{"id":801,"date":"2024-11-04T03:49:57","date_gmt":"2024-11-04T00:49:57","guid":{"rendered":"https:\/\/www.dchost.com\/blog\/?p=801"},"modified":"2024-11-04T03:50:52","modified_gmt":"2024-11-04T00:50:52","slug":"phishing-oltalama-nedir-nasil-korunabilirsiniz","status":"publish","type":"post","link":"https:\/\/www.dchost.com\/blog\/phishing-oltalama-nedir-nasil-korunabilirsiniz\/","title":{"rendered":"Phishing (Oltalama) Nedir? Nas\u0131l Korunabilirsiniz?"},"content":{"rendered":"<div class=\"dchost-blog-content-wrapper\"><p>Merhaba! \u0130nternet kullan\u0131c\u0131s\u0131 olarak &#8220;Phishing&#8221; veya T\u00fcrk\u00e7esi ile &#8220;Oltalama&#8221; terimini duymu\u015f olabilirsiniz. G\u00fcn\u00fcm\u00fczde siber sald\u0131rganlar, kullan\u0131c\u0131lar\u0131n bilgilerini ele ge\u00e7irmek i\u00e7in giderek daha karma\u015f\u0131k y\u00f6ntemler geli\u015ftirmektedir. Phishing, en yayg\u0131n siber sald\u0131r\u0131 y\u00f6ntemlerinden biri olarak \u00f6ne \u00e7\u0131k\u0131yor. Bu makalede, phishing&#8217;in ne oldu\u011funu, nas\u0131l \u00e7al\u0131\u015ft\u0131\u011f\u0131n\u0131, \u00f6rneklerle a\u00e7\u0131klayarak kendinizi nas\u0131l koruyabilece\u011finizi ad\u0131m ad\u0131m anlataca\u011f\u0131z. Haz\u0131rsan\u0131z, siber g\u00fcvenlik d\u00fcnyas\u0131nda bilin\u00e7li bir ad\u0131m atmaya ba\u015flayal\u0131m!<\/p>\n<div id=\"toc_container\" class=\"toc_transparent no_bullets\"><p class=\"toc_title\">\u0130&ccedil;indekiler<\/p><ul class=\"toc_list\"><li><a href=\"#Phishing_Oltalama_Nedir\"><span class=\"toc_number toc_depth_1\">1<\/span> Phishing (Oltalama) Nedir?<\/a><\/li><li><a href=\"#Phishing_Nasil_Calisir\"><span class=\"toc_number toc_depth_1\">2<\/span> Phishing Nas\u0131l \u00c7al\u0131\u015f\u0131r?<\/a><\/li><li><a href=\"#Phishing_Saldiri_Turleri\"><span class=\"toc_number toc_depth_1\">3<\/span> Phishing Sald\u0131r\u0131 T\u00fcrleri<\/a><\/li><li><a href=\"#Phishing_Ornekleri\"><span class=\"toc_number toc_depth_1\">4<\/span> Phishing \u00d6rnekleri<\/a><\/li><li><a href=\"#Phishing_Saldirilarindan_Nasil_Korunabilirsiniz\"><span class=\"toc_number toc_depth_1\">5<\/span> Phishing Sald\u0131r\u0131lar\u0131ndan Nas\u0131l Korunabilirsiniz?<\/a><ul><li><a href=\"#1_Supheli_E-postalara_Karsi_Dikkatli_Olun\"><span class=\"toc_number toc_depth_2\">5.1<\/span> 1. \u015e\u00fcpheli E-postalara Kar\u015f\u0131 Dikkatli Olun<\/a><\/li><li><a href=\"#2_Baglantilari_Dogrulamadan_Tiklamayin\"><span class=\"toc_number toc_depth_2\">5.2<\/span> 2. Ba\u011flant\u0131lar\u0131 Do\u011frulamadan T\u0131klamay\u0131n<\/a><\/li><li><a href=\"#3_Cok_Faktorlu_Kimlik_Dogrulama_MFA_Kullanin\"><span