{"id":5795,"date":"2025-02-19T21:17:30","date_gmt":"2025-02-19T18:17:30","guid":{"rendered":"https:\/\/sunucucozumleri.com\/?p=5795"},"modified":"2025-02-19T21:17:30","modified_gmt":"2025-02-19T18:17:30","slug":"ag-guvenligi-ve-koruma-stratejileri","status":"publish","type":"post","link":"https:\/\/sunucucozumleri.com\/blog\/ag-guvenligi-ve-koruma-stratejileri\/","title":{"rendered":"A\u011f G\u00fcvenli\u011fi ve Koruma Stratejileri"},"content":{"rendered":"<p><strong>A\u011f g\u00fcvenli\u011fi<\/strong>, modern i\u015fletmelerin ve kurulu\u015flar\u0131n dijital altyap\u0131lar\u0131n\u0131n temel ta\u015f\u0131d\u0131r. Veri merkezleri, sunucular ve a\u011f cihazlar\u0131, kritik verilerin depoland\u0131\u011f\u0131 ve i\u015flemlerin ger\u00e7ekle\u015ftirildi\u011fi merkezi bir rol oynar. Bu nedenle, bu sistemlerin g\u00fcvenli\u011fi, hem i\u015f s\u00fcreklili\u011fi hem de veri b\u00fct\u00fcnl\u00fc\u011f\u00fc a\u00e7\u0131s\u0131ndan kritik \u00f6neme sahiptir. Bu makalede, a\u011f g\u00fcvenli\u011finin temel prensiplerini, veri merkezleri ve sunucular i\u00e7in koruma stratejilerini detayl\u0131 ve teknik bir \u015fekilde inceleyece\u011fiz.<\/p>\n<hr \/>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Makale \u0130\u00e7eri\u011fi<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"\u0130\u00e7indekiler Tablosunu A\u00e7\/Kapat\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/sunucucozumleri.com\/blog\/ag-guvenligi-ve-koruma-stratejileri\/#1_Ag_Guvenligi_Nedir\" >1. A\u011f G\u00fcvenli\u011fi Nedir?<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/sunucucozumleri.com\/blog\/ag-guvenligi-ve-koruma-stratejileri\/#11_Tanim\" >1.1. Tan\u0131m<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/sunucucozumleri.com\/blog\/ag-guvenligi-ve-koruma-stratejileri\/#12_Ag_Guvenliginin_Onemi\" >1.2. A\u011f G\u00fcvenli\u011finin \u00d6nemi<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/sunucucozumleri.com\/blog\/ag-guvenligi-ve-koruma-stratejileri\/#2_Ag_Guvenligi_Tehditleri\" >2. A\u011f G\u00fcvenli\u011fi Tehditleri<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/sunucucozumleri.com\/blog\/ag-guvenligi-ve-koruma-stratejileri\/#21_Siber_Saldirilar\" >2.1. Siber Sald\u0131r\u0131lar<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/sunucucozumleri.com\/blog\/ag-guvenligi-ve-koruma-stratejileri\/#22_Ic_Tehditler\" >2.2. \u0130\u00e7 Tehditler<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/sunucucozumleri.com\/blog\/ag-guvenligi-ve-koruma-stratejileri\/#23_Fiziksel_Tehditler\" >2.3. Fiziksel Tehditler<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/sunucucozumleri.com\/blog\/ag-guvenligi-ve-koruma-stratejileri\/#3_Veri_Merkezi_ve_Sunucu_Guvenligi\" >3. Veri Merkezi ve Sunucu G\u00fcvenli\u011fi<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/sunucucozumleri.com\/blog\/ag-guvenligi-ve-koruma-stratejileri\/#31_Fiziksel_Guvenlik\" >3.1. Fiziksel G\u00fcvenlik<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/sunucucozumleri.com\/blog\/ag-guvenligi-ve-koruma-stratejileri\/#Fiziksel_Guvenlik_Onlemleri\" >Fiziksel G\u00fcvenlik \u00d6nlemleri:<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/sunucucozumleri.com\/blog\/ag-guvenligi-ve-koruma-stratejileri\/#32_Ag_Guvenligi\" >3.2. A\u011f G\u00fcvenli\u011fi<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/sunucucozumleri.com\/blog\/ag-guvenligi-ve-koruma-stratejileri\/#Ag_Guvenligi_Onlemleri\" >A\u011f G\u00fcvenli\u011fi \u00d6nlemleri:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/sunucucozumleri.com\/blog\/ag-guvenligi-ve-koruma-stratejileri\/#Ornek\" >\u00d6rnek:<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/sunucucozumleri.com\/blog\/ag-guvenligi-ve-koruma-stratejileri\/#33_Veri_Sifreleme\" >3.3. Veri \u015eifreleme<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/sunucucozumleri.com\/blog\/ag-guvenligi-ve-koruma-stratejileri\/#Sifreleme_Yontemleri\" >\u015eifreleme Y\u00f6ntemleri:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/sunucucozumleri.com\/blog\/ag-guvenligi-ve-koruma-stratejileri\/#Ornek-2\" >\u00d6rnek:<\/a><\/li><\/ul><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/sunucucozumleri.com\/blog\/ag-guvenligi-ve-koruma-stratejileri\/#4_Ag_Guvenligi_Stratejileri\" >4. A\u011f G\u00fcvenli\u011fi Stratejileri<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/sunucucozumleri.com\/blog\/ag-guvenligi-ve-koruma-stratejileri\/#41_Guclu_Parola_Politikalari\" >4.1. G\u00fc\u00e7l\u00fc Parola Politikalar\u0131<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-19\" href=\"https:\/\/sunucucozumleri.com\/blog\/ag-guvenligi-ve-koruma-stratejileri\/#Ornek-3\" >\u00d6rnek:<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-20\" href=\"https:\/\/sunucucozumleri.com\/blog\/ag-guvenligi-ve-koruma-stratejileri\/#42_Iki_Faktorlu_Kimlik_Dogrulama_2FA\" >4.2. \u0130ki Fakt\u00f6rl\u00fc Kimlik Do\u011frulama (2FA)<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-21\" href=\"https:\/\/sunucucozumleri.com\/blog\/ag-guvenligi-ve-koruma-stratejileri\/#Ornek-4\" >\u00d6rnek:<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-22\" href=\"https:\/\/sunucucozumleri.com\/blog\/ag-guvenligi-ve-koruma-stratejileri\/#43_Duzenli_Yedekleme\" >4.3. D\u00fczenli Yedekleme<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-23\" href=\"https:\/\/sunucucozumleri.com\/blog\/ag-guvenligi-ve-koruma-stratejileri\/#Ornek-5\" >\u00d6rnek:<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-24\" href=\"https:\/\/sunucucozumleri.com\/blog\/ag-guvenligi-ve-koruma-stratejileri\/#44_Guncelleme_ve_Yama_Yonetimi\" >4.4. G\u00fcncelleme ve Yama Y\u00f6netimi<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-25\" href=\"https:\/\/sunucucozumleri.com\/blog\/ag-guvenligi-ve-koruma-stratejileri\/#Ornek-6\" >\u00d6rnek:<\/a><\/li><\/ul><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-26\" href=\"https:\/\/sunucucozumleri.com\/blog\/ag-guvenligi-ve-koruma-stratejileri\/#5_Ileri_Duzey_Ag_Guvenligi_Onlemleri\" >5. \u0130leri D\u00fczey A\u011f G\u00fcvenli\u011fi \u00d6nlemleri<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-27\" href=\"https:\/\/sunucucozumleri.com\/blog\/ag-guvenligi-ve-koruma-stratejileri\/#51_IDSIPS_Intrusion_DetectionPrevention_Systems\" >5.1. IDS\/IPS (Intrusion Detection\/Prevention Systems)<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-28\" href=\"https:\/\/sunucucozumleri.com\/blog\/ag-guvenligi-ve-koruma-stratejileri\/#Ornek-7\" >\u00d6rnek:<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-29\" href=\"https:\/\/sunucucozumleri.com\/blog\/ag-guvenligi-ve-koruma-stratejileri\/#52_SIEM_Security_Information_and_Event_Management\" >5.2. SIEM (Security Information and Event Management)<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-30\" href=\"https:\/\/sunucucozumleri.com\/blog\/ag-guvenligi-ve-koruma-stratejileri\/#Ornek-8\" >\u00d6rnek:<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-31\" href=\"https:\/\/sunucucozumleri.com\/blog\/ag-guvenligi-ve-koruma-stratejileri\/#53_Zero_Trust_Architecture_Sifir_Guven_Mimarisi\" >5.3. Zero