{"id":4508,"date":"2017-12-11T10:02:23","date_gmt":"2017-12-11T07:02:23","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=4508"},"modified":"2019-11-15T14:45:57","modified_gmt":"2019-11-15T11:45:57","slug":"what-is-secure-os","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/what-is-secure-os\/4508\/","title":{"rendered":"G\u00fcvenli \u0130\u015fletim Sistemi (OS) nedir?"},"content":{"rendered":"<p>S\u0131k s\u0131k \u015fu soruyla kar\u015f\u0131la\u015f\u0131yorum: \u201c<a href=\"https:\/\/www.kaspersky.com.tr\/blog\/kaspersky-os-7-facts\/2981\/\" target=\"_blank\" rel=\"noopener\">D\u00fcnyada tamamen g\u00fcvenli bir \u015fey yoksa<\/a> KasperskyOS\u2019un g\u00fcvenli oldu\u011funu nas\u0131l s\u00f6yleyebilirsiniz?\u201d<\/p>\n<p>Cevap ise \u015fu: Bu iki \u015fey aras\u0131nda kocaman anlamsal bir fark var!<\/p>\n<p>Asl\u0131nda bu d\u00fcnyada<em> kesin bir siber g\u00fcvenlik yok<\/em> ve bunu herkes biliyor. B\u00fct\u00fcn g\u00fcvenlik sistemlerinin g\u00f6revi arzulanan %100\u2019e olabildi\u011fince yak\u0131n olmakt\u0131r ve siz buna yakla\u015ft\u0131k\u00e7a g\u00f6rev daha zor, daha yava\u015f ve daha pahal\u0131 hale gelir. Ola\u011fan %99,9 etkilili\u011fe ula\u015ft\u0131ktan sonra, kaynak t\u00fcketimiyle ve karma\u015f\u0131kl\u0131\u011f\u0131yla, bir sonraki y\u00fczdelerin her binde birinin \u00f6nceki \u00e7al\u0131\u015fmalar\u0131n t\u00fcm\u00fcne e\u015fit oldu\u011fu g\u00f6r\u00fcl\u00fcyor. Ancak \u00e7aba \u00f6nemlidir; bu t\u00fcr g\u00fcvenlik teknolojileri i\u00e7in b\u00fcy\u00fck pazarda g\u00fcvenli olmayan bir y\u00fczdenin binde birinin \u00f6ng\u00f6r\u00fclmeyen sonu\u00e7lar ve korkun\u00e7 hasarlarla bir felakete yol a\u00e7abilece\u011fi <a href=\"https:\/\/www.kaspersky.com.tr\/enterprise-security\/industrial\" target=\"_blank\" rel=\"noopener\">kritik altyap\u0131<\/a>, <a href=\"https:\/\/www.kaspersky.com\/blog\/connected-cars-secure-by-design\/16947\/\" target=\"_blank\" rel=\"noopener nofollow\">otomotiv<\/a>, <a href=\"https:\/\/os.kaspersky.com\/wp-content\/uploads\/sites\/11\/2017\/10\/Case_Study_Kraftway_router_A5_ENG.pdf?_ga=2.7858106.988645823.1512973750-1508076597.1475216580\" target=\"_blank\" rel=\"noopener nofollow\">a\u011f cihazlar\u0131<\/a> ve maksimum g\u00fcvenlik gerektiren ba\u015fka pek \u00e7ok alan bulunmaktad\u0131r.<\/p>\n<p>Ba\u015fka bir deyi\u015fle, g\u00fcvenli bir i\u015fletim sistemi %100\u2019e olabildi\u011fince yak\u0131n olmay\u0131 ama\u00e7lar; b\u00f6ylece siber sald\u0131r\u0131lar neredeyse imkans\u0131z olur veya en az\u0131ndan ekonomik olarak kar sa\u011flayamaz. Bu amaca ula\u015fmak i\u00e7in \u00e7aba g\u00f6steren KasperskyOS (KOS) benzersizdir. Ger\u00e7ekten tamamen g\u00fcvenli bir platform; \u015fimdi nedenini a\u00e7\u0131klayaca\u011f\u0131m.<\/p>\n<p>\u00d6zetle: KOS asl\u0131nda g\u00fcvenli bir mikro \u00e7ekirdek mimarisine dayanmaktad\u0131r. Ba\u015ftan Yasakl\u0131 kavram\u0131n\u0131 takiben korunan bir adres alan\u0131nda \u00e7al\u0131\u015f\u0131r ve m\u00fc\u015fterilerin i\u015fletme mant\u0131\u011f\u0131n\u0131 en k\u00fc\u00e7\u00fck detaylara kadar tan\u0131mlamas\u0131na olanak tan\u0131r. Sistem kompakt ve \u015feffaft\u0131r ve ayr\u0131ca hi\u00e7bir fazlal\u0131k i\u00e7ermez.