{"id":98206,"date":"2019-04-14T00:00:43","date_gmt":"2019-04-14T07:00:43","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=98206"},"modified":"2019-04-08T02:51:55","modified_gmt":"2019-04-08T09:51:55","slug":"what-does-it-mean-to-be-5g-ready-tr","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2019\/04\/what-does-it-mean-to-be-5g-ready-tr\/?lang=tr","title":{"rendered":"\u201c5G i\u00e7in Haz\u0131r\u201d Ne Demektir?"},"content":{"rendered":"<p><em>Bu, g\u00fcvenlik a\u00e7\u0131s\u0131ndan olduk\u00e7a kritik bir ifadedir.<\/em><\/p>\n<p>\u201c5G i\u00e7in haz\u0131r\u201d \u00fcr\u00fcn ve teknolojilerin say\u0131s\u0131 her ge\u00e7en g\u00fcn art\u0131yor. Ancak bu ifade tam olarak ne anlama geliyor? Mobil Servis Sa\u011flay\u0131c\u0131lar\u0131, kapasite ve performans a\u00e7\u0131s\u0131ndan \u00f6l\u00e7eklenebilir 5G ekipmanlara ihtiya\u00e7 duyacak olsa da bu durum tek ba\u015f\u0131na a\u011flar\u0131n 5G i\u00e7in haz\u0131r olmas\u0131 a\u00e7\u0131s\u0131ndan yeterli mi?<\/p>\n<p>Gerekli g\u00fcvenlik \u00f6zellikleri tasar\u0131m gere\u011fi olarak uygulamaya al\u0131nmad\u0131k\u00e7a mobil a\u011flar tam anlam\u0131yla 5G uyumlu olmayacakt\u0131r.<\/p>\n<p>Federal \u0130leti\u015fim Komisyonu'nun eski ba\u015fkan\u0131 Tom Wheeler, ge\u00e7ti\u011fimiz g\u00fcnlerde yay\u0131mlanan bir\u00a0<strong><a href=\"https:\/\/www.nytimes.com\/2019\/01\/21\/opinion\/5g-cybersecurity-china.html\" rel=\"nofollow,noopener\" >NY Times makalesinde \u015funlar\u0131 ifade etti<\/a><\/strong><strong>:\u00a0 \u201c<\/strong><em>5G teknolojisinde lider olmak yaln\u0131zca a\u011f kurmakla s\u0131n\u0131rl\u0131 de\u011fildir, bu a\u011f\u0131n sunulan yenilikler i\u00e7in yeterince g\u00fcvenli olmas\u0131 da \u00f6nemlidir.\u201d<\/em>\u00a0 Wheeler yaz\u0131n\u0131n devam\u0131nda,\u00a0<em>\u201cMaalesef kablosuz a\u011flar\u0131m\u0131z, g\u00fcn\u00fcm\u00fczde s\u0131k rastlanan siber sald\u0131r\u0131lara dayan\u0131kl\u0131 bir \u015fekilde tasarlanmad\u0131\u011f\u0131ndan olmas\u0131 gerekti\u011fi kadar g\u00fcvenli de\u011fil. Bu durum a\u011flar\u0131 olu\u015fturan \u015firketlerin hatas\u0131 de\u011fil, g\u00fcncel d\u00f6rd\u00fcnc\u00fc nesil (4G) teknolojisinin standartlar\u0131n\u0131n siber sald\u0131r\u0131lar\u0131n bu kadar yayg\u0131n olmad\u0131\u011f\u0131 bir d\u00f6nemde belirlenmi\u015f olmas\u0131n\u0131n sonucudur.\u201d<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Yeni Bir G\u00fcvenlik Yakla\u015f\u0131m\u0131 \u0130htiyac\u0131<\/strong><\/p>\n<p>5G ile her \u015fey de\u011fi\u015fiyor. Uzaktan sa\u011fl\u0131k hizmetleri, enerji nakil hatlar\u0131n\u0131n uzaktan izlenip denetlenmesi ve otonom s\u00fcr\u00fc\u015f \u00f6zelli\u011fine sahip otomobiller i\u00e7in 5G teknolojilerinden faydalan\u0131lacak. A\u011flar\u0131n da\u011f\u0131t\u0131m alan\u0131 artacak ve kritik uygulamalar\u0131n \u00e7o\u011fu 5G a\u011flar\u0131n u\u00e7 birimlerinde ve u\u00e7 birim bulutlar\u0131nda bar\u0131nd\u0131r\u0131lacak. \u00c7ok a\u015famal\u0131 sald\u0131r\u0131 yapmak ve 5G a\u011flar\u0131n\u0131n en d\u00fc\u015f\u00fck g\u00fcvenlikli b\u00f6l\u00fcmlerindeki a\u00e7\u0131klar\u0131 istismar etmek i\u00e7in otomasyondan faydalanan denetlenmeyen tehdit akt\u00f6rlerinin faydalanabilece\u011fi f\u0131rsatlar artacak. Mobil a\u011flar\u0131n 5G uyumlu olmas\u0131 i\u00e7in yeni bir g\u00fcvenlik yakla\u015f\u0131m\u0131 \u015fart.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:50.4%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-96661 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/01\/5G-Approach-500x252.png\" alt=\"\" width=\"500\" height=\"252\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/01\/5G-Approach-500x252.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/01\/5G-Approach-230x116.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/01\/5G-Approach-768x387.png 768w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/01\/5G-Approach-510x257.