{"id":8840,"date":"2020-09-24T11:54:52","date_gmt":"2020-09-24T08:54:52","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=8840"},"modified":"2020-09-24T12:02:09","modified_gmt":"2020-09-24T09:02:09","slug":"industrial-cybersecurity-2020","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/industrial-cybersecurity-2020\/8840\/","title":{"rendered":"2020 End\u00fcstriyel Siber G\u00fcvenlik Anketi"},"content":{"rendered":"<p>Her g\u00fcvenlik g\u00f6revlisi, kurumsal sistemlere yap\u0131lan uzaktan ba\u011flant\u0131lar\u0131 potansiyel bir tehdit olarak g\u00f6r\u00fcr. End\u00fcstriyel kurulu\u015flarda ve \u00f6zellikle kritik altyap\u0131 tesislerindeki bilgi g\u00fcvenli\u011fi uzmanlar\u0131 i\u00e7in bu tehdit olduk\u00e7a ger\u00e7ek.<\/p>\n<p>Bu konuda tedbirli olduklar\u0131 i\u00e7in onlar\u0131 su\u00e7lamak yersiz olur. Herhangi bir aksaman\u0131n ya da ar\u0131zan\u0131n milyonlarca dolar zarar anlam\u0131na gelebilece\u011fi end\u00fcstriyel kurulu\u015flar, her t\u00fcrden siber su\u00e7lular i\u00e7in cazip hedeflerdir. Fidye yaz\u0131l\u0131m\u0131 kullananlar s\u00fcrekli end\u00fcstriyel sistemlere eri\u015fmek i\u00e7in kullanabilecekleri a\u00e7\u0131k RDP ba\u011flant\u0131lar\u0131n\u0131 ara\u015ft\u0131r\u0131rlar. Yayg\u0131n olarak bilinen e-posta adreslerine sahip \u00e7al\u0131\u015fanlar s\u0131k s\u0131k, sald\u0131rganlara uzaktan eri\u015fim sa\u011flayan Truva atlar\u0131na ba\u011flant\u0131lar i\u00e7eren kimlik av\u0131 e-postalar\u0131 al\u0131r. Siber su\u00e7lular, end\u00fcstriyel mekanlarda kullan\u0131lan \u0131s\u0131tma, havaland\u0131rma ve iklimlendirme sistemlerine bazen uzaktan da ba\u011flanan HVAC operat\u00f6rlerini takip etmeyi ihmal etmezler.<\/p>\n<p>2020\u2019den \u00f6nce durum a\u015fa\u011f\u0131 yukar\u0131 b\u00f6yleydi. Salg\u0131n, al\u0131nan \u00e7e\u015fitli karantina \u00f6nlemleri ve k\u00fcresel olarak uzaktan \u00e7al\u0131\u015fmaya ge\u00e7i\u015f, bu y\u0131l bilgi g\u00fcvenli\u011fi birimlerinin i\u015fleyi\u015flerini ve \u00e7al\u0131\u015fma y\u00f6ntemlerini g\u00f6zden ge\u00e7irerek gerekli d\u00fczenlemeleri yapmalar\u0131n\u0131 zorunlu k\u0131ld\u0131. Bu nedenle, end\u00fcstriyel kurulu\u015flarda \u00e7al\u0131\u015fan bilgi g\u00fcvenli\u011fi uzman\u0131 meslekta\u015flar\u0131m\u0131z, \u00f6ncelikler ve yakla\u015f\u0131mlar dahil olmak \u00fczere yeni ko\u015fullar\u0131n bilgi g\u00fcvenli\u011fini nas\u0131l etkiledi\u011fi konusunda daha fazla bilgi edinmeye karar verdiler. Bu durum, t\u00fcm d\u00fcnyada end\u00fcstriyel kurulu\u015flarda siber g\u00fcvenlik konusundaki karar al\u0131c\u0131larla politik anlamda n\u00fcfuza sahip ki\u015filerin kar\u015f\u0131l\u0131kl\u0131 g\u00f6r\u00fc\u015f al\u0131\u015fveri\u015fi yapmalar\u0131n\u0131 gerektirdi.<\/p>\n<p>G\u00f6r\u00fc\u015fmelerde dikkat \u00e7ekici sonu\u00e7lara ula\u015f\u0131ld\u0131: Ankete kat\u0131lanlar\u0131n yar\u0131s\u0131ndan fazlas\u0131 (%53) pandeminin daha fazla \u00e7al\u0131\u015fan\u0131n evden \u00e7al\u0131\u015fmas\u0131na neden oldu\u011funu ve bunun da bilgi g\u00fcvenli\u011fi hizmetleri i\u00e7in bir t\u00fcr stres testine d\u00f6n\u00fc\u015ft\u00fc\u011f\u00fcn\u00fc itiraf etti. \u00c7ok say\u0131da harici ba\u011flant\u0131 olmas\u0131 nedeniyle, \u015firketlerin b\u00fcy\u00fck \u00e7o\u011funlu\u011fu art\u0131k operasyonel teknoloji (OT) a\u011flar\u0131n\u0131n g\u00fcvenlik seviyesi de\u011ferlendirmelerini periyodik olarak yap\u0131yor (ankete kat\u0131lanlar\u0131n %5\u2019i hari\u00e7 t\u00fcm\u00fc bu t\u00fcr planlara sahipti). Bir\u00e7o\u011fu, \u00e7evresel korumaya y\u00f6nelik genel yakla\u015f\u0131mlar\u0131n\u0131 yeniden de\u011ferlendirmek zorunda kald\u0131; segmentasyon ve i\u015f istasyonu g\u00fcvenli\u011finin art\u0131k yeterli olmad\u0131\u011f\u0131 anla\u015f\u0131ld\u0131. Ankete kat\u0131lanlar\u0131n yaln\u0131zca %7\u2019si siber g\u00fcvenlik stratejilerinin salg\u0131n s\u0131ras\u0131nda kabul edilebilir seviyede etkili oldu\u011funu belirtti.