{"id":2417,"date":"2021-12-05T15:47:33","date_gmt":"2021-12-05T12:47:33","guid":{"rendered":"https:\/\/ebrarteknoloji.com\/?page_id=2417"},"modified":"2021-12-05T20:01:33","modified_gmt":"2021-12-05T17:01:33","slug":"siber-guvenlik-cyber-security","status":"publish","type":"page","link":"https:\/\/ebrarteknoloji.com\/index.php\/siber-guvenlik-cyber-security\/","title":{"rendered":"Siber G\u00fcvenlik &#8211; Cyber Security"},"content":{"rendered":"<div data-colibri-id=\"2417-c1\" class=\"style-1379 style-local-2417-c1 position-relative\">\n  <!---->\n  <div data-colibri-component=\"section\" data-colibri-id=\"2417-c2\" id=\"content\" class=\"h-section h-section-global-spacing d-flex align-items-lg-center align-items-md-center align-items-center style-1380 style-local-2417-c2 position-relative\">\n    <!---->\n    <!---->\n    <div class=\"h-section-grid-container h-section-boxed-container\">\n      <div data-colibri-id=\"2417-c9\" class=\"h-row-container gutters-row-lg-2 gutters-row-md-2 gutters-row-2 gutters-row-v-lg-2 gutters-row-v-md-2 gutters-row-v-2 style-1387 style-local-2417-c9 position-relative\">\n        <!---->\n        <div class=\"h-row justify-content-lg-center justify-content-md-center justify-content-center align-items-lg-stretch align-items-md-stretch align-items-stretch gutters-col-lg-2 gutters-col-md-2 gutters-col-2 gutters-col-v-lg-2 gutters-col-v-md-2 gutters-col-v-2\">\n          <!---->\n          <div class=\"h-column h-column-container d-flex h-col-lg-auto h-col-md-auto h-col-auto style-1388-outer style-local-2417-c10-outer\">\n            <div data-colibri-id=\"2417-c10\" class=\"d-flex h-flex-basis h-column__inner h-px-lg-2 h-px-md-2 h-px-0 v-inner-lg-2 v-inner-md-2 v-inner-0 style-1388 style-local-2417-c10 position-relative\">\n              <!---->\n              <!---->\n              <div class=\"w-100 h-y-container h-column__content h-column__v-align flex-basis-100 align-self-lg-start align-self-md-start align-self-start\">\n                <!---->\n                <div data-colibri-id=\"2417-c11\" class=\"h-global-transition-all h-heading style-1389 style-local-2417-c11 position-relative h-element\">\n                  <!---->\n                  <div class=\"h-heading__outer style-1389 style-local-2417-c11\">\n                    <!---->\n                    <!---->\n                    <h2 class=\"\"><em style=\"font-family: &quot;Playfair Display&quot;; color: rgb(3, 169, 244);\">siber g\u00fcvenlik, siber olaylara m\u00fcdahale, siber tehdit korumas\u0131, s\u0131zma testleri<\/em><\/h2>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"2417-c12\" class=\"h-global-transition-all h-heading style-1390 style-local-2417-c12 position-relative h-element\">\n                  <!---->\n                  <div class=\"h-heading__outer style-1390 style-local-2417-c12\">\n                    <!---->\n                    <!---->\n                    <h3 class=\"\">siber g\u00fcvenlik bizim i\u015fimiz<\/h3>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"2417-c13\" class=\"h-lead h-text h-text-component style-1391 style-local-2417-c13 position-relative h-element\">\n                  <!---->\n                  <!