{"id":11585,"date":"2023-08-09T12:44:05","date_gmt":"2023-08-09T09:44:05","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=11585"},"modified":"2023-08-09T12:44:05","modified_gmt":"2023-08-09T09:44:05","slug":"types-of-two-factor-authentication","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/types-of-two-factor-authentication\/11585\/","title":{"rendered":"\u0130ki fakt\u00f6rl\u00fc kimlik do\u011frulama t\u00fcrleri: art\u0131lar\u0131 ve eksileri"},"content":{"rendered":"<p>Son g\u00f6nderimizde, <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/what-is-two-factor-authentication\/48289\/\" rel=\"noopener nofollow\">iki fakt\u00f6rl\u00fc kimlik do\u011frulaman\u0131n ne oldu\u011funu<\/a> ve buna neden ihtiyac\u0131n\u0131z oldu\u011funu ele alm\u0131\u015ft\u0131k. \u00d6zetle, iki fakt\u00f6rl\u00fc kimlik do\u011frulama, temelde iki farkl\u0131 kimlik do\u011frulama y\u00f6ntemine dayal\u0131 bir eri\u015fim do\u011frulama mekanizmas\u0131d\u0131r.<\/p>\n<p>Kullan\u0131c\u0131lar, hesaplar\u0131n\u0131n daha g\u00fcvenilir bir \u015fekilde korunmas\u0131 i\u00e7in iki fakt\u00f6rl\u00fc kimlik do\u011frulamaya ihtiya\u00e7 duyar: Her bir kimlik do\u011frulama y\u00f6ntemi tek ba\u015f\u0131na savunmas\u0131z olabilse de, iki (veya daha fazlas\u0131n\u0131n) birlikte kullan\u0131lmas\u0131 hesab\u0131n ele ge\u00e7irilmesini \u00e7ok daha zorla\u015ft\u0131r\u0131r.<\/p>\n<p>Bu yaz\u0131da, mevcut \u00e7ok fakt\u00f6rl\u00fc kimlik do\u011frulama se\u00e7eneklerini ele alaca\u011f\u0131m, size her birinin art\u0131lar\u0131n\u0131 ve eksilerini anlataca\u011f\u0131m ve hesaplar\u0131n\u0131z\u0131 g\u00fcvende tutman\u0131z i\u00e7in en g\u00fcvenli olanlar\u0131 \u00f6nerece\u011fim.<\/p>\n<h2 id=\"sms-codes\">SMS, e-posta veya sesli arama yoluyla g\u00f6nderilen tek seferlik kodlar<\/h2>\n<p>Oturum a\u00e7ma do\u011frulamas\u0131 i\u00e7in en yayg\u0131n iki fakt\u00f6rl\u00fc kimlik do\u011frulama mekanizmalar\u0131ndan biri, tek seferlik kodlard\u0131r. Bunlar genellikle kay\u0131t s\u0131ras\u0131nda belirtilen telefon numaras\u0131na k\u0131sa mesaj olarak g\u00f6nderilir. Bunun i\u00e7in e-posta da kullan\u0131labilir, ancak daha az pop\u00fcler bir y\u00f6ntemdir. Daha b\u00fcy\u00fck hizmetler sunan \u015firketler genellikle kay\u0131t s\u0131ras\u0131nda belirtilen telefon numaras\u0131na sesli arama se\u00e7ene\u011fi de sunar.<\/p>\n<p>Kullan\u0131lan da\u011f\u0131t\u0131m kanal\u0131 ne olursa olsun ana fikir ayn\u0131d\u0131r: hizmete kaydolurken belirtti\u011finiz ba\u015fka bir hesaba veya telefon numaras\u0131na eri\u015febildi\u011finizi do\u011frulamak. Bu nedenle, birisi telefonunuza eri\u015fimi olmad\u0131\u011f\u0131 halde \u015fifrenizi \u00e7alarsa, bu koruma gayet iyi \u00e7al\u0131\u015facakt\u0131r.<\/p>\n<div id=\"attachment_11588\" style=\"width: 1180px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2023\/08\/09123017\/types-of-two-factor-authentication-1.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-11588\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2023\/08\/09123017\/types-of-two-factor-authentication-1.png\" alt=\"Tek seferlik Google hesab\u0131 kimlik do\u011frulama kodu i\u00e7eren SMS\" width=\"1170\" height=\"701\" class=\"size-full wp-image-11588\"><\/a><p id=\"caption-attachment-11588\" class=\"wp-caption-text\">En yayg\u0131n iki fakt\u00f6rl\u00fc kimlik do\u011frulama se\u00e7ene\u011fi k\u0131sa mesajla g\u00f6nderilen tek seferlik koddur.<\/p><\/div>\n<p>Ancak bu iki fakt\u00f6rl\u00fc kimlik do\u011frulama mekanizmas\u0131n\u0131n dezavantajlar\u0131 da vard\u0131r. Oturum a\u00e7may\u0131 onaylamak i\u00e7in e-posta kullan\u0131l\u0131yorsa ve oturum a\u00e7mak i\u00e7in kulland\u0131\u011f\u0131n\u0131z parola, korumaya \u00e7al\u0131\u015ft\u0131\u011f\u0131n\u0131z hesab\u0131nkiyle ayn\u0131ysa, elde edece\u011finiz ekstra g\u00fcvenlik \u00e7ok s\u0131n\u0131rl\u0131 olur. Hesab\u0131n parolas\u0131n\u0131 bilen bir sald\u0131rgan\u0131n, bu parolay\u0131 e-postan\u0131zda da oturum a\u00e7mak i\u00e7in deneyece\u011finden ve b\u00f6ylece tek seferlik do\u011frulama kodunu alabilece\u011finden emin olabilirsiniz.