{"id":149,"date":"2025-11-21T08:32:09","date_gmt":"2025-11-21T08:32:09","guid":{"rendered":"https:\/\/www.aliburaksan.com\/blog\/?p=149"},"modified":"2025-11-22T00:54:56","modified_gmt":"2025-11-22T00:54:56","slug":"siber-guvenlik-nedir-onemi","status":"publish","type":"post","link":"https:\/\/www.aliburaksan.com\/blog\/siber-guvenlik-nedir-onemi\/","title":{"rendered":"Siber G\u00fcvenlik Nedir?"},"content":{"rendered":"<p>Merhaba!<\/p>\n<h2>Siber G\u00fcvenlik Nedir ve Neden Hayati \u00d6nem Ta\u015f\u0131r? (IT Uzman\u0131 G\u00f6z\u00fcyle Pratik Rehber)<\/h2>\n<p>Son zamanlarda e-posta kutunuza gelen o \u015f\u00fcpheli &#8220;\u00f6d\u00fcl kazand\u0131n\u0131z&#8221; mesajlar\u0131, bilgisayar\u0131n\u0131z\u0131n aniden yava\u015flamas\u0131 ya da hi\u00e7 beklemedi\u011finiz bir anda banka hesab\u0131n\u0131zdan yap\u0131lan tuhaf i\u015flemler&#8230; Eminim bu ve benzeri durumlar bir\u00e7o\u011fumuzun ya do\u011frudan ba\u015f\u0131na gelmi\u015f ya da etraf\u0131m\u0131zda birilerine denk gelmi\u015ftir. \u0130\u015fte tam da bu noktada, dijital d\u00fcnyam\u0131z\u0131n g\u00f6r\u00fcnmez kalkan\u0131 devreye giriyor: Siber G\u00fcvenlik.<\/p>\n<p>Bir IT uzman\u0131 olarak, &#8220;Siber G\u00fcvenlik nedir?&#8221; ve &#8220;Neden bu kadar \u00f6nemli?&#8221; sorular\u0131na teknik detaylarla ama olabildi\u011fince samimi bir dille \u0131\u015f\u0131k tutmak istiyorum. Gelin, siber d\u00fcnyan\u0131n bu en kritik konusunu beraber ke\u015ffedelim. \u00c7\u00fcnk\u00fc bu sadece b\u00fcy\u00fck \u015firketlerin de\u011fil, hepimizin meselesi!<\/p>\n<h2>1. Giri\u015f: Dijital D\u00fcnyan\u0131n Karanl\u0131k Y\u00fcz\u00fc ve Bizim Kalkan\u0131m\u0131z<\/h2>\n<p>Hepimiz dijital d\u00fcnyada ya\u015f\u0131yoruz; bankac\u0131l\u0131k i\u015flemlerimizden sosyal medya etkile\u015fimlerimize, i\u015f yaz\u0131\u015fmalar\u0131m\u0131zdan ki\u015fisel foto\u011fraflar\u0131m\u0131za kadar her \u015feyimiz art\u0131k &#8220;\u00e7evrimi\u00e7i&#8221;. Bu durum hayat\u0131m\u0131z\u0131 inan\u0131lmaz kolayla\u015ft\u0131r\u0131yor, do\u011fru. Ancak madalyonun bir de di\u011fer y\u00fcz\u00fc var: artan dijitalle\u015fmeyle birlikte siber sald\u0131r\u0131lar\u0131n say\u0131s\u0131 ve karma\u015f\u0131kl\u0131\u011f\u0131 da h\u0131zla y\u00fckseliyor. Bir\u00e7ok \u015firket veya birey, &#8220;bana bir \u015fey olmaz&#8221; yan\u0131lg\u0131s\u0131yla hareket ediyor, ta ki i\u015f i\u015ften ge\u00e7ene kadar.<\/p>\n<p>Siber g\u00fcvenlik, basit\u00e7e tan\u0131mlamak gerekirse, internete ba\u011fl\u0131 sistemleri, a\u011flar\u0131 ve programlar\u0131 dijital sald\u0131r\u0131lardan, h\u0131rs\u0131zl\u0131ktan veya hasardan koruma uygulamas\u0131d\u0131r. Bu sald\u0131r\u0131lar genellikle verilere eri\u015fme, de\u011fi\u015ftirme veya yok etme; kullan\u0131c\u0131lar\u0131 gasp etme; veya normal i\u015f s\u00fcre\u00e7lerini kesintiye u\u011fratma amac\u0131 g\u00fcder. Benim k\u0131sa tecr\u00fcbelerimde bile g\u00f6rd\u00fc\u011f\u00fcm o kadar \u00e7ok \u00f6rnek var ki, art\u0131k bu konuya sadece bir &#8220;teknik detay&#8221; olarak bakmak imkans\u0131z. Kimlik h\u0131rs\u0131zl\u0131\u011f\u0131, finansal kay\u0131plar, itibar zedelenmesi, hatta ulusal g\u00fcvenlik tehditleri&#8230; Siber g\u00fcvenlik, bu senaryolar\u0131n \u00f6n\u00fcne ge\u00e7mek i\u00e7in var. Dijital \u00e7a\u011fda hayatta kalmak ve ba\u015far\u0131l\u0131 olmak i\u00e7in siber g\u00fcvenli\u011fi anlamak ve uygulamak art\u0131k bir tercih de\u011fil, bir zorunluluk haline geldi.<\/p>\n<h2>2. Teknik Detaylar: Siber G\u00fcvenli\u011fin Temel Ta\u015flar\u0131<\/h2>\n<p>Siber g\u00fcvenli\u011fi anlamak i\u00e7in baz\u0131 temel kavramlar\u0131 bilmek \u015fart. En \u00e7ok duyaca\u011f\u0131n\u0131z terimlerden biri &#8220;CIA \u00dc\u00e7l\u00fcs\u00fc&#8221;d\u00fcr: Gizlilik (Confidentiality), B\u00fct\u00fcnl\u00fck (Integrity) ve Eri\u015filebilirlik (Availability). Bu \u00fc\u00e7 prensip, bilgi g\u00fcvenli\u011finin temelini olu\u015fturur.