{"id":7456,"date":"2016-04-12T09:42:00","date_gmt":"2016-04-12T07:42:00","guid":{"rendered":"https:\/\/ihs.com.tr\/blog\/?p=7456"},"modified":"2016-04-12T09:42:00","modified_gmt":"2016-04-12T07:42:00","slug":"kisisel-saglik-bilgileri-hackerlar-icin-onemli","status":"publish","type":"post","link":"https:\/\/www.ihs.com.tr\/blog\/kisisel-saglik-bilgileri-hackerlar-icin-onemli\/","title":{"rendered":"Ki\u015fisel Sa\u011fl\u0131k Bilgileri Hackerlar \u0130\u00e7in Neden \u00d6nemli?"},"content":{"rendered":"<p><span style=\"font-size: 14pt;\">Ki\u015fisel sa\u011fl\u0131k bilgileri konusu hackerlar aras\u0131nda giderek daha pop\u00fcler bir hal al\u0131yor. Bu bilgilerin de\u011feri de karaborsa da giderek art\u0131yor. Sa\u011fl\u0131k bilgileri hackerlar i\u00e7in \u00f6zellikle boy veya g\u00f6z rengi gibi sahte kimlik yaratmak i\u00e7in kullan\u0131labilecek ki\u015fisel ayr\u0131nt\u0131lar\u0131 i\u00e7erdi\u011finden cazip. Yak\u0131n tarihli bir rapora g\u00f6re \u00e7al\u0131nt\u0131 sa\u011fl\u0131k sigortas\u0131 bilgileri karaborsada 60-70$ gibi bir fiyata ula\u015fm\u0131\u015f durumda. Bu rakam sosyal g\u00fcvenlik numaras\u0131 i\u00e7inse bir dolardan az.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Say\u0131lar\u0131 giderek artan hack olaylar\u0131 bir\u00e7ok sa\u011fl\u0131k kurulu\u015funu etkiliyor. Ponemon Institute\u2019un yapm\u0131\u015f oldu\u011fu y\u0131ll\u0131k \u00e7al\u0131\u015fmada hastanelerin ve sa\u011fl\u0131k kurulu\u015flar\u0131n\u0131n %90\u2019\u0131n\u0131n <strong><a href=\"https:\/\/www.ihs.com.tr\/blog\/calinan-kimliginiz-dark-webde-1a-satilabilir\/\" target=\"_blank\">veri h\u0131rs\u0131zl\u0131\u011f\u0131<\/a><\/strong> ma\u011fduru oldu\u011funu ve bunun kurulu\u015f ba\u015f\u0131na ortalama 2.1 milyon dolarl\u0131k bir zarara neden oldu\u011fu, bu kurulu\u015flar\u0131n %40\u2019\u0131n\u0131n ise bu olay\u0131 son bir iki sene i\u00e7inde ya\u015fad\u0131\u011f\u0131 belirtiliyor. Bu rakamlar\u0131n giderek artmas\u0131 bekleniyor. IDC Health\u2019in yay\u0131nlad\u0131\u011f\u0131 bir raporda 2016 y\u0131l\u0131 i\u00e7erisinde her \u00fc\u00e7 sa\u011fl\u0131k kurulu\u015fundan birinin <strong>veri h\u0131rs\u0131zl\u0131\u011f\u0131<\/strong> ma\u011fduru olaca\u011f\u0131 tahmin ediliyor.<\/span><\/p>\n<p><strong><span style=\"font-size: 14pt;\">Sa\u011fl\u0131k kay\u0131tlar\u0131n\u0131n dijitalle\u015fmesi riski artt\u0131r\u0131yor<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt;\">Hastalar\u0131n sa\u011fl\u0131k kurulu\u015funa gelmeden \u00f6nceki sa\u011fl\u0131k durumlar\u0131yla, kulland\u0131klar\u0131 ila\u00e7larla ve ya\u015fad\u0131klar\u0131 hastal\u0131k belirtileriyle ilgili bilgilerin sakland\u0131\u011f\u0131 elektronik sistemler doktorlar\u0131n hastalar\u0131n\u0131n sa\u011fl\u0131k ge\u00e7mi\u015fiyle ilgili \u00f6nemli bilgileri ba\u015fka hastanelerle, sa\u011fl\u0131k kurulu\u015flar\u0131yla ve ila\u00e7 firmalar\u0131yla payla\u015fmas\u0131n\u0131 sa\u011fl\u0131yor. Ancak, dijitalle\u015ftirilmi\u015f <a href=\"https:\/\/www.ihs.com.tr\/blog\/kisisel-verilerin-korunmasi\/\" target=\"_blank\"><strong>ki\u015fisel sa\u011fl\u0131k bilgileri<\/strong><\/a> \u00e7al\u0131nmaya da a\u00e7\u0131k.