{"id":10411,"date":"2022-01-03T13:17:22","date_gmt":"2022-01-03T10:17:22","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=10411"},"modified":"2022-01-03T14:44:10","modified_gmt":"2022-01-03T11:44:10","slug":"andersen-cybersecurity-technologies","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/andersen-cybersecurity-technologies\/10411\/","title":{"rendered":"Hans Christian Andersen&#8217;in G\u00fcvenlik Teknolojileri \u00dczerine Yazd\u0131klar\u0131"},"content":{"rendered":"<p>Hikaye anlatan herkes, Orta \u00c7a\u011flardan beri okuyucular\u0131na bir siber g\u00fcvenlik k\u00fclt\u00fcr\u00fc a\u015f\u0131lamaya \u00e7al\u0131\u015f\u0131yor. Temel prensipleri \u00e7ok basit: Halk hikayelerindeki \u201colaylar\u0131\u201d kullanarak ger\u00e7ek bir rapor olu\u015fturmak. Bu raporlar\u0131n ne kadar detayl\u0131 oldu\u011fu tabii ki de\u011fi\u015fiyor. Ancak, dikkatli bir okumadan sonra, her yazar\u0131n sunuma y\u00f6nelik yakla\u015f\u0131m\u0131ndaki temel fark ortaya \u00e7\u0131k\u0131yor.<\/p>\n<p><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/snow-white-cryptominers\/7522\/\" target=\"_blank\" rel=\"noopener\">Grimm Karde\u015fler<\/a> ve <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/operation-puss-in-boots\/6553\/\" target=\"_blank\" rel=\"noopener\">Charles Perrault<\/a>, hikayelerini siber olaylar etraf\u0131nda \u015fekillendiriyor; buna kar\u015f\u0131n Hans Christian Andersen, koruma teknolojilerine odaklan\u0131yor. Grimm Karde\u015fler ve Perrault, olay ara\u015ft\u0131rmas\u0131nda uzman \u015firketlerce destekleniyorken; Andersen bir g\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fc sa\u011flay\u0131c\u0131s\u0131yla \u00e7al\u0131\u015f\u0131yor gibi g\u00f6r\u00fcn\u00fcyor. Andersen\u2019in eserlerinden birka\u00e7 \u00f6rne\u011fi inceleyelim.<\/p>\n<h2>Yaban Ku\u011fular\u0131<\/h2>\n<p>Bu <a href=\"https:\/\/en.wikisource.org\/wiki\/Hans_Andersen%27s_Fairy_Tales\/The_Wild_Swans\" target=\"_blank\" rel=\"noopener nofollow\">peri masal\u0131n\u0131n<\/a> girizgah\u0131 olduk\u00e7a s\u0131radan: Yak\u0131n zamanda e\u015fini kaybetmi\u015f bir kral daha sonradan cad\u0131 oldu\u011fu ortaya \u00e7\u0131kan k\u00f6t\u00fc bir krali\u00e7eyle evlenir. Bu hikaye, peri masallar\u0131nda s\u0131kl\u0131kla, <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/insider-threat\/\" target=\"_blank\" rel=\"noopener\">dahili bir tehdidi<\/a> anlatmak i\u00e7in kullan\u0131lan bir \u00f6rtmecedir. Gen\u00e7 prenslerden nefret eden krali\u00e7e, onlar\u0131 \u015fifreler (ku\u015flara d\u00f6n\u00fc\u015ft\u00fcr\u00fcr). \u0130lgin\u00e7 bir \u015fekilde, Andersen \u015fifreleme algoritmas\u0131n\u0131n hatal\u0131 oldu\u011funu ortaya koyar: K\u00f6t\u00fc \u00fcvey anne, prensleri \u201c.sessiz_b\u00fcy\u00fck_ku\u015flar\u201d format\u0131nda \u015fifrelemek isterken, \u201c.ku\u011fular\u201d \u015feklinde \u015fifreler.<\/p>\n<p>Daha sonra, prenslerin ba\u015f\u0131ndan ge\u00e7en zorluklar ve \u00fc\u00e7\u00fcnc\u00fc taraf \u015fifreleme dan\u0131\u015fmanlar\u0131 bulma \u00e7abalar\u0131 anlat\u0131l\u0131r; ancak masal\u0131n b\u00fcy\u00fck bir b\u00f6l\u00fcm\u00fc, prensesin nas\u0131l manuel olarak her bir erkek karde\u015fi i\u00e7in 11 tane \u015fifre \u00e7\u00f6z\u00fcc\u00fc kod yazd\u0131\u011f\u0131yla ilgilidir.