You are on page 1of 12

1HVQHOHULQøQWHUQHWLQLQ*YHQOL÷LQGHøQVDQ)DNW|U

Human Factors in Internet of Things Security


Mevlüt Serkan TOK $OL$\GÕQ6(/d8.
TOBB ETÜ TOBB ETÜ
%LOJLVD\DU0KHQGLVOL÷L%|OP %LOJLVD\DU0KHQGLVOL÷L%|OPü
mtok@etu.edu.tr aselcuk@etu.edu.tr
ORCID: 0000-0002-5048-8409 ORCID: 0000-0002-8963-1647

Öz
øQWHUQHWH ED÷OÕ QHVQHOHU XODúÕP VD÷OÕN HQHUML JLEL healthcare and many other fields with smart devices
VHNW|UOHU LOH DNÕOOÕ ELQD YE X\JXODPDODUGD \R÷XQ producing and sharing data online; but also
RODUDN NXOODQÕOPDNWDGÕU %X QHVQHOHU RWRPDV\RQ YH provided innovative business models and novel user
PDOL\HWDYDQWDMODUÕQÕQ\DQÕVÕUD\HQLOLNoL LúPRGHlleri experiences. Configuring internet of things (IoT)
ve NXOODQÕFÕ GHQH\LPOHUL VXQPDNWDGÕU .XOODQÕFÕODUÕQ devices with easy or default passwords leads to
LQWHUQHWHED÷OÕQHVQHOHULQNRQILJUDV\RQODUÕQGDEDVLW serious vulnerabilities. In recent years, malware
parolalar seçmesi veya bu cihazlarla birlikte gelen (Mirai etc.) which are capable of creating IoT
YDUVD\ÕODQ SDURODODUÕ GH÷LúWLUPHPHOHUL FLGGL botnets and organizing distributed denial of service
JYHQOLN DoÕNODUÕ \DUDWPDNWDGÕU 6RQ \ÕOODUGD Mirai (DDoS) attacks have given rise to service
YE ]DUDUOÕ \D]ÕOÕPODU EX DoÕNOÕNODUÕ V|PUHUHN disruptions, reputational and financial loss. In this
oHYULP LoL QHVQHOHUL HOH JHoLUPHNWH YH GD÷ÕWÕN VHUYLV study, we aimed to emphasize importance of human
GÕúÕ EÕUDNPD VDOGÕUÕODUÕQGD VDOGÕUÕ XQVXUX RODUDN factor in IoT device security. To determine users’
NXOODQDUDN KL]PHW NHVLQWLOHULQH PDGGL ND\ÕSODUD YH perceptions of security and risks related to IoT
LWLEDU ]HGHOHQPHVLQH QHGHQ ROPDNWDGÕU %X devices, preferences of password usage and
oDOÕúPDGD NXOODQÕFÕODUÕQ QHVQHOHULQ LQWHUQHWLQH password security; a questionnaire was employed to
\|QHOLNJYHQOLNYHULVNDOJÕODUÕQÕQSDURODNXOODQÕPÕ collect data and findings were discussed. Some
YH JYHQOL÷LQH GDLU WHUFLKOHULQLQ WHVSLW HGLOmesi ve measures to prevent circulation of IoT devices with
LQVDQ IDNW|UQQ QHVQHOHULQ LQWHUQHWL FLKD]ODUÕQÕQ common default passwords in Turkish market were
JYHQOL÷LQGHNL |QHPLQLQ RUWD\D NRQXOPDVÕ proposed.
DPDoODQPÕúWÕU .DWÕOÕPFÕODUGDQ DQNHW \|QWHPL LOH
YHUL WRSODQDUDN HOGH HGLOHQ EXOJXODU WDUWÕúÕOPÕú Keywords: internet of things, cyber security,
7UNL\H SD]DUÕQGD QHVQHOHULQ LQWHUQHWL FLKD]ODUÕQÕQ password security, mirai, human factor
WHNLO ROPD\DQ YDUVD\ÕODQ SDURODODU LOH NXOODQÕFÕODUD
DU]ÕQÕHQJHOOH\HFHNWHGELUOHU|QHULOPLúWLU 1. Giriú
Anahtar Sözcükler: nesnelerin interneti, siber %LOJL WHNQRORMLOHULQLQ KHU JHoHQ JQ KD\DWÕPÕ]GD
JYHQOLNSDURODJYHQOL÷LPLUDL, insan faktörü GDKDID]OD\HUDOPDVÕLOHLQWHUQHWHED÷OÕYHULDODELOHQ
YH J|QGHUHELOHQ QHVQHOHULQ NXOODQÕPÕ GD
\D\JÕQODúPÕúWÕU 1HVQHOHULQ LQWHUQHWL LQWHUQHW RI
Abstract
things - Io7  RODUDN GD DGODQGÕUÕODQ EX HNRVLVWHP
The growing presence of Internet of Things (IoT) sayesinGH QHUHGH\VH KHU ELUH\LQ \DNÕQ oHYUHVLQGH
devices has not only contributed in digital oHúLWOLDPDoODUODNXOODQÕODQHQD]ELUoHYULPLoLQHVQH
transformation of industry, transportation, EXODELOPHN PPNQGU >@  \ÕOÕQD NDGDU
LQWHUQHWH ED÷OÕ QHVQHOHULQ VD\ÕVÕQÕQ  PLO\DUÕ
DúPDVÕ EHNOHQPHNWHGLU >@ *HQLú NXOODQÕP DODQÕ
Gönderme ve kabul tarihi: 17.10.2019-17.11.2019 bulunan çevrim içL QHVQHOHU VLEHU VDOGÕUÕODUÕQ KHP
faili hem de hedefi olabilmektedir. OWASP
DĂŬĂůĞƚƺƌƺ͗ƌĂƔƚŦƌŵĂ
WDUDIÕQGDn \D\ÕQODQDQ\ÕOÕQHVQHOHULQLQWHUQHWLQL
tehdit eden ilk on zafiyet listesinde nesnelerin

TÜRKøYE BøLøùøM VAKFI BøLGøSAYAR BøLøMLERø ve MÜHENDøSLøöø DERGøSø (2019 Cilt:12 - SayÕ:2) - 1
yönetiminde basit, tahmin edilir, herkesçe 2. Art alan
HULúLOHELOHQ YH\D GH÷LúWLULOHPH] SDUROD NXOODQÕPÕ LON
VÕUDGDEXOXQPDNWDGÕU>@ 0LUDL ]DUDUOÕ \D]ÕOÕPÕQÕQ orijinal versiyonunun
ND\QDN NRGX LQFHOHQGL÷LQGH NRGODUÕQ o D\UÕ
20 Eylül 2016’da KrebsOnSecurity isimli siber E|OPGH %RW /RDGHU &1&  WRSODQGÕ÷Õ bot ve
JYHQOLN NRQXOX ELU EORJ VLWHVL  *%SV¶\H XODúDQ loader bölümlerinin C dili, CNC bölümünün ise Go
ER\XWWD GD÷ÕWÕN KL]PHW GÕúÕ EÕUDNPD VDOGÕUÕVÕQD GLOL LOH \D]ÕOGÕ÷Õ J|UOPHNWHGLU >@ .D\QDN NRGODUÕ
(distributed denial of service-''R6  X÷UDPÕúWÕU %X içerisinde úLIUHOHQHUHN NRGODQPÕú ve root:root,
boyutta bir VDOGÕUÕQÕQ R JQH NDGDU \DSÕOPÕú HQ DGPLQURRWJXHVWJXHVWYE\D\JÕQúHNLOGHNXOODQÕODQ
E\N GD÷ÕWÕN KL]PHW GÕúÕ EÕUDNPD VDOGÕUÕVÕQÕQ  IDUNOÕ NXOODQÕFÕ DGÕSDUROD oLIWL ND\ÕWOÕGÕU
\DNODúÕNLNLNDWÕROGX÷XGH÷HUOHQGLULOPLúWLU>@0LUDL øoHULVLQGH EXOXQDQ VFDQQHU LVLPOL PRGO LOH UDVWJHOH
ERWQHWRODUDNGDDGODQGÕUÕODQEXVDOGÕUÕ\DGDLUND\QDN IP adresleri üretmekte, üretilen adresleri ABD
NRGODUÕ  (\OO ¶GD +DFN)RUXPVQHW |UQ 6DYXQPD %DNDQOÕ÷Õ YE ELU NÕVÕP RUJDQL]DV\RQODUÕQ
sitesinde “Anna-VHQSDL´ NXOODQÕFÕ DGOÕ ELU úDKÕV ,3DGUHVOHULQLLoHUHQELUNDUDOLVWH\OHNÕ\DVOD\DUDNEX
WDUDIÕQGDQ \D\ÕQODQPÕúWÕU >@  (NLP ¶GD RUJDQL]DV\RQODUÕ NDSVDP GÕúÕQGD EÕUDNPDNWDGÕU >@
GLQDPLN '16 VD÷OD\ÕFÕVÕ RODQ '\Q¶H \DSÕODQ hUHWLOHQ ,3 DGUHVLQLQ  YH  SRUWODUÕQD ED÷ODQWÕ
VDOGÕUÕQÕQ ER\XWXQXQ  7%SV¶\H XODúWÕ÷Õ WHVSLW WDOHEL J|QGHUHUHN 7HOQHW SURWRNRO DoÕN PÕ NRQWURO
HGLOPLúWLU NL NHQGL WUQQ HQ E\N ER\XWWDNL HGLOPHNWH DoÕN ROGX÷X WDNGLUGH ND\ÕWOÕ Sarola
VDOGÕUÕVÕ ROPDVÕQÕQ \DQÕ VÕUD |QHPOL VD\ÕGD LQWHUQHW oLIWOHULQL NXOODQDUDN NDED NXYYHW VDOGÕUÕVÕ \DSÕODUDN
VLWHVLQLQKL]PHWGÕúÕNDOPDVÕQD \RODoPÕúWÕU'\QEX 7HOQHW ED÷ODQWÕVÕ NXUXOPDNWD RWXUXP DoPD ELOJLOHUL
VDOGÕUÕ\D NDWÕODQ Xo VLVWHP VD\ÕVÕQÕQ  raporlama sunucusuna gönderilmekte ve yükleyici
FLYDUÕQGD ROGX÷XQX GX\XUPXúWXU >@ 0LUDL ]DUDUOÕ DGÕ YHULOHQ ELU VXQXFX WDUDIÕQGDQ FLKD]D \NO
\D]ÕOÕPÕQÕQ PDQWÕNVDO \DSÕVÕ ùHNLO ¶GH %XV\%R[ X\JXODPDVÕ V|PUOHUHN |QFHGHQ
J|VWHULOPLúWLU KD]ÕUODQPÕúLNLOLNRGODUFLKD]D\NOHQPHNWHYHFLKD]
N|OH D÷ÕQD GDKLO HGLOPHNWHGLU >@

