{"id":5810,"date":"2025-02-16T16:00:22","date_gmt":"2025-02-16T13:00:22","guid":{"rendered":"https:\/\/sunucucozumleri.com\/?p=5810"},"modified":"2025-02-16T16:00:22","modified_gmt":"2025-02-16T13:00:22","slug":"siber-saldirilar-ve-korunma-yontemleri","status":"publish","type":"post","link":"https:\/\/sunucucozumleri.com\/blog\/siber-saldirilar-ve-korunma-yontemleri\/","title":{"rendered":"Siber Sald\u0131r\u0131lar ve Korunma Y\u00f6ntemleri"},"content":{"rendered":"<p><strong>Siber sald\u0131r\u0131lar<\/strong>, g\u00fcn\u00fcm\u00fcz dijital d\u00fcnyas\u0131nda hem bireyler hem de kurulu\u015flar i\u00e7in b\u00fcy\u00fck bir tehdit olu\u015fturuyor. Hacker&#8217;lar, sistemlere s\u0131zmak, veri \u00e7almak veya hizmetleri engellemek i\u00e7in s\u00fcrekli yeni y\u00f6ntemler geli\u015ftiriyor. Peki, bu sald\u0131r\u0131lar nas\u0131l ger\u00e7ekle\u015fiyor? Ve en \u00f6nemlisi, bu sald\u0131r\u0131lardan nas\u0131l korunabiliriz? Bu makalede, hem bir hacker&#8217;\u0131n bak\u0131\u015f a\u00e7\u0131s\u0131yla siber sald\u0131r\u0131lar\u0131 inceleyece\u011fiz, hem de bir IT g\u00f6revlisine bu konuyu en basit haliyle anlataca\u011f\u0131z. Hadi ba\u015flayal\u0131m!<\/p>\n<hr \/>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Makale \u0130\u00e7eri\u011fi<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"\u0130\u00e7indekiler Tablosunu A\u00e7\/Kapat\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/sunucucozumleri.com\/blog\/siber-saldirilar-ve-korunma-yontemleri\/#1_Siber_Saldiri_Nedir_Basit_Anlatim\" >1. Siber Sald\u0131r\u0131 Nedir? (Basit Anlat\u0131m)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/sunucucozumleri.com\/blog\/siber-saldirilar-ve-korunma-yontemleri\/#2_Siber_Saldiri_Turleri_Hacker_Gozuyle\" >2. Siber Sald\u0131r\u0131 T\u00fcrleri (Hacker G\u00f6z\u00fcyle)<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/sunucucozumleri.com\/blog\/siber-saldirilar-ve-korunma-yontemleri\/#21_Phishing_Oltalama\" >2.1. Phishing (Oltalama)<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/sunucucozumleri.com\/blog\/siber-saldirilar-ve-korunma-yontemleri\/#Nasil_Yapilir\" >Nas\u0131l Yap\u0131l\u0131r?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/sunucucozumleri.com\/blog\/siber-saldirilar-ve-korunma-yontemleri\/#Korunma_Yontemleri\" >Korunma Y\u00f6ntemleri:<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/sunucucozumleri.com\/blog\/siber-saldirilar-ve-korunma-yontemleri\/#22_Malware_Zararli_Yazilim\" >2.2. Malware (Zararl\u0131 Yaz\u0131l\u0131m)<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/sunucucozumleri.com\/blog\/siber-saldirilar-ve-korunma-yontemleri\/#Nasil_Yapilir-2\" >Nas\u0131l Yap\u0131l\u0131r?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/sunucucozumleri.com\/blog\/siber-saldirilar-ve-korunma-yontemleri\/#Korunma_Yontemleri-2\" >Korunma Y\u00f6ntemleri:<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/sunucucozumleri.com\/blog\/siber-saldirilar-ve-korunma-yontemleri\/#23_DDoS_Saldirisi_Dagitilmis_Hizmet_Engelleme\" >2.3. DDoS Sald\u0131r\u0131s\u0131 (Da\u011f\u0131t\u0131lm\u0131\u015f Hizmet Engelleme)<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/sunucucozumleri.com\/blog\/siber-saldirilar-ve-korunma-yontemleri\/#Nasil_Yapilir-3\" >Nas\u0131l Yap\u0131l\u0131r?