<\/p>\n<p>A\u015fa\u011f\u0131da baz\u0131 detaylara ula\u015fabilirsiniz.<\/p>\n<h2>Mimari<\/h2>\n<p>\u201cElbise dolab\u0131, tiyatronun olmazsa olmaz\u0131d\u0131r\u201d derler, mimari de i\u015fletim sisteminin olmazsa olmaz\u0131d\u0131r.<\/p>\n<p>B\u00fct\u00fcn modern masa\u00fcst\u00fc ve mobil i\u015fletim sistemlerinin ve hatta bir\u00e7ok end\u00fcstriyel i\u015fletim sisteminin amac\u0131 nedir? Kullan\u0131labilirlik, \u00f6l\u00e7eklenebilirlik, i\u015flevsellik, tutarl\u0131l\u0131k ve tescilli olma. Her sat\u0131c\u0131 \u201cg\u00fcvenlik\u201d s\u00f6z\u00fc verir, ancak derine indi\u011finizde g\u00fcvenlikten eser bulamazs\u0131n\u0131z; bu t\u00fcr \u00fcr\u00fcnler, i\u00e7inde ger\u00e7ek teknoloji bar\u0131nd\u0131rmayan bir pazarlamadan \u00f6teye ge\u00e7mez.<\/p>\n<p>Fark, i\u015fletim sisteminin mimarisinde yat\u0131yor: G\u00fcvenli bir i\u015fletim sistemi, korunmas\u0131z sistemlerde bulunan klasik \u00e7ekirdek-uygulama-g\u00fcvenlik hiyerar\u015fisinin aksine, g\u00fcvenlik-\u00e7ekirdek-uygulama paradigmas\u0131na dayanmaktad\u0131r. KOS ekosistemi, \u00e7ekirdek ve uygulamalar\u0131n \u00e7al\u0131\u015fma y\u00f6ntemini tan\u0131mlayan temel siber g\u00fcvenlik ilkelerine dayanmaktad\u0131r.<\/p>\n<h2>\u00dc\u00e7\u00fcnc\u00fc halka<\/h2>\n<p>Temel yakla\u015f\u0131mlardan biri, i\u015fletim sistemi kodunun \u00e7o\u011funlu\u011funu, d\u00fc\u015f\u00fck ayr\u0131cal\u0131kl\u0131 bir adres alan\u0131na, \u00f6rne\u011fin x86 mimarisinde \u00fc\u00e7\u00fcnc\u00fc halkaya aktarmakt\u0131r.<\/p>\n<p>Bu, ilk bak\u0131\u015fta garip gelse de alt\u0131nda iyi bir neden yat\u0131yor: \u00dc\u00e7\u00fcnc\u00fc halka g\u00fcvenli bir adres alan\u0131 sa\u011flar. \u00dc\u00e7\u00fcnc\u00fc halkada kod eylemleri \u00fczerinde kontrol sa\u011flamak ve kodu d\u0131\u015f etkilerden korumak \u00e7ok daha kolayd\u0131r. Buradaki performanstaki ka\u00e7\u0131n\u0131lmaz d\u00fc\u015f\u00fc\u015f, kompaktl\u0131\u011fa dayal\u0131 h\u0131z (a\u015fa\u011f\u0131da mikro \u00e7ekirdek ayr\u0131nt\u0131lar\u0131na bakabilirsiniz) ve programlamadaki kusursuzlukla telafi edilir. Ayr\u0131ca kod daha \u015feffaf hale gelir ve b\u00f6ylece daha g\u00fcvenlidir.<\/p>\n<h2>Yasaklamamaya izin ver<\/h2>\n<p>Geleneksel i\u015fletim sistemi seviyesinde, <a href=\"https:\/\/securelist.com\/application-control-the-key-to-a-secure-network-part-1\/36746\/#7\" target=\"_blank\" rel=\"noopener\">Ba\u015ftan Yasakl\u0131 (Default Deny)<\/a> kavram\u0131 uzun s\u00fcredir uygulanmaktad\u0131r ve \u00e7e\u015fitli senaryolarda ba\u015far\u0131yla kullan\u0131lmaktad\u0131r. Bir\u00e7ok sistemin g\u00fcvenli\u011fini artt\u0131rmak i\u00e7in kullan\u0131lan ve iyi bilinen bir y\u00f6ntem olarak bu, yeterince etkilidir.