{"id":4463,"date":"2015-09-14T06:50:49","date_gmt":"2015-09-14T06:50:49","guid":{"rendered":"https:\/\/ihs.com.tr\/blog\/?p=4463"},"modified":"2015-09-18T07:52:33","modified_gmt":"2015-09-18T07:52:33","slug":"kampusler-veri-acisindan-bir-altin-madeni-peki-yeterince-guvenli-mi","status":"publish","type":"post","link":"https:\/\/www.ihs.com.tr\/blog\/kampusler-veri-acisindan-bir-altin-madeni-peki-yeterince-guvenli-mi\/","title":{"rendered":"Kamp\u00fcsler veri a\u00e7\u0131s\u0131ndan bir alt\u0131n madeni, peki yeterince g\u00fcvenli mi?"},"content":{"rendered":"<p style=\"text-align: justify;\"><span style=\"font-size: 14pt;\">\u00dcniversite a\u011flar\u0131na y\u00f6nelik sald\u0131r\u0131lar son d\u00f6nemlerde ciddi art\u0131\u015flar g\u00f6steriyor. Symantec&#8217;in 2015 <a href=\"http:\/\/www.symantec.com\/content\/en\/us\/enterprise\/other_resources\/21347933_GA_RPT-internet-security-threat-report-volume-20-2015.pdf\" target=\"_blank\" rel=\"nofollow\"><strong>&#8220;Internet Security Threat Report&#8221; (ISTR)<\/strong><\/a> detaylar\u0131nda bahsetti\u011fi gibi, e\u011fitim sekt\u00f6r\u00fc 2014 y\u0131l\u0131nda <strong>en \u00e7ok g\u00fcvenlik ihlali yap\u0131lan<\/strong> 3. sekt\u00f6r konumunda ve rakamlar\u0131 da art\u0131\u015f trendinde.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 14pt;\">\u00dcniversite a\u011flar\u0131nda bir \u00e7ok ki\u015fisel, finansal, akademik ve sosyal bilgi bulunuyor. <strong>Hacker&#8217;lar i\u00e7in &#8220;alt\u0131n madeni&#8221;<\/strong> olarak da tan\u0131mlayabilece\u011fimiz bu alan, elbette bu sebeple \u00f6nemli bir cazibe merkezi haline gelmi\u015f durumda.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 14pt;\">Bu bilgileri kullanarak mobil cihazlar\u0131, a\u011f hesaplar\u0131n\u0131, kredi kartlar\u0131n\u0131 ve \u00f6\u011frenci kredilerini bile kendi ama\u00e7lar\u0131 i\u00e7in kullanabilen hacker&#8217;lar\u0131n en \u00e7ok ho\u015funa giden \u015fey ise bu a\u011flar\u0131n <strong>bir \u015firket a\u011f\u0131 kadar g\u00fcvenlikli olmamas\u0131.<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 14pt;\"><img decoding=\"async\" class=\"aligncenter wp-image-4466 size-full\" src=\"https:\/\/www.ihs.com.tr\/blog\/wp-content\/uploads\/2015\/09\/campus-wifi.jpg\" alt=\"campus-wifi\" width=\"700\" height=\"539\" srcset=\"https:\/\/www.ihs.com.tr\/blog\/wp-content\/uploads\/2015\/09\/campus-wifi.jpg 700w, https:\/\/www.ihs.com.tr\/blog\/wp-content\/uploads\/2015\/09\/campus-wifi-300x231.jpg 300w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 14pt;\">E\u011fitim kurumlar\u0131n\u0131n b\u00fcy\u00fck ve olduk\u00e7a komplike bir a\u011flar\u0131 mevcut. Her sene binlerce \u00f6\u011frenci ve akademisyenin kat\u0131ld\u0131\u011f\u0131 ve ayr\u0131ld\u0131\u011f\u0131, ve hatta baz\u0131lar\u0131n\u0131n bile hacker olabilece\u011fi bir ortam sonu\u00e7ta. Ayr\u0131ca <strong>kamp\u00fcs i\u00e7i a\u00e7\u0131k Wi-Fi, ziyaret\u00e7iler, konu\u015fmac\u0131lar ve \u00f6\u011frencilerin kendi getirdi\u011fi cihazlar<\/strong> ile trafik, eri\u015fim ve karma\u015fa olabilecek en \u00fcst seviyeye \u00e7\u0131k\u0131yor.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 14pt;\">Her ne kadar \u00fcniversiteler ve kamp\u00fcsler de artan risklerin fark\u0131nda olsa ve g\u00fcvenlik \u00f6nlemlerini al\u0131yor olsa da, kullan\u0131c\u0131lar\u0131n da kendi \u00f6nlemlerini almas\u0131 ve <strong>hem kamp\u00fcste hem de kamp\u00fcs d\u0131\u015f\u0131nda bilgilerini koruyor olmas\u0131 olduk\u00e7a kritik.