{"id":32460,"date":"2025-02-02T17:01:50","date_gmt":"2025-02-02T17:01:50","guid":{"rendered":"https:\/\/leverate.com\/uncategorized-tr\/guvenli-olmayan-bir-dunyada-veri-guvenligi\/"},"modified":"2025-02-02T17:02:35","modified_gmt":"2025-02-02T17:02:35","slug":"guvenli-olmayan-bir-dunyada-veri-guvenligi","status":"publish","type":"post","link":"https:\/\/leverate.com\/tr\/blog-tr\/fintech-tr\/guvenli-olmayan-bir-dunyada-veri-guvenligi\/","title":{"rendered":"G\u00fcvenli Olmayan Bir D\u00fcnyada Veri G\u00fcvenli\u011fi"},"content":{"rendered":"<p><strong>Yak\u0131n zamana kadar, \u015firket \u00e7al\u0131\u015fanlar\u0131ndan birinin ihanet edece\u011fi ve hassas verileri tehlikeye ataca\u011f\u0131 fikri neredeyse d\u00fc\u015f\u00fcn\u00fclemezdi. \u015eirkete y\u00f6nelik tehditlerin i\u00e7eriden de\u011fil d\u0131\u015far\u0131dan geldi\u011fi konusunda fikir birli\u011fi sa\u011fland\u0131 ve g\u00fcvenlik \u00f6nlemleri buna g\u00f6re olu\u015fturuldu. D\u00fcnya, hassas NSA dosyalar\u0131n\u0131 \u00e7alan ve s\u0131zd\u0131ran \u015fimdiye kadar isimsiz bir m\u00fcteahhit olan Edward Snowden\u2019\u0131 \u00f6\u011frendi\u011finde bu durum dramatik bir \u015fekilde de\u011fi\u015fti.  <\/strong><\/p>\n\n<figure class=\"wp-block-image aligncenter size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"960\" height=\"480\" src=\"https:\/\/leverate.com\/wp-content\/uploads\/2023\/12\/leverate-blog-CoverL-2020-JUN-2-Data-Security-in-an-Unsecured-World.jpg\" alt=\"\" class=\"wp-image-22949\" srcset=\"https:\/\/leverate.com\/wp-content\/uploads\/2023\/12\/leverate-blog-CoverL-2020-JUN-2-Data-Security-in-an-Unsecured-World.jpg 960w, https:\/\/leverate.com\/wp-content\/uploads\/2023\/12\/leverate-blog-CoverL-2020-JUN-2-Data-Security-in-an-Unsecured-World-480x240.jpg 480w, https:\/\/leverate.com\/wp-content\/uploads\/2023\/12\/leverate-blog-CoverL-2020-JUN-2-Data-Security-in-an-Unsecured-World-768x384.jpg 768w\" sizes=\"(max-width: 960px) 100vw, 960px\" \/><\/figure>\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p>Snowden olay\u0131na ek olarak, \u201dBoscom\u201d taraf\u0131ndan haz\u0131rlanan a\u00e7\u0131klay\u0131c\u0131 bir rapor, bir \u015firketin verilerine y\u00f6nelik ana tehdidin d\u0131\u015far\u0131dan geldi\u011fi fikrine de meydan okudu: bilgisayar korsanlar\u0131ndan, end\u00fcstriyel casuslardan ve di\u011fer rakiplerden. Bu rapor rahats\u0131z edici bir ger\u00e7e\u011fi ortaya koyuyor: Herhangi bir \u015firketin eski \u00e7al\u0131\u015fanlar\u0131n\u0131n yakla\u015f\u0131k y\u00fczde seksen be\u015fi, ger\u00e7ek belgelerle olmasa bile, hassas verilerle i\u015f yerlerinden ayr\u0131ld\u0131. Snowden\u2019\u0131n NSA\u2019dan h\u0131rs\u0131zl\u0131\u011f\u0131 k\u00fcresel d\u00fczeyde g\u00f6r\u00fcn\u00fcr ve haber de\u011feri ta\u015f\u0131rken, Boscom raporu, her yerdeki \u00e7al\u0131\u015fanlar\u0131n hassas veri hazineleriyle \u00e7ekip gitmesinin ne kadar kolay oldu\u011funu g\u00f6steriyor.  <\/p>\n\n<p>Yukar\u0131dakilerin \u0131\u015f\u0131\u011f\u0131nda, \u00f6zellikle en b\u00fcy\u00fck risk kendi \u00e7al\u0131\u015fanlar\u0131ndan geldi\u011finde ve \u00e7al\u0131\u015fanlar\u0131n verilere eri\u015fimi yaln\u0131zca i\u015fleri i\u00e7in de\u011fil, genel olarak \u015firketin ba\u015far\u0131s\u0131 i\u00e7in hayati \u00f6nem ta\u015f\u0131d\u0131\u011f\u0131nda, \u015firketlerin veri g\u00fcvenli\u011fini sa\u011flamakta neden zorland\u0131klar\u0131n\u0131 anlamak kolayd\u0131r. Bu nedenle, sezgisel yan\u0131t olan verilere eri\u015fimi k\u0131s\u0131tlama \u00e7\u00f6z\u00fcm\u00fc sorunludur - do\u011fas\u0131 gere\u011fi \u015firketin \u00e7al\u0131\u015fma yetene\u011fini azalt\u0131r. Peki bu, \u015firketlerin \u00e7\u00f6z\u00fcm\u00fc olmayan bir sorunla kar\u015f\u0131 kar\u015f\u0131ya oldu\u011fu anlam\u0131na m\u0131 geliyor?  <\/p>\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"750\" height=\"500\" src=\"https:\/\/leverate.com\/wp-content\/uploads\/2020\/06\/DATA-SECURITY-IN-AN-UNSECURED-WORLD.jpg\" alt=\"\" class=\"wp-image-1411\" srcset=\"https:\/\/leverate.com\/wp-content\/uploads\/2020\/06\/DATA-SECURITY-IN-AN-UNSECURED-WORLD.jpg 750w, https:\/\/leverate.com\/wp-content\/uploads\/2020\/06\/DATA-SECURITY-IN-AN-UNSECURED-WORLD-300x200.jpg 300w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><\/figure>\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p>Bu bilmeceye sekt\u00f6r\u00fcm\u00fczle ilgili pratik bir senaryo arac\u0131l\u0131\u011f\u0131yla bakal\u0131m: Bir Forex arac\u0131 kurumu. Bir arac\u0131 kurumun, her birinin yeterince \u00e7al\u0131\u015fmas\u0131 i\u00e7in belirli verilere eri\u015fmesi gereken birka\u00e7 departman\u0131 vard\u0131r. Sat\u0131\u015f temsilcilerinden pazarlama ekibinin \u00fcyelerine (\u00f6rne\u011fin, e-posta pazarlamac\u0131lar\u0131) kadar, m\u00fc\u015fteri bilgilerinin \u00e7e\u015fitli y\u00f6nleri farkl\u0131 ki\u015filer taraf\u0131ndan g\u00f6r\u00fclebilir olmal\u0131d\u0131r ve b\u00f6l\u00fcmlere ay\u0131rmay\u0131 yaln\u0131zca yeterli yaz\u0131l\u0131m sa\u011flayabilir. \u00c7al\u0131\u015fanlar bilgiye \u00f6zel hale geldiklerinde, en b\u00fcy\u00fck g\u00fcvenlik ihlallerinin m\u00fcmk\u00fcn oldu\u011funu g\u00f6rmemeleri gerekir - bu nedenle b\u00f6l\u00fcmlere ay\u0131rman\u0131n \u00f6nemi yeterince vurgulanamaz. Bir arac\u0131 kurumun, \u00fcretkenlikten \u00f6d\u00fcn vermeden bilgileri i\u00e7eriden gelen potansiyel tehditlerden koruyabilmesinin tek yolu budur.    <\/p>\n\n<p>Teknik d\u00fczeyde, bir arac\u0131 kurumun elindeki en \u00f6nemli iki ara\u00e7, iyi bir CRM ve iyi \u015fifrelemedir. \u0130lki, y\u00f6netimin kimin hangi verilere \u00f6zel oldu\u011funu belirlemesine izin verir ve ikincisi, yetkisiz ki\u015filerin \u015firket d\u0131\u015f\u0131 bilgisayarlar (\u201dbilgisayar korsanlar\u0131\u201d) arac\u0131l\u0131\u011f\u0131yla bilgilere eri\u015fmesini engeller. \u0130yi \u015fifrelemenin bir ba\u015fka yarar\u0131 da, sahip olmad\u0131klar\u0131 uygun \u015fifre \u00e7\u00f6zme olmadan i\u015fe yaramaz oldu\u011fu i\u00e7in haydut \u00e7al\u0131\u015fanlar\u0131n gizli verileri g\u00f6ndermesini \u00f6nlemesidir.  <\/p>\n\n<p>Bu kar\u015f\u0131 \u00f6nlemlerin en iyi \u015fekilde uygulanabilmesi i\u00e7in \u00f6ncelikle bu yollarla desteklenecek ve uygulanacak bir veri g\u00fcvenli\u011fi politikas\u0131na karar vermek \u00f6nemlidir. Bu, teknik \u00f6nlemlerin mevcut ara\u00e7larla politika taraf\u0131ndan de\u011fil, politika taraf\u0131ndan belirlendi\u011fi anlam\u0131na gelir. Kullan\u0131lan teknik \u00f6nlemlere ek olarak, y\u00f6netim, \u015firket m\u00fclk\u00fcnde USB s\u00fcr\u00fcc\u00fclerin yasaklanmas\u0131, farkl\u0131 bir \u00e7al\u0131\u015fan\u0131n kullan\u0131c\u0131 ad\u0131yla oturum a\u00e7ma yasa\u011f\u0131 ve daha fazlas\u0131 gibi dahili kurallar\u0131 ve d\u00fczenlemeleri de a\u00e7\u0131k\u00e7a tan\u0131mlamal\u0131d\u0131r. Bu bariz olan\u0131 belirtmek gibi g\u00f6r\u00fcnse de, verilerinizin g\u00fcvenli\u011fini sa\u011flamak s\u00f6z konusu oldu\u011funda hi\u00e7bir \u015fey a\u00e7\u0131k de\u011fildir.   <\/p>\n\n<p>Edward Snowden, veri g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131 g\u00f6r\u00fcn\u00fcr hale getirdi. Ne de olsa, y\u00fcce NSA h\u0131rs\u0131zl\u0131\u011fa kar\u015f\u0131 savunmas\u0131zsa, geri kalan\u0131m\u0131z nerede duruyor? Ancak \u00f6zel sekt\u00f6r ba\u011flam\u0131nda, yeterli kar\u015f\u0131 \u00f6nlemler bir \u015firketin k\u0131r\u0131lganl\u0131\u011f\u0131n\u0131 \u00f6nemli \u00f6l\u00e7\u00fcde azalt\u0131r. Snowden\u2019\u0131 g\u00f6z \u00f6n\u00fcnde bulundurarak, bilgiyi ve kaynaklar\u0131n\u0131 kimin \u00e7ald\u0131\u011f\u0131n\u0131n kimli\u011fini de ak\u0131lda tutmak gerekir: ulusal istihbarat te\u015fkilatlar\u0131, rakip bir i\u015fletmeden daha fazla kayna\u011fa sahiptir ve operat\u00f6rleri bilgi almak i\u00e7in daha b\u00fcy\u00fck riskler almaya isteklidir. Snowden gibi insanlar ideolojik nedenlerle bilgi \u00e7alarken, i\u015f zekas\u0131 para ve k\u00e2r taraf\u0131ndan y\u00f6nlendirilir. Bu nedenle, \u00f6zel sekt\u00f6rde h\u0131rs\u0131zl\u0131\u011f\u0131 cayd\u0131rmak i\u00e7in gereken kar\u015f\u0131 \u00f6nlemler de daha uygun fiyatl\u0131 ve eri\u015filebilirdir.     <\/p>\n\n<p>G\u00fcn\u00fcn sonunda, verilerimizin s\u00fcrekli ve s\u00fcrekli risk alt\u0131nda oldu\u011fu bir d\u00fcnyada ya\u015f\u0131yoruz, ancak bu riski \u00f6nemli \u00f6l\u00e7\u00fcde azaltan bir\u00e7ok teknolojik \u00e7\u00f6z\u00fcm ve standart i\u015fletim prosed\u00fcr\u00fc de var. Potansiyel tehditlere kar\u015f\u0131 tetikte ve bir ad\u0131m \u00f6nde olman\u0131z gerekti\u011fini unutmay\u0131n, ancak bu tehditlerin bile ne kadar \u00f6nemli olursa olsun y\u00f6netilebilir oldu\u011funu ve veri g\u00fcvenli\u011fini sa\u011flaman\u0131n \u00fcretkenlik ve k\u00e2r pahas\u0131na olmas\u0131 gerekmedi\u011fini de unutmay\u0131n. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Yak\u0131n zamana kadar, \u015firket \u00e7al\u0131\u015fanlar\u0131ndan birinin ihanet edece\u011fi ve hassas verileri tehlikeye ataca\u011f\u0131 fikri neredeyse d\u00fc\u015f\u00fcn\u00fclemezdi.<\/p>\n","protected":false},"author":2,"featured_media":32462,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[311,341],"tags":[370,363,907,908],"class_list":["post-32460","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-fintech-tr","category-is","tag-isletme-yonetimi","tag-kaldir","tag-pip-sayma","tag-veri-korumasi"],"acf":[],"_links":{"self":[{"href":"https:\/\/leverate.com\/tr\/wp-json\/wp\/v2\/posts\/32460","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/leverate.com\/tr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/leverate.com\/tr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/leverate.com\/tr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/leverate.com\/tr\/wp-json\/wp\/v2\/comments?post=32460"}],"version-history":[{"count":0,"href":"https:\/\/leverate.com\/tr\/wp-json\/wp\/v2\/posts\/32460\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/leverate.com\/tr\/wp-json\/wp\/v2\/media\/32462"}],"wp:attachment":[{"href":"https:\/\/leverate.com\/tr\/wp-json\/wp\/v2\/media?parent=32460"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/leverate.com\/tr\/wp-json\/wp\/v2\/categories?post=32460"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/leverate.com\/tr\/wp-json\/wp\/v2\/tags?post=32460"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}