{"id":157276,"date":"2022-06-11T17:33:06","date_gmt":"2022-06-11T14:33:06","guid":{"rendered":"https:\/\/www.enerjigazetesi.ist\/?p=157276"},"modified":"2022-06-11T17:38:37","modified_gmt":"2022-06-11T14:38:37","slug":"siber-guvenligin-en-zayif-halkasi-insan","status":"publish","type":"post","link":"https:\/\/www.enerjigazetesi.ist\/en\/siber-guvenligin-en-zayif-halkasi-insan\/","title":{"rendered":"(Turkish) Siber G\u00fcvenli\u011fin En Zay\u0131f Halkas\u0131 \u0130nsan"},"content":{"rendered":"<p class=\"qtranxs-available-languages-message qtranxs-available-languages-message-en\">Sorry, this entry is only available in <a href=\"https:\/\/www.enerjigazetesi.ist\/tr\/wp-json\/wp\/v2\/posts\/157276\" class=\"qtranxs-available-language-link qtranxs-available-language-link-tr\" title=\"Turkish\">Turkish<\/a>. For the sake of viewer convenience, the content is shown below in the alternative language. You may click the link to switch the active language.<\/p><p><\/p>\n<h2><strong>Ara\u015ft\u0131rmalar, 2021\u2019de analiz edilen veri ihlallerinin % 82\u2019sinde bir \u201cinsan fakt\u00f6r\u00fc\u201d oldu\u011funu g\u00f6steriyor. Sald\u0131r\u0131lar\u0131n 1&#8217;inci hedefinin \u00e7al\u0131\u015fanlar oldu\u011fu, modern siber tehditlerin yads\u0131namaz bir ger\u00e7e\u011fi olurken siber g\u00fcvenlik e\u011fitimlerinin neden \u00f6nemli oldu\u011funa vurgu yap\u0131l\u0131rken bu konuda neler yap\u0131lmas\u0131 gerekti\u011fi de payla\u015f\u0131ld\u0131.<\/strong><\/h2>\n<p><strong>Siber g\u00fcvenlikle<\/strong> ilgili bir \u00f6zdeyi\u015f g\u00fcvenlik zincirindeki <strong>en zay\u0131f halkan\u0131n insanlar<\/strong> oldu\u011funu s\u00f6yler.<strong> Tehdit akt\u00f6rlerinin \u00e7al\u0131\u015fanlar\u0131<\/strong> istismar etmeye y\u00f6nelik rekabeti artt\u0131k\u00e7a bu s\u00f6z\u00fcn do\u011frulu\u011fu daha da art\u0131yor. Ancak<strong> bu zay\u0131f halkay\u0131<\/strong>, a\u015f\u0131lmas\u0131 zor bir <strong>ilk savunma hatt\u0131na d\u00f6n\u00fc\u015ft\u00fcrmek<\/strong> de m\u00fcmk\u00fcn. Burada <strong>kilit nokta<\/strong> etkili bir<strong> g\u00fcvenlik fark\u0131ndal\u0131\u011f\u0131 e\u011fitim program\u0131<\/strong> sunmakt\u0131r.<\/p>\n<h3><strong>E\u011fitim neden \u00f6nemli?<\/strong><\/h3>\n<h3><strong><img loading=\"lazy\" class=\"alignright wp-image-157279\" src=\"https:\/\/www.enerjigazetesi.ist\/wp-content\/uploads\/2022\/06\/siber-guvenligin-en-zayif-halkasi-insan-1.jpg\" alt=\"\" width=\"320\" height=\"180\" srcset=\"https:\/\/www.enerjigazetesi.ist\/wp-content\/uploads\/2022\/06\/siber-guvenligin-en-zayif-halkasi-insan-1.jpg 550w, https:\/\/www.enerjigazetesi.ist\/wp-content\/uploads\/2022\/06\/siber-guvenligin-en-zayif-halkasi-insan-1-300x169.jpg 300w, https:\/\/www.enerjigazetesi.ist\/wp-content\/uploads\/2022\/06\/siber-guvenligin-en-zayif-halkasi-insan-1-500x281.jpg 500w, https:\/\/www.enerjigazetesi.ist\/wp-content\/uploads\/2022\/06\/siber-guvenligin-en-zayif-halkasi-insan-1-80x45.jpg 80w\" sizes=\"(max-width: 320px) 100vw, 320px\" \/><\/strong><\/h3>\n<p>Ciddi bir <strong>g\u00fcvenlik ihlali<\/strong>, nedeni ne olursa olsun, <strong>finansal<\/strong> ve<strong> itibari<\/strong> a\u00e7\u0131dan <strong>\u00f6nemli