{"id":9288,"date":"2021-02-05T14:49:47","date_gmt":"2021-02-05T11:49:47","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=9288"},"modified":"2021-02-05T14:49:47","modified_gmt":"2021-02-05T11:49:47","slug":"data-on-used-devices","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/data-on-used-devices\/9288\/","title":{"rendered":"\u0130kinci el sat\u0131n al\u0131nan cihazlarda \u00f6zel verilerin a\u00e7\u0131\u011fa \u00e7\u0131kmas\u0131"},"content":{"rendered":"<p>Kaspersky Global Ara\u015ft\u0131rma ve Analiz Ekibi (GReAT), ikinci el cihazlar\u0131n g\u00fcvenli\u011fini <a href=\"https:\/\/www.businessleader.co.uk\/used-not-useless-data-on-second-hand-devices-creates-a-cybersecurity-concern-for-businesses\/107570\/\" target=\"_blank\" rel=\"noopener nofollow\">inceledi<\/a>. DACH ara\u015ft\u0131rma ba\u015fkanlar\u0131 Marco Preuss ve Christian Funk\u2019\u0131n 2020\u2019nin sonlar\u0131nda iki ay boyunca inceledikleri cihazlar aras\u0131nda kullan\u0131lm\u0131\u015f diz\u00fcst\u00fc bilgisayarlar, sabit diskler ve haf\u0131za kartlar\u0131 gibi \u00e7e\u015fitli depolama cihazlar\u0131 mevcuttu.<\/p>\n<p>Ama\u00e7lar\u0131, cihaz t\u00fcr\u00fcne g\u00f6re farkl\u0131l\u0131klar\u0131 belirlemek de\u011fil; bunlarla ilgili verileri incelemek, elektronik verilerin ki\u015fi veya di\u011fer ikincil pazar sat\u0131\u015f baz\u0131nda aras\u0131ndaki ili\u015fkiyi \u00f6\u011frenmekti. Bir sat\u0131c\u0131 olarak geride ne gibi izler b\u0131rak\u0131yor olabilirsiniz? Bir al\u0131c\u0131 olarak, cihaz\u0131n\u0131z\u0131n yepyeni bir cihaz gibi davranmas\u0131n\u0131 nas\u0131l sa\u011flayabilirsiniz? Siz bunu yapana kadar, yeni cihaz\u0131n\u0131z\u0131 kullanmak g\u00fcvenli mi?<\/p>\n<h2>Bulgular<\/h2>\n<p>Ara\u015ft\u0131rmac\u0131lar\u0131n inceledi\u011fi cihazlar\u0131n b\u00fcy\u00fck \u00e7o\u011funlu\u011fu, genellikle ki\u015fisel ancak bir k\u0131sm\u0131 kurumsal veri izlerini de i\u00e7eriyordu. Ayr\u0131ca, cihazlar\u0131n %16\u2019s\u0131ndan fazlas\u0131 ara\u015ft\u0131rmac\u0131lara do\u011frudan eri\u015fim imkan\u0131 sundu. Ara\u015ft\u0131rmac\u0131lar file-carving y\u00f6ntemlerini uygulad\u0131\u011f\u0131nda, geri kalan %74 cihaz\u0131n i\u00e7eri\u011fi ortaya \u00e7\u0131kt\u0131. Verilerin sadece %11\u2019i d\u00fczg\u00fcn bir \u015fekilde silinmi\u015fti.<\/p>\n<p>Preuss ve Funk\u2019\u0131n buldu\u011fu veriler, potansiyel derecede zarars\u0131z veya korkun\u00e7 derecede a\u00e7\u0131klay\u0131c\u0131 ve hatta tehlikeli olabilecek \u00f6\u011feler i\u00e7eriyordu: Takvim kay\u0131tlar\u0131, toplant\u0131 notlar\u0131, \u015firket kaynaklar\u0131 eri\u015fim verileri, dahili belgeler, ki\u015fisel foto\u011fraflar, t\u0131bbi bilgiler, vergi belgeleri ve daha fazlas\u0131. Ayr\u0131ca, Funk\u2019\u0131n da belirtti\u011fi gibi, ki\u015fisel veriler zamanla de\u011fer kaybetme e\u011filiminde de\u011fildir. Bir s\u00fcre ge\u00e7tikten sonra riskin ge\u00e7mesini bekleyip daha g\u00fcvende hissedemezsiniz (g\u00fcvende hissediyor olman\u0131z, riski herhangi bir \u015fekilde azaltmaz).