ùHNLO-1: 0LUDL]DUDUOÕ\D]ÕOÕPÕQÕQPDQWÕNVDO\DSÕVÕ.

.|OH D÷ÕQD GDKLO HGLOHQ FLKD]ODU ]HULQGHQ KHGHI


örün sitelerine DNS flood, SYN flood, ACK flood,

TÜRKøYE BøLøùøM VAKFI BøLGøSAYAR BøLøMLERø ve MÜHENDøSLøöø DERGøSø (2019 Cilt:12 - SayÕ:2) - 2
PSH flood, HTTP floRGWHNQLNOHULLOHGD÷ÕWÕNKL]PHW $%'¶GH  WDQHVLQLQ 7UNL\H¶GH EXOXQGX÷X WHVSLW
GÕúÕ EÕUDNPD VDOGÕUÕVÕ \DSDELOPHN PPNQGU >@ HGLOPLúWLU >21@ 'ROD\ÕVÕ\OD KDOHQ ]DDIOÕ FLKD]ODUÕQ
0LUDL YH WUHYOHUL WDUDIÕQGDQ HOH JHoLULOHQ FLKD]ODU NXOODQÕPÕQD ve botnet ROXúWXUPD\D GHYDP HGLOGL÷LQL
DUDVÕQGD úX DQD NDGDU \|QOHQGLULFLOHU GLMLWDO YLGHR GH÷HUOHQGLUPHNPPNQGU
ND\GHGLFLOHU ,3 NDPHUDODU YH \D]ÕFÕODU
EXOXQPDNWDGÕU >@ 3D]DU SD\Õ YH WDVDUÕP XQVXUODUÕ ABD siber olaylara müdahale birimince Mirai vb.
J|] |QQGH EXOXQGXUXODUDN IDUNOÕ FLKD]ODUÕ HOH ]DUDUOÕ \D]ÕOÕPODUD NDUúÕ DOÕQDFDN LON WHGELULQ WP
geçirecek varyantlar kodlamak mümkündür [12]. YDUVD\ÕODQ SDURODODUÕQ JoO SDURODODU LOH
GH÷LúWLULOPHVLROGX÷XGX\XUXOPXúWXr [22@9DUVD\ÕODQ
0LUDL¶QLQ RULMLQDO YHUVL\RQXQGD VDGHFH DoÕN SXEOLF  SDUROD NXOODQÕPÕQÕQ \DUDWWÕ÷Õ JYHQOLN DoÕNODUÕQÕQ
,3 DGUHVLQH VDKLS FLKD]ODU HWNL DOWÕQD DOÕQPÕúNHQ JLGHULOPHVLDPDFÕ\ODELUNÕVÕPILUPDODU\HQLUHWLOHQ
+DMLPHJLELGDKDJHOLúPLúYHUVL\RQODUÕ(YUHQVHO7DN- UQOHULQGHYDUVD\ÕODQSDURODX\JXODPDVÕQÕNDOGÕUPÕú
dDOÕúWÕU 83Q3- 8QLYHUVDO3OXJDQG3OD\ øQWHUQHW$÷ YHVÕQÕUOÕPLNWDUGDNLUQHJQFHOOHPH\D\ÕQODPÕúWÕU
*HoLGL &LKD]Õ ,*'-Internet Gateway Device) Ancak güncellenmeyen ikinFL HO UQOHULQ oHúLWOL
SURWRNROQ GHVWHNOHPH \HWHQH÷L ND]DQPÕú YH ELU VLWHOHU ]HULQGHQ VDWÕúÕQD YH VRQ NXOODQÕFÕ WDUDIÕQGDQ
\|QOHQGLULFL DUNDVÕQGDNL \HUHO ,3 DGUHVLQH VDKLS NXOODQÕPÕQD GHYDP HGLOPHNWHGLU $%' .DOLIRUQL\D
FLKD]ODUÕGDWHKGLWHGHUKDOHJHOPLúWLU>@. H\DOHW VHQDWRVX WDUDIÕQGDQ \D\ÕQODQDQ ELU \DVD
WDVDUÕVÕ >3@ øQJLOL] 7LFDUHW %DNDQOÕ÷Õ WDUDIÕQGDQ
0LUDL¶QLQND\QDNNRGODUÕQÕQ\D\ÕQODQPDVÕRQXDGHWD \D\ÕQODQDQ ELU \|QHWPHOLN >4] ile bu ülkelerde
ELU ]DUDUOÕ \D]ÕOÕP úDEORQX KDOLQH JHWLUPLúWLU >@ UHWLFL YH VDWÕFÕODUÕQ SL\DVD\D VXQGX÷X KHU ELU
0LUDL¶QLQND\QDNNRGODUÕQÕQ\D\ÕQODQPDVÕQGDQVRQUD oHYULPLoL QHVQHQLQ YDUVD\ÕODQ SDURODVÕQÕQ EHQ]HUVL]
N|W QL\HWOL NLúLOHUFH JHOLúWLULOHUHN NXOODQÕOPDVÕQD ROPDVÕ ]RUXQOX KDOH JHWLULOPLú, Avrupa
GHYDP HGLOPLúWLU >@ %X GXUXP 0LUDL WDEDQOÕ 7HOHNRPQLNDV\RQ 6WDQGDUWODUÕ (QVWLWV WDUDIÕQGDQ
]DUDUOÕ \D]ÕOÕP oHúLWOLOL÷LQL DUWWÕUPÕú YH \HQL ELU \D\ÕQODQDQ ETSI TS 103 645 “Cyber Security for
YDU\DQWÕQ RUWD\D oÕNPD VUHVLQL NÕVDOWPÕúWÕU >@ CRQVXPHU,QWHUQHWRI7KLQJV´VWDQGDUWÕLOHWNHWLFL\H
 \ÕOÕQGD LúOHWLOHQ EDO NS WX]DNODUÕQGD  VXQXODQ QHVQHOHULQ LQWHUQHWL FLKD]ODUÕQÕQ JYHQOL
IDUNOÕ SDUROD YH  IDUNOÕ LNLOL NRGXQ HOH WDVDUÕPÕQD\|QHOLNWHPHOLONHler WHVSLWHGLOPLúWLU>25].
JHoLULOPHVL IDUNOÕ SRUWODU YH SURWRNROOHU ]HULQGHQ Eylül 2016’da Türkiye’den 13.780 cihaz Mirai
ED÷ODQWÕ WDOHSOHULQLQ WHVSLWL 0LUDL¶QLQ HYULPOHúPH WDUDIÕQGDQ HOH JHoLULOPHVLQH YH HQIHNWH ROPXú FLKD]
KÕ]ÕQÕQ ELU J|VWHUJHVLGLU >@  \ÕOÕQGD WHVSLW EDUÕQGÕUDQ ONHOHU OLVWHVLQGH \HGLQFL VÕUDGD
HGLOHQ ]DUDUOÕ WUDIL÷LQ ¶LQL QHVQHOHULQ LQWHUQHWL ROXQPDVÕQD UD÷PHQ >@ ONHPL]GH KHQ] RUWDN ELU
NDSVDPÕQGD EXOXQDQ HOH JHoLULOPLú FLKD]ODUÕQ YDUVD\ÕODQ SDUROD LOH \DSÕODQGÕUÕOPÕú D÷ HULúLP
ROXúWXUGX÷X N|OH D÷ODUÕQ PH\GDQD JHWLUGL÷L YH EX \HWHQHNOL QHVQHOHULQ LWKDODWÕQÕ YH\D VDWÕúÕQÕ
D÷ODUÕ ROXúWXUDQ ]DUDUOÕ \D]ÕOÕPODUÕQ HQ D]  HQJHOOH\HQ\DVDOELUG]HQOHPHEXOXQPDPDNWDGÕU
RUDQÕQGD 0LUDL LOH EHQ]HU ND\QDN NRGODUÕ NXOODQGÕ÷Õ %X oDOÕúPDGD NXOODQÕFÕODUÕQ QHVQHOHULQ JYHQOL÷LQH
WHVSLW HGLOPLúWLU >@  \ÕOÕ PDUW D\Õ LWLEDUL\OH GDLU DOJÕ YH H÷LOLPOHULQL WHVSLW HGHUHN 0LUDL YE
0LUDL DUGÕOÕ ]DUDUOÕ \D]ÕOÕPODU oHúLWOL DoÕNOÕNODUÕ ]DUDUOÕ \D]ÕOÕPODUD NDUúÕ ELOJL YH KD]ÕUOÕN G]H\LQL
V|PUPHQLQ \DQÕ VÕUD YDUVD\ÕODQ SDUROD NXOODQÕPD GH÷HUOHQGLUPHN DPDFÕ\OD  VRV\DO PHG\D
yönelik kaba NXYYHW VDOGÕUÕVÕ \DSPD\D GHYDP NXOODQÕFÕVÕQÕQ J|QOO RODUDN NDWÕOGÕ÷Õ ELU oHYULP LoL
HWPLúWLU>@\ÕOÕQLVDQD\ÕLWLEDUL\OH+XDZHLYH DQNHW YDVÕWDVÕ\OD YHUL WRSODQPÕú YH HOGH HGLOHQ
/LQNV\V PDUNDOÕ \|QOHQGLULFLOHU 0LUDL ]DUDUOÕ EXOJXODUWDUWÕúÕOPÕúWÕU
\D]ÕOÕPÕQÕQ HYULPOHúPLú YHUVL\RQODUÕQFD VLEHU
VDOGÕUÕ\D X÷UDPÕú YH EX VDOGÕUÕODUGD HVNL WDULKOL 3. øOJLOLçDOÕúPDODU
DoÕNOÕNODUGDV|PUOPúWr [20].
 \ÕOÕQGD (6(7 úLUNHWL YH $%' 8OXVDO 6LEHU
 \ÕOÕ KD]LUDQ D\Õ LWLEDUL\OH GQ\D oDSÕQGD  *YHQOLN %LUOL÷L 1&6$  WDUDIÕQGDQ JHUoHNOHúWLULOHQ
QXPDUDOÕ SRUWX DoÕN YH LoHULVLQGH %XV\ER[ ELUoDOÕúPDGDNDWÕOÕPFÕQÕQ¶VLQLQHYLQGH-
X\JXODPDVÕ NXUXOX WRSODP  FLKD]  FLKD]ÕQ LQWHUQHW HULúLPLQLQ ROGX÷X %29’unun
EXOXQGX÷X YH EXQODUÕQ  DGHGLQLQ 7UNL\H HYOHULQGHNL PRGHPLQ YDUVD\ÕODQ SDURODVÕQÕ
ORNDV\RQOX ROGX÷X; Mirai komuta kontrol GH÷LúWLUPHGL÷L NDWÕOÕPFÕODUÕQ ¶QQ HYOHULQGHNL
VXQXFXODUÕQÕQ GHVWHNOHGL÷L SURWRNROOHU GRV\D \DSÕVÕ WHUPRVWDWÕQ NRQWURO YE DPDoODU LoLQ PRELO
YH SDUPDN L]L GLNNDWH DOÕQDUDN \DSÕODQ X\JXODPD NXOODQGÕ÷Õ ¶LQLQ ZHE NDPHUDODUÕQ
VRUJXODPDODUGD KDOHQ IDDO GXUXPGD RODQ \DNODúÕN \HWNLVL] NLúLOHUFH HULúLOHELOLU ROGX÷XQXQ IDUNÕQGD
 VXQXFXQXQ ROGX÷X YH EXQODUÕQ \DUÕVÕQÕQ
TÜRKøYE BøLøùøM VAKFI BøLGøSAYAR BøLøMLERø ve MÜHENDøSLøöø DERGøSø (2019 Cilt:12 - SayÕ:2) - 3
ROGX÷X YH ¶VÕQÕQ ZHE NDPHUDODUÕQÕ NRUXPD\D 4. Yöntem
G|QN KHUKDQJL ELU WHGELU DOPDGÕ÷Õ WHVSLW HGLOPLúWLU
[26]. .DWÕOÕPFÕODU

