{"id":3854,"date":"2023-11-22T10:20:19","date_gmt":"2023-11-22T07:20:19","guid":{"rendered":"https:\/\/uzmanposta.com\/blog\/?p=3854"},"modified":"2024-04-19T10:53:40","modified_gmt":"2024-04-19T07:53:40","slug":"zero-hour-day-attack-protection","status":"publish","type":"post","link":"https:\/\/uzmanposta.com\/blog\/zero-hour-day-attack-protection\/","title":{"rendered":"Zero-Hour (S\u0131f\u0131r\u0131nc\u0131 Saat) &#038; Zero-Day (S\u0131f\u0131r\u0131nc\u0131 G\u00fcn) Sald\u0131r\u0131s\u0131 Nedir? Nas\u0131l Korunabiliriz?"},"content":{"rendered":"\n<p>Bug\u00fcnlerde bir \u015firketin kar\u015f\u0131la\u015ft\u0131\u011f\u0131 en yayg\u0131n siber sald\u0131r\u0131lardan biri s\u0131f\u0131r\u0131nc\u0131 g\u00fcn sald\u0131r\u0131s\u0131d\u0131r (zero-day attack). S\u0131f\u0131r\u0131nc\u0131 g\u00fcn, g\u00fcvenlik ekiplerinin veya g\u00fcvenlik uzmanlar\u0131n\u0131n yaz\u0131l\u0131m a\u00e7\u0131klar\u0131ndan habersiz oldu\u011fu ve a\u00e7\u0131klar\u0131 gidermek i\u00e7in bir g\u00fcvenlik yamas\u0131 veya y\u00fckseltmesi \u00fczerinde \u00e7al\u0131\u015fmak i\u00e7in &#8220;0&#8221; g\u00fcnlerinin oldu\u011fu bir durumu tan\u0131mlar. Yaz\u0131l\u0131m a\u00e7\u0131klar\u0131n\u0131n derhal tespit edilip \u00e7\u00f6z\u00fclmedi\u011fini varsayal\u0131m. Bu durumda, mali kay\u0131p, veri h\u0131rs\u0131zl\u0131\u011f\u0131, operasyonlar\u0131n durdurulmas\u0131, a\u011fa veya sisteme yetkisiz eri\u015fim ve zarar g\u00f6rm\u00fc\u015f itibar dahil olmak \u00fczere i\u015fletme \u00fczerinde \u00f6nemli olumsuz etkileri olabilir.<\/p>\n\n\n\n<p>Bilgisayar korsanlar\u0131n\u0131n s\u0131f\u0131r\u0131nc\u0131 g\u00fcn sald\u0131r\u0131lar\u0131 ile hedef alabilece\u011fi en yayg\u0131n sistemler a\u015fa\u011f\u0131dakileri i\u00e7erir:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>\u0130\u015fletim sistemleri<\/li><li>Donan\u0131m<\/li><li><a href=\"https:\/\/uzmanposta.com\/blog\/iot\/\">Nesnelerin \u0130nterneti (IoT) cihazlar\u0131<\/a><\/li><li>\u00dcr\u00fcn Yaz\u0131l\u0131m\u0131<\/li><li>Kurumsal <a href=\"https:\/\/uzmanposta.com\/blog\/saas-software-as-a-service\/\">SaaS<\/a><\/li><li>Web taray\u0131c\u0131lar\u0131<\/li><li>A\u00e7\u0131k kaynakl\u0131 yaz\u0131l\u0131m<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Zero-Hour Zero-Day Attack Nedir?<\/h2>\n\n\n\n<p>S\u0131f\u0131r\u0131nc\u0131 g\u00fcn sald\u0131r\u0131s\u0131 veya zero-day attack, yaz\u0131l\u0131m geli\u015ftiricinin bir bilgisayar korsan\u0131ndan \u00f6nce bir uygulama veya cihaz a\u00e7\u0131\u011f\u0131 bulmas\u0131 anlam\u0131na gelir. Bu noktada g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131 bulan geli\u015ftiricinin proaktif davranmas\u0131 ve kullan\u0131c\u0131lara bir yama sunmas\u0131 gerekir.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">S\u0131f\u0131r\u0131nc\u0131 G\u00fcn Sald\u0131r\u0131lar\u0131n\u0131n T\u00fcrleri<\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"1000\" height=\"500\" src=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/sifirinci-gun-saldirilarinin-turleri.jpeg\" alt=\"S\u0131f\u0131r\u0131nc\u0131 G\u00fcn Sald\u0131r\u0131lar\u0131n\u0131n T\u00fcrleri\" class=\"wp-image-3858\" srcset=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/sifirinci-gun-saldirilarinin-turleri.jpeg 1000w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/sifirinci-gun-saldirilarinin-turleri-300x150.jpeg 300w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/sifirinci-gun-saldirilarinin-turleri-768x384.jpeg 768w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/sifirinci-gun-saldirilarinin-turleri-360x180.jpeg 360w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/sifirinci-gun-saldirilarinin-turleri-750x375.jpeg 750w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/figure><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">1. Hedefli s\u0131f\u0131r\u0131nc\u0131 g\u00fcn sald\u0131r\u0131lar\u0131<\/h3>\n\n\n\n<p>Hedefli s\u0131f\u0131r\u0131nc\u0131 g\u00fcn sald\u0131r\u0131lar\u0131, hassas veya kazan\u00e7l\u0131 veriler i\u00e7eren belirli sistemlerdeki g\u00fcvenlik a\u00e7\u0131klar\u0131ndan faydalan\u0131r. Bu sald\u0131r\u0131lar\u0131n kurbanlar\u0131 Google gibi b\u00fcy\u00fck teknoloji \u015firketleri, devlet kurumlar\u0131 veya bir sekt\u00f6rdeki rakipler olabilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Hedefli olmayan s\u0131f\u0131r\u0131nc\u0131 g\u00fcn sald\u0131r\u0131lar\u0131<\/h3>\n\n\n\n<p>Bu sald\u0131r\u0131lar, belirli bir yaz\u0131l\u0131m, donan\u0131m veya \u00fcr\u00fcn yaz\u0131l\u0131m\u0131 \u00e7al\u0131\u015ft\u0131ran birden fazla cihazda belirli bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131ndan yararlanan geni\u015f \u00e7apl\u0131 sald\u0131r\u0131lard\u0131r. \u00d6rne\u011fin, bilgisayar korsan\u0131 bir taray\u0131c\u0131n\u0131n bir s\u00fcr\u00fcm\u00fcnde bir a\u00e7\u0131k bulursa, bu taray\u0131c\u0131 s\u00fcr\u00fcm\u00fcn\u00fc \u00e7al\u0131\u015ft\u0131ran her cihaz\u0131 istismar etmeye \u00e7al\u0131\u015f\u0131r.