{"id":148977,"date":"2022-01-07T15:29:01","date_gmt":"2022-01-07T12:29:01","guid":{"rendered":"https:\/\/www.enerjigazetesi.ist\/?p=148977"},"modified":"2022-01-07T15:35:39","modified_gmt":"2022-01-07T12:35:39","slug":"siber-guvenlik-parolalarin-calinmasi-icin-kullanilan-5-yontem","status":"publish","type":"post","link":"https:\/\/www.enerjigazetesi.ist\/en\/siber-guvenlik-parolalarin-calinmasi-icin-kullanilan-5-yontem\/","title":{"rendered":"(Turkish) Siber G\u00fcvenlik: Parolalar\u0131n \u00c7al\u0131nmas\u0131nda Kullan\u0131lan 5 Y\u00f6ntem!"},"content":{"rendered":"<p class=\"qtranxs-available-languages-message qtranxs-available-languages-message-en\">Sorry, this entry is only available in <a href=\"https:\/\/www.enerjigazetesi.ist\/tr\/wp-json\/wp\/v2\/posts\/148977\" class=\"qtranxs-available-language-link qtranxs-available-language-link-tr\" title=\"Turkish\">Turkish<\/a>. For the sake of viewer convenience, the content is shown below in the alternative language. You may click the link to switch the active language.<\/p><p><\/p>\n<h2>Parola kavram\u0131 y\u00fczy\u0131llard\u0131r hayat\u0131m\u0131zda ve parolalar\u0131n bilgi i\u015flem d\u00fcnyas\u0131na giri\u015fi bir\u00e7o\u011fumuzun hat\u0131rlayabilece\u011finden bile eskiye dayan\u0131yor. Ortalama bir ki\u015finin hat\u0131rlamas\u0131 gereken <strong>100 giri\u015f bilgisi<\/strong> <img loading=\"lazy\" class=\"alignright wp-image-148980\" src=\"https:\/\/www.enerjigazetesi.ist\/wp-content\/uploads\/2022\/01\/teknoloji-parolalarin-calinmasi-icin-kullanilan-5-yontem-2.jpg\" alt=\"\" width=\"320\" height=\"234\" srcset=\"https:\/\/www.enerjigazetesi.ist\/wp-content\/uploads\/2022\/01\/teknoloji-parolalarin-calinmasi-icin-kullanilan-5-yontem-2.jpg 485w, https:\/\/www.enerjigazetesi.ist\/wp-content\/uploads\/2022\/01\/teknoloji-parolalarin-calinmasi-icin-kullanilan-5-yontem-2-300x219.jpg 300w, https:\/\/www.enerjigazetesi.ist\/wp-content\/uploads\/2022\/01\/teknoloji-parolalarin-calinmasi-icin-kullanilan-5-yontem-2-69x50.jpg 69w\" sizes=\"(max-width: 320px) 100vw, 320px\" \/>oldu\u011fu ve bu say\u0131n\u0131n gittik\u00e7e artt\u0131\u011f\u0131 bir \u00e7a\u011fda ya\u015f\u0131yoruz.<\/h2>\n<p>Bir\u00e7ok ki\u015fi, kendilerine kolayl\u0131k olsun diye, k\u0131sa yollar\u0131 tercih ediyor ve sonucunda da g\u00fcvenlikle ilgili sorunlar ortaya \u00e7\u0131k\u0131yor. Bir <strong>siber su\u00e7lu<\/strong> ile ki\u015fisel ve finansal bilgileriniz aras\u0131ndaki <strong>tek \u015feyin parola oldu\u011funu<\/strong> d\u00fc\u015f\u00fcn\u00fcrsek,<strong> sahtekarlar\u0131n giri\u015f bilgilerini \u00e7almaya<\/strong> veya<strong> k\u0131rmaya neden bu kadar istekli<\/strong> oldu\u011funu anlayabiliriz. Parolalar dijital d\u00fcnyan\u0131n sanal anahtarlar\u0131d\u0131r. <strong>Online bankac\u0131l\u0131\u011fa<\/strong>, <strong>e-posta<\/strong> ve<strong> sosyal medya hizmetleri<\/strong>ne, <strong>Netflix<\/strong> hesaplar\u0131na ve <strong>bulut depolamas\u0131nda<\/strong> bulunan<strong> t\u00fcm verilere eri\u015fim<\/strong> sa\u011flar.