{"id":8787,"date":"2020-09-10T11:46:23","date_gmt":"2020-09-10T08:46:23","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=8787"},"modified":"2020-09-10T11:46:23","modified_gmt":"2020-09-10T08:46:23","slug":"thin-client-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/thin-client-cybersecurity\/8787\/","title":{"rendered":"G\u00fcvenlik a\u00e7\u0131s\u0131ndan ince istemciler"},"content":{"rendered":"<p>Salg\u0131n ve arkas\u0131ndan gelen karantina sebebiyle 2020 y\u0131l\u0131, i\u015fletmeler i\u00e7in temelde bir dizi yeni soruyu g\u00fcndeme getirdi. Birincisi \u2014 herhangi bir \u015firket daha \u00f6nce \u00e7al\u0131\u015fanlar\u0131n\u0131n evdeki sandalyeleri, monit\u00f6rleri ve masalar\u0131 i\u00e7in amortisman hesaplamak zorunda kald\u0131 m\u0131? \u2014 bu durum art\u0131k s\u00f6z konusu. En b\u00fcy\u00fck y\u00fck, BT ve g\u00fcvenlik departmanlar\u0131n\u0131n omuzlar\u0131na y\u00fcklendi. \u00d6nceden, personele uzaktan \u00e7al\u0131\u015fmaya uygun bir i\u015fyeri ortam\u0131 sa\u011flamalar\u0131 gerekti\u011fi konusunda \u00e7ok az uyar\u0131da bulunulmu\u015ftu ve sonras\u0131nda, g\u00fcvenlik \u00e7emberinin her yerde ge\u00e7erli oldu\u011fu bir d\u00fcnya i\u00e7in acilen yeni <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/zero-trust-security\/8619\/\" target=\"_blank\" rel=\"noopener\">bilgi g\u00fcvenli\u011fi stratejisi geli\u015ftirmeye ihtiya\u00e7 duyuldu<\/a>.<\/p>\n<p>K\u00f6t\u00fcmserler BT\u2019nin \u00e7\u00f6kece\u011fini \u00f6ng\u00f6rd\u00fc ama bu olmad\u0131; \u015firketlerin b\u00fcy\u00fck \u00e7o\u011funlu\u011fu operasyonlar\u0131n\u0131 olduk\u00e7a h\u0131zl\u0131 bir \u015fekilde yeniden organize edebildiler. Bununla birlikte, ge\u00e7i\u015f uygulamalar\u0131 \u00e7e\u015fitlilik g\u00f6sterdi. Pandemi ba\u015flamadan \u00f6nce, \u00e7al\u0131\u015fanlar\u0131 daha \u00e7ok diz\u00fcst\u00fc bilgisayar kullanan i\u015fletmelerin \u015fans\u0131 yaver gitti. Halihaz\u0131rda aktif bir Kendi Cihaz\u0131n\u0131 Kendin Getir (BYOD) politikas\u0131na sahip olanlar da b\u00fcy\u00fck bir avantaja sahipti. Bunun sonucunda, d\u00fcnyan\u0131n \u00f6nde gelen \u015firketlerinden baz\u0131lar\u0131 maliyetleri d\u00fc\u015f\u00fcrmek i\u00e7in \u00e7al\u0131\u015fanlar\u0131n\u0131 herkesi kapsayacak \u015fekilde uzaktan \u00e7al\u0131\u015ft\u0131rmaya karar verdiler. Oracle, Rimini Street ve Okta da dahil olmak \u00fczere bir\u00e7ok k\u00fcresel BT devi, ofis alanlar\u0131n\u0131n k\u0131smi olarak k\u00fc\u00e7\u00fclt\u00fclmesinin k\u00e2r rakamlar\u0131 \u00fczerinde olumlu bir etkisi oldu\u011funu s\u00f6yledi.<\/p>\n<p>G\u00fcvenli\u011fi sa\u011flamak daha karma\u015f\u0131k hale geldi. Bir\u00e7ok bilgi g\u00fcvenli\u011fi departman\u0131 buna haz\u0131r de\u011fildi. Birincisi, insanlar birden, \u015firket taraf\u0131ndan izlenmeyen, y\u00f6netilmeyen ve hatta <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/awareness-telecommuting\/8135\/\" target=\"_blank\" rel=\"noopener\">g\u00fcncellenmeyen<\/a> kendi a\u011f donan\u0131mlar\u0131n\u0131 kullanarak yerel ev a\u011flar\u0131ndan \u00e7al\u0131\u015fmaya ba\u015flad\u0131. \u0130kincisi, cihazlar\u0131n \u00e7e\u015fitli g\u00f6revleri ger\u00e7ekle\u015ftirmek i\u00e7in t\u00fcm aile taraf\u0131ndan kullan\u0131ld\u0131\u011f\u0131 g\u00f6r\u00fclmeye ba\u015fland\u0131, bu g\u00f6revlerin hepsi \u015firket i\u015fiyle ilgili olmak zorunda de\u011fildi. \u00d6rne\u011fin, ebeveynler ve \u00e7ocuklar i\u015f yapmak ve ders \u00e7al\u0131\u015fmak i\u00e7in d\u00f6n\u00fc\u015f\u00fcml\u00fc olarak ayn\u0131 diz\u00fcst\u00fc bilgisayarlar\u0131 kullan\u0131yorlard\u0131. Dahas\u0131, baz\u0131 durumlarda ayn\u0131 makine, g\u00fcvenlik \u00e7al\u0131\u015fanlar\u0131n\u0131n da onaylamad\u0131\u011f\u0131 iki farkl\u0131 \u015firketin a\u011f\u0131na ba\u011flan\u0131yordu.