{"id":7552,"date":"2020-09-10T15:11:49","date_gmt":"2020-09-10T12:11:49","guid":{"rendered":"https:\/\/www.inforte.com\/?p=7552"},"modified":"2020-09-16T15:04:56","modified_gmt":"2020-09-16T12:04:56","slug":"siber-saldirilari-onlemek-icin-kritik-yaklasimlar","status":"publish","type":"post","link":"https:\/\/www.inforte.com\/en\/siber-saldirilari-onlemek-icin-kritik-yaklasimlar\/","title":{"rendered":"Siber Sald\u0131r\u0131lar\u0131 \u00d6nlemek \u0130\u00e7in Kritik Yakla\u015f\u0131mlar"},"content":{"rendered":"<p data-renderer-start-pos=\"1\">Siber sald\u0131r\u0131lar\u0131n ilk safhalar\u0131nda anla\u015f\u0131lmas\u0131 ve i\u00e7erisinde kullan\u0131lacak teknik, taktik ve prosed\u00fcrlerin (TTP) tan\u0131mlanarak ilgili aksiyonlar\u0131 \u00f6nceden tespit etmek ve g\u00fcvenlik operasyonlar\u0131 buna uygun olarak haz\u0131rlamak her organizasyon i\u00e7in elzem olan bir g\u00fcvenlik yakla\u015f\u0131m\u0131d\u0131r. Tehdit avc\u0131l\u0131\u011f\u0131 olarak tan\u0131mlanan bu y\u00f6ntemler zararl\u0131 aksiyonlar\u0131 bertaraf etmek kadar, sald\u0131r\u0131larda kullan\u0131lan y\u00f6ntemlerin bir Red Teaming-K\u0131rm\u0131z\u0131 Tak\u0131m al\u0131\u015ft\u0131rmas\u0131 ile deneyimlenmesi de olduk\u00e7a k\u0131ymetlidir. 2020 FireEye Mandiant \u2018<a class=\"sc-iELTvK jHUAie\" title=\"https:\/\/content.fireeye.com\/security-effectiveness\/rpt-security-effectiveness-2020-deep-dive-into-cyber-reality\" href=\"https:\/\/content.fireeye.com\/security-effectiveness\/rpt-security-effectiveness-2020-deep-dive-into-cyber-reality\" data-renderer-mark=\"true\">Deep Dive Into Cyber Reality<\/a>\u2019 raporunda detayl\u0131 bahsedildi\u011fi gibi g\u00fcncel atak \u00f6rneklerinin <span id=\"82f58696-2f76-4cf9-bcd7-fe61a7a26f00\" data-renderer-mark=\"true\" data-mark-type=\"annotation\" data-mark-annotation-type=\"inlineComment\" data-id=\"82f58696-2f76-4cf9-bcd7-fe61a7a26f00\">mevcut g\u00fc<\/span>venlik uygulamalar\u0131nda %65 oran\u0131nda geleneksel y\u00f6ntemlerle \u00f6nlemedi\u011fi ve tespit edilemedi\u011fi ortaya konulmu\u015ftur. Buna ek olarak mevcut log tabanl\u0131 uygulamalar\u0131n\u0131n g\u00fcncel tehditlerde sadece %15\u2019inde alarm olu\u015ftu\u011fu ve %31\u2019in ise tamamen g\u00f6zden ka\u00e7t\u0131\u011f\u0131 g\u00f6zlemlenmi\u015ftir.<\/p>\n<p data-renderer-start-pos=\"1\">\u00a0<br \/><\/p>\n<p data-renderer-start-pos=\"884\">Geleneksel SIEM platformlar\u0131 log toplama etkinli\u011fi ve buradan al\u0131nacak sa\u011fl\u0131kl\u0131 aksiyonlar hala istenilen seviyede ger\u00e7ekle\u015fmemektedir. Di\u011fer taraftan sa\u011fl\u0131kl\u0131 g\u00fcvenlik korelasyonlar\u0131n\u0131 olu\u015fturmak i\u00e7in, g\u00fcncel tehditlerin atak karakteristikleri, \u00e7e\u015fitli payload \u00f6rnekleri hala yetersiz seviyede olmaktad\u0131r. Bunun net bir sonucu olarak g\u00fcvenlik vaka y\u00f6netimi ve orkestrasyon ak\u0131\u015flar\u0131nda \u00e7o\u011fu organizasyonda \u00f6nemli s\u0131k\u0131nt\u0131lar g\u00f6zlemlenmektedir.