{"id":4899,"date":"2018-05-04T14:41:42","date_gmt":"2018-05-04T11:41:42","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=4899"},"modified":"2019-11-15T14:41:54","modified_gmt":"2019-11-15T11:41:54","slug":"rogue-one-analysis","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/rogue-one-analysis\/4899\/","title":{"rendered":"Rogue One \u2014 bir siber g\u00fcvenlik de\u011ferlendirmesi"},"content":{"rendered":"<p>Ge\u00e7en y\u0131l Y\u0131ld\u0131z Sava\u015flar\u0131 4. B\u00f6l\u00fcmde ge\u00e7en bir <a href=\"https:\/\/www.kaspersky.com\/blog\/star-wars-cybersecurity-problems\/6392\/\" target=\"_blank\" rel=\"noopener nofollow\">olay\u0131 analiz etmi\u015ftik<\/a>. Ancak, daha o zamanlar \u00d6l\u00fcm Y\u0131ld\u0131z\u0131\u2019n\u0131n yok olmas\u0131na yol a\u00e7an g\u00fcvenlik hatalar\u0131n\u0131n buz da\u011f\u0131n\u0131n g\u00f6r\u00fcnen y\u00fcz\u00fc oldu\u011fu hissine kap\u0131lm\u0131\u015ft\u0131k. \u0130mparatorlu\u011fun g\u00fcvelik sistemleriyle olan sorunlar\u0131 daha \u00e7ok galaksiye \u00f6zg\u00fc niteliktedir. Neyse ki, Lucasfilm\u2019den gelen ara\u015ft\u0131rmac\u0131lar bu olay\u0131n \u00f6ncesindeki olaylar\u0131n ayr\u0131nt\u0131l\u0131 bir incelemesini yap\u0131p Rogue One: Bir Star Wars Hikayesi ad\u0131 alt\u0131nda yay\u0131nlad\u0131. Bu video dok\u00fcman\u0131n\u0131n ortaya \u00e7\u0131kard\u0131klar\u0131n\u0131 burada bulabilirsiniz.<\/p>\n<h2>G\u00fcvenlik \u0130K ile ba\u015flar<\/h2>\n<p>Rogue One, \u0130mparatorluk Ordusu yenilik\u00e7i projeler ba\u015fkan\u0131, Orson Krennic, ve \u00fcst geli\u015ftirme uzman\u0131 Galen Erso\u2019yu ke\u015ffeden bir \u0130K uzmanlar\u0131 ekibinin \u00d6l\u00fcm Y\u0131ld\u0131z\u0131 s\u00fcper-silah projesi \u00fczerinde \u00e7al\u0131\u015fmas\u0131yla a\u00e7\u0131l\u0131r. Erso hakk\u0131nda neler biliyoruz? Birincisi, istifas\u0131n\u0131 sunmadan \u00f6nce proje \u00fczerinde \u00e7al\u0131\u015f\u0131r. \u0130kincisi, geri d\u00f6nmek i\u00e7in bir acelesi yoktur Ancak, \u0130mparatorluk \u0130K ona reddedemeyece\u011fi bir teklifte bulunur ve b\u00f6ylece geri d\u00f6ner. Daha sonra Krennic, Erso\u2019nun s\u0131zd\u0131r\u0131lan planlar\u0131n kayna\u011f\u0131 olan bir end\u00fcstriyel casus oldu\u011funu anlar.<\/p>\n<p>B\u00f6yle bir ki\u015finin, kesinlikle hassas bilgilerle \u00e7al\u0131\u015fmas\u0131na izin verilmemesi ya da hi\u00e7 i\u015fe al\u0131nmamas\u0131 gerekirdi. Bu durum, \u0130K ekibinin i\u015fe al\u0131m safhas\u0131nda hemen anlayabilece\u011fi bir \u015fey olmal\u0131yd\u0131. Ancak riskleri saptayamad\u0131lar. Zaman\u0131nda yap\u0131lan g\u00fcvenlik fark\u0131ndal\u0131k e\u011fitimi, tarama s\u00fcrecinde k\u0131rm\u0131z\u0131 bayraklar\u0131 tespit etmelerine yard\u0131mc\u0131 olabilirdi.