{"id":148760,"date":"2022-01-04T10:57:12","date_gmt":"2022-01-04T07:57:12","guid":{"rendered":"https:\/\/www.enerjigazetesi.ist\/?p=148760"},"modified":"2022-01-04T10:57:12","modified_gmt":"2022-01-04T07:57:12","slug":"2021-yilinda-karsilastigimiz-en-kotu-10-siber-guvenlik-aliskanligi","status":"publish","type":"post","link":"https:\/\/www.enerjigazetesi.ist\/en\/2021-yilinda-karsilastigimiz-en-kotu-10-siber-guvenlik-aliskanligi\/","title":{"rendered":"(Turkish) 2021 Y\u0131l\u0131nda Kar\u015f\u0131la\u015ft\u0131\u011f\u0131m\u0131z En K\u00f6t\u00fc 10 Siber G\u00fcvenlik Al\u0131\u015fkanl\u0131\u011f\u0131&#8230;"},"content":{"rendered":"<p class=\"qtranxs-available-languages-message qtranxs-available-languages-message-en\">Sorry, this entry is only available in <a href=\"https:\/\/www.enerjigazetesi.ist\/tr\/wp-json\/wp\/v2\/posts\/148760\" class=\"qtranxs-available-language-link qtranxs-available-language-link-tr\" title=\"Turkish\">Turkish<\/a>. For the sake of viewer convenience, the content is shown below in the alternative language. You may click the link to switch the active language.<\/p><p><\/p>\n<h2><strong>2022 Y\u0131l\u0131na ba\u015flarken, dijital hayat\u0131m\u0131z\u0131 da g\u00f6zden ge\u00e7irmemiz, yeni kararlar almam\u0131z gerekiyor. Yeni bir y\u0131la ba\u015flarken siber g\u00fcvenlikle ilgili de\u011fi\u015ftirilmesi gereken 10 al\u0131\u015fkanl\u0131k belirlendi&#8230;<\/strong><\/h2>\n<p>\u0130yi bir g\u00fcvenlik anlay\u0131\u015f\u0131, <strong>kimlik doland\u0131r\u0131c\u0131l\u0131\u011f\u0131<\/strong> ve <strong>maddi kay\u0131p riskinin azalmas\u0131<\/strong> anlam\u0131na <img loading=\"lazy\" class=\"alignright wp-image-148762\" src=\"https:\/\/www.enerjigazetesi.ist\/wp-content\/uploads\/2022\/01\/2021-yilinda-karsilastigimiz-en-kotu-10-siber-guvenlik-aliskanligi-1.jpg\" alt=\"\" width=\"320\" height=\"214\" srcset=\"https:\/\/www.enerjigazetesi.ist\/wp-content\/uploads\/2022\/01\/2021-yilinda-karsilastigimiz-en-kotu-10-siber-guvenlik-aliskanligi-1.jpg 550w, https:\/\/www.enerjigazetesi.ist\/wp-content\/uploads\/2022\/01\/2021-yilinda-karsilastigimiz-en-kotu-10-siber-guvenlik-aliskanligi-1-300x200.jpg 300w, https:\/\/www.enerjigazetesi.ist\/wp-content\/uploads\/2022\/01\/2021-yilinda-karsilastigimiz-en-kotu-10-siber-guvenlik-aliskanligi-1-500x334.jpg 500w, https:\/\/www.enerjigazetesi.ist\/wp-content\/uploads\/2022\/01\/2021-yilinda-karsilastigimiz-en-kotu-10-siber-guvenlik-aliskanligi-1-75x50.jpg 75w, https:\/\/www.enerjigazetesi.ist\/wp-content\/uploads\/2022\/01\/2021-yilinda-karsilastigimiz-en-kotu-10-siber-guvenlik-aliskanligi-1-450x300.jpg 450w\" sizes=\"(max-width: 320px) 100vw, 320px\" \/>geliyor. Bu doland\u0131r\u0131c\u0131l\u0131klar\u0131n maliyeti, 2020 y\u0131l\u0131nda <strong>56 milyar ABD dolar\u0131<\/strong>na ula\u015ft\u0131 ve doland\u0131r\u0131c\u0131l\u0131klar\u0131n \u00e7o\u011fu \u00e7evrimi\u00e7i ortamda