class=\"toc_number toc_depth_2\">5.3<\/span> 3. \u00c7ok Fakt\u00f6rl\u00fc Kimlik Do\u011frulama (MFA) Kullan\u0131n<\/a><\/li><li><a href=\"#4_Antivirus_Yazilimi_Kullanin_ve_Guncel_Tutun\"><span class=\"toc_number toc_depth_2\">5.4<\/span> 4. Antivir\u00fcs Yaz\u0131l\u0131m\u0131 Kullan\u0131n ve G\u00fcncel Tutun<\/a><\/li><\/ul><\/li><li><a href=\"#Sonuc_Phishing_Saldirilarindan_Korunmak_Icin_Ilk_Adimi_Atin\"><span class=\"toc_number toc_depth_1\">6<\/span> Sonu\u00e7: Phishing Sald\u0131r\u0131lar\u0131ndan Korunmak \u0130\u00e7in \u0130lk Ad\u0131m\u0131 At\u0131n<\/a><\/li><\/ul><\/div>\n<h2><span id=\"Phishing_Oltalama_Nedir\">Phishing (Oltalama) Nedir?<\/span><\/h2>\n<p>Phishing, kullan\u0131c\u0131lar\u0131 kand\u0131rarak ki\u015fisel veya finansal bilgilerini \u00e7almak amac\u0131yla yap\u0131lan bir siber sald\u0131r\u0131 t\u00fcr\u00fcd\u00fcr. Sald\u0131rganlar, g\u00fcvenilir bir kaynaktan geliyormu\u015f gibi g\u00f6r\u00fcnen e-postalar, mesajlar veya web siteleri kullanarak kullan\u0131c\u0131lar\u0131 kand\u0131rmaya \u00e7al\u0131\u015f\u0131r. \u00d6rne\u011fin, banka veya pop\u00fcler bir sosyal medya platformundan geldi\u011fini iddia eden sahte bir e-posta, sizi giri\u015f bilgilerinizi girmeye veya hassas verilerinizi payla\u015fmaya ikna etmeye \u00e7al\u0131\u015fabilir.<\/p>\n<h2><span id=\"Phishing_Nasil_Calisir\">Phishing Nas\u0131l \u00c7al\u0131\u015f\u0131r?<\/span><\/h2>\n<p>Phishing sald\u0131r\u0131lar\u0131 genellikle iki ana ad\u0131mdan olu\u015fur:<\/p>\n<ul>\n<li><strong>1. Sahte \u0130leti\u015fim:<\/strong> Sald\u0131rgan, g\u00fcvenilir bir kaynaktan geliyormu\u015f gibi g\u00f6r\u00fcnen bir e-posta veya mesaj g\u00f6nderir. Bu ileti\u015fimde, kullan\u0131c\u0131y\u0131 hemen harekete ge\u00e7irmeye \u00e7al\u0131\u015fan acil bir durumdan bahsedilir. \u00d6rne\u011fin, &#8220;Hesab\u0131n\u0131zda \u015f\u00fcpheli bir aktivite tespit ettik!&#8221; gibi.<\/li>\n<li><strong>2. Bilgi Toplama:<\/strong> Kullan\u0131c\u0131, ileti\u015fimde yer alan ba\u011flant\u0131ya t\u0131klayarak sahte bir web sitesine y\u00f6nlendirilir. Bu site, ger\u00e7ek bir banka veya platformun sayfas\u0131na benzetilmi\u015ftir ve kullan\u0131c\u0131 burada \u015fifre, kimlik bilgileri veya kredi kart\u0131 bilgilerini girer.<\/li>\n<\/ul>\n<p>Bu \u015fekilde, sald\u0131rganlar kullan\u0131c\u0131lar\u0131n bilgilerini ele ge\u00e7irir ve bu bilgileri k\u00f6t\u00fcye kullanabilirler.