<\/p>\n<p>KasperskyOS\u2019da, sistem seviyesinde Ba\u015ftan Yasakl\u0131 kavram\u0131n\u0131 uygulad\u0131k. Bu g\u00fcvenli i\u015fletim sistemindeki t\u00fcm i\u015flemler varsay\u0131lan olarak yasaklanm\u0131\u015ft\u0131r. M\u00fc\u015fteriler uygulama s\u0131ras\u0131nda kendi g\u00fcvenlik politikalar\u0131n\u0131 olu\u015fturarak baz\u0131 i\u015fletme zorluklar\u0131n\u0131 kar\u015f\u0131layan belirli eylemlere izin vermek i\u00e7in \u00e7e\u015fitli kurallar tan\u0131mlar. Bir ba\u015fka deyi\u015fle g\u00fcvenlik politikas\u0131, alt\u0131nda her bir sistemin \u00e7al\u0131\u015ft\u0131\u011f\u0131 bir kurallar b\u00fct\u00fcn\u00fcd\u00fcr. Bu politika, trafi\u011fi y\u00f6neten kurallara benzer fakat buna \u00f6nemli bir istisna mevcut: Bu kurallar\u0131 ihlal etmek m\u00fcmk\u00fcn de\u011fil. Yani KOS, nitelik bak\u0131m\u0131ndan daha y\u00fcksek bir koruma sa\u011flar.<\/p>\n<h2>Do\u011fru mikro y\u00f6netim<\/h2>\n<p>KasperskyOS\u2019un kullan\u0131c\u0131 eylem kurallar\u0131 olduk\u00e7a esnek, etkileyici ve ayr\u0131nt\u0131l\u0131d\u0131r. \u0130\u015flemler aras\u0131 ileti\u015fimin niteli\u011fi ve sistem hizmetleri, a\u011f protokolleri, i\u015fletim sistemi mod\u00fclleri ve uygulamalar\u0131n\u0131n kullan\u0131m\u0131 da dahil olmak \u00fczere belirli g\u00fcvenlik gereksinimlerini elde etmek i\u00e7in gerekirse en k\u00fc\u00e7\u00fck ayr\u0131nt\u0131ya kadar \u00e7ok \u00f6zel bir mant\u0131k tan\u0131mlayabilirsiniz. Tan\u0131mlanan mant\u0131\u011f\u0131n d\u0131\u015f\u0131nda kalan t\u00fcm i\u015flemler otomatik olarak engellenir. Sistem yaln\u0131zca a\u00e7\u0131k\u00e7a izin verilen i\u015flemleri ger\u00e7ekle\u015ftirir.<\/p>\n<h2>Az\u0131 karar, \u00e7o\u011fu zarar<\/h2>\n<p>Bir g\u00fcn <a href=\"https:\/\/www.embedded-world.de\/en\" target=\"_blank\" rel=\"noopener nofollow\">Embedded World<\/a>\u2018de bir \u015firket, yaz\u0131l\u0131m\u0131n\u0131n \u201cy\u00fcz milyon sat\u0131rl\u0131k kod ile \u00e7al\u0131\u015fan\u201d bir araba geli\u015ftirmesiyle \u00f6v\u00fcnd\u00fc; bu durum beni \u00e7ok \u015fa\u015f\u0131rtt\u0131. Asl\u0131nda kod say\u0131s\u0131 ne kadar fazlaysa yaratt\u0131\u011f\u0131 potansiyel g\u00fcvenlik a\u00e7\u0131klar\u0131 nedeniyle \u00fcr\u00fcn de o kadar tehlikeli olur. Kural olarak, b\u00f6yle bir \u00fcr\u00fcn\u00fcn denetimi kolay de\u011fildir, \u00fcr\u00fcn\u00fcn kaynak yo\u011funlu\u011fu ve h\u0131z\u0131 d\u00fc\u015fer ve bir tak\u0131m di\u011fer olumsuz yan etkiler de beraberinde gelir. Son olarak, kod boyutu programlama becerisinin bir \u00f6l\u00e7\u00fcs\u00fcd\u00fcr; d\u00fczenli, \u00f6zl\u00fc kod \u00e7ok karma\u015f\u0131k g\u00f6revleri bile yerine getirebilir.<\/p>\n<p>KOS\u2019un \u00e7ekirde\u011findeki sat\u0131r say\u0131s\u0131 yaln\u0131zca 1500 civar\u0131ndad\u0131r. Yanl\u0131\u015f okumad\u0131n\u0131z: \u0130\u015fletim sistemi \u00e7ekirde\u011finin t\u00fcm mant\u0131\u011f\u0131n\u0131 yaln\u0131zca 1500 sat\u0131r tan\u0131ml\u0131yor. \u0130kincisi, i\u015flemcilerle (Intel, ARM, MIPS) ba\u011flant\u0131l\u0131d\u0131r ve s\u00fcr\u00fcc\u00fcler, sistem yard\u0131mc\u0131 programlar\u0131, aray\u00fcz ve i\u015f uygulamalar\u0131 en \u00fcst s\u0131rada yer almaktad\u0131r. KOS\u2019a mikro \u00e7ekirdek i\u015fletim sistemi diyoruz, ancak bu \u00e7ekirdek boyutuyla buna bir nano \u00e7ekirdek i\u015fletim sistemi de denilebilir.