<\/p>\n<p>\u0130rtibat listeleri, vergi belgeleri ve t\u0131bbi kay\u0131tlar (veya kay\u0131tl\u0131 parolalar arac\u0131l\u0131\u011f\u0131yla bunlara eri\u015fim) gibi do\u011frudan kullan\u0131labilir bilgilere ek olarak, elektronik cihazlar ikinci el hasara neden olabilecek bilgiler i\u00e7erir. Siber su\u00e7lular\u0131n sosyal a\u011f profillerinden ve g\u00f6nderilerinden toplad\u0131klar\u0131 bilgileri nas\u0131l kulland\u0131klar\u0131n\u0131 d\u00fc\u015f\u00fcn\u00fcn. Dijital bir cihaz\u0131n i\u00e7eri\u011fi \u00e7ok daha bilgilendiricidir.<\/p>\n<h2>K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mdan bahsetmi\u015f miydik?<\/h2>\n<p>Ba\u015fka kimsenin sizinle dijital cihaz g\u00fcvenli\u011fi konusundaki titizli\u011fi payla\u015fmad\u0131\u011f\u0131n\u0131 s\u00f6ylemek g\u00fcvenlidir. Baz\u0131lar\u0131, i\u015fleri sizden daha s\u0131k\u0131 bir \u015fekilde ba\u011flayabilir. Ancak ikinci el sat\u0131n al\u0131rsan\u0131z, yaln\u0131zca ba\u015fkas\u0131n\u0131n verilerini de\u011fil \u2013 ayn\u0131 zamanda k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131 da bonus olarak sat\u0131n alma olas\u0131l\u0131\u011f\u0131n\u0131z bulunuyor. Preuss ve Funk\u2019\u0131n inceledi\u011fi cihazlar\u0131n %17\u2019si, vir\u00fcs taray\u0131c\u0131 alarmlar\u0131m\u0131z\u0131 tetikledi.<\/p>\n<h2>Tan\u0131t\u0131m: Daha kapsaml\u0131 bir \u00e7al\u0131\u015fma<\/h2>\n<p>Burada raporlad\u0131\u011f\u0131m\u0131z ara\u015ft\u0131rma asl\u0131nda Kaspersky\u2019nin Arlington Research\u2019i g\u00f6revlendirdi\u011fi bir <a href=\"https:\/\/www.techradar.com\/news\/second-hand-devices-are-an-absolute-privacy-nightmare\" target=\"_blank\" rel=\"noopener nofollow\">\u00e7al\u0131\u015fmayla<\/a> ba\u015flad\u0131. Birle\u015fik Krall\u0131k, Almanya ve Avusturya\u2019daki birka\u00e7 bin yeti\u015fkin t\u00fcketiciyi sorgulad\u0131. \u0130kinci el dijital sat\u0131\u015flar\u0131n ger\u00e7ekten sa\u011flam ve ger\u00e7ekten de g\u00fcvenilir bir veri s\u0131z\u0131nt\u0131s\u0131 oldu\u011funu bularak, ilk \u00e7al\u0131\u015fma bir t\u00fcr do\u011frulama i\u015flevi g\u00f6rd\u00fc. Y\u00fczlerce al\u0131c\u0131n\u0131n yar\u0131s\u0131ndan az\u0131 sat\u0131n ald\u0131klar\u0131 cihazlarda herhangi bir foto\u011fraf, \u201cm\u00fcstehcen i\u00e7erik\u201d, ileti\u015fim bilgileri, pasaport gibi hassas belgeler veya giri\u015f bilgileri bulamad\u0131.<\/p>\n<h3>Sat\u0131c\u0131lar dikkatli olmal\u0131<\/h3>\n<p>Ankete kat\u0131lanlar\u0131n yakla\u015f\u0131k %10\u2019una sat\u0131c\u0131n\u0131n bilgilerinin oldu\u011fu cihazlar verilmi\u015f olsa da, pek \u00e7o\u011fu, bulunan verileri g\u00f6rmezden gelmeyecek, hemen silmeyecek veya bulunan verileri as\u0131l sahibine veya herhangi bir yetkiliye bildirmeyecekti. \u015e\u00f6yle bir g\u00f6z atman\u0131n \u00f6tesinde (ki kat\u0131l\u0131mc\u0131lar\u0131n %74\u2019\u00fc bunu yapman\u0131n bir yolunu bulacaklar\u0131n\u0131 s\u00f6yledi), 10 ki\u015fide 1\u2019den fazlas\u0131, bulduklar\u0131 verileri bundan kar elde edebileceklerini d\u00fc\u015f\u00fcn\u00fcrlerse satacaklar\u0131n\u0131 itiraf etti.