{"id":7845,"date":"2020-03-02T11:10:07","date_gmt":"2020-03-02T08:10:07","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=7845"},"modified":"2020-03-02T11:10:07","modified_gmt":"2020-03-02T08:10:07","slug":"three-little-pigs","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/three-little-pigs\/7845\/","title":{"rendered":"\u00dc\u00e7 K\u00fc\u00e7\u00fck Domuzcuk ve Siber G\u00fcvenlik"},"content":{"rendered":"<p>\u0130nsanlar, eski g\u00fcnlerde siber g\u00fcvenli\u011fe \u015fu an oldu\u011fundan \u00e7ok daha fazla \u00f6nem g\u00f6steriyordu. G\u00fcn\u00fcm\u00fcze kadar gelen halk masallar\u0131n\u0131n \u00e7o\u011funun, \u00e7ocuklar\u0131 siber tehditler d\u00fcnyas\u0131na kar\u015f\u0131 haz\u0131rlamak i\u00e7in uyduruldu\u011funa eminim. Mesela, \u00fcnl\u00fc \u0130ngiliz halk masal\u0131 \u00dc\u00e7 K\u00fc\u00e7\u00fck Domuzcuk&#8217;u ele alal\u0131m. Basit g\u00f6r\u00fcnen olay \u00f6rg\u00fcs\u00fc, yaln\u0131zca kaba kuvvet sald\u0131r\u0131lar\u0131n\u0131n ard\u0131ndaki fikri de\u011fil; ayn\u0131 zamanda bal k\u00fcpleri ve hatta kripto kapsay\u0131c\u0131lar gibi karma\u015f\u0131k kavramlar\u0131 da a\u00e7\u0131kl\u0131yor!<\/p>\n<p>Masal\u0131n bir\u00e7ok versiyonu var ve dilden dile biraz de\u011fi\u015fiyor, ancak bug\u00fcn biz James Halliwell-Phillipps&#8217;in 19. y\u00fczy\u0131lda yazd\u0131\u011f\u0131 metne odaklanaca\u011f\u0131z. Tabi, olay \u00f6rg\u00fcs\u00fc bundan daha da eskilere dayan\u0131yor.<\/p>\n<h2>Kaba kuvvet<\/h2>\n<p>Masal, \u00fc\u00e7 domuzun siber tehditlere kar\u015f\u0131 korunmak i\u00e7in bir donan\u0131m \u00e7\u00f6z\u00fcm\u00fc se\u00e7mesiyle ba\u015flar. Bu, bir \u00e7e\u015fit \u0130nternet a\u011f ge\u00e7idi gibi g\u00f6r\u00fcnmektedir. \u0130lk domuz, samandan yap\u0131lm\u0131\u015f bir cihaz se\u00e7er (ucuz ve g\u00fcvenilmez), ikincisi ah\u015fap se\u00e7er (daha g\u00fcvenilir, ancak yine de pek iyi de\u011fil) ve \u00fc\u00e7\u00fcnc\u00fcs\u00fc ta\u015flardan yap\u0131lm\u0131\u015f ger\u00e7ek bir g\u00fcvenlik duvar\u0131 olu\u015fturur.<\/p>\n<p>Masaldaki kurt olduk\u00e7a d\u00fc\u015f\u00fck vas\u0131fl\u0131 bir hacker olarak tasvir edilmi\u015ftir. Kurdun k\u00fc\u00e7\u00fck domuzcuklar\u0131n bilgi altyap\u0131s\u0131na yakla\u015f\u0131m\u0131, sahip oldu\u011fu tek ara\u00e7la sald\u0131rmakt\u0131r: \u00fcfleme. Ku\u015fkusuz fark etmi\u015fsinizdir, bu da kaba kuvvet hacklemesine benzer. Siber g\u00fcvenlikte, kaba kuvvet genellikle parola k\u0131rarken uygulan\u0131r.<\/p>\n<p>Masal; hedef, siber g\u00fcvenli\u011fe fazla dikkat etmedi\u011finde bu tekni\u011fin ger\u00e7ekten etkili olabilece\u011fini g\u00f6stermektedir: \u0130lk iki domuz kul\u00fcbesi kaba kuvvet sald\u0131r\u0131s\u0131na dayanamaz ve sald\u0131rgan i\u00e7eri girer. Ama \u00fc\u00e7\u00fcnc\u00fcs\u00fcnde, kurt birtak\u0131m sorunlarla kar\u015f\u0131la\u015f\u0131r. Ba\u015fka bir deyi\u015fle, iki y\u00fczy\u0131l \u00f6nceki hikaye anlat\u0131c\u0131lar\u0131 bile, varsay\u0131lan \u015fifreleri olan ucuz y\u00f6nlendiriciler kullanman\u0131n bir felakete sebep oldu\u011funu biliyorlard\u0131.