<\/p>\n<div class=\"rich-media-item mediaSingleView-content-wrap image-center sc-bbmXgH dnzrlx sc-uJMKN jhPfNG\" data-layout=\"center\" data-width=\"65\" data-node-type=\"mediaSingle\">\n<div class=\"sc-jqCOkK kTDsIc\">\n<div class=\"sc-eIHaNI fsSVSj\" data-context-id=\"2064385\" data-type=\"file\" data-node-type=\"media\" data-width=\"730\" data-height=\"487\" data-id=\"5d6cc664-63ad-43ba-a4ce-80480cfd76af\" data-collection=\"contentId-2064385\" data-file-name=\"image-20200909-065413.png\" data-file-size=\"511228\" data-file-mime-type=\"image\/png\">\n<div class=\"sc-gNJABI fixMqP\" data-testid=\"media-card-view\">\n<div class=\"media-file-card-view sc-eEieub dMnqJh sc-hUMlYv jOckgO\" data-testid=\"media-file-card-view\" data-test-status=\"complete\" data-test-media-name=\"image-20200909-065413.png\" data-test-progress=\"1\">\n<div class=\"wrapper\">\n<div class=\"img-wrapper\"><img fetchpriority=\"high\" decoding=\"async\" class=\"size-medium wp-image-7549 aligncenter\" src=\"https:\/\/www.inforte.com\/wp-content\/uploads\/2020\/09\/acb671a8-9738-453e-a12a-3ea43aca845d-300x200.png\" alt=\"\" width=\"300\" height=\"200\" srcset=\"https:\/\/www.inforte.com\/wp-content\/uploads\/2020\/09\/acb671a8-9738-453e-a12a-3ea43aca845d-300x200.png 300w, https:\/\/www.inforte.com\/wp-content\/uploads\/2020\/09\/acb671a8-9738-453e-a12a-3ea43aca845d.png 730w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p data-renderer-start-pos=\"1331\"><span id=\"5f321128-7d9e-4b5d-acca-b77e52040c19\" data-renderer-mark=\"true\" data-mark-type=\"annotation\" data-mark-annotation-type=\"inlineComment\" data-id=\"5f321128-7d9e-4b5d-acca-b77e52040c19\">Bunun ger\u00e7ekte anlam\u0131 ise organizasyonlar\u0131n, <\/span>ataklar\u0131n etkinlik d\u00fczeylerinin alt\u0131nda ve olduk\u00e7a endi\u015fe verici d\u00fczeyde performans g\u00f6stermeleridir. Artan dijitalle\u015fme, sald\u0131r\u0131lar\u0131n daha sofistike hale gelmesi, g\u00fcvenlik uygulamalar\u0131n\u0131n karma\u015f\u0131kl\u0131\u011f\u0131 ve yetersiz insan g\u00fcc\u00fc etmenleri ile bu sorunlar sadece teknolojik \u00e7\u00f6z\u00fcmlerle adreslenememektedir. G\u00fcn\u00fcm\u00fcz d\u00fcnyas\u0131nda, bir organizasyondaki t\u00fcm tak\u0131mlar i\u00e7in g\u00fcvenlik ilk s\u0131rada olmal\u0131, ihlaller ve sald\u0131r\u0131lar\u0131 \u00f6nlemek i\u00e7in uygun siber g\u00fcvenlik politikalar\u0131 olu\u015fturman\u0131n ve bunlara ba\u011fl\u0131 kalman\u0131n gerekli oldu\u011fu kurum k\u00fclt\u00fcr\u00fcn\u00fcn bir par\u00e7as\u0131 olmal\u0131d\u0131r. Bunun yan\u0131nda uygun teknolojilerin her kuruma \u00f6zel risk ve siber g\u00fcvenlik ihtiya\u00e7lar\u0131n\u0131 g\u00f6zetecek \u015fekilde <span id=\"657442e6-a230-41b6-b887-c77207d907fa\" data-renderer-mark=\"true\" data-mark-type=\"annotation\" data-mark-annotation-type=\"inlineComment\" data-id=\"657442e6-a230-41b6-b887-c77207d907fa\">yap\u0131land\u0131r\u0131lmas\u0131, <\/span>g\u00fcvenli\u011fi koruma katman\u0131 yat\u0131r\u0131mlar\u0131 kadar g\u00f6r\u00fcn\u00fcrl\u00fck\/tespit katmanlar\u0131 i\u00e7in de gerekli yat\u0131r\u0131mlar\u0131n yap\u0131lmas\u0131 kritik olmaktad\u0131r.<\/p>\n<p data-renderer-start-pos=\"1331\">\u00a0<br \/><\/p>\n<p data-renderer-start-pos=\"2183\">Sald\u0131r\u0131lar\u0131 \u00f6nlemenin \u00f6nemli bir par\u00e7as\u0131 da bir tehdit akt\u00f6r\u00fc gibi d\u00fc\u015f\u00fcnmektir, ataklar nas\u0131l meydana geliyor, hangi a\u00e7\u0131k nas\u0131l kullan\u0131l\u0131yor t\u00fcm bu detaylar olduk\u00e7a \u00f6nemli. <span id=\"e92422cf-0a21-4334-9c28-9d583f044fd5\" data-renderer-mark=\"true\" data-mark-type=\"annotation\" data-mark-annotation-type=\"inlineComment\" data-id=\"e92422cf-0a21-4334-9c28-9d583f044fd5\">Ters m\u00fchendislik <\/span>yaparak sald\u0131rganlar taraf\u0131ndan kullan\u0131lan \u00e7e\u015fitli teknikleri anlayarak mevcut g\u00fcvenlik uygulama ve yap\u0131land\u0131rmalar\u0131n\u0131n her zaman en maksimum d\u00fczeyde olmas\u0131n\u0131 ve verimlili\u011fini