<\/span><\/p>\n<p><a href=\"https:\/\/www.ihs.com.tr\/blog\/wp-content\/uploads\/2016\/04\/sa\u011fl\u0131k-bilgileri.jpg\" data-rel=\"penci-gallery-image-content\" rel=\"attachment wp-att-7458\"><img decoding=\"async\" class=\"alignnone size-medium wp-image-7458\" src=\"https:\/\/www.ihs.com.tr\/blog\/wp-content\/uploads\/2016\/04\/sa\u011fl\u0131k-bilgileri-300x200.jpg\" alt=\"sa\u011fl\u0131k bilgileri\" width=\"300\" height=\"200\" srcset=\"https:\/\/www.ihs.com.tr\/blog\/wp-content\/uploads\/2016\/04\/sa\u011fl\u0131k-bilgileri-300x200.jpg 300w, https:\/\/www.ihs.com.tr\/blog\/wp-content\/uploads\/2016\/04\/sa\u011fl\u0131k-bilgileri-165x110.jpg 165w, https:\/\/www.ihs.com.tr\/blog\/wp-content\/uploads\/2016\/04\/sa\u011fl\u0131k-bilgileri-270x180.jpg 270w, https:\/\/www.ihs.com.tr\/blog\/wp-content\/uploads\/2016\/04\/sa\u011fl\u0131k-bilgileri-480x320.jpg 480w, https:\/\/www.ihs.com.tr\/blog\/wp-content\/uploads\/2016\/04\/sa\u011fl\u0131k-bilgileri.jpg 780w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p><span style=\"font-size: 14pt;\">Baz\u0131 veriler e-posta yaz\u0131\u015fmalar\u0131 gibi basit y\u00f6ntemlerle s\u0131zabiliyor. \u00c7al\u0131\u015fanlardan birinin yanl\u0131\u015f bir ki\u015fiye e-posta g\u00f6ndermesiyle bu veri bir anda yay\u0131labiliyor. E-postalar\u0131n hacklenerek \u00e7al\u0131nd\u0131\u011f\u0131 da oluyor. Hackerlar art\u0131k sosyal m\u00fchendislik sayesinde daha ak\u0131ll\u0131 oldu ve sa\u011fl\u0131k kurulu\u015fu \u00e7al\u0131\u015fanlar\u0131ndan daha fazla sa\u011fl\u0131k bilgisi isteyen mesajlar g\u00f6nderiyorlar. Bu sahte e-postalar\u0131n \u00e7o\u011funda k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar veya k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlara y\u00f6nlendiren linkler oluyor. Hackerlar bu sayede sa\u011fl\u0131k \u00e7al\u0131\u015fanlar\u0131n\u0131 kand\u0131r\u0131p bilgisayarlar\u0131n\u0131 ele ge\u00e7irerek t\u0131bbi veriler de dahil olmak \u00fczere t\u00fcm <a href=\"https:\/\/www.ihs.com.tr\/blog\/kisisel-verilerin-korunmasi\/\" target=\"_blank\">ki\u015fisel bilgileri<\/a> ele ge\u00e7irebiliyor.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Bir\u00e7ok \u00fc\u00e7\u00fcnc\u00fc taraf\u0131n ki\u015fisel sa\u011fl\u0131k bilgilerine eri\u015fimi olmas\u0131 da riski artt\u0131r\u0131yor. Hastanelere IT dan\u0131\u015fmanl\u0131\u011f\u0131, t\u0131bbi malzeme, laboratuvar hizmetleri vs. gibi hizmetler sunan t\u00fcm \u015firketlerin klinik verilere eri\u015fiminin olmas\u0131 nedeniyle veri d\u0131\u015far\u0131 daha kolay s\u0131zabiliyor.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">B\u00fcy\u00fck hacimli dosyalar\u0131n payla\u015f\u0131m\u0131 ve yedeklenmesi i\u00e7in kullan\u0131lan bulut hizmetleri de hacklenebiliyor. Bunlar\u0131n aras\u0131nda <strong>Dropbox<\/strong> gibi pop\u00fcler hizmetler ve \u00f6zel bulut hizmetleri de bulunuyor. Ayr\u0131ca takvim sistemleri, e-posta hesaplar\u0131 ve acil t\u0131bbi m\u00fcdahale sistemleri gibi, t\u0131bbi verileri i\u00e7eren t\u00fcm uygulamalar da hacklenmeye a\u00e7\u0131k.<\/span><\/p>\n<p><strong><span style=\"font-size: 14pt;\">Sa\u011fl\u0131k hizmetleri verilerini korumak i\u00e7in at\u0131lmas\u0131 geren ad\u0131mlar<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt;\">Elektronik sa\u011fl\u0131k bilgilerinin payla\u015f\u0131m\u0131 ve eri\u015fimi i\u00e7in bir\u00e7ok farkl\u0131 yol oldu\u011fundan, <strong>sa\u011fl\u0131k kurulu\u015flar\u0131<\/strong> bu bilgi ak\u0131\u015f\u0131n\u0131 korumak i\u00e7in ekstra \u00f6nlemler almal\u0131. Bu \u00f6nlemler aras\u0131nda verinin t\u00fcm uygulamalar, bulut hizmetleri, veritabanlar\u0131 ve e-posta sunucular\u0131 aras\u0131nda nas\u0131l dola\u015ft\u0131\u011f\u0131n\u0131 incelemek de bulunmaktad\u0131r. Bilgi her payla\u015f\u0131ld\u0131\u011f\u0131nda bu payla\u015f\u0131m veri kayb\u0131n\u0131 \u00f6nlemek i\u00e7in kontrol edilmeli ve onaylanmal\u0131d\u0131r ama bu i\u015flemler de kullan\u0131c\u0131lar\u0131n takip edebilece\u011fi \u015fekilde \u015feffaf olarak yap\u0131lmal\u0131d\u0131r.