<\/p>\n\n\n\n<p>\u00c7o\u011fu s\u0131f\u0131r\u0131nc\u0131 g\u00fcn sald\u0131r\u0131s\u0131 i\u015fletim sistemlerini, a\u00e7\u0131k kaynak kodunu, a\u011f cihazlar\u0131n\u0131, donan\u0131m\u0131, \u00fcr\u00fcn yaz\u0131l\u0131m\u0131n\u0131, <a href=\"https:\/\/uzmanposta.com\/blog\/bulut-bilisim\/\">bulut tabanl\u0131 hizmetleri<\/a> ve IoT cihazlar\u0131n\u0131 hedef al\u0131r. S\u0131f\u0131r\u0131nc\u0131 g\u00fcn sald\u0131r\u0131lar\u0131 genellikle finans kurumlar\u0131n\u0131 ve bankalar\u0131 hedef al\u0131r.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">S\u0131f\u0131r G\u00fcn Sald\u0131r\u0131s\u0131 Nas\u0131l Ger\u00e7ekle\u015fir?<\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"1000\" height=\"500\" src=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/sifir-gun-saldirisi-nasil-gerceklestirilir.jpeg\" alt=\"S\u0131f\u0131r G\u00fcn Sald\u0131r\u0131s\u0131 Nas\u0131l Ger\u00e7ekle\u015fir?\" class=\"wp-image-3857\" srcset=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/sifir-gun-saldirisi-nasil-gerceklestirilir.jpeg 1000w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/sifir-gun-saldirisi-nasil-gerceklestirilir-300x150.jpeg 300w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/sifir-gun-saldirisi-nasil-gerceklestirilir-768x384.jpeg 768w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/sifir-gun-saldirisi-nasil-gerceklestirilir-360x180.jpeg 360w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/sifir-gun-saldirisi-nasil-gerceklestirilir-750x375.jpeg 750w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/figure><\/div>\n\n\n\n<p>S\u0131f\u0131r\u0131nc\u0131 g\u00fcn sald\u0131r\u0131lar\u0131 be\u015f a\u015famada ger\u00e7ekle\u015febilir: <strong>Tan\u0131mlama<\/strong>, <strong>Olu\u015fturma<\/strong>, <strong>\u0130stihbarat<\/strong>, <strong>Planlama<\/strong> ve <strong>Y\u00fcr\u00fctme<\/strong>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Tan\u0131mlama<\/h3>\n\n\n\n<p>Bu t\u00fcr siber sald\u0131r\u0131larda ilk ad\u0131m hedefi belirlemektir. Bir hedef belirlendikten sonra, bilgisayar korsan\u0131n\u0131n s\u00f6z konusu sistem i\u00e7in hangi g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131n mevcut oldu\u011funu bulmas\u0131 gerekir. Bunu, bilinen hatalar hakk\u0131nda okuyarak veya benzer sistemlerde ge\u00e7mi\u015f sald\u0131r\u0131lar\u0131 ara\u015ft\u0131rarak yapabilirler.<\/p>\n\n\n\n<p>Bu g\u00fcvenlik a\u00e7\u0131klar\u0131 belirlendikten sonra bilgisayar korsanlar\u0131 bunlar\u0131 kullanmak ve gizli tutmak i\u00e7in ellerinden geleni yaparlar, b\u00f6ylece bir sald\u0131r\u0131da kullanmadan \u00f6nce g\u00fcvenlik ekipleri taraf\u0131ndan yamalanmazlar.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Olu\u015fturma<\/h3>\n\n\n\n<p>S\u0131f\u0131r g\u00fcn sald\u0131r\u0131s\u0131, yaz\u0131l\u0131mda daha \u00f6nce bilinmeyen bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131ndan yararlanan bir istismard\u0131r. Siber sald\u0131r\u0131 daha \u00f6nce bilinmeyen bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131 kulland\u0131\u011f\u0131ndan, buna kar\u015f\u0131 korunmak i\u00e7in herhangi bir yama veya d\u00fczeltme mevcut de\u011fildir. Bu da bilgisayar korsanlar\u0131n\u0131n, \u00e7ok ge\u00e7 olana kadar kimse ihlal edildi\u011fini bilmeden bilgisayarlar\u0131n ve a\u011flar\u0131n kontrol\u00fcn\u00fc ele ge\u00e7irmesine olanak tan\u0131r.<\/p>\n\n\n\n<p>S\u0131f\u0131r g\u00fcn sald\u0131r\u0131lar\u0131, olu\u015fturulma a\u015famas\u0131nda, hassas verilere eri\u015fmek veya sald\u0131rd\u0131klar\u0131 belirli hedef hakk\u0131nda bilgi sahibi olmadan hasara neden olmak isteyen k\u00f6t\u00fc niyetli bilgisayar korsanlar\u0131 taraf\u0131ndan olu\u015fturulur. Bu siber sald\u0131r\u0131lar ne kadar hedefe y\u00f6nelik ve etkili olursa, bilgisayar korsanlar\u0131n\u0131n mallar\u0131n\u0131 k\u00e2r amac\u0131yla satt\u0131klar\u0131 yeralt\u0131 karaborsalar\u0131nda de\u011ferleri de o kadar y\u00fcksek olacakt\u0131r.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. \u0130stihbarat<\/h3>\n\n\n\n<p>\u0130stihbarat a\u015famas\u0131nda bilgisayar korsan\u0131 hedef hakk\u0131nda bilgi toplar. Hedefe eri\u015fmenin bir yolunu bulmaya \u00e7al\u0131\u015f\u0131rlar ya da mevcut bir eri\u015fim kanal\u0131n\u0131 kullanabilirler (\u00f6rne\u011fin, sizin i\u00e7in \u00e7al\u0131\u015fan ve fiziksel eri\u015fimi olan bir \u00e7al\u0131\u015fan).<\/p>\n\n\n\n<p>Bilgisayar korsan\u0131n\u0131n, sald\u0131r\u0131s\u0131n\u0131 buna g\u00f6re planlamak i\u00e7in ne yapt\u0131\u011f\u0131na dair bilgiye de ihtiyac\u0131 vard\u0131r. Birinin evinize girmeye \u00e7al\u0131\u015ft\u0131\u011f\u0131n\u0131 ancak alarm sisteminizin nerede oldu\u011funu veya nas\u0131l \u00e7al\u0131\u015ft\u0131\u011f\u0131n\u0131 bilmedi\u011fini varsayal\u0131m. Bu durumda, muhtemelen evinizden de\u011ferli bir \u015fey alamadan polisler taraf\u0131ndan yakalanacaklard\u0131r.