<\/p>\n<h3>2.1. CIA \u00dc\u00e7l\u00fcs\u00fc (Gizlilik, B\u00fct\u00fcnl\u00fck, Eri\u015filebilirlik)<\/h3>\n<p>* **Gizlilik (Confidentiality):** Yetkisiz ki\u015filerin hassas bilgilere eri\u015fimini engellemektir. Yani veriye sadece yetkili ki\u015filerin ula\u015fabilmesini sa\u011flamak. \u00d6rne\u011fin, e-posta \u015fifreniz, banka bilgileriniz veya \u015firketinizin gizli projeleri sadece sizin ve yetkilendirilmi\u015f ki\u015filerin eri\u015fimine a\u00e7\u0131k olmal\u0131d\u0131r. \u015eifreleme (encryption), g\u00fc\u00e7l\u00fc parolalar ve eri\u015fim kontrolleri bu prensibin temel uygulamalar\u0131d\u0131r.<\/p>\n<p>* **B\u00fct\u00fcnl\u00fck (Integrity):** Verinin do\u011fru ve tam oldu\u011fundan, yetkisiz veya istenmeyen \u015fekillerde de\u011fi\u015ftirilmedi\u011finden emin olmakt\u0131r. Bir dosyan\u0131n veya bir veritaban\u0131 kayd\u0131n\u0131n, olu\u015fturuldu\u011fu zamanki haliyle kalmas\u0131, \u00fczerinde oynanmamas\u0131 demektir. Veri b\u00fct\u00fcnl\u00fc\u011f\u00fcn\u00fc sa\u011flamak i\u00e7in hash de\u011ferleri, dijital imzalar ve s\u00fcr\u00fcm kontrol sistemleri kullan\u0131l\u0131r. Benim tecr\u00fcbelerimde, bazen fark\u0131nda olmadan yap\u0131lan yanl\u0131\u015f bir de\u011fi\u015fikli\u011fin ne kadar b\u00fcy\u00fck problemlere yol a\u00e7t\u0131\u011f\u0131n\u0131 g\u00f6rd\u00fcm; b\u00fct\u00fcnl\u00fck tam da bunu engeller.<\/p>\n<p>* **Eri\u015filebilirlik (Availability):** Yetkili kullan\u0131c\u0131lar\u0131n ihtiya\u00e7 duyduklar\u0131 zaman verilere ve sistemlere eri\u015febilmelerini sa\u011flamakt\u0131r. Bir web sitesine veya bir uygulamaya ula\u015famad\u0131\u011f\u0131n\u0131zda, asl\u0131nda eri\u015filebilirlik ilkesinin ihlal edildi\u011fini g\u00f6r\u00fcyorsunuz demektir. DDoS sald\u0131r\u0131lar\u0131 (Distributed Denial of Service) bu ilkeyi hedef al\u0131r. Yedekleme sistemleri, y\u00fcksek eri\u015filebilirlik mimarileri ve kesintisiz g\u00fc\u00e7 kaynaklar\u0131 bu prensibin korunmas\u0131na yard\u0131mc\u0131 olur.<\/p>\n<h3>2.2. Yayg\u0131n Siber Sald\u0131r\u0131 Vekt\u00f6rleri<\/h3>\n<p>Siber g\u00fcvenlik uzmanlar\u0131, bu CIA \u00fc\u00e7l\u00fcs\u00fcn\u00fc korumak i\u00e7in sald\u0131rganlar\u0131n hangi yollar\u0131 kulland\u0131\u011f\u0131n\u0131 iyi bilir. \u0130\u015fte en yayg\u0131n olanlardan birka\u00e7\u0131:<\/p>\n<p>* **Kimlik Av\u0131 (Phishing) ve Sosyal M\u00fchendislik:** Belki de en eski ama hala en etkili y\u00f6ntemlerden biri. Size g\u00fcvenilir bir kaynaktan (banka, e-ticaret sitesi, i\u015f arkada\u015f\u0131 vb.) geliyormu\u015f gibi g\u00f6r\u00fcnen e-postalar, SMS&#8217;ler veya mesajlarla ki\u015fisel bilgilerinizi \u00e7almaya \u00e7al\u0131\u015f\u0131rlar. Aceleci kararlar verdirmek veya korkutmak \u00fczerine kurulu bu taktiklere kar\u015f\u0131 her zaman \u015f\u00fcpheci olmak gerekir.<\/p>\n<p>* **K\u00f6t\u00fc Ama\u00e7l\u0131 Yaz\u0131l\u0131mlar (Malware):** Vir\u00fcsler, Truva atlar\u0131 (Trojan), fidye yaz\u0131l\u0131mlar\u0131 (Ransomware), casus yaz\u0131l\u0131mlar (Spyware)&#8230; Bu yaz\u0131l\u0131mlar, sistemlerinize s\u0131zarak verilerinizi \u00e7alabilir, bozabilir veya kilitleyebilir. \u00d6zellikle ransomware, son zamanlarda hem bireyler hem de \u015firketler i\u00e7in b\u00fcy\u00fck bir ba\u015f belas\u0131 haline geldi.<\/p>\n<p>* **Hizmet Reddi (DDoS) Sald\u0131r\u0131lar\u0131:** Bir sistemi veya a\u011f\u0131 a\u015f\u0131r\u0131 trafikle bo\u011farak normal kullan\u0131c\u0131lar\u0131n hizmetlere eri\u015fimini engellemeyi ama\u00e7lar. \u00d6zellikle e-ticaret siteleri veya kritik altyap\u0131lar i\u00e7in y\u0131k\u0131c\u0131 sonu\u00e7lar\u0131 olabilir.<\/p>\n<p>* **S\u0131f\u0131r G\u00fcn (Zero-Day) A\u00e7\u0131klar\u0131:** Yaz\u0131l\u0131m \u00fcreticileri taraf\u0131ndan hen\u00fcz ke\u015ffedilmemi\u015f veya yamas\u0131 yay\u0131nlanmam\u0131\u015f g\u00fcvenlik zafiyetleridir. Sald\u0131rganlar bu a\u00e7\u0131klar\u0131 kullanarak sisteme s\u0131zabilirler. Bu t\u00fcr sald\u0131r\u0131lar en tehlikelilerinden biridir, \u00e7\u00fcnk\u00fc savunma mekanizmalar\u0131 hen\u00fcz bu sald\u0131r\u0131 tipini tan\u0131maz.