n\n\n\n<p><strong>\u0130lgili \u0130\u00e7erik:<\/strong> <a href=\"https:\/\/uzmanposta.com\/blog\/phishing-nedir\/\">Phishing Nedir? Phishing (Oltalama) Sald\u0131r\u0131s\u0131 Nas\u0131l Engellenir?<\/a><\/p>\n\n\n\n<p><strong>\u0130lgili \u0130\u00e7erik:<\/strong> <a href=\"https:\/\/uzmanposta.com\/blog\/kimlik-avi-nedir-nasil-onlenir\/\">Kimlik Av\u0131 Nedir, Nas\u0131l \u00d6nlenir?<\/a><\/p>\n\n\n\n<p><strong>\u0130lgili \u0130\u00e7erik:<\/strong> <a href=\"https:\/\/uzmanposta.com\/blog\/sosyal-muhendislik\/\">Sosyal M\u00fchendislik Nedir? Sosyal M\u00fchendislik Sald\u0131r\u0131lar\u0131 Nas\u0131l \u00d6nlenir?<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. MitM&nbsp;<\/h3>\n\n\n\n<p><strong>Ortadaki Adam (MitM) sald\u0131r\u0131lar\u0131<\/strong>, bilgisayar korsanlar\u0131n\u0131n a\u011flar, bilgisayarlar veya kullan\u0131c\u0131lar aras\u0131nda iletilen verilere m\u00fcdahale etmesine olanak tan\u0131yan ihlallerdir. Bilgisayar korsan\u0131, genellikle tespit edilmeden iki taraf\u0131n ileti\u015fimlerini g\u00f6zetleyebilir ve iletileri hedeflenen al\u0131c\u0131ya g\u00f6ndermeden \u00f6nce de\u011fi\u015ftirebilir.<\/p>\n\n\n\n<p>Kendinizi MitM sald\u0131r\u0131lar\u0131ndan korumak i\u00e7in VPN kullanabilir veya g\u00fc\u00e7l\u00fc \u015fifreleme uygulayabilirsiniz.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">6. Dosyas\u0131z Sald\u0131r\u0131lar (Fileless Attacks)<\/h3>\n\n\n\n<p>Dosyas\u0131z sald\u0131r\u0131lar, kullan\u0131c\u0131n\u0131n cihaz\u0131nda zaten y\u00fckl\u00fc olan uygulamalardan yararlanan<strong> yeni bir k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m sald\u0131r\u0131s\u0131<\/strong> t\u00fcr\u00fcd\u00fcr. Kendini bir hedef makineye da\u011f\u0131tmas\u0131 gereken geleneksel k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131n aksine g\u00fcvenli kabul edilen \u00f6nceden y\u00fcklenmi\u015f uygulamalar\u0131 kullan\u0131r ve bu nedenle eski antivir\u00fcs ara\u00e7lar\u0131 taraf\u0131ndan tespit edilemez.<\/p>\n\n\n\n<p>Dosyas\u0131z k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m sald\u0131r\u0131lar\u0131, kullan\u0131c\u0131 taraf\u0131ndan ba\u015flat\u0131lan eylemlerle veya i\u015fletim sistemi g\u00fcvenlik a\u00e7\u0131klar\u0131ndan yararlan\u0131larak kullan\u0131c\u0131 eylemi olmadan tetiklenebilir. Dosyas\u0131z k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m, cihaz\u0131n RAM&#8217;inde bulunur ve k\u00f6t\u00fc ama\u00e7l\u0131 kod enjekte etmek i\u00e7in genellikle PowerShell ve Windows Y\u00f6netim Ara\u00e7lar\u0131 (WMI) gibi yerel i\u015fletim sistemi ara\u00e7lar\u0131na eri\u015fir.<\/p>\n\n\n\n<p>Ayr\u0131cal\u0131kl\u0131 bir sistemdeki g\u00fcvenilir bir uygulama, sistem i\u015flemlerini birden fazla u\u00e7 noktada ger\u00e7ekle\u015ftirebilir ve bu da onlar\u0131 dosyas\u0131z k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m sald\u0131r\u0131lar\u0131 i\u00e7in ideal hedefler haline getirir.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Siber Sald\u0131r\u0131lar Nas\u0131l \u00d6nlenir? Yayg\u0131n Siber G\u00fcvenlik \u00c7\u00f6z\u00fcmleri<\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"750\" height=\"375\" src=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/11\/siber-saldirilar-nasil-onlenir-yaygin-siber-guvenlik-cozumleri.png\" alt=\"Siber Sald\u0131r\u0131lar Nas\u0131l \u00d6nlenir? Yayg\u0131n Siber G\u00fcvenlik \u00c7\u00f6z\u00fcmleri\" class=\"wp-image-2736\" srcset=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/11\/siber-saldirilar-nasil-onlenir-yaygin-siber-guvenlik-cozumleri.png 750w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/11\/siber-saldirilar-nasil-onlenir-yaygin-siber-guvenlik-cozumleri-300x150.png 