{"id":9801,"date":"2021-07-07T11:21:40","date_gmt":"2021-07-07T08:21:40","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=9801"},"modified":"2021-07-07T13:02:21","modified_gmt":"2021-07-07T10:02:21","slug":"cyberthreats-in-isolated-subnet","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/cyberthreats-in-isolated-subnet\/9801\/","title":{"rendered":"\u0130zole edilmi\u015f alt a\u011flar g\u00fcvenliymi\u015f gibi g\u00f6r\u00fcn\u00fcr"},"content":{"rendered":"<p>Baz\u0131 bilgi g\u00fcvenli\u011fi uzmanlar\u0131 izole edilmi\u015f a\u011flar\u0131n fazladan korumaya ihtiyac\u0131 olmad\u0131\u011f\u0131n\u0131 d\u00fc\u015f\u00fcn\u00fcr. Tehditlerin i\u00e7eri girebilmesinin bir yolu yoksa, neden u\u011fra\u015fas\u0131n\u0131z ki? Ancak izolasyon, a\u011f\u0131n a\u015f\u0131lamaz oldu\u011fu anlam\u0131na gelmez. Uzmanlar\u0131m\u0131z bunu size kan\u0131tlamak i\u00e7in ya\u015fanm\u0131\u015f vakalara dayanan birka\u00e7 senaryo payla\u015ft\u0131.<\/p>\n<p>Diyelim ki kurulu\u015fumuzun, hava aral\u0131\u011f\u0131 olan izole edilmi\u015f bir alt a\u011f\u0131 var. Bu da demek oluyor ki, ne internetten, ne de ayn\u0131 kurulu\u015fun a\u011f\u0131n\u0131n di\u011fer b\u00f6l\u00fctlerinden bu a\u011fa eri\u015filemiyor. Dahas\u0131, \u015firketin bilgi g\u00fcvenli\u011fi politikas\u0131na g\u00f6re a\u015fa\u011f\u0131daki kurallar uygulan\u0131yor:<\/p>\n<ul>\n<li>B\u00f6l\u00fctteki t\u00fcm makinelerde antivir\u00fcs yaz\u0131l\u0131m\u0131 kullan\u0131lmal\u0131 ve haftada bir (izole edilmi\u015f bir b\u00f6l\u00fct i\u00e7in yeterince iyi bir s\u0131kl\u0131k) manuel olarak g\u00fcncellenmeli;<\/li>\n<li>Her makinenin cihaz kontrol sistemi, g\u00fcvenilen cihazlar d\u0131\u015f\u0131ndaki flash s\u00fcr\u00fcc\u00fclere ba\u011flanmay\u0131 engellemeli;<\/li>\n<li>Alanda cep telefonu kullanmak yasak.<\/li>\n<\/ul>\n<p>Burada tuhaf bir durum yok. Ne k\u00f6t\u00fc gidebilir ki?<\/p>\n<h2>Birinci senaryo: Kendin-yap tarz\u0131 internet ba\u011flant\u0131s\u0131<\/h2>\n<p>Bir i\u015fletme internet ba\u011flant\u0131s\u0131n\u0131 kaybederse, can\u0131 s\u0131k\u0131lm\u0131\u015f \u00e7al\u0131\u015fanlar ge\u00e7ici \u00e7\u00f6z\u00fcmlere ba\u015fvurur. Baz\u0131lar\u0131 fazladan bir telefon bulur, bunu dan\u0131\u015fmadaki birine verir ve i\u015f bilgisayar\u0131n\u0131 \u00e7evrimi\u00e7i yapmak i\u00e7in, telefonu modem olarak kullan\u0131r.<\/p>\n<p>Bu b\u00f6l\u00fct i\u00e7in haz\u0131rlanan tehdit modeli, a\u011fdan gelen sald\u0131r\u0131lar\u0131, internetten gelen k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131 veya benzer g\u00fcvenlik sorunlar\u0131n\u0131 beklemez. Ayr\u0131ca ger\u00e7ek hayatta, her y\u00f6netici antivir\u00fcs program\u0131n\u0131 her hafta g\u00fcncellemez. Bunun sonucunda da siber su\u00e7lular, bir bilgisayar\u0131 Truva At\u0131 casus yaz\u0131l\u0131m\u0131yla ele ge\u00e7irip a\u011fa eri\u015fim elde edebilir ve k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131 t\u00fcm alt yaz\u0131l\u0131ma yayarak bir antivir\u00fcs g\u00fcncellemesi onu durdurana kadar bilgi s\u0131zd\u0131rmaya devam edebilir.<\/p>\n<h2>\u0130kinci senaryo: Her kural\u0131n istisnas\u0131<\/h2>\n<p>\u0130zole edilmi\u015f a\u011flar\u0131n bile istisnalar\u0131 vard\u0131r, \u00f6rne\u011fin g\u00fcvenilen flash s\u00fcr\u00fcc\u00fclere izin verirler. Bu t\u00fcrden flash s\u00fcr\u00fcc\u00fclerin \u00fczerinde hi\u00e7 s\u0131n\u0131rlama olmazken; bunlar\u0131n sistemden dosyalar\u0131 kopyalamak, sisteme dosya yerle\u015ftirmek veya a\u011f\u0131n izole edilmemi\u015f k\u0131s\u0131mlar\u0131nda y\u00f6netici izniyle bir \u015feyler yapmak i\u00e7in kullan\u0131lmayaca\u011f\u0131n\u0131 nereden bilebiliriz? Dahas\u0131, teknik destek ekibi bazen, \u00f6rne\u011fin, b\u00f6l\u00fct\u00fcn i\u00e7indeki a\u011f ekipman\u0131n\u0131 ayarlamak i\u00e7in kendi bilgisayarlar\u0131n\u0131 da izole edilmi\u015f a\u011fa ba\u011flayabilir.