<\/p>\n<h3>2.3. Temel Savunma Mekanizmalar\u0131<\/h3>\n<p>Bu sald\u0131r\u0131lara kar\u015f\u0131 bizi koruyan \u00e7e\u015fitli katmanlar ve ara\u00e7lar mevcuttur:<\/p>\n<p>* **G\u00fcvenlik Duvarlar\u0131 (Firewall):** A\u011f trafi\u011fini izler ve \u00f6nceden belirlenmi\u015f g\u00fcvenlik kurallar\u0131na g\u00f6re izin verir veya engeller.<br \/>\n* **Antivir\u00fcs\/EDR (Endpoint Detection and Response) Yaz\u0131l\u0131mlar\u0131:** K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131 tespit eder, karantinaya al\u0131r ve kald\u0131r\u0131r. EDR \u00e7\u00f6z\u00fcmleri, geleneksel antivir\u00fcs yaz\u0131l\u0131mlar\u0131na g\u00f6re daha proaktif ve kapsaml\u0131 koruma sa\u011flar.<br \/>\n* **\u015eifreleme (Encryption):** Veriyi okunamaz hale getirerek yetkisiz eri\u015fimi engeller. Veri \u015fifreleme, hem aktar\u0131m halindeki (in-transit) hem de depolanm\u0131\u015f (at-rest) veriler i\u00e7in hayati \u00f6neme sahiptir.<br \/>\n* **Yama Y\u00f6netimi (Patch Management):** \u0130\u015fletim sistemleri ve uygulamalardaki g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 kapatmak i\u00e7in d\u00fczenli g\u00fcncellemelerin yap\u0131lmas\u0131d\u0131r. Basit ama \u00e7ok etkili bir savunma hatt\u0131.<br \/>\n* **\u00c7ok Fakt\u00f6rl\u00fc Kimlik Do\u011frulama (MFA\/2FA):** Kullan\u0131c\u0131lar\u0131n kimliklerini do\u011frulamak i\u00e7in birden fazla y\u00f6ntem (parola, parmak izi, SMS kodu vb.) kullanmas\u0131. Parolan\u0131z \u00e7al\u0131nsa bile, ikinci fakt\u00f6r olmadan eri\u015fim engellenir.<\/p>\n<h2>3. Ad\u0131m Ad\u0131m Uygulama ve Pratik \u00d6neriler<\/h2>\n<p>Siber g\u00fcvenli\u011fi sadece b\u00fcy\u00fck \u015firketlerin uzmanl\u0131k alan\u0131 olarak g\u00f6rmek b\u00fcy\u00fck bir yan\u0131lg\u0131. Kendi dijital g\u00fcvenli\u011finiz i\u00e7in yapabilece\u011finiz \u00e7ok basit ama etkili ad\u0131mlar var. \u0130\u015fte size benim deneyimlerimden s\u00fcz\u00fclm\u00fc\u015f, hem ki\u015fisel hem de kurumsal seviyede uygulayabilece\u011finiz pratik \u00f6neriler:<\/p>\n<h3>3.1. Ki\u015fisel Seviyede Yap\u0131labilecekler<\/h3>\n<p>* **G\u00fc\u00e7l\u00fc ve Benzersiz \u015eifreler Kullan\u0131n, Parola Y\u00f6neticisi Edinin:** &#8220;123456&#8221; veya &#8220;\u015fifre&#8221; gibi parolalar ge\u00e7mi\u015fte kald\u0131. B\u00fcy\u00fck-k\u00fc\u00e7\u00fck harf, rakam ve \u00f6zel karakter i\u00e7eren, en az 12-14 karakterlik \u015fifreler kullan\u0131n. Her hesap i\u00e7in farkl\u0131 bir \u015fifre belirlemek zor oldu\u011fu i\u00e7in, Bitwarden, LastPass gibi **parola y\u00f6neticileri (password manager)** kullanmak hayat kurtar\u0131r. Bir kere ana parolay\u0131 ezberleyin, gerisini o halletsin.<\/p>\n<p>* **\u0130ki Fakt\u00f6rl\u00fc Kimlik Do\u011frulamay\u0131 (2FA\/MFA) Aktif Edin:** Bankac\u0131l\u0131k, e-posta, sosyal medya hesaplar\u0131n\u0131zda mutlaka bu \u00f6zelli\u011fi a\u00e7\u0131n. \u015eifreniz \u00e7al\u0131nsa bile, telefonunuza gelen SMS kodu, kimlik do\u011frulay\u0131c\u0131 uygulama (Google Authenticator, Authy) veya biyometrik do\u011frulama olmadan kimse hesab\u0131n\u0131za eri\u015femez. Bu, sizin i\u00e7in en b\u00fcy\u00fck kalkanlardan biri olacakt\u0131r.<\/p>\n<p>* **Yaz\u0131l\u0131mlar\u0131n\u0131z\u0131 ve \u0130\u015fletim Sisteminizi G\u00fcncel Tutun:** Windows Update, macOS g\u00fcncellemeleri, taray\u0131c\u0131n\u0131z\u0131n (Chrome, Firefox vb.) ve kulland\u0131\u011f\u0131n\u0131z uygulamalar\u0131n (Office, Zoom vb.) g\u00fcncel oldu\u011fundan emin olun. \u00dcreticiler, bulunan g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 yamalarla kapat\u0131rlar. G\u00fcncellemeleri atlamak, sald\u0131rganlara &#8220;buyurun gelin!&#8221; demektir.<\/p>\n<p>* **D\u00fczenli Yedekleme Yap\u0131n:** En basit ama en kritik ad\u0131mlardan biri. Verilerinizin kopyalar\u0131n\u0131 harici disklere, bulut depolama hizmetlerine (Google Drive, OneDrive) d\u00fczenli olarak kaydedin. Bir fidye yaz\u0131l\u0131m\u0131 sald\u0131r\u0131s\u0131nda veya disk bozulmas\u0131nda verilerinizi kaybetmemenin tek yolu budur.