{"id":260,"date":"2026-03-29T01:07:57","date_gmt":"2026-03-29T00:07:57","guid":{"rendered":"https:\/\/www.boonsictbeheer.nl\/?page_id=260"},"modified":"2026-03-30T06:22:11","modified_gmt":"2026-03-30T04:22:11","slug":"belirsizlik","status":"publish","type":"page","link":"https:\/\/www.boonsictbeheer.nl\/tr\/obscurity\/","title":{"rendered":"Belirsizlik"},"content":{"rendered":"<p>Gizlilik Olmadan G\u00fcvenlik,<\/p>\n<h6>\nBu makaledeki i\u00e7erik, Security Without Obscurity, 2. Bask\u0131'da tart\u0131\u015f\u0131lan ana ilkelerden esinlenmi\u015ftir. T\u00fcm metin ba\u011f\u0131ms\u0131z olarak yaz\u0131lm\u0131\u015ft\u0131r ve kelimesi kelimesine herhangi bir materyal i\u00e7ermemektedir.<strong>.<\/strong><\/h6>\n<p><strong>Ana mesaj:<\/strong><\/p>\n<p>Belirsizlik Olmadan G\u00fcvenlik, 2. Bask\u0131, sistem detaylar\u0131n\u0131 gizlemenin daha g\u00fc\u00e7l\u00fc koruma yaratt\u0131\u011f\u0131na dair uzun s\u00fcredir devam eden inanca meydan okuyor. Yazar, ger\u00e7ek siber g\u00fcvenli\u011fin gizlilik veya belirsizlik \u00fczerine de\u011fil, \u015feffaf, do\u011frulanabilir ve iyi test edilmi\u015f g\u00fcvenlik ilkeleri \u00fczerine in\u015fa edildi\u011fini savunmaktad\u0131r. Sistemler, sald\u0131rganlar nas\u0131l \u00e7al\u0131\u015ft\u0131klar\u0131n\u0131 anlad\u0131klar\u0131nda bile g\u00fcvenli kalmal\u0131d\u0131r. Bu fikir modern g\u00fcvenlik m\u00fchendisli\u011finin temelini olu\u015fturur ve yerle\u015fik kriptografik ilkelerle uyumludur.<br \/>\nNeden \u201cGizlilik Yoluyla G\u00fcvenlik\u201d Modern Ortamlarda Ba\u015far\u0131s\u0131z Olur<br \/>\nKitap, gizli yap\u0131land\u0131rmalara, belgelenmemi\u015f davran\u0131\u015flara veya gizli sistem tasar\u0131mlar\u0131na g\u00fcvenmenin k\u0131r\u0131lgan bir g\u00fcvenlik pozisyonu yaratt\u0131\u011f\u0131n\u0131 a\u00e7\u0131kl\u0131yor. Tek bir ayr\u0131nt\u0131 s\u0131zd\u0131\u011f\u0131nda veya bir sald\u0131rgan sistemi tersine m\u00fchendislikle \u00e7\u00f6zd\u00fc\u011f\u00fcnde, t\u00fcm savunma \u00e7\u00f6ker. Zay\u0131fl\u0131klar\u0131 gizlemek yerine, kurulu\u015flar \u015funlara odaklanmal\u0131d\u0131r:<\/p>\n<p>\u2013 a\u00e7\u0131k ve hakemli g\u00fcvenlik mekanizmalar\u0131<br \/>\n- g\u00fc\u00e7l\u00fc kimlik do\u011frulama ve \u015fifreleme<br \/>\n\u00f6ng\u00f6r\u00fclebilir, denetlenebilir sistem davran\u0131\u015f\u0131<\/p>\n<p>Bu yakla\u015f\u0131m, g\u00fcvenli\u011fin \u015fansa veya gizlili\u011fe de\u011fil, kan\u0131tlanm\u0131\u015f dayan\u0131kl\u0131l\u0131\u011fa dayanmas\u0131n\u0131 sa\u011flar.