---->\n                  <div class=\"\">\n                    <p><span style=\"color: rgb(70, 112, 127); font-family: &quot;Open Sans&quot;; font-size: 16px; font-weight: 400;\">Penetrasyon (s\u0131zma) testlerimiz TSE onayl\u0131 sertifikaya sahip uzmanlar\u0131m\u0131zca ger\u00e7ekle\u015ftirilmektedir. S\u0131zma testi hizmetlerimiz TS 13638 standartlar\u0131nda tan\u0131mlanan metodoloji izlenerek ve standard kriterlere uygun \u015fekilde ger\u00e7ekle\u015ftirilmektedir.<\/span><\/p>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n        <\/div>\n      <\/div>\n      <div data-colibri-id=\"2417-c3\" class=\"h-row-container gutters-row-lg-2 gutters-row-md-2 gutters-row-2 gutters-row-v-lg-2 gutters-row-v-md-2 gutters-row-v-2 style-1381 style-local-2417-c3 position-relative\">\n        <!---->\n        <div class=\"h-row justify-content-lg-center justify-content-md-center justify-content-center align-items-lg-stretch align-items-md-stretch align-items-stretch gutters-col-lg-2 gutters-col-md-2 gutters-col-2 gutters-col-v-lg-2 gutters-col-v-md-2 gutters-col-v-2\">\n          <!---->\n          <div class=\"h-column h-column-container d-flex h-col-lg-auto h-col-md-auto h-col-auto style-1382-outer style-local-2417-c4-outer\">\n            <div data-colibri-id=\"2417-c4\" class=\"d-flex h-flex-basis h-column__inner h-px-lg-0 h-px-md-0 h-px-0 v-inner-lg-0 v-inner-md-0 v-inner-0 style-1382 style-local-2417-c4 position-relative\">\n              <!---->\n              <!---->\n              <div class=\"w-100 h-y-container h-column__content h-column__v-align flex-basis-100 align-self-lg-start align-self-md-start align-self-start\">\n                <!---->\n                <div data-colibri-id=\"2417-c5\" class=\"d-block style-1383 style-local-2417-c5 position-relative h-element\">\n                  <!---->\n                  <div class=\"h-image__frame-container-outer\">\n                    <a href=\"https:\/\/stm.pona.com.tr\/\" h-use-smooth-scroll=\"true\" class=\"image-link\">\n                      <div class=\"h-image__frame-container\">\n                        <!---->\n                        <!---->\n                        <img decoding=\"async\" width=\"1070\" height=\"739\" src=\"https:\/\/ebrarteknoloji.com\/wp-content\/uploads\/2021\/12\/pentest6.jpg\" class=\"wp-image-2400 style-1383-image style-local-2417-c5-image\" alt=\"\" srcset=\"https:\/\/ebrarteknoloji.com\/wp-content\/uploads\/2021\/12\/pentest6.jpg 1070w, https:\/\/ebrarteknoloji.com\/wp-content\/uploads\/2021\/12\/pentest6-300x207.jpg 300w, https:\/\/ebrarteknoloji.com\/wp-content\/uploads\/2021\/12\/pentest6-1024x707.jpg 1024w, https:\/\/ebrarteknoloji.com\/wp-content\/uploads\/2021\/12\/pentest6-768x530.jpg 768w\" sizes=\"(max-width: 1070px) 100vw, 1070px\" \/>\n                        <div class=\"h-image__frame style-1383-frameImage style-local-2417-c5-frameImage\"><\/div>\n                      <\/div>\n                    <\/a>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n        <\/div>\n      <\/div>\n      <div data-colibri-id=\"2417-c6\" class=\"h-row-container gutters-row-lg-2 gutters-row-md-2 gutters-row-0 gutters-row-v-lg-2 gutters-row-v-md-2 gutters-row-v-2 style-1384 style-local-2417-c6 position-relative\">\n        <!