ger\u00e7ekle\u015fti. Sorunun b\u00fcy\u00fckl\u00fc\u011f\u00fcn\u00fc anlayabilmek i\u00e7in ABD Kimlik H\u0131rs\u0131zl\u0131\u011f\u0131 Bilgi Merkezi verilerinin g\u00f6z \u00f6n\u00fcne al\u0131nmas\u0131 gerekiyor. Verilere g\u00f6re, ABD\u2019deki<strong> kimlik h\u0131rs\u0131zl\u0131\u011f\u0131<\/strong> kurbanlar\u0131n\u0131n \u00fc\u00e7te biri<strong> doland\u0131r\u0131c\u0131l\u0131k<\/strong> nedeniyle <strong>yiyecek almak<\/strong> veya <strong>faturalar\u0131n\u0131 \u00f6demek<\/strong> i\u00e7in yeterince paralar\u0131n\u0131n olmad\u0131\u011f\u0131n\u0131 belirtiyor. ESET uzmanlar\u0131, 2022\u2019de<strong> siber hijyenin<\/strong> art\u0131r\u0131larak dikkatli davran\u0131lmas\u0131n\u0131 ve a\u015fa\u011f\u0131da payla\u015f\u0131lan <strong>10 k\u00f6t\u00fc al\u0131\u015fkanl\u0131\u011f\u0131n<\/strong><span style=\"text-decoration: underline;\"> b\u0131rak\u0131lmas\u0131n\u0131 \u00f6neriyor:<\/span><\/p>\n<h3><strong>1- G\u00fcncel olmayan yaz\u0131l\u0131m kullanmak<\/strong><\/h3>\n<p>Bilgisayar\u0131n\u0131zdaki ve cihazlar\u0131n\u0131zdaki i\u015fletim sistemlerinin, taray\u0131c\u0131lar\u0131n ve di\u011fer yaz\u0131l\u0131mlar\u0131n g\u00fcvenlik a\u00e7\u0131klar\u0131, siber su\u00e7lular\u0131n sald\u0131rabilece\u011fi en iyi yerlerdir. Otomatik g\u00fcncelleme i\u015flevini etkinle\u015ftirdi\u011finizde ve istendi\u011finde g\u00fcncellemeyi onaylad\u0131\u011f\u0131n\u0131zda, bu konu g\u00fcnl\u00fck hayat\u0131n\u0131z\u0131 \u00e7ok fazla engellemez.<\/p>\n<h3><strong>2- Zay\u0131f parola g\u00fcvenli\u011fi<\/strong><\/h3>\n<p>Parolalar, dijital d\u00fcnyam\u0131z\u0131n kap\u0131s\u0131n\u0131n anahtarlar\u0131d\u0131r. Ne yaz\u0131k ki bug\u00fcnlerde hat\u0131rlamam\u0131z gereken \u00e7ok fazla parola oldu\u011fundan, bu parolalar\u0131 yeterince g\u00fcvenli \u015fekilde kullanm\u0131yoruz. Birden \u00e7ok hesap i\u00e7in ayn\u0131 parolay\u0131 kullanmak ve tahmin etmesi kolay giri\u015f bilgileri belirlemek, bilgisayar korsanlar\u0131na olduk\u00e7a fazla avantaj sa\u011fl\u0131yor. Bu sald\u0131rganlar yaz\u0131l\u0131m kullanarak zay\u0131f \u015fifrelemeleri k\u0131rar, yayg\u0131n olarak kullan\u0131lan varyantlar\u0131 dener ve ele ge\u00e7irilen parolalar\u0131 di\u011fer hesaplarda da kullanmaya \u00e7al\u0131\u015f\u0131r. Bunun yerine g\u00fc\u00e7l\u00fc ve benzersiz parolalar\u0131 veya giri\u015f anahtarlar\u0131n\u0131 hat\u0131rlamak i\u00e7in bir parola y\u00f6neticisi kullan\u0131n. Ayr\u0131ca m\u00fcmk\u00fcn olan t\u00fcm hesaplarda iki fakt\u00f6rl\u00fc kimlik do\u011frulamaya (2FA) ge\u00e7i\u015f yap\u0131n.