<\/p>\n<table style=\"border-bottom: 0;border-collapse: inherit\" border=\"0\">\n<tbody>\n<tr>\n<td style=\"border-top: 0\" colspan=\"2\"><b>Andrey Nikishin, \u00d6zel Projeler Direkt\u00f6r\u00fc, Gelecek Teknolojileri, Kaspersky Lab<\/b><\/td>\n<\/tr>\n<tr>\n<td style=\"border-top: 0\"><img decoding=\"async\" class=\"alignnone size-thumbnail wp-image-22274\" style=\"width: 72px;max-width: none\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2018\/05\/03083304\/nikishin-150x150.png\" alt=\"\"><\/td>\n<td style=\"border: 1px solid #ddd;border-top: none;padding: 20px\">Yukar\u0131daki durumun uyduruldu\u011funu d\u00fc\u015f\u00fcn\u00fcyorsan\u0131z, tamamen yan\u0131ld\u0131n\u0131z. \u0130nsan fakt\u00f6r\u00fc ve yetersiz siber g\u00fcvenlik e\u011fitimi, end\u00fcstriyel tesislerdeki \u00e7o\u011fu kazan\u0131n sebebidir.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>Eadu\u2019daki s\u00fcper gizli laboratuvar<\/h2>\n<p>Galen Erso, Eadu gezegeninde bir siber kristal i\u015fleme tesisine g\u00f6t\u00fcr\u00fcl\u00fcr. Buras\u0131, s\u00fcper gizli bir askeri projede \u00e7al\u0131\u015fmas\u0131 i\u00e7in bask\u0131 yap\u0131ld\u0131\u011f\u0131, Gulag-tarz\u0131\u201d<a href=\"https:\/\/en.wikipedia.org\/wiki\/Sharashka\" target=\"_blank\" rel=\"noopener nofollow\">bir deneysel tasar\u0131m b\u00fcrosudur<\/a>\u201c. S\u00f6yledi\u011fimiz gibi, Erso\u2019yu gizli bir projede g\u00f6revlendirmek aptalcad\u0131r. Ancak hi\u00e7bir denetleme yapmadan onu orada \u00e7al\u0131\u015ft\u0131rmak daha aptalcad\u0131r. Erso, \u00d6l\u00fcm Y\u0131ld\u0131z\u0131\u2019nda bir <a href=\"https:\/\/securelist.com\/threats\/vulnerability-glossary\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener\">g\u00fcvenlik a\u00e7\u0131\u011f\u0131<\/a> olu\u015fturur.<\/p>\n<p>Karma\u015f\u0131k projelerde, \u00f6zellikle \u00f6nemli altyap\u0131lar olu\u015ftururken in\u015faata ba\u015flamadan \u00f6nce, yerle\u015ftirilecek nesneler i\u00e7in ayr\u0131 bir proje analizi yapmak olduk\u00e7a \u00f6nemlidir. Hem de tak\u0131mda b\u00f6yle \u015f\u00fcpheci ve ho\u015fnutsuz bir \u00e7al\u0131\u015fanla.<\/p>\n<table style=\"border-bottom: 0;border-collapse: inherit\" border=\"0\">\n<tbody>\n<tr>\n<td style=\"border-top: 0\" colspan=\"2\"><b>Andrey Nikishin, \u00d6zel Projeler Direkt\u00f6r\u00fc, Gelecek Teknolojileri, Kaspersky Lab<\/b><\/td>\n<\/tr>\n<tr>\n<td style=\"border-top: 0\"><img decoding=\"async\" class=\"alignnone size-thumbnail wp-image-22274\" style=\"width: 72px;max-width: none\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2018\/05\/03083304\/nikishin-150x150.png\" alt=\"\"><\/td>\n<td style=\"border: 1px solid #ddd;border-top: none;padding: 20px\">G\u00fcvenli yaz\u0131l\u0131m geli\u015ftirme i\u00e7in kulland\u0131\u011f\u0131m\u0131z modern y\u00f6ntemlerin, \u0130mparatorluk geli\u015ftiricileri taraf\u0131ndan bilindi\u011finden %100 eminim. Peki, neden bunlar\u0131 uygulamad\u0131lar? Muhtemelen bug\u00fcn\u00fcn yaz\u0131l\u0131m geli\u015ftiricileri ile ayn\u0131 sebepten: Odak noktalar\u0131 ba\u015fka bir yerde. \u00d6l\u00fcm Y\u0131ld\u0131z\u0131, ortaya \u00e7\u0131kabilecek sonu\u00e7lar\u0131n en iyi \u00f6rneklerinden biridir.