{"id":1595,"date":"2025-02-02T13:43:52","date_gmt":"2025-02-02T13:43:52","guid":{"rendered":"https:\/\/endustri40.bktechin.com\/2025\/02\/02\/siber-guvenlik-tehditleri-2018\/"},"modified":"2025-02-02T13:43:52","modified_gmt":"2025-02-02T13:43:52","slug":"siber-guvenlik-tehditleri-2018","status":"publish","type":"post","link":"https:\/\/endustri40.com\/en\/siber-guvenlik-tehditleri-2018\/","title":{"rendered":"Siber G\u00fcvenlik Tehditleri | 2018"},"content":{"rendered":"<p style=\"text-align: justify;\"><span style=\"font-size:16px;\"><span style=\"font-family:trebuchet ms,helvetica,sans-serif;\">\u0130nsanl\u0131\u011f\u0131n dijital ileti\u015fime olduk&ccedil;a ba\u011f\u0131ml\u0131 oldu\u011fu bir d&ouml;nemdeyiz. Mobil cihazlar, diz&uuml;st&uuml; bilgisayarlar ve <strong><a href=\"https:\/\/endustri40.com\/en\/bulut-bilisim-cloud-computing-nedir\/\" target=\"_blank\">bulut teknolojisi (cloud)<\/a><\/strong>, herkes i&ccedil;in her yerde ve anl\u0131k eri\u015fime olanak sa\u011flad\u0131. Koruma ve g&uuml;vence olmadan insanlar risk alt\u0131nda kal\u0131yor. Yayg\u0131n g&uuml;venlik tehditleri ve sorunlar\u0131 y&uuml;z&uuml;nden ciddi s\u0131k\u0131nt\u0131lar ve parasal kay\u0131plar ya\u015fan\u0131yor.<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size:16px;\"><span style=\"font-family:trebuchet ms,helvetica,sans-serif;\"><strong><a href=\"https:\/\/endustri40.com\/en\/giyilebilir-teknolojilerin-moda-endustrisine-etkileri\/\" target=\"_blank\">Siber tehdit<\/a><\/strong> b&uuml;y&uuml;meye devam ediyor ve bu tehdit donan\u0131ml\u0131 olan kullan\u0131c\u0131lar\u0131 da etkiliyor. Kimlik av\u0131, kimlik h\u0131rs\u0131zl\u0131\u011f\u0131, doland\u0131r\u0131c\u0131l\u0131k ve fidye yaz\u0131l\u0131mlar\u0131 kullan\u0131c\u0131lar\u0131n huzurunu tehdit ediyor. Siber g&uuml;venlik uzmanlar\u0131 makine &ouml;\u011frenimi, derin &ouml;\u011frenme ve yapay zeka gibi yeni nesil teknolojilerle gelece\u011fin g&uuml;venlik &ouml;nlemlerini yarat\u0131rken, siber su&ccedil;lular da bu teknolojilere kar\u015f\u0131 g&uuml;&ccedil;l&uuml; teknikler icat ediyor ve uyguluyor.<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size:22px;\"><span style=\"color:#008080;\"><em><strong><span style=\"font-family:trebuchet ms,helvetica,sans-serif;\">\u25baKriptojacking &ldquo;Alt\u0131na H&uuml;cum&rdquo; Siber Su&ccedil;lular\u0131n &Ouml;nceli\u011fi Olacakt\u0131r<\/span><\/strong><\/em><\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size:16px;\"><span style=\"font-family:trebuchet ms,helvetica,sans-serif;\">&ldquo;Cryptojack (kriptojack)&rdquo; olarak adland\u0131r\u0131lan ani bir trend, son birka&ccedil; ay i&ccedil;erisinde bilgisayar korsanlar\u0131n\u0131n web sitelerine &uuml;cretsiz dijital para toplamak i&ccedil;in sald\u0131r\u0131da bulunmas\u0131na olanak sa\u011flad\u0131. Kriptojacking faaliyeti 2017 y\u0131l\u0131n\u0131n sonlar\u0131na do\u011fru patlamaya ba\u015flad\u0131 ve &ouml;zellikle kripto para birimlerinin de\u011feri artt\u0131k&ccedil;a 2018&rsquo;de &ccedil;ok fazla etkinlik izlenece\u011finden \u015f&uuml;pheleniliyor. Tek bir madencilik cryptocurrency (kripto para birimi), ziyaret&ccedil;ileri kendi web m&uuml;lklerine dayand\u0131rarak kendi c&uuml;zdanlar\u0131 i&ccedil;in madencilik yapabilir. Bu ko\u015fullar alt\u0131nda kriptojacking faaliyetinin, sitelerdeki reklamlar\u0131n yerini tamamen yeni bir gelir ak\u0131\u015f\u0131na d&ouml;n&uuml;\u015ft&uuml;rebilece\u011fi olas\u0131l\u0131\u011f\u0131 &ccedil;ok y&uuml;ksektir. Bununla birlikte, kriptojack&rsquo;lerin en b&uuml;y&uuml;k k\u0131sm\u0131, me\u015fru web sitelerinden ceza c&uuml;zdan\u0131 i&ccedil;in may\u0131n para birimine tahsis edilmi\u015f web sitelerinden kaynaklan\u0131yor olabilir. Bu nedenlerle kriptojacking 2018&rsquo;de izlenecek siber su&ccedil;lardan biri olacak.