<\/p>\n<p>* **Kimlik Av\u0131na Kar\u015f\u0131 Uyan\u0131k Olun:** E-postalardaki veya mesajlardaki linklere t\u0131klamadan \u00f6nce g\u00f6ndericiyi ve linkin ger\u00e7ek adresini kontrol edin (fareyi linkin \u00fczerine getirerek g\u00f6rebilirsiniz). \u015e\u00fcphe duydu\u011funuz e-postalar\u0131 do\u011frudan silin. Benim g\u00f6rd\u00fc\u011f\u00fcm tecr\u00fcbelerde, sadece bir anl\u0131k dikkatsizlik insanlar\u0131n felaketi olabiliyor.<\/p>\n<h3>3.2. Kurumsal Seviyede Ba\u015flang\u0131\u00e7 Noktalar\u0131 (Tecr\u00fcbelerimden \u00d6neriler)<\/h3>\n<p>K\u00fc\u00e7\u00fck veya orta \u00f6l\u00e7ekli \u015firketler i\u00e7in siber g\u00fcvenlik b\u00fcy\u00fck bir b\u00fct\u00e7e kalemi gibi g\u00f6r\u00fcnebilir, ancak basit ad\u0131mlarla \u00f6nemli yol katedilebilir:<\/p>\n<p>* **\u00c7al\u0131\u015fan E\u011fitimi:** En g\u00fc\u00e7l\u00fc savunma hatt\u0131 insan fakt\u00f6r\u00fcd\u00fcr. D\u00fczenli siber g\u00fcvenlik fark\u0131ndal\u0131k e\u011fitimleri d\u00fczenleyin. Kimlik av\u0131 sim\u00fclasyonlar\u0131 yaparak \u00e7al\u0131\u015fanlar\u0131n pratik yapmas\u0131n\u0131 sa\u011flay\u0131n. Unutmay\u0131n, en zay\u0131f halka ne kadar g\u00fc\u00e7l\u00fcyse, zincir o kadar sa\u011flam olur.<br \/>\n* **Eri\u015fim Kontrolleri ve &#8220;En Az Ayr\u0131cal\u0131k&#8221; Prensibi:** \u00c7al\u0131\u015fanlara sadece i\u015flerini yapmalar\u0131 i\u00e7in gerekli olan verilere ve sistemlere eri\u015fim yetkisi verin. Gere\u011finden fazla yetki, potansiyel bir risk demektir.<br \/>\n* **A\u011f Segmentasyonu:** \u015eirket a\u011f\u0131n\u0131z\u0131 mant\u0131ksal b\u00f6l\u00fcmlere ay\u0131r\u0131n (\u00f6rne\u011fin, muhasebe, IT, misafir a\u011f\u0131). Bir b\u00f6l\u00fcmde bir g\u00fcvenlik ihlali olursa, di\u011fer b\u00f6l\u00fcmlere yay\u0131lmas\u0131n\u0131 engeller.<\/p>\n<h3>3.3. Pratik Komutlar (Uygulama Alanlar\u0131)<\/h3>\n<p>IT uzman\u0131 olarak bizlerin s\u0131k\u00e7a kulland\u0131\u011f\u0131, genel a\u011f g\u00fcvenli\u011fi hakk\u0131nda fikir veren birka\u00e7 komut:<\/p>\n<p>* **A\u011f Ba\u011flant\u0131lar\u0131n\u0131 Kontrol Etmek (Windows):** Hangi programlar\u0131n a\u011fa ba\u011fland\u0131\u011f\u0131n\u0131 veya hangi portlar\u0131n dinledi\u011fini g\u00f6rmek, beklenmedik ba\u011flant\u0131lar\u0131 tespit etmek i\u00e7in \u00f6nemlidir.<\/p>\n<p>cmd<br \/>\nnetstat -ano<\/p>\n<p>*(Bu komut, aktif t\u00fcm ba\u011flant\u0131lar\u0131, dinleme durumundaki portlar\u0131 ve bu ba\u011flant\u0131lar\u0131 kullanan i\u015flem kimliklerini (PID) g\u00f6sterir. &#8220;LISTEN&#8221; durumundaki portlara dikkat edin.)*<\/p>\n<p>* **A\u011f Ba\u011flant\u0131lar\u0131n\u0131 Kontrol Etmek (Linux\/macOS):** Benzer \u015fekilde, Linux ve macOS sistemlerinde de a\u011f durumunu kontrol edebiliriz.<\/p>\n<p>bash<br \/>\nsudo lsof -i -P -n | grep LISTEN<\/p>\n<p>*(Bu komut, sistemde dinleme durumunda olan t\u00fcm a\u011f servislerini ve kulland\u0131klar\u0131 port numaralar\u0131n\u0131 g\u00f6sterir. Bilmedi\u011finiz bir servisin dinlemede olmas\u0131, bir g\u00fcvenlik riski olabilir.)*<\/p>\n<p>* **IP Adresinizi Kontrol Etmek:** Kendi cihaz\u0131n\u0131z\u0131n a\u011fdaki konumunu veya genel internet IP adresinizi bilmek, bazen sorun giderme veya g\u00fcvenlik analizi i\u00e7in faydal\u0131d\u0131r.<\/p>\n<p>cmd<br \/>\n# Windows<br \/>\nipconfig<\/p>\n<p># Linux\/macOS<br \/>\nifconfig # veya ip a<\/p>\n<p>*(Bu komutlar, bilgisayar\u0131n\u0131z\u0131n yerel a\u011fdaki IP adresini, a\u011f ge\u00e7idini ve di\u011fer a\u011f yap\u0131land\u0131rma bilgilerini g\u00f6sterir.)*<\/p>\n<p>Bu komutlar size anl\u0131k bir bak\u0131\u015f a\u00e7\u0131s\u0131 sunar ve basit d\u00fczeyde a\u011f denetimi yapman\u0131z\u0131 sa\u011flar.<\/p>\n<h2>4. S\u0131k Yap\u0131lan Hatalar: Bu Tuzaklara D\u00fc\u015fmeyin!