{"id":4503,"date":"2017-12-08T10:28:30","date_gmt":"2017-12-08T07:28:30","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=4503"},"modified":"2019-11-15T14:46:02","modified_gmt":"2019-11-15T11:46:02","slug":"internet-of-vulnerabilities","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/internet-of-vulnerabilities\/4503\/","title":{"rendered":"Korunmas\u0131z Nesnelerin \u0130nterneti"},"content":{"rendered":"<p>\u00c7ok say\u0131da ak\u0131ll\u0131 saat, kahve makinesi, elektrikli s\u00fcp\u00fcrge ve hatta araba, art\u0131k sevgi ve g\u00fcvenimizin artmakta oldu\u011fu ba\u011fl\u0131 cihazlar i\u00e7in kapsay\u0131c\u0131 bir terim olan Nesnelerin \u0130nterneti\u2019nin (IoT) bir par\u00e7as\u0131. IoT, en az\u0131ndan teoride hayat\u0131m\u0131z\u0131 daha kolay ve elveri\u015fli k\u0131lar; artan pop\u00fclerli\u011finin sebebi budur.<\/p>\n<p>Fakat madalyonun bir de ters y\u00fcz\u00fc var: g\u00fcvenlik. Ne yaz\u0131k ki, \u00fcreticiler \u0130nternet ba\u011flant\u0131l\u0131 cihazlar\u0131n g\u00fcvenli\u011fi i\u00e7in gerekti\u011fi kadar endi\u015fe duymuyor; bu nedenle neredeyse b\u00fct\u00fcn \u201cak\u0131ll\u0131\u201d cihazlar korunmas\u0131z ve potansiyel olarak tehlikeli. Kaspersky Lab, IoT\u2019daki tehditleri ara\u015ft\u0131rd\u0131.<\/p>\n<h2>IoT tehlikeli mi?<\/h2>\n<p>IoT cihazlar\u0131n\u0131n g\u00fcvenli\u011fi genelde zay\u0131ft\u0131r ve devre d\u0131\u015f\u0131 b\u0131rakmak olduk\u00e7a kolayd\u0131r. Su\u00e7lular \u015fu konuda avantaj sa\u011flad\u0131klar\u0131 i\u00e7in mutlu: IoT\u2019a sald\u0131ran zararl\u0131 programlar\u0131n say\u0131s\u0131 bu y\u0131l <a href=\"https:\/\/securelist.com\/honeypots-and-the-internet-of-things\/78751\/\" target=\"_blank\" rel=\"noopener\">iki kattan fazla<\/a> artt\u0131. D\u00fcnya \u00e7ap\u0131nda ak\u0131ll\u0131 cihazlar\u0131n say\u0131s\u0131 6 milyara ula\u015ft\u0131 ve bu cihazlar\u0131n \u00e7o\u011fu korunmas\u0131z durumda, b\u00f6ylece telefonlar davetsiz misafirlerin i\u015ftah\u0131n\u0131 kabartan birer av haline geliyor.<\/p>\n<p>Hacklenmi\u015f IoT cihazlar\u0131 <a href=\"https:\/\/tr.wikipedia.org\/wiki\/Denial-of-service_attack\" target=\"_blank\" rel=\"noopener nofollow\">DDoS sald\u0131r\u0131lar\u0131<\/a> i\u00e7in kullan\u0131labilir, b\u00f6ylece \u00e7ok say\u0131da birle\u015fik g\u00fcce meydan okur: kablosuz a\u011f y\u00f6nlendiricilerinin bir sunucuya girip zarar vermesi gibi. Buna tam da \u00fcnl\u00fc <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/attack-on-dyn-explained\/2629\/\" target=\"_blank\" rel=\"noopener\">Mirai<\/a> <a href=\"https:\/\/tr.wikipedia.org\/wiki\/Botnet\" target=\"_blank\" rel=\"noopener nofollow\">botnet<\/a>\u2018in neredeyse bir y\u0131l \u00f6nce d\u00fcnyadaki onlarca b\u00fcy\u00fck Web servisine zarar vermesi \u00f6rnek verilebilir.<\/p>\n<p>\u0130nternete ba\u011fl\u0131 ak\u0131ll\u0131 cihazlardan bir tek botnetler faydalanm\u0131yor. \u00d6rne\u011fin; ak\u0131ll\u0131 bir kameray\u0131 hack\u2019leyen bir sald\u0131rgan, kameran\u0131n <a href=\"https:\/\/www.kaspersky.com\/blog\/massive-webcam-breach\/6833\/\" target=\"_blank\" rel=\"noopener nofollow\">sahibine casusluk yapmaya<\/a> ba\u015flayabilir. IoT\u2019da hi\u00e7bir \u015fey kutsal de\u011fildir, hatta \u00e7ocuklar\u0131n oyuncaklar\u0131 da buna dahil. Siber su\u00e7lular, bir \u00e7ocu\u011fun \u00e7ok sevdi\u011fi Furby veya oyuncak ay\u0131 k\u0131l\u0131\u011f\u0131na girerek \u00e7ocukla konu\u015fmak i\u00e7in korunmas\u0131z bir Bluetooth ba\u011flant\u0131s\u0131n\u0131 <a href=\"https:\/\/www.cnet.com\/news\/smart-toys-have-big-security-flaws-consumer-report-finds\/\" target=\"_blank\" rel=\"noopener nofollow\">k\u00f6t\u00fcye kullanabilir<\/a> veya bir <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/my-friend-cayla-risks\/2984\/\" target=\"_blank\" rel=\"noopener\">oyuncak bebek yard\u0131m\u0131yla<\/a> \u00e7ocu\u011funuzu g\u00f6zetleyebilir.