<\/p>\n<p>\u0130ster SMS ister sesli arama yoluyla olsun, telefon numaras\u0131 \u00fczerinden do\u011frulama farkl\u0131 bir sorun yarat\u0131r: telefonun sahibi telefona eri\u015fimini kaybedilebilir. Bazen kullan\u0131c\u0131lar telefon hesaplar\u0131na para y\u00fcklemeyi unuturlar veya telefonlar\u0131n\u0131 kaybederler ya da numaralar\u0131n\u0131 de\u011fi\u015ftirirler.<\/p>\n<p>Su\u00e7lular\u0131n, telekom operat\u00f6rlerini kendilerine kurban\u0131n telefon numaras\u0131n\u0131 i\u00e7eren bir SIM kart vermeye <a target=\"_blank\" href=\"https:\/\/www.vice.com\/en\/article\/d3n3am\/att-and-verizon-employees-charged-sim-swapping-criminal-ring\" rel=\"noopener nofollow\">ikna etmeleri<\/a> ve b\u00f6ylece do\u011frulama kodlar\u0131na eri\u015fmeleri de <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.theverge.com\/2019\/8\/31\/20841448\/jack-dorsey-twitter-hacked-account-sim-swapping\">al\u0131\u015f\u0131lmad\u0131k bir durum de\u011fildir<\/a>. Ayr\u0131ca, metin mesajlar\u0131 ele ge\u00e7irilebilir \u2014 bu t\u00fcr vakalar <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.kaspersky.com.tr\/blog\/ss7-hacked\/5651\/\">\u00e7ok\u00e7a rapor edilmi\u015ftir<\/a>.<\/p>\n<p>\u00d6zet: Bu iki fakt\u00f6rl\u00fc kimlik do\u011frulama se\u00e7ene\u011fi i\u015finizi g\u00f6r\u00fcr, ancak en \u00f6nemli hesaplar\u0131 \u2014 \u00f6zellikle de finansla ilgili olanlar\u0131 \u2014 korumak i\u00e7in daha g\u00fcvenilir bir y\u00f6ntem kullanmak daha mant\u0131kl\u0131 olacakt\u0131r.<\/p>\n<h2 id=\"passwords\">\u0130kinci fakt\u00f6r olarak \u015fifre<\/h2>\n<p>Bazen \u015fifre birinci de\u011fil ikinci fakt\u00f6rd\u00fcr. Bu, mesajla\u015fma uygulamalar\u0131n\u0131n s\u0131kl\u0131kla yapt\u0131\u011f\u0131 \u015feydir: oturum a\u00e7mak i\u00e7in, varsay\u0131lan olarak, SMS ile iletilen tek seferlik kodu girmek yeterlidir. Parola genellikle iste\u011fe ba\u011fl\u0131d\u0131r. Bana sorarsan\u0131z iste\u011fe ba\u011fl\u0131 olsa da asl\u0131nda gereklidir. Tek seferde bir s\u00fcr\u00fc olas\u0131 soruna kar\u015f\u0131 sizi koruyacakt\u0131r.<\/p>\n<p>En \u00f6nemlisi, yaz\u0131\u015fmalar\u0131n\u0131z\u0131, WhatsApp veya Telegram\u2019a kaydolmak i\u00e7in kulland\u0131\u011f\u0131n\u0131z telefon numaras\u0131na eri\u015fiminizi yanl\u0131\u015fl\u0131kla kaybetmeye kar\u015f\u0131 koruyacakt\u0131r. Kulland\u0131\u011f\u0131n\u0131z as\u0131l telefon numaran\u0131z\u0131 de\u011fi\u015ftirdi\u011finizi, eski SIM kart\u0131n\u0131z\u0131 bir \u00e7ekmeceye koydu\u011funuzu ve uzun s\u00fcre \u00fccretini \u00f6demedi\u011finizi varsayal\u0131m. Operat\u00f6r bir s\u00fcre sonra numaran\u0131z\u0131 yeniden satacak ve b\u00f6ylece yeni hat sahibinin mesajla\u015fma uygulamas\u0131nda sizin ad\u0131n\u0131za oturum a\u00e7mas\u0131 m\u00fcmk\u00fcn olacakt\u0131r \u2014 tabii hesab\u0131n\u0131z ek olarak bir parola ile korunmad\u0131\u011f\u0131 s\u00fcrece.<\/p>\n<p>Ve bu \u015fifre kesinlikle o veya bu \u015fekilde telefon numaran\u0131za eri\u015fim kazanabilecek korsanlara kar\u015f\u0131 mesajla\u015fma hesab\u0131n\u0131za en az\u0131ndan bir miktar koruma sa\u011flayacakt\u0131r.<\/p>\n<h2 id=\"pre-generated\">Tek seferlik kodlar\u0131n \u00f6nceden olu\u015fturulmu\u015f bir listesi<\/h2>\n<p>Kar\u015f\u0131la\u015fabilece\u011finiz ba\u015fka bir se\u00e7enek, \u00f6nceden olu\u015fturulmu\u015f tek seferlik kodlar\u0131n bir listesidir. Bankalar bazen i\u015flemlerini onaylamak i\u00e7in m\u00fc\u015fterilerine bu t\u00fcr listeler verirken, baz\u0131 internet hizmetleri (Google gibi) hesap kurtarma i\u00e7in bunlar\u0131n kullan\u0131lmas\u0131na izin verir.<\/p>\n<p>Bu g\u00fcvenilir bir mekanizma olarak kabul edilebilir. \u00c7\u00fcnk\u00fc bu t\u00fcr kodlar kullan\u0131c\u0131ya son derece nadiren iletilir, bu nedenle m\u00fcdahale i\u00e7in minimum oranda f\u0131rsat do\u011far. Kodlar rastgeledir, yani benzersizdirler. Bu y\u00fczden onlar\u0131 tahmin etmek neredeyse imkans\u0131zd\u0131r.