<\/p>\n<p>\u00c7al\u0131\u015fman\u0131n sonu\u00e7lar\u0131 hakk\u0131nda daha fazla bilgi edinmek i\u00e7in raporun tamam\u0131na buradan ula\u015fabilirsiniz: \u201c<a href=\"https:\/\/ics.kaspersky.com\/the-state-of-industrial-cybersecurity-2020\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Dijitalle\u015fme \u00e7a\u011f\u0131nda end\u00fcstriyel siber g\u00fcvenli\u011fin durumu.<\/a>\u201d Rapor, salg\u0131n\u0131n end\u00fcstriyel g\u00fcvenlik sorumlular\u0131n\u0131n \u00e7al\u0131\u015fmalar\u0131n\u0131 nas\u0131l etkiledi\u011fini a\u00e7\u0131klaman\u0131n yan\u0131 s\u0131ra, g\u00fcvenlik kararlar\u0131 \u00fczerinde kimlerin ve nas\u0131l etkisi oldu\u011fu, inovasyonun itici g\u00fc\u00e7lerinin kimler oldu\u011fu ve hepsinden \u00f6nemlisi siber g\u00fcvenlik birimlerinin 2020\u2019de kar\u015f\u0131la\u015ft\u0131\u011f\u0131 sorunlar gibi \u00e7e\u015fitli ba\u015fl\u0131klarda i\u00e7g\u00f6r\u00fc sa\u011fl\u0131yor.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>End\u00fcstriyel g\u00fcvenlik uzmanlar\u0131m\u0131z, pandemide end\u00fcstriyel siber g\u00fcvenli\u011fin durumu \u00fczerine bir ara\u015ft\u0131rma yapt\u0131.<\/p>\n","protected":false},"author":2581,"featured_media":8841,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194],"tags":[667,906,550,2145,1953],"class_list":{"0":"post-8840","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"tag-arastirma","10":"tag-ics","11":"tag-siber-guvenlik","12":"tag-uzaktan-calisma","13":"tag-uzaktan-erisim"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/industrial-cybersecurity-2020\/8840\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/industrial-cybersecurity-2020\/21905\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/industrial-cybersecurity-2020\/17379\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/industrial-cybersecurity-2020\/23296\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/industrial-cybersecurity-2020\/21488\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/industrial-cybersecurity-2020\/20111\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/industrial-cybersecurity-2020\/23878\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/industrial-cybersecurity-2020\/22840\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/industrial-cybersecurity-2020\/29089\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/industrial-cybersecurity-2020\/37031\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/industrial-cybersecurity-2020\/15685\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/industrial-cybersecurity-2020\/16066\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/industrial-cybersecurity-2020\/13988\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/industrial-cybersecurity-2020\/25182\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/industrial-cybersecurity-2020\/29260\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/industrial-cybersecurity-2020\/26101\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/industrial-cybersecurity-2020\/22878\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/industrial-cybersecurity-2020\/28199\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/industrial-cybersecurity-2020\/28031\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/ics\/","name":"ICS"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/8840","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2581"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=8840"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/8840\/revisions"}],"predecessor-version":[{"id":8850,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/8840\/revisions\/8850"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/8841"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=8840"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=8840"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=8840"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}