{"id":7472,"date":"2019-12-02T13:06:48","date_gmt":"2019-12-02T10:06:48","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=7472"},"modified":"2019-12-02T13:06:48","modified_gmt":"2019-12-02T10:06:48","slug":"phishing-prevalence-effect","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/phishing-prevalence-effect\/7472\/","title":{"rendered":"Kimlik av\u0131 psikolojisi: Yayg\u0131nl\u0131k etkisi"},"content":{"rendered":"<p>Siber su\u00e7lulular uzun zamandan beri psikolojiyi bir aldatma arac\u0131 olarak kullan\u0131yor. Fakat ayn\u0131 zamanda biz de bu psikolojik fenomenleri belirli su\u00e7 y\u00f6ntemlerini a\u00e7\u0131klamak ve do\u011fru korunma stratejisini belirlemek i\u00e7in kullanabiliyoruz. Pek \u00e7ok psikolog, sald\u0131r\u0131 planlar\u0131n\u0131 ve i\u015fe yarama nedenlerini analiz ediyor. Bug\u00fcn, kimlik av\u0131 sald\u0131r\u0131lar\u0131na kar\u015f\u0131 geli\u015ftirilen teknolojilerin g\u00fcc\u00fcne ra\u011fmen neden e-posta tuzaklar\u0131n\u0131n hala insanlar\u0131 ma\u011fdur ederek \u00f6nemli zararlara yol a\u00e7abildi\u011fini a\u00e7\u0131klamaya \u00e7al\u0131\u015fan bir hipotezi inceleyece\u011fiz. En \u00f6nemlisi de, bu konuda ne yap\u0131labilece\u011fini tart\u0131\u015faca\u011f\u0131z.<\/p>\n<p>\u0130stenmeyen e-postalara ve kimlik av\u0131 doland\u0131r\u0131c\u0131l\u0131klar\u0131na kar\u015f\u0131 al\u0131nan \u00f6nlemler, her \u015firketin \u00e7evrimi\u00e7i g\u00fcvenlik prosed\u00fcr\u00fcn\u00fcn kilit bile\u015fenleridir. Siber vakalar\u0131 inceleyen uzmanlar\u0131m\u0131z \u00e7o\u011funlukla bir e-posta ile ba\u015flayan sorunlarla kar\u015f\u0131la\u015f\u0131yor. Bu e-posta, kitlesel olarak g\u00f6nderilmi\u015f de olabiliyor, hedefli bir sald\u0131r\u0131 da olabiliyor. G\u00fcn\u00fcm\u00fczde e-posta filtreleri tipik kimlik av\u0131 e-postalar\u0131n\u0131 y\u00fcksek d\u00fczeyde kesinlikle tespit edebiliyor, fakat sald\u0131rganlar yine de bazen bir \u015fekilde (\u00f6rne\u011fin bir <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/bec-toyota\/6467\/\" target=\"_blank\" rel=\"noopener\">i\u015f orta\u011f\u0131n\u0131n posta kutusunu hackleyerek<\/a>) mesaj\u0131 daima en zay\u0131f halka olan insan kurbana ula\u015ft\u0131rmay\u0131 ba\u015farabiliyorlar. \u00dcstelik filtreler daha etkili hale geldik\u00e7e s\u0131zan mesaj\u0131n kullan\u0131c\u0131y\u0131 kand\u0131rabilme olas\u0131l\u0131\u011f\u0131 da art\u0131yor.<\/p>\n<h2>Deney<\/h2>\n<p>AB\u2019Dli iki ara\u015ft\u0131rmac\u0131 olan Massachusetts Institute of Technology\u2019den Ben D. Sawyer ve University of Central Florida\u2019dan Peter A. Hancock, k\u00f6t\u00fc ama\u00e7l\u0131 e-postalar\u0131n s\u0131kl\u0131\u011f\u0131 ile kullan\u0131c\u0131lar taraf\u0131ndan ba\u015far\u0131yla tespit edilmeleri aras\u0131nda do\u011frudan bir korelasyon oldu\u011fu <a href=\"https:\/\/journals.sagepub.com\/doi\/full\/10.1177\/0018720818780472\" target=\"_blank\" rel=\"noopener nofollow\">hipotezini \u00f6ne s\u00fcrd\u00fc<\/a>. Teorileri, psikolojide uzun zamand\u0131r bilinen ve ki\u015finin daha az yayg\u0131n olan bir sinyali g\u00f6zden ka\u00e7\u0131rma (veya tespit edememe) olas\u0131l\u0131\u011f\u0131n\u0131n daha s\u0131k meydana gelen bir sinyali g\u00f6zden ka\u00e7\u0131rma olas\u0131l\u0131\u011f\u0131ndan daha y\u00fcksek oldu\u011funu ifade eden \u201c<a href=\"https:\/\/www.wikizeroo.org\/index.php?q=aHR0cHM6Ly9lbi53aWtpcGVkaWEub3JnL3dpa2kvUHJldmFsZW5jZV9lZmZlY3Q\" target=\"_blank\" rel=\"noopener nofollow\">yayg\u0131nl\u0131k etkisine<\/a>\u201d dayan\u0131yordu.