300w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/11\/siber-saldirilar-nasil-onlenir-yaygin-siber-guvenlik-cozumleri-360x180.png 360w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><\/figure><\/div>\n\n\n\n<p>A\u015fa\u011f\u0131da, <strong>siber sald\u0131r\u0131lar\u0131 \u00f6nlemek<\/strong> i\u00e7in i\u015fletmeler taraf\u0131ndan yayg\u0131n olarak kullan\u0131lan birka\u00e7 g\u00fcvenlik arac\u0131 bulunmaktad\u0131r. Tabii ki ara\u00e7lar sald\u0131r\u0131lar\u0131 \u00f6nlemek i\u00e7in yeterli de\u011fildir; her i\u015fletmenin, ara\u00e7lar\u0131 y\u00f6netmek ve tehditleri azaltmak i\u00e7in e\u011fitimli BT ve g\u00fcvenlik personeline veya d\u0131\u015f kaynakl\u0131 g\u00fcvenlik hizmetlerine ihtiyac\u0131 vard\u0131r.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Web Uygulamas\u0131 G\u00fcvenlik Duvar\u0131 (WAF)<\/h3>\n\n\n\n<p>WAF, HTTP isteklerini analiz eder ve \u015f\u00fcpheli k\u00f6t\u00fc niyetli trafi\u011fi tespit ederek web uygulamalar\u0131n\u0131 korur. Bu, kod yerle\u015ftirme sald\u0131r\u0131s\u0131 giri\u015fiminde bulunan k\u00f6t\u00fc niyetli bir kullan\u0131c\u0131daki gibi gelen trafik veya bir komuta ve kontrol (C&amp;C) merkeziyle ileti\u015fim kuran yerel bir sunucuya da\u011f\u0131t\u0131lan k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mdaki gibi giden trafik olabilir.<\/p>\n\n\n\n<p>WAF&#8217;ler, k\u00f6t\u00fc ama\u00e7l\u0131 trafi\u011fi bir web uygulamas\u0131na ula\u015fmadan engelleyebilir ve bilgisayar korsanlar\u0131n\u0131n, temel uygulamadaki g\u00fcvenlik a\u00e7\u0131klar\u0131 giderilmemi\u015f olsa bile bir\u00e7ok yayg\u0131n g\u00fcvenlik a\u00e7\u0131\u011f\u0131ndan yararlanmas\u0131n\u0131 \u00f6nleyebilir. Uygulama katman\u0131nda (OSI a\u011f modelinin 7. katman\u0131) bilgisayar korsan\u0131 taraf\u0131ndan ger\u00e7ekle\u015ftirilen sald\u0131r\u0131lar\u0131 koruyarak geleneksel g\u00fcvenlik duvarlar\u0131n\u0131 ve sald\u0131r\u0131 tespit sistemlerini (IDS) tamamlar.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. DDoS Korumas\u0131<\/h3>\n\n\n\n<p>Bir <strong>DDoS koruma \u00e7\u00f6z\u00fcm\u00fc<\/strong>, bir a\u011f\u0131 veya sunucuyu hizmet reddi sald\u0131r\u0131lar\u0131na kar\u015f\u0131 koruyabilir. Bunu, i\u015fletme taraf\u0131ndan yerinde da\u011f\u0131t\u0131lan \u00f6zel a\u011f ekipman\u0131 kullanarak veya bulut tabanl\u0131 bir hizmet olarak yapar. Bulut tabanl\u0131 hizmetler, talep \u00fczerine \u00f6l\u00e7eklenebildikleri i\u00e7in milyonlarca botu i\u00e7eren b\u00fcy\u00fck \u00f6l\u00e7ekli DDoS sald\u0131r\u0131lar\u0131n\u0131 sapt\u0131rabilir.<\/p>\n\n\n\n<p>Bir DDoS koruma sistemi veya hizmeti, bir DDoS sald\u0131r\u0131 d\u00fczenini alg\u0131lamak ve me\u015fru trafi\u011fi k\u00f6t\u00fc niyetli trafikten ay\u0131rmak i\u00e7in trafi\u011fi izler. Bir sald\u0131r\u0131 tespit etti\u011finde, trafik paketlerini inceleyerek ve k\u00f6t\u00fc ama\u00e7l\u0131 oldu\u011fu d\u00fc\u015f\u00fcn\u00fclenleri b\u0131rakarak, hedef sunucuya veya a\u011fa ula\u015fmas\u0131n\u0131 engelleyerek &#8220;temizleme&#8221; ger\u00e7ekle\u015ftirir. Ayn\u0131 zamanda, hizmette herhangi bir kesinti olmamas\u0131n\u0131 sa\u011flamak i\u00e7in me\u015fru trafi\u011fi hedef sisteme y\u00f6nlendirir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Bot Korumas\u0131<\/h3>\n\n\n\n<p>\u0130nternet trafi\u011finin b\u00fcy\u00fck bir y\u00fczdesini olu\u015fturan botlar, sistem kaynaklar\u0131n\u0131 ele ge\u00e7irerek web sitelerine a\u011f\u0131r bir y\u00fck bindirir. Baz\u0131 botlar yararl\u0131 olsa da (web sitelerini arama motorlar\u0131 i\u00e7in dizine ekleyen botlar gibi), di\u011ferleri k\u00f6t\u00fc ama\u00e7l\u0131 faaliyetler ger\u00e7ekle\u015ftirebilir. Botlar, DDoS i\u00e7in, web sitelerinden i\u00e7erik kaz\u0131mak, otomatik olarak web uygulamas\u0131 sald\u0131r\u0131lar\u0131 ger\u00e7ekle\u015ftirmek, spam ve k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m yaymak ve daha fazlas\u0131 i\u00e7in kullan\u0131labilir.