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Planlama<\/h3>\n\n\n\n<p>S\u0131f\u0131r g\u00fcn sald\u0131r\u0131s\u0131n\u0131n bir sonraki a\u015famas\u0131 planlamad\u0131r. Bilgisayar korsan\u0131, hedefi belirler. Bu bir ki\u015fi ya da kurum olabilir ve ard\u0131ndan siber sald\u0131r\u0131n\u0131n nas\u0131l ger\u00e7ekle\u015ftirilece\u011fini planlar.<\/p>\n\n\n\n<p>Bilgisayar korsanlar\u0131 hedeflerine karar verdikten sonra, hedefleri hakk\u0131nda sald\u0131r\u0131 i\u00e7in faydal\u0131 olabilecek bilgileri toplamak i\u00e7in ke\u015fif yaparlar. Hedeflerinin bilgisayarlar\u0131 ve a\u011flar\u0131 hakk\u0131nda daha fazla bilgi edinmek i\u00e7in Google Dork gibi ke\u015fif ara\u00e7lar\u0131n\u0131 da kullanabilirler.<\/p>\n\n\n\n<p>T\u00fcm bu bilgiler topland\u0131ktan sonra bilgisayar korsanlar\u0131, ister k\u00f6t\u00fc ama\u00e7l\u0131 kod ister bilgisayar korsanl\u0131\u011f\u0131 ara\u00e7lar\u0131 olsun, ara\u00e7lar\u0131n\u0131 ve planlar\u0131n\u0131 ger\u00e7ekle\u015ftirmek i\u00e7in gereken altyap\u0131y\u0131 haz\u0131rlamaya ba\u015flar.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. Y\u00fcr\u00fctme<\/h3>\n\n\n\n<p>Y\u00fcr\u00fctme a\u015famas\u0131 zero-day sald\u0131r\u0131s\u0131n\u0131n en \u00f6nemli k\u0131sm\u0131d\u0131r, \u00e7\u00fcnk\u00fc as\u0131l hasar bu a\u015famada verilir. Bu, ilk etapta ne t\u00fcr bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131 veya istismar kullan\u0131ld\u0131\u011f\u0131na ba\u011fl\u0131 olarak \u00e7e\u015fitli \u015fekillerde olabilir.<\/p>\n\n\n\n<p>\u00d6rne\u011fin, bir bilgisayar korsan\u0131 sisteminize eri\u015fim sa\u011flamak i\u00e7in bir uzaktan kod y\u00fcr\u00fctme (RCE) hatas\u0131 kullan\u0131r ve ard\u0131ndan sisteminize k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m y\u00fcklerse, bu k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m muhtemelen yarat\u0131c\u0131s\u0131ndan ba\u015fka bir girdi olmadan kendi k\u00f6t\u00fc ama\u00e7l\u0131 eylemlerini ger\u00e7ekle\u015ftirecektir.<\/p>\n\n\n\n<p>Ancak baz\u0131 durumlarda, bilgisayar korsan\u0131 hedeflenen ki\u015finin yard\u0131m\u0131na ihtiya\u00e7 duyabilir. \u00d6rne\u011fin onlar\u0131 kand\u0131rarak ba\u011flant\u0131lara t\u0131klamalar\u0131n\u0131 veya bu ama\u00e7 i\u00e7in \u00f6zel olarak tasarlanm\u0131\u015f e-posta\u2019lardaki ekleri a\u00e7malar\u0131n\u0131 sa\u011flayabilirler. Bu durumlarda, bilgisayar korsan\u0131n\u0131n hedeflerine ula\u015fmalar\u0131 ancak bir izinsiz giri\u015f giri\u015fiminin kendilerini tehlikeye att\u0131\u011f\u0131n\u0131n fark\u0131nda olmayan kullan\u0131c\u0131larla do\u011frudan etkile\u015fime ge\u00e7erek m\u00fcmk\u00fcn olabilir.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Zero-Day Attacks \u00d6rnekleri<\/h2>\n\n\n\n<p>A\u015fa\u011f\u0131da pop\u00fcler Zero-Day sald\u0131r\u0131 \u00f6rneklerinden baz\u0131lar\u0131n\u0131 bulabilirsiniz:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Stuxnet<\/h3>\n\n\n\n<p>\u0130lk olarak 2010 y\u0131l\u0131nda ke\u015ffedilen Stuxnet, ABD ve \u0130srail h\u00fck\u00fcmetleri taraf\u0131ndan \u0130ran&#8217;\u0131n n\u00fckleer program\u0131n\u0131 sekteye u\u011fratmak i\u00e7in yarat\u0131ld\u0131\u011f\u0131na inan\u0131lan bir bilgisayar solucan\u0131d\u0131r. End\u00fcstriyel kontrol sistemlerini hedef al\u0131r ve ekipmana fiziksel hasar verir; \u00f6zellikle fiziksel altyap\u0131y\u0131 yok etmek i\u00e7in tasarlanm\u0131\u015f bilinen ilk k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131md\u0131r.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. WannaCry<\/h3>\n\n\n\n<p>WannaCry, May\u0131s 2017&#8217;de d\u00fcnya \u00e7ap\u0131nda bilgisayarlar\u0131 vuran bir fidye yaz\u0131l\u0131m\u0131 sald\u0131r\u0131s\u0131d\u0131r. Siber sald\u0131r\u0131, kendini yaymak i\u00e7in Microsoft Windows&#8217;taki bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131 kulland\u0131, hedeflenen ki\u015filerin bilgisayarlar\u0131ndaki dosyalar\u0131 \u015fifreledi ve \u015fifrelerini \u00e7\u00f6zmek i\u00e7in fidye talep etti. WannaCry \u00f6zellikle zarar vericiydi, \u00e7\u00fcnk\u00fc kendisini bir bilgisayardan di\u011ferine otomatik olarak yaymak i\u00e7in bir &#8220;solucan&#8221; tekni\u011fi kulland\u0131 ve h\u0131zla bir\u00e7ok bilgisayara bula\u015ft\u0131.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Log4Shell<\/h3>\n\n\n\n<p>Log4Shell, Bash kabu\u011funun g\u00fcnl\u00fck tutma \u00f6zelli\u011findeki bir a\u00e7\u0131ktan yararlanan bir s\u0131f\u0131r\u0131nc\u0131 g\u00fcn sald\u0131r\u0131s\u0131d\u0131r. Bir bilgisayar korsan\u0131 bir dizi komutu birbirine zincirleyerek kabu\u011fu \u00e7al\u0131\u015ft\u0131ran kullan\u0131c\u0131n\u0131n ayr\u0131cal\u0131klar\u0131yla rastgele kod \u00e7al\u0131\u015ft\u0131rabilir. Bu, hassas verilere eri\u015fim elde etmek, ayr\u0131cal\u0131klar\u0131 art\u0131rmak ve hatta sistemin kontrol\u00fcn\u00fc tamamen ele ge\u00e7irmek i\u00e7in kullan\u0131labilir.