{"id":7460,"date":"2016-04-12T09:55:30","date_gmt":"2016-04-12T07:55:30","guid":{"rendered":"https:\/\/ihs.com.tr\/blog\/?p=7460"},"modified":"2016-04-12T09:55:30","modified_gmt":"2016-04-12T07:55:30","slug":"uygulama-guvenligi-konusunda-dikkat-etmeniz-gereken-4-sey","status":"publish","type":"post","link":"https:\/\/www.ihs.com.tr\/blog\/uygulama-guvenligi-konusunda-dikkat-etmeniz-gereken-4-sey\/","title":{"rendered":"Uygulama G\u00fcvenli\u011fi Konusunda Dikkat Etmeniz Gereken 4 \u015eey"},"content":{"rendered":"<p><span style=\"font-size: 14pt;\">Uygulama g\u00fcvenli\u011fi konusu genellikle ihmal edilir. Bu muhtemelen biraz bilgi eksikli\u011finden, biraz da geli\u015ftiricilerin uygulamalar\u0131n \u00f6zelliklerine ve esteti\u011fine daha fazla a\u011f\u0131rl\u0131k vermesindendir. Fakat i\u015fin i\u00e7indeki riskler d\u00fc\u015f\u00fcn\u00fcl\u00fcrse bu konunun kesinlikle ihmal edilmemesi gerekti\u011fi de a\u00e7\u0131kt\u0131r. S\u0131radan bir uygulama g\u00fcvenli\u011fi\u00a0a\u00e7\u0131\u011f\u0131 de\u011ferli bilgileri \u00e7al\u0131nmaya a\u00e7\u0131k hale getirebilir ve uygulaman\u0131za y\u00f6nelik m\u00fc\u015fteri g\u00fcvenini bir anda yok edebilir.<br \/>\n<\/span><\/p>\n<p><a href=\"https:\/\/www.ihs.com.tr\/blog\/wp-content\/uploads\/2016\/04\/uygulama-g\u00fcvenli\u011fi-a\u00e7\u0131klar\u0131.jpg\" data-rel=\"penci-gallery-image-content\" rel=\"attachment wp-att-7462\"><img decoding=\"async\" class=\"alignnone size-medium wp-image-7462\" src=\"https:\/\/www.ihs.com.tr\/blog\/wp-content\/uploads\/2016\/04\/uygulama-g\u00fcvenli\u011fi-a\u00e7\u0131klar\u0131-300x115.jpg\" alt=\"uygulama g\u00fcvenli\u011fi a\u00e7\u0131klar\u0131\" width=\"300\" height=\"115\" srcset=\"https:\/\/www.ihs.com.tr\/blog\/wp-content\/uploads\/2016\/04\/uygulama-g\u00fcvenli\u011fi-a\u00e7\u0131klar\u0131-300x115.jpg 300w, https:\/\/www.ihs.com.tr\/blog\/wp-content\/uploads\/2016\/04\/uygulama-g\u00fcvenli\u011fi-a\u00e7\u0131klar\u0131.jpg 363w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<ol>\n<li><span style=\"font-size: 14pt;\"><strong>Veriyle komutlar\u0131 birbirinden ay\u0131r\u0131n<\/strong>. Veya, ba\u015fka bir deyi\u015fle, verilerinizi sisteminizi \u00e7\u00f6kertecek komutlardan koruyun. Hackerlar genellikle k\u00fcme veya y\u0131\u011f\u0131n ta\u015fmalar\u0131n\u0131 ya da SQL, LADP, Xpath ve Command a\u00e7\u0131klar\u0131n\u0131 kullan\u0131r. Bu y\u00f6ntemlerle girilen veri uygulaman\u0131z\u0131 ele ge\u00e7irebilir. Bu y\u00f6ntemler siber sald\u0131r\u0131lar\u0131n b\u00fcy\u00fck k\u0131sm\u0131n\u0131 olu\u015fturmaktad\u0131r, bu y\u00fczden uygulamalar\u0131n\u0131zda bu y\u00f6ntemlere kar\u015f\u0131 koruma sa\u011flamak b\u00fcy\u00fck \u00f6nem te\u015fkil etmektedir.<\/span><\/li>\n<li><span style=\"font-size: 14pt;\"><strong>\u0130yi bir uygulama mant\u0131\u011f\u0131 kurun<\/strong>. \u0130yi bir uygulama mant\u0131\u011f\u0131yla uygulaman\u0131z\u0131n ge\u00e7ersiz verileri sorgulamadan kabul etmesini, kullan\u0131c\u0131lar\u0131n belirli i\u015flemler i\u00e7in gerekli a\u015famalar\u0131 atlamas\u0131n\u0131 veya bir \u00f6nceki a\u015fama onaylanmadan sonraki a\u015famalara ge\u00e7ilmesini \u00f6nleyebilirsiniz. Girdilerin mutlaka onaylanmas\u0131n\u0131 sa\u011flayarak veya sunucular aras\u0131 API entegrasyonunu devreye sokarak uygulaman\u0131z\u0131 bir\u00e7ok sald\u0131r\u0131dan koruyabilirsiniz.