<\/p>\n\n\n\n<p>Bir bot koruma sistemi, k\u00f6t\u00fc botlar\u0131 alg\u0131lar ve engellerken me\u015fru botlar\u0131n arama indeksleme, test etme ve performans izleme gibi faaliyetler ger\u00e7ekle\u015ftirmesine izin verir. Bunu, bilinen bot kaynaklar\u0131n\u0131n geni\u015f bir veri taban\u0131n\u0131 koruyarak ve bir botun k\u00f6t\u00fc niyetli oldu\u011funu g\u00f6sterebilecek davran\u0131\u015f kal\u0131plar\u0131n\u0131 tespit ederek yapar.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Bulut G\u00fcvenli\u011fi<\/h3>\n\n\n\n<p>G\u00fcn\u00fcm\u00fczde neredeyse t\u00fcm i\u015fletmeler altyap\u0131y\u0131, uygulamalar\u0131 ve verileri bulutta y\u00f6netir. Bulut sistemleri, genellikle genel a\u011flara maruz kal\u0131r, olduk\u00e7a dinamiktir ve kurumsal a\u011f d\u0131\u015f\u0131nda \u00e7al\u0131\u015f\u0131r. D\u00fc\u015f\u00fck d\u00fczeyde g\u00f6r\u00fcn\u00fcrl\u00fck ya\u015fad\u0131klar\u0131 i\u00e7in siber tehditlere kar\u015f\u0131 \u00f6zellikle savunmas\u0131zd\u0131r.<\/p>\n\n\n\n<p>Bulut sa\u011flay\u0131c\u0131lar\u0131, altyap\u0131lar\u0131n\u0131n g\u00fcvenli\u011fini sa\u011flama sorumlulu\u011funu \u00fcstlenir ve bulut kullan\u0131c\u0131lar\u0131n\u0131n verilerini ve i\u015f y\u00fcklerini g\u00fcvence alt\u0131na almalar\u0131na yard\u0131mc\u0131 olabilecek yerle\u015fik g\u00fcvenlik ara\u00e7lar\u0131 sunar. Ancak, birinci taraf bulut g\u00fcvenlik ara\u00e7lar\u0131 s\u0131n\u0131rl\u0131d\u0131r ve bunlar\u0131n do\u011fru bir \u015fekilde kullan\u0131ld\u0131\u011f\u0131na ve t\u00fcm bulut kaynaklar\u0131n\u0131n ger\u00e7ekten g\u00fcvenli oldu\u011funa dair bir garanti yoktur. Bir\u00e7ok i\u015fletme, bulutta da\u011f\u0131t\u0131lan t\u00fcm hassas varl\u0131klar\u0131n uygun \u015fekilde korunmas\u0131n\u0131 sa\u011flamak i\u00e7in <strong>\u00f6zel bulut g\u00fcvenlik \u00e7\u00f6z\u00fcmleri<\/strong> kullan\u0131r.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. Veri Taban\u0131 G\u00fcvenli\u011fi<\/h3>\n\n\n\n<p>Veri tabanlar\u0131 genellikle hassas g\u00f6revler a\u00e7\u0131s\u0131ndan kritik bilgiler tutar. Bu y\u00fczden bilgisayar korsanlar\u0131 i\u00e7in birincil hedeftir. Veri tabanlar\u0131n\u0131n g\u00fcvenli\u011fini sa\u011flamak, veri taban\u0131 sunucular\u0131n\u0131n sa\u011flamla\u015ft\u0131r\u0131lmas\u0131n\u0131, veri tabanlar\u0131n\u0131n eri\u015fim kontrol\u00fc ve \u015fifrelemeyi etkinle\u015ftirecek \u015fekilde uygun \u015fekilde yap\u0131land\u0131r\u0131lmas\u0131n\u0131 ve k\u00f6t\u00fc ama\u00e7l\u0131 etkinliklerin izlenmesini i\u00e7erir. <strong>Veri taban\u0131 g\u00fcvenlik \u00e7\u00f6z\u00fcmleri<\/strong>, i\u015fletme genelinde veri tabanlar\u0131 i\u00e7in tutarl\u0131 bir g\u00fcvenlik d\u00fczeyi sa\u011flamaya yard\u0131mc\u0131 olabilir. A\u015f\u0131r\u0131 ayr\u0131cal\u0131klar, veri taban\u0131 motorlar\u0131ndaki yama uygulanmam\u0131\u015f g\u00fcvenlik a\u00e7\u0131klar\u0131, korumas\u0131z hassas veriler ve veri taban\u0131 enjeksiyonu gibi sorunlar\u0131 \u00f6nlemeye yard\u0131mc\u0131 olabilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">6. API G\u00fcvenli\u011fi<\/h3>\n\n\n\n<p>Modern uygulamalar, di\u011fer uygulamalarla ileti\u015fim kurmak, veri veya hizmet almak i\u00e7in uygulama programlama arabirimlerini (API&#8217;ler) kullan\u0131r. API&#8217;ler, bir i\u015fletme i\u00e7indeki sistemleri entegre etmek i\u00e7in kullan\u0131l\u0131r ve \u00fc\u00e7\u00fcnc\u00fc \u015fah\u0131slar taraf\u0131ndan i\u015fletilen sistemlerle ileti\u015fim kurmak ve onlardan veri almak i\u00e7in giderek daha fazla kullan\u0131lmaktad\u0131r.