<\/p>\n<p>Ancak depolama sorun olu\u015fturur. Sald\u0131rganlar \u00f6nceden olu\u015fturulmu\u015f kodlar listenizi \u00e7almay\u0131 ba\u015far\u0131rsa, hesab\u0131n\u0131z\u0131 ele ge\u00e7irmeleri veya hesab\u0131n\u0131zdan para \u00e7almalar\u0131 son derece kolay olacakt\u0131r.<\/p>\n<div id=\"attachment_11592\" style=\"width: 3010px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2023\/08\/09123020\/types-of-two-factor-authentication-2-scaled-1-scaled.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-11592\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2023\/08\/09123020\/types-of-two-factor-authentication-2-scaled-1-scaled.jpg\" alt=\"\u00d6nceden olu\u015fturulmu\u015f tek seferlik kodlar listesi\" width=\"3000\" height=\"1942\" class=\"size-full wp-image-11592\"><\/a><p id=\"caption-attachment-11592\" class=\"wp-caption-text\">Banka i\u015flemlerinin do\u011frulanmas\u0131 i\u00e7in \u00f6nceden olu\u015fturulmu\u015f tek seferlik kodlar listesi<\/p><\/div>\n<p>Bu nedenle, tek seferlik onay kodlar\u0131 bir kasada veya elektronik muadilinde saklanmal\u0131d\u0131r. \u00d6rne\u011fin, [Kaspersky Password Manager placeholder] Kaspersky Password Manager[\/Placeholder] i\u00e7inde \u015fifrelenmi\u015f notlar vard\u0131r. Tek seferlik kodlar\u0131n listesini bu notlara kaydederseniz, Kaspersky Password Manager i\u00e7in g\u00fc\u00e7l\u00fc ve \u00f6zg\u00fcn bir ana parola belirlemeniz halinde, g\u00fcvenli bir \u015fekilde korunurlar.<\/p>\n<p>Bununla birlikte, bu kimlik do\u011frulama y\u00f6nteminin ana sak\u0131ncas\u0131, s\u0131k s\u0131k do\u011frulamaya ihtiyac\u0131n\u0131z varsa, \u00f6nceden olu\u015fturulmu\u015f kodlar\u0131n\u0131z\u0131n h\u0131zla t\u00fckenmesidir. Bu, daha fazla yeni parola olu\u015fturup kaydetmeniz gerekece\u011fi anlam\u0131na gelir. Birden fazla hesap y\u00f6netiyorsan\u0131z, t\u00fcm bu listeler kolayca kafan\u0131z\u0131 kar\u0131\u015ft\u0131r\u0131r. Bu nedenle, ana kimlik do\u011frulama y\u00f6ntemi olarak \u00f6nceden olu\u015fturulmu\u015f kodlar, tam da ihtiya\u00e7 duydu\u011funuz anda istek \u00fczerine olu\u015fturulan kodlarla de\u011fi\u015ftirilmi\u015ftir.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kpm\">\n<h2 id=\"authenticators\">Bir kimlik do\u011frulama uygulamas\u0131ndan gelen tek seferlik kodlar<\/h2>\n<p>Tek seferlik kodlar\u0131n \u201can\u0131nda\u201d olu\u015fturulmas\u0131, do\u011frulay\u0131c\u0131lar taraf\u0131ndan yap\u0131l\u0131r. Bunlar bazen ge\u00e7erli kodu g\u00f6r\u00fcnt\u00fcleyen k\u00fc\u00e7\u00fck bir ekrana sahip ba\u011f\u0131ms\u0131z cihazlar olabilir \u2014 baz\u0131 bankalar m\u00fc\u015fterilerine bu t\u00fcr kimlik do\u011frulay\u0131c\u0131lar verir.<\/p>\n<p>Ancak bu g\u00fcnlerde ak\u0131ll\u0131 telefonlarda \u00e7al\u0131\u015fan \u00f6zel kimlik do\u011frulama uygulamalar\u0131n\u0131n, ba\u011f\u0131ms\u0131z cihazlardan daha pop\u00fcler oldu\u011fu s\u00f6ylenebilir. Bunlar hakk\u0131nda da birka\u00e7 yaz\u0131m\u0131z var:<\/p>\n<ul>\n<li><a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/authenticator-apps-compatibility\/47063\/\" rel=\"noopener nofollow\">Kimlik do\u011frulay\u0131c\u0131 uygulamalar\u0131 ve nas\u0131l \u00e7al\u0131\u015ft\u0131klar\u0131<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.kaspersky.com.tr\/blog\/best-authenticator-apps-2022\/10422\/\" rel=\"noopener\">Android, iOS, Windows ve macOS i\u00e7in en iyi kimlik do\u011frulama uygulamalar\u0131<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/authenticator-apps-and-security\/47426\/\" rel=\"noopener nofollow\">Tek seferlik kodlarla kimlik do\u011frulama: art\u0131lar\u0131 ve eksileri<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.kaspersky.com.tr\/blog\/how-to-recover-authenticator-app\/10063\/\" rel=\"noopener\">Kimlik do\u011frulama uygulamas\u0131 y\u00fckl\u00fc telefonunuzu kaybederseniz ne yapmal\u0131s\u0131n\u0131z?