Trust Architecture (S\u0131f\u0131r G\u00fcven Mimarisi)<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-32\" href=\"https:\/\/sunucucozumleri.com\/blog\/ag-guvenligi-ve-koruma-stratejileri\/#Ornek-9\" >\u00d6rnek:<\/a><\/li><\/ul><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-33\" href=\"https:\/\/sunucucozumleri.com\/blog\/ag-guvenligi-ve-koruma-stratejileri\/#6_Sonuc\" >6. Sonu\u00e7<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"1_Ag_Guvenligi_Nedir\"><\/span>1. A\u011f G\u00fcvenli\u011fi Nedir?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"11_Tanim\"><\/span>1.1. Tan\u0131m<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A\u011f g\u00fcvenli\u011fi, bir a\u011fdaki verilerin, sistemlerin ve kaynaklar\u0131n yetkisiz eri\u015fim, k\u00f6t\u00fc niyetli sald\u0131r\u0131lar ve di\u011fer tehditlere kar\u015f\u0131 korunmas\u0131n\u0131 sa\u011flamak i\u00e7in uygulanan \u00f6nlemler ve stratejilerdir.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"12_Ag_Guvenliginin_Onemi\"><\/span>1.2. A\u011f G\u00fcvenli\u011finin \u00d6nemi<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li><strong>Veri B\u00fct\u00fcnl\u00fc\u011f\u00fc<\/strong>: Hassas verilerin korunmas\u0131n\u0131 sa\u011flar.<\/li>\n<li><strong>\u0130\u015f S\u00fcreklili\u011fi<\/strong>: A\u011f kesintilerini ve hizmet kay\u0131plar\u0131n\u0131 \u00f6nler.<\/li>\n<li><strong>Yasal Uyumluluk<\/strong>: Veri koruma yasalar\u0131na uyum sa\u011flar.<\/li>\n<\/ul>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"2_Ag_Guvenligi_Tehditleri\"><\/span>2. A\u011f G\u00fcvenli\u011fi Tehditleri<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"21_Siber_Saldirilar\"><\/span>2.1. Siber Sald\u0131r\u0131lar<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li><strong>DDoS Sald\u0131r\u0131lar\u0131<\/strong>: A\u011f trafi\u011fini a\u015f\u0131r\u0131 y\u00fckleyerek hizmeti engelleme.<\/li>\n<li><strong><a href=\"https:\/\/sunucucozumleri.com\/blog\/2024-linux-icin-en-iyi-6-kotu-amacli-yazilim-tarayicisi\/\">Malware<\/a><\/strong>: Zararl\u0131 yaz\u0131l\u0131mlar arac\u0131l\u0131\u011f\u0131yla sistemlere s\u0131zma.<\/li>\n<li><strong>Phishing<\/strong>: Sahte e-postalar ve web siteleri arac\u0131l\u0131\u011f\u0131yla bilgi \u00e7alma.<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"22_Ic_Tehditler\"><\/span>2.2. \u0130\u00e7 Tehditler<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li><strong>Yetkisiz Eri\u015fim<\/strong>: \u00c7al\u0131\u015fanlar\u0131n yetkilerini k\u00f6t\u00fcye kullanmas\u0131.<\/li>\n<li><strong>\u0130nsan Hatalar\u0131<\/strong>: Yanl\u0131\u015f yap\u0131land\u0131rma veya kazara veri s\u0131z\u0131nt\u0131s\u0131.<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"23_Fiziksel_Tehditler\"><\/span>2.3. Fiziksel Tehditler<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li><strong>Donan\u0131m Ar\u0131zalar\u0131<\/strong>: <a href=\"https:\/\/sunucucozumleri.com\/blog\/frontpage\/\">Sunucu<\/a> veya a\u011f cihazlar\u0131n\u0131n ar\u0131zalanmas\u0131.<\/li>\n<li><strong>Do\u011fal Afetler<\/strong>: Yang\u0131n, sel veya deprem gibi afetler.<\/li>\n<\/ul>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"3_Veri_Merkezi_ve_Sunucu_Guvenligi\"><\/span>3. Veri Merkezi ve Sunucu G\u00fcvenli\u011fi<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"31_Fiziksel_Guvenlik\"><\/span>3.1. Fiziksel G\u00fcvenlik<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Veri merkezleri ve sunucular, fiziksel g\u00fcvenlik \u00f6nlemleriyle korunmal\u0131d\u0131r.