<\/p>\n\n\n\n<p>T\u00fcm API&#8217;ler, \u00f6zellikle <strong>internet \u00fczerinden eri\u015filen genel API<\/strong>&#8216;ler, sald\u0131r\u0131lara kar\u015f\u0131 hassast\u0131r. API&#8217;ler y\u00fcksek d\u00fczeyde yap\u0131land\u0131r\u0131lm\u0131\u015f ve belgelenmi\u015f oldu\u011fundan, bilgisayar korsan\u0131n\u0131n bunlar\u0131 \u00f6\u011frenmesi ve manip\u00fcle etmesi kolayd\u0131r. Pek \u00e7ok API d\u00fczg\u00fcn bir \u015fekilde g\u00fcvenli de\u011fildir, zay\u0131f bir \u015fekilde do\u011frulanabilir veya siteler aras\u0131 komut dosyas\u0131 \u00e7al\u0131\u015ft\u0131rma (XSS), SQL enjeksiyonu ve ortadaki adam (MitM) sald\u0131r\u0131lar\u0131 gibi g\u00fcvenlik a\u00e7\u0131klar\u0131na maruz kalabilir.<\/p>\n\n\n\n<p><strong>API&#8217;lerin g\u00fcvenli\u011fini sa\u011flamak<\/strong>, g\u00fc\u00e7l\u00fc \u00e7ok fakt\u00f6rl\u00fc kimlik do\u011frulama (MFA), kimlik do\u011frulama belirte\u00e7lerinin g\u00fcvenli kullan\u0131m\u0131, aktar\u0131lan verilerin \u015fifrelenmesi ve enjeksiyon sald\u0131r\u0131lar\u0131n\u0131 \u00f6nlemek i\u00e7in kullan\u0131c\u0131 girdilerinin sterilize edilmesi dahil olmak \u00fczere \u00e7e\u015fitli \u00f6nlemler gerektirir. <strong>API \u00e7\u00f6z\u00fcmleri<\/strong>, API&#8217;ler i\u00e7in bu g\u00fcvenlik kontrollerinin merkezi bir \u015fekilde uygulanmas\u0131na yard\u0131mc\u0131 olabilir.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\u0130\u015fletmeler E-Posta Verilerini Siber Sald\u0131r\u0131dan Nas\u0131l Korumal\u0131d\u0131r?<\/h2>\n\n\n\n<p>E-posta\u2019lar, siber sald\u0131r\u0131lar ger\u00e7ekle\u015ftirmek i\u00e7in her zaman en zay\u0131f halkalardan biridir. Statista taraf\u0131ndan haz\u0131rlanan bir\u00e7ok rapora g\u00f6re, e-posta spam trafi\u011fi, toplam e-posta trafi\u011finin %56&#8217;s\u0131d\u0131r. Bu y\u00fczden e-posta tabanl\u0131 siber sald\u0131r\u0131lar\u0131 \u00f6nlemeniz gerekir. <\/p>\n\n\n\n<p> E-posta tabanl\u0131 siber sald\u0131r\u0131lar\u0131 \u00f6nemli \u00f6l\u00e7\u00fcde azaltman\u0131za yard\u0131mc\u0131 olabilecek baz\u0131 ipu\u00e7lar\u0131 a\u015fa\u011f\u0131daki \u015fekildedir:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. U\u00e7tan Uca \u015eifreleme ile Korumal\u0131 E-posta\u2019lar Kullan\u0131n<\/h3>\n\n\n\n<p>E-posta\u2019lar\u0131 \u015fifrelemeden g\u00f6ndermek, i\u015fletmenize \u00f6zel e-posta&#8217;lar\u0131 \u00fc\u00e7\u00fcnc\u00fc bir taraf\u0131n okumas\u0131na izin verdi\u011finiz anlam\u0131na gelir. U\u00e7tan uca \u015fifreleme, t\u00fcm verileri bir sunucuya g\u00f6nderilmeden \u00f6nce sunucunun sahip olmad\u0131\u011f\u0131 bir \u015fifreleme anahtar\u0131 kullanarak \u015fifreleyen bir teknolojidir. \u015eifreleme, sunucu d\u00fczeyinde bir ihlal oldu\u011funda e-posta\u2019lar\u0131n\u0131z\u0131 veri s\u0131z\u0131nt\u0131lar\u0131na kar\u015f\u0131 korumaya yard\u0131mc\u0131 olur.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. \u00c7al\u0131\u015fanlar\u0131n\u0131z\u0131 E\u011fitin<\/h3>\n\n\n\n<p>Bilgisayar korsanlar\u0131, \u00e7e\u015fitli sosyal m\u00fchendislik, kimlik av\u0131 ve URL sahtekarl\u0131\u011f\u0131 teknikleri kullanarak k\u00f6t\u00fc ama\u00e7l\u0131 e-posta\u2019lar olu\u015fturur ve bunlar\u0131n zarars\u0131z g\u00f6r\u00fcnmesini sa\u011flar. Bu k\u00f6t\u00fc ama\u00e7l\u0131 e-posta\u2019lar, indirildi\u011finde veya t\u0131kland\u0131\u011f\u0131nda en k\u00f6t\u00fc g\u00fcvenlik risklerine yol a\u00e7abilen vir\u00fcsl\u00fc ek ve ba\u011flant\u0131larla birlikte gelir.