<\/p>\n<h2>\u00d6neriler ve ipu\u00e7lar\u0131<\/h2>\n<p>Birle\u015fik Krall\u0131k Ulusal Siber G\u00fcvenlik Merkezi (NCSC), ikinci el elektronik cihaz al\u0131c\u0131lar\u0131 ve sat\u0131c\u0131lar\u0131 i\u00e7in ki\u015fisel verilerin yedeklenmesinden cihaz\u0131n yeni al\u0131nm\u0131\u015f kadar m\u00fckemmel olmas\u0131n\u0131 sa\u011flamaya kadar baz\u0131 <a href=\"https:\/\/www.ncsc.gov.uk\/guidance\/buying-selling-second-hand-devices\" target=\"_blank\" rel=\"noopener nofollow\">i\u015fe yarar tavsiyelerde<\/a> bulunuyor.<\/p>\n<h3>Sat\u0131c\u0131lar i\u00e7in<\/h3>\n<p>Bir sat\u0131c\u0131 olarak en b\u00fcy\u00fck \u00f6nceli\u011finiz, bilgilerinizi hem g\u00fcvenli hem de gizli tutabilmek i\u00e7in satt\u0131\u011f\u0131n\u0131z cihazdan silmek. Evet, cihaz\u0131n g\u00fcvenli oldu\u011fundan emin olmak da \u00f6nemlidir. Umuyoruz en ba\u015f\u0131ndan b\u00f6yle yapm\u0131\u015fs\u0131n\u0131zd\u0131r, ancak buradaki ama\u00e7, bilgilerinizi kendinize saklaman\u0131zd\u0131r.<\/p>\n<ul>\n<li>Verilerinizi yedekleyin. \u0130ster telefonda, bilgisayarda, haf\u0131za kart\u0131nda veya ba\u015fka bir depolama bi\u00e7iminde olsun, satt\u0131\u011f\u0131n\u0131z cihazdan silmeden \u00f6nce verilerinizi g\u00fcvenli bir \u015fekilde <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/how-to-backup\/4212\/\" target=\"_blank\" rel=\"noopener\">yedekleyin<\/a>;<\/li>\n<li>SIM ve haf\u0131za kartlar\u0131n\u0131 telefonlardan \u00e7\u0131kar\u0131n. Cihaz\u0131n\u0131z eSIM kullan\u0131yorsa silin;<\/li>\n<li>Buna izin veren t\u00fcm hesaplar i\u00e7in iki fakt\u00f6rl\u00fc kimlik do\u011frulamay\u0131 etkinle\u015ftirin. Ard\u0131ndan satt\u0131\u011f\u0131n\u0131z cihazdaki her hizmetten (bankac\u0131l\u0131k, e-posta, sosyal medya vb.) \u00e7\u0131k\u0131\u015f yap\u0131n;<\/li>\n<li>S\u00f6z konusu cihaz\u0131 fabrika ayarlar\u0131na s\u0131f\u0131rlay\u0131n veya medyay\u0131 bi\u00e7imlendirin;<\/li>\n<li>Bir\u00e7ok durumda verilerin fabrika ayarlar\u0131na s\u0131f\u0131rland\u0131ktan veya bi\u00e7imlendirildikten sonra bile kurtar\u0131labilece\u011fini unutmay\u0131n. Ayg\u0131tta hi\u00e7bir \u015feyin kalmad\u0131\u011f\u0131ndan emin olmak i\u00e7in ayg\u0131t t\u00fcr\u00fcne, modeline ve yap\u0131land\u0131rmas\u0131na ba\u011fl\u0131 olarak baz\u0131 ek ad\u0131mlar uygulaman\u0131z gerekir. Cihaz\u0131n\u0131zdan t\u00fcm verileri g\u00fcvenli bir \u015fekilde silmenin yollar\u0131n\u0131 ara\u015ft\u0131r\u0131n.<\/li>\n<\/ul>\n<h3>Al\u0131c\u0131lar i\u00e7in<\/h3>\n<p>\u0130kinci el cihaz al\u0131c\u0131lar\u0131na tavsiyemiz, dijital sahiplik konusundaki genel tavsiyemize benzerlik g\u00f6steriyor. Ancak, biraz daha \u00f6nemli \u00e7\u00fcnk\u00fc ikinci el bir cihaz\u0131n kirli oldu\u011funu varsaymam\u0131z gerekiyor. Sonradan pi\u015fman olaca\u011f\u0131n\u0131za ba\u015ftan tedbirli olmak daha ak\u0131ll\u0131cad\u0131r.<\/p>\n<ul>\n<li>S\u00f6z konusu cihaz\u0131n \u00f6zelliklerine g\u00f6re, fabrika ayarlar\u0131na s\u0131f\u0131rlay\u0131n veya depolama ortam\u0131n\u0131 bi\u00e7imlendirin;<\/li>\n<li>Bir cihazda halihaz\u0131rda bulunan k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mla kar\u015f\u0131la\u015fma riskini ortadan kald\u0131rmak i\u00e7in, m\u00fcmk\u00fcnse, cihaz\u0131 sat\u0131n almadan \u00f6nce\u00a0<a href=\"https:\/\/www.kaspersky.com.tr\/advert\/security-cloud?