<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/cdnen4.yasaminritmi.com\/image\/51054f9485994de88a4108b53fc406c4\/siber-guvenlik-tehditleri-endustri40.jpg\" style=\"height: 100%; width: 100%;\" \/><\/p>\n<p style=\"text-align: justify;\"><strong><em><span style=\"color:#008080;\"><span style=\"font-size:22px;\"><span style=\"font-family:trebuchet ms,helvetica,sans-serif;\">\u25baPowerShell Tabanl\u0131 Sald\u0131r\u0131larda Art\u0131\u015f G&ouml;r&uuml;lecektir<\/span><\/span><\/span><\/em><\/strong><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size:16px;\"><span style=\"font-family:trebuchet ms,helvetica,sans-serif;\">Bu senenin ba\u015flar\u0131nda, geli\u015fmi\u015f bir PowerShell zararl\u0131 yaz\u0131l\u0131m\u0131 Suudi Arabistan Krall\u0131\u011f\u0131&rsquo;n\u0131n resmi bilgisayarlar\u0131na sald\u0131rd\u0131. Sald\u0131r\u0131, ayg\u0131tta komuta ve denetim sunucusu i&ccedil;in vekil olarak g&ouml;rev yapan tehlikeli web siteleri ile ileti\u015fim kurmaya y&ouml;nelik k&ouml;t&uuml; ama&ccedil;l\u0131 komut dosyalar\u0131 i&ccedil;eriyordu. Bu k&ouml;t&uuml; ama&ccedil;l\u0131 komut dosyas\u0131 sald\u0131r\u0131lar\u0131 &ouml;zellikle PowerShell&rsquo;i tan\u0131mlamak inan\u0131lmaz derecede zor. Antivir&uuml;s motorlar\u0131ndan kolayca ka&ccedil;abiliyorlar, bu da siber su&ccedil;lular i&ccedil;in daha cazip hale geliyor.<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><em><strong><span style=\"color:#008080;\"><span style=\"font-size:22px;\"><span style=\"font-family:trebuchet ms,helvetica,sans-serif;\">\u25baSiber Su&ccedil;lular Daha Fazla G&uuml;venlik Yaz\u0131l\u0131m\u0131n\u0131 Hedefleyecek ve \u0130stismar Edecek<\/span><\/span><\/span><\/strong><\/em><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size:16px;\"><span style=\"font-family:trebuchet ms,helvetica,sans-serif;\">Sald\u0131rganlar, g&uuml;venilen programlar\u0131n yaz\u0131l\u0131m ve donan\u0131m <strong><a href=\"https:\/\/endustri40.com\/en\/tesis-tasariminda-endustri-4-0\/\" target=\"_blank\">tedarik zincirini <\/a><\/strong>hedefleyerek cihazlar\u0131 kontrol edebilir ve kullan\u0131c\u0131lar\u0131 kalpten manip&uuml;le edebilir. Hackerlar g&uuml;venlik &uuml;r&uuml;nlerinden istifade ederek bulut trafi\u011fini engellemek ve y&ouml;nlendirmek i&ccedil;in ara&ccedil;lar edineceklerdir. Bu olaylar daha yayg\u0131n hale geldi\u011finde g&uuml;venlik yaz\u0131l\u0131m\u0131n\u0131n, &ouml;zellikle antivir&uuml;s &ccedil;&ouml;z&uuml;mlerinin kamu ve i\u015fletme alg\u0131s\u0131 daha da k&ouml;t&uuml;le\u015fecektir.<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><em><strong><span style=\"color:#008080;\"><span style=\"font-size:22px;\"><span style=\"font-family:trebuchet ms,helvetica,sans-serif;\">\u25baSiber Su&ccedil;lular Bulut Bili\u015fimi Hedef Alacak<\/span><\/span><\/span><\/strong><\/em><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size:16px;\"><span style=\"font-family:trebuchet ms,helvetica,sans-serif;\">\u015eirketler bulut teknolojine ge&ccedil;tik&ccedil;e sald\u0131rganlar bulut sa\u011flay\u0131c\u0131lar\u0131n\u0131 hedefleyecek. 