 \ÕOÕQGD  NDWÕOÕPFÕQÕQ DNÕOOÕ WHOHYL]\RQODUD $UDúWÕUPD - 1LVDQ  WDULKOHUL DUDVÕQGD
yönelik mahremiyet ile ilgili risklere dair \UWOPúWU $UDúWÕUPDQÕQ NDWÕOÕPFÕODUÕQÕ VRV\DO
IDUNÕQGDOÕ÷ÕQÕ |OoPHN DPDFÕ\OD \UWOHQ ELU PHG\D NXOODQÕFÕVÕ ELUH\OHU ROXúWXUPDNWDGÕU
oDOÕúPDGD JHQHO RODUDN GúN VHYL\HGH ELU .DWÕOÕPFÕODUD DLW GHPRJUDILN GD÷ÕOÕP Çizelge-1’de
IDUNÕQGDOÕN ROGX÷X J|UOPú NDWÕOÕPFÕODUÕQ VXQXOPXúWXU
¶VÕQÕQ ULVNOHUH GDLU IDUNÕQGDOÕN VDKLEL ROGX÷X Çizelge-1: .DWÕOÕPFÕODUÕQ'HPRJUDILN'D÷ÕOÕPÕ
WHVSLW HGLOPLúWLU $NÕOOÕ WHOHYL]\RQXQ NXOODQÕODELOLUOLN 'H÷LúNHQ Kategori f %
VHYL\HVLQL GúUPHGL÷L VUHFH PDKUHPL\HWLQ Erkek 217 53.32
NRUXQPDVÕQD GDLU DOÕQDFDN WHGELUOHULQ NXOODQÕFÕODU Cinsiyet
.DGÕQ 190 46.68
WDUDIÕQGDQEHQLPVHQHFH÷LVRQXFXQDYDUÕOPÕúWÕU>7].
18-20 61 14.99
 \ÕOÕ PDUW D\Õ LoHULVLQGH \D\ÕQODQPÕú ELU 21-30 194 47.67
oDOÕúPDGD  NDWÕOÕPFÕ\D oHYULP LoL DQNHW 31-40 124 30.47
X\JXODQPÕúYHNDWÕOÕPFÕODUÕQ¶QQKHUKDQJLELU <Dú
41-50 25 6.14
LQWHUQHWHED÷OÕQHVQH\HVDKLSROPDGÕ÷Õ¶VÕQÕQELU 51-60 3 0.74
QHVQH\H ¶VLQLQ LNL YH\D GDKD ID]OD VD\ÕGD
61 ve üzeri 0 0
QHVQH\H VDKLS ROGX÷X J|UOPúWU .DWÕOÕPFÕODUÕQ
øONRNXO 1 0.25
oR÷XQOX÷X JYHQOLN   YH PDKUHPL\HWLQ  
LQWHUQHWH ED÷OÕ ELU QHVQHQLQ VDKLS ROPDVÕ JHUHNHQ Ortaokul 5 1.23
|]HOOLNOHUGHQ ROGX÷XQX EHOLUWPLúWLU øQWHUQHWH ED÷OÕ Lise 44 10.81
(÷LWLP
bir nesneniQVDKLSROPDVÕJHUHNHQ|]HOOLNOHULQ|QHP Ön lisans 32 7.86
durumu
GHUHFHVLQH J|UH VÕUDODQPDVÕ VRUXVXQGD LVH Lisans 227 55.77
NDWÕOÕPFÕODUÕQ oR÷XQOX÷XQXQ   NXUXOXP Yüksek Lisans 66 16.22
NROD\OÕ÷Õ NXOODQÕP NROD\OÕ÷Õ X\JXQOXN JYHQOLN YH Doktora 32 7.86
PDKUHPL\HW \HULQH PDOL\HW |]HOOL÷LQL LON VÕUDGD
VHoWL÷L WHVSLW HGLOPLúWLU %X GXUXP ³NXOODQÕFÕODU (÷LWLPYH\D +D\ÕU 353 86.73
WDUDIÕQGDQ WHRULN RODUDN JYHQOLN YH PDKUHPL\HWH oDOÕúPDDODQÕ
önem verilse de pratikte maliyetin daha önemli bir bilgi
IDNW|U RODUDN J|UOG÷´ úHNOLQGH \RUXPODQPÕúWÕU teknolojileri /
Evet 54 13.27
[28]. siber güvenlik
ile ilgili mi?
7UNL\H¶GHNL ELOJLVD\DU NXOODQÕFÕODUÕQÕQ ELOJL
JYHQOL÷LQH GDLU JHQHO IDUNÕQGDOÕk seviyelerini
|OoPHN DPDFÕ\OD oRN VD\ÕGD oDOÕúPD \DSÕOPÕúWÕU
[29]-[31@ DQFDN EX oDOÕúPDODU LQFHOHQGL÷LQGH  \ÕOÕQGD 7UNL\H¶GH  PLO\RQ VRV\DO PHG\D
genellikle üniversite vb. bir organizasyon bünyesinde NXOODQÕFÕVÕ ROGX÷X >32] göz önünde bulundurularak
NÕVÕWOÕ ELU HYUHQL WHPVLO HGHQ |UQHNOHP LOH LFUD  JYHQ G]H\LQGH YH  KDWD SD\Õ GLNNDWH
HGLOGL÷LJ|UOPHNWHGLU<DSÕODQOLWHUDWUWDUDPDVÕQGD DOÕQGÕ÷ÕQGD  NDWÕOÕPFÕGDQ ROXúDQ ELU |UQHNOHPLQ
ONHPL]GHNLNXOODQÕFÕODUÕQQHVQHOHULQLQWHUQHWLQHGDLU VRV\DO PHG\D NXOODQÕFÕODUÕQÕ WHPVLO HGHELOHFH÷L
JYHQOLNDOJÕVÕQÕYH\DIDUNÕQGDOÕNG]H\LQL|OoHQELU GH÷HUOHQGLULOPLúWLU  *|QOOON HVDVÕQD J|UH WRSODP
oDOÕúPD\DUDVWODQÕOPDPÕúWÕU  NXOODQÕFÕ DUDúWÕUPD\D NDWÕOPÕú  NXOODQÕFÕ
DUDúWÕUPD\ÕWDPDPODPÕúWÕU.DWÕOÕPFÕODUÕQDUDúWÕUPD\Õ
WDPDPODPD RUDQÕ ¶GÕU .DWÕOÕPFÕODU ZZZ
facebook.com, www.linkedin.com,
www.twitter.com, www.eksisozluk.com örün siteleri
]HULQGHQ HULúLP OLQNL LoHULU GDYHW PHWQL
SD\ODúÕOPDVÕ VXUHWL\OH DUDúWÕUPD\D GDYHW HGLOPLúWLU
.DWÕOÕPFÕODUÕQ DUDúWÕUPD\D NDWÕOÕPÕQÕ WHúYLNH \|QHOLN
herhangi bir motivasyon (ödeme vb.)
VD÷ODQPDPÕúWÕU