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____ksc___\" target=\"_blank\" rel=\"noopener\">g\u00fcvenilir bir g\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fcn\u00fc<\/a> kurun ve etkinle\u015ftirin. Cihaz\u0131 ilk kez kullanmadan \u00f6nce de bir tarama yap\u0131n.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksc\">\n","protected":false},"excerpt":{"rendered":"<p>Uzmanlar\u0131m\u0131z, kullan\u0131lm\u0131\u015f cihazlarda kar\u015f\u0131la\u015f\u0131lan veri s\u0131z\u0131nt\u0131s\u0131n\u0131 a\u00e7\u0131kl\u0131yor.<\/p>\n","protected":false},"author":2045,"featured_media":9289,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[994,1284,1352,995],"tags":[720,2361,500,2360,2359],"class_list":{"0":"post-9288","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-privacy","8":"category-tips","9":"category-special-projects","10":"category-technology","11":"tag-bagli-cihazlar","12":"tag-cihaz-satisi","13":"tag-gizlilik","14":"tag-ikinci-el-alisveris","15":"tag-ikinci-el-satis"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/data-on-used-devices\/9288\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/data-on-used-devices\/22470\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/data-on-used-devices\/17960\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/data-on-used-devices\/24175\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/data-on-used-devices\/22252\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/data-on-used-devices\/20950\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/data-on-used-devices\/24618\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/data-on-used-devices\/23817\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/data-on-used-devices\/30039\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/data-on-used-devices\/38610\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/data-on-used-devices\/16332\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/data-on-used-devices\/16904\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/data-on-used-devices\/14432\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/data-on-used-devices\/26158\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/data-on-used-devices\/29960\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/data-on-used-devices\/26649\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/data-on-used-devices\/28850\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/data-on-used-devices\/28656\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/gizlilik\/","name":"Gizlilik"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9288","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2045"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=9288"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9288\/revisions"}],"predecessor-version":[{"id":9290,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9288\/revisions\/9290"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/9289"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=9288"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=9288"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=9288"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}