{"id":128003,"date":"2021-01-26T16:13:33","date_gmt":"2021-01-26T13:13:33","guid":{"rendered":"https:\/\/www.enerjigazetesi.ist\/?p=128003"},"modified":"2021-01-26T16:24:18","modified_gmt":"2021-01-26T13:24:18","slug":"operasyonel-teknoloji-nin-arkasi-ve-siber-guvenlik-neden-onemli","status":"publish","type":"post","link":"https:\/\/www.enerjigazetesi.ist\/en\/operasyonel-teknoloji-nin-arkasi-ve-siber-guvenlik-neden-onemli\/","title":{"rendered":"(Turkish) Operasyonel Teknolojinin Arkas\u0131 ve Siber G\u00fcvenli\u011fin \u00d6nemi&#8230;"},"content":{"rendered":"<p class=\"qtranxs-available-languages-message qtranxs-available-languages-message-en\">Sorry, this entry is only available in <a href=\"https:\/\/www.enerjigazetesi.ist\/tr\/wp-json\/wp\/v2\/posts\/128003\" class=\"qtranxs-available-language-link qtranxs-available-language-link-tr\" title=\"Turkish\">Turkish<\/a>. For the sake of viewer convenience, the content is shown below in the alternative language. You may click the link to switch the active language.<\/p><p><\/p>\n<h1>Ponemon Institute taraf\u0131ndan yap\u0131lan bir ara\u015ft\u0131rmaya g\u00f6re, operasyonel teknoloji (OT) sekt\u00f6r\u00fcnde faaliyet g\u00f6steren organizasyonlar\u0131n %90\u2019\u0131, ge\u00e7ti\u011fimiz y\u0131llarda siber sald\u0131r\u0131ya en az bir kere maruz kald\u0131; bunlar\u0131n %45\u2019i ise operasyonel teknolojinin bu ataklara nas\u0131l dahil oldu\u011funu g\u00f6zlemledi.<\/h1>\n<p><strong>Siber g\u00fcvenli\u011fi<\/strong> d\u00fc\u015f\u00fcnd\u00fc\u011f\u00fcm\u00fczde, \u015firketlerin <strong>bilgi teknolojilerine (BT)<\/strong> \u00f6zellikle odaklanma e\u011filiminde oldu\u011funu g\u00f6rebiliriz. Bilgi teknolojilerine odaklanan \u015firketler, normal \u015fartlarda internete ba\u011fl\u0131 olan ve<strong> siber sald\u0131r\u0131lar\u0131n<\/strong> temel hedefi haline gelen altyap\u0131lar\u0131n\u0131 korumay\u0131 ama\u00e7lar. <span style=\"text-decoration: underline;\">Bu altyap\u0131lar;<\/span> <strong>verilerin aktar\u0131m\u0131n\u0131, saklanmas\u0131n\u0131<\/strong> ve <strong>i\u015flenmesini<\/strong> sa\u011flar. Bununla birlikte, <strong>i\u015fletmeler gitgide<\/strong> <img loading=\"lazy\" class=\"alignright wp-image-128006\" src=\"https:\/\/www.enerjigazetesi.ist\/wp-content\/uploads\/2021\/01\/operasyonel-tek-arkasinda-ne-var-ve-siber-guvenlik-neden-onemli-1.jpg\" alt=\"\" width=\"320\" height=\"214\" srcset=\"https:\/\/www.enerjigazetesi.ist\/wp-content\/uploads\/2021\/01\/operasyonel-tek-arkasinda-ne-var-ve-siber-guvenlik-neden-onemli-1.jpg 550w, https:\/\/www.enerjigazetesi.ist\/wp-content\/uploads\/2021\/01\/operasyonel-tek-arkasinda-ne-var-ve-siber-guvenlik-neden-onemli-1-300x200.jpg 300w, https:\/\/www.enerjigazetesi.ist\/wp-content\/uploads\/2021\/01\/operasyonel-tek-arkasinda-ne-var-ve-siber-guvenlik-neden-onemli-1-500x334.jpg 500w, https:\/\/www.enerjigazetesi.ist\/wp-content\/uploads\/2021\/01\/operasyonel-tek-arkasinda-ne-var-ve-siber-guvenlik-neden-onemli-1-75x50.jpg 75w, https:\/\/www.enerjigazetesi.ist\/wp-content\/uploads\/2021\/01\/operasyonel-tek-arkasinda-ne-var-ve-siber-guvenlik-neden-onemli-1-450x300.jpg 