{"id":6127,"date":"2019-07-11T11:59:09","date_gmt":"2019-07-11T08:59:09","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=6127"},"modified":"2019-11-15T14:27:08","modified_gmt":"2019-11-15T11:27:08","slug":"vulnerable-wi-fi","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/vulnerable-wi-fi\/6127\/","title":{"rendered":"Ofiste uygun fakat riskli Wi-Fi"},"content":{"rendered":"<p>G\u00fcn\u00fcm\u00fczde hemen hemen her ofisin Wi-Fi a\u011f\u0131 mevcut, hatta bazen bu a\u011f birden fazla bile olabiliyor. Kim diz\u00fcst\u00fc bilgisayarlar\u0131 bir kablo ile birbirine ba\u011flamak ister? Ak\u0131ll\u0131 telefon ve tabletleri de unutun! Ancak, kablosuz bir a\u011f BT altyap\u0131n\u0131zda zay\u0131f bir nokta olabilir.<\/p>\n<h2>\u015eifre madencili\u011fi<\/h2>\n<p>\u00c7o\u011fu \u015firket kablosuz a\u011flar\u0131 i\u00e7in karma\u015f\u0131k ve benzersiz \u015fifreler kullanmaz ve a\u011f ad\u0131n\u0131n yay\u0131nlanmas\u0131n\u0131 engellemek i\u00e7in de pek u\u011fra\u015fmazlar. Ayr\u0131ca pek \u00e7o\u011fu, a\u011f ba\u011flant\u0131lar\u0131n\u0131n ofis d\u0131\u015f\u0131na \u00e7\u0131kmas\u0131n\u0131 \u00f6nlemek i\u00e7in Wi-Fi sinyalinin g\u00fcc\u00fcn\u00fc s\u0131n\u0131rlamaz. Bu nedenle, genellikle \u00e7ok az\u0131 potansiyel bir sald\u0131rgan\u0131n ofisin yak\u0131nlar\u0131nda tak\u0131lmas\u0131n\u0131 ve bir Wi-Fi ba\u011flant\u0131s\u0131 ile kurumsal bir a\u011fa girmeye \u00e7al\u0131\u015fmas\u0131n\u0131 \u00f6nleyebilir.<\/p>\n<p>Y\u00f6nlendiricinin giri\u015fine basit bir s\u00f6zl\u00fck sald\u0131r\u0131s\u0131 yapmak sadece birka\u00e7 saniye s\u00fcrer. Sald\u0131rgan\u0131n acelesi olmad\u0131\u011f\u0131 s\u00fcrece, karma\u015f\u0131k \u015fifre kombinasyonlar\u0131n\u0131 \u00e7\u00f6zmesi ise daha fazla zaman\u0131n\u0131 alacakt\u0131r. Ancak, bu her zaman gerekli de\u011fildir, \u00e7\u00fcnk\u00fc baz\u0131 y\u00f6nlendiricilerde sald\u0131rgan, donan\u0131m yaz\u0131l\u0131m\u0131ndaki g\u00fcvenlik a\u00e7\u0131klar\u0131ndan kolayca faydalanabilir.<\/p>\n<h3>Donan\u0131m yaz\u0131l\u0131m\u0131 g\u00fcvenlik a\u00e7\u0131klar\u0131<\/h3>\n<p>Ara\u015ft\u0131rmac\u0131lar, Wi-Fi y\u00f6nlendiricinizin \u015fifrelerini ve di\u011fer koruyucu mekanizmalar\u0131n\u0131 takip ederek, k\u00f6t\u00fc niyetli ki\u015filerin bir a\u011fa girmesine izin verebilecek g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 d\u00fczenli olarak tespit ederler. Baz\u0131 durumlarda, cihaz \u00fczerinde \u00fcst\u00fcn kullan\u0131c\u0131 haklar\u0131 elde edebilirler. Genellikle program geli\u015ftiricileri, bu g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 d\u00fczeltme konusunda h\u0131zl\u0131d\u0131rlar. Sorun \u015fu ki, bir\u00e7ok kurulu\u015f eklentilerini zaman\u0131nda y\u00fcklememektedir ve \u00f6zellikle bunu yaparken donan\u0131m yaz\u0131l\u0131m\u0131n\u0131n yeniden ba\u015flat\u0131lmas\u0131 gerekir.<\/p>\n<h2>Misafir a\u011f\u0131<\/h2>\n<p>Bir\u00e7ok \u015firket \u00e7al\u0131\u015fanlar ve misafirler i\u00e7in farkl\u0131 Wi-Fi a\u011flar\u0131 kullan\u0131r. Bu yap\u0131lan makul bir \u00f6nlemdir: Bir yandan ofisteki m\u00fc\u015fterilerin ve di\u011fer ziyaret\u00e7ilerin internete ba\u011flanmas\u0131 sa\u011flan\u0131rken; \u00f6te yandan, \u015firket a\u011f\u0131na ve i\u00e7 kaynaklara eri\u015fimleri engellenecektir. Ancak misafir Wi-Fi sizin aleyhinize \u00e7al\u0131\u015fabilir.