---->\n        <div class=\"h-row justify-content-lg-center justify-content-md-center justify-content-center align-items-lg-stretch align-items-md-stretch align-items-stretch gutters-col-lg-2 gutters-col-md-2 gutters-col-0 gutters-col-v-lg-2 gutters-col-v-md-2 gutters-col-v-2\">\n          <!---->\n          <div class=\"h-column h-column-container d-flex h-col-lg-auto h-col-md-auto h-col-auto style-1385-outer style-local-2417-c7-outer\">\n            <div data-colibri-id=\"2417-c7\" class=\"d-flex h-flex-basis h-column__inner h-px-lg-2 h-px-md-2 h-px-2 v-inner-lg-2 v-inner-md-2 v-inner-2 style-1385 style-local-2417-c7 position-relative\">\n              <!---->\n              <!---->\n              <div class=\"w-100 h-y-container h-column__content h-column__v-align flex-basis-100 align-self-lg-start align-self-md-start align-self-start\">\n                <!---->\n                <div data-colibri-id=\"2417-c8\" class=\"h-lead h-text h-text-component style-1386 style-local-2417-c8 position-relative h-element\">\n                  <!---->\n                  <!---->\n                  <div class=\"\">\n                    <p>S\u0131zma testi (Pentest) nedir ?<\/p>\n                    <p>S\u0131zma testi (penetrasyon testi) , bili\u015fim sistemlerine ve sahip oldu\u011fu hassas verilere siber korsanlar taraf\u0131ndan yap\u0131labilecek olas\u0131 sald\u0131r\u0131lar\u0131n taklit edilmesidir. Bu tatbikat neticesinde firmalar sistemlerinde bulunan zafiyetleri\n                      giderebilir ve hackerlar\u0131n sald\u0131r\u0131lar\u0131na kar\u015f\u0131 korunakl\u0131 hale gelebilir. S\u0131zma testlerinin ana hatlar\u0131 genel olarak sistemde \u00e7al\u0131\u015fan uygulamalar\u0131n veya yaz\u0131l\u0131mlar\u0131n tespiti, analizi ve zafiyet bar\u0131nd\u0131r\u0131p bar\u0131nd\u0131rmad\u0131klar\u0131n\u0131n de\u011ferlendirilmesi\n                      \u015feklindedir.<\/p>\n                    <p>S\u0131zma testlerinin faydalar\u0131 nelerdir?<\/p>\n                    <p>S\u0131zma testlerinin kurumlara bir\u00e7ok faydas\u0131 bulunmaktad\u0131r, bunlardan baz\u0131lar\u0131 ise \u015funlard\u0131r:<\/p>\n                    <p>1)Firmalara sistemlerinin zafiyetleri hakk\u0131nda detayl\u0131 bir rapor sunulur, bu rapor sonucunda firmalar sistemlerinin zafiyetli noktalar\u0131n\u0131 kapatabilir, sistemlerini g\u00fc\u00e7lendirebilir ve olas\u0131 sald\u0131r\u0131lara kar\u015f\u0131 korunakl\u0131 hale gelebilir.<\/p>\n                    <p>2)Firmalara ger\u00e7ekle\u015ftirilen olas\u0131 sald\u0131r\u0131lar, firmalar a\u00e7\u0131s\u0131ndan ciddi maddi ve manevi kay\u0131plara yol a\u00e7abilmektedir. Bu sebepten dolay\u0131 firmalar, sald\u0131r\u0131ya u\u011frad\u0131ktan sonra de\u011fil sald\u0131r\u0131ya u\u011framadan \u00f6nce gerekli tedbirleri almal\u0131d\u0131r.<\/p>\n                    <p>3)\u00dclkemizde 6698 say\u0131l\u0131 KVKK (Ki\u015fisel Verilerin Korunmas\u0131 Kanunu) kapsam\u0131nda olas\u0131 sald\u0131r\u0131lar sonucu veri s\u0131z\u0131nt\u0131s\u0131 ile kar\u015f\u0131la\u015f\u0131ld\u0131\u011f\u0131nda, ilgili kuruma ciddi maddi yapt\u0131r\u0131mlar uygulanmakta ve kurumsal itibar\u0131 zarar g\u00f6rmektedir. KVKK\n                      kapsam\u0131nda firmalar \u00e7e\u015fitli g\u00fcvenlik testlerini yapt\u0131rmal\u0131 ve \u00f6zellikle m\u00fc\u015fterilerinin verilerini sakl\u0131 tutmakla m\u00fckelleftir.