sa\u011flayacakt\u0131r. Benzer \u015fekilde tehdit ortam\u0131na bakt\u0131\u011f\u0131m\u0131zda, sald\u0131rganlar\u0131n g\u00fcvenlik tespiti zorla\u015ft\u0131racak bir\u00e7ok tekni\u011fi kulland\u0131\u011f\u0131n\u0131 g\u00f6r\u00fcyoruz, bunlar\u0131n en yayg\u0131n olanlar\u0131n\u0131 a\u015fa\u011f\u0131daki gibidir;<\/p>\n<p data-renderer-start-pos=\"2183\">\u00a0<br \/><\/p>\n<ul>\n<li data-renderer-start-pos=\"2746\">\u015eifreleme ve t\u00fcnelleme: IPS, NDR vb detection tabanl\u0131 \u00fcr\u00fcnler sens\u00f6rleri ile a\u011f\u0131 izler ve a\u011f \u00fczerinden ge\u00e7en paketleri yakalar, ancak a\u011f tabanl\u0131 sens\u00f6rler a\u00e7\u0131k olarak \u015fifrelenmemi\u015f iletilen datalar\u0131n tespitine dayan\u0131r. G\u00fcn\u00fcm\u00fcz ataklar\u0131n\u0131n \u00f6nemli k\u0131sm\u0131nda \u015fifreleme teknikleri yo\u011fun olarak kullan\u0131lmaktad\u0131r.<\/li>\n<li data-renderer-start-pos=\"2746\">Sald\u0131r\u0131lar\u0131n zamanlamas\u0131: Ataklar sald\u0131r\u0131 aksiyonlar\u0131n\u0131 normalden daha yava\u015f ger\u00e7ekle\u015ftirerek a\u011f \u00fczerindeki anomali ve tespit edilmekten m\u00fcmk\u00fcn oldu\u011funda ka\u00e7maya \u00e7al\u0131\u015fmaktad\u0131rlar. APT odakl\u0131 ataklar genellikle bu t\u00fcr bir ka\u00e7\u0131nma sald\u0131r\u0131s\u0131 <span id=\"cba92187-e8e8-4329-813c-7dc77ceab726\" data-renderer-mark=\"true\" data-mark-type=\"annotation\" data-mark-annotation-type=\"inlineComment\" data-id=\"cba92187-e8e8-4329-813c-7dc77ceab726\">ya da<\/span> kullan\u0131c\u0131 davran\u0131\u015flar\u0131n\u0131 taklit ederek legal trafik olarak kendini g\u00f6stebilirler.<\/li>\n<li data-renderer-start-pos=\"2746\">Protokol d\u00fczeyinde yanl\u0131\u015f yorumlama: Ataklar, bir sens\u00f6r\u00fcn trafi\u011fi ge\u00e7irmesini veya g\u00f6rmezden gelmesini sa\u011flayabilirler, protokol <span id=\"ec4e7bb8-4ffd-4c50-b186-6b4cb390fa48\" data-renderer-mark=\"true\" data-mark-type=\"annotation\" data-mark-annotation-type=\"inlineComment\" data-id=\"ec4e7bb8-4ffd-4c50-b186-6b4cb390fa48\">obfustication <\/span>teknikleri ile trafi\u011fi hedeften farkl\u0131 yada legal trafik gibi g\u00f6rmesine neden olabilirler.<\/li>\n<\/ul>\n<br \/>\n<p data-renderer-start-pos=\"3624\">Yetersiz g\u00f6r\u00fcn\u00fcrl\u00fck, tespit ve \u00f6nlemeye yol a\u00e7an bu durumlar ger\u00e7ek atak gelene kadar organizasyonlar\u0131n eksik ve uygunsuz yap\u0131land\u0131r\u0131lmalar\u0131na yol a\u00e7arak potansiyel riskler kar\u015f\u0131s\u0131nda mevcut g\u00fcvenlik altyap\u0131s\u0131n\u0131n at\u0131l kullan\u0131lmas\u0131na neden olmaktad\u0131r. Bu durumun en yayg\u0131n be\u015f nedeni a\u015fa\u011f\u0131daki gibidir;<\/p>\n<p data-renderer-start-pos=\"3624\">\u00a0<br \/><\/p>\n<ul>\n<li data-renderer-start-pos=\"3928\">Eski s\u0131n\u0131fland\u0131rma kategorileri ve g\u00fcncelli\u011fini yitirmi\u015f korelasyonlar<\/li>\n<li data-renderer-start-pos=\"3928\">Ataklar taraf\u0131ndan yo\u011fun kullan\u0131lan protokollerde s\u0131n\u0131rl\u0131 a\u011f izleme<\/li>\n<li data-renderer-start-pos=\"3928\">Tek seferlik istisnalar ve konfig\u00fcrasyon de\u011fi\u015fikliklerin \u00e7ok fazla olmas\u0131, yetersiz takibi ve ileti\u015fimi<\/li>\n<li data-renderer-start-pos=\"3928\">Ayr\u0131cal\u0131kl\u0131 hesaplar\u0131n g\u00fcvenli\u011findeki yetersiz yap\u0131land\u0131rmalar<\/li>\n<li data-renderer-start-pos=\"3928\">Atak ba\u011flam\u0131ndan uzak yetersiz g\u00fcvenlik yap\u0131land\u0131rmas\u0131 ve eksik