{"id":1372,"date":"2021-11-03T08:56:51","date_gmt":"2021-11-03T05:56:51","guid":{"rendered":"https:\/\/multimediabilgisayar.com\/blog\/?p=1372"},"modified":"2024-11-06T14:09:19","modified_gmt":"2024-11-06T11:09:19","slug":"siber-guvenlik-nedir","status":"publish","type":"post","link":"https:\/\/multimediabilgisayar.com\/blog\/siber-guvenlik-nedir\/","title":{"rendered":"Siber G\u00fcvenlik Nedir?"},"content":{"rendered":"<p>Son y\u0131llarda ya\u015fanan siber sald\u0131r\u0131lar ve bunun sonucunda olu\u015fan siber g\u00fcvenlik alan\u0131na ilgi g\u00fcn ge\u00e7tik\u00e7e artmaktad\u0131r. Dolay\u0131s\u0131yla siber g\u00fcvenlik nedir sorusuna yan\u0131t arayanlar\u0131n say\u0131s\u0131 da ayn\u0131 \u015fekilde art\u0131\u015f g\u00f6stermektedir. \u0130nternetin bu kadar yo\u011fun kullan\u0131lmas\u0131 bilginin g\u00fcvenli\u011finin korunmas\u0131n\u0131 zorla\u015ft\u0131rmaktad\u0131r. <strong><a href=\"\/siber-guvenlik-nedir\">Siber g\u00fcvenlik<\/a><\/strong> asl\u0131nda k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m ve ki\u015filerden, verilerinizi korumak i\u00e7in kullan\u0131l\u0131r.<\/p>\n<h2>Siber G\u00fcvenlik Nedir<\/h2>\n<p>Donan\u0131m, yaz\u0131l\u0131m ve veriler d\u00e2hil olmak \u00fczere internete ba\u011fl\u0131 cihazlarda bulunan verileri siber sald\u0131r\u0131lara kar\u015f\u0131 korumakt\u0131r. Siber g\u00fcvenli\u011fin temel amac\u0131, sadece bireyleri de\u011fil ayn\u0131 zamanda devletleri, devlet i\u00e7erisinde bulunan kamu kurum ve kurulu\u015flar\u0131, \u015firketleri ve bunu gibi bir\u00e7ok alan\u0131 hem i\u00e7 hem de d\u0131\u015f tehditlere kar\u015f\u0131 korumakt\u0131r.<\/p>\n<h4>Siber sald\u0131r\u0131lardan verilerimizi korunmak ancak siber g\u00fcvenlik ile m\u00fcmk\u00fcn olmaktad\u0131r.<\/h4>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"wp-image-2870 size-full\" src=\"http:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/siber-guvenlik-1.jpg\" alt=\"Siber G\u00fcvenlik Nedir\" width=\"1922\" height=\"1281\" srcset=\"https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/siber-guvenlik-1.jpg 1922w, https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/siber-guvenlik-1-300x200.jpg 300w, https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/siber-guvenlik-1-1024x682.jpg 1024w, https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/siber-guvenlik-1-768x512.jpg 768w, https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/siber-guvenlik-1-1536x1024.jpg 1536w, https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/siber-guvenlik-1-158x105.jpg 158w, https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/siber-guvenlik-1-1320x880.jpg 1320w\" sizes=\"(max-width: 1922px) 100vw, 1922px\" \/><\/p>\n<p>Ba\u015far\u0131l\u0131 bir siber g\u00fcvenlik yakla\u015f\u0131m\u0131, bilgisayarlarda, a\u011flarda, programlarda veya g\u00fcvende tutmak istedi\u011fi verilerde yay\u0131lan birden fazla koruma katman\u0131na sahiptir. Bir organizasyonda, insanlar, s\u00fcre\u00e7ler ve teknoloji, <strong><a href=\"\/siber-saldirilardan-korunmak-icin-alabileceginiz-guvenlik-onlemleri\/\">siber sald\u0131r\u0131lara<\/a><\/strong> kar\u015f\u0131 etkili bir savunma olu\u015fturmak i\u00e7in birbirini tamamlamal\u0131d\u0131r.<\/p>\n<p>G\u00fcn\u00fcm\u00fczde herkes geli\u015fmi\u015f siber savunma programlar\u0131ndan yararlanmaktad\u0131r. Bireysel d\u00fczeyde, bir siber g\u00fcvenlik sald\u0131r\u0131s\u0131 kimlik h\u0131rs\u0131zl\u0131\u011f\u0131ndan, zorla girme denemelerine gibi \u00f6nemli verilerin kaybolmas\u0131na kadar her \u015feyle sonu\u00e7lanabilir.