<\/p>\n<p>Son olarak, baz\u0131 su\u00e7lular IoT cihazlar\u0131n\u0131 bozup \u00e7al\u0131\u015fmaz hale getirebilir. <a href=\"https:\/\/threatpost.com\/iot-malware-activity-already-more-than-doubled-2016-numbers\/126350\/\" target=\"_blank\" rel=\"noopener nofollow\">BrickerBot worm<\/a> bu \u015fekilde i\u015fliyordu. Sald\u0131r\u0131ya u\u011frayan cihazlar sadece plastik ve metal y\u0131\u011f\u0131n\u0131na d\u00f6n\u00fc\u015ft\u00fc.<\/p>\n<h2>D\u00fc\u015fman\u0131n\u0131z\u0131 tan\u0131y\u0131n<\/h2>\n<p>Kaspersky Lab sekiz ak\u0131ll\u0131 cihaz i\u00e7in g\u00fcvenlik kontrol\u00fc yapmaya karar verdi: ak\u0131ll\u0131 bir \u015farj cihaz\u0131, uygulama kontroll\u00fc ve web kameras\u0131 ile donat\u0131lm\u0131\u015f oyuncak araba, ak\u0131ll\u0131 ev sistemleri i\u00e7in al\u0131c\u0131-verici, ak\u0131ll\u0131 \u00f6l\u00e7ek, elektrikli s\u00fcp\u00fcrge, \u00fct\u00fc (evet, ak\u0131ll\u0131 \u00fct\u00fc!), kamera ve saat.<\/p>\n<p>Sonu\u00e7lar pek i\u00e7 a\u00e7\u0131c\u0131 de\u011fildi. Sekiz cihazdan yaln\u0131zca bir tanesi yeterince g\u00fcvenliydi, kalan cihazlar ise g\u00fcvenilir bir koruma g\u00f6stermedi. Bir\u00e7o\u011fu baz\u0131 durumlarda de\u011fi\u015ftirilmesi bile m\u00fcmk\u00fcn olmayan varsay\u0131lan \u015fifreleri kullan\u0131yordu, di\u011ferleri ise gizli bilgileri ele ge\u00e7irmeye a\u00e7\u0131k \u015fekilde b\u0131rakm\u0131\u015ft\u0131.<\/p>\n<p>Uzmanlar\u0131m\u0131z taraf\u0131ndan incelenen di\u011fer ak\u0131ll\u0131 \u015feylerin aras\u0131nda pop\u00fcler bir \u201ccasus\u201d oyunca\u011f\u0131 da vard\u0131: telefon uygulamas\u0131ndan kontrol edilen ve dahili kameras\u0131 olan bir araba. Telefona ba\u011flanmak i\u00e7in \u015fifre bile gerekmiyordu, b\u00f6ylece araba isteyen herkes taraf\u0131ndan kontrol edilebiliyordu. Bu tekerlekli casus, ses ve video kayd\u0131 yaparak su\u00e7lular\u0131n cihaz\u0131n sahibi hakk\u0131nda \u015fantaj malzemesi toplamas\u0131na olanak sa\u011fl\u0131yor.<\/p>\n<h2>IoT d\u00fcnyas\u0131nda hayatta kalman\u0131n yollar\u0131<\/h2>\n<p>Ak\u0131ll\u0131 cihazlar\u0131 kullan\u0131rken g\u00fcvende olman\u0131z i\u00e7in birka\u00e7 tavsiye:<\/p>\n<p>Sat\u0131n almadan \u00f6nce avantajlar\u0131 ve dezavantajlar\u0131 kar\u015f\u0131la\u015ft\u0131r\u0131n. Almay\u0131 d\u00fc\u015f\u00fcnd\u00fc\u011f\u00fcn\u00fcz cihaza daha \u00f6nce yap\u0131lan sald\u0131r\u0131lar\u0131 ara\u015ft\u0131r\u0131n. Belki de \u0130nternet\u2019te bu cihazla ilgili hack\u2019leme hikayeleri vard\u0131r.<\/p>\n<p>Varsay\u0131lan \u015fifreyi her zaman daha karma\u015f\u0131k bir \u015fifreyle de\u011fi\u015ftirin. Cihaz \u015fifreyi de\u011fi\u015ftirmenize izin vermiyorsa ger\u00e7ekten bu cihaza ihtiyac\u0131n\u0131z olup olmad\u0131\u011f\u0131n\u0131 bir kere daha d\u00fc\u015f\u00fcn\u00fcn.