<\/p>\n<p>G\u00fcvenilen bir flash s\u00fcr\u00fcc\u00fc veya bilgisayar, s\u0131f\u0131r g\u00fcn k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131 i\u00e7in bir ta\u015f\u0131y\u0131c\u0131 haline gelse de k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m, genellikle hedef a\u011fda \u00e7ok uzun s\u00fcre bar\u0131namaz. G\u00fcncelleme yap\u0131ld\u0131\u011f\u0131 zaman, i\u015fletmenin izole edilmemi\u015f antivir\u00fcs program\u0131 oradaki hedefi etkisiz hale getirecektir. Yaz\u0131l\u0131m\u0131n, o kadar k\u0131sa bir zamanda bile ana izole edilmemi\u015f a\u011fa verebilece\u011fi zarara gelecek olursak; k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m b\u00f6l\u00fct g\u00fcncellenene kadar, yani en az bir hafta, izole edilmi\u015f b\u00f6l\u00fctte kalmaya devam eder.<\/p>\n<p>Ortaya \u00e7\u0131kacak sonu\u00e7, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131n t\u00fcr\u00fcne ba\u011fl\u0131. Bu yaz\u0131l\u0131m, \u00f6rne\u011fin, o \u00e7ok g\u00fcvenilen flash s\u00fcr\u00fcc\u00fclere bir veri kaydedebilir. K\u0131sa bir s\u00fcre sonra, izole edilmemi\u015f b\u00f6l\u00fctteki di\u011fer bir s\u0131f\u0131r g\u00fcn tehdidi, ba\u011fl\u0131 cihazlarda sakl\u0131 veriyi aray\u0131p \u015firket d\u0131\u015f\u0131na g\u00f6ndermeye ba\u015flayabilir. Ayn\u0131 \u015fekilde bu k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131n amac\u0131, bilgisayar\u0131n yaz\u0131l\u0131m\u0131n\u0131 veya end\u00fcstriyel denetim ayarlar\u0131n\u0131 de\u011fi\u015ftirmek gibi bir sabotaj yapmak olabilir.<\/p>\n<h2>\u00dc\u00e7\u00fcnc\u00fc senaryo: \u0130\u00e7eriden birileri<\/h2>\n<p>\u0130zole edilmi\u015f a\u011f b\u00f6l\u00fct\u00fcn\u00fcn bulundu\u011fu yere eri\u015fimi olan k\u00f6t\u00fc ama\u00e7l\u0131 bir \u00e7al\u0131\u015fan, isterse a\u011f\u0131n \u00e7evresini ele ge\u00e7irebilir. \u00d6rne\u011fin, i\u00e7inde SIM kart ve internet ba\u011flant\u0131s\u0131 olan minyat\u00fcr bir Raspberry-Pi gibi k\u00f6t\u00fc ama\u00e7l\u0131 bir cihaz\u0131 a\u011fa ba\u011flayabilir. <a href=\"https:\/\/www.kaspersky.com\/blog\/dark-vishnya-attack\/24867\/\" target=\"_blank\" rel=\"noopener nofollow\">DarkVishnya<\/a> vakas\u0131n\u0131 buna \u00f6rnek verebiliriz.<\/p>\n<h2>Yap\u0131lmas\u0131 gerekenler<\/h2>\n<p>\u00dc\u00e7 senaryoda da eksik olan \u00e7ok \u00f6nemli bir detay vard\u0131: G\u00fcncel bir g\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fc. \u0130zole edilmi\u015f b\u00f6l\u00fcte Kaspersky Private Security Network y\u00fcklenmi\u015f olsayd\u0131, tehditlerin hepsini zaman\u0131nda tespit etmi\u015f ve ortadan kald\u0131rm\u0131\u015f olurdu. Bu \u00e7\u00f6z\u00fcm, temelde bizim bulut tabanl\u0131 Kaspersky Security Network \u00fcr\u00fcn\u00fcm\u00fcz\u00fcn \u015firket i\u00e7i versiyonu. Ama bu \u00fcr\u00fcn veri diyotu modunda da \u00e7al\u0131\u015fabilir.<\/p>\n<p>Di\u011fer bir deyi\u015fle Kaspersky Private Security Network, yerel olmas\u0131na ra\u011fmen en yeni tehditlerle ilgili bilgileri d\u0131\u015far\u0131dan al\u0131r ve i\u00e7erideki u\u00e7 nokta \u00e7\u00f6z\u00fcmleriyle payla\u015f\u0131r. Ayn\u0131 zamanda, izole edilmi\u015f alan\u0131n \u00f6tesindeki t\u00fcm verinin k\u00fcresel a\u011fa giri\u015fini engeller. Bu \u00e7\u00f6z\u00fcmle ilgili daha fazla bilgi i\u00e7in <a href=\"https:\/\/www.kaspersky.com.tr\/enterprise-security\/private-security-network?