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">S\u0131f\u0131r\u0131nc\u0131 G\u00fcn Sald\u0131r\u0131s\u0131 Nas\u0131l \u00c7al\u0131\u015f\u0131r?<\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"1000\" height=\"500\" src=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/sifirinci-gun-saldirisi-nasil-calisir.jpeg\" alt=\"S\u0131f\u0131r\u0131nc\u0131 G\u00fcn Sald\u0131r\u0131s\u0131 Nas\u0131l \u00c7al\u0131\u015f\u0131r?\" class=\"wp-image-3859\" srcset=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/sifirinci-gun-saldirisi-nasil-calisir.jpeg 1000w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/sifirinci-gun-saldirisi-nasil-calisir-300x150.jpeg 300w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/sifirinci-gun-saldirisi-nasil-calisir-768x384.jpeg 768w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/sifirinci-gun-saldirisi-nasil-calisir-360x180.jpeg 360w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/sifirinci-gun-saldirisi-nasil-calisir-750x375.jpeg 750w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/figure><\/div>\n\n\n\n<p>Bir s\u0131f\u0131r\u0131nc\u0131 g\u00fcn sald\u0131r\u0131s\u0131n\u0131n nas\u0131l \u00e7al\u0131\u015ft\u0131\u011f\u0131n\u0131 do\u011fru bir \u015fekilde anlamak i\u00e7in, \u00f6ncelikle bu t\u00fcr sald\u0131r\u0131larda yer alan \u00fc\u00e7 temel taraf hakk\u0131nda net bir fikre sahip olman\u0131z gerekir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Bilgisayar korsanlar\u0131<\/h3>\n\n\n\n<p>Bilgisayar korsanlar\u0131, g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 bulmak i\u00e7in belirli bir yaz\u0131l\u0131m veya donan\u0131m par\u00e7as\u0131 hakk\u0131ndaki mevcut bilgileri ara\u015ft\u0131r\u0131r. Bulduklar\u0131 a\u00e7\u0131klardan yararlanarak \u00f6zel bilgilere eri\u015fmeye, fidye talep etmeye ya da sistemi \u00e7\u00f6kertmeye \u00e7al\u0131\u015f\u0131rlar. Bilgisayar korsanlar\u0131 kendi yararlar\u0131na kullanabilecekleri bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131 bulana kadar olas\u0131 \u00e7atlaklar\u0131 taramaya devam eder.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Sat\u0131c\u0131lar<\/h3>\n\n\n\n<p>Sat\u0131c\u0131lar, donan\u0131m veya yaz\u0131l\u0131m\u0131n tescilli sahipleridir. Teknolojinin bak\u0131m\u0131 ve y\u00fckseltilmesinden sorumludurlar. Bir\u00e7ok kurulu\u015f i\u015flerini y\u00fcr\u00fctmek ve sorunlar\u0131n\u0131 \u00e7\u00f6zmek i\u00e7in \u00fcr\u00fcn ve hizmet sat\u0131c\u0131lar\u0131n\u0131 kullan\u0131r. Sat\u0131c\u0131lar g\u00fcvenlik, gizlilik ve y\u00fcksek kullan\u0131labilirlik sa\u011flamak i\u00e7in hizmet seviyesi anla\u015fmalar\u0131na (SLA&#8217;lar) ba\u011fl\u0131d\u0131r. Sat\u0131c\u0131lar, s\u0131f\u0131r g\u00fcn sald\u0131r\u0131s\u0131na tepki verme g\u00fcc\u00fcne sahip olanlard\u0131r. Ancak baz\u0131 durumlarda bilgisayar korsanlar\u0131, bir \u015firketin sistemlerinde yer alan ve sat\u0131c\u0131lar\u0131n dahil olmad\u0131\u011f\u0131 belirli g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 hedef alabilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Son kullan\u0131c\u0131lar<\/h3>\n\n\n\n<p>Son kullan\u0131c\u0131lar, sat\u0131c\u0131lar taraf\u0131ndan sa\u011flanan \u00fcr\u00fcn ve hizmetleri t\u00fcketir. Son kullan\u0131c\u0131 bir kurulu\u015f, \u00e7al\u0131\u015fanlar ya da g\u00fcnl\u00fck t\u00fcketiciler olabilir. Genellikle s\u0131f\u0131r\u0131nc\u0131 g\u00fcn sald\u0131r\u0131s\u0131n\u0131n etkisini ilk hissedenler onlard\u0131r. Sat\u0131c\u0131lar, zarar\u0131n artmamas\u0131n\u0131 sa\u011flamak i\u00e7in son kullan\u0131c\u0131larla birlikte \u00e7al\u0131\u015f\u0131r.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Zero-Hour Zero-Day Attack \u00d6nleme Y\u00f6ntemleri<\/h2>\n\n\n\n<p>S\u0131f\u0131r\u0131nc\u0131 g\u00fcn sald\u0131r\u0131lar\u0131n\u0131 \u00f6nlemenize yard\u0131mc\u0131 olacak baz\u0131 ipu\u00e7lar\u0131 a\u015fa\u011f\u0131daki \u015fekildedir:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. G\u00fcvenlik a\u00e7\u0131\u011f\u0131 taramas\u0131 ger\u00e7ekle\u015ftirin<\/h3>\n\n\n\n<p>S\u0131f\u0131r\u0131nc\u0131 g\u00fcn sald\u0131r\u0131s\u0131n\u0131 \u00f6nlemek i\u00e7in en kritik ad\u0131m g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 taramakt\u0131r. Yaz\u0131l\u0131m koduna y\u00f6nelik sald\u0131r\u0131lar\u0131 sim\u00fcle edebilen ve kodda kusur olup olmad\u0131\u011f\u0131n\u0131 kontrol edebilen g\u00fcvenlik uzmanlar\u0131n\u0131n yard\u0131m\u0131yla, g\u00fcvenlik a\u00e7\u0131\u011f\u0131 taramas\u0131 s\u0131f\u0131r\u0131nc\u0131 g\u00fcn a\u00e7\u0131klar\u0131n\u0131n h\u0131zla ortaya \u00e7\u0131kar\u0131lmas\u0131na yard\u0131mc\u0131 olur. G\u00fcncellenen yaz\u0131l\u0131mlardaki yeni g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131n, zafiyetlerin ve g\u00fcvenlik yap\u0131land\u0131rma hatalar\u0131n\u0131n tespit edilmesine yard\u0131mc\u0131 olur. Ancak bu \u00e7\u00f6z\u00fcm her s\u0131f\u0131r\u0131nc\u0131 g\u00fcn sald\u0131r\u0131s\u0131n\u0131 