<\/p>\n<p>Teknoloji, kurulu\u015flara ve bireylere, siber sald\u0131r\u0131lardan korunmalar\u0131 i\u00e7in gereken bilgisayar g\u00fcvenlik ara\u00e7lar\u0131n\u0131 vermek i\u00e7in \u00e7ok \u00f6nemlidir.<\/p>\n<p>\u00dc\u00e7 ana varl\u0131k korunmal\u0131d\u0131r: bilgisayarlar, ak\u0131ll\u0131 cihazlar ve y\u00f6nlendiriciler gibi u\u00e7 nokta cihazlar\u0131; a\u011flar ve bulut. Bu varl\u0131klar\u0131 korumak i\u00e7in kullan\u0131lan yayg\u0131n teknoloji, yeni nesil g\u00fcvenlik duvarlar\u0131, DNS filtreleme, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m korumas\u0131, vir\u00fcsten koruma yaz\u0131l\u0131m\u0131 ve e-posta g\u00fcvenlik \u00e7\u00f6z\u00fcmlerini i\u00e7erir.<br \/>Kurumsal varl\u0131klar birden fazla farkl\u0131 sistemden olu\u015ftu\u011fundan, etkili ve verimli bir siber g\u00fcvenlik duru\u015fu t\u00fcm bilgi sistemlerinde koordineli \u00e7aba gerektirir. Bu nedenle, siber g\u00fcvenlik alt alanlardan kullanmam\u0131z gerekmektedir.<\/p>\n<h2>Siber G\u00fcvenli\u011fin Alt Alanlar\u0131<\/h2>\n<p><img decoding=\"async\" class=\"wp-image-2873 size-full\" src=\"http:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/ag-guvenligi-1.jpg\" alt=\"A\u011f g\u00fcvenli\u011fi\" width=\"1920\" height=\"1081\" srcset=\"https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/ag-guvenligi-1.jpg 1920w, https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/ag-guvenligi-1-300x169.jpg 300w, https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/ag-guvenligi-1-1024x577.jpg 1024w, https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/ag-guvenligi-1-768x432.jpg 768w, https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/ag-guvenligi-1-1536x865.jpg 1536w, https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/ag-guvenligi-1-186x105.jpg 186w, https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/ag-guvenligi-1-1320x743.jpg 1320w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/p>\n<p>Hedef sald\u0131rganlar veya f\u0131rsat\u00e7\u0131 k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar olmas\u0131 fark etmeksizin bir bilgisayar a\u011f\u0131n\u0131 davetsiz misafirlerden koruma uygulamas\u0131d\u0131r. A\u011f g\u00fcvenli\u011fi sa\u011flamak i\u00e7in hem donan\u0131m hem de yaz\u0131l\u0131m mekanizmalar\u0131n\u0131n d\u0131\u015f etkenlere kar\u015f\u0131 koruman\u0131z gerekmektedir. Etkili bir a\u011f g\u00fcvenli\u011fi i\u00e7in kurulu\u015f varl\u0131klar\u0131n\u0131n birden \u00e7ok d\u0131\u015f ve i\u00e7 tehdide kar\u015f\u0131 korunmas\u0131na yard\u0131mc\u0131 olur.<\/p>\n<p>&nbsp;<\/p>\n<h4>Uygulama g\u00fcvenli\u011fi<\/h4>\n<p><img decoding=\"async\" class=\"wp-image-2872 size-full\" src=\"http:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/uygulama-guvenligi-1.jpg\" alt=\"Uygulama g\u00fcvenli\u011fi\" width=\"1920\" height=\"1347\" srcset=\"https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/uygulama-guvenligi-1.jpg 1920w, https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/uygulama-guvenligi-1-300x210.jpg 300w, https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/uygulama-guvenligi-1-1024x718.jpg 1024w, https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/uygulama-guvenligi-1-768x539.jpg 768w, https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/uygulama-guvenligi-1-1536x1078.jpg 1536w, https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/uygulama-guvenligi-1-150x105.jpg 150w, https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/uygulama-guvenligi-1-1320x926.jpg 1320w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/p>\n<p>Yaz\u0131l\u0131m ve cihazlar\u0131n tehditlerden etkilenmemesine odaklan\u0131r. Bir kurulu\u015fta kullan\u0131lan t\u00fcm yaz\u0131l\u0131m ve hizmetlerde \u00e7ok \u00e7e\u015fitli tehditlere kar\u015f\u0131 \u00e7e\u015fitli savunma uygulanmas\u0131n\u0131 i\u00e7erir. Uygulama kaynaklar\u0131na yetkisiz eri\u015fim veya de\u011fi\u015fiklik yapma olas\u0131l\u0131\u011f\u0131n\u0131 en aza indirmek i\u00e7in g\u00fcvenli uygulama mimarileri tasarlamay\u0131, g\u00fcvenli kod yazmay\u0131, g\u00fc\u00e7l\u00fc veri giri\u015fi do\u011frulama vb. uygulama gerektirir. Ba\u015far\u0131l\u0131 g\u00fcvenlik, daha tasar\u0131m a\u015famas\u0131ndayken ba\u015flar.