<\/p>\n                    <p>\n                      <br>\n                    <\/p>\n                    <p>\n                      <br>\n                    <\/p>\n                    <p>S\u0131zma testleri t\u00fcrleri nelerdir ?<\/p>\n                    <p>Testin yap\u0131ld\u0131\u011f\u0131 lokasyona g\u00f6re 2 adet s\u0131zma testi t\u00fcr\u00fc bulunur. Bunlar,<\/p>\n                    <p>\u0130\u00e7 a\u011f (Internal) S\u0131zma testi :Bu s\u0131zma testi t\u00fcr\u00fcnde, ilgili firman\u0131n yerel a\u011flar\u0131na ba\u011flan\u0131p i\u00e7eriye a\u00e7\u0131k sistemleri test edilir. \u00d6zellikle \u00e7al\u0131\u015fan bilgisayarlar\u0131n\u0131n i\u015fletim sistemi zafiyetleri veya \u00e7al\u0131\u015fanlar\u0131n s\u0131k kulland\u0131klar\u0131\n                      yaz\u0131l\u0131mlar\u0131n versiyon tespiti ve ilgili zafiyetlerin tespit edildi\u011fi s\u0131zma testi t\u00fcr\u00fcd\u00fcr.<\/p>\n                    <p>D\u0131\u015f a\u011f(External) S\u0131zma testi: Bu s\u0131zma testinde ilgili firman\u0131n web sitesi veya d\u0131\u015f a\u011f sunucular\u0131na eri\u015filip ilgili zafiyetlerin tespit edildi\u011fi s\u0131zma testi t\u00fcr\u00fcd\u00fcr. \u00d6zellikle veri tabanlar\u0131yla \u00e7al\u0131\u015f\u0131lan veya kimlik do\u011frulamas\u0131 gerektiren\n                      oturum y\u00f6netimi gibi fonksiyonlara sahip web uygulamalar\u0131n testleri de yine burada ger\u00e7ekle\u015fir.<\/p>\n                    <p>\n                      <br>\n                    <\/p>\n                    <p>S\u0131zma testleri y\u00f6ntemleri nelerdir ?<\/p>\n                    <p>3 adet s\u0131zma testi y\u00f6ntemi bulunur. Bunlar,<\/p>\n                    <p>Black Box Pentest (Siyah kutu s\u0131zma testi): Bu s\u0131zma testi (penetrasyon testi) y\u00f6nteminde, testi yapacak ki\u015filere hi\u00e7bir bilgi verilmez. Testi yapacak ki\u015filer ,ilgili a\u011fda \u00e7al\u0131\u015fan her t\u00fcrl\u00fc uygulamay\u0131 veya sistemi tespit edip zafiyetlerini\n                      aramakla y\u00fck\u00fcml\u00fcd\u00fcr. Testi yapacak ki\u015filere \u00f6nceden bilgi sa\u011flanmad\u0131\u011f\u0131 i\u00e7in, firman\u0131n \u00f6nemli servisleri \u00fczerinde yap\u0131lacak testlerde bozulma veya aksama riski daha y\u00fcksektir. Bunun yan\u0131 s\u0131ra, di\u011fer test t\u00fcrlerine g\u00f6re daha fazla\n                      zaman ald\u0131\u011f\u0131 i\u00e7in daha maliyetlidir. Firmalar taraf\u0131ndan genellikle tercih edilmez.<\/p>\n                    <p>Gray Box Pentest (Gri kutu S\u0131zma testi): Bu s\u0131zma testi (pentest) y\u00f6nteminde, testi yapacak ki\u015filere \u00f6nceden IP adresleri veya sunucular hakk\u0131nda versiyon bilgileri gibi \u00e7ok temel bilgiler sa\u011flan\u0131r. Black Box yakla\u015f\u0131m\u0131na g\u00f6re \u00f6n bilgileri\n                      daha y\u00fcksek olan s\u0131zma testi (pentest) ekibinin, hassas sistemlere kar\u015f\u0131 ger\u00e7ekle\u015ftirecekleri testler daha az riskli olup testin tamamlanma s\u00fcresi daha k\u0131sa olur.