yakalayamad\u0131\u011f\u0131ndan, i\u015fletmelerin kod incelemeleri yapmalar\u0131 ve bir istismar\u0131 durdurmak i\u00e7in tarama sonucunu ald\u0131ktan sonra derhal harekete ge\u00e7meleri gerekir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Yama y\u00f6netimi ger\u00e7ekle\u015ftirin<\/h3>\n\n\n\n<p>\u0130\u015fletmeler, yeni tespit edilen yaz\u0131l\u0131m a\u00e7\u0131klar\u0131n\u0131 tespit ettikten sonra, bilinen g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 d\u00fczeltmek ve riski azaltmak i\u00e7in m\u00fcmk\u00fcn olan en k\u0131sa s\u00fcrede yaz\u0131l\u0131m yamalar\u0131n\u0131 y\u00fcklemelidir. Bu sayede s\u0131f\u0131r\u0131nc\u0131 g\u00fcn sald\u0131r\u0131lar\u0131 riskini \u00f6nemli \u00f6l\u00e7\u00fcde azaltabilirler.&nbsp;<\/p>\n\n\n\n<p>Yama y\u00f6netimi s\u00fcrecinde i\u015fletmelerin yamalar\u0131 h\u0131zl\u0131 ve verimli bir \u015fekilde uygulamas\u0131 \u00e7ok \u00f6nemlidir, aksi takdirde bu s\u00fcre\u00e7 uzad\u0131k\u00e7a s\u0131f\u0131r\u0131nc\u0131 g\u00fcn sald\u0131r\u0131s\u0131 riski de artar.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Etkili bir Web Uygulamas\u0131 G\u00fcvenlik Duvar\u0131 (WAF) kurun<\/h3>\n\n\n\n<p>U\u00e7 noktalara veya a\u011f kenar\u0131na, gelen ve giden HTTP\/S trafi\u011fini izleyebilen, filtreleyebilen ve \u00f6nleyebilen ve di\u011fer k\u00f6t\u00fc ama\u00e7l\u0131 istekleri engelleyebilen g\u00fc\u00e7l\u00fc bir Web Uygulamas\u0131 G\u00fcvenlik Duvar\u0131 (WAF) (WAF) teknolojisi da\u011f\u0131t\u0131n.&nbsp;Etkili bir WAF, \u015firketinizin tehditlere ger\u00e7ek zamanl\u0131 olarak yan\u0131t vermesini ve ortaya \u00e7\u0131kan tehditlerle g\u00fcncel kalmak i\u00e7in h\u0131zla uyum sa\u011flamas\u0131n\u0131 sa\u011flar.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Yeni Nesil Antivir\u00fcs (NGAV) \u00e7\u00f6z\u00fcm\u00fc y\u00fckleyin<\/h3>\n\n\n\n<p>Geleneksel antivir\u00fcs yaz\u0131l\u0131mlar\u0131 s\u0131f\u0131r\u0131nc\u0131 g\u00fcn tehditlerine kar\u015f\u0131 yetersiz kald\u0131\u011f\u0131ndan, sistemlerinizi g\u00fcvende ve emniyette tutmak i\u00e7in yeni ve geli\u015ftirilmi\u015f Yeni Nesil Antivir\u00fcs (NGAV) \u00e7\u00f6z\u00fcm\u00fc y\u00fckleyebilirsiniz. Bu sayede hacker taktiklerini, tekniklerini ve prosed\u00fcrlerini (TTP) izleyerek ve bunlara yan\u0131t vererek sald\u0131r\u0131lar\u0131 \u00f6nleyebilirsiniz.&nbsp;Bu, genel sald\u0131r\u0131 y\u00fczeyini \u00f6nemli \u00f6l\u00e7\u00fcde azalt\u0131r ve bir\u00e7ok ciddi sald\u0131r\u0131y\u0131 di\u011fer alanlara ula\u015fmadan \u00f6nce \u00f6nler.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. \u0130zinsiz Giri\u015f Koruma Sistemi (IPS) da\u011f\u0131t\u0131n<\/h3>\n\n\n\n<p>Bir a\u011f\u0131 ger\u00e7ek zamanl\u0131 olarak s\u00fcrekli izlemek ve k\u00f6t\u00fc ama\u00e7l\u0131 kodlar\u0131n a\u011fa s\u0131zmas\u0131n\u0131 \u00f6nlemek i\u00e7in bir <a href=\"https:\/\/uzmanposta.com\/blog\/ips\/\">Sald\u0131r\u0131 \u00d6nleme Sistemi (IPS)<\/a> kullan\u0131n. \u0130mza tabanl\u0131 ve anomali alg\u0131lama teknolojisini kullanarak bilinen g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 ve s\u0131f\u0131r\u0131nc\u0131 g\u00fcn sald\u0131r\u0131lar\u0131n\u0131 \u00f6nleyin. Bu sayede k\u00f6t\u00fc niyetli davran\u0131\u015flar\u0131 tespit edin, belirlenen riskleri kaydedin ve g\u00fcvenlik a\u00e7\u0131\u011f\u0131 istismarlar\u0131n\u0131 \u00f6nlemek i\u00e7in \u00f6nleyici tedbirler al\u0131n.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">6. Kullan\u0131c\u0131lar\u0131 e\u011fitin<\/h3>\n\n\n\n<p>Bir i\u015fletme i\u00e7inde, \u00e7ok say\u0131da bilgisayar korsan\u0131 s\u0131f\u0131r\u0131nc\u0131 g\u00fcn sald\u0131r\u0131lar\u0131nda insan hatas\u0131ndan faydalan\u0131r. Bilgisayar korsanlar\u0131, insanlar\u0131 hassas veya gizli bilgileri if\u015fa etmeleri i\u00e7in kand\u0131rmak veya manip\u00fcle etmek i\u00e7in s\u0131f\u0131r\u0131nc\u0131 g\u00fcn sald\u0131r\u0131lar\u0131n\u0131 kullan\u0131r. Bu nedenle, i\u015fletmelerin sistemlerinin ve kurulu\u015flar\u0131n\u0131n g\u00fcvenli\u011fini art\u0131rmak i\u00e7in \u00e7al\u0131\u015fanlar\u0131n\u0131 ve m\u00fc\u015fterilerini s\u0131f\u0131r\u0131nc\u0131 g\u00fcn a\u00e7\u0131klar\u0131 ve ortaya \u00e7\u0131kan di\u011fer riskler veya tehditler hakk\u0131nda e\u011fitmeleri hayati \u00f6nem ta\u015f\u0131r. Ayr\u0131ca, \u00e7al\u0131\u015fanlar\u0131n\u0131za veya m\u00fc\u015fterilerinize k\u00f6t\u00fc ama\u00e7l\u0131 dosyalar\u0131 indirme ve k\u00f6t\u00fc ama\u00e7l\u0131 ekleri a\u00e7ma riskleri konusunda yeterli e\u011fitim verin.