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/sunucucozumleri.com\/blog\/siber-saldirilar-ve-korunma-yontemleri\/#Korunma_Yontemleri-3\" >Korunma Y\u00f6ntemleri:<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/sunucucozumleri.com\/blog\/siber-saldirilar-ve-korunma-yontemleri\/#24_SQL_Injection\" >2.4. SQL Injection<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/sunucucozumleri.com\/blog\/siber-saldirilar-ve-korunma-yontemleri\/#Nasil_Yapilir-4\" >Nas\u0131l Yap\u0131l\u0131r?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/sunucucozumleri.com\/blog\/siber-saldirilar-ve-korunma-yontemleri\/#Korunma_Yontemleri-4\" >Korunma Y\u00f6ntemleri:<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/sunucucozumleri.com\/blog\/siber-saldirilar-ve-korunma-yontemleri\/#25_Ransomware_Fidye_Yazilimi\" >2.5. Ransomware (Fidye Yaz\u0131l\u0131m\u0131)<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/sunucucozumleri.com\/blog\/siber-saldirilar-ve-korunma-yontemleri\/#Nasil_Yapilir-5\" >Nas\u0131l Yap\u0131l\u0131r?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/sunucucozumleri.com\/blog\/siber-saldirilar-ve-korunma-yontemleri\/#Korunma_Yontemleri-5\" >Korunma Y\u00f6ntemleri:<\/a><\/li><\/ul><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/sunucucozumleri.com\/blog\/siber-saldirilar-ve-korunma-yontemleri\/#3_Siber_Saldirilardan_Korunma_Yontemleri_Detayli_ve_Teknik\" >3. Siber Sald\u0131r\u0131lardan Korunma Y\u00f6ntemleri (Detayl\u0131 ve Teknik)<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-19\" href=\"https:\/\/sunucucozumleri.com\/blog\/siber-saldirilar-ve-korunma-yontemleri\/#31_Guclu_Parola_Politikalari\" >3.1. G\u00fc\u00e7l\u00fc Parola Politikalar\u0131<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-20\" href=\"https:\/\/sunucucozumleri.com\/blog\/siber-saldirilar-ve-korunma-yontemleri\/#Ornek\" >\u00d6rnek:<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-21\" href=\"https:\/\/sunucucozumleri.com\/blog\/siber-saldirilar-ve-korunma-yontemleri\/#32_Iki_Faktorlu_Kimlik_Dogrulama_2FA\" >3.2. \u0130ki Fakt\u00f6rl\u00fc Kimlik Do\u011frulama (2FA)<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-22\" href=\"https:\/\/sunucucozumleri.com\/blog\/siber-saldirilar-ve-korunma-yontemleri\/#Ornek-2\" >\u00d6rnek:<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-23\" href=\"https:\/\/sunucucozumleri.com\/blog\/siber-saldirilar-ve-korunma-yontemleri\/#33_Ag_Guvenligi\" >3.3. A\u011f G\u00fcvenli\u011fi<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-24\" href=\"https:\/\/sunucucozumleri.com\/blog\/siber-saldirilar-ve-korunma-yontemleri\/#Ornek-3\" >\u00d6rnek:<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-25\" href=\"https:\/\/sunucucozumleri.com\/blog\/siber-saldirilar-ve-korunma-yontemleri\/#34_Veri_Sifreleme\" >3.4. Veri \u015eifreleme<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-26\" href=\"https:\/\/sunucucozumleri.com\/blog\/siber-saldirilar-ve-korunma-yontemleri\/#Ornek-4\" >\u00d6rnek:<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-27\" href=\"https:\/\/sunucucozumleri.com\/blog\/siber-saldirilar-ve-korunma-yontemleri\/#35_Duzenli_Yedekleme\" >3.5. D\u00fczenli Yedekleme<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-28\" href=\"https:\/\/sunucucozumleri.com\/blog\/siber-saldirilar-ve-korunma-yontemleri\/#Ornek-5\" >\u00d6rnek:<\/a><\/li><\/ul><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-29\" href=\"https:\/\/sunucucozumleri.com\/blog\/siber-saldirilar-ve-korunma-yontemleri\/#4_Sonuc\" >4. Sonu\u00e7<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"1_Siber_Saldiri_Nedir_Basit_Anlatim\"><\/span>1. Siber