<\/p>\n<h2>Temiz hava<\/h2>\n<p>Son y\u0131llarda jeopolitik t\u00fcrb\u00fclans, bili\u015fim sekt\u00f6r\u00fcne ciddi bir g\u00fcven eksikli\u011fi yaratt\u0131. Paranoya, siber casusluk i\u00e7in ticari yaz\u0131l\u0131mlar kullanan ve ayn\u0131 anda her yerde olabilen devlet korsanlar\u0131 ile olduk\u00e7a yayg\u0131n gizli h\u00fckumet operasyonlar\u0131 hakk\u0131ndaki korkular\u0131 besler. Baz\u0131 \u015firketler daha fazla gizlilik <a href=\"https:\/\/www.reuters.com\/article\/us-usa-cyber-russia-mcafee\/mcafee-says-it-no-longer-will-permit-government-source-code-reviews-idUSKBN1CV2MP\" target=\"_blank\" rel=\"noopener nofollow\">talep ediyor<\/a>, ancak \u015fu zaman\u0131n makul <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/even-more-transparency\/4353\/\" target=\"_blank\" rel=\"noopener\">a\u00e7\u0131kl\u0131k zaman\u0131<\/a> oldu\u011funa inan\u0131yoruz. KasperskyOS, \u00e7ekirdek kompaktl\u0131\u011f\u0131 ve \u015feffafl\u0131\u011f\u0131 sayesinde bu giri\u015fime m\u00fckemmel uyum sa\u011flar.<\/p>\n<p>Neden \u00fcr\u00fcn kaynak kodunu a\u00e7maktan korkmuyoruz?<\/p>\n<p>\u00d6ncelikle, saklayacak bir \u015feyimiz yok. \u0130kinci olarak, herhangi bir zay\u0131f noktan\u0131n tespiti bizi mutlu eder; d\u00fczeltmeler \u00fcr\u00fcnlerimizi daha da g\u00fcvenilir hale getirir. \u00dc\u00e7\u00fcnc\u00fc olarak, KOS\u2019un \u00e7ekirde\u011fi defalarca test edildi ve \u015fimdiye tek bir hata ya da a\u00e7\u0131klanmam\u0131\u015f prosed\u00fcr bile g\u00f6zlemlenmedi. Eminim son zamanlarda ba\u015flatt\u0131\u011f\u0131m\u0131z \u015feffafl\u0131k giri\u015fimi bunu bir kez daha teyit edecektir. Son olarak, kaynak kodun g\u00f6zlemlenmesi, g\u00fcvenlik a\u00e7\u0131\u011f\u0131 alg\u0131laman\u0131n bir ko\u015fulu de\u011fildir, \u00e7o\u011fu durumda g\u00fcvenlik eksiklikleri di\u011fer yollarla bulunur.<\/p>\n<h2>Her \u015fey karar\u0131nda<\/h2>\n<p>Yaz\u0131l\u0131m piyasas\u0131, onlarca y\u0131ld\u0131r bir \u00e7e\u015fit i\u015flevsellik yar\u0131\u015f\u0131na giriyor. Daha fazla d\u00fc\u011fme, \u00f6zellik ve avantaj\u0131n yeni bir s\u00fcr\u00fcm\u00fcn bas\u0131n b\u00fcltenlerine girmesi insanlar\u0131 mest etse de, bir\u00e7ok ki\u015finin bunlar\u0131 hi\u00e7 kullanmad\u0131\u011f\u0131 a\u00e7\u0131\u011fa \u00e7\u0131kt\u0131\u011f\u0131nda bu co\u015fku kaybolur. \u0130\u015fte inan\u0131lmaz bir <a href=\"https:\/\/answers.microsoft.com\/en-us\/office\/forum\/office_2010-office_install\/what-is-the-percentage-of-features-of-word-excel\/80e417ef-8336-49a5-9f5f-0a59c8c8fbd4?auth=1\" target=\"_blank\" rel=\"noopener nofollow\">\u00f6rnek<\/a>: Sadece be\u015f Word komutu, toplam kullan\u0131m\u0131n \u00fc\u00e7te birini olu\u015fturuyor. Sizce hi\u00e7 kimsenin kullanmad\u0131\u011f\u0131 ka\u00e7 tane komut vard\u0131r?