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>G\u00fcvenlik de\u011ferlendirmesi eksi\u011fi yeni bir \u015fey de\u011fildir. D\u0131\u015f d\u00fcnyayla ili\u015fkisi kesilen Erso\u2019nun hala \u0130mparatorluk pilotlar\u0131yla ileti\u015fime ge\u00e7ebilmesi, hatta bu pilotlardan birini i\u015fe alabilmesi olay\u0131 \u00e7ok daha ileri ta\u015f\u0131r.<br>\nSonu\u00e7 olarak, Erso:<\/p>\n<ol>\n<li>\u00d6l\u00fcm Y\u0131ld\u0131z\u0131\u2019n\u0131n var oldu\u011funu \u0130syanc\u0131lar\u2019a bildirir.<\/li>\n<li>Onlar\u0131, \u00d6l\u00fcm Y\u0131ld\u0131z\u0131n\u0131n savunmas\u0131zl\u0131klar\u0131 hakk\u0131nda bilgilendirir.<\/li>\n<li>Scarif gezegenindeki projelerin yeri hakk\u0131nda bilgi verir.<\/li>\n<\/ol>\n<h2>Scarif deposu<\/h2>\n<p>Asl\u0131nda; y\u00fcksek g\u00fcvenlikli veri deposu, di\u011fer b\u00fct\u00fcn \u0130mparatorluk tesislerinden \u00e7ok daha iyi bir \u015fekilde tasarlanm\u0131\u015ft\u0131r. \u00d6ncelikle, Scarif hi\u00e7bir fiziksel nesnenin ge\u00e7emeyece\u011fi (ate\u015f duvar\u0131 olarak da i\u015flev g\u00f6ren) bir g\u00fc\u00e7 alan\u0131yla \u00e7evrelenmi\u015ftir. Yaln\u0131zca merkezden kontrol edilebilen tek bir giri\u015f noktas\u0131 vard\u0131r. Veriler, biyometrik kilitle korunan \u00e7evrimd\u0131\u015f\u0131 sabit disklerde saklan\u0131r. Verici anten de a\u011fdan kesilmi\u015ftir- etki hale getirmek i\u00e7in fiziksel eri\u015fim gereklidir.<\/p>\n<p>Ama eri\u015fi koruma mekanizmas\u0131 olarak biyometri ideal de\u011fildir. Bu durumda, taray\u0131c\u0131ya \u00f6l\u00fc bir memurun eli tutularak ikinci bir yoldan ge\u00e7ilir. G\u00fcvenlik duvar\u0131 da \u00e7\u00f6z\u00fcm de\u011fildir. B\u00fcy\u00fck miktarlarda veri transferini etkin bir \u015fekilde engeller ancak dahili ileti\u015fim sistemleri kullanarak \u0130syanc\u0131lar\u0131n\u00a0 verici sinyalini g\u00fc\u00e7lendirerek \u00fcstesinden gelinebilir. Ayr\u0131ca, gemiyi sisteme ba\u011flamak, sadece birka\u00e7 kabloyu ba\u011flama ve bir levyeyi d\u00f6nd\u00fcrme ile m\u00fcmk\u00fcnd\u00fcr. Hi\u00e7bir kimlik tan\u0131mlama sistemi yok! Bu, \u0130syanc\u0131lar\u0131n y\u00f6r\u00fcngeden g\u00fcvenlik duvar\u0131na g\u00fc\u00e7l\u00fc bir DDoS sald\u0131r\u0131s\u0131 ba\u015flatmalar\u0131na imkan sa\u011flar.<\/p>\n<p>T\u00fcm\u00fcnden daha y\u0131k\u0131c\u0131 olan ise, \u00e7ok \u00f6v\u00fclen verici anteninin birazc\u0131k bile olsun korunmamas\u0131d\u0131r. Bir disk yerle\u015ftirin, i\u015fte bu kadar kolay! G\u00fcvenlik duvar\u0131n\u0131n girilemezli\u011finden ger\u00e7ekten o kadar eminler miydi?