<\/p>\n<p><strong>A\u00e7\u0131k standartlar ve \u015feffaf g\u00fcvenlik uygulamalar\u0131:<\/strong><\/p>\n<p>Kitaptaki ana temalardan biri a\u00e7\u0131k standartlar\u0131n \u00f6nemi. Kamuoyu taraf\u0131ndan test edilen ve geni\u015f \u00e7apta incelenen teknolojiler, \u00f6zel veya gizli \u00e7\u00f6z\u00fcmlerden daha g\u00fcvenli olma e\u011filimindedir. Yazar, \u015feffafl\u0131\u011f\u0131n \u015funlar\u0131 sa\u011flad\u0131\u011f\u0131n\u0131 vurguluyor:<\/p>\n<p>\u2013 daha h\u0131zl\u0131 zafiyet tespiti<br \/>\n- toplum g\u00fcd\u00fcml\u00fc iyile\u015ftirmeler<br \/>\n\u2013 uzun vadeli g\u00fcvenilirlik<br \/>\n\u2013 daha kolay uyumluluk ve denetim<\/p>\n<p>Bu, a\u00e7\u0131k g\u00fcvenlik \u00e7er\u00e7eveleri ve tekrarlanabilir altyap\u0131 y\u00f6n\u00fcndeki daha geni\u015f hareketle uyumludur.<\/p>\n<p><strong>Siber g\u00fcvenli\u011fin temeli olarak risk y\u00f6netimi<\/strong><\/p>\n<p>Kitap, g\u00fcvenli\u011fi bir kontrol listesi veya bir dizi ara\u00e7 olarak ele almak yerine, s\u00fcrekli bir risk y\u00f6netimi s\u00fcreci olarak \u00e7er\u00e7eveliyor. Etkili g\u00fcvenlik programlar\u0131:<\/p>\n<p>\u2013 ger\u00e7ek\u00e7i tehditleri belirleyin<\/p>\n<p>\u2013 etkiye ve olas\u0131l\u0131\u011fa g\u00f6re \u00f6nceliklendirin<\/p>\n<p>\u2013 en \u00e7ok \u00f6nem ta\u015f\u0131yan yerlere kaynaklar\u0131 tahsis edin<\/p>\n<p>- yeni bilgilere ve geli\u015fen risklere uyum sa\u011flama<\/p>\n<p>Bu zihniyet, kurulu\u015flar\u0131n d\u00fc\u015f\u00fck riskli alanlarda a\u015f\u0131r\u0131 m\u00fchendislikten ka\u00e7\u0131nmalar\u0131na ve ayn\u0131 zamanda \u00f6nemli noktalardaki savunmalar\u0131 g\u00fc\u00e7lendirmelerine yard\u0131mc\u0131 olur.<\/p>\n<p><strong>G\u00fcvenlikte insan unsuru<\/strong><\/p>\n<p>Kitap, bir\u00e7ok ihlalin teknik kusurlardan ziyade insan davran\u0131\u015flar\u0131ndan kaynakland\u0131\u011f\u0131n\u0131 vurguluyor. Zay\u0131f parolalar, belirsiz politikalar ve yetersiz e\u011fitim, en iyi teknik kontrolleri bile genellikle baltalar. Bunu ele almak i\u00e7in yazar \u015funlar\u0131 savunuyor:<\/p>\n<p>- kullan\u0131c\u0131 dostu g\u00fcvenlik uygulamalar\u0131<\/p>\n<p>\u2013 a\u00e7\u0131k ileti\u015fim<\/p>\n<p>\u2013 \u00e7al\u0131\u015fanlar i\u00e7in ger\u00e7ek\u00e7i beklentiler<\/p>\n<p>\u2013 devam eden e\u011fitim ve fark\u0131ndal\u0131k<\/p>\n<p>- G\u00fcvenlik ancak insanlar s\u00fcrt\u00fc\u015fme olmadan kurallar\u0131 takip edebildiklerinde ba\u015far\u0131l\u0131 olur.<\/p>\n<p><strong>Tasar\u0131m Yoluyla G\u00fcvenlik<\/strong><\/p>\n<p>dayan\u0131kl\u0131 sistemler in\u015fa etmek i\u00e7in ilkeler<br \/>\nKitap, kurulu\u015flar\u0131n s\u0131f\u0131rdan g\u00fcvenli sistemler olu\u015fturmas\u0131na yard\u0131mc\u0131 olan \u00e7e\u015fitli temel tasar\u0131m ilkelerini ana hatlar\u0131yla a\u00e7\u0131klamaktad\u0131r:<\/p>\n<p><strong>Derinlemesine savunma<\/strong><br \/>\n\u2013 \u00c7ok katmanl\u0131 koruma, tek bir hatan\u0131n t\u00fcm sistemi tehlikeye atmamas\u0131n\u0131 sa\u011flar.<\/p>\n<p><strong>En az ayr\u0131cal\u0131k<\/strong><br \/>\n\u2013 Kullan\u0131c\u0131lar ve hizmetler, yaln\u0131zca ihtiya\u00e7 duyduklar\u0131 eri\u015fime sahip olur, bu da hatalar\u0131n veya sald\u0131r\u0131lar\u0131n etki alan\u0131n\u0131 azalt\u0131r.