<\/p>\n<p>Hala cihaz\u0131 sat\u0131n almak istiyorsan\u0131z sald\u0131r\u0131 riskini azaltacak yollar\u0131 d\u00fc\u015f\u00fcn\u00fcn. Kaspersky Lab, ak\u0131ll\u0131 cihazlar i\u00e7in \u00fccretsiz bir g\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fc olan <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/kaspersky-iot-scanner-2\/4208\/\" target=\"_blank\" rel=\"noopener\">Kaspersky IoT Scanner<\/a>\u2018\u0131n beta s\u00fcr\u00fcm\u00fcn\u00fc piyasaya s\u00fcrd\u00fc. Kaspersky IoT Taray\u0131c\u0131s\u0131 evinizdeki kablosuz a\u011f ba\u011flant\u0131s\u0131n\u0131 kontrol eder, hangi cihazlar\u0131n internete ba\u011fl\u0131 oldu\u011funu tespit eder ve bunlar\u0131n g\u00fcvenli bir \u015fekilde korunup korunmad\u0131\u011f\u0131n\u0131 ortaya \u00e7\u0131kar\u0131r.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00c7ok say\u0131da ak\u0131ll\u0131 saat, kahve makinesi, elektrikli s\u00fcp\u00fcrge ve hatta araba, art\u0131k sevgi ve g\u00fcvenimizin artmakta oldu\u011fu ba\u011fl\u0131 cihazlar i\u00e7in kapsay\u0131c\u0131 bir terim olan Nesnelerin \u0130nterneti&#8217;nin (IoT) bir par\u00e7as\u0131. IoT, en az\u0131ndan teoride hayat\u0131m\u0131z\u0131 daha kolay ve elveri\u015fli k\u0131lar; artan pop\u00fclerli\u011finin sebebi budur.<\/p>\n","protected":false},"author":40,"featured_media":4504,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1287],"tags":[1350,744,628,629,1063,551],"class_list":{"0":"post-4503","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-akilli-ev","9":"tag-guvenlik","10":"tag-internet-of-things","11":"tag-iot","12":"tag-nesnelerin-interneti","13":"tag-urunler-2"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/internet-of-vulnerabilities\/4503\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/internet-of-vulnerabilities\/11909\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/internet-of-vulnerabilities\/9913\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/internet-of-vulnerabilities\/14151\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/internet-of-vulnerabilities\/12343\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/internet-of-vulnerabilities\/12147\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/internet-of-vulnerabilities\/14897\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/internet-of-vulnerabilities\/14761\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/internet-of-vulnerabilities\/19265\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/internet-of-vulnerabilities\/20303\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/internet-of-vulnerabilities\/9826\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/internet-of-vulnerabilities\/8581\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/internet-of-vulnerabilities\/15385\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/internet-of-vulnerabilities\/8957\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/internet-of-vulnerabilities\/18858\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/internet-of-vulnerabilities\/19135\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/internet-of-vulnerabilities\/19127\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/akilli-ev\/","name":"ak\u0131ll\u0131 ev"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/4503","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=4503"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/4503\/revisions"}],"predecessor-version":[{"id":6996,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/4503\/revisions\/6996"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/4504"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=4503"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=4503"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=4503"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}