2016&rsquo;daki Dyn ve Mirai sald\u0131r\u0131lar\u0131na bir g&ouml;z at\u0131nca bu e\u011filimin olu\u015ftu\u011fu g&ouml;r&uuml;l&uuml;yor ve bu e\u011filim 2018&rsquo;de yeni bir tepe noktas\u0131na ula\u015facakt\u0131r. \u015eirketler, sald\u0131r\u0131ya u\u011fram\u0131\u015f bulut sa\u011flay\u0131c\u0131lar\u0131n\u0131 kurtarmak i&ccedil;in s\u0131n\u0131rl\u0131 tepki verme yeteneklerine sahip olacak. Bu durum \u015firketlerin, t&uuml;m i\u015f y&uuml;klerini bir bulut sa\u011flay\u0131c\u0131s\u0131yla bu tehlikeye kar\u015f\u0131 korumak i&ccedil;in &ccedil;oklu bulut stratejisine bakmas\u0131na sebep olacak.<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/endustri40.com\/en\/otomasyona-yenik-dusecek-10-meslek\/\" target=\"_blank\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/cdnen4.yasaminritmi.com\/image\/ef203280406440e68ab6b3cbae62c0c9\/Otomasyona Yenik D\u00fc\u015fecek 10 Meslek.jpg\" style=\"height: 100%; width: 100%;\" \/><\/a><\/p>\n<p style=\"text-align: justify;\"><em><strong><span style=\"color:#008080;\"><span style=\"font-size:22px;\"><span style=\"font-family:trebuchet ms,helvetica,sans-serif;\">\u25baHassas SCADA Sistemleri ve IoT 2018&rsquo;de Fiziksel Hasara U\u011frayacak<\/span><\/span><\/span><\/strong><\/em><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size:16px;\"><span style=\"font-family:trebuchet ms,helvetica,sans-serif;\">Son zamanlarda k&uuml;resel a\u011flara ba\u011fl\u0131 IoT (Nesnelerin \u0130nterneti) cihazlar\u0131n\u0131n say\u0131s\u0131nda patlama ya\u015fand\u0131 ve g&uuml;n ge&ccedil;tik&ccedil;e bu say\u0131 artmaya devam etmektedir. IoT cihazlar\u0131 ve SCADA sistemlerinin internetteki g&uuml;venlik a&ccedil;\u0131klar\u0131, 2018&rsquo;de dijital hasarlardan &ccedil;ok fiziksel zararlara neden olacak. Hasar\u0131n &ouml;l&ccedil;e\u011fi, kay\u0131plar\u0131 denetleyici bile\u015fenleri ile s\u0131n\u0131rlayacakt\u0131r. IoT kapsam\u0131ndaki alg\u0131lay\u0131c\u0131 ve ak\u0131ll\u0131 cihazlar geni\u015f co\u011frafi alanlarda &ccedil;al\u0131\u015facakt\u0131r. <strong><a href=\"https:\/\/endustri40.com\/en\/endustri-4-0la-birlikte-gelen-akilli-tarim\/\" target=\"_top\">IoT<\/a>&nbsp;<\/strong>ve SCADA cihazlar\u0131n\u0131n kurulumdan sonra parmak izi vermenin kolay ve yamaman\u0131n zor oldu\u011fu ortak open-source (a&ccedil;\u0131k kaynak) sistemleri kullan\u0131yor olmas\u0131 onlar\u0131 ana hedef haline getiriyor.&nbsp;<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color:#008080;\"><strong><em><span style=\"font-size:22px;\"><span style=\"font-family:trebuchet ms,helvetica,sans-serif;\">\u25baSiber Su&ccedil;lular K&ouml;t&uuml; Ama&ccedil;l\u0131 Yaz\u0131l\u0131mlar\u0131 Yaymak \u0130&ccedil;in Solucanlar\u0131 Kullanacak<\/span><\/span><\/em><\/strong><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size:16px;\"><span style=\"font-family:trebuchet ms,helvetica,sans-serif;\">2017&rsquo;de WannaCry ve Trickbot&rsquo;un k&ouml;t&uuml; ama&ccedil;l\u0131 yaz\u0131l\u0131mlar\u0131 yaymak i&ccedil;in solucan i\u015flevselli\u011fi kulland\u0131\u011f\u0131n\u0131 g&ouml;rd&uuml;k. 2018&rsquo;de daha fazla Malware ailesi bu tekni\u011fi kullanacak, &ccedil;&uuml;nk&uuml; solucanlardan gelen a\u011flar di\u011fer bir&ccedil;ok y&ouml;ntemden daha h\u0131zl\u0131 yay\u0131l\u0131rlar. Bilgisayar korsanlar\u0131, &ccedil;ok g&ouml;ze batmadan solucanlar\u0131 nas\u0131l kullanabileceklerini &ouml;\u011frenirlerse, bu taktik ile kurbanlar\u0131n say\u0131s\u0131n\u0131 h\u0131zla artt\u0131rabilir.