<\/p>\n<p>&nbsp;<\/p>\n<h4>Kimlik Y\u00f6netimi ve Veri G\u00fcvenli\u011fi<\/h4>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2875 size-full\" src=\"http:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/kimlik-yonetimi-ve-veri-1.jpg\" alt=\"Kimlik Y\u00f6netimi ve Veri G\u00fcvenli\u011fi\" width=\"1921\" height=\"1280\" srcset=\"https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/kimlik-yonetimi-ve-veri-1.jpg 1921w, https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/kimlik-yonetimi-ve-veri-1-300x200.jpg 300w, https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/kimlik-yonetimi-ve-veri-1-1024x682.jpg 1024w, https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/kimlik-yonetimi-ve-veri-1-768x512.jpg 768w, https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/kimlik-yonetimi-ve-veri-1-1536x1023.jpg 1536w, https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/kimlik-yonetimi-ve-veri-1-158x105.jpg 158w, https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/kimlik-yonetimi-ve-veri-1-1320x880.jpg 1320w\" sizes=\"(max-width: 1921px) 100vw, 1921px\" \/><\/p>\n<p>Hem depolama hem de aktarma s\u0131ras\u0131nda verilerin b\u00fct\u00fcnl\u00fc\u011f\u00fcn\u00fc ve gizlili\u011fini korur. Kimlik y\u00f6netimi, bireylerin bir kurulu\u015f i\u00e7indeki bilgi sistemlerine kimlik do\u011frulamas\u0131n\u0131 ve yetkilendirilmesini sa\u011flayan \u00e7er\u00e7eveleri, s\u00fcre\u00e7leri ve faaliyetleri i\u00e7erir. Veri g\u00fcvenli\u011fi, hareketsiz ve yoldayken verilerin g\u00fcvenli\u011fini sa\u011flayan g\u00fc\u00e7l\u00fc bilgi depolama mekanizmalar\u0131n\u0131 uygulamay\u0131 i\u00e7erir.<\/p>\n<p>&nbsp;<\/p>\n<h4>Mobil g\u00fcvenlik<\/h4>\n<p>Cep telefonlar\u0131, diz\u00fcst\u00fc bilgisayarlar, tabletler vb. mobil cihazlarda depolanan hem kurumsal hem de ki\u015fisel bilgilerin yetkisiz eri\u015fim, cihaz kayb\u0131 veya h\u0131rs\u0131zl\u0131\u011f\u0131, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m vb. gibi \u00e7e\u015fitli tehditlerden korunmas\u0131n\u0131 ifade eder.<\/p>\n<p>&nbsp;<\/p>\n<h4>Bulut G\u00fcvenli\u011fi<\/h4>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-2874 size-full\" src=\"http:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/bulut-siber-1.jpg\" alt=\"Bulut G\u00fcvenli\u011fi\" width=\"1919\" height=\"1281\" srcset=\"https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/bulut-siber-1.jpg 1919w, https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/bulut-siber-1-300x200.jpg 300w, https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/bulut-siber-1-1024x684.jpg 1024w, https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/bulut-siber-1-768x513.jpg 768w, https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/bulut-siber-1-1536x1025.jpg 1536w, https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/bulut-siber-1-157x105.jpg 157w, https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/bulut-siber-1-1320x881.jpg 1320w\" sizes=\"(max-width: 1919px) 100vw, 1919px\" \/><\/p>\n<p>AWS, Google, Azure, Rackspace vb. gibi \u00e7e\u015fitli bulut servis sa\u011flay\u0131c\u0131lar\u0131. Etkili mimari ve ortam yap\u0131land\u0131rmas\u0131, \u00e7e\u015fitli tehditlere kar\u015f\u0131 koruma sa\u011flar.