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">7. G\u00fc\u00e7l\u00fc bir e-posta g\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fc kullan\u0131n<\/h3>\n\n\n\n<p>G\u00fcn\u00fcm\u00fczde her kurum i\u00e7in en yayg\u0131n tehdit vekt\u00f6r\u00fc e-posta\u2019d\u0131r. Bilgisayar korsan\u0131, kullan\u0131c\u0131n\u0131n sistemine eri\u015fmek i\u00e7in genellikle <a href=\"https:\/\/uzmanposta.com\/blog\/kimlik-avi-nedir-nasil-onlenir\/\">kimlik av\u0131<\/a>, spam ve <a href=\"https:\/\/uzmanposta.com\/blog\/bec\/\">Business Email Compromise (BEC)<\/a> gibi bir e-posta g\u00fcvenlik ihlali yoluyla s\u0131f\u0131r g\u00fcn sald\u0131r\u0131s\u0131 kullan\u0131r. Bu nedenle, e-posta\u2019lar\u0131n\u0131z\u0131 ve kurulu\u015funuzun gizli bilgilerini bilgisayar korsanlar\u0131ndan, spam&#8217;den, k\u00f6t\u00fc ama\u00e7l\u0131 e-posta\u2019lardan ve vir\u00fcslerden korumak i\u00e7in etkili bir e-posta g\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fc kullanmak zorunludur.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">8. Olay M\u00fcdahale Plan\u0131n\u0131 (IRP) uygulay\u0131n<\/h3>\n\n\n\n<p>S\u0131f\u0131r\u0131nc\u0131 g\u00fcn sald\u0131r\u0131lar\u0131na h\u0131zl\u0131 bir \u015fekilde yan\u0131t vermek ve ortaya \u00e7\u0131kan riskleri en aza indirmek i\u00e7in Olay M\u00fcdahale Plan\u0131n\u0131 (IRP) uygulay\u0131n. <\/p>\n\n\n\n<p>IRP alt\u0131 temel ad\u0131mlar\u0131:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Haz\u0131rl\u0131k<\/li><li>Tan\u0131mlama<\/li><li>S\u0131n\u0131rlama<\/li><li>Eradikasyon<\/li><li>Kurtarma<\/li><li>\u00c7\u0131kar\u0131lan dersler<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">S\u0131f\u0131r\u0131nc\u0131 G\u00fcn Sald\u0131r\u0131s\u0131na Kar\u015f\u0131 Kurumsal E-posta\u2019lar\u0131n G\u00fcvenli\u011fini Sa\u011flama<\/h2>\n\n\n\n<p>Bilinmeyen veya ele al\u0131nmam\u0131\u015f g\u00fcvenlik a\u00e7\u0131klar\u0131ndan yararlanan s\u0131f\u0131r\u0131nc\u0131 g\u00fcn sald\u0131r\u0131lar\u0131, siber su\u00e7lular\u0131n kurumsal a\u011flara s\u0131zmas\u0131n\u0131 veya hemen sald\u0131rmas\u0131n\u0131 ya da oturup bunu yapmak i\u00e7in en uygun zaman\u0131 beklemesini sa\u011flar. S\u0131f\u0131r\u0131nc\u0131 g\u00fcn sald\u0131r\u0131lar\u0131n\u0131n \u00e7o\u011fu e-posta yoluyla ger\u00e7ekle\u015ftirilir.<\/p>\n\n\n\n<p>Kullan\u0131c\u0131lar\u0131n\u0131z\u0131, \u00f6nemli i\u015f varl\u0131klar\u0131n\u0131z\u0131 ve itibar\u0131n\u0131z\u0131 \u00e7ok katmanl\u0131 bir e-posta koruma sistemi ile korumak, s\u0131f\u0131r\u0131nc\u0131 g\u00fcn sald\u0131r\u0131lar\u0131n\u0131 gelen kutusundan uzak tutar.<\/p>\n\n\n\n<p>Bu noktada i\u015fletmenizdeki herkesi temel tehdit azaltma konusunda e\u011fitmeniz gerekir. \u015e\u00fcpheli e-posta\u2019lar ve bilinmeyen eklerin a\u00e7\u0131lmamas\u0131 veya kurulu\u015funuzun d\u0131\u015f\u0131ndaki ba\u011flant\u0131lara t\u0131klanmamas\u0131 gibi di\u011fer g\u00fcvenli uygulamalar konusunda fark\u0131ndal\u0131\u011f\u0131 te\u015fvik etmeniz \u015fartt\u0131r.<\/p>\n\n\n\n<p>Ayr\u0131ca t\u00fcm sistemlerinizi yedekleyin ve bir felaket kurtarma plan\u0131 geli\u015ftirin.<\/p>\n\n\n\n<p>Bu uygulamalar ne kadar \u00f6nemli olsa da, belki de en \u00f6nemlisi \u00e7ok katmanl\u0131 bir e-posta g\u00fcvenlik sistemi kurmakt\u0131r.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">S\u0131f\u0131r\u0131nc\u0131 G\u00fcn Sald\u0131r\u0131s\u0131n\u0131 Durdurmak i\u00e7in \u00c7ok Katmanl\u0131 E-posta Korumas\u0131<\/h2>\n\n\n\n<p>S\u0131f\u0131r\u0131nc\u0131 g\u00fcn sald\u0131r\u0131s\u0131 veri g\u00fcvenli\u011fine y\u00f6nelik ciddi bir tehdittir. S\u0131f\u0131r\u0131nc\u0131 g\u00fcn sald\u0131r\u0131s\u0131, bir yaz\u0131l\u0131m par\u00e7as\u0131ndaki bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131ndan yararlanan, bu zay\u0131fl\u0131\u011f\u0131 kullanarak tehdidin bilinmesinden sonraki saatler veya g\u00fcnler i\u00e7inde, ancak d\u00fczeltilmeden veya yamalanmadan \u00f6nce kurumsal bir a\u011fa eri\u015fen bir t\u00fcr geli\u015fmi\u015f kal\u0131c\u0131 tehdittir.<\/p>\n\n\n\n<p>Sald\u0131r\u0131lar genellikle k\u00f6t\u00fc niyetli bir ba\u011flant\u0131 veya bir ek arac\u0131l\u0131\u011f\u0131yla ba\u015flat\u0131ld\u0131\u011f\u0131ndan, bir kurulu\u015fu s\u0131f\u0131r\u0131nc\u0131 g\u00fcn tehdidine kar\u015f\u0131 korumak i\u00e7in e-posta g\u00fcvenli\u011fi \u00e7ok \u00f6nemlidir. S\u0131f\u0131r\u0131nc\u0131 g\u00fcn sald\u0131r\u0131s\u0131n\u0131 \u00f6nlemek, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m, vir\u00fcs ve spam&#8217;in yan\u0131 s\u0131ra kimlik av\u0131, hedefli kimlik av\u0131 gibi hedefli sald\u0131r\u0131lara kar\u015f\u0131 savunmak i\u00e7in birden fazla koruma katman\u0131 gerektirir.