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/01\/5G-Approach-79x40.png 79w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/01\/5G-Approach-596x300.png 596w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/01\/5G-Approach.png 822w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>Standartlar\u0131 ve a\u011f mimarisini tan\u0131mlama s\u00fcre\u00e7leri devam ediyor olsa da mobil operat\u00f6rler, bu a\u011flara tasar\u0131m gere\u011fi do\u011fru g\u00fcvenlik \u00f6zelliklerini ekleme f\u0131rsat\u0131na sahip ve bunu yapmalar\u0131 gerekiyor. G\u00fcn\u00fcm\u00fczde ger\u00e7ekle\u015ftirilen siber sald\u0131r\u0131lar, mobil a\u011flar\u0131 istila edebiliyor. Bu sald\u0131r\u0131lar\u0131n her ge\u00e7en g\u00fcn geli\u015fmesine de olduk\u00e7a dikkat edilmesi gerekiyor.<\/p>\n<p>Mobil operat\u00f6rlerin tam olarak 5G i\u00e7in haz\u0131r olabilmesi, \u015fu \u00f6zelliklere sahip sa\u011flam ve kapsaml\u0131 bir u\u00e7tan uca g\u00fcvenlik stratejisi benimsemesine ba\u011fl\u0131d\u0131r:<\/p>\n<ul>\n<li>A\u011f\u0131n uygulama, sinyal ve veri d\u00fczlemi gibi t\u00fcm katmanlar\u0131na uygulanan eksiksiz g\u00f6r\u00fcn\u00fcrl\u00fck, inceleme ve denetim \u00f6zellikleri.<\/li>\n<li>Farkl\u0131 mobil a\u011f konumlar\u0131ndan ve ortamlar\u0131ndan al\u0131nan bilgilerle desteklenen makine \u00f6\u011frenmesi (ML) destekli bulut tabanl\u0131 tehdit analizi.<\/li>\n<li>T\u00fcm a\u011f konumlar\u0131nda tutarl\u0131 g\u00fcvenlik s\u00fcre\u00e7leri olu\u015fturulmas\u0131n\u0131 sa\u011flayan bulut ile uyumlu bir platform.<\/li>\n<\/ul>\n<p>Bu gerekli g\u00fcvenlik \u00f6zellikleri uygulamaya al\u0131nd\u0131ktan sonra mobil a\u011flar ba\u011flama dayal\u0131 g\u00fcvenlik sonu\u00e7lar\u0131 sa\u011flayan veri temelli tehdit \u00f6nleme yakla\u015f\u0131m\u0131yla 5G uyumlu hale gelecektir. Mobil operat\u00f6rler s\u00fcre\u00e7leri otomatikle\u015ftirerek etkilenen cihazlar\u0131 proaktif bir \u015fekilde tan\u0131mlayabilir ve cihaz taraf\u0131ndan ba\u015flat\u0131lan sald\u0131r\u0131lar\u0131 \u00f6nleyebilir. Operat\u00f6rler 5G a\u011flar\u0131ndaki \u00e7e\u015fitli sinyal ve denetim katmanlar\u0131ndan faydalanmaya \u00e7al\u0131\u015facak geli\u015fmi\u015f \u00e7ok a\u015famal\u0131 sald\u0131r\u0131lar\u0131 tespit edebilir. Geli\u015fmi\u015f tehditleri otomatik olarak tan\u0131mlayabilir, bunlar\u0131 belirli cihazlarla\/kullan\u0131c\u0131larla ili\u015fkilendirebilir ve etkilenen cihazlar\u0131 a\u011fdan ay\u0131rabilir\/kald\u0131rabilir. Ayr\u0131ca kendilerini \"g\u00fcvenli i\u015f sa\u011flay\u0131c\u0131lar\u0131\" olarak tan\u0131mlayabilir.<\/p>\n<p>Bu 5G a\u011flar\u0131n\u0131n ilerleyen y\u0131llarda hayatlar\u0131m\u0131z\u0131 pozitif anlamda de\u011fi\u015ftirecek d\u00f6n\u00fc\u015f\u00fcm hizmetlerinin omurgas\u0131n\u0131 olu\u015fturmas\u0131 hedefleniyor. Otonom ara\u00e7lar, uzaktan ameliyat, ak\u0131ll\u0131 fabrikalar veya 5G'den faydalanmam\u0131z\u0131 sa\u011flayacak di\u011fer teknolojik geli\u015ftirmeler konusunda Wheeler'\u0131n da ifade etti\u011fi gibi: \u201c<em>Teknoloji alan\u0131ndaki \u00f6nc\u00fclerin, yat\u0131r\u0131mc\u0131lar\u0131n ve kullan\u0131c\u0131lar\u0131n bu heyecan verici a\u011f\u0131n siber g\u00fcvenlik alan\u0131nda yeterli oldu\u011funa inanmas\u0131 gerekiyor.\u201d<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Bu, g\u00fcvenlik a\u00e7\u0131s\u0131ndan olduk\u00e7a kritik bir ifadedir. \u201c5G i\u00e7in haz\u0131r\u201d \u00fcr\u00fcn ve teknolojilerin say\u0131s\u0131 her ge\u00e7en g\u00fcn art\u0131yor. Ancak bu ifade tam olarak ne anlama geliyor? Mobil Servis Sa\u011flay\u0131c\u0131lar\u0131, kapasite ve performans &hellip;<\/p>\n","protected":false},"author":293,"featured_media":98208,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[4827],"tags":[],"coauthors":[3073],"class_list":["post-98206","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized-tr"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/05\/blog-service-providers-banner-650x300.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/98206","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/293"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=98206"}],"version-history":[{"count":2,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/98206\/revisions"}],"predecessor-version":[{"id":98209,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/98206\/revisions\/98209"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/98208"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=98206"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=98206"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=98206"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=98206"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}