<\/p>\n<p>Fikir \u015fu ki; bir misafir a\u011f\u0131 i\u00e7in \u015fifre almak olduk\u00e7a kolayd\u0131r. Ancak baz\u0131 durumlarda \u2013 e\u011fer a\u011f uygun \u015fekilde yap\u0131land\u0131r\u0131lmam\u0131\u015f ise \u2013 misafirler kurumsal altyap\u0131n\u0131n baz\u0131 unsurlar\u0131na ula\u015f\u0131m sa\u011flayabilirler.<\/p>\n<p>Do\u011fru a\u011f yap\u0131land\u0131rmas\u0131yla bile, \u00e7al\u0131\u015fanlar\u0131n\u0131z istemeden kendilerini tehlikeye atabilirler. Bunlardan birinin kurumsal politika gere\u011fince engellenen bir a\u011f kayna\u011f\u0131na eri\u015fmek istedi\u011fini varsayal\u0131m. \u00dczerine tekrar d\u00fc\u015f\u00fcnmeye gerek kalmadan, gizli verileri olan bir diz\u00fcst\u00fc bilgisayar\u0131 misafir a\u011f\u0131na ba\u011flar. Bu sayede, ayn\u0131 misafir a\u011f\u0131nda gizlenen bir sald\u0131rgan, bir sald\u0131r\u0131 ger\u00e7ekle\u015ftirmeyi deneyebilir veya bir kimsenin diz\u00fcst\u00fc bilgisayar\u0131na k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m bula\u015ft\u0131rabilir.<\/p>\n<h3>Kurumsal k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar daha az savunmas\u0131z hale nas\u0131l gelir?<\/h3>\n<p>Wi-Fi a\u011flar\u0131n\u0131n hala \u00f6nemli oldu\u011funa inan\u0131yoruz; ancak, hem cihaz hem de kurumsal a\u011f yap\u0131land\u0131rmas\u0131 i\u00e7in g\u00fcvenlik odakl\u0131 yakla\u015f\u0131mlara ihtiya\u00e7lar\u0131 var.<\/p>\n<ul>\n<li>Wi-Fi y\u00f6nlendiricileri ve eri\u015fim noktalar\u0131n\u0131n donan\u0131m yaz\u0131l\u0131m\u0131n\u0131 g\u00fcncelleyin ve g\u00fcncel tutun. \u00dcreticiler g\u00fcvenlik a\u00e7\u0131klar\u0131 \u00fczerine s\u00fcrekli \u00e7al\u0131\u015f\u0131yorlar; \u00e7\u00fcnk\u00fc bir \u015feyin \u00e7al\u0131\u015f\u0131yor olmas\u0131 onun g\u00fcvenli oldu\u011fu anlam\u0131na gelmiyor.<\/li>\n<li>Wi-Fi eri\u015fimi i\u00e7in benzersiz, uzun ve karma\u015f\u0131k bir \u015fifre belirleyin. \u00c7al\u0131\u015fanlar\u0131n\u0131z\u0131n her cihaza yaln\u0131zca bir kez giri\u015f yapmalar\u0131 gerekir ve g\u00fc\u00e7l\u00fc \u015fifrelerin kullan\u0131m\u0131 a\u011f korsanl\u0131\u011f\u0131n\u0131 daha zor hale getirir.<\/li>\n<li>A\u011f\u0131n\u0131z\u0131n ofis d\u0131\u015f\u0131ndan kullan\u0131lamayacak \u015fekilde sinyal g\u00fcc\u00fcn\u00fc s\u0131n\u0131rlay\u0131n.<\/li>\n<li>Bulunmas\u0131n\u0131 zorla\u015ft\u0131rmak i\u00e7in a\u011f ad\u0131n\u0131 gizleyin.<\/li>\n<li>A\u011f i\u00e7in belirgin olmayan veya kolay bir \u015fekilde tahmin edilemeyecek bir ad se\u00e7in ve y\u00f6nlendirici model numaras\u0131n\u0131 bunun d\u0131\u015f\u0131nda tutun, b\u00f6ylece sald\u0131rganlar bilinen bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131 aramak i\u00e7in bunu kullanamazlar.<\/li>\n<li>Misafir a\u011f\u0131n\u0131 ay\u0131r\u0131n, b\u00f6ylece misafirlerin dahili kaynaklara eri\u015fimi engellenecektir. Ziyaret\u00e7ilerinizi baz\u0131 rahatl\u0131klardan mahrum etmeniz gerekebilir (yaz\u0131c\u0131n\u0131zdan bir belge \u00e7\u0131kt\u0131s\u0131 alabilmek gibi), ancak veri s\u0131z\u0131nt\u0131s\u0131 riskini \u00f6nemli \u00f6l\u00e7\u00fcde azalt\u0131rs\u0131n\u0131z.