<\/p>\n<h2><span id=\"Phishing_Saldiri_Turleri\">Phishing Sald\u0131r\u0131 T\u00fcrleri<\/span><\/h2>\n<p>Phishing&#8217;in farkl\u0131 t\u00fcrleri bulunmaktad\u0131r ve her biri farkl\u0131 y\u00f6ntemlerle \u00e7al\u0131\u015f\u0131r:<\/p>\n<table>\n<thead>\n<tr>\n<th>Phishing T\u00fcr\u00fc<\/th>\n<th>A\u00e7\u0131klama<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>E-posta Phishing<\/td>\n<td>G\u00fcvenilir kaynaklardan geliyormu\u015f gibi g\u00f6r\u00fcnen sahte e-postalar g\u00f6nderilerek kullan\u0131c\u0131lar\u0131n bilgileri \u00e7al\u0131nmaya \u00e7al\u0131\u015f\u0131l\u0131r.<\/td>\n<\/tr>\n<tr>\n<td>Spear Phishing<\/td>\n<td>Belirli bir ki\u015fiyi veya kurumu hedef al\u0131r. Bu t\u00fcr sald\u0131r\u0131lar genellikle daha \u00f6zelle\u015fmi\u015f ve ki\u015fisel bilgilere dayan\u0131r.<\/td>\n<\/tr>\n<tr>\n<td>Vishing<\/td>\n<td>Telefon \u00fczerinden yap\u0131lan oltalama sald\u0131r\u0131lar\u0131d\u0131r. Sald\u0131rgan, telefon g\u00f6r\u00fc\u015fmesi s\u0131ras\u0131nda kullan\u0131c\u0131dan bilgilerini payla\u015fmas\u0131n\u0131 ister.<\/td>\n<\/tr>\n<tr>\n<td>Smishing<\/td>\n<td>SMS yoluyla yap\u0131lan oltalama sald\u0131r\u0131lar\u0131d\u0131r. Kullan\u0131c\u0131ya sahte bir ba\u011flant\u0131 i\u00e7eren mesaj g\u00f6nderilir.<\/td>\n<\/tr>\n<tr>\n<td>Clone Phishing<\/td>\n<td>Daha \u00f6nce g\u00f6nderilen ger\u00e7ek bir e-posta veya mesaj\u0131n birebir kopyas\u0131n\u0131 olu\u015fturur ve i\u00e7erisine zararl\u0131 ba\u011flant\u0131 ekler.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2><span id=\"Phishing_Ornekleri\">Phishing \u00d6rnekleri<\/span><\/h2>\n<p>Phishing sald\u0131r\u0131lar\u0131n\u0131n daha iyi anla\u015f\u0131lmas\u0131 i\u00e7in baz\u0131 ger\u00e7ek hayat \u00f6rneklerini inceleyelim:<\/p>\n<ol>\n<li><strong>Banka G\u00fcncelleme Talebi:<\/strong> Kullan\u0131c\u0131ya bankas\u0131ndan geliyormu\u015f gibi g\u00f6r\u00fcnen bir e-posta g\u00f6nderilir. E-postada, &#8220;Hesab\u0131n\u0131z g\u00fcncellenmeli, hemen giri\u015f yap\u0131n&#8221; gibi bir mesaj vard\u0131r. Kullan\u0131c\u0131 sahte bir bankac\u0131l\u0131k sayfas\u0131na y\u00f6nlendirilir ve giri\u015f bilgilerini burada girer.<\/li>\n<li><strong>Sosyal Medya G\u00fcvenlik Uyar\u0131s\u0131:<\/strong> Pop\u00fcler bir sosyal medya platformundan geldi\u011fi iddia edilen bir e-posta ile kullan\u0131c\u0131ya &#8220;Hesab\u0131n\u0131zda g\u00fcvenlik sorunu tespit edildi&#8221; denir. Kullan\u0131c\u0131, sahte bir sosyal medya sitesine giri\u015f yaparak bilgilerini payla\u015f\u0131r.<\/li>\n<\/ol>\n<h2><span id=\"Phishing_Saldirilarindan_Nasil_Korunabilirsiniz\">Phishing Sald\u0131r\u0131lar\u0131ndan Nas\u0131l Korunabilirsiniz?