g\u00f6r\u00fcn\u00fcrl\u00fck<\/li>\n<\/ul>\n<br \/>\n<p data-renderer-start-pos=\"4324\">Bir \u00e7ok atak senaryosunda kritik sapmalara neden olabilecek \u00f6zellikle kritik kullan\u0131c\u0131lar\u0131n eri\u015fim sa\u011flad\u0131\u011f\u0131 sistemler i\u00e7in g\u00fcvenlik do\u011frulamas\u0131n\u0131n yetersizili\u011fi, olu\u015fan log kay\u0131tlar\u0131n\u0131n SIEM\u2019de detayl\u0131 kay\u0131t alt\u0131na al\u0131nmamas\u0131 <span id=\"155bbd92-cb97-4678-878d-4986323dcf3c\" data-renderer-mark=\"true\" data-mark-type=\"annotation\" data-mark-annotation-type=\"inlineComment\" data-id=\"155bbd92-cb97-4678-878d-4986323dcf3c\">ya da<\/span> yap\u0131lan \u00e7e\u015fitli istisnalar uyguland\u0131\u011f\u0131 g\u00f6r\u00fclmektedir. \u00d6zellikle ayr\u0131cal\u0131k\u0131 hesaplar\u0131n y\u00f6netimi i\u00e7in <a class=\"sc-iELTvK jHUAie\" title=\"https:\/\/www.centrify.com\/privileged-access-management\/\" href=\"https:\/\/www.centrify.com\/privileged-access-management\/\" data-renderer-mark=\"true\">PAM teknolojlerinin<\/a> yap\u0131land\u0131r\u0131lmas\u0131 ve ilgili log kay\u0131tlar\u0131 ile SIEM \u00fczerinde gerekli alarmlar\u0131n olu\u015fturulmas\u0131 kritik \u00f6nemdedir. G\u00fcvenlik vakalar\u0131nda genellikle SIEM\u2019e bu bilgilerin g\u00f6nderilmemesi <span id=\"69cb5281-e8bc-4589-b40c-929c41e8cdd3\" data-renderer-mark=\"true\" data-mark-type=\"annotation\" data-mark-annotation-type=\"inlineComment\" data-id=\"69cb5281-e8bc-4589-b40c-929c41e8cdd3\">ya da<\/span> atak teknikleri ile ba\u011f\u0131nt\u0131l\u0131 korelasyon kurallar\u0131n\u0131n etkin \u00e7al\u0131\u015fmamas\u0131 nedeniyle \u00f6nemli g\u00fcvenlik risklerini ta\u015f\u0131maktad\u0131r. <span id=\"9390086f-c4a2-4e80-a416-0f3922780f15\" data-renderer-mark=\"true\" data-mark-type=\"annotation\" data-mark-annotation-type=\"inlineComment\" data-id=\"9390086f-c4a2-4e80-a416-0f3922780f15\">Sonu\u00e7 olarak tek bir ayr\u0131cal\u0131kl\u0131 hesap altyap\u0131 i\u00e7erisindeki bir \u00e7ok sisteme eri\u015fimi oldu\u011funda tek seferde y\u00fczlerce son kullan\u0131c\u0131 ve sunucuyu risk alt\u0131nda b\u0131rakmakta<\/span>, <a class=\"sc-iELTvK jHUAie\" title=\"https:\/\/attack.mitre.org\/tactics\/TA0004\/\" href=\"https:\/\/attack.mitre.org\/tactics\/TA0004\/\" data-renderer-mark=\"true\">Privileged Escalation<\/a>, <a class=\"sc-iELTvK jHUAie\" title=\"https:\/\/attack.mitre.org\/tactics\/TA0008\/\" href=\"https:\/\/attack.mitre.org\/tactics\/TA0008\/\" data-renderer-mark=\"true\">Lateral Movement<\/a> gibi \u00f6nemli atak y\u00f6ntemlerine kar\u015f\u0131 organizasyonlar\u0131 savunmas\u0131z b\u0131rakmaktad\u0131r.<\/p>\n<p data-renderer-start-pos=\"4324\">\u00a0<br \/><\/p>\n<p data-renderer-start-pos=\"5271\"><span id=\"c648af52-e0b2-4794-afd9-cb85b99c89e0\" data-renderer-mark=\"true\" data-mark-type=\"annotation\" data-mark-annotation-type=\"inlineComment\" data-id=\"c648af52-e0b2-4794-afd9-cb85b99c89e0\">\u00d6zet olarak, <\/span>organizasyonlar sand\u0131klar\u0131ndan \u00e7ok daha b\u00fcy\u00fck risk alt\u0131ndad\u0131r. Siber hijyeni g\u00fc\u00e7lendirmek ve riski en aza indirmek i\u00e7in g\u00fcvenlik etkinli\u011fini t\u00fcm seviyelerde do\u011frulanmas\u0131 ve ger\u00e7ek g\u00fcvenlik verisine eri\u015fim zorunludur. Organizasyonlar bu yap\u0131land\u0131rmalar ve \u00f6nlemler ile kritik varl\u0131klar\u0131, marka itibar\u0131n\u0131 ve ekonomik de\u011feri daha iyi koruyabilir. T\u00fcm bu risk gruplar\u0131n\u0131n mevcut ve ger\u00e7ek sald\u0131r\u0131lara kar\u015f\u0131 de\u011ferlendirerek potansiyel sald\u0131r\u0131lar\u0131 tespit edip \u00f6nleyebilece\u011finizi \u00f6\u011frenmek ister misiniz?