<\/p>\n<p>&nbsp;<\/p>\n<h4>Operasyonel g\u00fcvenlik<\/h4>\n<p>Veri varl\u0131klar\u0131n\u0131n i\u015flenmesi ve korunmas\u0131na ili\u015fkin s\u00fcre\u00e7leri ve kararlar\u0131 i\u00e7erir. Kullan\u0131c\u0131lar\u0131n bir a\u011fa eri\u015firken sahip olduklar\u0131 izinler ve verilerin nas\u0131l ve nerede depolanabilece\u011fini veya payla\u015f\u0131labilece\u011fini belirleyen prosed\u00fcrler bu kapsama girer.<\/p>\n<p>&nbsp;<\/p>\n<h4>Ola\u011fan\u00fcst\u00fc durum kurtarma ve i\u015f s\u00fcreklili\u011fi<\/h4>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-2876 size-full\" src=\"http:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/olaganustu-durumlara-karsi-siber-1.jpg\" alt=\"Ola\u011fan\u00fcst\u00fc durum kurtarma ve i\u015f s\u00fcreklili\u011fi\" width=\"1922\" height=\"1282\" srcset=\"https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/olaganustu-durumlara-karsi-siber-1.jpg 1922w, https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/olaganustu-durumlara-karsi-siber-1-300x200.jpg 300w, https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/olaganustu-durumlara-karsi-siber-1-1024x683.jpg 1024w, https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/olaganustu-durumlara-karsi-siber-1-768x512.jpg 768w, https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/olaganustu-durumlara-karsi-siber-1-1536x1025.jpg 1536w, https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/olaganustu-durumlara-karsi-siber-1-157x105.jpg 157w, https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/olaganustu-durumlara-karsi-siber-1-1320x880.jpg 1320w\" sizes=\"(max-width: 1922px) 100vw, 1922px\" \/><\/p>\n<p>Bir kurulu\u015fun herhangi bir felaket s\u0131ras\u0131nda ve sonras\u0131nda i\u015f a\u00e7\u0131s\u0131ndan kritik sistemleri \u00e7evrimi\u00e7i tutmaya haz\u0131rlanmalar\u0131na yard\u0131mc\u0131 olan s\u00fcre\u00e7ler, izleme, uyar\u0131lar ve planlar ile ilgilenir. Ayr\u0131ca bir olaydan sonra kay\u0131p i\u015flemler ve sistemler olaya nas\u0131l yan\u0131t verdi\u011fini ilgilenir.<\/p>\n<p>\u0130\u015f s\u00fcreklili\u011fi, belirli kaynaklar olmadan faaliyet g\u00f6stermeye \u00e7al\u0131\u015f\u0131rken kurulu\u015fun geri \u00e7ekildi\u011fi pland\u0131r.<\/p>\n<p>&nbsp;<\/p>\n<h4>Son kullan\u0131c\u0131 e\u011fitimi<\/h4>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-2871 size-full\" src=\"http:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/son-kullanici-hatasi-siber-1.jpg\" alt=\"Son kullan\u0131c\u0131 e\u011fitimi\" width=\"1921\" height=\"1282\" srcset=\"https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/son-kullanici-hatasi-siber-1.jpg 1921w, https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/son-kullanici-hatasi-siber-1-300x200.jpg 300w, https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/son-kullanici-hatasi-siber-1-1024x683.jpg 1024w, https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/son-kullanici-hatasi-siber-1-768x513.jpg 768w, https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/son-kullanici-hatasi-siber-1-1536x1025.jpg 1536w, https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/son-kullanici-hatasi-siber-1-157x105.jpg 157w, https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2021\/11\/son-kullanici-hatasi-siber-1-1320x881.jpg 1320w\" sizes=\"(max-width: 1921px) 100vw, 1921px\" \/><\/p>\n<p>\u00d6ng\u00f6r\u00fclemeyen siber g\u00fcvenlik fakt\u00f6r\u00fcn\u00fc ele al\u0131r. \u0130nsanlar iyi g\u00fcvenlik uygulamalar\u0131na uymayan herkes yanl\u0131\u015fl\u0131kla g\u00fcvenli ba\u015fka bir sisteme vir\u00fcs bula\u015ft\u0131rabilir. Bundan dolay\u0131 kullan\u0131c\u0131n\u0131n e\u011fitilmesi, politikalar\u0131 hakk\u0131nda fark\u0131ndal\u0131\u011f\u0131n art\u0131r\u0131lmas\u0131n\u0131n, \u015f\u00fcpheli e-posta eklerini silmeyi, tan\u0131mlanmam\u0131\u015f USB s\u00fcr\u00fcc\u00fcleri takmamalar\u0131n\u0131 ve di\u011fer \u00e7e\u015fitli \u00f6nemli dersleri \u00f6\u011fretmek,\u00a0 g\u00fcvenlik i\u00e7in hayati \u00f6nem ta\u015f\u0131r.