<\/p>\n<h3><strong>Giri\u015f bilgilerine sahip olan bilgisayar korsanlar\u0131 neler yapabilir:<\/strong><\/h3>\n<p>&#8211; <strong>Ki\u015fisel kimlik bilgilerini \u00e7almak<\/strong> ve bu bilgileri <strong>ba\u015fka su\u00e7lulara satmak<\/strong><\/p>\n<p>&#8211; Hesab\u0131n kendisine eri\u015fim sa\u011flama olana\u011f\u0131n\u0131 ba\u015fkalar\u0131na satmak. Karanl\u0131k a\u011fdaki su\u00e7lu sitelerinde bu <strong>kimlik bilgileriyle ticaret<\/strong> yap\u0131l\u0131r. Bu bilgileri alan <strong>k\u00f6t\u00fc niyetli ki\u015filer<\/strong>, <em>\u00fccretsiz taksi yolculuklar\u0131ndan ve video yay\u0131nlar\u0131ndan<\/em> ele ge\u00e7irilen <strong>u\u00e7u\u015f mili hesaplar\u0131yla indirimli seyahatlere<\/strong> kadar her \u015feye eri\u015fim sa\u011flayabilir.<\/p>\n<p>&#8211;<strong> Ayn\u0131 parolay\u0131<\/strong> kulland\u0131\u011f\u0131n\u0131z di\u011fer hesaplara giri\u015f yapmak i\u00e7in <strong>parolalar\u0131 kullanmak.<\/strong><\/p>\n<h3><strong>Bilgisayar korsanlar\u0131 parolalar\u0131 nas\u0131l \u00e7al\u0131yor?<\/strong><\/h3>\n<h4><strong>Kimlik av\u0131 ve sosyal m\u00fchendislik<\/strong><\/h4>\n<p>\u0130nsan, hata yapabilen ve tahmin edilebilir bir varl\u0131kt\u0131r. Ayr\u0131ca, acele etmemiz istendi\u011finde yanl\u0131\u015f kararlar vermeye de e\u011filimliyiz. <strong>Siber su\u00e7lular, sosyal m\u00fchendislik<\/strong> yoluyla bu zay\u0131fl\u0131klar\u0131m\u0131zdan faydalan\u0131rlar. <strong>Sosyal m\u00fchendislik<\/strong>, yapmamam\u0131z gereken bir \u015feyi yapmam\u0131z i\u00e7in tasarlanan psikolojik bir kand\u0131rmad\u0131r. <strong>Kimlik av\u0131 b\u00fcy\u00fck ihtimalle<\/strong> bunun en bilinen \u00f6rne\u011fidir. Kimlik av\u0131nda <strong>bilgisayar korsanlar\u0131 arkada\u015f, aile<\/strong> ve<strong> i\u015f ili\u015fkiniz<\/strong> bulunan \u015firketler gibi <strong>ger\u00e7ek ki\u015filerin kimli\u011fine<\/strong> b\u00fcr\u00fcn\u00fcr. Size gelen<strong> e-posta<\/strong> veya <strong>mesaj<\/strong> ger\u00e7ek gibi g\u00f6r\u00fcn\u00fcr, ancak<strong> e-postada<\/strong> veya<strong> mesajda<\/strong> k\u00f6t\u00fc ama\u00e7l\u0131 bir ba\u011flant\u0131 ya da ek bulunur. Bu ba\u011flant\u0131ya veya eke t\u0131klad\u0131\u011f\u0131n\u0131zda <strong>k\u00f6t\u00fc ama\u00e7l\u0131 bir yaz\u0131l\u0131m<\/strong> indirirsiniz ya da ki\u015fisel bilgilerinizi girmeniz gereken bir sayfaya y\u00f6nlendirilirsiniz.