<\/p>\n<table style=\"border-bottom: 0;border-collapse: inherit\" border=\"0\">\n<tbody>\n<tr>\n<td style=\"border-top: 0\" colspan=\"2\"><b>Andrey Nikishin, \u00d6zel Projeler Direkt\u00f6r\u00fc, Gelecek Teknolojileri, Kaspersky Lab<\/b><\/td>\n<\/tr>\n<tr>\n<td style=\"border-top: 0\"><img decoding=\"async\" class=\"alignnone size-thumbnail wp-image-22274\" style=\"width: 72px;max-width: none\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2018\/05\/03083304\/nikishin-150x150.png\" alt=\"\"><\/td>\n<td style=\"border: 1px solid #ddd;border-top: none;padding: 20px\">Bu, ger\u00e7ekte modern end\u00fcstriyel tesislerde siber savunman\u0131n uygulanma \u015fekline maalesef \u00e7ok benziyor. Basit bir sald\u0131r\u0131 vekt\u00f6r\u00fc biden bire ortaya \u00e7\u0131kmaya ba\u015flad\u0131\u011f\u0131nda bir g\u00fcvenlik denetimi ger\u00e7ekle\u015ftirip bir tehdit modeli olu\u015fturana kadar her \u015fey \u00e7ok iyi kurgulanm\u0131\u015f g\u00f6r\u00fcn\u00fcyor. Ve bizim d\u00fcnyam\u0131zdaki sald\u0131r\u0131lar, veri s\u0131zd\u0131r\u0131lmas\u0131 ile s\u0131n\u0131rl\u0131 olmayabilir \u2014 sonu\u00e7lar\u0131 \u00e7ok daha vahim olabilir.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>Nesnelerin \u0130nterneti<\/h2>\n<p>IoT g\u00fcvenli\u011fini saran felaket durum, \u00f6zel bir dikkate almay\u0131 gerektiriyor. \u0130syanc\u0131lar, yeniden programlanm\u0131\u015f bir K-2SO droid (\u00f6zel bir robot) kullan\u0131yorlar. Bui bir t\u00fcr astromech veya yorumlay\u0131c\u0131 de\u011fil. K-2SO stratejik bir analisttir. Davran\u0131\u015f\u0131 ile yarg\u0131layacak olursak, iyi ve uygun denebilir. \u0130mparatorluk protokolleriyle bilinmesi gereken her \u015fey droid\u2019in haf\u0131zas\u0131nda sakl\u0131d\u0131r. Ancak ne t\u00fcr bir i\u015fletim sistemi cihaz\u0131n\u0131n yeniden programlanmas\u0131n\u0131 sa\u011flar? Ve neden hala \u0130mparatorluk sistemi K-2SO\u2019nin dost\u00e7a oldu\u011funu d\u00fc\u015f\u00fcn\u00fcyor ve bilgisayarlarla olan ileti\u015fimine izin veriyor? \u0130mparatorluk nas\u0131l olur da bu droid\u2019in bir doland\u0131r\u0131c\u0131 oldu\u011funu bilmez? Her \u015feyden \u00f6nce, bu, bir kritik altyap\u0131 meselesidir.<\/p>\n<p>lax \u0130mparatorluk g\u00fcvenli\u011finin bir sonucu olarak, K-2SO, sessizce di\u011fer droid\u2019lerden bilgi alabiliyor, bilgi aramak i\u00e7in \u0130mparatorluk Ar\u015fivine ba\u011flanabiliyor, ve istasyonun savunma mekanizmalar\u0131n\u0131n kontrol\u00fcn\u00fc ele alabiliyor.<\/p>\n<h2>\u0130mparatorluk \u00dcst Komutas\u0131<\/h2>\n<p>Kraliyet komutanlar\u0131 taraf\u0131ndan verilen bilgi g\u00fcvenli\u011fi kararlar\u0131 ayr\u0131 ayr\u0131 analiz edilmelidir. Se\u00e7ilecek \u00e7ok say\u0131da karar var.<\/p>\n<p><strong>Grand Moff Tarkin<\/strong><\/p>\n<p>Tarkin, bilgi s\u0131zd\u0131r\u0131lmas\u0131na kar\u015f\u0131 verilen sava\u015fta sert taktikler uyguluyor. Esasen, ke\u015ffedilen s\u0131zd\u0131rmalarla birlikte t\u00fcm \u015fehirleri y\u0131k\u0131yor. Bu y\u00f6ndeki ilk emri, bir taraf de\u011fi\u015ftirmi\u015f ajan\u0131n \u00d6l\u00fcm Y\u0131ld\u0131z\u0131\u2019n\u0131n yap\u0131s\u0131n\u0131 bildi\u011fini \u00f6\u011frenmesi \u00fczerine Jedha gezegeninde yer alan kutsal \u015fehri yok etmek oluyor. \u0130kinci sefer, \u0130syanc\u0131 sald\u0131r\u0131s\u0131 alt\u0131nda oldu\u011fu haberini ald\u0131ktan sonra Scarif\u2019teki \u0130mparatorluk Ar\u015fivine kar\u015f\u0131 oluyor.