<\/p>\n                    <p>White Box Pentest (Beyaz Kutu S\u0131zma Testi): Bu s\u0131zma testi y\u00f6nteminde, testi yapacak ki\u015filere sistemler hakk\u0131nda her t\u00fcrl\u00fc bilgi \u00f6nceden sa\u011flan\u0131r. Bu sayede testi yapacak ki\u015filer, hassas sistemlere kar\u015f\u0131 \u00e7ok daha g\u00fcvenli bir \u015fekilde\n                      test ger\u00e7ekle\u015ftirecek ve olas\u0131 servis durmas\u0131 veya aksamas\u0131 problemleriyle kar\u015f\u0131la\u015fmayacaklard\u0131r. Ayn\u0131 zamanda di\u011fer test t\u00fcrlerine g\u00f6re \u00e7ok daha k\u0131sa s\u00fcrede tamamland\u0131\u011f\u0131 i\u00e7in daha d\u00fc\u015f\u00fck maliyetli ve \u00e7ok daha y\u00fcksek g\u00fcvenlikli bir\n                      test ger\u00e7ekle\u015fmi\u015f olacakt\u0131r.<\/p>\n                    <p>\n                      <br>\n                    <\/p>\n                    <p>Standart bir s\u0131zma testi a\u015famalar\u0131 nelerdir ?<\/p>\n                    <p>Standart bir s\u0131zma testi \u00f6ncelikle ke\u015fif (reconnaissance) a\u015famas\u0131yla ba\u015flar. Ke\u015fif a\u015famas\u0131 s\u0131zma testleri (penetrasyon testleri) i\u00e7in en \u00f6nemli a\u015famalardand\u0131r ve s\u0131zma testi uzmanlar\u0131 (pentester) bu a\u015famada sistem hakk\u0131nda olabildi\u011fince\n                      bilgi toplamaya ve kar\u015f\u0131s\u0131ndaki sistemi tan\u0131maya \u00e7al\u0131\u015f\u0131r. Ke\u015fif a\u015famas\u0131 test boyunca s\u00fcren bir a\u015famad\u0131r, testin ilerleyen zamanlar\u0131nda ke\u015ffedilen yeni bir bilgi ile tekrar s\u00fcrecin ba\u015f\u0131na d\u00f6n\u00fclmeli ve ad\u0131m ad\u0131m ilerlenmelidir.<\/p>\n                    <p>Ke\u015fif a\u015famas\u0131 boyunca sistemin a\u011f haritas\u0131n\u0131n \u00e7\u0131kar\u0131lmas\u0131, sunucu ve servislerin tespiti, i\u015fletim sistemlerinin tespiti, a\u011f servislerinin tespiti, kullan\u0131c\u0131lar\u0131n tespiti ve ilgili kullan\u0131c\u0131lar i\u00e7in \u00e7e\u015fitli parola k\u0131rma sald\u0131r\u0131lar\u0131\n                      ve tespit edilen sistemlerin versiyonlar\u0131 \u00fczerinde \u00e7e\u015fitli zafiyetlerin olup olmad\u0131\u011f\u0131 ile ilgili derin ara\u015ft\u0131rmalar yap\u0131lmaktad\u0131r.<\/p>\n                    <p>Ke\u015fif a\u015famas\u0131 sonras\u0131 ilgili sistemlerde tespit edilen zafiyetlerin s\u00f6m\u00fcr\u00fclmesi (exploit) ve bu durumun detayl\u0131ca ve profesyonelce haz\u0131rlanm\u0131\u015f bir raporda sunulmas\u0131 olduk\u00e7a \u00f6nemlidir.<\/p>\n                    <p>S\u0131zma testi (pentest) boyunca bazen s\u0131zma testi uzmanlar\u0131) pentesterlar, ilgili kurumun \u00e7al\u0131\u015fanlar\u0131na phising (oltalama) sald\u0131r\u0131lar\u0131 da d\u00fczenleyebilir ve \u00e7al\u0131\u015fanlar\u0131n da g\u00fcvenlik bilincini test etmek isteyebilirler. Firmalar teknik\n                      olarak sistemlerini sald\u0131r\u0131lara kar\u015f\u0131 ne kadar g\u00fc\u00e7lendirseler de \u00e7al\u0131\u015fanlar\u0131n\u0131n g\u00fcvenlik bilincini de y\u00fckseltmedikleri takdirde olas\u0131 ba\u015far\u0131l\u0131 bir oltalama (phising) sald\u0131r\u0131s\u0131 neticesinde zarar g\u00f6rmeleri muhtemeldir.