TÜRKøYE BøLøùøM VAKFI BøLGøSAYAR BøLøMLERø ve MÜHENDøSLøöø DERGøSø (2019 Cilt:12 - SayÕ:2) - 4
Veri toplama aUDFÕ 5. Bulgular
$QNHWOHU XFX] ELU \|QWHP ROPDVÕ YH PHYFXW øúOHWLPsistemi ve web tDUD\ÕFÕtercihleri
GDYUDQÕúODUÕQ WHVSLWL KXVXVXQGD YHUL WRSODPD\D
X\JXQOX÷X QHGHQL\OH WHUFLK HGLOPHNWHGLU >3]. Bu .DWÕOÕPFÕODUÕQ E\N oR÷XQOX÷X  
oDOÕúPDGD ELULQFLO YHULOHU oHYULPLoL DQNHW YDVÕWDVÕ\OD ELOJLVD\DUODUÕQGD LúOHWLP VLVWHPL RODUDN |QFHOLNOH
toSODQPÕúWÕU $UDúWÕUPD WDUDPD PRGHOL NXOODQÕODUDN :LQGRZV GD÷ÕWÕPODUÕQÕ WHUFLK HWPLúWir. Örün siteleri
JHUoHNOHúWLULOPLúWLU $QNHWLQ JHOLúWLULOPHVLQGH DODQ ]L\DUHWOHULQGH NDWÕOÕPFÕODUÕQ oR÷XQOXNOD  
\D]ÕQGDNLEHQ]HUDUDúWÕUPDODUGDQID\GDODQÕOPÕúWÕU *RRJOH &KURPH ZHE WDUD\ÕFÕVÕQÕ NXOODQGÕNODUÕ WHVSLW
HGLOPLúWLU .DWÕOÕPFÕODUÕQ LúOHWLP VLVWHPL YH ZHE
Anket üçüncü taraf bir örün sitesi üzerinden WDUD\ÕFÕWHUFLKOHULQLQWHVSLWLQH\|QHOLNVRUXODQVRUXODU
JHUoHNOHúWLULOPLúWLU 0RELO FLKD]ODU YH ELOJLVD\DU YHYHULOHQ\DQÕWODUÇizelge-2¶GHVXQXOPXúWXU
üzerinGHQ DQNHWH NDWÕOÕP VD÷ODQPÕú VLWH WDUDIÕQGDQ
WXWXODQ oHUH] ELOJLVL LOH D\QÕ FLKD]ODUGDQ NDWÕOÕP Çizelge-2: øúOHWLP6LVWHPLYH:HE7DUD\ÕFÕ
Tercihleri
HQJHOOHQPLúWLU $QNHW |QFHVLQGH NDWÕOÕPFÕODUGDQ H-
Soru f %
SRVWD DGUHVL YE NLúLVHO ELOJLOHU WDOHS HGLOPHPLú
S5 - %LOJLVD\DUÕQÕ]GD Windows
DQNHWPGGHWLQFH,3DGUHVLELOJLVLWXWXOPDPÕúWÕU Her 369 91,11
KDQJLLúOHWLPVLVWHPLQL GD÷ÕWÕPODUÕ
bir NDWÕOÕPFÕ\D DQNHWH NDWÕOGÕ÷Õ DQGDQ LWLEDUHQ ELU
NXOODQÕ\RUVXQX]" Mac OS 58 14,32
NLPOLN QXPDUDVÕ DWDQPÕú YH \DQÕWODU EX NLPOLN %LUGHQID]ODVHoHQH÷L Linux
QXPDUDVÕ VDWÕUÕQD ND\GHGLOPLúWLU $QNHW LúDUHWOH\HELOLUVLQL] GD÷ÕWÕPODUÕ
27 6,67
EDúODQJÕFÕQGDNDWÕOÕPFÕODUDD\GÕQODWÕOPÕúRQDPPHWQL Google
YDVÕWDVÕ\OD ELOJL YHULOPLú YH J|QOO UÕ]DODUÕ 351 86,67
Chrome
DOÕQPÕúWÕU$QNHWVRQXQGDDQOÕNLVWDWLVWLNVHOVRQXoODU S10 - %LOJLVD\DUÕQÕ]GD Mozilla
NDWÕOÕPFÕODUD J|VWHULOPLúWLU $QNHW WRSODP RQ DOWÕ 122 30,12
KDQJLZHEWDUD\ÕFÕ\Õ Firefox
VRUXGDQ ROXúPDNWDGÕU .XOODQÕFÕODUÕQ GHPRJUDILN NXOODQÕ\RUVXQX]" Opera 87 21,48
ELOJLOHUL G|UW VRUXGD LúOHWLP VLVWHPL YH ZHE WDUD\ÕFÕ %LUGHQID]ODVHoHQH÷L Internet
75 18,52
tercihleri iki VRUXGD SDUROD NXOODQÕPÕ YH LúDUHWOH\HELOLUVLQL] Explorer
JYHQOL÷LQHGDLUH÷LOLPOHU EHúVRUXGDQHVQHOHULQ Safari 57 14,07
LQWHUQHWLYHVLEHUJYHQOLNNRQXVXQGDNLH÷LOLPOHU Yandex 41 10,12
G|UW VRUXGD |OoOPúWU .DWÕOÕPFÕODUGDQ LVWH÷H Microsoft
29 7,16
ED÷OÕ EH\DQ HGLOHQ J|Uú YH |QHULOHU DoÕN XoOX Edge
FHYDS YHULOHQ VRQ VRUX\OD WRSODQPÕúWÕU $QNHWWH TOR 27 6,67
toplamda dokuz adet çoktan seçmeli (tek
FHYDSOÕ EHúDGHWoRNWDQVHoPHOL oRNFHYDSOÕ  3DURODNXOODQÕPÕYHJYHQOL÷LQHGDLUH÷LOLPOHU
ELU DGHW VÕUDODPD ELU DGHW DoÕN XoOX VRUX
VRUXOPXúWXU .DWÕOÕPFÕODUÕQSDURODNXOODQÕPÕQDYHJYHQOL÷LQHGDLU
DOJÕ YH WHUFLKOHULQL EHOLUOHPHN DPDFÕ\OD WRSODP DOWÕ
Verilerin analizi DGHWVRUXVRUXOPXúWXU
9HULOHU VRQXoODUÕQ DQDOL]LYH LNL GH÷LúNHQOL .L-Kare .DWÕOÕPFÕODUGDQ JQON \DúDQWÕODUÕQGD NXOODQGÕNODUÕ
WHVWL RODUDN LNL WHPHO NDWHJRUL DOWÕQGD DQDOL] DOWÕ D\UÕ SDUROD\Õ |QHP GHUHFHVLQH J|UH VÕUDODPDODUÕ
HGLOPLúWLU 7P DQDOL]OHU ,%0 6PSS Statistics V.22 LVWHQPLúWLU (Q |QHPOL SDUROD RODUDN LQWHUQHW
\D]ÕOÕPÕLOHJHUoHNOHúWLULOPLúWLU EDQNDFÕOÕN SDURODVÕ VHoLOPLú VÕUDVÕ\OD H-SRVWD KHVDEÕ
$QNHWWH\HUDODQPDGGHOHULQWRSODQGÕ÷ՁoDQDEDúOÕN SDURODVÕ VRV\DO PHG\D KHVDEÕ SDURODVÕ HYOHULQGHNL
RODQLúOHWLPVLVWHPLYHZHEWDUD\ÕFÕWHUFLKOHULSDUROD yönlendiricinin (modem) yönetici parolasÕ WDNLS
NXOODQÕPÕ YH JYHQOL÷LQH GDLU H÷LOLPOHU QHVQHOHULQ HGLOHQ ELU IRUXP VLWHVLQLQ SDURODVÕ YH WHNUDU JLUPH\L
LQWHUQHWL YH VLEHU WHKGLW DOJÕODUÕ LOH LOJLOL VRUXODUÕQ GúQPHGLNOHUL ELU VLWHQLQ SDURODVÕ NDWÕOÕPFÕODUFD
\DQÕWODUÕ\]GHYHIUHNDQVLOHEHWLPOHQPLúWLU |QHPOLJ|UOPúWU