<\/p>\n<h2>G\u00fcvenli\u011fi ihlal edilmi\u015f ileti\u015fim kanal\u0131<\/h2>\n<p>Ne yaz\u0131k ki, masal\u0131n t\u00fcm versiyonlar\u0131 ikinci geleneksel sald\u0131r\u0131y\u0131 i\u00e7ermez. Ama i\u015fte kar\u015f\u0131n\u0131zda: \u0130lk sald\u0131r\u0131 ba\u015far\u0131s\u0131z olduktan sonra, kurt \u00fc\u00e7\u00fcnc\u00fc domuzcu\u011fa faydal\u0131 ba\u011flant\u0131lar yollamaya ba\u015flar. \u00d6zellikle, turp tarlalar\u0131n\u0131n, elma a\u011fa\u00e7lar\u0131n\u0131n ve bir de gitmek i\u00e7in en iyi zaman\u0131 \u00f6nerdi\u011fi bir panay\u0131r\u0131n adreslerini g\u00f6nderir.<\/p>\n<p>Ba\u011flant\u0131lar\u0131n bir kimlik av\u0131 bi\u00e7imi oldu\u011fu varsay\u0131labilir, ancak eski \u0130ngiliz hikaye anlat\u0131c\u0131lar\u0131 asl\u0131nda daha ince d\u00fc\u015f\u00fcnm\u00fc\u015flerdi. Tarif ettikleri \u015fey tamamen farkl\u0131 bir sald\u0131r\u0131 tipiydi. Bu durumda &#8220;ba\u011flant\u0131lar&#8221; sahte de\u011fil, ger\u00e7ektir. Ve bu kurt i\u00e7in olduk\u00e7a iyi bir se\u00e7enek: Kurt, k\u00fc\u00e7\u00fck domuzun nereye gitti\u011fini daha az umursayamazd\u0131. \u00c7\u00fcnk\u00fc as\u0131l mesele, ileti\u015fim kanal\u0131n\u0131 kontrol etmesiydi; fakat sadece belirli saatlerde, 7\/24 de\u011fil.<\/p>\n<p>K\u00fc\u00e7\u00fck domuz, t\u00fcyl\u00fc hacker\u0131 yararl\u0131 siteleri ziyaret ederek kand\u0131r\u0131r, ancak kurdun ondan yapmas\u0131n\u0131 istedi\u011fi zamanlarda de\u011fil. Tek ger\u00e7ek tehlike, panay\u0131rdan sonra k\u00fc\u00e7\u00fck domuz geri d\u00f6nerken kurt kar\u015f\u0131s\u0131na \u00e7\u0131kt\u0131\u011f\u0131nda ba\u015f g\u00f6sterir. Domuzcuk, bir yolunu bulur: Panay\u0131rdan ald\u0131\u011f\u0131 yay\u0131\u011f\u0131n \u00fcst\u00fcne t\u0131rman\u0131p i\u00e7ine girer ve tepeden a\u015fa\u011f\u0131 yuvarlan\u0131r. Bu da kurdu korkutup ka\u00e7\u0131r\u0131r. Modern terimlerle anlatmak gerekirse; k\u00fc\u00e7\u00fck domuz bir kripto kapsay\u0131c\u0131daki siteden veri indirir ve b\u00f6ylece g\u00fcvenli\u011fi ihlal edilmi\u015f ileti\u015fim kanal\u0131n\u0131 kullanmas\u0131na ra\u011fmen g\u00fcvenli kalmay\u0131 ba\u015far\u0131r.<\/p>\n<h2>Bal k\u00fcp\u00fc<\/h2>\n<p>K\u00fc\u00e7\u00fck domuzun altyap\u0131s\u0131na n\u00fcfuz etmeyi ama\u00e7lad\u0131\u011f\u0131 son ve \u00e7aresiz giri\u015fiminde, kurt cihazda bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131 arar. Bulabilece\u011fi tek delik bacad\u0131r, bu y\u00fczden a\u015fa\u011f\u0131ya inip \u015f\u00f6mineden i\u00e7eri girmeye \u00e7al\u0131\u015f\u0131r. Kurt \u015fans eseri mi bu a\u00e7\u0131\u011fa rastlam\u0131\u015ft\u0131r? Belli ki hay\u0131r; k\u00fc\u00e7\u00fck domuz uzun zaman \u00f6nce bunu fark etmi\u015fti. Dahas\u0131, tuza\u011f\u0131 \u00f6nceden kurduktan sonra ate\u015fi yakar ve \u00fczerine bir kazan koyar.<\/p>\n<p>Siber g\u00fcvenlikte bu kazana bal k\u00fcp\u00fc denir. Kas\u0131tl\u0131 olarak ortaya \u00e7\u0131kan g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131n temel amac\u0131, siber su\u00e7lular\u0131n faaliyetlerini izlemektir. Ancak su\u00e7lular yeterince dikkatli de\u011filse, bal k\u00fcp\u00fc ayn\u0131 zamanda onlar\u0131n maskesini d\u00fc\u015f\u00fcrebilir ve kim olduklar\u0131n\u0131 anlamaya yard\u0131mc\u0131 olabilir.