{"id":7218,"date":"2016-03-21T10:01:05","date_gmt":"2016-03-21T08:01:05","guid":{"rendered":"https:\/\/ihs.com.tr\/blog\/?p=7218"},"modified":"2016-03-21T10:01:05","modified_gmt":"2016-03-21T08:01:05","slug":"guvenlik-konusundaki-bilgi-eksikligi-ticari-kuruluslari-kisitliyor","status":"publish","type":"post","link":"https:\/\/www.ihs.com.tr\/blog\/guvenlik-konusundaki-bilgi-eksikligi-ticari-kuruluslari-kisitliyor\/","title":{"rendered":"G\u00fcvenlik Konusundaki Bilgi Eksikli\u011fi Ticari Kurulu\u015flar\u0131 K\u0131s\u0131tl\u0131yor"},"content":{"rendered":"<p><span style=\"font-size: 14pt;\">Dell\u2019in yapt\u0131\u011f\u0131 Veri G\u00fcvenli\u011fi Anketi\u2019ne g\u00f6re <a href=\"https:\/\/www.ihs.com.tr\/blog\/sirketiniz-icin-3-temel-guvenlik-onlemi\/\" target=\"_blank\">g\u00fcvenlik<\/a> konusundaki kayg\u0131lar kurulu\u015flar\u0131n bulut ve mobiliteyi benimsemesini geciktiriyor.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">\u015eirketler veri g\u00fcvenli\u011finin faydalar\u0131n\u0131n fark\u0131nda olsa da, bunu di\u011fer ticari giri\u015fimlerden geri kalmadan faaliyetlerine dahil etmekte zorlan\u0131yorlar.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Anket raporunda \u201cKurulu\u015flar ve IT karar al\u0131c\u0131lar\u0131 veri g\u00fcvenli\u011fiyle ilgili gereksinimleri kar\u015f\u0131layacak ara\u00e7lar ellerinde olsa dahi bu teknolojilere ba\u011fl\u0131 olan programlar\u0131 uygulama ve geni\u015fletme konusunda pek rahat olmad\u0131klar\u0131n\u0131 ifade ediyorlar,\u201d deniyor.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">7 \u00fclkeden 1300 \u015firket ve IT uzman\u0131yla yap\u0131lan anket sonucunda, her ne kadar \u00fcst d\u00fczey y\u00f6neticiler <strong><a href=\"https:\/\/www.ihs.com.tr\/blog\/kisisel-verilerin-korunmasi\/\" target=\"_blank\">veri g\u00fcvenli\u011fine<\/a><\/strong> ge\u00e7mi\u015fte oldu\u011fundan \u00e7ok daha fazla yat\u0131r\u0131m yap\u0131yor olsalar da, IT ekipleri bu y\u00f6neticilerin veri g\u00fcvenli\u011fiyle ilgili zorluklar\u0131n \u00fcstesinden gelmek i\u00e7in gereken enerjiyi ve kaynaklar\u0131 hala yeterince tahsis etmediklerini d\u00fc\u015f\u00fcn\u00fcyor.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Her d\u00f6rt karar al\u0131c\u0131dan \u00fc\u00e7\u00fc kurulu\u015flar\u0131n\u0131n \u00fcst d\u00fczey y\u00f6neticileri i\u00e7in veri g\u00fcvenli\u011finin \u00f6ncelikli oldu\u011funu kabul ediyor, fakat her d\u00f6rt ki\u015fiden biri de bu y\u00f6neticilerin <strong>veri g\u00fcvenli\u011fi<\/strong> konular\u0131nda yeterince bilgili olmad\u0131\u011f\u0131n\u0131 d\u00fc\u015f\u00fcn\u00fcyor.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Her d\u00f6rt karar al\u0131c\u0131dan \u00fc\u00e7\u00fc \u00fcst d\u00fczey y\u00f6neticilerin mevcut g\u00fcvenlik \u00f6nlemlerini artt\u0131rmay\u0131 d\u00fc\u015f\u00fcnd\u00fc\u011f\u00fcn\u00fc, yar\u0131s\u0131ndan fazlas\u0131 ise \u00f6n\u00fcm\u00fczdeki be\u015f y\u0131l i\u00e7erisinde veri g\u00fcvenli\u011fine daha fazla para harcanmas\u0131n\u0131 beklediklerini s\u00f6yl\u00fcyor.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Mevcut projelerin geli\u015ftirilmesi s\u00f6z konusu oldu\u011funda maliyet \u00f6nemli bir mesele halini al\u0131yor. Ankete kat\u0131lanlar\u0131n %53\u2019\u00fc gelecekte ilave g\u00fcvenlik \u00f6nlemleri al\u0131nmas\u0131n\u0131 beklememelerinin nedeni olarak maliyet k\u0131s\u0131tl\u0131l\u0131klar\u0131n\u0131 g\u00f6steriyor.