Bilgi teknolojileri veya siber güvenlik konusunda 3DURODWUOHULQLQNDWÕOÕPFÕODUFDEHOLUOHQPLúVÕUDVÕJ|]


H÷LWLPJ|UPúYH\DEXDODQODUGDoDOÕúDQNDWÕOÕPFÕODU önünde bulundurularak (1) QXPDUDOÕGHQNOHP ile her
³ELOJL VDKLEL NDWÕOÕPFÕ´ RODUDN VÕQÕIODQGÕUÕOPÕú YH EX ELUSDURODQÕQ|QHPVNRUXKHVDSODQPÕúWÕU
NLúLOHULQ \DQÕWODUÕQÕQ GL÷HU NDWÕOÕPFÕODUÕQ \DQÕWODUÕ\OD
QHNDGDUIDUNOÕODúWÕ÷Õ.L-.DUHWHVWLLOHLQFHOHQPLúWLU

TÜRKøYE BøLøùøM VAKFI BøLGøSAYAR BøLøMLERø ve MÜHENDøSLøöø DERGøSø (2019 Cilt:12 - SayÕ:2) - 5
Sa= 6*k1+5*k2+4*k3+3*k4+2*k5+1*k6 (1) YHULOHQ SDUROD\Õ FLKD]ÕQ LON NXUXOXPX HVQDVÕQGD
n GH÷LúWLULUNHQ ¶QQ YDUVD\ÕODQ SDUROD\Õ
GH÷LúWLUPHGHQ sürekli NXOODQGÕ÷Õ EHOLUOHQPLúWLU
™Ni KDWÕOÕPFÕODUÕQ ELOGL÷L J|UOPúWU .DWÕOÕPFÕODUÕQ
i=1 ¶VÕQÕQ PRGHP \|QOHQGLULFL  FLKD]ÕQÕQ ELU
VLEHU VDOGÕUÕ\D PDUX] NDODELOHFH÷LQL ELOGL÷L
Sa D SDURODVÕQÕQ VNRUXQX Ni D SDURODVÕQÕ L |QHP
GHUHFHVLQH VDKLS SDUROD RODUDN VHoHQ NDWÕOÕPFÕ ¶QQ NDEORVX] \D]ÕFÕODUÕQ VLEHU VDOGÕUÕ\D
PDUX]NDODELOHFH÷LQLELOGL÷LWHVSLWHGLOPLúWLU
VD\ÕVÕQÕWHPVLOHWPHNWHGLU +HVDSODQDQ|QHPVNRUODUÕ
ùHNLO-2¶GHVXQXOPXúWXU Bilgi sahibi kaWÕOÕPFÕ \DQÕWODUÕQÕQ GL÷HU NDWÕOÕPFÕ
\DQÕWODUÕ\ODNDUúÕODúWÕUÕOPDVÕ
.DWÕOÕPFÕODUÕQ oR÷XQOX÷X ELU SDURODQÕQ JoO
ROPDVÕQÕQ   YH KDWÕUODQPDVÕQÕQ NROD\
ROPDVÕQÕQ   SDUROD VHoLPLQGH HQ |QHPOL $UDúWÕUPD\DNDWÕODQELUH\OHUHELOJLWHNQRORMLOHULYH\D
IDNW|U ROGX÷XQX GúQPHNWHGLU .DWÕOÕPFÕODUÕQ VLEHU JYHQOLN ]HULQH H÷LWLP DOÕS DOPDGÕNODUÕ YH\D
¶L NHQGLOHULQH J|VWHULOHQ EHú D\UÕ SDURODGDQ EX DODQGD oDOÕúÕS oDOÕúPDGÕNODUÕ VRUXODUDN ELOJL
“7ujMkRDGPLQ´ SDURODVÕQÕ HQ   JYHQOL    SDUROD teknolojileri ve siber güvenlik konusunda bilgi sahibi
RODUDNVHoPLúWLU³6(D\V´SDURODVÕNDWÕOÕPFÕODUÕQ ROGX÷X GH÷HUOHQGLULOHQ ELUH\OHU WHVSLW HGLOPLú YH
¶VL WDUDIÕQGDQ HQ JYHQOL SDUROD RODUDN WHUFLK NÕVDFD ³ELOJL VDKLEL NDWÕOÕPFÕ´ RODUDN
HGLOPLúWLU.DWÕOÕPFÕODUÕQoR÷XQOX÷X  SDUROD VÕQÕIODQGÕUÕOPÕúWÕU7RSODQDQ\DQÕWODUÕQNDWHJRULNYHUL
VHoHUNHQKDOHQNXOODQGÕ÷ÕELUNDoSDURODEXOXQGX÷XQX ROPDPDVÕ QHGHQL\OH LNL VRUX .L-Kare testine tabi
YH EX SDURODODU DUDVÕQGDQ VHoLP \DSWÕ÷ÕQÕ EH\DQ tutulmadan Çizelge-5’te J|UOG÷ ]HUH çapraz
HWPLúNDWÕOÕPFÕODUÕQoR÷XQOX÷X  SDURODODUÕQÕ NDUúÕODúWÕUPD\DSÕOPÕúEHúVRUX\DYHULOHQ\DQÕWODULVH
VDNODPD \|QWHPL RODUDN DNÕOGD WXWPD VHoHQH÷LQL G]HQOHQHUHNNDWÕOÕPFÕODUÕQYHUGLNOHUL\DQÕWODUÕQELOJL
WHUFLK HWPLúWLU .DWÕOÕPFÕODUÕQ SDUROD NXOODQÕPÕ YH VDKLEL ROPD GH÷LúNHQLQH J|UH oDSUD]ODQPDVÕ LOH .L-
JYHQOL÷LQH GDLU H÷LOLPOHULQLQ WHVSLWLQH \|QHOLN .DUH WHVWL JHUoHNOHúWLULOPLú YH GD÷ÕOÕPODU DUDVÕQGD
sorulDQ VRUXODU YH YHULOHQ \DQÕWODU Çizelge-3’te LVWDWLVWLNVHODoÕGDQDQODPOÕIDUNEXOXQXSEXOXQPDGÕ÷Õ
VXQXOPXúWXU WHVSLWHGLOPLúWLU

1HVQHOHULQLQWHUQHWLYHVLEHUWHKGLWDOJÕODUÕ %LOJL VDKLEL NDWÕOÕPFÕODUÕQ ELU |UQ VLWHVLQH VLEHU


VDOGÕUÕ \DSDELOHFHN FLKD]ODUÕ GR÷UX VHoPH RUDQÕQÕQ
.DWÕOÕPFÕODUÕQ QHVQHOHULQ LQWHUQHWLQLQ JYHQOL÷L YH GL÷HU NDWÕOÕPFÕODUD RUDQOD GDKD \NVHN ROGX÷X
VLEHU WHKGLW DOJÕODUÕQÕ WHVSLW HWPHN DPDFÕ\OD VRUXODQ J|UOPúWU %HQ]HU ELU úHNLOGH EX NDWÕOÕPFÕODUÕQ
G|UW DGHW VRUX\D YHULOHQ \DQÕWODU Çizelge-4’te VLEHU VDOGÕUÕ\D PDUX] NDODELOHFHN FLKD]ODUÕ WHVSLW
VXQXOPXúWXU .DWÕOÕPFÕODUÕQ ¶LQLQ VDWÕQ etme oUDQÕQÕQGL÷HUNDWÕOÕPFÕODUDRUDQODGDKD\NVHN
DOGÕNODUÕ PRGHP ,3 NDPHUD YE ELU FLKD]OD ELUOLNWH ROGX÷XJ|UOPúWU