Sald\u0131r\u0131 Nedir? (Basit Anlat\u0131m)<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Siber sald\u0131r\u0131, bir <a href=\"https:\/\/sunucucozumleri.com\/blog\/bilgisayar-nasil-kullanilir\/\">bilgisayar<\/a> sistemine, a\u011fa veya cihaza yetkisiz eri\u015fim sa\u011flamak veya bu sistemleri zarara u\u011fratmak i\u00e7in yap\u0131lan her t\u00fcrl\u00fc k\u00f6t\u00fc niyetli giri\u015fimdir. \u00d6rne\u011fin, bir hacker, \u015firketinizin bilgisayarlar\u0131na girip m\u00fc\u015fteri verilerini \u00e7alabilir veya web sitenizi kullan\u0131lamaz hale getirebilir.<\/p>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"2_Siber_Saldiri_Turleri_Hacker_Gozuyle\"><\/span>2. Siber Sald\u0131r\u0131 T\u00fcrleri (Hacker G\u00f6z\u00fcyle)<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"21_Phishing_Oltalama\"><\/span>2.1. Phishing (Oltalama)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Hacker&#8217;lar, sahte e-postalar veya web siteleri kullanarak kullan\u0131c\u0131lar\u0131n ki\u015fisel bilgilerini (\u015fifreler, kredi kart\u0131 numaralar\u0131 vb.) \u00e7almaya \u00e7al\u0131\u015f\u0131r.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"Nasil_Yapilir\"><\/span>Nas\u0131l Yap\u0131l\u0131r?<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<ul>\n<li><strong>Ad\u0131m 1<\/strong>: Sahte bir e-posta haz\u0131rlan\u0131r (\u00f6rne\u011fin, bankan\u0131zdan geliyormu\u015f gibi).<\/li>\n<li><strong>Ad\u0131m 2<\/strong>: E-postada, &#8220;Hesab\u0131n\u0131z\u0131 g\u00fcncellemeniz gerekiyor&#8221; gibi bir mesaj ve bir link bulunur.<\/li>\n<li><strong>Ad\u0131m 3<\/strong>: Kullan\u0131c\u0131 linke t\u0131klar ve sahte bir web sitesine y\u00f6nlendirilir.<\/li>\n<li><strong>Ad\u0131m 4<\/strong>: Kullan\u0131c\u0131, \u015fifresini veya kredi kart\u0131 bilgilerini girer.<\/li>\n<li><strong>Ad\u0131m 5<\/strong>: Hacker, bu bilgileri ele ge\u00e7irir.<\/li>\n<\/ul>\n<h4><span class=\"ez-toc-section\" id=\"Korunma_Yontemleri\"><\/span>Korunma Y\u00f6ntemleri:<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<ul>\n<li><strong>E-postalara Dikkat Edin<\/strong>: Tan\u0131mad\u0131\u011f\u0131n\u0131z ki\u015filerden gelen e-postalara t\u0131klamay\u0131n.<\/li>\n<li><strong>Linkleri Kontrol Edin<\/strong>: Linklerin ger\u00e7ekten g\u00fcvenilir bir kaynaktan gelip gelmedi\u011fini kontrol edin.<\/li>\n<li><strong>\u0130ki Fakt\u00f6rl\u00fc Kimlik Do\u011frulama (2FA) Kullan\u0131n<\/strong>: \u015eifreniz \u00e7al\u0131nsa bile, ikinci bir g\u00fcvenlik ad\u0131m\u0131 ekleyin.<\/li>\n<\/ul>\n<hr \/>\n<h3><span class=\"ez-toc-section\" id=\"22_Malware_Zararli_Yazilim\"><\/span>2.2. Malware (Zararl\u0131 Yaz\u0131l\u0131m)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><a href=\"https:\/\/sunucucozumleri.com\/blog\/2024-linux-icin-en-iyi-6-kotu-amacli-yazilim-tarayicisi\/\">Malware<\/a>, bilgisayar\u0131n\u0131za bula\u015farak verilerinizi \u00e7alan, sisteminizi bozan veya kontrol\u00fcn\u00fcz\u00fc ele ge\u00e7iren yaz\u0131l\u0131mlard\u0131r.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"Nasil_Yapilir-2\"><\/span>Nas\u0131l Yap\u0131l\u0131r?<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<ul>\n<li><strong>Ad\u0131m 1<\/strong>: Hacker, bir zararl\u0131 yaz\u0131l\u0131m (\u00f6rne\u011fin, vir\u00fcs veya trojan) haz\u0131rlar.