zararlara<\/strong> yol a\u00e7abilir. Yak\u0131n zamanda yap\u0131lan bir ara\u015ft\u0131rma, b\u00f6yle bir ihlale maruz kalan i\u015fletmelerin <strong>% 20<\/strong>\u2019sinin sonu\u00e7 olarak <strong>neredeyse iflas etti\u011fini<\/strong> g\u00f6steriyor. Bir di\u011fer ara\u015ft\u0131rma ise bir<strong> veri ihlalinin<\/strong> g\u00fcn\u00fcm\u00fczdeki ortalama maliyetinin <strong>4,2 milyon ABD dolar\u0131&#8217;<\/strong>n\u0131n da \u00fcst\u00fcnde \u00e7\u0131karak en y\u00fcksek seviyelere ula\u015ft\u0131\u011f\u0131n\u0131 \u00f6ne s\u00fcr\u00fcyor.<\/p>\n<h3><strong>G\u00fcvenlik fark\u0131ndal\u0131\u011f\u0131 e\u011fitimi nedir?<\/strong><\/h3>\n<p><strong>G\u00fcvenlik fark\u0131ndal\u0131\u011f\u0131 e\u011fitimi<\/strong>, do\u011fru kararlar alabilmeleri i\u00e7in \u00e7al\u0131\u015fanlar\u0131n elini g\u00fc\u00e7lendirmeye y\u00f6nelik<strong> bir dizi konu<\/strong> ve <strong>tekni\u011fin<\/strong> ele al\u0131nmas\u0131n\u0131 gerektiren bi\u00e7imlendirilmi\u015f bir s\u00fcre\u00e7tir. Bu kapsamda s\u00f6z konusu <strong>e\u011fitim<\/strong>, bir<strong> g\u00fcvenlik tasar\u0131m\u0131na<\/strong> sahip kurum k\u00fclt\u00fcr\u00fc olu\u015fturmak isteyen kurumlar i\u00e7in temel bir yap\u0131ta\u015f\u0131 olarak g\u00f6r\u00fclebilir.<\/p>\n<h3><strong>G\u00fcvenlik fark\u0131ndal\u0131\u011f\u0131 e\u011fitimi neden gerekli?<\/strong><\/h3>\n<p>Herhangi bir e\u011fitim program\u0131nda oldu\u011fu gibi <strong>g\u00fcvenlik fark\u0131ndal\u0131\u011f\u0131 e\u011fitimlerinde de<\/strong> bireylerin daha iyi birer \u00e7al\u0131\u015fana d\u00f6n\u00fc\u015fmeleri i\u00e7in becerilerinin geli\u015ftirilmesi fikri g\u00fcd\u00fcl\u00fcr. \u00c7al\u0131\u015fanlar\u0131n <strong>g\u00fcvenlik fark\u0131ndal\u0131klar\u0131n\u0131 geli\u015ftirmek<\/strong>, <strong>potansiyel g\u00fcvenlik ihlali riskini<\/strong> de azaltacakt\u0131r. Kurumsal kullan\u0131c\u0131lar, \u00e7al\u0131\u015ft\u0131klar\u0131 herhangi bir kurumun tam merkezinde yer al\u0131rlar. Dolay\u0131s\u0131yla onlar\u0131n bilgileri ele ge\u00e7irilirse kurumlar\u0131n bilgileri de ele ge\u00e7irilebilir. Benzer \u015fekilde, bu ki\u015filerin <strong>hassas veriler<\/strong> ile <strong>BT sistemlerine<\/strong> eri\u015febiliyor olmas\u0131, \u015firketi de olumsuz etkileyebilecek <strong>kazalar\u0131n riskini<\/strong> art\u0131rmaktad\u0131r.<\/p>\n<p><strong>\u00c7e\u015fitli e\u011filimler, g\u00fcvenlik fark\u0131ndal\u0131\u011f\u0131 e\u011fitimine<\/strong> duyulan acil ihtiyac\u0131n <span style=\"text-decoration: underline;\">\u00f6nemini ortaya koymaktad\u0131r:<\/span><\/p>\n<p><strong>Parolalar:\u00a0<\/strong>De\u011fi\u015fmeyen <strong>kimlik bilgileri, bilgisayar sistemleri<\/strong> kadar uzun bir ge\u00e7mi\u015fe sahip. G\u00fcvenlik uzmanlar\u0131n\u0131n y\u0131llard\u0131r uyarmas\u0131na ra\u011fmen <strong>kimlik bilgileri, kullan\u0131c\u0131 kimlik do\u011frulamas\u0131<\/strong> i\u00e7in kullan\u0131lan en pop\u00fcler y\u00f6ntem olmaya devam ediyor. Nedeni basit; insanlar bu bilgileri nas\u0131l kullanaca\u011f\u0131n\u0131 <strong>i\u00e7g\u00fcd\u00fcsel<\/strong> olarak biliyor. Bu ise, bu bilgilerin <strong>bilgisayar korsanlar\u0131<\/strong> i\u00e7in