<\/p>\n\n\n\n<p>\u00c7al\u0131\u015fanlar\u0131n\u0131z\u0131 e\u011fitti\u011finizde ve onlar\u0131 bu t\u00fcr sald\u0131r\u0131lara maruz b\u0131rakt\u0131\u011f\u0131n\u0131zda, i\u015fletmenizi siber sald\u0131r\u0131lardan kurtarm\u0131\u015f olursunuz. Sahte sald\u0131r\u0131lar\u0131 sim\u00fcle etmek, \u00e7al\u0131\u015fanlar\u0131n\u0131z\u0131n kimlik av\u0131, vishing vb. e-posta tehditlerinin kurban\u0131 olmamalar\u0131n\u0131 sa\u011flaman\u0131za yard\u0131mc\u0131 olur.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Uygulamay\u0131 Ba\u015ftan G\u00fcvenli Hale Getirin<\/h3>\n\n\n\n<p>G\u00f6ndermeden \u00f6nce <strong>Sender Policy Framework (SPF), Domain Keys Identified Mail (DKIM)<\/strong> gibi \u00fcst d\u00fczey<strong> e-posta kimlik do\u011frulama <\/strong>standartlar\u0131n\u0131 kontrol eden mevcut<strong> en iyi spam filtreleme algoritmalar\u0131na<\/strong> sahip olun ve spam e-posta\u2019lar\u0131 \u00e7al\u0131\u015fanlar\u0131n posta kutusuna ula\u015fmadan kaynak d\u00fczeyinde tespit etmeyi deneyin. Bu ilk filtreleme sizi birka\u00e7 sald\u0131r\u0131dan kurtarabilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Y\u00f6netici Ayr\u0131cal\u0131klar\u0131n\u0131 K\u0131s\u0131tlay\u0131n<\/h3>\n\n\n\n<p>U\u00e7tan uca \u015fifreleme, sunucu d\u00fczeyindeki ihlalleri azaltmaya yard\u0131mc\u0131 olurken, y\u00f6netim a\u015famas\u0131nda ger\u00e7ekle\u015fen ileti\u015fimlere kar\u015f\u0131 herhangi bir koruma sa\u011flamayabilir. Kimlik av\u0131 kampanyalar\u0131 yoluyla hedeflenen bilgisayar korsanl\u0131\u011f\u0131, geleneksel g\u00fcvenlik politikalar\u0131yla bir y\u00f6netici hesab\u0131n\u0131 kolayca tehlikeye atabilir.<\/p>\n\n\n\n<p>Y\u00f6netici hesaplar\u0131n\u0131n ayr\u0131cal\u0131klar\u0131n\u0131n k\u0131s\u0131tlanmas\u0131, bu sald\u0131r\u0131lar\u0131n\u0131n azalt\u0131lmas\u0131na ve e-posta uygulamas\u0131n\u0131n \u015f\u00fcpheli \u00fc\u00e7\u00fcnc\u00fc taraf m\u00fcdahalesinden korunmas\u0131na yard\u0131mc\u0131 olabilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. \u015eifre Y\u00f6netimi<\/h3>\n\n\n\n<p>B\u00fcy\u00fck ve k\u00fc\u00e7\u00fck harfler, \u00f6zel karakterler vb. gibi \u00e7al\u0131\u015fanlar\u0131n belirledi\u011fi parolalar i\u00e7in ilk g\u00fcvenlik gereksinimlerini zorunlu k\u0131larak t\u00fcm sistemlerin tahmin edilmesi zor parolalarla g\u00fcvence alt\u0131na al\u0131nmas\u0131n\u0131 sa\u011flayabilirsiniz. Bu, siber sald\u0131r\u0131lar\u0131 azaltmaya yard\u0131mc\u0131 olur.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">6. \u015e\u00fcpheli E-posta Eklerini \u0130ndirmeyin<\/h3>\n\n\n\n<p>\u015e\u00fcpheli kaynaklardan gelen PDF&#8217;lerin, Word belgelerinin, ZIP dosyalar\u0131n\u0131n indirilmesini, bu t\u00fcr kaynaklara eri\u015fimi engelleyerek k\u0131s\u0131tlay\u0131n. Bu t\u00fcr belgeleri indirmek, davetsiz misafirlere izin vermenize neden olabilir.<\/p>\n\n\n\n<p>\u00d6zetle diyebiliriz ki,<strong> e-posta tabanl\u0131 siber sald\u0131r\u0131lar<\/strong> her ge\u00e7en g\u00fcn art\u0131yor ve bilgisayar korsanlar\u0131, g\u00fcvenlik sistemlerini tehlikeye atmak i\u00e7in s\u00fcrekli olarak yeni yollar yarat\u0131yor. \u015eimdiye kadar meydana gelen ihlallerin \u00e7o\u011fu, kullan\u0131c\u0131lar\u0131n k\u00f6t\u00fc ama\u00e7l\u0131 e-postalar\u0131 t\u0131klamas\u0131ndan kaynakland\u0131. Bu nedenle, i\u015fletmenizin g\u00fcvenli\u011fini sa\u011flamak ve <strong>e-posta tabanl\u0131 tehditleri <\/strong>ortadan kald\u0131rmak i\u00e7in s\u00fcrekli \u00f6nlemler alarak e-posta&#8217;lar\u0131n\u0131z\u0131 koruyun. Bu sayede hassas verilerinizi g\u00fcvence alt\u0131na al\u0131n.<\/p>\n\n\n\n<p><b>\u0130<\/b><strong>lgili \u0130\u00e7erikler:<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/bec\/\">Business Email Compromise (BEC) Nedir? BEC Sald\u0131r\u0131lar\u0131 Nas\u0131l Engellenir?<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/siber-guvenlik-nedir-veri-guvenligini-nasil-saglariz\/\">Siber G\u00fcvenlik Nedir? Veri G\u00fcvenli\u011fini Nas\u0131l Sa\u011flar\u0131z?