ùHNLO-2: .DWÕOÕPFÕODUÕQSDUROD|QHPVÕUDODPDVÕVRQXFXKHVDSODQDQ|QHPVNRUODUÕ

TÜRKøYE BøLøùøM VAKFI BøLGøSAYAR BøLøMLERø ve MÜHENDøSLøöø DERGøSø (2019 Cilt:12 - SayÕ:2) - 6
Çizelge-3: 3DUROD.XOODQÕPÕQD'DLU$OJÕYH7HUFLKOHU
Soru f %
*oOROPDOÕ ]RUWDKmin edilmeli) 320 79,01
S12 - Sizce bir parola seçiminde en
+DWÕUODPDVÕNROD\ROPDOÕ 183 45,19
önemli faktör nedir?
(÷OHQFHOLYH\DLOJLQoROPDOÕ 26 6,42
%LUGHQID]ODVHoHQH÷L
.ÕVDROPDOÕNROD\\D]ÕOPDOÕ 13 3,21
LúDUHWOH\HELOLUVLQL]
'L÷HU 13 3,21
7ujMko0admin 193 47,65
SEays214. 189 46,67
S13 - 6L]FHDúD÷ÕGDNLSDURODODUGDQKDQJLVL
Nisan2019. 10 2,47
HQJYHQOLSDURODGÕU"
147258 9 2,22
I love you2 4 0,99
.XOODQGÕ÷ÕPELUNDoSDURODPYDURQODUÕQDUDVÕQGDQ
265 65,43
seçerim.
+HUKHVDSLoLQD\UÕSDURODVHoHULP 69 17,04
S14 – 3DURODODUÕQÕ]ÕQDVÕOVHoHUVLQL]"
dR÷XQOXNODD\UÕSDURODODUVHoHrim, bunlar nadiren
45 11,11
ELUELULQLQD\QÕRODELOLU
+HSVLD\QÕSDURODGÕU 26 6,42
$NOÕPGDWXWDUÕP 282 69,63
%LOJLVD\DUÕPGDYH\DFHSWHOHIRQXPGDELUGRV\D
49 12,1
üzerine kaydederim.
S15 – 3DURODODUÕQÕ]ÕoR÷XQOXNODQDVÕO
.k÷ÕGDSRVW-LWYEIL]LNVHOELURUWDPD\D]DUÕP 29 7,16
VDNODPD\ÕWHUFLKHGHUVLQL]"
:HEWDUD\ÕFÕPDKDWÕUODPDVÕLoLQND\GHGHULP 20 4,94
3DUROD\|QHWLPSURJUDPÕNXOODQÕUYHRQDND\GHGHULP 23 5,65
'L÷HU 2 0,49

Çizelge-4: 1HVQHOHULQøQWHUQHWLYH6LEHU7HKGLW$OJÕVÕ
Soru f %
S4 - 6DWÕQDOGÕ÷ÕQÕ]ELUFLKD]ODYHULOHQ .XOODQPDGDQLONNXUXOXPGDGH÷LúWLULULP 241 59,51
örn. yönlendirici (modem), IP kamera D\DNDGDUNXOODQÕUÕP 4 0,99
YELOHELUOLNWHYHULOHQ\|QHWLFLSDURODVÕQÕ D\DNDGDUNXOODQÕUÕP 12 2,96
(örn. admin, root vb.) ne kadar süreyle D\DNDGDUNXOODQÕUÕP 30 7,41
NXOODQÕUVÕQÕ]" 6UHNOLNXOODQÕUÕP 118 29,14
1-Hedef olma ihtimalim yoktur. 68 16,79
S6 - %LUVLEHUVDOGÕUÕQÕQKHGHILROPD 2-Hedef olPDLKWLPDOLPD]GÕU 184 45,43
ihtimalinizi 1-DUDVÕQGDSXDQOD\ÕQÕ]  3-+HGHIROXSROPDPDLKWLPDOLPD\QÕGÕU 112 27,65
en yüksek ihtimal) 4-Hedef olma ihtimalim yüksektir. 20 4,94
5-Kesinlikle hedefim. 21 5,19
Yönlendirici (modem) 267 65,93
IP kamera 174 42,96
S9 - $úD÷ÕGDNLFLKD]ODUGDQKDQJLOHUL\OH
Kablosuz bebek monitörü 91 22,47
ELUZHEVLWHVLQHVLEHUVDOGÕUÕ\DSÕODELOLU"
'LMLWDOYLGHRND\ÕWFLKD]Õ '95 86 21,23
(Birden fazla VHoHQH÷L
.DEORVX]\D]ÕFÕ 82 20,25
LúDUHWOH\HELOLUVLQL]
79X]DNWDQNXPDQGDVÕ 28 6,91
Fotoselli lamba 18 4,44
Yönlendirici (modem) 306 75,56
S11 - AúD÷ÕGDNLFLKD]ODUGDQKDQJLOHUL $NÕOOÕWHOHYL]\RQ 295 72,84
VLEHUVDOGÕUÕODUDPDUX]NDODELOLU" IP kamera 279 68,89
%LUGHQID]ODVHoHQH÷L Kablosuz bebek monitörü 183 45,19
LúDUHWOH\HELOLUVLQL] .DEORVX]\D]ÕFÕ 180 44,44
$NÕOOÕEX]GRODEÕ 174 42,96
Mutfak robotu 27 6,67
Elektrikli süpürge 20 4,94