<\/p>\n<p>Hangi \u015firketlerin hem BT hem de g\u00fcvenlik a\u00e7\u0131s\u0131ndan en az sorun ya\u015fad\u0131\u011f\u0131n\u0131 biliyor musunuz? Bu \u015firketler, sanalla\u015ft\u0131rma teknolojilerini veya daha spesifik olarak sanal masa\u00fcst\u00fc altyap\u0131s\u0131n\u0131 (VDI) aktif \u015fekilde kullananlard\u0131.<\/p>\n<h2>Sanal masa\u00fcst\u00fc nedir?<\/h2>\n<p>Genel olarak, masa\u00fcst\u00fc sanalla\u015ft\u0131rma, \u00e7al\u0131\u015fan ki\u015finin \u00e7al\u0131\u015fma alan\u0131 ile \u00e7al\u0131\u015fmak i\u00e7in kulland\u0131klar\u0131 fiziksel cihaz\u0131 ay\u0131rmaya prensibi ile \u00e7al\u0131\u015f\u0131r. \u015eirket, altyap\u0131s\u0131n\u0131 (veya kiralama kapasitesini) kullanarak bir bilgi i\u015flem k\u00fcmesi haz\u0131rlar, bir sanalla\u015ft\u0131rma platformunu y\u00fckler ve her \u00e7al\u0131\u015fan i\u00e7in sanal makineler olu\u015fturur. Sanal makine imaj\u0131, \u00e7al\u0131\u015fan\u0131n ihtiya\u00e7 duydu\u011fu t\u00fcm yaz\u0131l\u0131mlar\u0131 i\u00e7erir.<\/p>\n<p>\u00c7al\u0131\u015fanlar; masa\u00fcst\u00fc bilgisayarlar, ince istemciler, diz\u00fcst\u00fc bilgisayarlar ve tabletler dahil olmak \u00fczere herhangi bir cihazdan sanal masa\u00fcstlerine (ve kullanma iznine sahip olduklar\u0131 kurumsal kaynaklara) ba\u011flanabilirler. Genel olarak konu\u015fursak \u2014 klavye ve fare ba\u011flayabildikten ve onu izleyebildikten sonra (baz\u0131 merakl\u0131lar asl\u0131nda b\u00f6yle bir kurulum kullanarak \u00e7al\u0131\u015f\u0131r) \u2014 \u00e7al\u0131\u015fanlar bunun i\u00e7in bir telefonu bile kullanabilirler. Ve bu uygulama sadece uzaktan \u00e7al\u0131\u015fma veya internet \u00fczerinden \u00e7al\u0131\u015fma ile s\u0131n\u0131rl\u0131 de\u011fil. Bu teknoloji i\u015fletmelere a\u015fa\u011f\u0131dakiler de dahil olmak \u00fczere pek \u00e7ok avantaj sundu\u011fu i\u00e7in baz\u0131 \u015firketler ofiste de sanal masa\u00fcst\u00fc kullan\u0131yor:<\/p>\n<ul>\n<li>Bak\u0131m kolayl\u0131\u011f\u0131: Veri depolama sistemi, her bir \u00e7al\u0131\u015fan veya benzer sorumluluklara sahip \u00e7al\u0131\u015fma gruplar\u0131 i\u00e7in sanal makinelerin \u00f6nceden yap\u0131land\u0131r\u0131lm\u0131\u015f imajlar\u0131n\u0131 saklar ve hepsi merkezi olarak y\u00f6netilerek BT departman\u0131ndaki y\u00fck azalt\u0131l\u0131r;<\/li>\n<li>\u00d6l\u00e7eklenebilirlik: Bir \u00e7al\u0131\u015fan\u0131n aniden daha fazla bilgi i\u015flem g\u00fcc\u00fcne veya daha fazla RAM\u2019e ihtiyac\u0131 olursa, y\u00f6netici ekipman\u0131 fiziksel olarak y\u00fckseltmek yerine gerekli kaynaklar\u0131 onlara atayabilir;<\/li>\n<li>Esneklik: Sanal makineye ba\u011flanan bir cihaz bozulursa, \u00e7al\u0131\u015fan herhangi bir veri veya zaman kaybetmeden ba\u015fka bir cihaz \u00fczerinden kolayca tekrar ba\u011flanabilir;<\/li>\n<li>G\u00fcvenlik: Tahmin edebilece\u011finiz gibi Kaspersky bunu en \u00f6nemli avantaj olarak g\u00f6r\u00fcyor ve \u00f6zellikle ince istemcilerle birlikte kullan\u0131lan uzak masa\u00fcst\u00fc teknolojisi g\u00fcvenlik a\u00e7\u0131s\u0131ndan olduk\u00e7a g\u00fc\u00e7l\u00fcd\u00fcr.