<\/p>\n<p>Ancak yok etme, vir\u00fcsl\u00fc sistemi yeniden kurmakla kar\u015f\u0131la\u015ft\u0131r\u0131ld\u0131\u011f\u0131nda etkin olmayan bir \u00f6nlemdir. Bilgi s\u0131zd\u0131r\u0131lmas\u0131n\u0131n ke\u015ffi \u00fczerine yap\u0131lacak daha iyi bir strateji, hangi verilerin \u00e7al\u0131nd\u0131\u011f\u0131n\u0131 ve ajan\u0131n bu verileri \u0130syanc\u0131lara ula\u015ft\u0131r\u0131p ula\u015ft\u0131ramad\u0131\u011f\u0131n\u0131 ortaya \u00e7\u0131karmak i\u00e7in olay\u0131n acil ayr\u0131nt\u0131l\u0131 bir analizini ger\u00e7ekle\u015ftirmek olurdu. Ve \u0130mparatorluk, Jedha\u2019daki Kutsal \u015eehri yok etmek yerine, ilgili mesaj\u0131 durdursayd\u0131, g\u00fcvenlik a\u00e7\u0131\u011f\u0131ndan haberdar olurdu.<\/p>\n<p><strong>Orson Krennic<\/strong><\/p>\n<p>Galen Erso\u2019yu gizli projeye geri getirmek gibi budalaca tak\u0131nt\u0131s\u0131 bir yana, Krennic\u2019in kararlar\u0131 olduk\u00e7a rasyoneldir. Bir \u015fey i\u00e7in, bir inceleme ger\u00e7ekle\u015ftirmeye \u00e7al\u0131\u015f\u0131r: Scarif\u2019teki \u00fcsse vard\u0131ktan sonra, Galen Erso taraf\u0131ndan g\u00f6nderilen t\u00fcm mesajlar\u0131n analiz edilmesini ister. Gecikmi\u015f olsa da, bu tip eylemler g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131 bulmada i\u015fe yarayabilir.<\/p>\n<p>\u0130syanc\u0131 sald\u0131r\u0131s\u0131 s\u0131ras\u0131nda \u00fcss\u00fc ve kalkan\u0131 kapatma ve g\u00fcvenlik duvar\u0131n\u0131 tamamen yasak moduna getirmenin Krennic\u2019in parlak fikri oldu\u011funu da unutmamak gerek.<\/p>\n<table style=\"border-bottom: 0;border-collapse: inherit\" border=\"0\">\n<tbody>\n<tr>\n<td style=\"border-top: 0\" colspan=\"2\"><b>Andrey Nikishin, \u00d6zel Projeler Direkt\u00f6r\u00fc, Gelecek Teknolojileri, Kaspersky Lab<\/b><\/td>\n<\/tr>\n<tr>\n<td style=\"border-top: 0\"><img decoding=\"async\" class=\"alignnone size-thumbnail wp-image-22274\" style=\"width: 72px;max-width: none\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2018\/05\/03083304\/nikishin-150x150.png\" alt=\"\"><\/td>\n<td style=\"border: 1px solid #ddd;border-top: none;padding: 20px\">Bana sorarsan\u0131z, Rogue One efsanenin yeni b\u00f6l\u00fcm\u00fcnden belki de en iyi olan filmdir. \u00dcstelik, end\u00fcstriyel tesisler ve kritik altyap\u0131lar i\u00e7in siber g\u00fcvenlik e\u011fitim malzemesi sa\u011fl\u0131yor. Siber g\u00fcvenlik alan\u0131nda \u00e7al\u0131\u015fan herkes, ve hatta Y\u0131ld\u0131z Sava\u015flar\u0131 hayran\u0131 olmayanlar bile bu filmi seyretmelidir. \u201cKritik bilgi altyap\u0131s\u0131n\u0131 nas\u0131l koruyam\u0131yoruz?