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"Fiziksel_Guvenlik_Onlemleri\"><\/span>Fiziksel G\u00fcvenlik \u00d6nlemleri:<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<ul>\n<li><strong>Eri\u015fim Kontrol\u00fc<\/strong>: Sadece yetkili personelin veri merkezine eri\u015fimine izin verin.<\/li>\n<li><strong>G\u00fcvenlik Kameralar\u0131<\/strong>: Veri merkezini 7\/24 izleyin.<\/li>\n<li><strong>Yang\u0131n S\u00f6nd\u00fcrme Sistemleri<\/strong>: Yang\u0131n alg\u0131lama ve s\u00f6nd\u00fcrme sistemleri kullan\u0131n.<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"32_Ag_Guvenligi\"><\/span>3.2. A\u011f G\u00fcvenli\u011fi<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A\u011f g\u00fcvenli\u011fi, veri merkezleri ve sunucular i\u00e7in kritik \u00f6neme sahiptir.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"Ag_Guvenligi_Onlemleri\"><\/span>A\u011f G\u00fcvenli\u011fi \u00d6nlemleri:<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<ul>\n<li><strong>G\u00fcvenlik Duvar\u0131 (Firewall)<\/strong>: Gelen ve giden trafi\u011fi kontrol edin.<\/li>\n<li><strong>VPN (Virtual Private Network)<\/strong>: \u0130nternet trafi\u011finizi \u015fifreleyin.<\/li>\n<li><strong>A\u011f Segmentasyonu<\/strong>: A\u011f\u0131n\u0131z\u0131 b\u00f6l\u00fcmlere ay\u0131rarak sald\u0131r\u0131lar\u0131n yay\u0131lmas\u0131n\u0131 engelleyin.<\/li>\n<\/ul>\n<h4><span class=\"ez-toc-section\" id=\"Ornek\"><\/span>\u00d6rnek:<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<div class=\"md-code-block\">\n<pre><span class=\"token comment\"># UFW (Uncomplicated Firewall) ile g\u00fcvenlik duvar\u0131 yap\u0131land\u0131rma<\/span>\r\n<span class=\"token function\">sudo<\/span> ufw allow <span class=\"token function\">ssh<\/span>\r\n<span class=\"token function\">sudo<\/span> ufw allow http\r\n<span class=\"token function\">sudo<\/span> ufw <span class=\"token builtin class-name\">enable<\/span><\/pre>\n<\/div>\n<h3><span class=\"ez-toc-section\" id=\"33_Veri_Sifreleme\"><\/span>3.3. Veri \u015eifreleme<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Veri \u015fifreleme, veri merkezleri ve sunuculardaki hassas bilgileri korur.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"Sifreleme_Yontemleri\"><\/span>\u015eifreleme Y\u00f6ntemleri:<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<ul>\n<li><strong>Disk \u015eifreleme<\/strong>: Bilgisayar\u0131n\u0131zdaki verileri \u015fifreleyin (\u00f6rne\u011fin, BitLocker veya LUKS).<\/li>\n<li><strong>\u0130leti\u015fim \u015eifrelemesi<\/strong>: HTTPS, SSL\/TLS gibi protokoller kullan\u0131n.<\/li>\n<\/ul>\n<h4><span class=\"ez-toc-section\" id=\"Ornek-2\"><\/span>\u00d6rnek:<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<div class=\"md-code-block\">\n<pre><span class=\"token comment\"># LUKS ile disk \u015fifreleme<\/span>\r\n<span class=\"token function\">sudo<\/span> cryptsetup luksFormat \/dev\/sdX\r\n<span class=\"token function\">sudo<\/span> cryptsetup <span class=\"token function\">open<\/span> \/dev\/sdX my_encrypted_disk<\/pre>\n<\/div>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"4_Ag_Guvenligi_Stratejileri\"><\/span>4. A\u011f G\u00fcvenli\u011fi Stratejileri<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"41_Guclu_Parola_Politikalari\"><\/span>4.1. G\u00fc\u00e7l\u00fc Parola Politikalar\u0131<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li><strong>Uzunluk<\/strong>: En az 12 karakter.