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Bug\u00fcnlerde bir \u015firketin kar\u015f\u0131la\u015ft\u0131\u011f\u0131 en yayg\u0131n siber sald\u0131r\u0131lardan biri s\u0131f\u0131r\u0131nc\u0131 g\u00fcn sald\u0131r\u0131s\u0131d\u0131r (zero-day attack). S\u0131f\u0131r\u0131nc\u0131 g\u00fcn, g\u00fcvenlik ekiplerinin veya g\u00fcvenlik uzmanlar\u0131n\u0131n yaz\u0131l\u0131m a\u00e7\u0131klar\u0131ndan habersiz oldu\u011fu ve a\u00e7\u0131klar\u0131 gidermek i\u00e7in bir g\u00fcvenlik yamas\u0131 veya y\u00fckseltmesi \u00fczerinde \u00e7al\u0131\u015fmak i\u00e7in &#8220;0&#8221; g\u00fcnlerinin oldu\u011fu bir durumu tan\u0131mlar. Yaz\u0131l\u0131m a\u00e7\u0131klar\u0131n\u0131n derhal tespit edilip \u00e7\u00f6z\u00fclmedi\u011fini varsayal\u0131m. Bu durumda, mali kay\u0131p, veri [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3856,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[86],"tags":[],"class_list":["post-3854","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guvenlik"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Zero-Hour (S\u0131f\u0131r\u0131nc\u0131 Saat) &amp; Zero-Day (S\u0131f\u0131r\u0131nc\u0131 G\u00fcn) Sald\u0131r\u0131s\u0131 Nedir? Nas\u0131l Korunabiliriz? - Uzman Posta<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/uzmanposta.com\/blog\/zero-hour-day-attack-protection\/\" \/>\n<meta property=\"og:locale\" content=\"tr_TR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zero-Hour (S\u0131f\u0131r\u0131nc\u0131 Saat) &amp; Zero-Day (S\u0131f\u0131r\u0131nc\u0131 G\u00fcn) Sald\u0131r\u0131s\u0131 Nedir? Nas\u0131l Korunabiliriz? - Uzman Posta\" \/>\n<meta property=\"og:description\" content=\"Bug\u00fcnlerde bir \u015firketin kar\u015f\u0131la\u015ft\u0131\u011f\u0131 en yayg\u0131n siber sald\u0131r\u0131lardan biri s\u0131f\u0131r\u0131nc\u0131 g\u00fcn sald\u0131r\u0131s\u0131d\u0131r (zero-day attack). S\u0131f\u0131r\u0131nc\u0131 g\u00fcn, g\u00fcvenlik ekiplerinin veya g\u00fcvenlik uzmanlar\u0131n\u0131n yaz\u0131l\u0131m a\u00e7\u0131klar\u0131ndan habersiz oldu\u011fu ve a\u00e7\u0131klar\u0131 gidermek i\u00e7in bir g\u00fcvenlik yamas\u0131 veya y\u00fckseltmesi \u00fczerinde \u00e7al\u0131\u015fmak i\u00e7in &#8220;0&#8221; g\u00fcnlerinin oldu\u011fu bir durumu tan\u0131mlar. Yaz\u0131l\u0131m a\u00e7\u0131klar\u0131n\u0131n derhal tespit edilip \u00e7\u00f6z\u00fclmedi\u011fini varsayal\u0131m. Bu durumda, mali kay\u0131p, veri [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/uzmanposta.com\/blog\/zero-hour-day-attack-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/uzmanposta\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-22T07:20:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-19T07:53:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/zero-hour-zero-day-attack-protection-nedir-nasil-korunabiliriz.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sibel Ho\u015f\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@uZmanPosta\" \/>\n<meta name=\"twitter:site\" content=\"@uZmanPosta\" \/>\n<meta name=\"twitter:label1\" content=\"Yazan:\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sibel Ho\u015f\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tahmini okuma s\u00fcresi\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 dakika\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Zero-Hour (S\u0131f\u0131r\u0131nc\u0131 Saat) & Zero-Day (S\u0131f\u0131r\u0131nc\u0131 G\u00fcn) Sald\u0131r\u0131s\u0131 Nedir? Nas\u0131l Korunabiliriz? - Uzman Posta","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/uzmanposta.com\/blog\/zero-hour-day-attack-protection\/","og_locale":"tr_TR","og_type":"article","og_title":"Zero-Hour (S\u0131f\u0131r\u0131nc\u0131 Saat) & Zero-Day (S\u0131f\u0131r\u0131nc\u0131 G\u00fcn) Sald\u0131r\u0131s\u0131 Nedir? Nas\u0131l Korunabiliriz? - Uzman Posta","og_description":"Bug\u00fcnlerde bir \u015firketin kar\u015f\u0131la\u015ft\u0131\u011f\u0131 en yayg\u0131n siber sald\u0131r\u0131lardan biri s\u0131f\u0131r\u0131nc\u0131 g\u00fcn sald\u0131r\u0131s\u0131d\u0131r (zero-day attack). S\u0131f\u0131r\u0131nc\u0131 g\u00fcn, g\u00fcvenlik ekiplerinin veya g\u00fcvenlik uzmanlar\u0131n\u0131n yaz\u0131l\u0131m a\u00e7\u0131klar\u0131ndan habersiz oldu\u011fu ve a\u00e7\u0131klar\u0131 gidermek i\u00e7in bir g\u00fcvenlik yamas\u0131 veya y\u00fckseltmesi \u00fczerinde \u00e7al\u0131\u015fmak i\u00e7in &#8220;0&#8221; g\u00fcnlerinin oldu\u011fu bir durumu tan\u0131mlar. Yaz\u0131l\u0131m a\u00e7\u0131klar\u0131n\u0131n derhal tespit edilip \u00e7\u00f6z\u00fclmedi\u011fini varsayal\u0131m. Bu durumda, mali kay\u0131p, veri [&hellip;]","og_url":"https:\/\/uzmanposta.com\/blog\/zero-hour-day-attack-protection\/","og_site_name":"Blog","article_publisher":"https:\/\/www.facebook.com\/uzmanposta\/","article_published_time":"2023-11-22T07:20:19+00:00","article_modified_time":"2024-04-19T07:53:40+00:00","og_image":[{"width":1000,"height":500,"url":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/zero-hour-zero-day-attack-protection-nedir-nasil-korunabiliriz.jpeg","type":"image\/jpeg"}],"author":"Sibel Ho\u015f","twitter_card":"summary_large_image","twitter_creator":"@uZmanPosta","twitter_site":"@uZmanPosta","twitter_misc":{"Yazan:":"Sibel Ho\u015f","Tahmini okuma s\u00fcresi":"12 dakika"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/uzmanposta.com\/blog\/zero-hour-day-attack-protection\/#article","isPartOf":{"@id":"https:\/\/uzmanposta.com\/blog\/zero-hour-day-attack-protection\/"},"author":{"name":"Sibel Ho\u015f","@id":"https:\/\/uzmanposta.com\/blog\/#\/schema\/person\/ac85212a35ebcaaf56c92a7e051813d6"},"headline":"Zero-Hour (S\u0131f\u0131r\u0131nc\u0131 Saat) &#038; Zero-Day (S\u0131f\u0131r\u0131nc\u0131 G\u00fcn) Sald\u0131r\u0131s\u0131 Nedir? Nas\u0131l Korunabiliriz?","datePublished":"2023-11-22T07:20:19+00:00","dateModified":"2024-04-19T07:53:40+00:00","mainEntityOfPage":{"@id":"https:\/\/uzmanposta.com\/blog\/zero-hour-day-attack-protection\/"},"wordCount":2934,"publisher":{"@id":"https:\/\/uzmanposta.com\/blog\/#organization"},"image":{"@id":"https:\/\/uzmanposta.com\/blog\/zero-hour-day-attack-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/zero-hour-zero-day-attack-protection-nedir-nasil-korunabiliriz.jpeg","articleSection":["G\u00fcvenlik"],"inLanguage":"tr"},{"@type":"WebPage","@id":"https:\/\/uzmanposta.com\/blog\/zero-hour-day-attack-protection\/","url":"https:\/\/uzmanposta.com\/blog\/zero-hour-day-attack-protection\/","name":"Zero-Hour (S\u0131f\u0131r\u0131nc\u0131 Saat) & Zero-Day (S\u0131f\u0131r\u0131nc\u0131 G\u00fcn) Sald\u0131r\u0131s\u0131 Nedir? Nas\u0131l Korunabiliriz? - Uzman Posta","isPartOf":{"@id":"https:\/\/uzmanposta.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/uzmanposta.com\/blog\/zero-hour-day-attack-protection\/#primaryimage"},"image":{"@id":"https:\/\/uzmanposta.com\/blog\/zero-hour-day-attack-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/zero-hour-zero-day-attack-protection-nedir-nasil-korunabiliriz.jpeg","datePublished":"2023-11-22T07:20:19+00:00","dateModified":"2024-04-19T07:53:40+00:00","breadcrumb":{"@id":"https:\/\/uzmanposta.com\/blog\/zero-hour-day-attack-protection\/#breadcrumb"},"inLanguage":"tr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/uzmanposta.com\/blog\/zero-hour-day-attack-protection\/"]}]},{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/uzmanposta.com\/blog\/zero-hour-day-attack-protection\/#primaryimage","url":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/zero-hour-zero-day-attack-protection-nedir-nasil-korunabiliriz.jpeg","contentUrl":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/zero-hour-zero-day-attack-protection-nedir-nasil-korunabiliriz.jpeg","width":1000,"height":500,"caption":"Zero-Hour Zero-Day Attack Protection Nedir? Nas\u0131l Korunabiliriz?"},{"@type":"BreadcrumbList","@id":"https:\/\/uzmanposta.com\/blog\/zero-hour-day-attack-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/uzmanposta.com\/blog\/"},{"@type":"ListItem","position":2,"name":"G\u00fcvenlik","item":"https:\/\/uzmanposta.com\/blog\/guvenlik\/"},{"@type":"ListItem","position":3,"name":"Zero-Hour (S\u0131f\u0131r\u0131nc\u0131 Saat) &#038; Zero-Day (S\u0131f\u0131r\u0131nc\u0131 G\u00fcn) Sald\u0131r\u0131s\u0131 Nedir? Nas\u0131l Korunabiliriz?"}]},{"@type":"WebSite","@id":"https:\/\/uzmanposta.com\/blog\/#website","url":"https:\/\/uzmanposta.com\/blog\/","name":"Blog","description":"","publisher":{"@id":"https:\/\/uzmanposta.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/uzmanposta.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"tr"},{"@type":"Organization","@id":"https:\/\/uzmanposta.com\/blog\/#organization","name":"Uzman Posta","url":"https:\/\/uzmanposta.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/uzmanposta.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2020\/05\/logo.png","contentUrl":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2020\/05\/logo.png","width":131,"height":60,"caption":"Uzman Posta"},"image":{"@id":"https:\/\/uzmanposta.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/uzmanposta\/","https:\/\/x.com\/uZmanPosta","https:\/\/www.instagram.com\/uzmanposta\/","https:\/\/www.linkedin.com\/company\/uzmanposta\/","https:\/\/www.youtube.com\/channel\/UCk2n1vp1YJ0n3XaDRWBi88Q"]},{"@type":"Person","@id":"https:\/\/uzmanposta.com\/blog\/#\/schema\/person\/ac85212a35ebcaaf56c92a7e051813d6","name":"Sibel Ho\u015f","image":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/secure.gravatar.com\/avatar\/f925f03d20ff0803ddb37c96d39d3793c085014ce56421050f24823c23db1c2a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f925f03d20ff0803ddb37c96d39d3793c085014ce56421050f24823c23db1c2a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f925f03d20ff0803ddb37c96d39d3793c085014ce56421050f24823c23db1c2a?s=96&d=mm&r=g","caption":"Sibel Ho\u015f"},"sameAs":["https:\/\/sibelhos.com\/","https:\/\/www.instagram.com\/bismoothie\/","https:\/\/www.linkedin.com\/in\/sibelhos\/"]}]}},"_links":{"self":[{"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/posts\/3854","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/comments?post=3854"}],"version-history":[{"count":0,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/posts\/3854\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/media\/3856"}],"wp:attachment":[{"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/media?parent=3854"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/categories?post=3854"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/tags?post=3854"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}