<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 14pt;\">Kamp\u00fcslere, \u00fcniversitelere ve e\u011fitim kurumlar\u0131na y\u00f6nelik sald\u0131r\u0131lar, t\u0131pk\u0131 di\u011fer sekt\u00f6rlerde oldu\u011fu gibi h\u0131zla artmaya devam ediyor. Ancak bu sald\u0131r\u0131lar\u0131 savu\u015fturmak i\u00e7in <strong>al\u0131nan \u00f6nlemler ve g\u00fcvenlik a\u00e7\u0131s\u0131ndan izlenen &#8220;best practice&#8217;ler&#8221; sayesinde<\/strong> riskler de azalt\u0131lmaya \u00e7al\u0131\u015f\u0131l\u0131yor.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 14pt;\">Kullan\u0131c\u0131lara d\u00fc\u015fen pay ise, kendi g\u00fcvenliklerine -en az\u0131ndan a\u015fa\u011f\u0131daki konulara \u00f6zen g\u00f6stererek- dikkat etmek:<\/span><\/p>\n<ol>\n<li style=\"text-align: justify;\"><span style=\"font-size: 14pt;\">\u00dcniversitede yap\u0131lan her \u015fey arkas\u0131nda bir dijital iz b\u0131rak\u0131r. <strong>Neyi, ne zaman, kimlerle payla\u015ft\u0131\u011f\u0131n\u0131za dikkat edin.<\/strong><\/span><\/li>\n<li style=\"text-align: justify;\"><span style=\"font-size: 14pt;\"><strong>A\u00e7\u0131k Wi-Fi noktalar\u0131ndan<\/strong> internete ba\u011flan\u0131rken eri\u015fti\u011finiz sitelere, kulland\u0131\u011f\u0131n\u0131z ki\u015fisel bilgilere dikkat edin. M\u00fcmk\u00fcnse hi\u00e7 bir gizli bilgi, kredi kart\u0131 vb. payla\u015fmay\u0131n.<\/span><\/li>\n<li style=\"text-align: justify;\"><span style=\"font-size: 14pt;\">Verilerinizi <strong>her zaman YEDEKLEY\u0130N<\/strong>. Cihazlar\u0131n yerine yenisi konabilir, ama verilerin asla&#8230;<\/span><\/li>\n<li style=\"text-align: justify;\"><span style=\"font-size: 14pt;\"><strong>Cihazlar\u0131n\u0131z\u0131 koruyun<\/strong>. \u0130ster bir diz\u00fcst\u00fc bilgisayar veya bir mobil cihaz olsun, cihaz\u0131n\u0131 koruyacak \u00f6nlemleri al\u0131n.\u00a0<\/span><\/li>\n<li style=\"text-align: justify;\"><span style=\"font-size: 14pt;\">G\u00f6z\u00fcn\u00fcz a\u00e7\u0131k olsun, <strong>&#8220;oltaya gelmeyin&#8221;.<\/strong> San\u0131lan\u0131n aksine, bir \u00e7ok sald\u0131r\u0131 asl\u0131nda kullan\u0131c\u0131lar\u0131 kand\u0131rarak yap\u0131lan, kullan\u0131c\u0131n\u0131n kendi eliyle bilgilerini vermesini sa\u011flayan sald\u0131r\u0131lard\u0131r. Bu sebeple \u015f\u00fcpheli bir sayfa a\u00e7\u0131ld\u0131\u011f\u0131nda veya e-posta geldi\u011finde mutlaka ikinci defa d\u00fc\u015f\u00fcnerek hareket edin.<\/span><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>\u00dcniversite a\u011flar\u0131na y\u00f6nelik sald\u0131r\u0131lar son d\u00f6nemlerde ciddi art\u0131\u015flar g\u00f6steriyor. Symantec&#8217;in 2015 &#8220;Internet Security Threat Report&#8221; (ISTR) detaylar\u0131nda bahsetti\u011fi gibi, e\u011fitim sekt\u00f6r\u00fc 2014&hellip;<\/p>\n","protected":false},"author":3,"featured_media":4465,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-4463","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-haberler"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/posts\/4463","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=4463"}],"version-history":[{"count":5,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/posts\/4463\/revisions"}],"predecessor-version":[{"id":4471,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/posts\/4463\/revisions\/4471"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/media\/4465"}],"wp:attachment":[{"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=4463"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=4463"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=4463"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}