{"id":10136,"date":"2021-10-08T15:38:12","date_gmt":"2021-10-08T12:38:12","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=10136"},"modified":"2022-05-05T14:25:15","modified_gmt":"2022-05-05T11:25:15","slug":"top-5-challenges-security-economics","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/top-5-challenges-security-economics\/10136\/","title":{"rendered":"Bilgi g\u00fcvenli\u011findeki en \u00f6nemli 5 zorluk"},"content":{"rendered":"<p>Hi\u00e7bir \u015firket t\u00fcm karma\u015f\u0131k sald\u0131r\u0131lara haz\u0131rl\u0131kl\u0131 de\u011fildir. \u00d6rne\u011fin her \u015firket, s\u0131f\u0131r g\u00fcn g\u00fcvenlik a\u00e7\u0131klar\u0131 veya standart olmayan, karma\u015f\u0131k ara\u00e7lar ile ger\u00e7ekle\u015ftirilen bir sabotaj giri\u015fimiyle kar\u015f\u0131 kar\u015f\u0131ya kalabilir. Geli\u015fmi\u015f bir sald\u0131r\u0131y\u0131 ba\u015far\u0131l\u0131 bir \u015fekilde p\u00fcsk\u00fcrtmek ve olumsuz sonu\u00e7lar\u0131 en aza indirmek i\u00e7in bug\u00fcnden, siber g\u00fcvenlik ekibinizin ileride kar\u015f\u0131la\u015fabilece\u011fi zorluklara haz\u0131r olmal\u0131s\u0131n\u0131z.<\/p>\n<p>Ger\u00e7ekle\u015ftirilecek bir sald\u0131r\u0131y\u0131 \u00f6nceden tahmin etmek elbette imkans\u0131zd\u0131r, bu nedenle \u00e7al\u0131\u015fma arkada\u015flar\u0131m\u0131z, <a href=\"https:\/\/calculator.kaspersky.com\/\" target=\"_blank\" rel=\"noopener nofollow\">BT G\u00fcvenli\u011fi Ekonomisi 2021 raporumuz<\/a> i\u00e7in \u00e7e\u015fitli \u015firketlerin temsilcileriyle g\u00f6r\u00fc\u015fmeye ve di\u011fer \u015firketlerin deneyimlerini incelemeye karar verdiler. Ankete kat\u0131lanlar\u0131n ortak noktas\u0131, hepsinin \u00f6ncesinde karma\u015f\u0131k siber olaylar ya\u015fam\u0131\u015f olmas\u0131.<\/p>\n<p>\u0130\u015fte kat\u0131l\u0131mc\u0131lar\u0131n ankette belirti\u011fi ilk 5 endi\u015fe:<\/p>\n<h2>1. Yetersiz altyap\u0131 g\u00f6r\u00fcn\u00fcrl\u00fc\u011f\u00fc<\/h2>\n<p>Mant\u0131ken, altyap\u0131ya ili\u015fkin tam g\u00f6r\u00fcn\u00fcrl\u00fc\u011fe sahip olmadan tehdit arama ve ortadan kald\u0131rma neredeyse imkans\u0131zd\u0131r. Olduk\u00e7a karma\u015f\u0131k olaylar bile siber savunmac\u0131lar taraf\u0131ndan uzun bir s\u00fcre fark edilmeyebilir. Ayr\u0131ca, tam olarak anlamadan tepki vermek, durumun daha da k\u00f6t\u00fcle\u015fmesine neden olabilir.<\/p>\n<p><strong>Buna kar\u015f\u0131 al\u0131nacak \u00f6nlemler. <\/strong>Konu altyap\u0131 \u00fczerinde g\u00f6r\u00fcn\u00fcrl\u00fck sa\u011flama oldu\u011funda, <a href=\"https:\/\/www.kaspersky.com.tr\/enterprise-security\/endpoint-detection-response-edr?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">Endpoint Detection and Response<\/a>-s\u0131n\u0131f\u0131 \u00e7\u00f6z\u00fcmler kullanma konusunu de\u011ferlendirin.<\/p>\n<h2>2. Koordinasyon eksikli\u011fi<\/h2>\n<p>Koordine olmadan harekete ge\u00e7en farkl\u0131 ekipler, hasar\u0131n artmas\u0131na ve incelemenin karma\u015f\u0131kla\u015fmas\u0131na neden olabilir. Ayr\u0131ca istemeden de olsa ekipler birbirinin yapt\u0131\u011f\u0131 i\u015fe engel olabilir (\u00f6rne\u011fin BT, sunucular\u0131 kullan\u0131labilir durumda tutmak i\u00e7in sava\u015f\u0131rken, Bilgi G\u00fcvenli\u011fi, vir\u00fcsl\u00fc sunucuyu a\u011fdan \u00e7\u0131karmaya \u00e7al\u0131\u015fabilir).<\/p>\n<p><strong>Buna kar\u015f\u0131 al\u0131nacak \u00f6nlemler. <\/strong>\u00d6nceden bir acil durum plan\u0131 geli\u015ftirin ve plan\u0131n uygulanmas\u0131ndan sorumlu birini atay\u0131n.<\/p>\n<h2>3. Nitelikli personel eksikli\u011fi<\/h2>\n<p>Piyasada bilgi g\u00fcvenli\u011fi uzman\u0131 eksikli\u011fi ya\u015fanmaya devam ediyor, bu nedenle \u015firketlerin, tehditleri tespit edebilecek ve kritik olaylara yan\u0131t verebilecek \u015fekilde e\u011fitilmi\u015f personel eksikli\u011fini b\u00fcy\u00fck bir zorluk olarak belirtmeleri pek de \u015fa\u015f\u0131rt\u0131c\u0131 de\u011fil.<\/p>\n<p><strong>Buna kar\u015f\u0131 al\u0131nacak \u00f6nlemler. <\/strong>\u015eirket i\u00e7i uzmanl\u0131k eksikli\u011fi s\u00f6z konusuysa, hem <a href=\"https:\/\/www.kaspersky.com.tr\/enterprise-security\/incident-response?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">olay m\u00fcdahalesi<\/a> hem de <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/managed-detection-and-response?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener nofollow\">s\u00fcrekli izleme ve tehdit av\u0131<\/a> faatliyetleri i\u00e7in \u015firket d\u0131\u015f\u0131ndan ekipler istihdam edin.<\/p>\n<h2>4. \u00c7ok say\u0131daki uyar\u0131 i\u015faretinin aras\u0131nda ger\u00e7ek tehditlerin tespit edilememesi<\/h2>\n<p>G\u00fcvenlik sisteminizin altyap\u0131n\u0131zdaki tehlike i\u015faretlerini tespit edememesi k\u00f6t\u00fcd\u00fcr ancak \u00e7ok fazla i\u015faret tespit etmesi de \u00e7ok iyi de\u011fildir. Ger\u00e7ek tehditlere ili\u015fkin uyar\u0131lar, analistlerin dikkatini \u00e7eken ve di\u011fer de\u011ferli kaynaklar\u0131n\u0131 bo\u015fa harcayan binlerce farkl\u0131 olay aras\u0131nda kaybolabilir. Bu, karma\u015f\u0131k bir a\u011f i\u00e7in olduk\u00e7a ciddi bir sorundur.