<\/li>\n<li><strong>Ad\u0131m 2<\/strong>: Bu yaz\u0131l\u0131m, bir e-posta eki, indirilen bir dosya veya sahte bir web sitesi arac\u0131l\u0131\u011f\u0131yla bilgisayar\u0131n\u0131za bula\u015f\u0131r.<\/li>\n<li><strong>Ad\u0131m 3<\/strong>: Yaz\u0131l\u0131m, bilgisayar\u0131n\u0131zda arka planda \u00e7al\u0131\u015fmaya ba\u015flar ve verilerinizi \u00e7alar veya sisteminizi bozar.<\/li>\n<\/ul>\n<h4><span class=\"ez-toc-section\" id=\"Korunma_Yontemleri-2\"><\/span>Korunma Y\u00f6ntemleri:<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<ul>\n<li><strong>Antivir\u00fcs Yaz\u0131l\u0131m\u0131 Kullan\u0131n<\/strong>: Bilgisayar\u0131n\u0131zda g\u00fcncel bir antivir\u00fcs yaz\u0131l\u0131m\u0131 bulundurun.<\/li>\n<li><strong>G\u00fcvenilmeyen Dosyalar\u0131 \u0130ndirmeyin<\/strong>: Tan\u0131mad\u0131\u011f\u0131n\u0131z kaynaklardan dosya indirmeyin.<\/li>\n<li><strong>Sistem G\u00fcncellemelerini Yap\u0131n<\/strong>: \u0130\u015fletim sisteminizi ve yaz\u0131l\u0131mlar\u0131n\u0131z\u0131 d\u00fczenli olarak g\u00fcncelleyin.<\/li>\n<\/ul>\n<hr \/>\n<h3><span class=\"ez-toc-section\" id=\"23_DDoS_Saldirisi_Dagitilmis_Hizmet_Engelleme\"><\/span>2.3. DDoS Sald\u0131r\u0131s\u0131 (Da\u011f\u0131t\u0131lm\u0131\u015f Hizmet Engelleme)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>DDoS sald\u0131r\u0131s\u0131, bir web sitesine veya sunucuya a\u015f\u0131r\u0131 miktarda trafik g\u00f6ndererek hizmeti engellemeyi ama\u00e7lar.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"Nasil_Yapilir-3\"><\/span>Nas\u0131l Yap\u0131l\u0131r?<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<ul>\n<li><strong>Ad\u0131m 1<\/strong>: Hacker, bir botnet (bir\u00e7ok bilgisayardan olu\u015fan a\u011f) olu\u015fturur.<\/li>\n<li><strong>Ad\u0131m 2<\/strong>: Botnet&#8217;teki bilgisayarlar, hedef sunucuya s\u00fcrekli istek g\u00f6nderir.<\/li>\n<li><strong>Ad\u0131m 3<\/strong>: <a href=\"https:\/\/sunucucozumleri.com\/blog\/frontpage\/\">Sunucu<\/a>, bu isteklere yeti\u015femez ve hizmet veremez hale gelir.<\/li>\n<\/ul>\n<h4><span class=\"ez-toc-section\" id=\"Korunma_Yontemleri-3\"><\/span>Korunma Y\u00f6ntemleri:<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<ul>\n<li><strong>DDoS Koruma Hizmeti Kullan\u0131n<\/strong>: <a href=\"https:\/\/sunucucozumleri.com\/blog\/cloudflare-rehberi\/\">Cloudflare<\/a> veya Akamai gibi hizmetler, DDoS sald\u0131r\u0131lar\u0131n\u0131 engelleyebilir.<\/li>\n<li><strong>Trafik Filtreleme<\/strong>: \u015e\u00fcpheli trafi\u011fi engellemek i\u00e7in filtreleme sistemleri kullan\u0131n.<\/li>\n<\/ul>\n<hr \/>\n<h3><span class=\"ez-toc-section\" id=\"24_SQL_Injection\"><\/span>2.4. SQL Injection<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>SQL Injection, bir web sitesinin veritaban\u0131na yetkisiz eri\u015fim sa\u011flamak i\u00e7in kullan\u0131lan bir sald\u0131r\u0131 t\u00fcr\u00fcd\u00fcr.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"Nasil_Yapilir-4\"><\/span>Nas\u0131l Yap\u0131l\u0131r?<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<ul>\n<li><strong>Ad\u0131m 1<\/strong>: Hacker, bir web formuna (\u00f6rne\u011fin, giri\u015f ekran\u0131) zararl\u0131 bir SQL kodu ekler.<\/li>\n<li><strong>Ad\u0131m 2<\/strong>: Web sitesi, bu kodu i\u015fler ve veritaban\u0131na g\u00f6nderir.