b\u00fcy\u00fck birer hedef haline gelmesi sorununu ortaya \u00e7\u0131kar\u0131yor. Bir <strong>\u00e7al\u0131\u015fan\u0131n ki\u015fisel bilgilerini payla\u015fmas\u0131<\/strong> i\u00e7in kand\u0131r\u0131lmas\u0131 ya da bu bilgilerin tahmin edilmesi <strong>tam a\u011f eri\u015fimi<\/strong> i\u00e7in genelde ba\u015fka bir \u015feye gerek b\u0131rakm\u0131yor. Yap\u0131lan bir tahmine g\u00f6re<strong> Amerika&#8217;da<\/strong> \u00e7al\u0131\u015fanlar\u0131n yar\u0131s\u0131ndan fazlas\u0131, parolalar\u0131n\u0131 bir <strong>ka\u011f\u0131da yaz\u0131yor. Zay\u0131f parola uygulamalar\u0131<\/strong>, <strong>bilgisayar korsanlar\u0131<\/strong> i\u00e7in a\u00e7\u0131k birer kap\u0131d\u0131r. \u00c7al\u0131\u015fanlar\u0131n hat\u0131rlamas\u0131 gereken kimlik bilgilerinin say\u0131s\u0131 artt\u0131k\u00e7a <strong>k\u00f6t\u00fc kullan\u0131m ihtimalleri<\/strong> de artmaktad\u0131r.<\/p>\n<p><strong>Sosyal m\u00fchendislik:\u00a0<\/strong>\u0130nsanlar sosyal yarat\u0131klard\u0131r. Sosyal olmam\u0131z da bizleri kolay ikna edilebilen kolay hedefler haline getirmektedir. Bize anlat\u0131lan<strong> hikayelere<\/strong> ve <strong>o hikayeleri<\/strong> bize anlatanlara inanmak isteriz. <strong>Sosyal m\u00fchendisli\u011fin<\/strong> i\u015fe yarama sebebi i\u015fe \u015fudur;<strong> tehdit akt\u00f6rleri<\/strong> kurbanlar\u0131n\u0131n isteklerini yerine getirmelerini sa\u011flamak i\u00e7in<strong> zaman bask\u0131s\u0131<\/strong> ve <strong>birini taklit etme<\/strong> gibi <strong>sahtekarl\u0131k tekniklerini<\/strong> kullanmaktad\u0131r. Bir <strong>oltalama e-postas\u0131, SMS<\/strong> ile <strong>kimlik av\u0131<\/strong> olarak da bilinen <strong>oltalama k\u0131sa mesajlar\u0131<\/strong> ya da <strong>sesli kimlik av\u0131<\/strong> olarak da bilinen <strong>telefon aramalar\u0131, sahtekarl\u0131k tekniklerinin<\/strong> en bilinen \u00f6rnekleri olsa da i\u015f <strong>e-postalar\u0131n\u0131n<\/strong> ele ge\u00e7irilmesine <strong>(BEC)<\/strong> y\u00f6nelik sald\u0131r\u0131lar ve di\u011fer sahtekarl\u0131klar da yayg\u0131nd\u0131r.<\/p>\n<p><strong>Siber su\u00e7 ekonomisi:\u00a0<\/strong>Bu tehdit akt\u00f6rleri g\u00fcn\u00fcm\u00fczde <strong>karma\u015f\u0131k<\/strong> ve<strong> sofistike a\u011flarda<\/strong> yer alan karanl\u0131k web sitelerini kullanmaktad\u0131r. Bu karanl\u0131k a\u011f sitelerinde ise, \u00e7ok<strong> korunakl\u0131 bar\u0131nd\u0131rma<\/strong> hizmetlerinden fidye yaz\u0131l\u0131m\u0131na kadar <strong>her t\u00fcrl\u00fc veri<\/strong> ve<strong> hizmetin<\/strong> al\u0131m sat\u0131m\u0131n\u0131 yapmaktad\u0131rlar. Bu a\u011f\u0131n de\u011feri trilyonlarla ifade edilmektedir. <strong>Siber su\u00e7 sekt\u00f6r\u00fc<\/strong>n\u00fcn bu \u015fekilde<strong> \u201cmeslekle\u015fmesi\u201d<\/strong> de do\u011fal olarak<strong> tehdit akt\u00f6rlerinin<\/strong>, yat\u0131r\u0131m getirisinin en y\u00fcksek oldu\u011fu yerlere odaklanmas\u0131na neden olmu\u015ftur. \u00c7o\u011fu durumda bu, hem<strong> kurumsal<\/strong> \u00e7al\u0131\u015fan hem de <strong>t\u00fcketici<\/strong> olarak kullan\u0131c\u0131lar\u0131n hedef al\u0131nmas\u0131 anlam\u0131na gelmektedir.