<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/viruslu-e-mail-guvenligi\/\">Vir\u00fcsl\u00fc E-Mailler Hakk\u0131nda Al\u0131nacak \u00d6nlemler ve E-Posta G\u00fcvenli\u011fi<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/e-posta-sunucu-destekli-antivirus-programlari\/\">E-posta Sunucu Destekli Antivir\u00fcs Programlar\u0131<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/antispam-nedir\/\">Antispam Nedir? <\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/e-posta-uzerinden-yapilan-saldirilar-ve-alinmasi-gereken-onlemler\/\">E-Posta \u00dczerinden Yap\u0131lan Sald\u0131r\u0131lar ve Al\u0131nmas\u0131 Gereken \u00d6nlemler<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/guvenli-e-posta-iletisimi\/\">G\u00fcvenli E-posta \u0130leti\u015fimi i\u00e7in Al\u0131nacak \u00d6nlemler<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/penetrasyon-sizma-testi\/\">Penetrasyon (S\u0131zma) Testi Nedir, A\u015famalar\u0131 Nelerdir? Firmalar G\u00fcvenlik A\u00e7\u0131klar\u0131n\u0131 Nas\u0131l Giderebilir?<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Siber sald\u0131r\u0131, yetkisiz eri\u015fim elde etmeye, verileri \u00e7almaya veya bilgisayarlara, bilgisayar a\u011flar\u0131na veya di\u011fer bilgi i\u015flem sistemlerine zarar vermeye \u00e7al\u0131\u015fan bilgisayar korsanlar\u0131 taraf\u0131ndan ger\u00e7ekle\u015ftirilen bir dizi eylemdir. Siber sald\u0131r\u0131 herhangi bir yerden ba\u015flat\u0131labilir, bir veya daha fazla taktik, teknik ve prosed\u00fcr (TTP&#8217;ler) kullan\u0131larak bir ki\u015fi veya grup taraf\u0131ndan ger\u00e7ekle\u015ftirilebilir. Siber sald\u0131r\u0131 ba\u015flatan ki\u015filere genellikle siber [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":2733,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[86,1],"tags":[],"class_list":["post-2732","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guvenlik","category-nedir-nasil-yapilir"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Siber Sald\u0131r\u0131 Nedir? \u0130\u015fletmeler E-Posta Verilerini Siber Sald\u0131r\u0131dan Nas\u0131l Korumal\u0131d\u0131r? - Uzman Posta<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/uzmanposta.com\/blog\/siber-saldiri\/\" \/>\n<meta property=\"og:locale\" content=\"tr_TR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Siber Sald\u0131r\u0131 Nedir? \u0130\u015fletmeler E-Posta Verilerini Siber Sald\u0131r\u0131dan Nas\u0131l Korumal\u0131d\u0131r? - Uzman Posta\" \/>\n<meta property=\"og:description\" content=\"Siber sald\u0131r\u0131, yetkisiz eri\u015fim elde etmeye, verileri \u00e7almaya veya bilgisayarlara, bilgisayar a\u011flar\u0131na veya di\u011fer bilgi i\u015flem sistemlerine zarar vermeye \u00e7al\u0131\u015fan bilgisayar korsanlar\u0131 taraf\u0131ndan ger\u00e7ekle\u015ftirilen bir dizi eylemdir. Siber sald\u0131r\u0131 herhangi bir yerden ba\u015flat\u0131labilir, bir veya daha fazla taktik, teknik ve prosed\u00fcr (TTP&#8217;ler) kullan\u0131larak bir ki\u015fi veya grup taraf\u0131ndan ger\u00e7ekle\u015ftirilebilir. Siber sald\u0131r\u0131 ba\u015flatan ki\u015filere genellikle siber [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/uzmanposta.com\/blog\/siber-saldiri\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/uzmanposta\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-02T10:50:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-13T07:07:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/11\/siber-saldiri-nedir-isletmeler-eposta-verilerini-siber-saldirilardan-nasil-korumalidir.png\" \/>\n\t<meta property=\"og:image:width\" content=\"750\" \/>\n\t<meta property=\"og:image:height\" content=\"375\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Sibel