<\/p>\n                    <p>\n                      <a href=\"https:\/\/www.pona.com.tr\/siber-guvenlik-urunlerimiz\" target=\"_blank\" rel=\"noopener\" class=\"customize-unpreviewable\" style=\"color: inherit;\">\n                        <br>\n                      <\/a>\n                    <\/p>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n        <\/div>\n      <\/div>\n    <\/div>\n  <\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>siber g\u00fcvenlik, siber olaylara m\u00fcdahale, siber tehdit korumas\u0131, s\u0131zma testleri siber g\u00fcvenlik bizim i\u015fimiz Penetrasyon (s\u0131zma) testlerimiz TSE onayl\u0131 sertifikaya sahip uzmanlar\u0131m\u0131zca ger\u00e7ekle\u015ftirilmektedir. S\u0131zma testi hizmetlerimiz TS 13638 standartlar\u0131nda tan\u0131mlanan metodoloji izlenerek ve standard kriterlere uygun \u015fekilde ger\u00e7ekle\u015ftirilmektedir. S\u0131zma testi (Pentest) nedir ? S\u0131zma testi (penetrasyon testi) , bili\u015fim sistemlerine ve sahip oldu\u011fu hassas verilere [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/full-width-page.php","meta":{"footnotes":""},"class_list":["post-2417","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Siber G\u00fcvenlik - Cyber Security - Ebrar Bilgi Teknolojileri Ltd.<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ebrarteknoloji.com\/index.php\/siber-guvenlik-cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"tr_TR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Siber G\u00fcvenlik - Cyber Security - Ebrar Bilgi Teknolojileri Ltd.\" \/>\n<meta property=\"og:description\" content=\"siber g\u00fcvenlik, siber olaylara m\u00fcdahale, siber tehdit korumas\u0131, s\u0131zma testleri siber g\u00fcvenlik bizim i\u015fimiz Penetrasyon (s\u0131zma) testlerimiz TSE onayl\u0131 sertifikaya sahip uzmanlar\u0131m\u0131zca ger\u00e7ekle\u015ftirilmektedir. S\u0131zma testi hizmetlerimiz TS 13638 standartlar\u0131nda tan\u0131mlanan metodoloji izlenerek ve standard kriterlere uygun \u015fekilde ger\u00e7ekle\u015ftirilmektedir. S\u0131zma testi (Pentest) nedir ? S\u0131zma testi (penetrasyon testi) , bili\u015fim sistemlerine ve sahip oldu\u011fu hassas verilere [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ebrarteknoloji.com\/index.php\/siber-guvenlik-cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Ebrar Bilgi Teknolojileri Ltd.\" \/>\n<meta property=\"article:modified_time\" content=\"2021-12-05T17:01:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ebrarteknoloji.com\/wp-content\/uploads\/2021\/12\/pentest6.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tahmini okuma s\u00fcresi\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 dakika\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ebrarteknoloji.com\/index.php\/siber-guvenlik-cyber-security\/\",\"url\":\"https:\/\/ebrarteknoloji.com\/index.php\/siber-guvenlik-cyber-security\/\",\"name\":\"Siber G\u00fcvenlik - Cyber Security - Ebrar Bilgi Teknolojileri Ltd.\",\"isPartOf\":{\"@id\":\"https:\/\/ebrarteknoloji.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ebrarteknoloji.com\/index.php\/siber-guvenlik-cyber-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ebrarteknoloji.com\/index.php\/siber-guvenlik-cyber-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ebrarteknoloji.com\/wp-content\/uploads\/2021\/12\/pentest6.jpg\",\"datePublished\":\"2021-12-05T12:47:33+00:00\",\"dateModified\":\"2021-12-05T17:01:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/ebrarteknoloji.com\/index.php\/siber-guvenlik-cyber-security\