450w\" sizes=\"(max-width: 320px) 100vw, 320px\" \/>daha dijital hale geldi\u011fi i\u00e7in, bu alan haricindeki<strong> sald\u0131r\u0131lar ani \u015fekilde artm\u0131\u015f<\/strong> ve bu durum di\u011fer alanlar\u0131 da etkiledi. <strong>Fiziksel d\u00fcnyan\u0131n<\/strong> kontrol\u00fcyle <strong>ba\u011flant\u0131l\u0131 operasyonel teknoloji (OT)<\/strong>, i\u015fte burada devreye giriyor.<\/p>\n<p><strong>Ponemon Institute<\/strong> taraf\u0131ndan haz\u0131rlanan <strong>&#8220;Operasyonel Teknolojilerinde Siber G\u00fcvenlik&#8221;<\/strong> isimli raporda sunulan veriler; <strong>end\u00fcstriyel kontrol sistemleri<\/strong>ne veya<strong> operasyonel<\/strong> di\u011fer teknolojilere ba\u011f\u0131ml\u0131 olan end\u00fcstrileri bir araya getiren <strong>OT sekt\u00f6r\u00fc<\/strong>ndeki organizasyonlar\u0131n <strong>%90<\/strong>\u2019\u0131n\u0131n ge\u00e7ti\u011fimiz bir ka\u00e7 y\u0131lda <strong>veri ihlalleri<\/strong>ne, <strong>i\u015fleyi\u015fin durmas\u0131<\/strong>na ve \u00f6nemli kesintilere sebep olan<strong> siber sald\u0131r\u0131lara<\/strong> en az bir kere maruz kald\u0131\u011f\u0131n\u0131 g\u00f6steriyor. Ayr\u0131ca, bu ara\u015ft\u0131rmaya kat\u0131lan \u015firketlerin<strong> %45<\/strong>\u2019i, operasyonel teknoloji veya<strong> IoT (Nesnelerin \u0130nterneti) cihazlar\u0131n\u0131 da<\/strong> etkileyen en az bir sald\u0131r\u0131ya maruz kald\u0131\u011f\u0131n\u0131 ifade ediyor.<\/p>\n<p>Bu tip bir teknoloji, \u015firketler i\u00e7in <strong>sunucular<\/strong> veya <strong>veri merkezleri (CPD)<\/strong> kadar \u00f6nemli. \u00d6rne\u011fin, bir <strong>depoda, \u0131s\u0131tma ve so\u011futma sisteminde<\/strong> ya\u015fanan bir ar\u0131za, depodaki \u00fcr\u00fcnlerde \u00f6nemli kay\u0131plara sebep olabilir; e\u011fer<strong> iklimlendirme sisteminde<\/strong> bir sorun ya\u015fan\u0131rsa, <strong>CPD<\/strong> i\u00e7inde a\u015f\u0131r\u0131 \u0131s\u0131nmadan dolay\u0131 beklenmedik <strong>g\u00fc\u00e7 kesintileri<\/strong> ger\u00e7ekle\u015febilir. Bu nedenle, kritik<strong> OT bile\u015fenleri<\/strong> belirli gereksinimleri kar\u015f\u0131lamal\u0131; ayr\u0131ca <strong>k\u00e2rl\u0131l\u0131\u011f\u0131, g\u00fcvenilirli\u011fi<\/strong> ve <strong>g\u00fcvenli\u011fi<\/strong> sa\u011flamal\u0131d\u0131r. <strong>Dijitalizasyon<\/strong>, bu s\u00fcrece katk\u0131da bulunmas\u0131na ra\u011fmen, ayn\u0131 zamanda, ger\u00e7ekle\u015fmeleri \u00f6nceden m\u00fcmk\u00fcn olmayan <strong>uzaktan sald\u0131r\u0131lara da<\/strong> yol a\u00e7t\u0131.<\/p>\n<p><strong>Eaton Elektrik T\u00fcrkiye<\/strong> \u00dclke M\u00fcd\u00fcr\u00fc <strong>Y\u0131lmaz \u00d6zcan<\/strong> konuyla ilgili olarak; <em>\u201cOperasyonel teknoloji, uzun zamand\u0131r geri planda kalm\u0131\u015ft\u0131. Operasyonel teknoloji; <strong>veri <\/strong><strong>merkezleri<\/strong> veya <strong>acil ayd\u0131nlatma<\/strong>, <strong>asans\u00f6rler, g\u00fcvenlik alarmlar\u0131<\/strong> veya<strong> havaland\u0131rma, so\u011futma<\/strong> veya<strong> \u0131s\u0131tma sistemleri<\/strong> gibi fonksiyonlar\u0131 g\u00f6rd\u00fc\u011f\u00fcm\u00fcz binalar\u0131n yan\u0131 s\u0131ra,<strong> end\u00fcstrideki proseslerin<\/strong> ve <strong>operasyonlar\u0131n da<\/strong> \u00f6nemli bir par\u00e7as\u0131 olarak g\u00f6r\u00fcld\u00fc ancak bunlardan pek az\u0131nda ilerleme kaydedildi.