<\/p>\n<p><strong>Hibrit \u00e7al\u0131\u015fma:\u00a0<\/strong>Evden \u00e7al\u0131\u015fan ki\u015filerin,<strong> oltalama ba\u011flant\u0131lar\u0131na t\u0131klama<\/strong> ve<strong> i\u015f cihazlar\u0131n\u0131 ki\u015fisel ama\u00e7lar<\/strong> i\u00e7in kullanma gibi <strong>riskli davran\u0131\u015flar sergileme ihtimallerinin<\/strong> daha y\u00fcksek oldu\u011fu d\u00fc\u015f\u00fcn\u00fclmektedir.<strong>\u00a0<\/strong>Bu a\u00e7\u0131dan<strong> hibrit \u00e7al\u0131\u015fman\u0131n<\/strong> yeni bir d\u00f6nem olarak ortaya \u00e7\u0131kmas\u0131, sald\u0131rganlar\u0131n kurumsal kullan\u0131c\u0131lar\u0131 en zay\u0131f olduklar\u0131 anda hedeflemelerine yol a\u00e7m\u0131\u015ft\u0131r. Dahas\u0131 <strong>evdeki ba\u011flant\u0131lar<\/strong> ve <strong>bilgisayarlar da<\/strong> ofistekilere k\u0131yasla <strong>daha az korumaya sahip<\/strong> olabilmektedir.<\/p>\n<h3><strong>ESET\u2019ten \u00fccretsiz siber g\u00fcvenlik e\u011fitimi\u00a0<\/strong><\/h3>\n<p><em>ESET T\u00fcrkiye \u00dcr\u00fcn ve Pazarlama M\u00fcd\u00fcr\u00fc<\/em> <strong>Can Erginkurban<\/strong> i\u015fletmelere destek olabilmek i\u00e7in \u00fccretsiz bir<strong> siber g\u00fcvenlik e\u011fitimi<\/strong> haz\u0131rlad\u0131klar\u0131n\u0131 s\u00f6yledi. T\u00fcrk\u00e7e olarak haz\u0131rlanan e\u011fitime \u00a0<a href=\"https:\/\/www.eset.com\/tr\/business\/cybersecurity-training\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.eset.com\/tr\/business\/cybersecurity-training\/<\/a> adresinden formu dolduran herkes kolayl\u0131kla eri\u015febiliyor. E\u011fitim kapsam\u0131nda <strong>6 ba\u015fl\u0131k<\/strong>ta, <strong>i\u015fletmeler<\/strong> i\u00e7in en b\u00fcy\u00fck endi\u015fe konular\u0131 <strong>basit ama kapsaml\u0131<\/strong> bir \u015fekilde ele al\u0131n\u0131yor.<\/p>","protected":false},"excerpt":{"rendered":"<p>Sorry, this entry is only available in Turkish. For the sake of viewer convenience, the content is shown below in the alternative language. You may click the link to switch the active language. Ara\u015ft\u0131rmalar, 2021\u2019de analiz edilen veri ihlallerinin % 82\u2019sinde bir \u201cinsan fakt\u00f6r\u00fc\u201d oldu\u011funu g\u00f6steriyor. Sald\u0131r\u0131lar\u0131n 1&#8217;inci hedefinin \u00e7al\u0131\u015fanlar oldu\u011fu, modern siber tehditlerin yads\u0131namaz [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":157280,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[53,157],"tags":[103938,94833,103940,16303,103943,103937,103942,83187,103941,103939],"views":122,"_links":{"self":[{"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/posts\/157276"}],"collection":[{"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/comments?post=157276"}],"version-history":[{"count":0,"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/posts\/157276\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/media\/157280"}],"wp:attachment":[{"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/media?parent=157276"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/categories?post=157276"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.enerjigazetesi.ist\/en\/wp-json\/wp\/v2\/tags?post=157276"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}