{"id":5640,"date":"2015-11-24T12:10:14","date_gmt":"2015-11-24T12:10:14","guid":{"rendered":"https:\/\/ihs.com.tr\/blog\/?p=5640"},"modified":"2021-04-13T16:39:36","modified_gmt":"2021-04-13T14:39:36","slug":"mobil-veri-guvenligiyle-ilgili-puf-noktalar","status":"publish","type":"post","link":"https:\/\/www.ihs.com.tr\/blog\/mobil-veri-guvenligiyle-ilgili-puf-noktalar\/","title":{"rendered":"Mobil Veri G\u00fcvenli\u011fiyle \u0130lgili P\u00fcf Noktalar"},"content":{"rendered":"<p><span style=\"font-size: 14pt;\">\u0130lk telefonlar o kadar basitti ki kullan\u0131c\u0131lar <strong>sadece sesli arama<\/strong> yapabiliyor, <strong>SMS yollayabiliyor<\/strong> veya <strong>basit oyunlar<\/strong> oynayabiliyordu. G\u00fcn\u00fcm\u00fcz\u00fcn ak\u0131ll\u0131 telefonlar\u0131 ise h\u0131zl\u0131 i\u015flemcileri olan ve internete girebilen <strong>mini bilgisayarlar<\/strong> halini ald\u0131. Fakat kullan\u0131c\u0131lar\u0131n bazen ak\u0131ll\u0131 telefonlar\u0131n\u0131 korumay\u0131 ihmal edip bir sabah verileri \u00e7al\u0131nm\u0131\u015f olarak uyand\u0131klar\u0131 da oluyor. Bu a\u00e7\u0131klardan faydalanan hackerlar \u015fifreleri, kredi kart\u0131 bilgilerini veya g\u00fcvenlik a\u00e7\u0131\u011f\u0131 olan telefonlara kaydedilmi\u015f herhangi bir bilgiyi \u00e7al\u0131yorlar.<\/span><\/p>\n<p><strong><span style=\"font-size: 14pt;\">Antivir\u00fcs Program\u0131<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt;\">Kullan\u0131c\u0131lar ilk i\u015f olarak mobil cihazlar\u0131na pop\u00fcler web sitelerinden ge\u00e7en <a href=\"https:\/\/www.ihs.com.tr\/blog\/cerez-nedir-nasil-kullanilir\/\">\u00e7erez<\/a>lerin, foto\u011fraflar\u0131n, videolar\u0131n ve di\u011fer dosyalar\u0131n i\u00e7ine gizlenmi\u015f vir\u00fcslere, Trojanlara, casus yaz\u0131l\u0131mlara vs kar\u015f\u0131 koruma sa\u011flayacak bir antivir\u00fcs program\u0131 y\u00fcklemeleri gerekir.<\/span><\/p>\n<p><strong><span style=\"font-size: 14pt;\">Karma\u015f\u0131k Parola<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt;\">Her uygulama i\u00e7in en az alt\u0131 karakterden olu\u015fan bir parola belirlenmelidir. Bu parolada da k\u00fc\u00e7\u00fck ve b\u00fcy\u00fck harfler, say\u0131lar ve semboller (@, #, $ gibi) kullan\u0131lmal\u0131d\u0131r. Hackerlar\u0131n b\u00f6yle bir parolay\u0131 \u00e7\u00f6zmeleri zordur. Ak\u0131ll\u0131 telefonla internet bankac\u0131l\u0131\u011f\u0131 i\u015flemleri yaparken sanal klavyeyi kullanman\u0131z da daha g\u00fcvenli olacakt\u0131r.<\/span><\/p>\n<p><strong><span style=\"font-size: 14pt;\">\u015eirket Verilerinin Korunmas\u0131<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt;\">\u0130\u015f insanlar\u0131 ticari i\u015flemlerini yapmak i\u00e7in mobil cihaz y\u00f6netimi, uzaktan veri silme, veri \u015fifreleme gibi i\u015flevleri destekleyen uygulamalar kullanmak zorundad\u0131r. Bu ki\u015filer verilerini korumak i\u00e7in bir <a href=\"https:\/\/www.ihsteknoloji.com\/airwatch-mobil-cihaz-yonetimi\/\" target=\"_blank\"><strong>mobil cihaz y\u00f6netimi<\/strong><\/a> yaz\u0131l\u0131m\u0131 y\u00fcklemelidirler.