<\/li>\n<li><strong>Karma\u015f\u0131kl\u0131k<\/strong>: B\u00fcy\u00fck harf, k\u00fc\u00e7\u00fck harf, rakam ve \u00f6zel karakterlerin birle\u015fimi.<\/li>\n<li><strong>De\u011fi\u015fiklik<\/strong>: Parolalar\u0131 d\u00fczenli olarak de\u011fi\u015ftirin.<\/li>\n<\/ul>\n<h4><span class=\"ez-toc-section\" id=\"Ornek-3\"><\/span>\u00d6rnek:<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<div class=\"md-code-block\">\n<pre><span class=\"token comment\"># Linux'ta <a href=\"https:\/\/sunucucozumleri.com\/blog\/parola-saklama-uygulamalari-ve-karsilastirmalari\/\">parola<\/a> politikalar\u0131n\u0131 yap\u0131land\u0131rma<\/span>\r\n<span class=\"token function\">sudo<\/span> <span class=\"token function\">nano<\/span> \/etc\/pam.d\/common-password\r\npassword requisite pam_pwquality.so <span class=\"token assign-left variable\">retry<\/span><span class=\"token operator\">=<\/span><span class=\"token number\">3<\/span> <span class=\"token assign-left variable\">minlen<\/span><span class=\"token operator\">=<\/span><span class=\"token number\">12<\/span> <span class=\"token assign-left variable\">dcredit<\/span><span class=\"token operator\">=<\/span>-1 <span class=\"token assign-left variable\">ucredit<\/span><span class=\"token operator\">=<\/span>-1 <span class=\"token assign-left variable\">ocredit<\/span><span class=\"token operator\">=<\/span>-1 <span class=\"token assign-left variable\">lcredit<\/span><span class=\"token operator\">=<\/span>-1<\/pre>\n<\/div>\n<h3><span class=\"ez-toc-section\" id=\"42_Iki_Faktorlu_Kimlik_Dogrulama_2FA\"><\/span>4.2. \u0130ki Fakt\u00f6rl\u00fc Kimlik Do\u011frulama (2FA)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>2FA, \u015fifrenize ek olarak ikinci bir g\u00fcvenlik ad\u0131m\u0131 ekler (\u00f6rne\u011fin, SMS kodu veya uygulama \u00fczerinden onay).<\/p>\n<h4><span class=\"ez-toc-section\" id=\"Ornek-4\"><\/span>\u00d6rnek:<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<div class=\"md-code-block\">\n<pre><span class=\"token comment\"># Google Authenticator ile 2FA yap\u0131land\u0131rma<\/span>\r\n<span class=\"token function\">sudo<\/span> <span class=\"token function\">apt<\/span> <span class=\"token function\">install<\/span> libpam-google-authenticator\r\ngoogle-authenticator<\/pre>\n<\/div>\n<h3><span class=\"ez-toc-section\" id=\"43_Duzenli_Yedekleme\"><\/span>4.3. D\u00fczenli Yedekleme<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li><strong>Tam Yedekleme<\/strong>: T\u00fcm verilerinizi yedekleyin.<\/li>\n<li><strong>Art\u0131ml\u0131 Yedekleme<\/strong>: Son yedeklemeden bu yana de\u011fi\u015fen verileri yedekleyin.<\/li>\n<li><strong>Bulut Yedekleme<\/strong>: Verilerinizi bulut ortam\u0131nda yedekleyin.<\/li>\n<\/ul>\n<h4><span class=\"ez-toc-section\" id=\"Ornek-5\"><\/span>\u00d6rnek:<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<div class=\"md-code-block\">\n<pre><span class=\"token comment\"># rsync ile yedekleme<\/span>\r\n<span class=\"token function\">rsync<\/span> <span class=\"token parameter variable\">-avz<\/span> \/var\/www\/html \/backup\/<\/pre>\n<\/div>\n<h3><span class=\"ez-toc-section\" id=\"44_Guncelleme_ve_Yama_Yonetimi\"><\/span>4.4. G\u00fcncelleme ve Yama Y\u00f6netimi<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li><strong>\u0130\u015fletim Sistemi G\u00fcncellemeleri<\/strong>: Sunucular\u0131n\u0131z\u0131n i\u015fletim sistemini d\u00fczenli olarak g\u00fcncelleyin.<\/li>\n<li><strong>Yaz\u0131l\u0131m G\u00fcncellemeleri<\/strong>: Kullan\u0131lan yaz\u0131l\u0131mlar\u0131n g\u00fcncel s\u00fcr\u00fcmlerini kullan\u0131n.