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Her d\u00f6rt karar al\u0131c\u0131dan yaln\u0131zca biri \u00fcst d\u00fczey y\u00f6neticilerinin \u00f6n\u00fcm\u00fczdeki be\u015f y\u0131l i\u00e7erisinde veri g\u00fcvenli\u011fine yeterli b\u00fct\u00e7e ay\u0131rabilece\u011finden \u201c\u00e7ok emin oldu\u011funu\u201d s\u00f6ylemi\u015f.<\/span><\/p>\n<p><strong><span style=\"font-size: 14pt;\">G\u00fcvenlik becerisi eksikli\u011fi<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt;\">Dell ticari m\u00fc\u015fteri yaz\u0131l\u0131mlar\u0131 ve \u00e7\u00f6z\u00fcmlerinden sorumlu ba\u015fkan yard\u0131mc\u0131s\u0131 Steve Lalla \u201cBu bulgular \u00fcst d\u00fczey y\u00f6neticilerin veri g\u00fcvenli\u011fi stratejilerini \u015firketlerinde uygulamak s\u00f6z konusu oldu\u011funda daha giri\u015fken olmalar\u0131 gerekti\u011fini g\u00f6steriyor,\u201d diyor.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">\u201c\u015eirket liderleri g\u00fcvenlik altyap\u0131lar\u0131na yat\u0131r\u0131m yapmalar\u0131 gerekti\u011finin fark\u0131ndalar ama bu mevcut sistemlerini modern sald\u0131r\u0131lar\u0131 \u00f6nleyecek \u015fekilde g\u00fcncellemelerine veya geli\u015ftirmelerine neden olmuyor.\u201d<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">\u00dcst d\u00fczey y\u00f6neticilerin bu alana daha fazla yat\u0131r\u0131m yapmas\u0131na ra\u011fmen, anket sonucunda IT departmanlar\u0131n\u0131n veri g\u00fcvenli\u011fini tam anlam\u0131yla uygulayabilmeleri i\u00e7in daha fazla deste\u011fe ihtiyac\u0131 oldu\u011funu ve modern teknolojilere yeterince yat\u0131r\u0131m yap\u0131lmamas\u0131n\u0131n ve bu alandaki yetenek eksikli\u011finin veri g\u00fcvenli\u011fi stratejileri anlam\u0131nda gerekli ince ayarlar\u0131n yap\u0131lmas\u0131n\u0131n \u00f6n\u00fcndeki engeller oldu\u011fu ortaya \u00e7\u0131k\u0131yor.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Karar al\u0131c\u0131lar\u0131n \u00e7o\u011funlu\u011fu (%58) kurulu\u015flar\u0131n\u0131n alandaki e\u011fitimli g\u00fcvenlik profesyoneli eksikli\u011finden olumsuz anlamda etkilendi\u011fini d\u00fc\u015f\u00fcn\u00fcyor.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Karar al\u0131c\u0131lar\u0131n yakla\u015f\u0131k %70\u2019i hala veri g\u00fcvenli\u011fini vakit ve b\u00fct\u00e7e anlam\u0131nda bir y\u00fck olarak g\u00f6r\u00fcyor; yakla\u015f\u0131k yar\u0131s\u0131 \u00f6n\u00fcm\u00fczdeki be\u015f y\u0131l i\u00e7erisinde verileri g\u00fcvenli bir \u015fekilde saklamak i\u00e7in \u015fimdi oldu\u011fundan daha fazla vakit harcanmas\u0131 gerekti\u011fini, %76\u2019s\u0131 ise ellerindeki sistemin tek bir tedarik\u00e7i taraf\u0131ndan temin edilmesi durumunda daha az yorucu olaca\u011f\u0131n\u0131 d\u00fc\u015f\u00fcn\u00fcyor.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Lalla \u201cBu bulgular geleneksel ve tek boyutlu \u00e7\u00f6z\u00fcmlere e\u015flik eden maliyet ve zaman k\u0131s\u0131tl\u0131l\u0131klar\u0131n\u0131n IT departmanlar\u0131 \u00fczerinde olumsuz bir etki yaratt\u0131\u011f\u0131n\u0131 g\u00f6steriyor. Y\u00fczlerce veya binlerce \u00e7al\u0131\u015fan\u0131 olan \u015firketler i\u00e7in her u\u00e7 noktay\u0131 farkl\u0131 konsollar kullanarak ayr\u0131 ayr\u0131 y\u00f6netmek ola\u011fan\u00fcst\u00fc verimsiz bir y\u00f6ntem ve \u00e7at\u0131\u015fma veya uyumsuzluk ihtimalini bir hayli artt\u0131r\u0131yor. IT y\u00f6netimi i\u00e7in tek ve entegre bir paket kullanmak bu s\u00fcreci ciddi anlamda geli\u015ftirebilir,\u201d diyor.