<\/li>\n<li><strong>Ad\u0131m 3<\/strong>: Veritaban\u0131, bu kod nedeniyle hassas bilgileri (kullan\u0131c\u0131 adlar\u0131, \u015fifreler vb.) s\u0131zd\u0131r\u0131r.<\/li>\n<\/ul>\n<h4><span class=\"ez-toc-section\" id=\"Korunma_Yontemleri-4\"><\/span>Korunma Y\u00f6ntemleri:<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<ul>\n<li><strong>Parametreli Sorgular Kullan\u0131n<\/strong>: SQL sorgular\u0131nda kullan\u0131c\u0131 girdilerini do\u011frulay\u0131n.<\/li>\n<li><strong>Web Uygulamas\u0131 G\u00fcvenlik Duvar\u0131 (WAF)<\/strong>: WAF, SQL Injection gibi sald\u0131r\u0131lar\u0131 engelleyebilir.<\/li>\n<\/ul>\n<hr \/>\n<h3><span class=\"ez-toc-section\" id=\"25_Ransomware_Fidye_Yazilimi\"><\/span>2.5. Ransomware (Fidye Yaz\u0131l\u0131m\u0131)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Ransomware, bilgisayar\u0131n\u0131zdaki dosyalar\u0131 \u015fifreleyerek fidye talep eden bir zararl\u0131 yaz\u0131l\u0131md\u0131r.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"Nasil_Yapilir-5\"><\/span>Nas\u0131l Yap\u0131l\u0131r?<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<ul>\n<li><strong>Ad\u0131m 1<\/strong>: Hacker, bir ransomware yaz\u0131l\u0131m\u0131 haz\u0131rlar.<\/li>\n<li><strong>Ad\u0131m 2<\/strong>: Bu yaz\u0131l\u0131m, bir e-posta eki veya indirilen bir dosya arac\u0131l\u0131\u011f\u0131yla bilgisayar\u0131n\u0131za bula\u015f\u0131r.<\/li>\n<li><strong>Ad\u0131m 3<\/strong>: Yaz\u0131l\u0131m, dosyalar\u0131n\u0131z\u0131 \u015fifreler ve ekranda bir fidye mesaj\u0131 g\u00f6sterir.<\/li>\n<\/ul>\n<h4><span class=\"ez-toc-section\" id=\"Korunma_Yontemleri-5\"><\/span>Korunma Y\u00f6ntemleri:<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<ul>\n<li><strong>Yedekleme Yap\u0131n<\/strong>: Dosyalar\u0131n\u0131z\u0131 d\u00fczenli olarak yedekleyin.<\/li>\n<li><strong>G\u00fcvenlik Yaz\u0131l\u0131mlar\u0131 Kullan\u0131n<\/strong>: Antivir\u00fcs ve anti-ransomware yaz\u0131l\u0131mlar\u0131 kullan\u0131n.<\/li>\n<li><strong>E-postalara Dikkat Edin<\/strong>: \u015e\u00fcpheli e-postalar\u0131 a\u00e7may\u0131n.<\/li>\n<\/ul>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"3_Siber_Saldirilardan_Korunma_Yontemleri_Detayli_ve_Teknik\"><\/span>3. Siber Sald\u0131r\u0131lardan Korunma Y\u00f6ntemleri (Detayl\u0131 ve Teknik)<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"31_Guclu_Parola_Politikalari\"><\/span>3.1. G\u00fc\u00e7l\u00fc Parola Politikalar\u0131<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li><strong>Uzunluk<\/strong>: En az 12 karakter.<\/li>\n<li><strong>Karma\u015f\u0131kl\u0131k<\/strong>: B\u00fcy\u00fck harf, k\u00fc\u00e7\u00fck harf, rakam ve \u00f6zel karakterlerin birle\u015fimi.<\/li>\n<li><strong>De\u011fi\u015fiklik<\/strong>: Parolalar\u0131 d\u00fczenli olarak de\u011fi\u015ftirin.<\/li>\n<\/ul>\n<h4><span class=\"ez-toc-section\" id=\"Ornek\"><\/span>\u00d6rnek:<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<div class=\"md-code-block\">\n<pre><span class=\"token comment\"># Linux'ta <a href=\"https:\/\/sunucucozumleri.com\/blog\/parola-saklama-uygulamalari-ve-karsilastirmalari\/\">parola<\/a> politikalar\u0131n\u0131 yap\u0131land\u0131rma<\/span>\r\n<span class=\"token function\">sudo<\/span> <span class=\"token function\">nano<\/span> \/etc\/pam.d\/common-password\r\npassword requisite pam_pwquality.so <span class=\"token assign-left