Ho\u015f\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@uZmanPosta\" \/>\n<meta name=\"twitter:site\" content=\"@uZmanPosta\" \/>\n<meta name=\"twitter:label1\" content=\"Yazan:\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sibel Ho\u015f\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tahmini okuma s\u00fcresi\" \/>\n\t<meta name=\"twitter:data2\" content=\"14 dakika\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Siber Sald\u0131r\u0131 Nedir? \u0130\u015fletmeler E-Posta Verilerini Siber Sald\u0131r\u0131dan Nas\u0131l Korumal\u0131d\u0131r? - Uzman Posta","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/uzmanposta.com\/blog\/siber-saldiri\/","og_locale":"tr_TR","og_type":"article","og_title":"Siber Sald\u0131r\u0131 Nedir? \u0130\u015fletmeler E-Posta Verilerini Siber Sald\u0131r\u0131dan Nas\u0131l Korumal\u0131d\u0131r? - Uzman Posta","og_description":"Siber sald\u0131r\u0131, yetkisiz eri\u015fim elde etmeye, verileri \u00e7almaya veya bilgisayarlara, bilgisayar a\u011flar\u0131na veya di\u011fer bilgi i\u015flem sistemlerine zarar vermeye \u00e7al\u0131\u015fan bilgisayar korsanlar\u0131 taraf\u0131ndan ger\u00e7ekle\u015ftirilen bir dizi eylemdir. Siber sald\u0131r\u0131 herhangi bir yerden ba\u015flat\u0131labilir, bir veya daha fazla taktik, teknik ve prosed\u00fcr (TTP&#8217;ler) kullan\u0131larak bir ki\u015fi veya grup taraf\u0131ndan ger\u00e7ekle\u015ftirilebilir. Siber sald\u0131r\u0131 ba\u015flatan ki\u015filere genellikle siber [&hellip;]","og_url":"https:\/\/uzmanposta.com\/blog\/siber-saldiri\/","og_site_name":"Blog","article_publisher":"https:\/\/www.facebook.com\/uzmanposta\/","article_published_time":"2022-12-02T10:50:01+00:00","article_modified_time":"2023-04-13T07:07:56+00:00","og_image":[{"width":750,"height":375,"url":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/11\/siber-saldiri-nedir-isletmeler-eposta-verilerini-siber-saldirilardan-nasil-korumalidir.png","type":"image\/png"}],"author":"Sibel Ho\u015f","twitter_card":"summary_large_image","twitter_creator":"@uZmanPosta","twitter_site":"@uZmanPosta","twitter_misc":{"Yazan:":"Sibel Ho\u015f","Tahmini okuma s\u00fcresi":"14 dakika"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/uzmanposta.com\/blog\/siber-saldiri\/#article","isPartOf":{"@id":"https:\/\/uzmanposta.com\/blog\/siber-saldiri\/"},"author":{"name":"Sibel Ho\u015f","@id":"https:\/\/uzmanposta.com\/blog\/#\/schema\/person\/ac85212a35ebcaaf56c92a7e051813d6"},"headline":"Siber Sald\u0131r\u0131 Nedir? \u0130\u015fletmeler E-Posta Verilerini Siber Sald\u0131r\u0131dan Nas\u0131l Korumal\u0131d\u0131r?","datePublished":"2022-12-02T10:50:01+00:00","dateModified":"2023-04-13T07:07:56+00:00","mainEntityOfPage":{"@id":"https:\/\/uzmanposta.com\/blog\/siber-saldiri\/"},"wordCount":3297,"publisher":{"@id":"https:\/\/uzmanposta.com\/blog\/#organization"},"image":{"@id":"https:\/\/uzmanposta.com\/blog\/siber-saldiri\/#primaryimage"},"thumbnailUrl":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/11\/siber-saldiri-nedir-isletmeler-eposta-verilerini-siber-saldirilardan-nasil-korumalidir.png","articleSection":["G\u00fcvenlik","Nedir? Nas\u0131l Yap\u0131l\u0131r?"],"inLanguage":"tr"},{"@type":"WebPage","@id":"https:\/\/uzmanposta.com\/blog\/siber-saldiri\/","url":"https:\/\/uzmanposta.com\/blog\/siber-saldiri\/","name":"Siber Sald\u0131r\u0131 Nedir? \u0130\u015fletmeler E-Posta Verilerini Siber Sald\u0131r\u0131dan Nas\u0131l Korumal\u0131d\u0131r? - Uzman Posta","isPartOf":{"@id":"https:\/\/uzmanposta.