<\/p>\n<p>Masal, prensesin bir kilise mezarl\u0131\u011f\u0131ndan toplad\u0131\u011f\u0131 \u0131s\u0131rgan otlar\u0131n\u0131 bir araya getirerek \u015fifre \u00e7\u00f6z\u00fcc\u00fc kod olu\u015fturmas\u0131yla devam eder. Mezarl\u0131ktan bahsedilmesi, C++ programlama diline bir g\u00f6nderme yap\u0131yor gibi g\u00f6z\u00fck\u00fcyor (buradaki iki \u201cart\u0131\u201d i\u015fareti ha\u00e7lar\u0131 temsil ediyor); ki bu dil, hi\u00e7 de rastlant\u0131sal olmayan bir \u015fekilde, Andersen\u2019le ayn\u0131 yerde ya\u015fam\u0131\u015f olan <a href=\"https:\/\/en.wikipedia.org\/wiki\/Bjarne_Stroustrup\" target=\"_blank\" rel=\"noopener nofollow\">Bjarne Stroustrup<\/a> taraf\u0131ndan geli\u015ftirilmi\u015ftir. Prenses de \u015fifre \u00e7\u00f6z\u00fcc\u00fcleri C++ dilinde yazm\u0131\u015ft\u0131r.<\/p>\n<p>Ancak Andersen tarafs\u0131zd\u0131r. \u0130\u00e7inde bir hata bulunan son \u015fifre \u00e7\u00f6z\u00fcc\u00fc, son erkek karde\u015fin dosyalar\u0131n\u0131n bir k\u0131sm\u0131n\u0131n \u015fifreli kalmas\u0131na neden olur.<\/p>\n<h2>Prenses ve Bezelye Tanesi<\/h2>\n<p><a href=\"https:\/\/en.wikisource.org\/wiki\/Fairy_tales_of_Andersen_(Paull)\/The_Princess_and_the_Pea\" target=\"_blank\" rel=\"noopener nofollow\">Prenses ve Bezelye Tanesi<\/a> masal\u0131, orta \u00e7a\u011flardaki <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/sandbox\/\" target=\"_blank\" rel=\"noopener\">korumal\u0131 alana<\/a> dayal\u0131 bir davran\u0131\u015f analiz motorunun uygulamaya konmas\u0131 \u00fczerine bir rapor gibidir. Andersen bunu, bir uzmanl\u0131k dergisi i\u00e7in veya bir ba\u015far\u0131 hikayesi \u00fczerine resmi bir rapor olarak yazm\u0131\u015f olabilir.<\/p>\n<p>Bu masal k\u0131saca, evlenmek istedi\u011fi kad\u0131n\u0131n ger\u00e7ek bir prenses oldu\u011funu kan\u0131tlamas\u0131 gereken bir prens hakk\u0131ndad\u0131r. Bunun i\u00e7in prensin annesi, prensesin yatak odas\u0131na benzeyen, izole ve denetimli bir alan (yani bir korumal\u0131 alan) haz\u0131rlar. Normal prenses davran\u0131\u015f\u0131n\u0131 ortaya \u00e7\u0131karmak i\u00e7in yata\u011f\u0131n i\u00e7ine bir tetikleyici yerle\u015ftirir ve bunu 20 tane kal\u0131n ve ku\u015f t\u00fcy\u00fc \u015filtenin alt\u0131na gizler. Annenin hipotezine g\u00f6re, ger\u00e7ek bir prenses bu ko\u015fullarda bile tetikleyiciye tepki verecektir; ancak sahte bir prenses tetikleyicinin fark\u0131nda bile olmayacakt\u0131r.<\/p>\n<p>S\u0131radaki a\u015famada yatak odas\u0131ndaki denek, tetikleyiciye uygun tepkiyi verir ve anne bir karara var\u0131r: Bu, ger\u00e7ek bir prensestir.<\/p>\n<p>\u015eimdilerde davran\u0131\u015f tespit teknolojilerini prensesler i\u00e7in de\u011fil, k\u00f6t\u00fc ama\u00e7l\u0131 davran\u0131\u015flar\u0131 tespit etmek i\u00e7in kullan\u0131yoruz. Ancak, temel prensip hala ayn\u0131. \u00d6rne\u011fin, [Research Sandbox placeholder]Kaspersky Research Sandbox[Research Sandbox placeholder], kurumsal a\u011flara ba\u011fl\u0131 bir bilgisayar\u0131n normal \u00e7al\u0131\u015fma \u015feklini analiz edip ayr\u0131 bir alanda bu davran\u0131\u015f\u0131 taklit ederek potansiyel tehditlerin davran\u0131\u015f\u0131n\u0131 izler.