variable\">retry<\/span><span class=\"token operator\">=<\/span><span class=\"token number\">3<\/span> <span class=\"token assign-left variable\">minlen<\/span><span class=\"token operator\">=<\/span><span class=\"token number\">12<\/span> <span class=\"token assign-left variable\">dcredit<\/span><span class=\"token operator\">=<\/span>-1 <span class=\"token assign-left variable\">ucredit<\/span><span class=\"token operator\">=<\/span>-1 <span class=\"token assign-left variable\">ocredit<\/span><span class=\"token operator\">=<\/span>-1 <span class=\"token assign-left variable\">lcredit<\/span><span class=\"token operator\">=<\/span>-1<\/pre>\n<\/div>\n<hr \/>\n<h3><span class=\"ez-toc-section\" id=\"32_Iki_Faktorlu_Kimlik_Dogrulama_2FA\"><\/span>3.2. \u0130ki Fakt\u00f6rl\u00fc Kimlik Do\u011frulama (2FA)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>2FA, \u015fifrenize ek olarak ikinci bir g\u00fcvenlik ad\u0131m\u0131 ekler (\u00f6rne\u011fin, SMS kodu veya uygulama \u00fczerinden onay).<\/p>\n<h4><span class=\"ez-toc-section\" id=\"Ornek-2\"><\/span>\u00d6rnek:<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<div class=\"md-code-block\">\n<pre><span class=\"token comment\"># Google Authenticator ile 2FA yap\u0131land\u0131rma<\/span>\r\n<span class=\"token function\">sudo<\/span> <span class=\"token function\">apt<\/span> <span class=\"token function\">install<\/span> libpam-google-authenticator\r\ngoogle-authenticator<\/pre>\n<\/div>\n<hr \/>\n<h3><span class=\"ez-toc-section\" id=\"33_Ag_Guvenligi\"><\/span>3.3. A\u011f G\u00fcvenli\u011fi<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li><strong>G\u00fcvenlik Duvar\u0131 (Firewall)<\/strong>: Gelen ve giden trafi\u011fi kontrol edin.<\/li>\n<li><strong>VPN<\/strong>: \u0130nternet trafi\u011finizi \u015fifreleyin.<\/li>\n<li><strong>A\u011f Segmentasyonu<\/strong>: A\u011f\u0131n\u0131z\u0131 b\u00f6l\u00fcmlere ay\u0131rarak sald\u0131r\u0131lar\u0131n yay\u0131lmas\u0131n\u0131 engelleyin.<\/li>\n<\/ul>\n<h4><span class=\"ez-toc-section\" id=\"Ornek-3\"><\/span>\u00d6rnek:<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<div class=\"md-code-block\">\n<pre><span class=\"token comment\"># UFW (Uncomplicated Firewall) ile g\u00fcvenlik duvar\u0131 yap\u0131land\u0131rma<\/span>\r\n<span class=\"token function\">sudo<\/span> ufw allow <span class=\"token function\">ssh<\/span>\r\n<span class=\"token function\">sudo<\/span> ufw allow http\r\n<span class=\"token function\">sudo<\/span> ufw <span class=\"token builtin class-name\">enable<\/span><\/pre>\n<\/div>\n<hr \/>\n<h3><span class=\"ez-toc-section\" id=\"34_Veri_Sifreleme\"><\/span>3.4. Veri \u015eifreleme<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li><strong>Disk \u015eifreleme<\/strong>: Bilgisayar\u0131n\u0131zdaki verileri \u015fifreleyin (\u00f6rne\u011fin, BitLocker veya LUKS).<\/li>\n<li><strong>\u0130leti\u015fim \u015eifrelemesi<\/strong>: HTTPS, SSL\/TLS gibi protokoller kullan\u0131n.<\/li>\n<\/ul>\n<h4><span class=\"ez-toc-section\" id=\"Ornek-4\"><\/span>\u00d6rnek:<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<div class=\"md-code-block\">\n<pre><span class=\"token comment\"># LUKS ile disk \u015fifreleme<\/span>\r\n<span class=\"token function\">sudo<\/span> cryptsetup luksFormat \/dev\/sdX\r\n<span class=\"token function\">sudo<\/span> cryptsetup <span class=\"token function\">open<\/span> \/dev\/sdX my_encrypted_disk<\/pre>\n<\/div>\n<hr \/>\n<h3><span class=\"ez-toc-section\" id=\"35_Duzenli_Yedekleme\"><\/span>3.5. D\u00fczenli Yedekleme<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li><strong>Tam Yedekleme<\/strong>: T\u00fcm verilerinizi yedekleyin.