<\/a><\/li>\n<\/ul>\n<p>E\u011fer bu kimlik do\u011frulama y\u00f6nteminin nas\u0131l \u00e7al\u0131\u015ft\u0131\u011f\u0131, bir kimlik do\u011frulama uygulamas\u0131n\u0131n nas\u0131l se\u00e7ilece\u011fi ve kulland\u0131\u011f\u0131n\u0131zda nelere dikkat etmeniz gerekti\u011fi hakk\u0131nda bilgi ar\u0131yorsan\u0131z, yukar\u0131daki ba\u011flant\u0131lar\u0131 izleyin. Bu arada, kimlik do\u011frulay\u0131c\u0131 uygulamalar\u0131n rahatl\u0131k ve g\u00fcvenlik aras\u0131nda en uygun dengeyi sundu\u011funu ve bu noktan\u0131n da bu uygulamalar\u0131 giderek daha pop\u00fcler hale getirdi\u011fini k\u0131saca belirtmeliyim.<\/p>\n<div id=\"attachment_11590\" style=\"width: 2335px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2023\/08\/09123030\/types-of-two-factor-authentication-3.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-11590\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2023\/08\/09123030\/types-of-two-factor-authentication-3.png\" alt=\"Google Authenticator: en iyi bilinen kimlik do\u011frulama uygulamas\u0131\" width=\"2325\" height=\"1624\" class=\"size-full wp-image-11590\"><\/a><p id=\"caption-attachment-11590\" class=\"wp-caption-text\">Google Authenticator: en tan\u0131nm\u0131\u015f olsa da <a target=\"_blank\" rel=\"noopener\">https:\/\/www.kaspersky.com.tr\/blog\/best-authenticator-apps-2022\/10422\/<\/a>\u201d target=\u201d_blank\u201d&gt; sekt\u00f6rdeki tek tan\u0131nm\u0131\u015f  kimlik do\u011frulama uygulamas\u0131 de\u011fil<\/p><\/div>\n<h2 id=\"biometrics\">Biyometri: parmak izi, y\u00fcz veya ses<\/h2>\n<p>K\u0131sa bir s\u00fcre \u00f6nce, \u00e7o\u011fu insan i\u00e7in biyometrik kimlik do\u011frulama yeni bir \u015feydi. Ancak, i\u015fler olduk\u00e7a h\u0131zl\u0131 bir \u015fekilde de\u011fi\u015fti. Art\u0131k \u00e7o\u011fu ak\u0131ll\u0131 telefon, parmak izi veya y\u00fcz tan\u0131ma ile kimlik do\u011frulama yapabiliyor ve bu durum kimseyi \u015fa\u015f\u0131rtm\u0131yor.<\/p>\n<p>Ne var ki, baz\u0131 biyometri y\u00f6ntemleri size s\u0131ra d\u0131\u015f\u0131 gelebilir. Bunlara ses, iris, y\u00fcr\u00fcme ve yazma al\u0131\u015fkanl\u0131\u011f\u0131 tabanl\u0131 kimlik do\u011frulama y\u00f6ntemleri \u00f6rnek verilebilir. En \u00f6zg\u00fcn olanlara gelince, <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com.tr\/blog\/odor-based-authentication\/10860\/\" rel=\"noopener\">koku tabanl\u0131<\/a> kimlik do\u011frulama ara\u015ft\u0131rmas\u0131n\u0131 hat\u0131rlayabiliriz (her ne kadar \u00e7ok iyi \u00e7al\u0131\u015fmasa da)!<\/p>\n<p>Biyometrik kimlik do\u011frulaman\u0131n birka\u00e7 ciddi dezavantaj\u0131 vard\u0131r. Birincisi: Dayand\u0131\u011f\u0131 t\u00fcm \u00f6zellikler, kullan\u0131c\u0131n\u0131n kal\u0131c\u0131 \u00f6zellikleridir. G\u00fcvenli\u011fi ihlal edilmi\u015f bir parolay\u0131 de\u011fi\u015ftirebilirsiniz; hatta g\u00fcvenlik nedeniyle bunu birka\u00e7 kez yapabilirsiniz. Ancak kay\u0131tl\u0131 bir parmak izi yaln\u0131zca s\u0131n\u0131rl\u0131 say\u0131da de\u011fi\u015ftirilebilir \u2014 yapabilece\u011finiz denemeler tam anlam\u0131yla iki elin parmaklar\u0131yla s\u0131n\u0131rl\u0131d\u0131r.<\/p>\n<p>\u0130kinci \u00f6nemli konu, biyometrik verilerin son derece hassas olmas\u0131d\u0131r \u2014 hem de\u011fi\u015ftirilemez olduklar\u0131 hem de yaln\u0131zca bir kullan\u0131c\u0131n\u0131n <em>kimli\u011finin do\u011frulanmas\u0131na<\/em> de\u011fil, ayn\u0131 zamanda bir ki\u015finin <em>kimli\u011finin tespit edilmesine<\/em> de imkan verdikleri i\u00e7in. Bu nedenle, bu verilerin toplanmas\u0131 ve dijital hizmetlere aktar\u0131lmas\u0131 son derece dikkatli bir \u015fekilde ele al\u0131nmal\u0131d\u0131r.<\/p>\n<p>Bu sebeple biyometrik veriler normalde yerel kimlik do\u011frulama i\u00e7in kullan\u0131l\u0131r, herhangi bir yere iletilmemesi i\u00e7in cihazda saklan\u0131r ve i\u015flenir. Uzaktan biyometrik kimlik do\u011frulama i\u00e7in dijital hizmetin, normalde almak istemeyece\u011fi bir risk alarak cihaz sat\u0131c\u0131s\u0131na g\u00fcvenmesi gerekir. Net sonu\u00e7 \u015fudur: Yaln\u0131zca Apple, tam kapsaml\u0131 bir uzaktan biyometrik kimlik do\u011frulama mekanizmas\u0131na sahiptir. \u00c7\u00fcnk\u00fc \u015firket, yaz\u0131l\u0131m geli\u015ftirmeden cihaz \u00fcretimine kadar t\u00fcm ekosistemin kontrol\u00fcn\u00fc elinde tutmaktad\u0131r.