<\/p>\n<p data-renderer-start-pos=\"5271\">\u00a0<br \/><\/p>\n<p data-renderer-start-pos=\"5785\">Detayl\u0131 \u00e7\u00f6z\u00fcm ve bilgi i\u00e7in <a class=\"sc-iELTvK jHUAie\" title=\"mailto:info@inforte.com.tr\" href=\"mailto:info@inforte.com.tr\" data-renderer-mark=\"true\">sales@inforte.com.tr<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Siber sald\u0131r\u0131lar\u0131n ilk safhalar\u0131nda anla\u015f\u0131lmas\u0131 ve i\u00e7erisinde kullan\u0131lacak teknik, taktik ve prosed\u00fcrlerin (TTP) tan\u0131mlanarak ilgili aksiyonlar\u0131 \u00f6nceden tespit etmek ve g\u00fcvenlik operasyonlar\u0131 buna uygun olarak haz\u0131rlamak her organizasyon i\u00e7in elzem olan bir g\u00fcvenlik yakla\u015f\u0131m\u0131d\u0131r. Tehdit avc\u0131l\u0131\u011f\u0131 olarak tan\u0131mlanan bu y\u00f6ntemler zararl\u0131 aksiyonlar\u0131 bertaraf etmek kadar,&#8230;<\/p>","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[257],"tags":[258,260,259],"class_list":["post-7552","post","type-post","status-publish","format-standard","hentry","category-blog","tag-ciso","tag-covid19","tag-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Siber Sald\u0131r\u0131lar\u0131 \u00d6nlemek \u0130\u00e7in Kritik Yakla\u015f\u0131mlar - Inforte Bili\u015fim A.\u015e.<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inforte.com\/en\/siber-saldirilari-onlemek-icin-kritik-yaklasimlar\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Siber Sald\u0131r\u0131lar\u0131 \u00d6nlemek \u0130\u00e7in Kritik Yakla\u015f\u0131mlar - Inforte Bili\u015fim A.\u015e.\" \/>\n<meta property=\"og:description\" content=\"Siber sald\u0131r\u0131lar\u0131n ilk safhalar\u0131nda anla\u015f\u0131lmas\u0131 ve i\u00e7erisinde kullan\u0131lacak teknik, taktik ve prosed\u00fcrlerin (TTP) tan\u0131mlanarak ilgili aksiyonlar\u0131 \u00f6nceden tespit etmek ve g\u00fcvenlik operasyonlar\u0131 buna uygun olarak haz\u0131rlamak her organizasyon i\u00e7in elzem olan bir g\u00fcvenlik yakla\u015f\u0131m\u0131d\u0131r. Tehdit avc\u0131l\u0131\u011f\u0131 olarak tan\u0131mlanan bu y\u00f6ntemler zararl\u0131 aksiyonlar\u0131 bertaraf etmek kadar,...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inforte.com\/en\/siber-saldirilari-onlemek-icin-kritik-yaklasimlar\/\" \/>\n<meta property=\"og:site_name\" content=\"Inforte Bili\u015fim A.\u015e.\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-10T12:11:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-09-16T12:04:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inforte.com\/wp-content\/uploads\/2020\/09\/acb671a8-9738-453e-a12a-3ea43aca845d-300x200.png\" \/>\n<meta name=\"author\" content=\"Inforte\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Inforte\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.inforte.com\/siber-saldirilari-onlemek-icin-kritik-yaklasimlar\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.inforte.com\/siber-saldirilari-onlemek-icin-kritik-yaklasimlar\/\"},\"author\":{\"name\":\"Inforte\",\"@id\":\"https:\/\/www.inforte.com\/#\/schema\/person\/b0b38e387df23b9b7aa2d8448cebbeb6\"},\"headline\":\"Siber Sald\u0131r\u0131lar\u0131 \u00d6nlemek \u0130\u00e7in Kritik Yakla\u015f\u0131mlar\",\"datePublished\":\"2020-09-10T12:11:49+00:00\",\"dateModified\":\"2020-09-16T12:04:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.inforte.com\/siber-saldirilari-onlemek-icin-kritik-yaklasimlar\/\"},\"wordCount\":1082,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.inforte.