\u201d dedi ve ekledi; &#8220;<strong>Operasyonel teknoloji<\/strong>, geri planda kald\u0131\u011f\u0131 ve <strong>dijitalizasyon<\/strong> ve<strong> IoT sayesinde<\/strong> BT \u00e7\u00f6z\u00fcmleriyle gitgide daha fazla entegre oldu\u011fu i\u00e7in, <strong>siber sald\u0131rganlar<\/strong> i\u00e7in \u00e7ok <strong>daha cazip<\/strong> bir hedef haline geldi. Bu y\u00fczden, sistemlerimizi koruyacak \u00e7\u00f6z\u00fcmleri hayata ge\u00e7irmek i\u00e7in daha fazla bekleyemeyiz.\u201d<\/em><\/p>\n<h2><strong>OT Siber G\u00fcvenli\u011fi, \u0130\u015fletmelerin Korunmas\u0131 ve Hayatta Kalmas\u0131 i\u00e7in \u00c7ok \u00d6nemli<\/strong><\/h2>\n<p>Bug\u00fcn <strong>OT g\u00fcvenli\u011fi<\/strong> yakla\u015f\u0131m\u0131, <strong>BT g\u00fcvenli\u011fi<\/strong> yakla\u015f\u0131m\u0131ndan olduk\u00e7a farkl\u0131d\u0131r. OT, \u00e7al\u0131\u015fma s\u00fcresine ve kullan\u0131labilirli\u011fe odaklan\u0131rken, BT ise verilerin korunmas\u0131na odaklan\u0131r. <strong>OT a\u011flar\u0131<\/strong>, daha de\u011fi\u015fken kullan\u0131m alan\u0131 sunan BT\u2019nin dinamik yakla\u015f\u0131m\u0131na k\u0131yasla, nispeten statik kullan\u0131m kal\u0131plar\u0131n\u0131 benimser.<\/p>\n<p>\u00d6nceden <strong>\u00f6zel haberle\u015fme protokolleri<\/strong>nden istifade etmesi nedeniyle, <strong>operasyonel teknoloji<\/strong>, <strong>bilgi teknoloijleri<\/strong>nin kapsad\u0131\u011f\u0131<strong> antivirus, firewall<\/strong> veya <strong>di\u011fer u\u00e7 nokta koruma yaz\u0131l\u0131mlar\u0131<\/strong>, <strong>a\u011flar\u0131<\/strong> veya <strong>sunucular\u0131<\/strong> gibi, standart haline gelmi\u015f <strong>g\u00fcvenlik ara\u00e7lar\u0131<\/strong> ve <strong>teknolojilerine<\/strong> sahip de\u011fildir. <strong>OT varl\u0131klar\u0131<\/strong>, <strong>BT ekipmanlar\u0131<\/strong>na k\u0131yasla beklenen \u00e7ok daha <strong>uzun ya\u015fam d\u00f6ng\u00fcs\u00fcne<\/strong> sahiptir ve bir cihaz <strong>20 y\u0131ld\u0131r<\/strong> veya daha uzun s\u00fcredir kullan\u0131mdaysa, g\u00fcvenlik konusunda g\u00f6z \u00f6n\u00fcne al\u0131nacak hususlar daha farkl\u0131d\u0131r. Dahas\u0131, bu t\u00fcr varl\u0131klar <strong>laptop<\/strong> veya<strong> sunucular\u0131n g\u00fcvenlik<\/strong> amac\u0131yla kullanabilece\u011fi ek i\u015flemci g\u00fcc\u00fcnden yoksundur.<\/p>\n<p>Genellikle <strong>siber g\u00fcvenlik<\/strong> konusuna tamamen BT ekibinin hakim oldu\u011funa inan\u0131r\u0131z. Bununla birlikte, i\u015fletmelerin g\u00fcnl\u00fck operasyonlar\u0131n\u0131n y\u00fcr\u00fct\u00fclmesini sa\u011flayan teknolojiler online hale geldik\u00e7e, pek \u00e7ok <strong>i\u015fletme siber sald\u0131r\u0131 risklerine<\/strong> maruz kalaca\u011f\u0131na inan\u0131r ve <strong>OT sistemlerini<\/strong> korumay\u0131 unutur. Bu sebeple, organizasyonlar\u0131n, siber sald\u0131rganlar\u0131n yaln\u0131zca eylem metodunu de\u011fil, eylemlerinin amac\u0131n\u0131 da dikkate almalar\u0131 \u00f6nemlidir.