<\/p>\n<div id=\"attachment_11591\" style=\"width: 3010px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2023\/08\/09123021\/types-of-two-factor-authentication-4-scaled-1-scaled.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-11591\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2023\/08\/09123021\/types-of-two-factor-authentication-4-scaled-1-scaled.jpg\" alt=\"Parmak iziyle kimlik do\u011frulamas\u0131\" width=\"3000\" height=\"2000\" class=\"size-full wp-image-11591\"><\/a><p id=\"caption-attachment-11591\" class=\"wp-caption-text\">Parmak iziyle oturum a\u00e7ma bu g\u00fcnlerde yayg\u0131n bir uygulamad\u0131r<\/p><\/div>\n<p>Ancak biyometrik kimlik do\u011frulaman\u0131n, t\u00fcm dezavantajlar\u0131n\u0131 ge\u00e7ersiz k\u0131lan \u00f6nemli bir avantaj\u0131 vard\u0131r. D\u00fczg\u00fcn bir \u015fekilde uygulan\u0131rsa, kullan\u0131c\u0131lar\u0131n hayat\u0131n\u0131 \u00e7ok daha basit hale getirir \u00c7\u00fcnk\u00fc art\u0131k yazmaya gerek yoktur \u2014 sadece parma\u011f\u0131n\u0131z\u0131 sens\u00f6re bast\u0131rman\u0131z veya y\u00fcz\u00fcn\u00fcz\u00fc kameraya g\u00f6stermeniz yeter. Ve yine, <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com.tr\/blog\/face-unlock-insecurity\/4810\/\" rel=\"noopener\">do\u011fru bir \u015fekilde uygulan\u0131rsa<\/a>, olduk\u00e7a g\u00fcvenilirdir.<\/p>\n<h2 id=\"location\">Konum<\/h2>\n<p>Bir ba\u015fka kullan\u0131c\u0131 kimlik do\u011frulama t\u00fcr\u00fc de konumdur. Bu y\u00f6ntemi etkinle\u015ftirmeniz gerekmez, zaten varsay\u0131lan olarak a\u00e7\u0131kt\u0131r. Bu nedenle genellikle fark edilmez ve yaln\u0131zca yabanc\u0131lar hesab\u0131n\u0131za giri\u015f yapmaya \u00e7al\u0131\u015f\u0131rken ba\u015far\u0131s\u0131z oldu\u011funda, yani hizmetin beklemedi\u011fi bir yerden oturum a\u00e7ma giri\u015fimi geldi\u011finde uyar\u0131 al\u0131n\u0131r. Bu durumda hizmet, ek bir do\u011frulama y\u00f6ntemi kullan\u0131lmas\u0131n\u0131 gerektirebilir.<\/p>\n<p>Tabii ki konum, \u00e7ok g\u00fcvenilir bir kimlik do\u011frulama fakt\u00f6r\u00fc de\u011fildir. \u0130lk olarak, benzersiz bir y\u00f6ntem de\u011fildir. Herhangi bir zamanda bir\u00e7ok insan ayn\u0131 yerde olabilir. \u0130kincisi, manip\u00fcle edilmesi olduk\u00e7a kolayd\u0131r. \u00d6zellikle IP tabanl\u0131 konumdan bahsediyorsak bu durum daha da fazla ge\u00e7erlidir (do\u011fru GPS konumunu belirleme de\u011fil). Ancak konum, <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/what-is-two-factor-authentication\/48289\/\" rel=\"noopener nofollow\">kimlik do\u011frulama y\u00f6ntemlerinden<\/a> biri olarak kullan\u0131labilir ve bir\u00e7ok hizmet bunu yapar.<\/p>\n<h2 id=\"fido-u2f\">Donan\u0131m anahtarlar\u0131 FIDO U2F (ba\u015fka bir deyi\u015fle YubiKey)<\/h2>\n<p>Yukar\u0131da a\u00e7\u0131klanan kimlik do\u011frulama se\u00e7eneklerinin \u00f6nemli bir dezavantaj\u0131 vard\u0131r: kullan\u0131c\u0131n\u0131n kimli\u011finin do\u011frulanmas\u0131na izin verirler, ancak hizmetin de\u011fil. Bu da onlar\u0131 <a target=\"_blank\" href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/man-in-the-middle-attack\/\" rel=\"noopener\">MitM<\/a> (ortadaki adam) sald\u0131r\u0131lar\u0131na kar\u015f\u0131 savunmas\u0131z k\u0131lar.<\/p>\n<p>Sald\u0131rganlar, ger\u00e7ek hizmetin oturum a\u00e7ma mekanizmas\u0131n\u0131 yak\u0131ndan taklit eden sahte bir sayfa olu\u015fturabilir. Kullan\u0131c\u0131 oturum a\u00e7ma bilgilerini ve parolas\u0131n\u0131 girdikten sonra, su\u00e7lular hemen bunlar\u0131 ger\u00e7ek web sitesinde oturum a\u00e7mak i\u00e7in kullan\u0131r. Do\u011frulama kodu, kullan\u0131c\u0131dan sa\u011flamas\u0131 istenen bir sonraki \u015fey olacak ve hi\u00e7 zaman kaybetmeksizin kurban\u0131n hesab\u0131n\u0131 ele ge\u00e7irmek i\u00e7in kullan\u0131lacakt\u0131r.