<\/span><\/p>\n<p><strong><span style=\"font-size: 14pt;\">Phishing sald\u0131r\u0131lar\u0131 kayg\u0131lar\u0131 artt\u0131r\u0131yor<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt;\">Anket sonucunda kat\u0131l\u0131mc\u0131lar\u0131n her ne kadar k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlara kar\u015f\u0131 \u00e7\u00f6z\u00fcmleri halihaz\u0131rda kullan\u0131yor olsalar da k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar konusunda bir hayli endi\u015feli olduklar\u0131 g\u00f6r\u00fcl\u00fcyor.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Her d\u00f6rt karar al\u0131c\u0131n\u0131n \u00fc\u00e7\u00fc k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar ve geli\u015fmi\u015f \u0131srarc\u0131 tehditler konusunda olduk\u00e7a kayg\u0131l\u0131yken, be\u015f kat\u0131l\u0131mc\u0131dan yaln\u0131zca biri kendilerini geli\u015fmi\u015f k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m sald\u0131r\u0131lar\u0131na kar\u015f\u0131 koruyabileceklerinden \u00e7ok emin.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Ankete kat\u0131lanlar ayr\u0131ca hedef odakl\u0131 <strong>phishing<\/strong> sald\u0131r\u0131lar\u0131 konusunda di\u011fer sald\u0131r\u0131lara nazaran daha endi\u015feli.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Dell veri g\u00fcvenli\u011fi \u00e7\u00f6z\u00fcmleri sorumlusu Brett Hansen \u201cIT ve \u015firket karar al\u0131c\u0131lar\u0131n\u0131n k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlara kar\u015f\u0131 savunmalar\u0131 konusunda kendilerinden emin olmamalar\u0131n\u0131n nedeni \u00e7a\u011fd\u0131\u015f\u0131 veya verimsiz ara\u00e7lar\u0131 kullanmalar\u0131 olabilir. IT ekipleri tehditleri \u00f6nceden m\u00fcdahale ederek \u00f6nlemek ve yeni ortaya \u00e7\u0131kan tehditlerin daima bir ad\u0131m \u00f6n\u00fcnde olmak i\u00e7in gerekli olan kaynaklara sahip olmad\u0131klar\u0131nda mecburen sadece tehdit tespiti ve iyile\u015ftirme y\u00f6ntemlerini kullanarak savunma yap\u0131yorlar,\u201d diyor.<\/span><\/p>\n<p><strong><span style=\"font-size: 14pt;\">G\u00fcvenlikle ilgili endi\u015feler mobiliteyi k\u0131s\u0131tl\u0131yor<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt;\">Her ne kadar genel gidi\u015fat mobil bilgi i\u015flemin daha fazla kullan\u0131lmas\u0131 y\u00f6n\u00fcnde olsa da, anket sonucunda i\u015fverenlerin veriyi korumak i\u00e7in <a href=\"https:\/\/www.ihsteknoloji.com\/airwatch-mobil-cihaz-yonetimi\/\" target=\"_blank\">mobiliteyi k\u0131s\u0131tlamak<\/a> zorunda olduklar\u0131n\u0131 d\u00fc\u015f\u00fcnd\u00fc\u011f\u00fc ortaya \u00e7\u0131k\u0131yor.<\/span><\/p>\n<p><a href=\"https:\/\/www.ihs.com.tr\/blog\/wp-content\/uploads\/2016\/03\/kendi-cihaz\u0131n\u0131-getir.jpg\" data-rel=\"penci-gallery-image-content\" rel=\"attachment wp-att-7220\"><img decoding=\"async\" class=\"alignnone size-medium wp-image-7220\" src=\"https:\/\/www.ihs.com.tr\/blog\/wp-content\/uploads\/2016\/03\/kendi-cihaz\u0131n\u0131-getir-300x210.jpg\" alt=\"kendi cihaz\u0131n\u0131 getir\" width=\"300\" height=\"210\" srcset=\"https:\/\/www.ihs.com.tr\/blog\/wp-content\/uploads\/2016\/03\/kendi-cihaz\u0131n\u0131-getir-300x210.jpg 300w, https:\/\/www.ihs.com.tr\/blog\/wp-content\/uploads\/2016\/03\/kendi-cihaz\u0131n\u0131-getir.jpg 500w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p><span style=\"font-size: 14pt;\">Orta \u00f6l\u00e7ekli \u015firketleri \u00e7o\u011fu (%65) g\u00fcvenlik nedeniyle i\u015f g\u00fc\u00e7lerini daha mobil hale getirme planlar\u0131n\u0131 geri \u00e7ekerken, %67\u2019si kendi cihaz\u0131n\u0131 getir (BYOD) programlar\u0131n\u0131 kullanmaya ba\u015flamak konusunda \u00e7ekingen davran\u0131yor.