<\/p>\n<h3><strong>3- Herkese a\u00e7\u0131k Wi-Fi a\u011f\u0131 kullanmak<\/strong><\/h3>\n<p>Bug\u00fcnlerde daha fazla d\u0131\u015far\u0131 \u00e7\u0131kmaya ba\u015flad\u0131k. Bu nedenle, herkese a\u00e7\u0131k Wi-Fi a\u011flar\u0131 daha fazla kullan\u0131l\u0131yor. Ancak bu riskli bir konu. Bilgisayar korsanlar\u0131 internet kullan\u0131m\u0131n\u0131z hakk\u0131nda bilgi edinmek, hesaplar\u0131n\u0131za eri\u015fim sa\u011flamak ve kimli\u011finizi \u00e7almak i\u00e7in ayn\u0131 a\u011flar\u0131 kullanabilir. G\u00fcvende olmak i\u00e7in ortak alanlardaki bu eri\u015fim noktalar\u0131n\u0131 kullanmaktan ka\u00e7\u0131nmal\u0131s\u0131n\u0131z. Kullanmak zorunda oldu\u011funuz durumlarda, genel a\u011fa ba\u011fl\u0131yken \u00f6nemli hesaplar\u0131n\u0131za giri\u015f yapmay\u0131n.<\/p>\n<h3><strong>4- T\u0131klamadan \u00f6nce d\u00fc\u015f\u00fcnmemek<\/strong><\/h3>\n<p>Kimlik av\u0131, en \u00e7ok gelir sa\u011flayan doland\u0131r\u0131c\u0131l\u0131k t\u00fcrlerindendir. Sosyal m\u00fchendislik olarak bilinen bir teknik kullan\u0131l\u0131r. Sosyal m\u00fchendislikte sald\u0131rganlar, kurbanlar\u0131n\u0131 kand\u0131rarak k\u00f6t\u00fc ama\u00e7l\u0131 bir ba\u011flant\u0131ya t\u0131klamas\u0131n\u0131 veya k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m y\u00fckl\u00fc bir eki a\u00e7mas\u0131n\u0131 sa\u011flamaya \u00e7al\u0131\u015f\u0131r. \u0130\u00e7imizdeki iyi niyetli duygulardan faydalan\u0131r ve acil bir durum oldu\u011fuyla ilgili iletilerle h\u0131zl\u0131 bir \u015fekilde karar vermemizi sa\u011flamaya \u00e7al\u0131\u015f\u0131rlar. Bu sald\u0131r\u0131lar\u0131 bertaraf etmek i\u00e7in uygulamam\u0131z gereken en \u00f6nemli kural, d\u00fc\u015f\u00fcnmeden t\u0131klamamakt\u0131r. Gelen e-postan\u0131n ger\u00e7ek oldu\u011fundan emin olmak i\u00e7in g\u00f6nderen ki\u015fiyi veya \u015firketi iki kere kontrol edin. Acele hareket etmeyin.<\/p>\n<h3><strong>5- T\u00fcm cihazlarda g\u00fcvenlik kullanmamak<\/strong><\/h3>\n<p>Gelir sa\u011flayan siber tehditlerin bulundu\u011fu bir \u00e7a\u011fda bilgisayarlar\u0131n\u0131zda ve mobil cihazlar\u0131n\u0131zda sayg\u0131n bir sa\u011flay\u0131c\u0131n\u0131n k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlara kar\u015f\u0131 korumas\u0131n\u0131 kullanmal\u0131s\u0131n\u0131z. Ancak ka\u00e7\u0131m\u0131z mobil cihazlar\u0131m\u0131zda ve tabletlerimizde ayn\u0131 \u015fekilde g\u00fcvenlik yaz\u0131l\u0131m\u0131 kullan\u0131yoruz? Ara\u015ft\u0131rmaya g\u00f6re, her y\u0131l bu cihazlar\u0131 neredeyse<strong> 5 bin saat<\/strong> kullan\u0131yoruz. Bu s\u00fcre zarf\u0131nda k\u00f6t\u00fc ama\u00e7l\u0131 uygulamalarla ve web siteleriyle kar\u015f\u0131la\u015fma olas\u0131l\u0131\u011f\u0131m\u0131z olduk\u00e7a fazla. Cihaz\u0131n\u0131z\u0131 hemen koruma alt\u0131na al\u0131n.