<\/p>\n<p>Bu t\u00fcr tehditlerle ba\u015fa \u00e7\u0131kmak i\u00e7in en pop\u00fcler modeli YubiKey ad\u0131yla da bilinen FIDO U2F anahtarlar\u0131 olu\u015fturulmu\u015ftur. Bu y\u00f6ntemin ana avantaj\u0131, kay\u0131t s\u0131ras\u0131nda hizmetin ve U2F anahtar\u0131n\u0131n, hem hizmet hem de her bir kullan\u0131c\u0131ya \u00f6zg\u00fc baz\u0131 bilgileri hat\u0131rlamas\u0131d\u0131r. Daha sonra kimlik do\u011frulama s\u0131ras\u0131nda hizmetin anahtara belirli bir istek g\u00f6ndermesi gerekir. Anahtar, yaln\u0131zca bu istek do\u011fruysa yan\u0131t verir.<\/p>\n<p>B\u00f6ylece bu ileti\u015fimin her iki taraf\u0131 da iste\u011fin me\u015fru olup olmad\u0131\u011f\u0131n\u0131 anlar. Ayr\u0131ca, bu kimlik do\u011frulama mekanizmas\u0131 a\u00e7\u0131k anahtar kriptografisine dayanmaktad\u0131r. Bu nedenle t\u00fcm s\u00fcre\u00e7 sahtecilik, dinleme ve benzeri tehditlere kar\u015f\u0131 iyi korunmaktad\u0131r.<\/p>\n<div id=\"attachment_11589\" style=\"width: 3010px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2023\/08\/09123021\/types-of-two-factor-authentication-5-scaled-1-scaled.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-11589\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2023\/08\/09123021\/types-of-two-factor-authentication-5-scaled-1-scaled.jpg\" alt=\"FIDO U2F anahtarlar\u0131 \u015funlard\u0131r: Yubico YubiKey ve Google Titan (Feitian ePass)\" width=\"3000\" height=\"2435\" class=\"size-full wp-image-11589\"><\/a><p id=\"caption-attachment-11589\" class=\"wp-caption-text\">Bir \u00e7ift FIDO U2F anahtar\u0131 \u00f6rne\u011fi: Yubico YubiKey (solda) ve Google Titan (sa\u011fda)<\/p><\/div>\n<p>FIDO U2F anahtarlar\u0131n\u0131n \u00f6nemli bir avantaj daha vard\u0131r. Arkalar\u0131nda yatan teknoloji olduk\u00e7a karma\u015f\u0131k olmas\u0131na ve s\u0131k\u0131 bir kriptografi kullanmas\u0131na ra\u011fmen, y\u00fczeyde, yani kullan\u0131c\u0131n\u0131n bak\u0131\u015f a\u00e7\u0131s\u0131ndan, her \u015fey \u00e7ok basit g\u00f6r\u00fcn\u00fcr. Anahtar\u0131 bir USB soketine tak\u0131n (veya ak\u0131ll\u0131 telefonunuzu tutun; bu t\u00fcr anahtarlar genellikle <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/tr.wikipedia.org\/wiki\/NFC\">NFC\u2019yi<\/a> destekler) ve kimlik do\u011frulamay\u0131 tamamlamak i\u00e7in parma\u011f\u0131n\u0131zla anahtar\u0131n \u00fczerindeki sens\u00f6r pedine dokunun.<\/p>\n<p>U2F donan\u0131m anahtarlar\u0131n\u0131 kullanmak, g\u00fcn\u00fcm\u00fczde mevcut olan en g\u00fcvenilir kimlik do\u011frulama y\u00f6ntemidir ve \u00f6nemli hesaplar i\u00e7in \u00f6nerilen bir g\u00fcvenlik se\u00e7ene\u011fidir. Google\u2019da yapt\u0131klar\u0131 da tam olarak budur. T\u00fcm \u015firket \u00e7al\u0131\u015fanlar\u0131, <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/krebsonsecurity.com\/2018\/07\/google-security-keys-neutralized-employee-phishing\/\">be\u015f y\u0131l\u0131 a\u015fk\u0131n bir s\u00fcredir<\/a> kurumsal hesaplar\u0131 i\u00e7in bu t\u00fcr anahtarlar\u0131 kullanmaktad\u0131r.<\/p>\n<h2 id=\"passkeys\">FIDO Parolalar\u0131, <span style=\"text-decoration: line-through;\">gelecekteki<\/span> do\u011frulama ad\u0131mlar\u0131n\u0131n parolalar olmadan nas\u0131l ger\u00e7ekle\u015ftirilece\u011fine dair bize ipucu verir<\/h2>\n<p>Kurulu\u015funuzdaki t\u00fcm \u00e7al\u0131\u015fanlar\u0131n kimlik do\u011frulama i\u00e7in donan\u0131m anahtarlar\u0131 kullanmas\u0131n\u0131 sa\u011flamak kolay de\u011fildir, ancak yine de m\u00fcmk\u00fcnd\u00fcr. Yine de bu y\u00f6ntem, milyonlarca normal internet kullan\u0131c\u0131s\u0131 i\u00e7in pek uygun de\u011fildir. S\u0131radan insanlar, b\u0131rak\u0131n baz\u0131 \u00f6zel donan\u0131mlar i\u00e7in para \u00f6demeyi, yaln\u0131zca iki fakt\u00f6rl\u00fc kimlik do\u011frulama fikrinden bile rahats\u0131z olurlar.<\/p>\n<p>Bu nedenle, U2F anahtarlar\u0131n\u0131n yarat\u0131c\u0131s\u0131 olan FIDO Alliance, parolalar yerine \u201cge\u00e7i\u015f anahtarlar\u0131\u201d kullanan <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com.tr\/blog\/passkey-future-without-passwords\/10716\/\" rel=\"noopener\">yeni bir kimlik do\u011frulama standard\u0131<\/a> geli\u015ftirmi\u015ftir. Bu teknoloji, basit\u00e7e anlat\u0131lacak olursa, kimlik do\u011frulama verilerini depolamak i\u00e7in herhangi bir \u00f6zel cihaza ihtiya\u00e7 duymaman\u0131z d\u0131\u015f\u0131nda, U2F anahtarlar\u0131yla hemen hemen ayn\u0131d\u0131r.