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.inforte.com\/siber-saldirilari-onlemek-icin-kritik-yaklasimlar\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2020\/09\/acb671a8-9738-453e-a12a-3ea43aca845d-300x200.png\",\"keywords\":[\"CISO\",\"COVID19\",\"CYBERSECURITY\"],\"articleSection\":[\"Inforte Blog\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.inforte.com\/siber-saldirilari-onlemek-icin-kritik-yaklasimlar\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.inforte.com\/siber-saldirilari-onlemek-icin-kritik-yaklasimlar\/\",\"url\":\"https:\/\/www.inforte.com\/siber-saldirilari-onlemek-icin-kritik-yaklasimlar\/\",\"name\":\"Siber Sald\u0131r\u0131lar\u0131 \u00d6nlemek \u0130\u00e7in Kritik Yakla\u015f\u0131mlar - Inforte Bili\u015fim A.\u015e.\",\"isPartOf\":{\"@id\":\"https:\/\/www.inforte.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.inforte.com\/siber-saldirilari-onlemek-icin-kritik-yaklasimlar\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.inforte.com\/siber-saldirilari-onlemek-icin-kritik-yaklasimlar\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2020\/09\/acb671a8-9738-453e-a12a-3ea43aca845d-300x200.png\",\"datePublished\":\"2020-09-10T12:11:49+00:00\",\"dateModified\":\"2020-09-16T12:04:56+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.inforte.com\/siber-saldirilari-onlemek-icin-kritik-yaklasimlar\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.inforte.com\/siber-saldirilari-onlemek-icin-kritik-yaklasimlar\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.inforte.com\/siber-saldirilari-onlemek-icin-kritik-yaklasimlar\/#primaryimage\",\"url\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2020\/09\/acb671a8-9738-453e-a12a-3ea43aca845d-300x200.png\",\"contentUrl\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2020\/09\/acb671a8-9738-453e-a12a-3ea43aca845d-300x200.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.inforte.com\/siber-saldirilari-onlemek-icin-kritik-yaklasimlar\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Ana sayfa\",\"item\":\"https:\/\/www.inforte.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Siber Sald\u0131r\u0131lar\u0131 \u00d6nlemek \u0130\u00e7in Kritik Yakla\u015f\u0131mlar\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.inforte.com\/#website\",\"url\":\"https:\/\/www.inforte.com\/\",\"name\":\"Inforte Bili\u015fim A.\u015e.\",\"description\":\"arbor, DDOS, spectrum, visibility, availability, forescout, nac, orchestration, network control, iot security, netscout, performans monitor, packet broker, tap, services assurance, centrify, privilage, access management, password vault, idendity access management, session recording\",\"publisher\":{\"@id\":\"https:\/\/www.inforte.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.inforte.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.inforte.com\/#organization\",\"name\":\"Inforte Bili\u015fim A.\u015e.\",\"url\":\"https:\/\/www.inforte.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.inforte.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2018\/06\/logo.png\",\"contentUrl\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2018\/06\/logo.png\",\"width\":286,\"height\":180,\"caption\":\"Inforte Bili\u015fim A.\u015e.\"},\"image\":{\"@id\":\"https:\/\/www.inforte.