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/uzmanposta.com\/blog\/siber-saldiri\/#primaryimage"},"image":{"@id":"https:\/\/uzmanposta.com\/blog\/siber-saldiri\/#primaryimage"},"thumbnailUrl":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/11\/siber-saldiri-nedir-isletmeler-eposta-verilerini-siber-saldirilardan-nasil-korumalidir.png","datePublished":"2022-12-02T10:50:01+00:00","dateModified":"2023-04-13T07:07:56+00:00","breadcrumb":{"@id":"https:\/\/uzmanposta.com\/blog\/siber-saldiri\/#breadcrumb"},"inLanguage":"tr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/uzmanposta.com\/blog\/siber-saldiri\/"]}]},{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/uzmanposta.com\/blog\/siber-saldiri\/#primaryimage","url":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/11\/siber-saldiri-nedir-isletmeler-eposta-verilerini-siber-saldirilardan-nasil-korumalidir.png","contentUrl":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2022\/11\/siber-saldiri-nedir-isletmeler-eposta-verilerini-siber-saldirilardan-nasil-korumalidir.png","width":750,"height":375,"caption":"Siber Sald\u0131r\u0131 Nedir? \u0130\u015fletmeler E-Posta Verilerini Siber Sald\u0131r\u0131dan Nas\u0131l Korumal\u0131d\u0131r?"},{"@type":"BreadcrumbList","@id":"https:\/\/uzmanposta.com\/blog\/siber-saldiri\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/uzmanposta.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Nedir? Nas\u0131l Yap\u0131l\u0131r?","item":"https:\/\/uzmanposta.com\/blog\/nedir-nasil-yapilir\/"},{"@type":"ListItem","position":3,"name":"Siber Sald\u0131r\u0131 Nedir? \u0130\u015fletmeler E-Posta Verilerini Siber Sald\u0131r\u0131dan Nas\u0131l Korumal\u0131d\u0131r?"}]},{"@type":"WebSite","@id":"https:\/\/uzmanposta.com\/blog\/#website","url":"https:\/\/uzmanposta.com\/blog\/","name":"Blog","description":"","publisher":{"@id":"https:\/\/uzmanposta.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/uzmanposta.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"tr"},{"@type":"Organization","@id":"https:\/\/uzmanposta.com\/blog\/#organization","name":"Uzman Posta","url":"https:\/\/uzmanposta.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/uzmanposta.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2020\/05\/logo.png","contentUrl":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2020\/05\/logo.png","width":131,"height":60,"caption":"Uzman Posta"},"image":{"@id":"https:\/\/uzmanposta.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/uzmanposta\/","https:\/\/x.com\/uZmanPosta","https:\/\/www.instagram.com\/uzmanposta\/","https:\/\/www.linkedin.com\/company\/uzmanposta\/","https:\/\/www.youtube.com\/channel\/UCk2n1vp1YJ0n3XaDRWBi88Q"]},{"@type":"Person","@id":"https:\/\/uzmanposta.com\/blog\/#\/schema\/person\/ac85212a35ebcaaf56c92a7e051813d6","name":"Sibel Ho\u015f","image":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/secure.gravatar.com\/avatar\/f925f03d20ff0803ddb37c96d39d3793c085014ce56421050f24823c23db1c2a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f925f03d20ff0803ddb37c96d39d3793c085014ce56421050f24823c23db1c2a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f925f03d20ff0803ddb37c96d39d3793c085014ce56421050f24823c23db1c2a?s=96&d=mm&r=g","caption":"Sibel Ho\u015f"},"sameAs":["https:\/\/sibelhos.com\/","https:\/\/www.instagram.com\/bismoothie\/","https:\/\/www.linkedin.com\/in\/sibelhos\/"]}]}},"_links":{"self":[{"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/posts\/2732","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/comments?post=2732"}],"version-history":[{"count":0,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/posts\/2732\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/media\/2733"}],"wp:attachment":[{"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/media?parent=2732"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/categories?post=2732"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/tags?post=2732"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}