<\/li>\n<\/ul>\n<h2>Sanal masa\u00fcstleri, ince istemciler ve g\u00fcvenlik<\/h2>\n<p>G\u00fcvenlik a\u00e7\u0131s\u0131ndan bak\u0131ld\u0131\u011f\u0131nda, \u00e7al\u0131\u015fanlar\u0131n kulland\u0131\u011f\u0131 yaz\u0131l\u0131ma kar\u0131\u015fmadan, onlar\u0131 korumaktan ba\u015fka hi\u00e7bir ama\u00e7lar\u0131 yoksa sanal masa\u00fcstleri iyidir. Elbette, kullan\u0131c\u0131lar i\u015f dosyalar\u0131n\u0131 ve aray\u00fcz ayarlar\u0131n\u0131 de\u011fi\u015ftirebilir, ancak bunlar sanal makineden ayr\u0131 olarak saklan\u0131r. Yaz\u0131l\u0131mda yap\u0131lan t\u00fcm de\u011fi\u015fiklikler \u2014 ve sanal makineye indirilen k\u00f6t\u00fc ama\u00e7l\u0131 kodlar \u2014 bilgisayar\u0131 yeniden ba\u015flatt\u0131ktan sonra kaybolur. Bu, sanal makinelerin korumas\u0131z \u015fekilde \u00e7al\u0131\u015fabilece\u011fi anlam\u0131na gelmez, ancak bir APT\u2019nin bir i\u015f bilgisayar\u0131nda gizlenme olas\u0131l\u0131\u011f\u0131n\u0131 b\u00fcy\u00fck \u00f6l\u00e7\u00fcde azalt\u0131r.<\/p>\n<p>Bununla birlikte yukar\u0131da da bahsetti\u011fimiz gibi, kullan\u0131c\u0131lar ince istemcilerden sanal masa\u00fcstlerine ba\u011flanarak g\u00fcvenlik konusunda maksimum fayda sa\u011flar. Ince istemci, terminal modunda bir ayg\u0131tt\u0131r. Genellikle herhangi bir dahili depolamaya bile sahip de\u011fildir, yaln\u0131zca bir sunucuya ba\u011flanan ve kullan\u0131c\u0131lar\u0131n bir monit\u00f6r ve \u00e7evre birimlerini ba\u011flamas\u0131na izin veren bir kutudur (yap\u0131land\u0131rma modele ba\u011fl\u0131 olarak de\u011fi\u015febilir). Ince istemci herhangi bir i\u015f verisini i\u015flemez veya saklamaz.<\/p>\n<p>Elbette bir ince istemci, iyi bir ileti\u015fim kanal\u0131na ihtiya\u00e7 duyar. Ancak son y\u0131llarda, bu o kadar da b\u00fcy\u00fck bir sorun de\u011fildir.<\/p>\n<p>Bir ince istemci ile bir sunucu aras\u0131ndaki ileti\u015fim, genellikle \u015fifrelenmi\u015f bir protokol \u00fczerinden y\u00fcr\u00fct\u00fcl\u00fcr ve bu, g\u00fcvenilmeyen a\u011f ortam\u0131 sorununu \u00e7\u00f6zer. Tabii ki kullan\u0131c\u0131n\u0131n bak\u0131\u015f a\u00e7\u0131s\u0131ndan ince istemci, \u00f6rne\u011fin bir diz\u00fcst\u00fc bilgisayara g\u00f6re \u00e7ok daha az y\u00f6nl\u00fc bir cihazd\u0131r. Ince istemcileri oyun oynamak, \u00fc\u00e7\u00fcnc\u00fc taraf bilgi sistemlerine ba\u011flanmak veya i\u015fyerinde zaten yap\u0131lmas\u0131 yasak olabilecek \u00e7e\u015fitli \u015feyleri yapmak i\u00e7in kullanamazs\u0131n\u0131z. Ayr\u0131ca bu t\u00fcr bir cihaz\u0131n, donan\u0131m h\u0131rs\u0131zl\u0131\u011f\u0131n\u0131n olas\u0131 sorunlar\u0131ndan birini \u00e7\u00f6zd\u00fc\u011f\u00fcn\u00fc de belirtmek gerekir; saklanan veri yoksa, veri s\u0131z\u0131nt\u0131s\u0131 da olmaz.<\/p>\n<p>\u015eirketlerin uzaktan \u00e7al\u0131\u015fma konusunda bilgi g\u00fcvenli\u011fini sa\u011flamaya y\u00f6nelik artan ilgisinden yola \u00e7\u0131karak, anahtar teslimi uzak masa\u00fcst\u00fc altyap\u0131 \u00e7\u00f6z\u00fcmlerine olan ihtiyac\u0131n giderek artaca\u011f\u0131n\u0131 \u00f6ng\u00f6r\u00fcyoruz. B\u00fcy\u00fck olas\u0131l\u0131kla en uygulanabilir plan, fiziksel altyap\u0131y\u0131 \u00f6nemli \u00f6l\u00e7\u00fcde de\u011fi\u015ftirmek zorunda kalmamak i\u00e7in halka a\u00e7\u0131k bulut hizmetlerini kullanmak olacakt\u0131r. Yani, b\u00fcy\u00fck \u015firketlerin VDI\u2019ya ge\u00e7i\u015f yapt\u0131\u011f\u0131 a\u015famaya yakla\u015ft\u0131\u011f\u0131m\u0131z g\u00f6r\u00fcl\u00fcyor. Bu, aktif olarak bu alandaki uzmanl\u0131\u011f\u0131m\u0131z\u0131 geli\u015ftirmemizin ve KasperskyOS i\u015fletim sistemimiz \u00fczerinde \u00e7al\u0131\u015fan ince istemciler i\u00e7in \u00e7\u00f6z\u00fcmler \u00fcretmeye \u00e7al\u0131\u015fmam\u0131z\u0131n sebebidir.