<\/p>\n<h2>The Tinderbox (Kibrit Kutusu)<\/h2>\n<p>\u201c<a href=\"https:\/\/en.wikisource.org\/wiki\/Hans_Andersen%27s_Fairy_Tales\/The_Tinder-Box\" target=\"_blank\" rel=\"noopener nofollow\">The Tinderbox<\/a>\u201d masal\u0131nda Andersen bir hacker\u2019\u0131 anlat\u0131r. Hikayede \u2018asker\u2019 olarak bahsedilen hacker, Kibrit Kutusu ad\u0131nda bir ileti\u015fim cihaz\u0131n\u0131 kullanarak canavar k\u00f6peklerden olu\u015fan bir grup su\u00e7luyla haberle\u015fir. K\u00f6pekler askere hem coin (para) kazand\u0131r\u0131r, hem de devlet k\u0131s\u0131tlamalar\u0131n\u0131 atlatarak prensesle ileti\u015fime ge\u00e7mesini sa\u011flar. Dahas\u0131, k\u00f6pekler istenmeyen ki\u015fileri ortadan kald\u0131rarak askerin ger\u00e7ek d\u00fcnyadaki su\u00e7 faaliyetlerini gizler. Di\u011fer bir deyi\u015fle, Kibrit Kutusu bir karanl\u0131k a\u011f arac\u0131d\u0131r ve \u015f\u00fcphesiz, Tor\u2019a bir g\u00f6ndermedir.<\/p>\n<p>\u201cKibrit Kutusu\u201d, \u00f6zellikle ana karakteri a\u00e7\u0131s\u0131ndan biraz al\u0131\u015f\u0131lagelmemi\u015f bir masald\u0131r. Peri masallar\u0131n\u0131n kahramanlar\u0131 genellikle iyi karakterlerdir veya en az\u0131ndan insanda empati duygusu uyand\u0131r\u0131rlar. Bu masalda ise ana karakter, kahraman olmaktan \u00e7ok uzak, k\u00f6t\u00fc ruhlu bir adamd\u0131r.<\/p>\n<p>Bu k\u0131sac\u0131k masal boyunca asker, insanlar\u0131 doland\u0131r\u0131r, soyar, ona nereden para bulabilece\u011fini s\u00f6yleyen bir kad\u0131n\u0131 \u00f6ld\u00fcr\u00fcr, prensesi tekrar tekrar ka\u00e7\u0131r\u0131r, prensesin ailesini, yarg\u0131\u00e7lar\u0131 ve kraliyet dan\u0131\u015fmanlar\u0131n\u0131 ortadan kald\u0131r\u0131r ve en sonunda y\u00f6netimi ele ge\u00e7irir. Andersen adam\u0131 a\u00e7\u0131k\u00e7a bir su\u00e7lu olarak betimlemek istemi\u015ftir.<\/p>\n<p>Bilgi g\u00fcvenli\u011fi konusuna d\u00f6necek olursak, esasen kibrit kutusuyla de\u011fil; saray koruyucular\u0131n\u0131n, askerin prensese nerede ve nas\u0131l ula\u015ft\u0131\u011f\u0131n\u0131 belirlemek i\u00e7in kulland\u0131\u011f\u0131 y\u00f6ntemlerle ilgileniyoruz. Krali\u00e7e hacker\u2019\u0131 anlamak i\u00e7in birka\u00e7 giri\u015fimde bulunur. Krali\u00e7enin, \u201cPrenses ve Bezelye Tanesi\u201dndeki gibi, saraydaki bilgi g\u00fcvenli\u011finden sorumlu ki\u015fi oldu\u011funa dikkat edin, \u00e7\u00fcnk\u00fc Andersen, orta \u00e7a\u011flarda CISO\u2019nun (Ba\u015f Bilgi G\u00fcvenli\u011fi Y\u00f6neticisi) g\u00f6revinin ne kadar \u00f6nemli oldu\u011funu bu \u015fekilde g\u00f6steriyor.<\/p>\n<p>Krali\u00e7e \u00f6nce, kurum i\u00e7indeki (saraydaki) bir siber tehdit analistinden (krali\u00e7e nedimesinden), davetsiz misafirin adresini manuel olarak aramas\u0131n\u0131 ister. Krali\u00e7e nedimesi, askerin kulland\u0131\u011f\u0131 alt a\u011f\u0131 do\u011fru bir \u015fekilde tan\u0131mlar; ancak karma\u015f\u0131k adres gizleme sistemi, nedimenin as\u0131l makineyi tespit etmesini engeller. Di\u011fer bir deyi\u015fle, k\u00f6peklerden biri, nedimeyi hedefinden \u015fa\u015f\u0131rtmak i\u00e7in \u00e7evredeki kap\u0131lar\u0131, askerin kap\u0131s\u0131na \u00e7izilmi\u015f \u00e7arp\u0131 i\u015faretinin ayn\u0131s\u0131yla i\u015faretler.