TÜRKøYE BøLøùøM VAKFI BøLGøSAYAR BøLøMLERø ve MÜHENDøSLøöø DERGøSø (2019 Cilt:12 - SayÕ:2) - 7
Çizelge-%LOJL6DKLEL2OPD'H÷LúNHQLQH*|UH %LU VLEHU VDOGÕUÕQÕQ KHGHIL ROPD LKWLPDOLQH GDLU KHU
<DQÕWODUÕQ.DUúÕODúWÕUPDVÕ LNL NDWÕOÕPFÕ JUXEXQ YHUGLNOHUL \DQÕWODU DUDVÕQGD
LVWDWLVWLNVHO DoÕGDQ DQODPOÕ IDUN EXOXQGX÷X WHspit
Bilgi sahibi HGLOPLúWLU%LOJLVDKLELNDWÕOÕPFÕODUGDQNHQGLOHULQLELU
NDWÕOÕPFÕPÕ" VLEHUVDOGÕUÕQÕQKHGHILROPDLKWLPDOLQLoRN\NVHNYH
Evet +D\ÕU NHVLQ RODUDN GH÷HUOHQGLUHQOHULQ RUDQÕ  LNHQ
Soru (%) (%)
GL÷HU NDWÕOÕPFÕODUGD EX RUDQ ¶GLU Ki-Kare
Modem 83,3 62,8
S9 - $úD÷ÕGDNL WHVWLQH WDEL WXWXODQ \DQÕWODUD \|QHOLN LVWDWistiksel
Dijital video
cihazlardan 31,4 19,5 DQDOL]VRQXoODUÕÇizelge-6¶GDVXQXOPXúWXU
ND\ÕWFLKD]Õ
hangileriyle bir
web sitesine
Kablosuz bebek
35,1 20,3 6. 7DUWÕúPD
monitörü
VLEHUVDOGÕUÕ .DWÕOÕPFÕODUÕQ SDUROD VHoHUNHQ ]RU WDKPLQ HGLOHQ YH
IP kamera 53,7 41
\DSÕODELOLU" DNÕOGD NDOÕFÕOÕ÷Õ EXOXQDQ SDURODODUÕ WHUFLK HWPHVL
.DEORVX]\D]ÕFÕ 37 17 bireylerde belirli bir güvenli parola seçim kriterinin
Kablosuz bebek ROXúWX÷XQX J|VWHUPHNWHGLU .DWÕOÕPFÕlar yeni bir
61,1 42,4
monitörü SDUROD EHOLUOHUNHQ NXOODQGÕNODUÕ ELUNDo SDUROD
S11 - $úD÷ÕGDNL
IP kamera 77,7 67,3 LoHULVLQGHQ VHoLP \DSPDNWD YH SDURODODUÕQÕ GL÷HU
cihazlardan VDNODPD \|QWHPOHULQH QD]DUDQ DNÕOGD WXWPD\Õ WHUFLK
$NÕOOÕ79 74 72,5
hangileri siber HWPHNWHGLU .DWÕOÕPFÕODU HYOHULQGHNL \|QOHQGLULFLQLQ
$NÕOOÕEX]GRODEÕ 53,7 41
VDOGÕUÕODUDPDUX] \|QHWLFL SDURODVÕQÕ EDQNDFÕOÕN H-posta ve sosyal
Yönlendirici
kalabilir? 83,3 74,2 PHG\D KHVDS SDURODODUÕQGDQ GDKD |QHPVL]
(modem)
görmektedir.
.DEORVX]\D]ÕFÕ 57,4 42,4
.DWÕOÕPFÕODUNDUDNWHUVD\ÕVÕID]ODYHIDUNOÕ|]QLWHOLNOL
%LOJL VDKLEL NDWÕOÕPFÕODU LOH GL÷HU NDWÕOÕPFÕODUÕQ VDWÕQ NDUDNWHUOHUGHQ ROXúDQ SDURODODUÕQ JYHQOL ROGX÷XQX
DOÕQDQ FLKD]ODUGDNL YDUVD\ÕODQ SDURODODUÕ LON ELOPHNWHGLU $QFDN o \ÕOGÕU oHúLWOL VLEHU VDOGÕUÕODUGD
NXUXOXPGD GH÷LúWLUPH RUDQODUÕ DUDVÕQGD LVWDWLVWLNVHO rolü olan 0LUDL]DUDUOÕ\D]ÕOÕPÕQÕQ ND\QDNNRGODUÕQGD
DoÕGDQ DQODPOÕ IDUN EXOXQGX÷X J|UOPúWU %LOJL NÕUÕODFDNSDURODODUDUDVÕQGDEXOXQDQYHDahua marka
VDKLELNLúLOHULQVDWÕQDOGÕNODUÕPRGHP,3NDPHUDJLEL ELU NÕVÕP ,3 NDPHUDODUÕQ YDUVD\ÕODQ SDURODVÕ ROGX÷X
FLKD]ODUOD ELUOLNWH YHULOHQ YDUVD\ÕODQ SDUROD\Õ LON bilinen ³XM0NRDGPLQ´ VHoHQH÷LQLQ NDWÕOÕPFÕODUÕQ
NXUXOXPGD GH÷LúWLUPH RUDQÕ  LNHQ GL÷HU oR÷XQOX÷X WDUDIÕQGDQ HQ JYHQOL SDUROD RODUDN WHUFLK
NDWÕOÕPFÕODUGDEXRUDQ¶GLU HGLOPHVL NDWÕOÕPFÕODUÕQ 0LUDL WDUDIÕQGDQ KHGHI DOÕQDQ
SDURODNWSKDQHVLQLELOPHGL÷LQLJ|VWHUPHNWHGLU
Güvenli parola seçim sorusunda bilgi sahibi
KDWÕOÕPFÕODU oR÷XQOXNOD VDWÕQ DOGÕNODUÕ ELU FLKD]ÕQ
NDWÕOÕPFÕODULOHGL÷HUNDWÕOÕPFÕODUÕQ³XM0NRDGPLQ´
YDUVD\ÕODQ SDURODVÕQÕ LON NXUXOXPGD GH÷LúWLUPHNWHGLU
YH³6(D\V´VHoHQHNOHULQLWHUFLKHWPHRUDQODUÕQGD DQFDN KHU EHú NDWÕOÕPFÕGDQ LNLVLQLQ VDWÕQ DOGÕNODUÕ
LVWDWLVWLNVHO DoÕGDQ DQODPOÕ ELU IDUNOÕOÕN WHVSLW FLKD]ODUGDNL YDUVD\ÕODQ SDUROD\Õ LON NXUXOXPGD
HGLOPHPLúWLU GH÷LúWLUPHPHVL EX NRQXGD FLGGL ELU ELOLQoVL]OLN
%LOJLVDKLELNDWÕOÕPFÕODUYHGL÷HUNDWÕOÕPFÕODUÕQSDUROD ROGX÷XQX J|VWHUPHNWHGLU .DWÕOÕPFÕODUGD LQWHUQHWH
saklama tercihlerLQLQGD÷ÕOÕPÕQGDLVWDWLVWLNVHODoÕGDQ ED÷OÕ QHVQHOHULQ VLEHU VDOGÕUÕ\D PDUX] NDODELOHFH÷L
DQODPOÕ IDUN ROGX÷X J|UOPú ROXS ELOJL VDKLEL ELOLQFL NÕVPHQ ROXúVD GD EX QHVQHOHUOH VLEHU VDOGÕUÕ
\DSÕODELOHFH÷LELOLQFL\HWHUOLVHYL\HGHGH÷LOGLU
NDWÕOÕPFÕODUÕQ SDURODODUÕQÕ DNÕOGD WXWPD RUDQÕ 
GL÷HU NDWÕOÕPFÕODUÕQ SDURODODUÕQÕ DNÕOGD WXWPD RUDQÕ .DWÕOÕPFÕODUÕQ oR÷XQOX÷X ELU VLEHU VDOGÕUÕ\D KHGHI
¶WU%LOJLVDKLELNDWÕOÕPFÕODUÕQSDUROD\|QHWLP ROPDLKWLPDOLQLQEXOXQPDGÕ÷ÕQÕYH\DEXLKWLPDOLQD]
SURJUDPÕ NXOODQPD RUDQÕ  GL÷HU NDWÕOÕPFÕODUÕQ ROGX÷XQXEHOLUWPLúWLUøVWH÷HED÷OÕEH\DQHGLOHQJ|Uú
SDUROD\|QHWLPSURJUDPÕNXOODQPDRUDQÕ¶WU YH |QHULOHULQ WRSODQGÕ÷Õ VRQ VRUX\D ELU NÕVÕP
NDWÕOÕPFÕODU ³ELU VLEHU VDOGÕUÕQÕQ KHGHIL ROPDN LoLQ
3DUROD VHoLPL NRQXVXQGD ELOJL VDKLEL NDWÕOÕPFÕODUÕQ
LVWLKEDUDW HPQL\HW YE NULWLN ELU ELULPGH oDOÕúÕ\RU
KHU KHVDS LoLQ D\UÕ SDUROD VHoPH RUDQÕQÕQ GL÷HU
ROPDN JHUHNWL÷L´ YH ³VÕUDGDQ NXOODQÕFÕODUÕQ VLEHU
NDWÕOÕPFÕODUD RUDQOD GDKD \NVHN ROGX÷X DQFDN
VDOGÕUÕ\DKHGHIROPDVÕQÕQPPNQROPDGÕ÷Õ´LoHULNOL
\DQÕWODUÕQJHQHOGD÷ÕOÕPÕGLNNDWHDOÕQGÕ÷ÕQGDWHUFLKOHU
\DQÕWODU YHUPLúWLU +HU LNL GXUXP ELUOLNWH
DUDVÕQGD LVWDWLVWLNVHO DoÕGDQ DQODPOÕ ELU IDUN
GH÷HUOHQGLULOGL÷LQGH NDWÕOÕPFÕODUÕQ VÕUDGDQ
EXOXQPDGÕ÷ÕJ|UOPúWU
NXOODQÕFÕODUÕQ ELU VLEHU VDOGÕUÕ\D KHGHI ROPD\DFD÷ÕQD

TÜRKøYE BøLøùøM VAKFI BøLGøSAYAR BøLøMLERø ve MÜHENDøSLøöø DERGøSø (2019 Cilt:12 - SayÕ:2) - 8
Çizelge-6: %LOJL7HNQRORMLOHULYH6LEHU*YHQOLN$ODQÕQGD(÷LWLPøú'XUXPX'H÷LúNHQLQH*|UH<DQÕWODUÕQ
Ki-.DUH7HVWL6RQXoODUÕ

%LOJLVDKLELNDWÕOÕPFÕPÕ"
Soru

Evet (%) +D\ÕU  Ȥ sd p


S4 - 6DWÕQDOGÕ÷ÕPPRGHP Evet 72,2 57,5
IP kamera vb. cihazlarla
birlikte gelen admin, root vb.
SDUROD\ÕLONNXUXOXPGD 4,207 1 0,04
+D\ÕU 27,8 42,5
GH÷LúWLULULP <DQÕWODU
kategorik olarak yeniden
G]HQOHQPLúWLU
1. Hedef olma ihtimalim
13 17,3
yoktur.
S6 - %LUVLEHUVDOGÕUÕQÕQ
2. +HGHIROPDLKWLPDOLPD]GÕU 31,5 47,6
hedefi olma ihtimalinizi 1-5
3. +HGHIROXSROPDPDLKWLPDOLPD\QÕGÕU 31,5 26,9 16,14 4 0,003
DUDVÕQGDSXDQOD\ÕQÕ]
4. Hedef olma ihtimalim
(5 en yüksek ihtimal) 9,3 4,2
yüksektir.
5. Kesinlikle hedefim. 14,8 4
S13 - 6L]FHDúD÷ÕGDNLOHUGHQ 7ujMko0admin 48,1 47,5
0,42 1 0,838
KDQJLVLHQJYHQOLSDURODGÕU" SEays214. 44,4 46,7
+HSVLD\QÕSDURODGÕU 7,4 6,5
.XOODQGÕ÷ÕPELUNDoSDURODPYDURQODUÕQ
51,9 67,1
S14 - 3DURODODUÕQÕ]ÕQDVÕO DUDVÕQGDQVHoHULP
5,289 3 0,152
seçersiniz? dR÷XQOXNODD\UÕSDURODODUVHoHULP
14,8 10,5
QDGLUHQEXQODUELUELULQLQD\QÕRODELOLU
+HUKHVDSLoLQD\UÕSDURODVHoHULP 25,9 15,9
.k÷ÕGDSRVW-it'e vb. fiziksel bir ortama
9,4 6,8
\D]DUÕP
%LOJLVD\DUÕPGDFHSWHOHIRQXPGD
11,3 12,5
S15 - 3DURODODUÕQÕ]Õ bir dosya üzerine kaydederim.
oR÷XQOXNODQDVÕOVDNODPD\Õ :HEWDUD\ÕFÕPDKDWÕUODPDVÕLoLQ 14,32 4 0,006
3,8 5,1
tercih edersiniz? kaydederim.
$NOÕPGDWXWDUÕP 58,5 71,3
3DUROD\|QHWLPSURJUDPÕNXOODQÕUÕPYH
17 4,3
ona kaydederim.