<\/p>\n<p><strong>G\u00fcvenli varsay\u0131lanlar<\/strong><br \/>\n\u2013 Sistemler kutudan \u00e7\u0131kt\u0131\u011f\u0131 haliyle g\u00fcvenli olmal\u0131 ve yanl\u0131\u015f yap\u0131land\u0131rma riskini en aza indirmelidir.<\/p>\n<p><strong>Denetlenebilirlik<\/strong><br \/>\n- G\u00fcnl\u00fck kayd\u0131, izleme ve izlenebilirlik, olaylar\u0131 tespit etmek ve zaman i\u00e7inde savunmay\u0131 iyile\u015ftirmek i\u00e7in gereklidir.<\/p>\n<p>Bu ilkeler, sa\u011flam, \u00f6ng\u00f6r\u00fclebilir ve bak\u0131m\u0131 daha kolay bir g\u00fcvenlik duru\u015fu yarat\u0131r.<\/p>\n<p><strong>Ger\u00e7ek d\u00fcnya \u00f6rnekleri ve \u00e7\u0131kar\u0131lan dersler<\/strong><\/p>\n<p>Kitap boyunca yazar, kurulu\u015flar\u0131n s\u0131k s\u0131k ayn\u0131 hatalar\u0131\u2014yanl\u0131\u015f yap\u0131land\u0131rmalar, zay\u0131f eri\u015fim kontrolleri ve gizli ayarlara g\u00fcvenme\u2014nas\u0131l tekrarlad\u0131klar\u0131n\u0131 g\u00f6stermek i\u00e7in ger\u00e7ek olaylar\u0131 kullan\u0131yor. Bu \u00f6rnekler ana mesaj\u0131 peki\u015ftiriyor: \u015feffaf, iyi tasarlanm\u0131\u015f g\u00fcvenlik, gizlili\u011fe dayal\u0131 yakla\u015f\u0131mlardan tutarl\u0131 bir \u015fekilde daha iyi performans g\u00f6sterir.<\/p>\n<p>\u2013 gizlilikle g\u00fcvenlik<br \/>\n\u2013 siber g\u00fcvenlik en iyi uygulamalar<br \/>\n\u2013 tasar\u0131mda g\u00fcvenlik ilkeleri<br \/>\n\u2013 katmanl\u0131 savunma<br \/>\n\u2013 risk temelli g\u00fcvenlik<br \/>\n\u2013 a\u00e7\u0131k g\u00fcvenlik standartlar\u0131<br \/>\n\u2013 siber g\u00fcvenlikte insan fakt\u00f6rleri<\/p>","protected":false},"excerpt":{"rendered":"<p>Security Without Obscurity, The content in this article is inspired by the main principles discussed in Security Without Obscurity, 2nd Edition. All text is independently written and does not include any verbatim material. Core message: Security Without Obscurity, 2nd Edition challenges the long\u2011standing belief that hiding system details creates stronger protection. The author argues that [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-260","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.boonsictbeheer.nl\/tr\/wp-json\/wp\/v2\/pages\/260","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.boonsictbeheer.nl\/tr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.boonsictbeheer.nl\/tr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.boonsictbeheer.nl\/tr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.boonsictbeheer.nl\/tr\/wp-json\/wp\/v2\/comments?post=260"}],"version-history":[{"count":6,"href":"https:\/\/www.boonsictbeheer.nl\/tr\/wp-json\/wp\/v2\/pages\/260\/revisions"}],"predecessor-version":[{"id":359,"href":"https:\/\/www.boonsictbeheer.nl\/tr\/wp-json\/wp\/v2\/pages\/260\/revisions\/359"}],"wp:attachment":[{"href":"https:\/\/www.boonsictbeheer.nl\/tr\/wp-json\/wp\/v2\/media?parent=260"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}