<\/p>\n<p>Krali\u00e7enin ikinci giri\u015fimi daha karma\u015f\u0131kt\u0131r ve ba\u015far\u0131l\u0131 olur. Krali\u00e7e, prensesin istemci uygulamas\u0131na bir implant yerle\u015ftirir: bir torba karabu\u011fday yulaf\u0131. Asker bir daha ileti\u015fim kurmaya \u00e7al\u0131\u015ft\u0131\u011f\u0131 zaman karabu\u011fday implant\u0131, bilgisayarlardan iyi anlayan k\u00f6pe\u011fin sinyali \u201cAsker\u2019in cam\u0131\u201dna, yani direkt olarak Windows tabanl\u0131 bilgisayar\u0131na, yeniden y\u00f6nlendirmek i\u00e7in kulland\u0131\u011f\u0131 ara d\u00fc\u011f\u00fcmleri i\u015faretler. B\u00f6ylece asker takip edilir, tutuklan\u0131r ve \u00f6l\u00fcme mahkum edilir.<\/p>\n<p>\u201cPrenses ve Bezelye Tanesi\u201d masal\u0131n\u0131n aksine bu bir ba\u015far\u0131 hikayesi de\u011fil, e\u011fitici bir \u00f6yk\u00fcd\u00fcr. Yoldan ge\u00e7en birine, ileti\u015fim cihaz\u0131n\u0131 mahkuma teslim etmesi i\u00e7in r\u00fc\u015fvet verilir. Mahkum t\u00fcm su\u00e7lu k\u00f6pek grubunun deste\u011fini al\u0131r ve hikayenin sonunda krali\u00e7enin t\u00fcm \u00e7abalar\u0131 bo\u015fa \u00e7\u0131kar.<\/p>\n<h2>\u0130mparator\u2019un Yeni Elbiseleri<\/h2>\n<p>Andersen\u2019in bilgi g\u00fcvenli\u011fi teknolojileri \u00fczerine se\u00e7ti\u011fimiz hikayelerin sonuncusu da olduk\u00e7a \u00fcnl\u00fc: \u201c<a href=\"https:\/\/en.wikisource.org\/wiki\/Hans_Andersen%27s_Fairy_Tales\/The_Emperor%27s_New_Clothes\" target=\"_blank\" rel=\"noopener nofollow\">\u0130mparator\u2019un Yeni Elbiseleri<\/a>\u201c. Orijinal masal \u015f\u00fcphesiz, siber \u015farlatanlar \u00fczerine hiciv niteli\u011finde ve ele\u015ftirel bir metin. Kendi yeni jenerasyon blok zinciri veya AI (Yapay Zeka) tabanl\u0131 siber g\u00fcvenlik sistemlerini \u00f6vmeye doyamayan sa\u011flay\u0131c\u0131lardan bahsediyoruz.<\/p>\n<p>\u201c\u0130mparator\u2019un Yeni Elbiseleri\u201d masal\u0131nda kral, tam donan\u0131ml\u0131 bir siber g\u00fcvenlik sistemi haz\u0131rlatmak i\u00e7in bir miktar para ay\u0131r\u0131r; ama \u00fcstleniciler, krala birka\u00e7 haval\u0131 blok zinciri temal\u0131 sunum yutturup paray\u0131 cebe atar. Kral\u0131n dan\u0131\u015fmanlar\u0131, teknoloji hakk\u0131nda hi\u00e7bir \u015fey bilmedikleri ve aptal g\u00f6r\u00fcnmekten korktuklar\u0131ndan, bunun harika bir f\u0131rsat oldu\u011funu s\u00f6yler. Dana sonra, gen\u00e7 ama s\u0131zma testlerinde a\u00e7\u0131k\u00e7a uzman biri, kraliyetin koruma sisteminin \u00e7al\u0131\u015famayacak kadar \u00e7ok eksikle dolu oldu\u011funu fark eder.<\/p>\n<p>Siber g\u00fcvenlik sekt\u00f6r\u00fc, Andersen\u2019in zaman\u0131ndan bu yana olduk\u00e7a ilerledi. Modern i\u015fletmeler, <a href=\"https:\/\/www.kaspersky.com.tr\/small-to-medium-business-security\/cloud?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kescloud___\" target=\"_blank\" rel=\"noopener\">g\u00fcvenlik \u00e7\u00f6z\u00fcmlerini<\/a> se\u00e7erken reklam sloganlar\u0131ndan \u00e7ok, <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/ransomware-best-protection-2021\/10129\/\" target=\"_blank\" rel=\"noopener\">ba\u011f\u0131ms\u0131z testlerin sonu\u00e7lar\u0131yla<\/a> y\u00f6nlendirilmelidir.