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Karar al\u0131c\u0131lar\u0131n %82\u2019si g\u00fcvenli\u011fi artt\u0131rmak i\u00e7in <strong>veri eri\u015fim<\/strong> noktalar\u0131n\u0131 k\u0131s\u0131tl\u0131yorken, %72\u2019si veriye nereden ula\u015f\u0131ld\u0131\u011f\u0131n\u0131 bilmenin veri koruma \u00f6nlemlerini daha verimli hale getirece\u011fine inan\u0131yor.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Kat\u0131l\u0131mc\u0131lar\u0131n yakla\u015f\u0131k %70\u2019i \u015firketlerini olas\u0131 bir veri h\u0131rs\u0131zl\u0131\u011f\u0131na kar\u015f\u0131 korumak i\u00e7in ki\u015fisel cihazlar\u0131ndan feragat etmeye haz\u0131r olduklar\u0131n\u0131, %57\u2019si ise \u015firketleri taraf\u0131ndan kullan\u0131lan kriptolama y\u00f6ntemlerinin kalitesi hakk\u0131nda kayg\u0131lar\u0131 oldu\u011funu s\u00f6yl\u00fcyor.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Her be\u015f kat\u0131l\u0131mc\u0131dan ikisi ise \u00e7al\u0131\u015fanlar\u0131n verimlili\u011finin artmas\u0131 i\u00e7in mobiliteye daha fazla a\u011f\u0131rl\u0131k verilmesi gerekti\u011fini d\u00fc\u015f\u00fcn\u00fcyor.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">\u201cKurulu\u015flar korunakl\u0131 ve g\u00fcvenli mobilite programlar\u0131 olu\u015fturma konusunda \u00e7ekingen davrand\u0131klar\u0131nda kendilerini di\u011fer risklere a\u00e7\u0131k hale getiriyorlar. Mobilite ve g\u00fcvenlik veriyi ister at\u0131l haldeyken ister hareketli haldeyken, isterse de kullan\u0131m halindeyken koruyacak ak\u0131ll\u0131 kriptolama y\u00f6ntemlerinin kullan\u0131ld\u0131\u011f\u0131 modern veri g\u00fcvenli\u011fi teknolojileriyle bir arada var olabilir,\u201d diyor Hansen.<\/span><\/p>\n<p><strong><span style=\"font-size: 14pt;\">Buluta y\u00f6nelik g\u00fcvensizlik<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt;\">\u00c7al\u0131\u015fanlar\u0131n i\u015fyerlerinde Box ve Google Drive gibi a\u00e7\u0131k bulut hizmetlerini daha fazla kullanmaya ba\u015flamas\u0131yla, karar al\u0131c\u0131lar art\u0131k bu uygulamalardan kaynaklanan riskleri kontrol alt\u0131nda tutabileceklerine daha az inan\u0131yor.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Her be\u015f kat\u0131l\u0131mc\u0131n\u0131n d\u00f6rd\u00fc kritik verilerin buluta y\u00fcklenmesi konusunda endi\u015feli, %58\u2019i ise bir y\u0131l \u00f6nce oldu\u011fundan daha endi\u015feli.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Kat\u0131l\u0131mc\u0131lar\u0131n \u00fc\u00e7te biri kurulu\u015flar\u0131nda g\u00fcvenlikle ilgili endi\u015feler y\u00fcz\u00fcnden a\u00e7\u0131k bulut sitelerine eri\u015fimin k\u0131s\u0131tl\u0131 oldu\u011funu bildiriyor.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Halihaz\u0131rda bulut kullan\u0131c\u0131s\u0131 olan karar al\u0131c\u0131lar\u0131n yakla\u015f\u0131k %57\u2019si ve a\u00e7\u0131k bulut platformlar\u0131n\u0131 kullanmay\u0131 d\u00fc\u015f\u00fcnen karar al\u0131c\u0131lar\u0131n %45\u2019i g\u00fcvenli\u011fi bulut hizmeti firmalar\u0131n\u0131n sa\u011flamas\u0131n\u0131 beklediklerini ifade ediyor.