<\/p>\n<p>Ara\u015ft\u0131rmac\u0131lar, kat\u0131l\u0131mc\u0131lara i\u00e7lerinden baz\u0131lar\u0131nda k\u00f6t\u00fc ama\u00e7l\u0131 ekler bulunan e-postalar\u0131n g\u00f6nderildi\u011fi bir deneyle teorilerini pratikte de test etmeye karar verdi. K\u00f6t\u00fc ama\u00e7l\u0131 e-postalar\u0131n oran\u0131 her kat\u0131l\u0131mc\u0131 i\u00e7in farkl\u0131yd\u0131: Baz\u0131lar\u0131na gelen postalar\u0131n yaln\u0131zca %1\u2019inde k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m varken baz\u0131lar\u0131nda bu oran %5\u2019e veya %20\u2019ye kadar \u00e7\u0131k\u0131yordu. Sonu\u00e7, tehditin ne kadar az s\u0131kl\u0131kta meydana geliyorsa o kadar zor tespit edildi\u011fi hipotezini do\u011frulad\u0131. \u00dcstelik, ba\u011fl\u0131l\u0131k lineer bile de\u011fildi; logaritmikti.<\/p>\n<p>Deneyin olduk\u00e7a ufak bir \u00f6rneklem kulland\u0131\u011f\u0131n\u0131 (33 ki\u015fi) ve t\u00fcm kat\u0131l\u0131mc\u0131lar\u0131n \u00f6\u011frenci oldu\u011funu da g\u00f6zard\u0131 etmemek gerek; sonucu k\u00f6r\u00fc k\u00f6r\u00fcne do\u011fru kabul etmek i\u00e7in hen\u00fcz erken olabilir. \u00d6te yandan psikolojide yayg\u0131nl\u0131k etkisi genel olarak kan\u0131tlanm\u0131\u015f kabul ediliyor, o halde neden kimlik av\u0131 e-postalar\u0131 i\u00e7in de ge\u00e7erli olmas\u0131n? Sawyer ve Hancock, her durumda hipotezlerini daha geli\u015fmi\u015f testlere tabi tutarak rafine edeceklerini vadediyor.<\/p>\n<p>Ara\u015ft\u0131rmac\u0131lar bu fenomenin sistemin g\u00fcvenli\u011fine duyulan g\u00fcvendeki art\u0131\u015fla ba\u011flant\u0131l\u0131 olarak a\u00e7\u0131klanabilece\u011fini \u00f6ne s\u00fcr\u00fcyor. Temelde, kimlik av\u0131na kar\u015f\u0131 koruyan teknolojilerin, kullan\u0131c\u0131lar\u0131 tehditlerden korurken ayn\u0131 zamanda gardlar\u0131n\u0131 indirmelerine de sebep oldu\u011funu iddia ediyorlar. Ara\u015ft\u0131rmac\u0131lar bununla birlikte siber su\u00e7lular\u0131n da bu etkiden haberdar olabilece\u011fini, dolay\u0131s\u0131yla k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131 kasten daha az s\u0131kl\u0131kla g\u00f6nderdiklerini de varsay\u0131yor.<\/p>\n<h2>Pratik sonu\u00e7lar<\/h2>\n<p>Tahmin edebilece\u011finiz \u00fczere otomatik g\u00fcvenlik sistemlerini b\u0131rakman\u0131z\u0131 savunmuyoruz. Bununla birlikte, e\u011fer Sawyer ve Hancock\u2019un hipotezi do\u011fruysa, kullan\u0131c\u0131lar\u0131n arada s\u0131rada bir kimlik av\u0131 e-postas\u0131yla kar\u015f\u0131 kar\u015f\u0131ya gelmeleri kendi yararlar\u0131na olacakt\u0131r. Elbette ger\u00e7ek bir kimlik av\u0131 e-postas\u0131ndan bahsetmiyoruz.<\/p>\n<p>Her boyutta \u015firketin \u00e7al\u0131\u015fanlar\u0131 i\u00e7in siber g\u00fcvenlik e\u011fitimi sunan \u00e7\u00f6z\u00fcm\u00fcm\u00fcz <a href=\"https:\/\/www.kaspersky.com.tr\/small-to-medium-business-security\/security-awareness-platform\" target=\"_blank\" rel=\"noopener\">Kaspersky Automated Security Awareness Platform<\/a>, e\u011fitim alanlar\u0131n becerilerinin ne kadar geli\u015fti\u011fini d\u00fczenli aral\u0131klarla kontrol etmenizi sa\u011fl\u0131yor. Bu kontrollerin bir par\u00e7as\u0131 olarak e\u011fitim alanlara kimlik av\u0131 e-postalar\u0131n\u0131 simule eden e-postalar g\u00f6nderiliyor ve \u00e7al\u0131\u015fanlar\u0131n do\u011fru tepkileri vermesi bekleniyor. Bu kontroller, kimlik av\u0131n\u0131n neye benzedi\u011fini unutmamalar\u0131n\u0131 sa\u011flayarak \u00e7al\u0131\u015fanlar\u0131 s\u00fcrekli tetikte tutuyor.