<\/p>\n<div style=\"display: none;\">https:\/\/www.multiyazilim.com<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\u0130nternetin bu kadar yo\u011fun kullan\u0131lmas\u0131 bilginin g\u00fcvenli\u011finin ve korunmas\u0131n\u0131 zorla\u015ft\u0131rmaktad\u0131r.( Siber g\u00fcvenlik a\u011f mobil uygulama)<\/p>\n","protected":false},"author":1,"featured_media":2093,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[199],"tags":[326,327,328,329,264,241],"class_list":["post-1372","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-siber-guvenlik","tag-bulut-guvenligi","tag-mobil-guvenlik","tag-siber-guvenlik","tag-siber-guvenlik-alt-yapisi","tag-siber-saldirilar","tag-siber-saldirilara-karsi"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Siber G\u00fcvenlik Nedir? - Multimedia Bilgisayar | Blog<\/title>\n<meta name=\"description\" content=\"\u0130nternetin bu kadar yo\u011fun kullan\u0131lmas\u0131 bilginin g\u00fcvenli\u011finin ve korunmas\u0131n\u0131 zorla\u015ft\u0131rmaktad\u0131r.( Siber g\u00fcvenlik a\u011f mobil uygulama)\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/multimediabilgisayar.com\/blog\/siber-guvenlik-nedir\/\" \/>\n<meta property=\"og:locale\" content=\"tr_TR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Siber G\u00fcvenlik Nedir? - Multimedia Bilgisayar | Blog\" \/>\n<meta property=\"og:description\" content=\"\u0130nternetin bu kadar yo\u011fun kullan\u0131lmas\u0131 bilginin g\u00fcvenli\u011finin ve korunmas\u0131n\u0131 zorla\u015ft\u0131rmaktad\u0131r.( Siber g\u00fcvenlik a\u011f mobil uygulama)\" \/>\n<meta property=\"og:url\" content=\"https:\/\/multimediabilgisayar.com\/blog\/siber-guvenlik-nedir\/\" \/>\n<meta property=\"og:site_name\" content=\"Multimedia Bilgisayar | Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-03T05:56:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-06T11:09:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2022\/01\/cybercrime.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1919\" \/>\n\t<meta property=\"og:image:height\" content=\"1282\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Multimedia\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Yazan:\" \/>\n\t<meta name=\"twitter:data1\" content=\"Multimedia\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tahmini okuma s\u00fcresi\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 dakika\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/multimediabilgisayar.com\/blog\/siber-guvenlik-nedir\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/multimediabilgisayar.com\/blog\/siber-guvenlik-nedir\/\"},\"author\":{\"name\":\"Multimedia\",\"@id\":\"https:\/\/multimediabilgisayar.com\/blog\/#\/schema\/person\/75acd01e1e2de1d9d7b9c18ecfd81c90\"},\"headline\":\"Siber G\u00fcvenlik Nedir?\",\"datePublished\":\"2021-11-03T05:56:51+00:00\",\"dateModified\":\"2024-11-06T11:09:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/multimediabilgisayar.com\/blog\/siber-guvenlik-nedir\/\"},\"wordCount\":942,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/multimediabilgisayar.