\u201d diye adland\u0131raca\u011f\u0131m\u0131z s\u00fcre\u00e7 i\u00e7in bir e\u011fitim k\u0131lavuzu.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;Kritik bilgi altyap\u0131s\u0131n\u0131 nas\u0131l koruyam\u0131yoruz?&#8221; diye adland\u0131rmak istedi\u011fimiz s\u00fcre\u00e7 i\u00e7in bir e\u011fitim k\u0131lavuzu.<\/p>\n","protected":false},"author":700,"featured_media":4900,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1194,1727],"tags":[1605,1603,1606,1601,1602,1604,1600],"class_list":{"0":"post-4899","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-death-star","10":"tag-kritik-altyapi","11":"tag-mtfbwy","12":"tag-olum-yildizi","13":"tag-rogue-one","14":"tag-star-wars","15":"tag-yildiz-savaslari"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/rogue-one-analysis\/4899\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/rogue-one-analysis\/13244\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/rogue-one-analysis\/11046\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/rogue-one-analysis\/6035\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/rogue-one-analysis\/15316\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/rogue-one-analysis\/13594\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/rogue-one-analysis\/12924\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/rogue-one-analysis\/16001\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/rogue-one-analysis\/15557\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/rogue-one-analysis\/20503\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/rogue-one-analysis\/22273\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/rogue-one-analysis\/10380\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/rogue-one-analysis\/10264\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/rogue-one-analysis\/16561\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/rogue-one-analysis\/20308\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/rogue-one-analysis\/23836\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/rogue-one-analysis\/20211\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/rogue-one-analysis\/20201\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/mtfbwy\/","name":"MTFBWY"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/4899","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/700"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=4899"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/4899\/revisions"}],"predecessor-version":[{"id":6942,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/4899\/revisions\/6942"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/4900"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=4899"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=4899"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=4899"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}