/#breadcrumb\"},\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ebrarteknoloji.com\/index.php\/siber-guvenlik-cyber-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/ebrarteknoloji.com\/index.php\/siber-guvenlik-cyber-security\/#primaryimage\",\"url\":\"https:\/\/ebrarteknoloji.com\/wp-content\/uploads\/2021\/12\/pentest6.jpg\",\"contentUrl\":\"https:\/\/ebrarteknoloji.com\/wp-content\/uploads\/2021\/12\/pentest6.jpg\",\"width\":1070,\"height\":739},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ebrarteknoloji.com\/index.php\/siber-guvenlik-cyber-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Anasayfa\",\"item\":\"https:\/\/ebrarteknoloji.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Siber G\u00fcvenlik &#8211; Cyber Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ebrarteknoloji.com\/#website\",\"url\":\"https:\/\/ebrarteknoloji.com\/\",\"name\":\"Ebrar Bilgi Teknolojileri Ltd.\",\"description\":\"Siber, Penetrasyon, Bili\u015fim, Yaz\u0131l\u0131m, G\u00fcvenlik, S\u0131zma, Sibel Kesti\",\"publisher\":{\"@id\":\"https:\/\/ebrarteknoloji.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ebrarteknoloji.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"tr\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ebrarteknoloji.com\/#organization\",\"name\":\"Ebrar Bilgi Teknolojileri Ltd.\",\"url\":\"https:\/\/ebrarteknoloji.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/ebrarteknoloji.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ebrarteknoloji.com\/wp-content\/uploads\/2021\/04\/ebrar_inApp_fwpng.fw_.png\",\"contentUrl\":\"https:\/\/ebrarteknoloji.com\/wp-content\/uploads\/2021\/04\/ebrar_inApp_fwpng.fw_.png\",\"width\":474,\"height\":52,\"caption\":\"Ebrar Bilgi Teknolojileri Ltd.\"},\"image\":{\"@id\":\"https:\/\/ebrarteknoloji.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Siber G\u00fcvenlik - Cyber Security - Ebrar Bilgi Teknolojileri Ltd.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ebrarteknoloji.com\/index.php\/siber-guvenlik-cyber-security\/","og_locale":"tr_TR","og_type":"article","og_title":"Siber G\u00fcvenlik - Cyber Security - Ebrar Bilgi Teknolojileri Ltd.","og_description":"siber g\u00fcvenlik, siber olaylara m\u00fcdahale, siber tehdit korumas\u0131, s\u0131zma testleri siber g\u00fcvenlik bizim i\u015fimiz Penetrasyon (s\u0131zma) testlerimiz TSE onayl\u0131 sertifikaya sahip uzmanlar\u0131m\u0131zca ger\u00e7ekle\u015ftirilmektedir. S\u0131zma testi hizmetlerimiz TS 13638 standartlar\u0131nda tan\u0131mlanan metodoloji izlenerek ve standard kriterlere uygun \u015fekilde ger\u00e7ekle\u015ftirilmektedir. S\u0131zma testi (Pentest) nedir ? S\u0131zma testi (penetrasyon testi) , bili\u015fim sistemlerine ve sahip oldu\u011fu hassas verilere [&hellip;]","og_url":"https:\/\/ebrarteknoloji.com\/index.php\/siber-guvenlik-cyber-security\/","og_site_name":"Ebrar Bilgi Teknolojileri Ltd.","article_modified_time":"2021-12-05T17:01:33+00:00","og_image":[{"url":"https:\/\/ebrarteknoloji.com\/wp-content\/uploads\/2021\/12\/pentest6.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Tahmini okuma s\u00fcresi":"5 dakika"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ebrarteknoloji.com\/index.php\/siber-guvenlik-cyber-security\/","url":"https:\/\/ebrarteknoloji.com\/index.php\/siber-guvenlik-cyber-security\/","name":"Siber G\u00fcvenlik - Cyber Security - Ebrar Bilgi Teknolojileri Ltd.","isPartOf":{"@id":"https:\/\/ebrarteknoloji.