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/multimediabilgisayar.com\/blog\/siber-guvenlik-nedir\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2022\/01\/cybercrime.jpg\",\"keywords\":[\"bulut g\u00fcvenli\u011fi\",\"mobil g\u00fcvenlik\",\"Siber G\u00fcvenlik\",\"siber g\u00fcvenlik alt yap\u0131s\u0131\",\"siber sald\u0131r\u0131lar\",\"siber sald\u0131r\u0131lara kar\u015f\u0131\"],\"articleSection\":[\"Siber G\u00fcvenlik\"],\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/multimediabilgisayar.com\/blog\/siber-guvenlik-nedir\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/multimediabilgisayar.com\/blog\/siber-guvenlik-nedir\/\",\"url\":\"https:\/\/multimediabilgisayar.com\/blog\/siber-guvenlik-nedir\/\",\"name\":\"Siber G\u00fcvenlik Nedir? - Multimedia Bilgisayar | Blog\",\"isPartOf\":{\"@id\":\"https:\/\/multimediabilgisayar.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/multimediabilgisayar.com\/blog\/siber-guvenlik-nedir\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/multimediabilgisayar.com\/blog\/siber-guvenlik-nedir\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2022\/01\/cybercrime.jpg\",\"datePublished\":\"2021-11-03T05:56:51+00:00\",\"dateModified\":\"2024-11-06T11:09:19+00:00\",\"description\":\"\u0130nternetin bu kadar yo\u011fun kullan\u0131lmas\u0131 bilginin g\u00fcvenli\u011finin ve korunmas\u0131n\u0131 zorla\u015ft\u0131rmaktad\u0131r.( Siber g\u00fcvenlik a\u011f mobil uygulama)\",\"breadcrumb\":{\"@id\":\"https:\/\/multimediabilgisayar.com\/blog\/siber-guvenlik-nedir\/#breadcrumb\"},\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/multimediabilgisayar.com\/blog\/siber-guvenlik-nedir\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/multimediabilgisayar.com\/blog\/siber-guvenlik-nedir\/#primaryimage\",\"url\":\"https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2022\/01\/cybercrime.jpg\",\"contentUrl\":\"https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2022\/01\/cybercrime.jpg\",\"width\":1919,\"height\":1282,\"caption\":\"S\u0130BER G\u00dcVENL\u0130K NED\u0130R?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/multimediabilgisayar.com\/blog\/siber-guvenlik-nedir\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Anasayfa\",\"item\":\"https:\/\/multimediabilgisayar.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Siber G\u00fcvenlik Nedir?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/multimediabilgisayar.com\/blog\/#website\",\"url\":\"https:\/\/multimediabilgisayar.com\/blog\/\",\"name\":\"Multimedia Bilgisayar | Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/multimediabilgisayar.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/multimediabilgisayar.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"tr\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/multimediabilgisayar.com\/blog\/#organization\",\"name\":\"Multimedia Bilgisayar | Blog\",\"url\":\"https:\/\/multimediabilgisayar.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/multimediabilgisayar.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2024\/11\/Multi-Logo-Siyah.png\",\"contentUrl\":\"https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2024\/11\/Multi-Logo-Siyah.png\",\"width\":2386,\"height\":403,\"caption\":\"Multimedia Bilgisayar | Blog\"},\"image\":{\"@id\":\"https:\/\/multimediabilgisayar.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/multimediabilgisayar.com\/blog\/#\/schema\/person\/75acd01e1e2de1d9d7b9c18ecfd81c90\",\"name\":\"Multimedia\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/multimediabilgisayar.