<\/p>\n<p>Her yeni \u00f6zellik; g\u00fcvenlik a\u00e7\u0131\u011f\u0131, performans ve hataya dayan\u0131kl\u0131l\u0131\u011f\u0131n azalmas\u0131, y\u00f6netim karma\u015f\u0131kl\u0131\u011f\u0131 ve daha fazlas\u0131 da dahil olmak \u00fczere bir dizi tehlikeyi i\u00e7ermektedir. KasperskyOS, her \u015fey karar\u0131nda dedi\u011fimiz bir ilkeyle \u00e7al\u0131\u015f\u0131r. \u0130\u015fletim sistemi basit, temiz ve \u015feffaft\u0131r. \u00dcstelik <a href=\"https:\/\/www.kaspersky.com\/blog\/security-within-kaspersky-lab-launches-kaspersky-security-system\/15190\/\" target=\"_blank\" rel=\"noopener nofollow\">belirli uygulamalarda<\/a> di\u011fer i\u015fletim sistemlerine ve uygulamalar\u0131na gereksiz olan i\u015flevselli\u011fin kesilmesine yard\u0131mc\u0131 olur ve yaln\u0131zca a\u00e7\u0131klanan i\u015flevlerin eski platformlarda (eski SCADA sistemleri gibi) uygulanmas\u0131n\u0131 sa\u011flar.<\/p>\n<p>Daha fazla bilgi i\u00e7in \u015furaya t\u0131klay\u0131n: <a href=\"https:\/\/os.kaspersky.com\/\" target=\"_blank\" rel=\"noopener nofollow\">KasperskyOS<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>S\u0131k s\u0131k \u015fu soruyla kar\u015f\u0131la\u015f\u0131yorum: &#8220;D\u00fcnyada tamamen g\u00fcvenli bir \u015fey yoksa KasperskyOS&#8217;un g\u00fcvenli oldu\u011funu nas\u0131l s\u00f6yleyebilirsiniz?&#8221;<\/p>\n","protected":false},"author":2464,"featured_media":4509,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1194,1727],"tags":[629,1373,1063],"class_list":{"0":"post-4508","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-iot","10":"tag-kasperskyos","11":"tag-nesnelerin-interneti"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/what-is-secure-os\/4508\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/what-is-secure-os\/11914\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/what-is-secure-os\/9918\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/what-is-secure-os\/14155\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/what-is-secure-os\/12350\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/what-is-secure-os\/12150\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/what-is-secure-os\/20312\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/what-is-secure-os\/8586\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/what-is-secure-os\/8950\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/what-is-secure-os\/18888\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/what-is-secure-os\/19139\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/what-is-secure-os\/19131\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/iot\/","name":"IoT"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/4508","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2464"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=4508"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/4508\/revisions"}],"predecessor-version":[{"id":6995,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/4508\/revisions\/6995"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/4509"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=4508"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=4508"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=4508"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}