<\/p>\n<p>Burada a\u00e7\u0131klad\u0131\u011f\u0131m\u0131z \u00fczere <strong>kimlik av\u0131 sald\u0131r\u0131s\u0131yla<\/strong> ilgili i\u015faretleri fark etmenin bir\u00e7ok yolu vard\u0131r. Doland\u0131r\u0131c\u0131lar, <strong>kurbanlar\u0131n\u0131n giri\u015f bilgilerini<\/strong> ve <strong>di\u011fer ki\u015fisel bilgilerini ele ge\u00e7irmek<\/strong> i\u00e7in do\u011frudan <strong>telefonla arayarak<\/strong>, genellikle <strong>teknik destek ekibi<\/strong> m\u00fchendisi gibi davran\u0131r. Bu tekni\u011fe <strong>\u201csesli kimlik h\u0131rs\u0131zl\u0131\u011f\u0131\u201d (ses tabanl\u0131 kimlik h\u0131rs\u0131zl\u0131\u011f\u0131)<\/strong> denir.<\/p>\n<h4><strong>K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar<\/strong><\/h4>\n<p>Parolalar\u0131n\u0131z\u0131 ele ge\u00e7irmek i\u00e7in kullan\u0131lan pop\u00fcler yollardan biri de k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlard\u0131r. Kimlik av\u0131 e-postalar\u0131, bu t\u00fcrdeki sald\u0131r\u0131lar aras\u0131nda ba\u015fl\u0131ca vekt\u00f6rd\u00fcr. K\u00f6t\u00fc ama\u00e7l\u0131 \u00e7evrimi\u00e7i bir reklama (zararl\u0131 reklam) t\u0131klayarak veya g\u00fcvenli\u011fi ihlal edilmi\u015f bir web sitesini ziyaret ederek (istemeden indirme) kurban durumuna d\u00fc\u015febilirsiniz. ESET ara\u015ft\u0131rmac\u0131s\u0131 Lukas Stefanko taraf\u0131ndan bir\u00e7ok kez g\u00f6sterildi\u011fi \u00fczere k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar, s\u0131kl\u0131kla <strong>\u00fc\u00e7\u00fcnc\u00fc taraf uygulama ma\u011fazalar\u0131nda<\/strong> bulunan ve <strong>ger\u00e7ek g\u00f6z\u00fcken bir telefon uygulamas\u0131nda<\/strong> gizlenmi\u015f bile olabilir.<\/p>\n<p>Bilgi \u00e7almak i\u00e7in kullan\u0131lan \u00e7e\u015fitli t\u00fcrlerde <strong>k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m<\/strong> bulunur, ancak en yayg\u0131n olanlar\u0131ndan baz\u0131lar\u0131 bast\u0131\u011f\u0131n\u0131z tu\u015flar\u0131 kaydetmek veya cihaz\u0131n\u0131z\u0131n ekran g\u00f6r\u00fcnt\u00fcs\u00fcn\u00fc alarak, bu g\u00f6r\u00fcnt\u00fcy\u00fc sald\u0131rganlara g\u00f6ndermek \u00fczere tasarlan\u0131r.<\/p>\n<h4><strong>Deneme yan\u0131lma sald\u0131r\u0131lar\u0131<\/strong><\/h4>\n<p>Ortalama <strong>bir ki\u015finin bilmesi gereken<\/strong> ortalama parola say\u0131s\u0131 <strong>2020 y\u0131l\u0131nda<\/strong> <strong>%25<\/strong>\u2019lik bir art\u0131\u015f g\u00f6sterdi. Bunun sonucunda bir\u00e7o\u011fumuz hat\u0131rlamas\u0131 kolay parolalar se\u00e7ip bunlar\u0131 birden \u00e7ok sitede kullan\u0131yoruz. Ancak bu durum <strong>deneme yan\u0131lma sald\u0131r\u0131s\u0131<\/strong> denilen teknikler i\u00e7in kap\u0131lar\u0131 aralayabilir. Bunlardan en yayg\u0131n olanlar\u0131ndan biri <strong>kimlik h\u0131rs\u0131zl\u0131\u011f\u0131&#8217;<\/strong>d\u0131r. Bu teknikte sald\u0131rganlar, daha \u00f6nce ele ge\u00e7irilmi\u015f b\u00fcy\u00fck hacimli <strong>kullan\u0131c\u0131\/parola<\/strong> kombinasyonlar\u0131n\u0131 <strong>otomatik bir yaz\u0131l\u0131ma<\/strong> y\u00fckler. Daha sonra bu ara\u00e7, kombinasyonlar\u0131 bir\u00e7ok sitede deneyerek <strong>e\u015fle\u015fme bulmaya<\/strong> \u00e7al\u0131\u015f\u0131r. Bu sayede korsanlar yaln\u0131zca bir <strong>parola<\/strong> ile<strong> bir\u00e7ok hesab\u0131n\u0131z\u0131<\/strong> ele ge\u00e7irebilir. Bir hesaplamaya g\u00f6re ge\u00e7ti\u011fimiz y\u0131l d\u00fcnya genelinde bu \u015fekilde <strong>193 milyar deneme<\/strong> oldu\u011fu hesapland\u0131. Ge\u00e7ti\u011fimiz g\u00fcnlerde bu teknikle ilgili olarak Kanada h\u00fck\u00fcmeti kurban durumuna d\u00fc\u015ft\u00fc. Di\u011fer bir deneme yan\u0131lma tekni\u011fi ise parola p\u00fcsk\u00fcrtmedir. Bu teknikte korsanlar, yayg\u0131n olarak kullan\u0131lan parolalar\u0131 deneyerek sizin hesab\u0131n\u0131z\u0131n parolas\u0131n\u0131 k\u0131rmak i\u00e7in<strong> otomatik bir yaz\u0131l\u0131m<\/strong> kullan\u0131r.<\/p>\n<h4><strong>Tahmin<\/strong><\/h4>\n<p>Deneme yan\u0131lma yoluyla parolan\u0131z\u0131 ele ge\u00e7irmek i\u00e7in otomatik ara\u00e7lara sahip olmalar\u0131na ra\u011fmen, bilgisayar korsanlar\u0131 bazen bu ara\u00e7lara ihtiya\u00e7 duymadan, deneme yan\u0131lma sald\u0131r\u0131lar\u0131nda kullan\u0131lan daha sistematik yakla\u015f\u0131m\u0131n tam tersine yaln\u0131zca <strong>basit bir tahminle parolan\u0131z\u0131<\/strong> ele ge\u00e7irebilir. 2020 y\u0131l\u0131ndaki en \u00e7ok kullan\u0131lan parola <strong>\u201c123456\u201d<\/strong> idi, ikinci s\u0131rada ise<strong> \u201c123456789\u201d<\/strong> geliyordu. En \u00e7ok kullan\u0131lan parolalar aras\u0131nda d\u00f6rd\u00fcnc\u00fc s\u0131rada ise <strong>\u201cparola\u201d<\/strong> kelimesi yer al\u0131yordu. Bir\u00e7ok ki\u015fi gibi <strong>birden \u00e7ok hesapta ayn\u0131 parolay\u0131<\/strong> kullan\u0131yor veya benzer bir parola belirliyorsan\u0131z sald\u0131rganlar\u0131n i\u015fini kolayla\u015ft\u0131r\u0131yor, <strong>kimlik h\u0131rs\u0131zl\u0131\u011f\u0131<\/strong> ve<strong> doland\u0131r\u0131c\u0131l\u0131k<\/strong> ile ilgili riskinizi art\u0131r\u0131yorsunuz demektir.<\/p>\n<h4><strong>Omuz \u00fczerinden sinsice izleme<\/strong><\/h4>\n<p>\u015eu ana kadar inceledi\u011fimiz <strong>parola ihlalleri<\/strong> sanal ortamda uygulanan y\u00f6ntemlerdi. Ancak k\u0131s\u0131tlamalar\u0131n azalmas\u0131 ve bir\u00e7ok \u00e7al\u0131\u015fan\u0131n ofiste \u00e7al\u0131\u015fmaya yeniden ba\u015flamas\u0131yla birlikte, denenmi\u015f ve i\u015fe yarad\u0131\u011f\u0131 onaylanm\u0131\u015f baz\u0131 <strong>dinleme teknikleri<\/strong>nin de risk olu\u015fturdu\u011funu hat\u0131rlatmakta fayda var. Omuz \u00fczerinden sinsice izlemenin hala risk olu\u015fturmas\u0131n\u0131n tek nedeni bu de\u011fildir. Ge\u00e7ti\u011fimiz g\u00fcnlerde ESET \u00e7al\u0131\u015fan\u0131 Jake Moore, basit bir teknik kullanarak birinin <strong>Snapchat hesab\u0131n\u0131<\/strong> ele ge\u00e7irmenin ne kadar kolay oldu\u011funu g\u00f6stermek i\u00e7in bir deney yapt\u0131. Bu sald\u0131r\u0131n\u0131n <strong>Wi-Fi \u00fczerinden dinleme<\/strong> y\u00f6ntemiyle ger\u00e7ekle\u015ftirildi\u011fi ve <strong>\u201cba\u011flant\u0131y\u0131 izinsiz izleme\u201d<\/strong> olarak bilinen <strong>y\u00fcksek teknoloji<\/strong> versiyonunda, herkese a\u00e7\u0131k <strong>Wi-Fi ba\u011flant\u0131lar\u0131n\u0131<\/strong> izleyen korsanlar ayn\u0131 a\u011fa ba\u011fl\u0131 oldu\u011funuz s\u00fcre i\u00e7erisinde girdi\u011finiz parolan\u0131z\u0131 \u00e7alar. Her iki teknik de <strong>y\u0131llard\u0131r kullan\u0131yor<\/strong> ve <strong>tehdit olu\u015fturmaya<\/strong> devam ediyor.<\/p>\n<h4><strong>Giri\u015f bilgilerinizi nas\u0131l koruyabilirsiniz?<\/strong><\/h4>\n<p>Bu teknikleri engellemek i\u00e7in bir\u00e7ok \u015fey yapabilirsiniz. Parolan\u0131za <strong>ikinci bir kimlik do\u011frulama<\/strong> ekleyebilirsiniz, parolalar\u0131n\u0131z\u0131 daha etkili bir \u015fekilde y\u00f6netebilirsiniz veya sald\u0131r\u0131 ger\u00e7ekle\u015fmeden \u00f6nce h\u0131rs\u0131z\u0131 durdurmaya y\u00f6nelik ad\u0131mlar atabilirsiniz. ESET uzmanlar\u0131 <strong>bilgilerinizi korumak i\u00e7in<\/strong> yapabileceklerinizi <span style=\"text-decoration: underline;\">\u015fu \u015fekilde \u00f6zetliyor;<\/span><\/p>\n<p>&#8211; <strong>Bankac\u0131l\u0131k<\/strong>,<strong> e-posta<\/strong> ve <strong>sosyal medya<\/strong> hesaplar\u0131n\u0131z ba\u015fta olmak \u00fczere <strong>t\u00fcm \u00e7evrimi\u00e7i hesaplar\u0131n\u0131zda<\/strong> yaln\u0131zca <strong>g\u00fc\u00e7l\u00fc<\/strong> ve <strong>e\u015fsiz parolalar<\/strong> veya <strong>ge\u00e7i\u015f kodlar\u0131<\/strong> kullan\u0131n<\/p>\n<p>&#8211; Birden \u00e7ok hesapta ayn\u0131 giri\u015f bilgilerini kullanmaktan veya yayg\u0131n olarak yap\u0131lan <strong>parola hatalar\u0131ndan<\/strong> ka\u00e7\u0131n\u0131n<\/p>\n<p>&#8211; T\u00fcm hesaplar\u0131n\u0131zda <strong>iki fakt\u00f6rl\u00fc kimlik do\u011frulama<\/strong>ya <strong>(2FA) ge\u00e7i\u015f<\/strong> yap\u0131n<\/p>\n<p>&#8211; <strong>T\u00fcm siteler<\/strong> ve <strong>hesaplar<\/strong> i\u00e7in g\u00fc\u00e7l\u00fc, <strong>benzersiz parolalar\u0131<\/strong> saklayan ve bu sayede giri\u015f yapmay\u0131 kolayla\u015ft\u0131r\u0131p g\u00fcvenli hale getiren bir<strong> parola y\u00f6neticisi<\/strong> <strong>kullan\u0131n<\/strong><\/p>\n<p>&#8211; Bir sa\u011flay\u0131c\u0131, bilgilerinizin ihlal edildi\u011fini size bildirir bildirmez parolan\u0131z\u0131 de\u011fi\u015ftirin<\/p>\n<p>&#8211;<strong> Giri\u015f yapmak<\/strong> i\u00e7in yaln\u0131zca <strong>HTTPS