<\/span><\/p>\n<p><strong><span style=\"font-size: 14pt;\">Verinin \u015eifrelenmesi<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt;\">Veriyi \u015fifresiz bir Wi-Fi ba\u011flant\u0131s\u0131 veya hotspot \u00fczerinden payla\u015fmak \u00e7ok risklidir, \u00e7\u00fcnk\u00fc korumas\u0131z cihazlardaki \u00f6nemli bilgileri \u00e7almak i\u00e7in pusuya yatm\u0131\u015f \u00e7ok say\u0131da h\u0131rs\u0131z vard\u0131r. Yine de bu \u015fartlar alt\u0131nda internete ba\u011flanman\u0131z gerekiyorsa web sitelerine SSL sertifikas\u0131yla veya HTTP:\/\/ kullanarak g\u00fcvenli a\u011flar \u00fczerinden girmenizi tavsiye ederiz.<\/span><\/p>\n<p><strong><span style=\"font-size: 14pt;\">Tu\u015f Seslerinizin Duyulmas\u0131<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt;\">Yeni iPhonelarda klavyedeki titre\u015fimler \u00fczerinden ne tu\u015flad\u0131\u011f\u0131n\u0131z\u0131 alg\u0131layan bir akselerometre sens\u00f6r\u00fc bulunmaktad\u0131r. Hackerlar bu sayede tu\u015flad\u0131\u011f\u0131n\u0131z \u015feyi \u201cduyabilmekte\u201d ve parolalar\u0131n\u0131z\u0131 tespit edebilmektedir. Bu y\u00fczden e-postalar\u0131n\u0131z\u0131 desen kilidi kullanarak a\u00e7man\u0131z\u0131 tavsiye ederiz.<\/span><\/p>\n<p><strong><span style=\"font-size: 14pt;\">Bilin\u00e7li Al\u0131\u015fveri\u015f<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt;\">Bir\u00e7ok ki\u015fi al\u0131\u015fveri\u015flerini internetten yapmaktad\u0131r, fakat hangi firmalarla irtibata ge\u00e7tikleri konusunda dikkatli olmal\u0131d\u0131rlar \u00e7\u00fcnk\u00fc bu firmalar\u0131n baz\u0131lar\u0131 \u00e7ok \u0131srarc\u0131 olur ve s\u00fcrekli <strong>tan\u0131t\u0131m e-postalar\u0131<\/strong> yollar veya sosyal medya \u00fczerinden s\u00fcrekli reklam g\u00f6nderir. Al\u0131\u015fveri\u015f yapmadan \u00f6nce bu firmalar hakk\u0131ndaki yorumlar\u0131 okumakta fayda vard\u0131r.<\/span><\/p>\n<p><strong><span style=\"font-size: 14pt;\">G\u00fcvenli FTP<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt;\">Hackerlar\u0131n \u00e7o\u011fu FTP parolalar\u0131n\u0131 ele ge\u00e7irir. Bu parolalar kullan\u0131c\u0131 oturum a\u00e7ma bilgileri i\u00e7in \u00f6zel bir dosya i\u00e7eren G\u00fcvenli Dosya Transferi Protokol\u00fc kullanarak korunabilir.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u0130lk telefonlar o kadar basitti ki kullan\u0131c\u0131lar sadece sesli arama yapabiliyor, SMS yollayabiliyor veya basit oyunlar oynayabiliyordu. G\u00fcn\u00fcm\u00fcz\u00fcn ak\u0131ll\u0131 telefonlar\u0131 ise h\u0131zl\u0131&hellip;<\/p>\n","protected":false},"author":3,"featured_media":5667,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-5640","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-haberler"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5640","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=5640"}],"version-history":[{"count":5,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5640\/revisions"}],"predecessor-version":[{"id":13918,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5640\/revisions\/13918"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/media\/5667"}],"wp:attachment":[{"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=5640"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=5640"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=5640"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}