<\/li>\n<\/ul>\n<h4><span class=\"ez-toc-section\" id=\"Ornek-6\"><\/span>\u00d6rnek:<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<div class=\"md-code-block\">\n<pre><span class=\"token comment\"># Ubuntu'da g\u00fcncellemeleri otomatik olarak y\u00fckleme<\/span>\r\n<span class=\"token function\">sudo<\/span> <span class=\"token function\">apt<\/span> <span class=\"token function\">install<\/span> unattended-upgrades\r\n<span class=\"token function\">sudo<\/span> dpkg-reconfigure <span class=\"token parameter variable\">--priority<\/span><span class=\"token operator\">=<\/span>low unattended-upgrades<\/pre>\n<\/div>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"5_Ileri_Duzey_Ag_Guvenligi_Onlemleri\"><\/span>5. \u0130leri D\u00fczey A\u011f G\u00fcvenli\u011fi \u00d6nlemleri<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"51_IDSIPS_Intrusion_DetectionPrevention_Systems\"><\/span>5.1. IDS\/IPS (Intrusion Detection\/Prevention Systems)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>IDS\/IPS sistemleri, a\u011f trafi\u011fini izleyerek olas\u0131 sald\u0131r\u0131lar\u0131 tespit eder ve engeller.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"Ornek-7\"><\/span>\u00d6rnek:<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<div class=\"md-code-block\">\n<pre><span class=\"token comment\"># Snort IDS\/IPS kurulumu<\/span>\r\n<span class=\"token function\">sudo<\/span> <span class=\"token function\">apt<\/span> <span class=\"token function\">install<\/span> snort\r\n<span class=\"token function\">sudo<\/span> snort <span class=\"token parameter variable\">-A<\/span> console <span class=\"token parameter variable\">-q<\/span> <span class=\"token parameter variable\">-u<\/span> snort <span class=\"token parameter variable\">-g<\/span> snort <span class=\"token parameter variable\">-c<\/span> \/etc\/snort\/snort.conf <span class=\"token parameter variable\">-i<\/span> eth0<\/pre>\n<\/div>\n<h3><span class=\"ez-toc-section\" id=\"52_SIEM_Security_Information_and_Event_Management\"><\/span>5.2. SIEM (Security Information and Event Management)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>SIEM sistemleri, g\u00fcvenlik olaylar\u0131n\u0131 toplar, analiz eder ve raporlar.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"Ornek-8\"><\/span>\u00d6rnek:<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<div class=\"md-code-block\">\n<pre><span class=\"token comment\"># ELK Stack (<a href=\"https:\/\/sunucucozumleri.com\/blog\/linux-almalinux-elasticsearch-kurulumu\/\">Elasticsearch<\/a>, Logstash, Kibana) kurulumu<\/span>\r\n<span class=\"token function\">sudo<\/span> <span class=\"token function\">apt<\/span> <span class=\"token function\">install<\/span> elasticsearch logstash kibana\r\n<span class=\"token function\">sudo<\/span> systemctl start elasticsearch\r\n<span class=\"token function\">sudo<\/span> systemctl start logstash\r\n<span class=\"token function\">sudo<\/span> systemctl start kibana<\/pre>\n<\/div>\n<h3><span class=\"ez-toc-section\" id=\"53_Zero_Trust_Architecture_Sifir_Guven_Mimarisi\"><\/span>5.3. Zero Trust Architecture (S\u0131f\u0131r G\u00fcven Mimarisi)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Zero Trust, her kullan\u0131c\u0131 ve cihaz\u0131n g\u00fcvenilir olmad\u0131\u011f\u0131 varsay\u0131m\u0131yla \u00e7al\u0131\u015f\u0131r. Her eri\u015fim iste\u011fi ayr\u0131 ayr\u0131 do\u011frulan\u0131r.