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-b2b\">\n","protected":false},"excerpt":{"rendered":"<p>Danimarkal\u0131 i\u015f arkada\u015f\u0131m\u0131z eserlerinde siber g\u00fcvenlikle ilgili bir\u00e7ok konuya de\u011finmi\u015ftir.<\/p>\n","protected":false},"author":700,"featured_media":10414,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194],"tags":[2051,2046,2041],"class_list":{"0":"post-10411","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"tag-gercekler","10":"tag-korumali-alan","11":"tag-peri-masallari"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/andersen-cybersecurity-technologies\/10411\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/andersen-cybersecurity-technologies\/23782\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/andersen-cybersecurity-technologies\/19281\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/andersen-cybersecurity-technologies\/26009\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/andersen-cybersecurity-technologies\/23986\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/andersen-cybersecurity-technologies\/23681\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/andersen-cybersecurity-technologies\/26656\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/andersen-cybersecurity-technologies\/26249\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/andersen-cybersecurity-technologies\/32142\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/andersen-cybersecurity-technologies\/43232\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/andersen-cybersecurity-technologies\/18364\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/andersen-cybersecurity-technologies\/18730\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/andersen-cybersecurity-technologies\/27923\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/andersen-cybersecurity-technologies\/32262\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/andersen-cybersecurity-technologies\/27977\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/andersen-cybersecurity-technologies\/24723\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/andersen-cybersecurity-technologies\/30142\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/andersen-cybersecurity-technologies\/29933\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/gercekler\/","name":"ger\u00e7ekler"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10411","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/700"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=10411"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10411\/revisions"}],"predecessor-version":[{"id":10416,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10411\/revisions\/10416"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/10414"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=10411"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=10411"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=10411"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}