<\/span><\/h2>\n<p>Phishing sald\u0131r\u0131lar\u0131ndan korunmak i\u00e7in alabilece\u011finiz baz\u0131 temel \u00f6nlemler \u015funlard\u0131r:<\/p>\n<h3><span id=\"1_Supheli_E-postalara_Karsi_Dikkatli_Olun\">1. \u015e\u00fcpheli E-postalara Kar\u015f\u0131 Dikkatli Olun<\/span><\/h3>\n<p>Phishing sald\u0131r\u0131lar\u0131n\u0131n \u00e7o\u011fu e-posta yoluyla ger\u00e7ekle\u015fir. Tan\u0131mad\u0131\u011f\u0131n\u0131z veya g\u00fcvenilirli\u011fi do\u011frulanmam\u0131\u015f bir kaynaktan gelen e-postalara kar\u015f\u0131 dikkatli olun. E-postada ki\u015fisel bilgilerinizi veya \u015fifrelerinizi isteyen mesajlardan \u015f\u00fcphelenin.<\/p>\n<h3><span id=\"2_Baglantilari_Dogrulamadan_Tiklamayin\">2. Ba\u011flant\u0131lar\u0131 Do\u011frulamadan T\u0131klamay\u0131n<\/span><\/h3>\n<p>Bir e-posta veya mesajdaki ba\u011flant\u0131ya t\u0131klamadan \u00f6nce, farenizi ba\u011flant\u0131n\u0131n \u00fczerine getirerek ba\u011flant\u0131n\u0131n nereye y\u00f6nlendirdi\u011fini kontrol edin. G\u00fcvenilir bir URL adresi d\u0131\u015f\u0131nda bir ba\u011flant\u0131ya t\u0131klamay\u0131n. \u00d6rne\u011fin, bir bankan\u0131n web adresi &#8220;bankan\u0131z.com&#8221; ise, &#8220;bankaniz-guvenlik.com&#8221; gibi sahte bir siteye y\u00f6nlendiren ba\u011flant\u0131lara t\u0131klamaktan ka\u00e7\u0131n\u0131n.<\/p>\n<h3><span id=\"3_Cok_Faktorlu_Kimlik_Dogrulama_MFA_Kullanin\">3. \u00c7ok Fakt\u00f6rl\u00fc Kimlik Do\u011frulama (MFA) Kullan\u0131n<\/span><\/h3>\n<p>Hesaplar\u0131n\u0131zda \u00e7ok fakt\u00f6rl\u00fc kimlik do\u011frulama (MFA) etkinle\u015ftirerek, sadece \u015fifreyle korunman\u0131n \u00f6tesinde bir g\u00fcvenlik katman\u0131 olu\u015fturabilirsiniz. Bu, sald\u0131rganlar\u0131n \u015fifrenizi ele ge\u00e7irse bile hesab\u0131n\u0131za eri\u015fmesini zorla\u015ft\u0131r\u0131r.<\/p>\n<h3><span id=\"4_Antivirus_Yazilimi_Kullanin_ve_Guncel_Tutun\">4. Antivir\u00fcs Yaz\u0131l\u0131m\u0131 Kullan\u0131n ve G\u00fcncel Tutun<\/span><\/h3>\n<p>Phishing sald\u0131r\u0131lar\u0131ndan korunman\u0131n bir di\u011fer yolu, g\u00fcvenilir bir antivir\u00fcs yaz\u0131l\u0131m\u0131 kullanmakt\u0131r. Bu t\u00fcr yaz\u0131l\u0131mlar, \u015f\u00fcpheli e-postalar\u0131 veya zararl\u0131 ba\u011flant\u0131lar\u0131 tespit edebilir ve sizi uyarabilir. Ayr\u0131ca, t\u00fcm yaz\u0131l\u0131mlar\u0131n\u0131z\u0131 g\u00fcncel tutarak g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 kapatabilirsiniz.