<\/li>\n<li><a href=\"https:\/\/go.kaspersky.com\/TR_Trial_Advanced_SOC.html?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=tr_kesbkb_ey0081_organic&amp;utm_content=link&amp;utm_term=tr_kdaily_organic_ey0081_link_blog_kesbkb\" target=\"_blank\" rel=\"noopener nofollow\">G\u00fcvenilir bir g\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fc\u00a0<\/a> kullan\u0131n, b\u00f6ylece bir sald\u0131rgan a\u011f\u0131n\u0131z\u0131 ele ge\u00e7irse bile, i\u015f istasyonlar\u0131na ve sunuculara b\u00fcy\u00fck bir zarar veremez.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial-leadgen\">\n","protected":false},"excerpt":{"rendered":"<p>Ofiste kullan\u0131lan Wi-Fi, g\u00fcvenli\u011finizde zay\u0131f bir nokta olabilir. <\/p>\n","protected":false},"author":40,"featured_media":6128,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194,1727],"tags":[503,1951,174],"class_list":{"0":"post-6127","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"category-smb","10":"tag-guvenlik-acigi","11":"tag-misafir-aglar","12":"tag-wi-fi"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/vulnerable-wi-fi\/6127\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/vulnerable-wi-fi\/15927\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/vulnerable-wi-fi\/13435\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/vulnerable-wi-fi\/17820\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/vulnerable-wi-fi\/15961\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/vulnerable-wi-fi\/14718\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/vulnerable-wi-fi\/18637\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/vulnerable-wi-fi\/17442\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/vulnerable-wi-fi\/22853\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/vulnerable-wi-fi\/27250\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/vulnerable-wi-fi\/11828\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/vulnerable-wi-fi\/11932\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/vulnerable-wi-fi\/10847\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/vulnerable-wi-fi\/19434\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/vulnerable-wi-fi\/23436\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/vulnerable-wi-fi\/22743\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/vulnerable-wi-fi\/22690\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/wi-fi\/","name":"wi-fi"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/6127","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=6127"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/6127\/revisions"}],"predecessor-version":[{"id":6763,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/6127\/revisions\/6763"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/6128"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=6127"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=6127"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=6127"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}