<\/h2>\n<p>Kullan\u0131c\u0131lar\u0131n ve hatta bazen kurumlar\u0131n yapt\u0131\u011f\u0131 baz\u0131 temel hatalar var ki, bunlar siber g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131n kap\u0131s\u0131n\u0131 ard\u0131na kadar aral\u0131yor:<\/p>\n<p>* **Zay\u0131f ve Tekrar Eden \u015eifreler:** En ba\u015fta bahsettim ama tekrar vurgulamak istiyorum. Ayn\u0131 \u015fifreyi birden fazla yerde kullanmak, bir hesap ele ge\u00e7irildi\u011finde domino etkisi yarat\u0131r.<br \/>\n* **G\u00fcncellemeleri \u0130hmal Etmek:** &#8220;\u015eimdi me\u015fgul\u00fcm&#8221; deyip erteledi\u011finiz g\u00fcncellemeler, bilinen zafiyetlere kar\u015f\u0131 sizi savunmas\u0131z b\u0131rak\u0131r. Bir\u00e7ok fidye yaz\u0131l\u0131m\u0131, bilinen ama yamalanmam\u0131\u015f a\u00e7\u0131klardan s\u0131zar.<br \/>\n* **Kimlik Av\u0131na D\u00fc\u015fmek (Dikkatsizlik):** Gelen her e-postay\u0131, mesaj\u0131 sorgulamadan a\u00e7mak, her linke t\u0131klamak b\u00fcy\u00fck bir risktir. &#8220;Bedava&#8221; bir \u015fey vadeden veya aciliyet hissi yaratan mesajlara kar\u015f\u0131 iki kere d\u00fc\u015f\u00fcn\u00fcn.<br \/>\n* **Yedekleme Yapmamak:** &#8220;Bana bir \u015fey olmaz&#8221; diyerek verilerini yedeklemeyen bir\u00e7ok ki\u015fi, bir fidye yaz\u0131l\u0131m\u0131 sald\u0131r\u0131s\u0131 veya donan\u0131m ar\u0131zas\u0131 sonras\u0131 t\u00fcm verilerini kaybetti. Benim tecr\u00fcbelerimde bu, en ac\u0131 derslerden biri oldu.<br \/>\n* **Varsay\u0131lan Ayarlar\u0131 De\u011fi\u015ftirmemek:** Yeni ald\u0131\u011f\u0131n\u0131z bir modem, Wi-Fi y\u00f6nlendirici veya IoT cihaz\u0131n\u0131n (ak\u0131ll\u0131 kamera, termostat vb.) varsay\u0131lan \u015fifrelerini de\u011fi\u015ftirmemek, kolay hedefler haline getirir. Sald\u0131rganlar bu varsay\u0131lan \u015fifreleri \u00e7ok iyi bilirler.<br \/>\n* **Sosyal M\u00fchendisli\u011fe Kar\u015f\u0131 Duyars\u0131zl\u0131k:** Sadece teknik sald\u0131r\u0131lar de\u011fil, insan psikolojisini hedef alan manip\u00fclasyonlar da yayg\u0131nd\u0131r. Telefonla aray\u0131p kendisini &#8220;IT&#8217;den&#8221; veya &#8220;bankadan&#8221; gibi tan\u0131tan ki\u015filere kar\u015f\u0131 her zaman dikkatli olun, bilgi vermeden \u00f6nce do\u011frulu\u011funu teyit edin.<br \/>\n* **&#8221;Bana bir \u015fey olmaz&#8221; Mentalitesi:** Bu belki de en b\u00fcy\u00fck hatad\u0131r. Siber sald\u0131r\u0131lar se\u00e7ici de\u011fildir; herkesin ba\u015f\u0131na gelebilir. Proaktif olmak, reaktif olmaktan her zaman daha iyidir.<\/p>\n<h2>5. Sonu\u00e7: S\u00fcrekli Bir Yolculuk ve Bilin\u00e7li Bir Yakla\u015f\u0131m<\/h2>\n<p>G\u00f6rd\u00fc\u011f\u00fcn\u00fcz gibi, siber g\u00fcvenlik tek seferlik bir i\u015flem de\u011fil, s\u00fcrekli devam eden bir s\u00fcre\u00e7tir. Yeni tehditler ortaya \u00e7\u0131kt\u0131k\u00e7a, yeni savunma y\u00f6ntemleri geli\u015ftirmemiz gerekiyor. Benim s\u00f6yleyebilece\u011fim en \u00f6nemli \u015fey \u015fu: siber g\u00fcvenlik bir k\u00fclt\u00fcr meselesidir. Hem bireysel hem de kurumsal olarak bu bilinci geli\u015ftirmek zorunday\u0131z.<\/p>\n<p>Unutmay\u0131n, dijital d\u00fcnyada att\u0131\u011f\u0131m\u0131z her ad\u0131m\u0131n bir risk ta\u015f\u0131ma potansiyeli var. Ancak bu riskleri do\u011fru bilgi ve pratik ad\u0131mlarla minimuma indirmek de bizim elimizde. G\u00fc\u00e7l\u00fc \u015fifreler, iki fakt\u00f6rl\u00fc kimlik do\u011frulama, g\u00fcncel yaz\u0131l\u0131mlar ve s\u00fcrekli fark\u0131ndal\u0131k&#8230; Bu temel ad\u0131mlar, sizi ve verilerinizi b\u00fcy\u00fck \u00f6l\u00e7\u00fcde koruyacakt\u0131r.<\/p>\n<p>Siber d\u00fcnyada g\u00fcvende kalmak, bilin\u00e7li ve dikkatli olmakla ba\u015flar. Bug\u00fcnden ba\u015flay\u0131n, kendinizi ve verilerinizi korumak i\u00e7in gerekli ad\u0131mlar\u0131 at\u0131n. \u00c7\u00fcnk\u00fc dijital \u00f6zg\u00fcrl\u00fc\u011f\u00fcm\u00fcz, dijital g\u00fcvenli\u011fimizle do\u011fru orant\u0131l\u0131d\u0131r!<\/p>\n<p>Okudu\u011funuz i\u00e7in te\u015fekk\u00fcrler, g\u00fcvenli g\u00fcnler dilerim!