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Her \u00fc\u00e7 kurulu\u015ftan yaln\u0131zca biri a\u00e7\u0131k bulut ortamlar\u0131na g\u00fcvenli eri\u015fimi geli\u015ftirmenin g\u00fcvenlik altyap\u0131lar\u0131 i\u00e7in en b\u00fcy\u00fck \u00f6ncelik olmas\u0131 gerekti\u011fini s\u00f6ylerken, %83\u2019\u00fc \u00e7al\u0131\u015fanlar\u0131n de\u011ferli verileri payla\u015fmak ve depolamak i\u00e7in a\u00e7\u0131k bulut ortamlar\u0131n\u0131 ya kullanmakta oldu\u011funu ya da yak\u0131nda kullanmaya ba\u015flayacaklar\u0131n\u0131 ifade ediyor.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">\u201cG\u00fcvenlik programlar\u0131 \u00e7al\u0131\u015fanlar\u0131n hem g\u00fcvenli hem de \u00fcretken olmalar\u0131n\u0131 sa\u011flamal\u0131, bu da i\u015flerini yapmalar\u0131n\u0131 kolayla\u015ft\u0131ran teknolojilere sahip olmalar\u0131 gerekti\u011fi anlam\u0131na geliyor. \u015eirketler a\u00e7\u0131k bulut kullan\u0131m\u0131n\u0131 k\u0131s\u0131tlayabilir veya yasaklayabilir, ancak kurumsal verileri korumak i\u00e7in ak\u0131ll\u0131 veri kriptolama y\u00f6ntemlerini kullanmak ve \u00e7al\u0131\u015fanlar\u0131n \u00fcretken olmak i\u00e7in k\u0131s\u0131tlay\u0131c\u0131 politikalara ba\u015fvurmas\u0131 riskini azaltmak daha verimli bir tercih olur,\u201d diyor Hansen.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">ABD Ulusal Siber G\u00fcvenlik Birli\u011fi yetkili m\u00fcd\u00fcr\u00fc Michael Kaiser her ne kadar siber g\u00fcvenli\u011fin kurulu\u015flarda IT altyap\u0131s\u0131n\u0131n bir eklentisi oldu\u011fu g\u00fcnlerden beri bir hayli ilerleme kaydedilmi\u015f olsa da, daha yap\u0131lacak \u00e7ok i\u015f oldu\u011funu s\u00f6yl\u00fcyor.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">\u201cDell Veri G\u00fcvenli\u011fi Anketi g\u00fcvenlik ortam\u0131 geli\u015ftik\u00e7e ve tehditler daha sofistike bir hal ald\u0131k\u00e7a, kurulu\u015flar\u0131n topyekun bir siber g\u00fcvenlik fark\u0131ndal\u0131\u011f\u0131 olu\u015fturmas\u0131 ve bunu b\u00fcnyelerine iyice entegre etmesi gerekti\u011fini g\u00f6zler \u00f6n\u00fcne seriyor,\u201d diyor.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dell\u2019in yapt\u0131\u011f\u0131 Veri G\u00fcvenli\u011fi Anketi\u2019ne g\u00f6re g\u00fcvenlik konusundaki kayg\u0131lar kurulu\u015flar\u0131n bulut ve mobiliteyi benimsemesini geciktiriyor. \u015eirketler veri g\u00fcvenli\u011finin faydalar\u0131n\u0131n fark\u0131nda olsa da,&hellip;<\/p>\n","protected":false},"author":3,"featured_media":7219,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-7218","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-haberler"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/posts\/7218","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=7218"}],"version-history":[{"count":4,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/posts\/7218\/revisions"}],"predecessor-version":[{"id":7237,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/posts\/7218\/revisions\/7237"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/media\/7219"}],"wp:attachment":[{"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=7218"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=7218"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=7218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}