<\/p>\n<h3><strong>6- G\u00fcvenli olmayan web sitelerini kullanmak\u00a0<\/strong><\/h3>\n<p>HTTPS sitelerinde, web taray\u0131c\u0131n\u0131zdan girdi\u011finiz siteye giden trafi\u011fi korumak i\u00e7in \u015fifreleme kullan\u0131l\u0131r. Bunun iki amac\u0131 vard\u0131r. Web sitesinin ger\u00e7ek oldu\u011funu, kimlik av\u0131 veya doland\u0131r\u0131c\u0131l\u0131kla ilgili bir web sitesi olmad\u0131\u011f\u0131n\u0131 do\u011frulamak; siber su\u00e7lular\u0131n parolalar\u0131n\u0131z\u0131 ve finansal bilgilerinizi \u00e7almak \u00fczere ileti\u015fimlerinize g\u00f6zetlemedi\u011finden emin olmak. G\u00fcn\u00fcm\u00fczde bir\u00e7ok kimlik av\u0131 sitesi HTTPS kulland\u0131\u011f\u0131ndan bu y\u00fczde 100 garanti y\u00f6ntem de\u011fildir ancak iyi bir ba\u015flang\u0131\u00e7t\u0131r. Her zaman kilit sembol\u00fcn\u00fcn olmas\u0131na dikkat edin.<\/p>\n<h3><strong>7- \u0130\u015f ve \u00f6zel hayat\u0131n\u0131z\u0131 payla\u015fmak<\/strong><\/h3>\n<p>Bir \u00e7o\u011fumuz son iki y\u0131l\u0131n b\u00fcy\u00fck bir k\u0131sm\u0131n\u0131, i\u015f ve \u00f6zel hayatlar\u0131m\u0131z\u0131 birbirinden ay\u0131ran keskin \u00e7izginin kayboldu\u011fu, iki taraf\u0131n birbirine kar\u0131\u015ft\u0131\u011f\u0131 bir \u015fekilde ya\u015fad\u0131k. \u00a0Bu \u00e7izgi belirsizle\u015ftik\u00e7e siber riskler de art\u0131yor. T\u00fcketici al\u0131\u015fveri\u015fine y\u00f6nelik sitelere ve di\u011fer sitelere giri\u015f yapmak i\u00e7in i\u015f e-postalar\u0131n\u0131n ve parolalar\u0131n kullan\u0131m\u0131n\u0131 d\u00fc\u015f\u00fcn\u00fcn. Bu sitelerdeki verilerin g\u00fcvenli\u011fi ihlal edilirse ne olur? Bilgisayar korsanlar\u0131, kurumsal hesaplar\u0131n\u0131z\u0131 ele ge\u00e7irebilir. Ayr\u0131ca i\u015f i\u00e7in g\u00fcvenli olmayan ki\u015fisel cihazlar\u0131n kullan\u0131lmas\u0131 da riski art\u0131r\u0131r. \u0130\u015finizi ve \u00f6zel hayat\u0131n\u0131z\u0131 ayr\u0131 tutmak i\u00e7in fazladan \u00e7aba harcamal\u0131s\u0131n\u0131z.<\/p>\n<h3><strong>8- Telefonda bilgilerinizi payla\u015fmak<\/strong><\/h3>\n<p>Sesli kimlik av\u0131 olarak da bilinen sesli kimlik h\u0131rs\u0131zl\u0131\u011f\u0131, e-posta ve SMS tabanl\u0131 kimlik av\u0131 h\u0131rs\u0131zl\u0131\u011f\u0131nda oldu\u011fu gibi kullan\u0131c\u0131lar\u0131 kand\u0131r\u0131p bir \u015feye t\u0131klamalar\u0131n\u0131 sa\u011flamak \u00fczere sosyal m\u00fchendisli\u011fi kullan\u0131r. Kurbanlar\u0131n ki\u015fisel ve finansal bilgilerini elde etmek i\u00e7in gittik\u00e7e pop\u00fclerle\u015fen bir yoldur. Doland\u0131r\u0131c\u0131lar, sald\u0131r\u0131y\u0131 ger\u00e7ek bir ileti\u015fim gibi g\u00f6stermek i\u00e7in genellikle ger\u00e7ek numaray\u0131 gizler. Ba\u015fl\u0131ca kural, telefonda hi\u00e7bir hassas bilgiyi payla\u015fmamakt\u0131r. Kim olduklar\u0131na ve nereden arad\u0131klar\u0131na ba\u011fl\u0131 olarak, arayan ki\u015finin verdi\u011fi numaray\u0131 kullanmadan \u015firketi do\u011frudan arayarak bilgileri kontrol edin.