<\/p>\n<p><em>Eaton Iberia Veri Merkezleri Segmenti Ba\u015fkan\u0131<\/em> <strong>Juan Manuel L\u00f3pez;<\/strong> <em>\u201cBilgi teknolojilerinin aksine, OT sisteminde payla\u015f\u0131lanlar\u0131n ne i\u015fletmeler, ne de siber sald\u0131rganlar i\u00e7in bir de\u011feri vard\u0131r. \u00d6rne\u011fin, kesintisiz g\u00fc\u00e7 kayna\u011f\u0131 veya k\u0131saca KGK (UPS), muazzam de\u011feri olan bilgileri payla\u015fmamaktad\u0131r. Bununla birlikte, \u015firketin BT sistemlerine ba\u011flanarak, siber\u00a0<\/em><em>sald\u0131rganlar\u0131n<strong> finansal<\/strong> veya<strong> m\u00fc\u015fterilere ait verilere ula\u015fabilece\u011fi<\/strong> bir arka kap\u0131 a\u00e7\u0131labilir. <strong>OT sistemleri<\/strong>nin kesintiye u\u011framas\u0131 da, dikkatleri ba\u015fka y\u00f6nlere \u00e7ekti\u011fi veya finansal kay\u0131plara veya itibar kayb\u0131na sebebiyet verdi\u011fi i\u00e7in, finansal siber sald\u0131rganlar\u0131n i\u015fine gelir.\u201d<\/em> dedi.<\/p>\n<h2><strong>Operasyonel Teknolojiyi Korumak i\u00e7in Ne Yapmal\u0131s\u0131n\u0131z?<\/strong><\/h2>\n<p><strong>BT ekipleri<\/strong> taraf\u0131ndan uygulanan \u00f6nlemlerin, \u015firketin <strong>OT altyap\u0131s\u0131n\u0131<\/strong> da koruyaca\u011f\u0131n\u0131 varsaymak art\u0131k ger\u00e7ek\u00e7i bir yakla\u015f\u0131m de\u011fildir. \u015eirketler, <strong>bayiler<\/strong> veya <strong>di\u011fer kurum<\/strong> ve <strong>kurulu\u015flar siber sald\u0131r\u0131 riskleri<\/strong>ni lay\u0131k\u0131yla anlamak ve bu risklere kar\u015f\u0131 koruma sa\u011flamak i\u00e7in i\u015fbirli\u011fi yaparken; operasyonel teknolojiler de sald\u0131r\u0131lara kar\u015f\u0131 daha da dayan\u0131kl\u0131 hale getirilmelidir. <span style=\"text-decoration: underline;\">Benzer \u015fekilde;<\/span> tesis y\u00f6neticileri, sat\u0131n ald\u0131klar\u0131 herhangi bir <strong>cihaz\u0131n sistem g\u00fcvenli\u011fini<\/strong> k\u0131rma te\u015febb\u00fcslerine kar\u015f\u0131 korundu\u011fundan emin olmak i\u00e7in <strong>BT y\u00f6neticileriyle<\/strong> birlikte \u00e7al\u0131\u015fmal\u0131 ve b\u00f6ylece bu <strong>teknolojinin g\u00fcvenlik zinciri<\/strong>nin en zay\u0131f halkas\u0131 olmad\u0131\u011f\u0131 kan\u0131tlanmal\u0131d\u0131r.<\/p>\n<p>Bu ba\u011flamda, <strong>operasyonel teknoloji \u00fcretim \u015firketleri<\/strong>, Eaton\u2019\u0131n &#8220;<strong><a href=\"https:\/\/www.eaton.com\/fr\/en-gb\/company\/news-insights\/what-matters\/enabling-powerful-cybersecurity.html?source_id=publitek_tr_operasyonel_teknolojilerin_arkasinda_ne\" target=\"_blank\" rel=\"nofollow noopener\">tasar\u0131mla gelen g\u00fcvenlik<\/a><\/strong>&#8221; yakla\u015f\u0131m\u0131yla da hayata ge\u00e7irdi\u011fi gibi, t\u00fcm \u00fcr\u00fcnlerini <strong>siber g\u00fcvenli\u011fi<\/strong> baz