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Siber G\u00fcvenlik Nedir ve Neden Hayati \u00d6nem Ta\u015f\u0131r? (IT Uzman\u0131 G\u00f6z\u00fcyle Pratik Rehber)<\/p>\n","protected":false},"author":1,"featured_media":182,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[11,19,17],"class_list":["post-149","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-siber-guvenlik-istihbarat","tag-firewall","tag-lifestyle","tag-siber-guvenlik"],"blocksy_meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Siber G\u00fcvenlik Nedir? - Ali Burak \u015ean<\/title>\n<meta name=\"description\" content=\"siber g\u00fcvenli\u011fin hayat\u0131m\u0131zdaki \u00f6nemi\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aliburaksan.com\/blog\/siber-guvenlik-nedir-onemi\/\" \/>\n<meta property=\"og:locale\" content=\"tr_TR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Siber G\u00fcvenlik Nedir? - Ali Burak \u015ean\" \/>\n<meta property=\"og:description\" content=\"siber g\u00fcvenli\u011fin hayat\u0131m\u0131zdaki \u00f6nemi\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aliburaksan.com\/blog\/siber-guvenlik-nedir-onemi\/\" \/>\n<meta property=\"og:site_name\" content=\"Ali Burak \u015ean\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-21T08:32:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-22T00:54:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aliburaksan.com\/blog\/wp-content\/uploads\/2025\/11\/siber-guvenlik-konu-basligi-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"2560\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"abs_administrator45_\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Yazan:\" \/>\n\t<meta name=\"twitter:data1\" content=\"abs_administrator45_\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tahmini okuma s\u00fcresi\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 dakika\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.aliburaksan.com\/blog\/siber-guvenlik-nedir-onemi\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.aliburaksan.com\/blog\/siber-guvenlik-nedir-onemi\/\"},\"author\":{\"name\":\"abs_administrator45_\",\"@id\":\"https:\/\/www.aliburaksan.com\/blog\/#\/schema\/person\/ddc80da203b66794d3a1b568035ff3c2\"},\"headline\":\"Siber G\u00fcvenlik Nedir?\",\"datePublished\":\"2025-11-21T08:32:09+00:00\",\"dateModified\":\"2025-11-22T00:54:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.aliburaksan.com\/blog\/siber-guvenlik-nedir-onemi\/\"},\"wordCount\":2382,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.aliburaksan.com\/blog\/#\/schema\/person\/ddc80da203b66794d3a1b568035ff3c2\"},\"image\":{\"@id\":\"https:\/\/www.aliburaksan.com\/blog\/siber-guvenlik-nedir-onemi\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.aliburaksan.com\/blog\/wp-content\/uploads\/2025\/11\/siber-guvenlik-konu-basligi-scaled.jpg\",\"keywords\":[\"firewall\",\"lifestyle\",\"siber g\u00fcvenlik\"],\"articleSection\":[\"Siber G\u00fcvenlik &amp; \u0130stihbarat\"],\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.aliburaksan.com\/blog\/siber-guvenlik-nedir-onemi\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aliburaksan.com\/blog\/siber-guvenlik-nedir-onemi\/\",\"url\":\"https:\/\/www.aliburaksan.com\/blog\/siber-guvenlik-nedir-onemi\/\",\"name\":\"Siber G\u00fcvenlik Nedir? - Ali Burak \u015ean\",\"isPartOf\":{\"@id\":\"https:\/\/www.aliburaksan.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aliburaksan.com\/blog\/siber-guvenlik-nedir-onemi\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.aliburaksan.com\/blog\/siber-guvenlik-nedir-onemi\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.aliburaksan.com\/blog\/wp-content\/uploads\/2025\/11\/siber-guvenlik-konu-basligi-scaled.jpg\",\"datePublished\":\"2025-11-21T08:32:09+00:00\",\"dateModified\":\"2025-11-22T00:54:56+00:00\",\"description\":\"siber g\u00fcvenli\u011fin hayat\u0131m\u0131zdaki \u00f6nemi\",\"breadcrumb\":{\"@id\":\"https:\/\/www.aliburaksan.com\/blog\/siber-guvenlik-nedir-onemi\/#breadcrumb\"},\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aliburaksan.com\/blog\/siber-guvenlik-nedir-onemi\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/www.aliburaksan.com\/blog\/siber-guvenlik-nedir-onemi\/#primaryimage\",\"url\":\"https:\/\/www.aliburaksan.com\/blog\/wp-content\/uploads\/2025\/11\/siber-guvenlik-konu-basligi-scaled.jpg\",\"contentUrl\":\"https:\/\/www.aliburaksan.com\/blog\/wp-content\/uploads\/2025\/11\/siber-guvenlik-konu-basligi-scaled.jpg\",\"width\":2560,\"height\":2560,\"caption\":\"cyber security technology world computer worm virus danger alert vector illustration\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aliburaksan.com\/blog\/siber-guvenlik-nedir-onemi\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Anasayfa\",\"item\":\"https:\/\/www.aliburaksan.