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.inforte.com\/#\/schema\/person\/b0b38e387df23b9b7aa2d8448cebbeb6\",\"name\":\"Inforte\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.inforte.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/28531e22b7b30f1c736d4741e45027bf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/28531e22b7b30f1c736d4741e45027bf?s=96&d=mm&r=g\",\"caption\":\"Inforte\"},\"url\":\"https:\/\/www.inforte.com\/en\/author\/content\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Siber Sald\u0131r\u0131lar\u0131 \u00d6nlemek \u0130\u00e7in Kritik Yakla\u015f\u0131mlar - Inforte Bili\u015fim A.\u015e.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inforte.com\/en\/siber-saldirilari-onlemek-icin-kritik-yaklasimlar\/","og_locale":"en_GB","og_type":"article","og_title":"Siber Sald\u0131r\u0131lar\u0131 \u00d6nlemek \u0130\u00e7in Kritik Yakla\u015f\u0131mlar - Inforte Bili\u015fim A.\u015e.","og_description":"Siber sald\u0131r\u0131lar\u0131n ilk safhalar\u0131nda anla\u015f\u0131lmas\u0131 ve i\u00e7erisinde kullan\u0131lacak teknik, taktik ve prosed\u00fcrlerin (TTP) tan\u0131mlanarak ilgili aksiyonlar\u0131 \u00f6nceden tespit etmek ve g\u00fcvenlik operasyonlar\u0131 buna uygun olarak haz\u0131rlamak her organizasyon i\u00e7in elzem olan bir g\u00fcvenlik yakla\u015f\u0131m\u0131d\u0131r. Tehdit avc\u0131l\u0131\u011f\u0131 olarak tan\u0131mlanan bu y\u00f6ntemler zararl\u0131 aksiyonlar\u0131 bertaraf etmek kadar,...","og_url":"https:\/\/www.inforte.com\/en\/siber-saldirilari-onlemek-icin-kritik-yaklasimlar\/","og_site_name":"Inforte Bili\u015fim A.\u015e.","article_published_time":"2020-09-10T12:11:49+00:00","article_modified_time":"2020-09-16T12:04:56+00:00","og_image":[{"url":"https:\/\/www.inforte.com\/wp-content\/uploads\/2020\/09\/acb671a8-9738-453e-a12a-3ea43aca845d-300x200.png","type":"","width":"","height":""}],"author":"Inforte","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Inforte","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inforte.com\/siber-saldirilari-onlemek-icin-kritik-yaklasimlar\/#article","isPartOf":{"@id":"https:\/\/www.inforte.com\/siber-saldirilari-onlemek-icin-kritik-yaklasimlar\/"},"author":{"name":"Inforte","@id":"https:\/\/www.inforte.com\/#\/schema\/person\/b0b38e387df23b9b7aa2d8448cebbeb6"},"headline":"Siber Sald\u0131r\u0131lar\u0131 \u00d6nlemek \u0130\u00e7in Kritik Yakla\u015f\u0131mlar","datePublished":"2020-09-10T12:11:49+00:00","dateModified":"2020-09-16T12:04:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inforte.com\/siber-saldirilari-onlemek-icin-kritik-yaklasimlar\/"},"wordCount":1082,"commentCount":0,"publisher":{"@id":"https:\/\/www.inforte.com\/#organization"},"image":{"@id":"https:\/\/www.inforte.com\/siber-saldirilari-onlemek-icin-kritik-yaklasimlar\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inforte.com\/wp-content\/uploads\/2020\/09\/acb671a8-9738-453e-a12a-3ea43aca845d-300x200.png","keywords":["CISO","COVID19","CYBERSECURITY"],"articleSection":["Inforte Blog"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inforte.com\/siber-saldirilari-onlemek-icin-kritik-yaklasimlar\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inforte.com\/siber-saldirilari-onlemek-icin-kritik-yaklasimlar\/","url":"https:\/\/www.inforte.com\/siber-saldirilari-onlemek-icin-kritik-yaklasimlar\/","name":"Siber Sald\u0131r\u0131lar\u0131 \u00d6nlemek \u0130\u00e7in Kritik Yakla\u015f\u0131mlar - Inforte Bili\u015fim A.\u015e.","isPartOf":{"@id":"https:\/\/www.inforte.