<\/p>\n<p>Parolalar\u0131 temelde herhangi bir yerde saklayabilirsiniz \u2014 ak\u0131ll\u0131 telefon, bilgisayar, taray\u0131c\u0131n\u0131n kullan\u0131c\u0131 profili veya daha da eski usul bir y\u00f6ntem olan USB anahtar\u0131. Benzersiz parola moduna ge\u00e7ti\u011finizde, parolalar\u0131 bulut arac\u0131l\u0131\u011f\u0131yla senkronize etmeyi veya hi\u00e7 senkronize etmemeyi se\u00e7ebilirsiniz.<\/p>\n<p>A\u00e7\u0131k\u00e7as\u0131, bu uzun depolama se\u00e7enekleri listesi, ge\u00e7i\u015f anahtarlar\u0131n\u0131n g\u00fcvenilirli\u011fini belli bir miktar d\u00fc\u015f\u00fcr\u00fcr. Ne kadar d\u00fc\u015f\u00fcrd\u00fc\u011f\u00fc, hangi ekipman ve hizmet kombinasyonunu kulland\u0131\u011f\u0131n\u0131za ba\u011fl\u0131d\u0131r.<\/p>\n<p>Bu dezavantaj\u0131n kar\u015f\u0131l\u0131\u011f\u0131nda kullan\u0131c\u0131lar ba\u015fka bir avantaj elde eder. <strong>Ge\u00e7i\u015f anahtarlar\u0131 hesap parolalar\u0131n\u0131 tamamlamaz, onlar\u0131n yerine ge\u00e7er<\/strong>. Bunun da \u00f6tesinde, bu t\u00fcr bir kimlik do\u011frulama hala \u00e7ok fakt\u00f6rl\u00fcd\u00fcr. Ge\u00e7i\u015f anahtarlar\u0131n\u0131z\u0131 saklayacak bir cihaz kullanman\u0131n yan\u0131 s\u0131ra, cihaz\u0131n\u0131z\u0131n kilidini a\u00e7mak i\u00e7in biyometri (cihaz\u0131n\u0131z destekliyorsa) veya PIN kullanarak oturum a\u00e7may\u0131 do\u011frulaman\u0131z gerekir. G\u00f6rd\u00fc\u011f\u00fcn\u00fcz gibi, baz\u0131 durumlarda parolalar\u0131 tamamen ortadan kald\u0131ramazs\u0131n\u0131z, ancak en az\u0131ndan ge\u00e7i\u015f anahtarlar\u0131 parola say\u0131s\u0131n\u0131 b\u00fcy\u00fck \u00f6l\u00e7\u00fcde azalt\u0131r.<\/p>\n<p>Bu giri\u015fimin temel sorunu, \u015fimdiye kadar yama i\u015fi yorgandan hallice bir izlenim vermesidir. Farkl\u0131 platformlar ve hizmetler, bir b\u00fct\u00fcn olarak veri depolama, kullan\u0131c\u0131 kimli\u011fi do\u011frulamas\u0131 ve g\u00fcvenlik i\u00e7in <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/authenticator-apps-compatibility\/47063\/\" rel=\"noopener nofollow\">\u00e7ok farkl\u0131 yakla\u015f\u0131mlar<\/a> kullan\u0131r. Bu nedenle, tek bir y\u00f6ntem yerine, g\u00fcvenilirlik a\u00e7\u0131s\u0131ndan b\u00fcy\u00fck farkl\u0131l\u0131klar g\u00f6steren birka\u00e7 farkl\u0131 y\u00f6ntem kullan\u0131l\u0131r.<\/p>\n<p>Bu sebeple, ge\u00e7i\u015f anahtarlar\u0131na tamamen ge\u00e7mek i\u00e7in hala biraz erken oldu\u011fu s\u00f6ylenebilir. Ancak bu anahtarlar\u0131 \u015fimdiden deneyebilirsiniz. Bir s\u00fcre \u00f6nce Google, <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/security.googleblog.com\/2023\/05\/so-long-passwords-thanks-for-all-phish.html\">ge\u00e7i\u015f anahtarlar\u0131n\u0131n Google hesaplar\u0131 taraf\u0131ndan tam olarak desteklendi\u011fini<\/a> duyurdu. Yani, art\u0131k ilgilenen herkes bu teknolojinin ger\u00e7ek hayatta nas\u0131l \u00e7al\u0131\u015ft\u0131\u011f\u0131n\u0131 g\u00f6rebilir.<\/p>\n<h2>Hangi iki fakt\u00f6rl\u00fc kimlik do\u011frulama y\u00f6ntemlerinin daha iyi oldu\u011fuyla ilgili son notlar ve hat\u0131rlanmas\u0131 gereken di\u011fer konular<\/h2>\n<p>Sonu\u00e7 olarak, kilit noktalar \u015funlard\u0131r:<\/p>\n<ul>\n<li>2023\u2019te iki fakt\u00f6rl\u00fc kimlik do\u011frulama art\u0131k bir l\u00fcks de\u011fil, hayati bir gerekliliktir. M\u00fcmk\u00fcn olan her yerde kullan\u0131lmal\u0131d\u0131r.<\/li>\n<li>Herhangi bir iki fakt\u00f6rl\u00fc kimlik do\u011frulama y\u00f6ntemi, hi\u00e7 bir kimlik koruma y\u00f6ntemi olmamas\u0131ndan \u00e7ok daha iyidir.<\/li>\n<li>Kimlik do\u011frulama uygulamalar\u0131, iki y\u00f6nl\u00fc kimlik do\u011frulama i\u00e7in idealdir.<\/li>\n<li>Bir FIDO U2F donan\u0131m anahtar\u0131 \u2014 Yubico YubiKey, Google Titan veya di\u011ferleri \u2014 bu i\u015f i\u00e7in daha da iyi bir se\u00e7enektir. \u00d6zellikle \u00f6nem derecesi y\u00fcksek hesaplar i\u00e7in.