<\/p>\n<h2><span id=\"Sonuc_Phishing_Saldirilarindan_Korunmak_Icin_Ilk_Adimi_Atin\">Sonu\u00e7: Phishing Sald\u0131r\u0131lar\u0131ndan Korunmak \u0130\u00e7in \u0130lk Ad\u0131m\u0131 At\u0131n<\/span><\/h2>\n<p>Phishing sald\u0131r\u0131lar\u0131, her ge\u00e7en g\u00fcn daha karma\u015f\u0131k hale geliyor ancak do\u011fru \u00f6nlemlerle bu t\u00fcr sald\u0131r\u0131lardan korunmak m\u00fcmk\u00fcnd\u00fcr. \u015e\u00fcpheli e-postalara kar\u015f\u0131 dikkatli olun, ba\u011flant\u0131lar\u0131 do\u011frulamadan t\u0131klamay\u0131n ve \u00e7ok fakt\u00f6rl\u00fc kimlik do\u011frulama kullanarak hesaplar\u0131n\u0131z\u0131 daha g\u00fcvenli hale getirin. Bu basit ad\u0131mlar\u0131 atarak siber g\u00fcvenlik konusunda g\u00fc\u00e7l\u00fc bir savunma hatt\u0131 olu\u015fturabilirsiniz. Unutmay\u0131n, bilin\u00e7li bir kullan\u0131c\u0131 olarak \u00e7evrimi\u00e7i g\u00fcvenli\u011finizi koruyabilirsiniz!<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Merhaba! \u0130nternet kullan\u0131c\u0131s\u0131 olarak &#8220;Phishing&#8221; veya T\u00fcrk\u00e7esi ile &#8220;Oltalama&#8221; terimini duymu\u015f olabilirsiniz. G\u00fcn\u00fcm\u00fczde siber sald\u0131rganlar, kullan\u0131c\u0131lar\u0131n bilgilerini ele ge\u00e7irmek i\u00e7in giderek daha karma\u015f\u0131k y\u00f6ntemler geli\u015ftirmektedir. Phishing, en yayg\u0131n siber sald\u0131r\u0131 y\u00f6ntemlerinden biri olarak \u00f6ne \u00e7\u0131k\u0131yor. Bu makalede, phishing&#8217;in ne oldu\u011funu, nas\u0131l \u00e7al\u0131\u015ft\u0131\u011f\u0131n\u0131, \u00f6rneklerle a\u00e7\u0131klayarak kendinizi nas\u0131l koruyabilece\u011finizi ad\u0131m ad\u0131m anlataca\u011f\u0131z. Haz\u0131rsan\u0131z, siber g\u00fcvenlik d\u00fcnyas\u0131nda bilin\u00e7li [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":804,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[30],"tags":[291,292,289,290,283,189],"class_list":["post-801","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-nedir","tag-internet-guvenligi","tag-korunma-yontemleri","tag-oltalama","tag-oltalama-saldirisi","tag-phishing","tag-siber-guvenlik"],"_links":{"self":[{"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/posts\/801","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/comments?post=801"}],"version-history":[{"count":2,"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/posts\/801\/revisions"}],"predecessor-version":[{"id":803,"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/posts\/801\/revisions\/803"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/media\/804"}],"wp:attachment":[{"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/media?parent=801"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/categories?post=801"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dchost.com\/blog\/wp-json\/wp\/v2\/tags?post=801"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}