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Buna ek olarak, veri payla\u015f\u0131m\u0131n\u0131 g\u00fcvence alt\u0131na almak i\u00e7in uygulanan t\u00fcm sistemler eri\u015filebilir ve kolay kullan\u0131ml\u0131 olmal\u0131d\u0131r. Sistem karma\u015f\u0131k olursa veya kullan\u0131c\u0131lar\u0131n yaz\u0131l\u0131m indirmesini gerektirirse \u00e7al\u0131\u015fanlar sistemi kullanmak istemez ve bilgiyi herhangi bir koruma veya g\u00fcvenlik \u00f6nlemi olmadan payla\u015f\u0131r. Veriler genellikle b\u00fcy\u00fck dosyalar\u0131 g\u00f6ndermek i\u00e7in kullan\u0131lan kurum i\u00e7i sistemlerin kullan\u0131m\u0131 zor oldu\u011fu, bu y\u00fczden de \u00e7al\u0131\u015fanlar g\u00fcvenlik riskinin bilincinde olmaks\u0131z\u0131n dosyalar\u0131n\u0131 Dropbox veya di\u011fer basit ve <strong>g\u00fcvensiz<\/strong> y\u00f6ntemlerle payla\u015ft\u0131\u011f\u0131 i\u00e7in hacklenir.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Veri payla\u015f\u0131m\u0131n\u0131n her t\u00fcr\u00fcn\u00fc analiz etmek i\u00e7in yap\u0131lan t\u00fcm yat\u0131r\u0131mlar yerindedir. Gizli sa\u011fl\u0131k bilgileri yanl\u0131\u015f ki\u015filerin eline ge\u00e7ecek olursa bunun sonu\u00e7lar\u0131 \u00e7ok ciddi olabilir. Sa\u011fl\u0131k kay\u0131tlar\u0131n\u0131n ele ge\u00e7irilmesi kimlik h\u0131rs\u0131zl\u0131klar\u0131na, dolay\u0131s\u0131yla ma\u011fdurlar\u0131n veriyi \u00e7ald\u0131ran sa\u011fl\u0131k kurulu\u015funa kar\u015f\u0131 yasal yollara ba\u015fvurmas\u0131na yol a\u00e7abilir. Bu veri h\u0131rs\u0131zl\u0131\u011f\u0131 olay\u0131 birden \u00e7ok hastay\u0131 ma\u011fdur edecek olursa \u00e7ok ciddi yasal kovu\u015fturmalara ve bir o kadar ciddi g\u00fcven kayb\u0131na neden olur.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Kurulu\u015flar ki\u015fisel sa\u011fl\u0131k bilgileri konusunda \u00e7ok titiz davranmal\u0131 ve bir yandan doktorlar\u0131n te\u015fhis ve tedavi s\u00fcrecinde ihtiya\u00e7 duyduklar\u0131 verilere h\u0131zl\u0131 ve kolay bir \u015fekilde eri\u015febilmesini sa\u011flarken bir yandan da bu konuyla ilgili mevzuata tamamen uymal\u0131. Sa\u011fl\u0131k kurulu\u015flar\u0131 veri payla\u015f\u0131m\u0131n\u0131n yap\u0131labilece\u011fi t\u00fcm yollar\u0131 g\u00fcvenli bir hale getirerek ki\u015fisel sa\u011fl\u0131k bilgilerini korumal\u0131 ve hacker kurban\u0131 olmamaya \u00f6zen g\u00f6stermeli.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ki\u015fisel sa\u011fl\u0131k bilgileri konusu hackerlar aras\u0131nda giderek daha pop\u00fcler bir hal al\u0131yor. Bu bilgilerin de\u011feri de karaborsa da giderek art\u0131yor. Sa\u011fl\u0131k bilgileri&hellip;<\/p>\n","protected":false},"author":3,"featured_media":7457,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-7456","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-haberler"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/posts\/7456","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=7456"}],"version-history":[{"count":3,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/posts\/7456\/revisions"}],"predecessor-version":[{"id":7466,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/posts\/7456\/revisions\/7466"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/media\/7457"}],"wp:attachment":[{"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=7456"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=7456"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=7456"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}