<\/li>\n<li>Ge\u00e7i\u015f anahtarlar\u0131n\u0131 \u015fimdiden deneyebilirsiniz, ancak bu teknolojiyi tamamen benimsemek i\u00e7in biraz erken g\u00f6r\u00fcn\u00fcyor.<\/li>\n<li>Bu nedenle, parolalar\u0131 dikkatli kullanmak hala hayati \u00f6nem ta\u015f\u0131yor. Karma\u015f\u0131k parolalar\u0131 tercih edin, birden \u00e7ok hizmet i\u00e7in ayn\u0131 parolay\u0131 yeniden kullanmay\u0131n ve bir parola y\u00f6neticisi kullanarak parolalar\u0131n\u0131z\u0131 g\u00fcvende tutun.<\/li>\n<li>Ve elbette, \u00e7o\u011fu iki fakt\u00f6rl\u00fc kimlik do\u011frulama y\u00f6nteminin (U2F ve ge\u00e7i\u015f anahtarlar\u0131 d\u0131\u015f\u0131nda) kimlik av\u0131na kar\u015f\u0131 savunmas\u0131z oldu\u011funu unutmay\u0131n. Bu nedenle, <a href=\"https:\/\/www.kaspersky.com.tr\/premium?icid=tr_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">Kaspersky Premium<\/a> gibi bu tehdidi otomatik olarak ortadan kald\u0131ran g\u00fcvenilir bir \u00e7\u00f6z\u00fcm kullan\u0131n.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-generic\">\n","protected":false},"excerpt":{"rendered":"<p>Piyasadaki iki fakt\u00f6rl\u00fc kimlik do\u011frulama t\u00fcrleri neler ve hangileri tercih edilmeli?<\/p>\n","protected":false},"author":2726,"featured_media":11587,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1284],"tags":[1624,2028,2552,2026,1575,2474,46],"class_list":{"0":"post-11585","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips","8":"tag-2fa","9":"tag-biyometri","10":"tag-fido","11":"tag-iki-faktorlu-kimlik-dogrulama","12":"tag-kimlik-dogrulama","13":"tag-kimlik-dogrulayicilar","14":"tag-sms"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/types-of-two-factor-authentication\/11585\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/types-of-two-factor-authentication\/25818\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/types-of-two-factor-authentication\/21259\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/types-of-two-factor-authentication\/28512\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/types-of-two-factor-authentication\/26117\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/types-of-two-factor-authentication\/26453\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/types-of-two-factor-authentication\/28937\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/types-of-two-factor-authentication\/27861\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/types-of-two-factor-authentication\/35584\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/types-of-two-factor-authentication\/48446\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/types-of-two-factor-authentication\/20751\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/types-of-two-factor-authentication\/21451\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/types-of-two-factor-authentication\/30271\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/types-of-two-factor-authentication\/34167\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/types-of-two-factor-authentication\/26434\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/types-of-two-factor-authentication\/32127\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/types-of-two-factor-authentication\/31810\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/2fa\/","name":"2FA"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/11585","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2726"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=11585"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/11585\/revisions"}],"predecessor-version":[{"id":11594,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/11585\/revisions\/11594"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/11587"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=11585"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=11585"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=11585"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}