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ebrarteknoloji.com\/index.php\/siber-guvenlik-cyber-security\/#primaryimage"},"image":{"@id":"https:\/\/ebrarteknoloji.com\/index.php\/siber-guvenlik-cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/ebrarteknoloji.com\/wp-content\/uploads\/2021\/12\/pentest6.jpg","datePublished":"2021-12-05T12:47:33+00:00","dateModified":"2021-12-05T17:01:33+00:00","breadcrumb":{"@id":"https:\/\/ebrarteknoloji.com\/index.php\/siber-guvenlik-cyber-security\/#breadcrumb"},"inLanguage":"tr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ebrarteknoloji.com\/index.php\/siber-guvenlik-cyber-security\/"]}]},{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/ebrarteknoloji.com\/index.php\/siber-guvenlik-cyber-security\/#primaryimage","url":"https:\/\/ebrarteknoloji.com\/wp-content\/uploads\/2021\/12\/pentest6.jpg","contentUrl":"https:\/\/ebrarteknoloji.com\/wp-content\/uploads\/2021\/12\/pentest6.jpg","width":1070,"height":739},{"@type":"BreadcrumbList","@id":"https:\/\/ebrarteknoloji.com\/index.php\/siber-guvenlik-cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Anasayfa","item":"https:\/\/ebrarteknoloji.com\/"},{"@type":"ListItem","position":2,"name":"Siber G\u00fcvenlik &#8211; Cyber Security"}]},{"@type":"WebSite","@id":"https:\/\/ebrarteknoloji.com\/#website","url":"https:\/\/ebrarteknoloji.com\/","name":"Ebrar Bilgi Teknolojileri Ltd.","description":"Siber, Penetrasyon, Bili\u015fim, Yaz\u0131l\u0131m, G\u00fcvenlik, S\u0131zma, Sibel Kesti","publisher":{"@id":"https:\/\/ebrarteknoloji.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ebrarteknoloji.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"tr"},{"@type":"Organization","@id":"https:\/\/ebrarteknoloji.com\/#organization","name":"Ebrar Bilgi Teknolojileri Ltd.","url":"https:\/\/ebrarteknoloji.com\/","logo":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/ebrarteknoloji.com\/#\/schema\/logo\/image\/","url":"https:\/\/ebrarteknoloji.com\/wp-content\/uploads\/2021\/04\/ebrar_inApp_fwpng.fw_.png","contentUrl":"https:\/\/ebrarteknoloji.com\/wp-content\/uploads\/2021\/04\/ebrar_inApp_fwpng.fw_.png","width":474,"height":52,"caption":"Ebrar Bilgi Teknolojileri Ltd."},"image":{"@id":"https:\/\/ebrarteknoloji.com\/#\/schema\/logo\/image\/"}}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/ebrarteknoloji.com\/index.php\/wp-json\/wp\/v2\/pages\/2417","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ebrarteknoloji.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ebrarteknoloji.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ebrarteknoloji.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ebrarteknoloji.com\/index.php\/wp-json\/wp\/v2\/comments?post=2417"}],"version-history":[{"count":3,"href":"https:\/\/ebrarteknoloji.com\/index.php\/wp-json\/wp\/v2\/pages\/2417\/revisions"}],"predecessor-version":[{"id":2470,"href":"https:\/\/ebrarteknoloji.com\/index.php\/wp-json\/wp\/v2\/pages\/2417\/revisions\/2470"}],"wp:attachment":[{"href":"https:\/\/ebrarteknoloji.com\/index.php\/wp-json\/wp\/v2\/media?parent=2417"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}