<\/li>\n<li><strong>Art\u0131ml\u0131 Yedekleme<\/strong>: Son yedeklemeden bu yana de\u011fi\u015fen verileri yedekleyin.<\/li>\n<li><strong>Bulut Yedekleme<\/strong>: Verilerinizi bulut ortam\u0131nda yedekleyin.<\/li>\n<\/ul>\n<h4><span class=\"ez-toc-section\" id=\"Ornek-5\"><\/span>\u00d6rnek:<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<div class=\"md-code-block\">\n<pre><span class=\"token comment\"># rsync ile yedekleme<\/span>\r\n<span class=\"token function\">rsync<\/span> <span class=\"token parameter variable\">-avz<\/span> \/var\/www\/html \/backup\/<\/pre>\n<\/div>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"4_Sonuc\"><\/span>4. Sonu\u00e7<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Siber sald\u0131r\u0131lar, g\u00fcn\u00fcm\u00fczde herkes i\u00e7in b\u00fcy\u00fck bir tehdit olu\u015fturuyor. Ancak, do\u011fru \u00f6nlemler alarak bu sald\u0131r\u0131lardan korunmak m\u00fcmk\u00fcn.<\/p>\n<p style=\"text-align: justify;\"><strong>&#8220;<span style=\"background-color: #ffff99;\">Siber Sald\u0131r\u0131lar ve Korunma Y\u00f6ntemleri<\/span>&#8220;<\/strong> ile ilgili yaz\u0131m\u0131z\u0131 sosyal medyada payla\u015farak ve yorum yaparak bizlere katk\u0131da bulunabilirsiniz.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Siber sald\u0131r\u0131lar, g\u00fcn\u00fcm\u00fcz dijital d\u00fcnyas\u0131nda hem bireyler hem de kurulu\u015flar i\u00e7in b\u00fcy\u00fck bir tehdit olu\u015fturuyor. Hacker&#8217;lar, sistemlere s\u0131zmak, veri \u00e7almak veya hizmetleri engellemek i\u00e7in s\u00fcrekli yeni y\u00f6ntemler geli\u015ftiriyor. Peki, bu sald\u0131r\u0131lar nas\u0131l ger\u00e7ekle\u015fiyor? Ve en \u00f6nemlisi, bu sald\u0131r\u0131lardan nas\u0131l korunabiliriz? Bu makalede, hem bir hacker&#8217;\u0131n bak\u0131\u015f a\u00e7\u0131s\u0131yla siber sald\u0131r\u0131lar\u0131 inceleyece\u011fiz, hem de bir IT g\u00f6revlisine &hellip;<\/p>\n","protected":false},"author":4,"featured_media":8938,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[232],"tags":[],"class_list":["post-5810","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"_links":{"self":[{"href":"https:\/\/sunucucozumleri.com\/blog\/wp-json\/wp\/v2\/posts\/5810","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sunucucozumleri.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sunucucozumleri.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sunucucozumleri.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/sunucucozumleri.com\/blog\/wp-json\/wp\/v2\/comments?post=5810"}],"version-history":[{"count":0,"href":"https:\/\/sunucucozumleri.com\/blog\/wp-json\/wp\/v2\/posts\/5810\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sunucucozumleri.com\/blog\/wp-json\/wp\/v2\/media\/8938"}],"wp:attachment":[{"href":"https:\/\/sunucucozumleri.com\/blog\/wp-json\/wp\/v2\/media?parent=5810"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sunucucozumleri.com\/blog\/wp-json\/wp\/v2\/categories?post=5810"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sunucucozumleri.com\/blog\/wp-json\/wp\/v2\/tags?post=5810"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}