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Siber G\u00fcvenlik Nedir?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aliburaksan.com\/blog\/#website\",\"url\":\"https:\/\/www.aliburaksan.com\/blog\/\",\"name\":\"Dijital Nab\u0131z \u2013 IT Haberleri\",\"description\":\"IT, Sistem Y\u00f6netimi ve Teknoloji G\u00fcnl\u00fc\u011f\u00fc\",\"publisher\":{\"@id\":\"https:\/\/www.aliburaksan.com\/blog\/#\/schema\/person\/ddc80da203b66794d3a1b568035ff3c2\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aliburaksan.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"tr\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/www.aliburaksan.com\/blog\/#\/schema\/person\/ddc80da203b66794d3a1b568035ff3c2\",\"name\":\"abs_administrator45_\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/www.aliburaksan.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0f7cbec178a59b3ec0e9b0732417e32803d988a369cc745ef68a7143376120ab?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0f7cbec178a59b3ec0e9b0732417e32803d988a369cc745ef68a7143376120ab?s=96&d=mm&r=g\",\"caption\":\"abs_administrator45_\"},\"logo\":{\"@id\":\"https:\/\/www.aliburaksan.com\/blog\/#\/schema\/person\/image\/\"},\"sameAs\":[\"http:\/\/www.aliburaksan.com\/blog\"],\"url\":\"https:\/\/www.aliburaksan.com\/blog\/author\/abs_administrator45_\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Siber G\u00fcvenlik Nedir? - Ali Burak \u015ean","description":"siber g\u00fcvenli\u011fin hayat\u0131m\u0131zdaki \u00f6nemi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aliburaksan.com\/blog\/siber-guvenlik-nedir-onemi\/","og_locale":"tr_TR","og_type":"article","og_title":"Siber G\u00fcvenlik Nedir? - Ali Burak \u015ean","og_description":"siber g\u00fcvenli\u011fin hayat\u0131m\u0131zdaki \u00f6nemi","og_url":"https:\/\/www.aliburaksan.com\/blog\/siber-guvenlik-nedir-onemi\/","og_site_name":"Ali Burak \u015ean","article_published_time":"2025-11-21T08:32:09+00:00","article_modified_time":"2025-11-22T00:54:56+00:00","og_image":[{"width":2560,"height":2560,"url":"https:\/\/www.aliburaksan.com\/blog\/wp-content\/uploads\/2025\/11\/siber-guvenlik-konu-basligi-scaled.jpg","type":"image\/jpeg"}],"author":"abs_administrator45_","twitter_card":"summary_large_image","twitter_misc":{"Yazan:":"abs_administrator45_","Tahmini okuma s\u00fcresi":"11 dakika"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.aliburaksan.com\/blog\/siber-guvenlik-nedir-onemi\/#article","isPartOf":{"@id":"https:\/\/www.aliburaksan.com\/blog\/siber-guvenlik-nedir-onemi\/"},"author":{"name":"abs_administrator45_","@id":"https:\/\/www.aliburaksan.com\/blog\/#\/schema\/person\/ddc80da203b66794d3a1b568035ff3c2"},"headline":"Siber G\u00fcvenlik Nedir?","datePublished":"2025-11-21T08:32:09+00:00","dateModified":"2025-11-22T00:54:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.aliburaksan.com\/blog\/siber-guvenlik-nedir-onemi\/"},"wordCount":2382,"commentCount":0,"publisher":{"@id":"https:\/\/www.aliburaksan.com\/blog\/#\/schema\/person\/ddc80da203b66794d3a1b568035ff3c2"},"image":{"@id":"https:\/\/www.aliburaksan.com\/blog\/siber-guvenlik-nedir-onemi\/#primaryimage"},"thumbnailUrl":"https:\/\/www.aliburaksan.com\/blog\/wp-content\/uploads\/2025\/11\/siber-guvenlik-konu-basligi-scaled.jpg","keywords":["firewall","lifestyle","siber g\u00fcvenlik"],"articleSection":["Siber G\u00fcvenlik &amp; \u0130stihbarat"],"inLanguage":"tr","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.aliburaksan.com\/blog\/siber-guvenlik-nedir-onemi\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.aliburaksan.com\/blog\/siber-guvenlik-nedir-onemi\/","url":"https:\/\/www.aliburaksan.com\/blog\/siber-guvenlik-nedir-onemi\/","name":"Siber G\u00fcvenlik Nedir? - Ali Burak \u015ean","isPartOf":{"@id":"https:\/\/www.aliburaksan.