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inforte.com\/siber-saldirilari-onlemek-icin-kritik-yaklasimlar\/#primaryimage"},"image":{"@id":"https:\/\/www.inforte.com\/siber-saldirilari-onlemek-icin-kritik-yaklasimlar\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inforte.com\/wp-content\/uploads\/2020\/09\/acb671a8-9738-453e-a12a-3ea43aca845d-300x200.png","datePublished":"2020-09-10T12:11:49+00:00","dateModified":"2020-09-16T12:04:56+00:00","breadcrumb":{"@id":"https:\/\/www.inforte.com\/siber-saldirilari-onlemek-icin-kritik-yaklasimlar\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inforte.com\/siber-saldirilari-onlemek-icin-kritik-yaklasimlar\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.inforte.com\/siber-saldirilari-onlemek-icin-kritik-yaklasimlar\/#primaryimage","url":"https:\/\/www.inforte.com\/wp-content\/uploads\/2020\/09\/acb671a8-9738-453e-a12a-3ea43aca845d-300x200.png","contentUrl":"https:\/\/www.inforte.com\/wp-content\/uploads\/2020\/09\/acb671a8-9738-453e-a12a-3ea43aca845d-300x200.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.inforte.com\/siber-saldirilari-onlemek-icin-kritik-yaklasimlar\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Ana sayfa","item":"https:\/\/www.inforte.com\/"},{"@type":"ListItem","position":2,"name":"Siber Sald\u0131r\u0131lar\u0131 \u00d6nlemek \u0130\u00e7in Kritik Yakla\u015f\u0131mlar"}]},{"@type":"WebSite","@id":"https:\/\/www.inforte.com\/#website","url":"https:\/\/www.inforte.com\/","name":"Inforte Bili\u015fim A.\u015e.","description":"arbor, DDOS, spectrum, visibility, availability, forescout, nac, orchestration, network control, iot security, netscout, performans monitor, packet broker, tap, services assurance, centrify, privilage, access management, password vault, idendity access management, session recording","publisher":{"@id":"https:\/\/www.inforte.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inforte.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.inforte.com\/#organization","name":"Inforte Bili\u015fim A.\u015e.","url":"https:\/\/www.inforte.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.inforte.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.inforte.com\/wp-content\/uploads\/2018\/06\/logo.png","contentUrl":"https:\/\/www.inforte.com\/wp-content\/uploads\/2018\/06\/logo.png","width":286,"height":180,"caption":"Inforte Bili\u015fim A.\u015e."},"image":{"@id":"https:\/\/www.inforte.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.inforte.com\/#\/schema\/person\/b0b38e387df23b9b7aa2d8448cebbeb6","name":"Inforte","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.inforte.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/28531e22b7b30f1c736d4741e45027bf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/28531e22b7b30f1c736d4741e45027bf?s=96&d=mm&r=g","caption":"Inforte"},"url":"https:\/\/www.inforte.com\/en\/author\/content\/"}]}},"_links":{"self":[{"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/posts\/7552"}],"collection":[{"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/comments?post=7552"}],"version-history":[{"count":5,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/posts\/7552\/revisions"}],"predecessor-version":[{"id":7589,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/posts\/7552\/revisions\/7589"}],"wp:attachment":[{"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/media?parent=7552"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/categories?post=7552"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/tags?post=7552"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}