siteler<\/strong> kullan\u0131n<\/p>\n<p>&#8211; Do\u011frulanmayan <strong>e-postalardaki ba\u011flant\u0131lara<\/strong> t\u0131klamay\u0131n veya ekleri a\u00e7may\u0131n<\/p>\n<p>&#8211; Yaln\u0131zca <strong>resmi uygulama ma\u011fazalar\u0131ndan<\/strong> uygulama indirin<\/p>\n<p>&#8211; T\u00fcm cihazlar\u0131n\u0131z i\u00e7in sayg\u0131n bir sa\u011flay\u0131c\u0131n\u0131n <strong>g\u00fcvenlik yaz\u0131l\u0131m\u0131na yat\u0131r\u0131m<\/strong> yap\u0131n<\/p>\n<p>&#8211; <strong>T\u00fcm i\u015fletim sistemlerinin<\/strong> ve<strong> uygulamalar\u0131n en g\u00fcncel s\u00fcr\u00fcmde<\/strong> oldu\u011fundan emin olun<\/p>\n<p>&#8211; Ortak kullan\u0131m alanlar\u0131nda <strong>omuz \u00fczerinden sinsice izleyenlere<\/strong> kar\u015f\u0131 dikkatli olun<\/p>\n<p>&#8211; <strong>Herkese a\u00e7\u0131k Wi-Fi kullan\u0131yorsan\u0131z<\/strong> asla bir hesaba giri\u015f yapmay\u0131n, giri\u015f yapman\u0131z gerekirse<strong> VPN<\/strong> kullan\u0131n<\/p>\n<p>\u00d6n\u00fcm\u00fczdeki <strong>10 y\u0131l<\/strong> i\u00e7erisinde <strong>parolalar\u0131n tarihe kar\u0131\u015faca\u011f\u0131<\/strong> tahmin ediliyor. Ancak parolaya alternatif y\u00f6ntemler hala parolan\u0131n yerini alma konusunda zorluklarla kar\u015f\u0131la\u015f\u0131yor. Dolay\u0131s\u0131yla bu konuda kullan\u0131c\u0131lar inisiyatifi ele almal\u0131d\u0131r. <strong>Dikkatli olun<\/strong> ve <strong>giri\u015f verilerinizi<\/strong> g\u00fcvende tutun.<\/p>","protected":false},"excerpt":{"rendered":"<p>Sorry, this entry is only available in Turkish. For the sake of viewer convenience, the content is shown below in the alternative language. You may click the link to switch the active language. Parola kavram\u0131 y\u00fczy\u0131llard\u0131r hayat\u0131m\u0131zda ve parolalar\u0131n bilgi i\u015flem d\u00fcnyas\u0131na giri\u015fi bir\u00e7o\u011fumuzun hat\u0131rlayabilece\u011finden bile eskiye dayan\u0131yor. Ortalama bir ki\u015finin hat\u0131rlamas\u0131 gereken 100 giri\u015f [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":148981,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[51,53,157],"tags":[100007,100002,100005,100006,92842,93936,100003,100004,89987,65918],"views":177,"_links":{"self":[{"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/posts\/148977"}],"collection":[{"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/comments?post=148977"}],"version-history":[{"count":0,"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/posts\/148977\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/media\/148981"}],"wp:attachment":[{"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/media?parent=148977"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/categories?post=148977"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/tags?post=148977"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}