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/90ae74e7c1a5a394ce7dec103aa0919c6a0a7c2f7e01f9275dca8e0c3f598c9f?s=96&d=wp_user_avatar&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/90ae74e7c1a5a394ce7dec103aa0919c6a0a7c2f7e01f9275dca8e0c3f598c9f?s=96&d=wp_user_avatar&r=g\",\"caption\":\"Multimedia\"},\"sameAs\":[\"https:\/\/multimediabilgisayar.com\/blog\"],\"url\":\"https:\/\/multimediabilgisayar.com\/blog\/author\/multi-admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Siber G\u00fcvenlik Nedir? - Multimedia Bilgisayar | Blog","description":"\u0130nternetin bu kadar yo\u011fun kullan\u0131lmas\u0131 bilginin g\u00fcvenli\u011finin ve korunmas\u0131n\u0131 zorla\u015ft\u0131rmaktad\u0131r.( Siber g\u00fcvenlik a\u011f mobil uygulama)","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/multimediabilgisayar.com\/blog\/siber-guvenlik-nedir\/","og_locale":"tr_TR","og_type":"article","og_title":"Siber G\u00fcvenlik Nedir? - Multimedia Bilgisayar | Blog","og_description":"\u0130nternetin bu kadar yo\u011fun kullan\u0131lmas\u0131 bilginin g\u00fcvenli\u011finin ve korunmas\u0131n\u0131 zorla\u015ft\u0131rmaktad\u0131r.( Siber g\u00fcvenlik a\u011f mobil uygulama)","og_url":"https:\/\/multimediabilgisayar.com\/blog\/siber-guvenlik-nedir\/","og_site_name":"Multimedia Bilgisayar | Blog","article_published_time":"2021-11-03T05:56:51+00:00","article_modified_time":"2024-11-06T11:09:19+00:00","og_image":[{"width":1919,"height":1282,"url":"https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2022\/01\/cybercrime.jpg","type":"image\/jpeg"}],"author":"Multimedia","twitter_card":"summary_large_image","twitter_misc":{"Yazan:":"Multimedia","Tahmini okuma s\u00fcresi":"5 dakika"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/multimediabilgisayar.com\/blog\/siber-guvenlik-nedir\/#article","isPartOf":{"@id":"https:\/\/multimediabilgisayar.com\/blog\/siber-guvenlik-nedir\/"},"author":{"name":"Multimedia","@id":"https:\/\/multimediabilgisayar.com\/blog\/#\/schema\/person\/75acd01e1e2de1d9d7b9c18ecfd81c90"},"headline":"Siber G\u00fcvenlik Nedir?","datePublished":"2021-11-03T05:56:51+00:00","dateModified":"2024-11-06T11:09:19+00:00","mainEntityOfPage":{"@id":"https:\/\/multimediabilgisayar.com\/blog\/siber-guvenlik-nedir\/"},"wordCount":942,"commentCount":0,"publisher":{"@id":"https:\/\/multimediabilgisayar.com\/blog\/#organization"},"image":{"@id":"https:\/\/multimediabilgisayar.com\/blog\/siber-guvenlik-nedir\/#primaryimage"},"thumbnailUrl":"https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2022\/01\/cybercrime.jpg","keywords":["bulut g\u00fcvenli\u011fi","mobil g\u00fcvenlik","Siber G\u00fcvenlik","siber g\u00fcvenlik alt yap\u0131s\u0131","siber sald\u0131r\u0131lar","siber sald\u0131r\u0131lara kar\u015f\u0131"],"articleSection":["Siber G\u00fcvenlik"],"inLanguage":"tr","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/multimediabilgisayar.com\/blog\/siber-guvenlik-nedir\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/multimediabilgisayar.com\/blog\/siber-guvenlik-nedir\/","url":"https:\/\/multimediabilgisayar.com\/blog\/siber-guvenlik-nedir\/","name":"Siber G\u00fcvenlik Nedir? - Multimedia Bilgisayar | Blog","isPartOf":{"@id":"https:\/\/multimediabilgisayar.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/multimediabilgisayar.com\/blog\/siber-guvenlik-nedir\/#primaryimage"},"image":{"@id":"https:\/\/multimediabilgisayar.com\/blog\/siber-guvenlik-nedir\/#primaryimage"},"thumbnailUrl":"https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2022\/01\/cybercrime.jpg","datePublished":"2021-11-03T05:56:51+00:00","dateModified":"2024-11-06T11:09:19+00:00","description":"\u0130nternetin bu kadar yo\u011fun kullan\u0131lmas\u0131 bilginin g\u00fcvenli\u011finin ve korunmas\u0131n\u0131 zorla\u015ft\u0131rmaktad\u0131r.