<\/p>\n<p>Teori sonunda yanl\u0131\u015f \u00e7\u0131ksa bile bu e-postalar\u0131n verebilece\u011fi bir zarar yok. En k\u00f6t\u00fc olas\u0131l\u0131kla e\u011fitim y\u00f6neticisinin zay\u0131f halkalar\u0131 tespit etmesine yard\u0131mc\u0131 olurlar.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kimlik av\u0131n\u0131n nas\u0131l ba\u015far\u0131l\u0131 oldu\u011funa dair a\u00e7\u0131klamalardan biri bilinen bir psikolojik etkiye dayan\u0131yor.<\/p>\n","protected":false},"author":2499,"featured_media":7473,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194,1727],"tags":[2073,1824,1920,1074,1834,1660],"class_list":{"0":"post-7472","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"category-smb","10":"tag-hedef-odakli-kimlik-avi","11":"tag-insan-faktoru","12":"tag-istenmeyen-e-posta","13":"tag-kimlik-avi","14":"tag-psikoloji","15":"tag-sosyal-muhendislik"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/phishing-prevalence-effect\/7472\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/phishing-prevalence-effect\/18291\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/phishing-prevalence-effect\/15183\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/phishing-prevalence-effect\/19984\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/phishing-prevalence-effect\/18380\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/phishing-prevalence-effect\/16732\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/phishing-prevalence-effect\/20717\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/phishing-prevalence-effect\/19459\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/phishing-prevalence-effect\/25806\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/phishing-prevalence-effect\/31610\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/phishing-prevalence-effect\/13495\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/phishing-prevalence-effect\/13773\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/phishing-prevalence-effect\/12552\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/phishing-prevalence-effect\/21666\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/phishing-prevalence-effect\/26246\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/phishing-prevalence-effect\/24605\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/phishing-prevalence-effect\/20728\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/phishing-prevalence-effect\/25598\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/phishing-prevalence-effect\/25433\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/kimlik-avi\/","name":"kimlik av\u0131"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/7472","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2499"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=7472"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/7472\/revisions"}],"predecessor-version":[{"id":7474,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/7472\/revisions\/7474"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/7473"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=7472"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=7472"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=7472"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}