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"Ornek-9\"><\/span>\u00d6rnek:<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<div class=\"md-code-block\">\n<pre><span class=\"token comment\"># Zero Trust i\u00e7in mikro-segmentasyon<\/span>\r\n<span class=\"token function\">sudo<\/span> iptables <span class=\"token parameter variable\">-A<\/span> INPUT <span class=\"token parameter variable\">-p<\/span> tcp <span class=\"token parameter variable\">--dport<\/span> <span class=\"token number\">22<\/span> <span class=\"token parameter variable\">-j<\/span> ACCEPT\r\n<span class=\"token function\">sudo<\/span> iptables <span class=\"token parameter variable\">-A<\/span> INPUT <span class=\"token parameter variable\">-j<\/span> DROP<\/pre>\n<\/div>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"6_Sonuc\"><\/span>6. Sonu\u00e7<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>A\u011f g\u00fcvenli\u011fi, veri merkezleri ve sunucular i\u00e7in kritik \u00f6neme sahiptir. Fiziksel g\u00fcvenlik, a\u011f g\u00fcvenli\u011fi, veri \u015fifreleme, g\u00fc\u00e7l\u00fc parola politikalar\u0131, iki fakt\u00f6rl\u00fc kimlik do\u011frulama, d\u00fczenli yedekleme ve g\u00fcncelleme y\u00f6netimi gibi \u00f6nlemler, a\u011f g\u00fcvenli\u011fini sa\u011flamak i\u00e7in temel stratejilerdir. \u0130leri d\u00fczey \u00f6nlemler olarak IDS\/IPS, SIEM ve Zero Trust mimarisi gibi teknolojiler de kullan\u0131labilir.<\/p>\n<p style=\"text-align: justify;\"><strong>&#8220;<span style=\"background-color: #ffff99;\">A\u011f G\u00fcvenli\u011fi ve Koruma Stratejileri<\/span>&#8220;<\/strong> ile ilgili yaz\u0131m\u0131z\u0131 sosyal medyada payla\u015farak ve yorum yaparak bizlere katk\u0131da bulunabilirsiniz.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A\u011f g\u00fcvenli\u011fi, modern i\u015fletmelerin ve kurulu\u015flar\u0131n dijital altyap\u0131lar\u0131n\u0131n temel ta\u015f\u0131d\u0131r. Veri merkezleri, sunucular ve a\u011f cihazlar\u0131, kritik verilerin depoland\u0131\u011f\u0131 ve i\u015flemlerin ger\u00e7ekle\u015ftirildi\u011fi merkezi bir rol oynar. Bu nedenle, bu sistemlerin g\u00fcvenli\u011fi, hem i\u015f s\u00fcreklili\u011fi hem de veri b\u00fct\u00fcnl\u00fc\u011f\u00fc a\u00e7\u0131s\u0131ndan kritik \u00f6neme sahiptir. Bu makalede, a\u011f g\u00fcvenli\u011finin temel prensiplerini, veri merkezleri ve sunucular i\u00e7in koruma stratejilerini &hellip;<\/p>\n","protected":false},"author":4,"featured_media":8945,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[37],"tags":[],"class_list":["post-5795","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-network"],"acf":[],"_links":{"self":[{"href":"https:\/\/sunucucozumleri.com\/blog\/wp-json\/wp\/v2\/posts\/5795","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sunucucozumleri.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sunucucozumleri.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sunucucozumleri.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/sunucucozumleri.com\/blog\/wp-json\/wp\/v2\/comments?post=5795"}],"version-history":[{"count":0,"href":"https:\/\/sunucucozumleri.com\/blog\/wp-json\/wp\/v2\/posts\/5795\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sunucucozumleri.com\/blog\/wp-json\/wp\/v2\/media\/8945"}],"wp:attachment":[{"href":"https:\/\/sunucucozumleri.com\/blog\/wp-json\/wp\/v2\/media?parent=5795"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sunucucozumleri.com\/blog\/wp-json\/wp\/v2\/categories?post=5795"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sunucucozumleri.com\/blog\/wp-json\/wp\/v2\/tags?post=5795"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}