alarak geli\u015ftirmelidir. Bu nedenle, <strong>bilgisayar korsanlar\u0131<\/strong>n\u0131n istismar edebilece\u011fi herhangi bir <strong>g\u00fcvenlik a\u00e7\u0131\u011f\u0131ndan<\/strong> ka\u00e7\u0131n\u0131lmal\u0131d\u0131r. <strong>IEC<\/strong> veya <strong>IEC standartlar\u0131<\/strong>ndan sorumlu kurulu\u015flarca belirlenen ve bu standartlara uygun teklifler sunulmal\u0131 ve bu kurulu\u015flarla i\u015fbirli\u011fi yap\u0131larak hem <strong>OT<\/strong> hem de <strong>BT sistemleri<\/strong>nin ihtiya\u00e7lar\u0131n\u0131 kar\u015f\u0131layacak ve d\u00fcnya genelinde de ge\u00e7erli olacak <strong>standartlar<\/strong> olu\u015fturulmal\u0131d\u0131r. \u015eirketler, altyap\u0131lar\u0131 i\u00e7in <strong>ekipman<\/strong> se\u00e7erken, <strong>g\u00fcvenli ortamlar<\/strong> yaratmak ad\u0131na<strong> siber g\u00fcvenli\u011fi<\/strong> i\u015flevsellikle ba\u011flant\u0131l\u0131 olarak d\u00fc\u015f\u00fcnmelidir. Burada de\u011findi\u011finmiz <strong>b\u00fct\u00fcn hususlar\u0131<\/strong> g\u00f6z \u00f6n\u00fcnde bulundurmadan, sistemi etkili bir \u015fekilde korumak m\u00fcmk\u00fcn olmayacakt\u0131r.<\/p>\n<p>Eaton hakk\u0131nda daha fazla bilgi almak i\u00e7in <strong><a href=\"http:\/\/www.eaton.com\" target=\"_blank\" rel=\"nofollow noopener\">Eaton.com<\/a><\/strong> adresini ziyaret edebilir<strong> en son g\u00fcncellemeler<\/strong> i\u00e7in Twitter (<a href=\"https:\/\/twitter.com\/ETN_EMEA\" target=\"_blank\" rel=\"nofollow noopener\">@ETN_EMEA<\/a>) ve(ya) LinkedIn (<a href=\"https:\/\/www.linkedin.com\/company\/2599\/\" target=\"_blank\" rel=\"nofollow noopener\">Eaton<\/a>) hesaplar\u0131n\u0131 takip edebilirsiniz.<\/p>","protected":false},"excerpt":{"rendered":"<p>Sorry, this entry is only available in Turkish. For the sake of viewer convenience, the content is shown below in the alternative language. You may click the link to switch the active language. Ponemon Institute taraf\u0131ndan yap\u0131lan bir ara\u015ft\u0131rmaya g\u00f6re, operasyonel teknoloji (OT) sekt\u00f6r\u00fcnde faaliyet g\u00f6steren organizasyonlar\u0131n %90\u2019\u0131, ge\u00e7ti\u011fimiz y\u0131llarda siber sald\u0131r\u0131ya en az bir [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":128005,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[51,53,157],"tags":[85497,62913,85495,52259,73928,85499,85494,85498,57901,80238,85496,85493,55724,85500,65918,84641],"views":143,"_links":{"self":[{"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/posts\/128003"}],"collection":[{"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/comments?post=128003"}],"version-history":[{"count":0,"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/posts\/128003\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/media\/128005"}],"wp:attachment":[{"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/media?parent=128003"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/categories?post=128003"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/tags?post=128003"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}