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aliburaksan.com\/blog\/siber-guvenlik-nedir-onemi\/#primaryimage"},"image":{"@id":"https:\/\/www.aliburaksan.com\/blog\/siber-guvenlik-nedir-onemi\/#primaryimage"},"thumbnailUrl":"https:\/\/www.aliburaksan.com\/blog\/wp-content\/uploads\/2025\/11\/siber-guvenlik-konu-basligi-scaled.jpg","datePublished":"2025-11-21T08:32:09+00:00","dateModified":"2025-11-22T00:54:56+00:00","description":"siber g\u00fcvenli\u011fin hayat\u0131m\u0131zdaki \u00f6nemi","breadcrumb":{"@id":"https:\/\/www.aliburaksan.com\/blog\/siber-guvenlik-nedir-onemi\/#breadcrumb"},"inLanguage":"tr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aliburaksan.com\/blog\/siber-guvenlik-nedir-onemi\/"]}]},{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/www.aliburaksan.com\/blog\/siber-guvenlik-nedir-onemi\/#primaryimage","url":"https:\/\/www.aliburaksan.com\/blog\/wp-content\/uploads\/2025\/11\/siber-guvenlik-konu-basligi-scaled.jpg","contentUrl":"https:\/\/www.aliburaksan.com\/blog\/wp-content\/uploads\/2025\/11\/siber-guvenlik-konu-basligi-scaled.jpg","width":2560,"height":2560,"caption":"cyber security technology world computer worm virus danger alert vector illustration"},{"@type":"BreadcrumbList","@id":"https:\/\/www.aliburaksan.com\/blog\/siber-guvenlik-nedir-onemi\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Anasayfa","item":"https:\/\/www.aliburaksan.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Siber G\u00fcvenlik Nedir?"}]},{"@type":"WebSite","@id":"https:\/\/www.aliburaksan.com\/blog\/#website","url":"https:\/\/www.aliburaksan.com\/blog\/","name":"Dijital Nab\u0131z \u2013 IT Haberleri","description":"IT, Sistem Y\u00f6netimi ve Teknoloji G\u00fcnl\u00fc\u011f\u00fc","publisher":{"@id":"https:\/\/www.aliburaksan.com\/blog\/#\/schema\/person\/ddc80da203b66794d3a1b568035ff3c2"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aliburaksan.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"tr"},{"@type":["Person","Organization"],"@id":"https:\/\/www.aliburaksan.com\/blog\/#\/schema\/person\/ddc80da203b66794d3a1b568035ff3c2","name":"abs_administrator45_","image":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/www.aliburaksan.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0f7cbec178a59b3ec0e9b0732417e32803d988a369cc745ef68a7143376120ab?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0f7cbec178a59b3ec0e9b0732417e32803d988a369cc745ef68a7143376120ab?s=96&d=mm&r=g","caption":"abs_administrator45_"},"logo":{"@id":"https:\/\/www.aliburaksan.com\/blog\/#\/schema\/person\/image\/"},"sameAs":["http:\/\/www.aliburaksan.com\/blog"],"url":"https:\/\/www.aliburaksan.com\/blog\/author\/abs_administrator45_\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aliburaksan.com\/blog\/wp-json\/wp\/v2\/posts\/149","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.aliburaksan.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aliburaksan.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aliburaksan.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aliburaksan.com\/blog\/wp-json\/wp\/v2\/comments?post=149"}],"version-history":[{"count":5,"href":"https:\/\/www.aliburaksan.com\/blog\/wp-json\/wp\/v2\/posts\/149\/revisions"}],"predecessor-version":[{"id":229,"href":"https:\/\/www.aliburaksan.com\/blog\/wp-json\/wp\/v2\/posts\/149\/revisions\/229"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aliburaksan.com\/blog\/wp-json\/wp\/v2\/media\/182"}],"wp:attachment":[{"href":"https:\/\/www.aliburaksan.com\/blog\/wp-json\/wp\/v2\/media?parent=149"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aliburaksan.com\/blog\/wp-json\/wp\/v2\/categories?post=149"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aliburaksan.com\/blog\/wp-json\/wp\/v2\/tags?post=149"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}