<\/span><\/li>\n<li><span style=\"font-size: 14pt;\"><strong>Uygulaman\u0131z\u0131n \u00e7evresini tan\u0131y\u0131n<\/strong>. Geli\u015ftiricilerin s\u0131k s\u0131k yapt\u0131\u011f\u0131 kavramsal hatalardan biri de uygulamalar\u0131n\u0131n kapal\u0131 bir sistem i\u00e7erisinde var oldu\u011funu d\u00fc\u015f\u00fcnmektir. Halbuki uygulamalar\u0131n\u0131z i\u015fletim sistemleri, donan\u0131m bile\u015fenleri, a\u011f ba\u011flanabilirli\u011fi, web taray\u0131c\u0131lar\u0131, \u00fc\u00e7\u00fcnc\u00fc taraf k\u00fct\u00fcphaneler gibi bir\u00e7ok d\u0131\u015f etmene ba\u011fl\u0131d\u0131r. Uygulaman\u0131zla \u00e7evresi aras\u0131ndaki g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 kapat\u0131n. Buna yaz\u0131l\u0131m\u0131n\u0131z\u0131 d\u00fczenli bir \u015fekilde g\u00fcncellemek de dahildir.<\/span><\/li>\n<li><span style=\"font-size: 14pt;\"><strong>Kriptolama i\u015fini uzmanlara b\u0131rak\u0131n<\/strong>. Kriptoloji zor bir i\u015ftir ve e\u011fer bu konuda uzman bir ki\u015fi de\u011filseniz bu i\u015fi tek ba\u015f\u0131n\u0131za yapmaya \u00e7al\u0131\u015fmay\u0131n. K\u00f6t\u00fc kriptoloji, uygulamalar\u0131 ba\u015fta uzaktan zamanlama sald\u0131r\u0131lar\u0131 olmak \u00fczere bir\u00e7ok siber sald\u0131r\u0131ya kar\u015f\u0131 k\u0131r\u0131lgan bir hale getirir. E\u011fer kendi kriptolar\u0131n\u0131z\u0131 yazmay\u0131 tercih ediyorsan\u0131z bu i\u015fin riskini kendi \u00fczerinize ald\u0131\u011f\u0131n\u0131z\u0131n bilincinde olman\u0131z gerekir. Yaln\u0131z i\u015fin en k\u00f6t\u00fc k\u0131sm\u0131 da kodunuzun zay\u0131f oldu\u011funu ancak i\u015f i\u015ften ge\u00e7tikten sonra anlayabilecek olman\u0131zd\u0131r.<\/span><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Uygulama g\u00fcvenli\u011fi konusu genellikle ihmal edilir. Bu muhtemelen biraz bilgi eksikli\u011finden, biraz da geli\u015ftiricilerin uygulamalar\u0131n \u00f6zelliklerine ve esteti\u011fine daha fazla a\u011f\u0131rl\u0131k vermesindendir.&hellip;<\/p>\n","protected":false},"author":3,"featured_media":7463,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-7460","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-haberler"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/posts\/7460","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=7460"}],"version-history":[{"count":4,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/posts\/7460\/revisions"}],"predecessor-version":[{"id":7468,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/posts\/7460\/revisions\/7468"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/media\/7463"}],"wp:attachment":[{"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=7460"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=7460"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=7460"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}