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">resmi sayfas\u0131n\u0131<\/a> ziyaret edebilirsiniz.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-b2b\">\n","protected":false},"excerpt":{"rendered":"<p>Bir a\u011f b\u00f6l\u00fct\u00fcn\u00fc izole etmek, a\u011f\u0131n ger\u00e7ekten a\u015f\u0131lamaz hale geldi\u011finin garantisi midir? <\/p>\n","protected":false},"author":2581,"featured_media":9802,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194],"tags":[2214,2441,618,2440,2439,2331],"class_list":{"0":"post-9801","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"tag-hava-araligi","10":"tag-hava-araligi-ana-etiket-hava-araligi","11":"tag-hedefli-saldirilar","12":"tag-iceriden-birileri","13":"tag-izole-edilmis-ag","14":"tag-yetkisiz-erisim"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/cyberthreats-in-isolated-subnet\/9801\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/cyberthreats-in-isolated-subnet\/23027\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/cyberthreats-in-isolated-subnet\/18509\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/cyberthreats-in-isolated-subnet\/24977\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/cyberthreats-in-isolated-subnet\/22985\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/cyberthreats-in-isolated-subnet\/22243\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/cyberthreats-in-isolated-subnet\/25583\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/cyberthreats-in-isolated-subnet\/25055\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/cyberthreats-in-isolated-subnet\/31002\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/cyberthreats-in-isolated-subnet\/40438\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/cyberthreats-in-isolated-subnet\/17284\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/cyberthreats-in-isolated-subnet\/17732\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/cyberthreats-in-isolated-subnet\/14995\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/cyberthreats-in-isolated-subnet\/27021\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/cyberthreats-in-isolated-subnet\/31179\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/cyberthreats-in-isolated-subnet\/27249\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/cyberthreats-in-isolated-subnet\/24069\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/cyberthreats-in-isolated-subnet\/29403\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/cyberthreats-in-isolated-subnet\/29195\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/hava-araligi\/","name":"hava aral\u0131\u011f\u0131"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9801","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2581"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=9801"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9801\/revisions"}],"predecessor-version":[{"id":9808,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9801\/revisions\/9808"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/9802"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=9801"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=9801"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=9801"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}