( Siber g\u00fcvenlik a\u011f mobil uygulama)","breadcrumb":{"@id":"https:\/\/multimediabilgisayar.com\/blog\/siber-guvenlik-nedir\/#breadcrumb"},"inLanguage":"tr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/multimediabilgisayar.com\/blog\/siber-guvenlik-nedir\/"]}]},{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/multimediabilgisayar.com\/blog\/siber-guvenlik-nedir\/#primaryimage","url":"https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2022\/01\/cybercrime.jpg","contentUrl":"https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2022\/01\/cybercrime.jpg","width":1919,"height":1282,"caption":"S\u0130BER G\u00dcVENL\u0130K NED\u0130R?"},{"@type":"BreadcrumbList","@id":"https:\/\/multimediabilgisayar.com\/blog\/siber-guvenlik-nedir\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Anasayfa","item":"https:\/\/multimediabilgisayar.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Siber G\u00fcvenlik Nedir?"}]},{"@type":"WebSite","@id":"https:\/\/multimediabilgisayar.com\/blog\/#website","url":"https:\/\/multimediabilgisayar.com\/blog\/","name":"Multimedia Bilgisayar | Blog","description":"","publisher":{"@id":"https:\/\/multimediabilgisayar.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/multimediabilgisayar.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"tr"},{"@type":"Organization","@id":"https:\/\/multimediabilgisayar.com\/blog\/#organization","name":"Multimedia Bilgisayar | Blog","url":"https:\/\/multimediabilgisayar.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/multimediabilgisayar.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2024\/11\/Multi-Logo-Siyah.png","contentUrl":"https:\/\/multimediabilgisayar.com\/blog\/wp-content\/uploads\/2024\/11\/Multi-Logo-Siyah.png","width":2386,"height":403,"caption":"Multimedia Bilgisayar | Blog"},"image":{"@id":"https:\/\/multimediabilgisayar.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/multimediabilgisayar.com\/blog\/#\/schema\/person\/75acd01e1e2de1d9d7b9c18ecfd81c90","name":"Multimedia","image":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/multimediabilgisayar.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/90ae74e7c1a5a394ce7dec103aa0919c6a0a7c2f7e01f9275dca8e0c3f598c9f?s=96&d=wp_user_avatar&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/90ae74e7c1a5a394ce7dec103aa0919c6a0a7c2f7e01f9275dca8e0c3f598c9f?s=96&d=wp_user_avatar&r=g","caption":"Multimedia"},"sameAs":["https:\/\/multimediabilgisayar.com\/blog"],"url":"https:\/\/multimediabilgisayar.com\/blog\/author\/multi-admin\/"}]}},"_links":{"self":[{"href":"https:\/\/multimediabilgisayar.com\/blog\/wp-json\/wp\/v2\/posts\/1372","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/multimediabilgisayar.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/multimediabilgisayar.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/multimediabilgisayar.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/multimediabilgisayar.com\/blog\/wp-json\/wp\/v2\/comments?post=1372"}],"version-history":[{"count":22,"href":"https:\/\/multimediabilgisayar.com\/blog\/wp-json\/wp\/v2\/posts\/1372\/revisions"}],"predecessor-version":[{"id":12039,"href":"https:\/\/multimediabilgisayar.com\/blog\/wp-json\/wp\/v2\/posts\/1372\/revisions\/12039"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/multimediabilgisayar.com\/blog\/wp-json\/wp\/v2\/media\/2093"}],"wp:attachment":[{"href":"https:\/\/multimediabilgisayar.com\/blog\/wp-json\/wp\/v2\/media?parent=1372"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/multimediabilgisayar.com\/blog\/wp-json\/wp\/v2\/categories?post=1372"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/multimediabilgisayar.com\/blog\/wp-json\/wp\/v2\/tags?post=1372"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}