<\/p>\n<h3><strong>9- Yedekleme yapmamak<\/strong><\/h3>\n<p>Fidye yaz\u0131l\u0131m\u0131, her y\u0131l \u015firketlere y\u00fcz milyonlarca dolara mal oluyor. Dolay\u0131s\u0131yla, bazen t\u00fcketicileri bekleyen bir\u00e7ok varyant oldu\u011funu unutuyoruz. Aniden evdeki bilgisayar\u0131n\u0131z\u0131n kilitlendi\u011fini d\u00fc\u015f\u00fcn\u00fcn. Aile foto\u011fraflar\u0131 ve \u00f6nemli i\u015f belgeleri dahil olmak \u00fczere bilgisayar\u0131n\u0131zdaki ve b\u00fcy\u00fck ihtimalle bulut depolamadaki t\u00fcm veriler sonsuza kadar kaybolabilir. D\u00fczenli yedekleme, k\u00f6t\u00fc durumlarla kar\u015f\u0131la\u015fman\u0131z ihtimaline kar\u015f\u0131 i\u00e7inizin rahat olmas\u0131n\u0131 sa\u011flar.<\/p>\n<h3><strong>10- Ak\u0131ll\u0131 telefonunuzu korumamak<\/strong><\/h3>\n<p>Avrupa\u2019daki evlerin neredeyse \u00fc\u00e7te biri sesli asistan, ak\u0131ll\u0131 televizyon ve g\u00fcvenlik kameralar\u0131 gibi elektronik cihazlarla donat\u0131lm\u0131\u015ft\u0131r. Ancak sa\u011flad\u0131klar\u0131 ba\u011flanabilirlik ve makine zekas\u0131 \u00f6zellikleri, bu cihazlar\u0131n su\u00e7lular i\u00e7in ilgi \u00e7ekici bir hedef haline gelmelerini de sa\u011flar. Di\u011ferlerine sald\u0131rmak \u00fczere botnetlere d\u00f6n\u00fc\u015ft\u00fcrmek i\u00e7in ele ge\u00e7irilebilirler veya di\u011fer cihazlara ve verilere eri\u015fim sa\u011flamak i\u00e7in kullan\u0131labilirler. Bu cihazlar\u0131 g\u00fcvende tutmak i\u00e7in, ba\u015flang\u0131\u00e7taki varsay\u0131lan parolalar\u0131 de\u011fi\u015ftirin. Ayr\u0131ca, \u00fcr\u00fcnlerindeki bilinen g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 onard\u0131\u011f\u0131na dair takip kayd\u0131 bulunan sat\u0131c\u0131lar\u0131 se\u00e7ti\u011finizden ve elektronik bir cihaz almadan \u00f6nce olas\u0131 g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 ara\u015ft\u0131rd\u0131\u011f\u0131n\u0131zdan emin olun.<\/p>","protected":false},"excerpt":{"rendered":"<p>Sorry, this entry is only available in Turkish. For the sake of viewer convenience, the content is shown below in the alternative language. You may click the link to switch the active language. 2022 Y\u0131l\u0131na ba\u015flarken, dijital hayat\u0131m\u0131z\u0131 da g\u00f6zden ge\u00e7irmemiz, yeni kararlar almam\u0131z gerekiyor. Yeni bir y\u0131la ba\u015flarken siber g\u00fcvenlikle ilgili de\u011fi\u015ftirilmesi gereken 10 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":148763,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[53,157],"tags":[99917,99913,99914,16303,65918,99915,99916,99912],"views":128,"_links":{"self":[{"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/posts\/148760"}],"collection":[{"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/comments?post=148760"}],"version-history":[{"count":0,"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/posts\/148760\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/media\/148763"}],"wp:attachment":[{"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/media?parent=148760"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/categories?post=148760"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/tags?post=148760"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}