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Toplu olarak evden \u00e7al\u0131\u015fmaya ge\u00e7i\u015f, g\u00fcvenli ve kullan\u0131\u015fl\u0131 bir uzaktan \u00e7al\u0131\u015fma ortam\u0131 i\u00e7in en iyi teknolojileri a\u00e7\u0131k \u015fekilde ortaya koydu.<\/p>\n","protected":false},"author":2617,"featured_media":8788,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194],"tags":[2266,1373,2145],"class_list":{"0":"post-8787","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"tag-ince-istemciler","10":"tag-kasperskyos","11":"tag-uzaktan-calisma"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/thin-client-cybersecurity\/8787\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/thin-client-cybersecurity\/21838\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/thin-client-cybersecurity\/17322\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/thin-client-cybersecurity\/23211\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/thin-client-cybersecurity\/21401\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/thin-client-cybersecurity\/20042\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/thin-client-cybersecurity\/23814\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/thin-client-cybersecurity\/22723\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/thin-client-cybersecurity\/29021\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/thin-client-cybersecurity\/36902\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/thin-client-cybersecurity\/15586\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/thin-client-cybersecurity\/15999\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/thin-client-cybersecurity\/13960\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/thin-client-cybersecurity\/25135\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/thin-client-cybersecurity\/11923\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/thin-client-cybersecurity\/29149\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/thin-client-cybersecurity\/26028\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/thin-client-cybersecurity\/22812\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/thin-client-cybersecurity\/28132\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/thin-client-cybersecurity\/27982\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/uzaktan-calisma\/","name":"uzaktan \u00e7al\u0131\u015fma"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/8787","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2617"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=8787"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/8787\/revisions"}],"predecessor-version":[{"id":8792,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/8787\/revisions\/8792"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/8788"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=8787"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=8787"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=8787"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}