<\/p>\n<p>A\u00e7\u0131k konu\u015fmak gerekirse, bu bilgilerin bir k\u0131sm\u0131 19. y\u00fczy\u0131ldaki \u00e7ocuklar i\u00e7in pek pratik de\u011fildi. Ancak as\u0131l hikaye anlat\u0131c\u0131lar\u0131n\u0131n akl\u0131nda farkl\u0131 bir ama\u00e7 vard\u0131: toplumun k\u00fclt\u00fcrel koduna faydal\u0131 uygulamalar sunmak. B\u00f6ylece y\u00fczy\u0131llar sonra, bilgi teknolojisinin ortaya \u00e7\u0131kmas\u0131yla, insanlar tehdit manzaras\u0131n\u0131n i\u00e7g\u00fcd\u00fcsel olarak fark\u0131na varabileceklerdi. \u00c7ocuklar\u0131na masallar\u0131 yeniden anlatanlar daha g\u00fcvenli bir d\u00fcnya kurmaya yard\u0131mc\u0131 oluyorlar.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"gandalf30\" \/>\n","protected":false},"excerpt":{"rendered":"<p>Hikaye anlat\u0131c\u0131lar\u0131n\u0131n infosec uzman\u0131 olduklar\u0131na dair daha fazla do\u011frulama.<\/p>\n","protected":false},"author":700,"featured_media":7846,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1352],"tags":[2125,2126,1867,2124,2016,794],"class_list":{"0":"post-7845","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-special-projects","8":"tag-bal-kupu","9":"tag-brute-force","10":"tag-gercek","11":"tag-kaba-kuvvet","12":"tag-masallar","13":"tag-sifreleme"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/three-little-pigs\/7845\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/three-little-pigs\/19427\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/three-little-pigs\/16060\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/three-little-pigs\/7812\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/three-little-pigs\/21065\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/three-little-pigs\/19351\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/three-little-pigs\/17833\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/three-little-pigs\/21995\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/three-little-pigs\/20759\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/three-little-pigs\/27522\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/three-little-pigs\/33796\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/three-little-pigs\/14395\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/three-little-pigs\/14519\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/three-little-pigs\/13104\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/three-little-pigs\/23159\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/three-little-pigs\/11160\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/three-little-pigs\/25045\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/three-little-pigs\/21780\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/three-little-pigs\/26973\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/three-little-pigs\/26812\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/masallar\/","name":"masallar"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/7845","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/700"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=7845"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/7845\/revisions"}],"predecessor-version":[{"id":7847,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/7845\/revisions\/7847"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/7846"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=7845"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=7845"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=7845"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}