<\/span><\/span><\/p>\n<p style=\"text-align: justify;\">&nbsp;<\/p>\n<p style=\"text-align: justify;\"><span style=\"color:#B22222;\"><strong><em><span style=\"font-size:20px;\"><span style=\"font-family:trebuchet ms,helvetica,sans-serif;\">Yazar: Nil&uuml;fer A&ccedil;\u0131kyol<\/span><\/span><\/em><\/strong><\/span><\/p>\n<p style=\"text-align: justify;\">&nbsp;<\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size:16px;\"><span style=\"font-family:trebuchet ms,helvetica,sans-serif;\">Kaynak:<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size:16px;\"><span style=\"font-family:trebuchet ms,helvetica,sans-serif;\">\u25baCSOonline<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: &quot;trebuchet ms&quot;, helvetica, sans-serif; font-size: 16px; text-align: justify;\">\u25ba<\/span><span style=\"font-size:16px;\"><span style=\"font-family:trebuchet ms,helvetica,sans-serif;\">BCW (Business Computing World)<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: &quot;trebuchet ms&quot;, helvetica, sans-serif; font-size: 16px; text-align: justify;\">\u25ba<\/span><span style=\"font-size:16px;\"><span style=\"font-family:trebuchet ms,helvetica,sans-serif;\">Arabian Gazette<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: &quot;trebuchet ms&quot;, helvetica, sans-serif; font-size: 16px; text-align: justify;\">\u25ba<\/span><span style=\"font-size:16px;\"><span style=\"font-family:trebuchet ms,helvetica,sans-serif;\">Security Boulevard<\/span><\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Siber g\u00fcvenlik tehditleri 2018 y\u0131l\u0131nda artarak devam edecek gibi g\u00f6r\u00fcn\u00fcyor. 2017 y\u0131l\u0131 b\u00fcy\u00fck hackler, veri ihlalleri ve fidye sald\u0131r\u0131lar\u0131 gibi siber g\u00fcvenlik tehditleri ile \u00e7alkant\u0131l\u0131 bir y\u0131l oldu. Peki 2018\u2019de bizi ne gibi g\u00fcvenlik tehditleri bekliyor? Tahmin edilen pek \u00e7ok tehditten birka\u00e7\u0131n\u0131 sizler i\u00e7in derledik.<\/p>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[1],"tags":[],"coauthors":[],"class_list":["post-1595","post","type-post","status-publish","format-standard","hentry","category-uncategorized","pmpro-has-access"],"acf":[],"_links":{"self":[{"href":"https:\/\/endustri40.com\/en\/wp-json\/wp\/v2\/posts\/1595","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/endustri40.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/endustri40.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/endustri40.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/endustri40.com\/en\/wp-json\/wp\/v2\/comments?post=1595"}],"version-history":[{"count":0,"href":"https:\/\/endustri40.com\/en\/wp-json\/wp\/v2\/posts\/1595\/revisions"}],"wp:attachment":[{"href":"https:\/\/endustri40.com\/en\/wp-json\/wp\/v2\/media?parent=1595"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/endustri40.com\/en\/wp-json\/wp\/v2\/categories?post=1595"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/endustri40.com\/en\/wp-json\/wp\/v2\/tags?post=1595"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/endustri40.com\/en\/wp-json\/wp\/v2\/coauthors?post=1595"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}