<\/p>\n<p><strong>Buna kar\u015f\u0131 al\u0131nacak \u00f6nlemler. <\/strong>Ger\u00e7ekten kritik olaylara \u00f6ncelik verilmesine yard\u0131mc\u0131 olan yerle\u015fik teknolojilere sahip <a href=\"https:\/\/www.kaspersky.com.tr\/small-to-medium-business-security\/endpoint-security-solution?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">kapsaml\u0131 siber g\u00fcvenlik \u00e7er\u00e7evesi<\/a> kullan\u0131n.<\/p>\n<h2>5. K\u00f6t\u00fc ama\u00e7l\u0131 olay veya davran\u0131\u015flar konusunda yetersiz g\u00f6r\u00fcn\u00fcrl\u00fck<\/h2>\n<p>Siber su\u00e7lular s\u00fcrekli olarak yeni sald\u0131r\u0131 y\u00f6ntemleri, ara\u00e7lar\u0131 ve a\u00e7\u0131klar\u0131 kullan\u0131yor. Siber tehditler hakk\u0131nda yeni bilgiler olmadan, g\u00fcvenlik \u00e7\u00f6z\u00fcmlerinin en g\u00fcncel sald\u0131r\u0131lara yan\u0131t vermesi veya \u015firket a\u011f\u0131ndaki davetsiz misafirleri tespit etmesi m\u00fcmk\u00fcn de\u011fildir.<\/p>\n<p><strong>Buna kar\u015f\u0131 al\u0131nacak \u00f6nlemler.<\/strong> G\u00fcvenlik \u00e7\u00f6z\u00fcmlerinize ve (varsa) Bilgi G\u00fcvenli\u011fi ve Olay Y\u00f6netimi (SIEM) sistemlerinize temel, g\u00fcncel <a href=\"https:\/\/www.kaspersky.com.tr\/enterprise-security\/threat-intelligence?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">tehdit istihbarat\u0131<\/a> sa\u011flay\u0131n.<\/p>\n<p>BT G\u00fcvenli\u011fi Ekonomisi 2021 raporunda, siber olay kaynakl\u0131 ortalama kurumsal kay\u0131p verisi gibi \u00e7ok say\u0131da ba\u015fka yararl\u0131 bilgi yer al\u0131yor. <a href=\"https:\/\/calculator.kaspersky.com\/app\/report\" target=\"_blank\" rel=\"noopener nofollow\">Raporun tamam\u0131n\u0131 buradan indirebilirsiniz<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>BT G\u00fcvenli\u011fi Ekonomisi 2021 raporu: Bilgi g\u00fcvenli\u011finin karma\u015f\u0131k olaylar kar\u015f\u0131s\u0131nda ya\u015fad\u0131\u011f\u0131 en \u00f6nemli 5 zorluk.<\/p>\n","protected":false},"author":2706,"featured_media":10137,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1287,1194],"tags":[790,1313,1935],"class_list":{"0":"post-10136","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-news","9":"category-business","10":"tag-guvenlik-aciklari","11":"tag-raporlar","12":"tag-tehdit-istihbarati"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/top-5-challenges-security-economics\/10136\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/top-5-challenges-security-economics\/23475\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/top-5-challenges-security-economics\/18951\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/top-5-challenges-security-economics\/9504\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/top-5-challenges-security-economics\/25548\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/top-5-challenges-security-economics\/23622\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/top-5-challenges-security-economics\/23044\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/top-5-challenges-security-economics\/26215\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/top-5-challenges-security-economics\/25745\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/top-5-challenges-security-economics\/31664\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/top-5-challenges-security-economics\/42347\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/top-5-challenges-security-economics\/17856\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/top-5-challenges-security-economics\/18260\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/top-5-challenges-security-economics\/15391\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/top-5-challenges-security-economics\/27543\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/top-5-challenges-security-economics\/31808\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/top-5-challenges-security-economics\/27699\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/top-5-challenges-security-economics\/24470\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/top-5-challenges-security-economics\/29827\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/top-5-challenges-security-economics\/29626\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/raporlar\/","name":"raporlar"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10136","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=10136"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10136\/revisions"}],"predecessor-version":[{"id":10138,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10136\/revisions\/10138"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/10137"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=10136"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=10136"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=10136"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}