GDLUDOJÕODUÕQÕQEXOXQGX÷XVRQXFXQDYDUÕOPÕúWÕUøOHUL .DWÕOÕPFÕODUÕQ oR÷XQOX÷X ELOJLVD\DUODUÕQGD LúOHWLP


G]H\ NDOÕFÕ WHKGLW VDOGÕUÕODUÕ DGYDQFH SHUVLVWHQW VLVWHPL RODUDN :LQGRZV GD÷ÕWÕPODUÕQÕ ZHE WDUD\ÕFÕ
threat - $37  V|] NRQXVX ROGX÷XQGD EX DOJÕ NDEXO RODUDN *RRJOH &KURPH X\JXODPDVÕQÕ WHUFLK
edilebilir olsa dahi nesnelerin internetini etkileyen HWPHNWHGLU$÷D ED÷OÕQHVQHOHULQ YDUVD\ÕODQ SDURODODU
]DUDUOÕ \D]ÕOÕPODU DoÕVÕQGDQ HOH DOÕQGÕ÷ÕQGD  EX YH\D NROD\ SDURODODU LOH NXOODQÕPÕQÕ HQJHOOH\HFHN
DOJÕQÕQJHoHUOLROPDGÕ÷ÕGH÷HUOHQGLULOPHNWHGLU o|]POHULQ WDVDUÕPÕQGD EX oDOÕúPDGD WHVSLW HGLOHQ
WHUFLK YHH÷LOLPOHULQ J|]|QQGHEXOXQGXUXOPDVÕV|]
%LOJLWHNQRORMLOHULYH\DVLEHUJYHOLNDODQÕQGDH÷LWLP NRQXVX o|]POHULQ HULúLOHELOLUOL÷LQL
DODQ \DKXW oDOÕúDQ NLúLOHU GL÷HU NDWÕOÕPFÕODUD NÕ\DVOD NXOODQÕODELOLUOL÷LQLYHHWNLQOL÷LQLDUWWÕUDFDNWÕU
nesnelerin internetinin güvenOL÷L NRQXVXQGD GDKD
ELOLQoOL YH WHPNLQOLGLU DQFDN EX NLúLOHUFH
³XM0NRDGPLQ´ VHoHQH÷LQLQ JYHQOL SDUROD RODUDN
VHoLOPLú ROPDVÕ 0LUDL ]DUDUOÕ \D]ÕOÕPÕ WDUDIÕQGDQ
KHGHI DOÕQDQ SDUROD NWSKDQHVLQLQ \HWHULQFH 7. Sonuç
ELOLQPHGL÷LQLJ|VWHUPHNWHGLU
0LUDL ]DUDUOÕ \D]ÕOÕPÕ X]XQ ELU VUHGLU JYHQOLN
X]PDQODUÕ WDUDIÕQGDQ ELOLQPHNWHGLU Güvenlik

TÜRKøYE BøLøùøM VAKFI BøLGøSAYAR BøLøMLERø ve MÜHENDøSLøöø DERGøSø (2019 Cilt:12 - SayÕ:2) - 9
X]PDQODUÕWDUDIÕQGDQQHVQHOHULQLQWHUQHWLFLKD]ODUÕQGD DOÕQDUDN 76(.  7HPHO 6HYL\H *YHQOLN
YDUVD\ÕODQ RWXUXP DoPD ELOJLOHULQLQ NXOODQÕPÕQÕQ Belgelendirmesi VUHFLQH WDEL WXWXOPDVÕ ONHPL]
VRQD HUGL÷L \DQÕOJÕVÕQD NDSÕODELOLU $QFDN EX dahilindeki nesnelerin interneti ekosisteminin
DUDúWÕUPD J|VWHUPLúWLU NL KDOHQ ONHPL]GHNL KHU EHú JYHQOL÷LQLDUWWÕUDFDNWÕU
NXOODQÕFÕGDQ LNLVL FLKD]ODUÕQÕQ LON NXUXOXPXnda
YDUVD\ÕODQ SDUROD\Õ GH÷LúWLUPHPHNWHGLU 8]PDQODU Kaynakça
WDUDIÕQGDQ \DSÕODQ DUDúWÕUPDODU QHWLFHVLQGH HOGH [1] A. Dulaunoy, G. Wagener, and S. Mokaddem, “An
HGLOHQ ELOJLOHULQ Xo NXOODQÕFÕODUD EX NXOODQÕFÕODUÕQ extended analysis of an IoT malware from a
DQOD\DFD÷Õ VHYL\HGH DNWDUÕPÕ YH NXOODQÕFÕODUGDNL blackhole network,” in TNC17 Networking
IDUNÕQGDOÕN VHYL\HVLQLQ DU]X HGLOHQ G]H\H Conference, Linz, Austria, 2017, p. 42.
oÕNDUÕOPDVÕ KXVXVXQGD HNVLNOLNOHU EXOXQGX÷X DoÕNWÕU [2] “Internet of things at a glance,” Cisco, 2016.
%X HNVLNOLNOHULQ KÕ]OÕ YH JHoLFL \|QWHPOHUOH [Online]. Available:
JLGHULOPHVLQL EHNOHPHN JHUoHNoL ELU \DNODúÕP https://www.cisco.com/c/dam/en/us/products/collater
ROPD\DFDNWÕU hONHPL]GH LON|÷UHWLP oD÷ÕQGDQ
al/se/internet-of-things/at-a-glance-c45-731471.pdf.
LWLEDUHQ ELUH\OHUH WHPHO ELOLúLP H÷LWLPL YHULOPHNWH
[Accessed: 06-May-2019].
NDPX NXUXPODUÕ YH |]HO VHNW|UGH oDOÕúDQODUD ELOJL
[3] “OWASP Internet of Things Project,” OWASP.
JYHQOL÷LIDUNÕQGDOÕNH÷LWLPOHULYHULOPHNWHGLU8OXVDO
[Online]. Available:
VLEHU JYHQOLN H\OHP SODQÕQD HNOHQHFHN KXVXVODU YH
https://www.owasp.org/index.php/OWASP_Internet
RUWD\D NRQDFDN  ELU LUDGH LOH LON|÷UHWLPGHQ LWLEDUHQ
_of_Things_Project #tab=IoT_Top_10. [Accessed:
ELOJL JYHQOL÷L IDUNÕQGDOÕN H÷LWLPOHUL YHULOPHOL YH
03-May-2019].
nesnelerin internetLQLQ JYHQOL÷L NRQXVX EX H÷LWLP
NDSVDPÕQda ele DOÕQPDOÕGÕU [4] R. Hallman, J. Bryan, G. Palavicini, J. Divita, and J.
Romero-Mariona, “IoDDoS - The Internet of
1HVQHOHULQ LQWHUQHWL FLKD]ODUÕQÕQ WDVDUÕPÕQGDQ distributed denial of sevice attacks - a case study of
kaynaklanan zafiyetlerin önlenmesi konusunda the Mirai malware and IoT-based botnets,” in
standartlar ve belgelendirme süreçleri büyük rol Proceedings of the 2nd International Conference on
R\QDPDNWDGÕU Internet of Things, Big Data and Security, Porto,
Portugal, 2017, pp. 47–58.
øQWHUQHWH ED÷OÕ QHVQHOHULQ JYHQOLN DODQÕQGD WHVW YH
[5] J. Margolis, T. T. Oh, S. Jadhav, Y. H. Kim and J. N.
VHUWLILNDV\RQXQ VD÷ODQPDVÕ DPDFÕ\OD \HGL D\UÕ
GH÷HUOHQGLUPH VHYL\HVLQGHQ ROXúDQ ,62,(&  Kim, "An In-Depth Analysis of the Mirai
Ortak Kriterler Belgelendirmesi sürecinden Botnet," 2017 International Conference on Software
ID\GDODQÕOPDVÕ \D\JÕQ ELU X\JXODPD ROVD GDKL EX Security and Assurance (ICSSA), Altoona, PA, USA,
VUHFLQ X]XQOX÷X KDUFDQDQ HIRU YH PDOL\HWOHULQ 2017, pp. 6-12.
üreticilerHJHWLUGL÷L\NHOHúWLULOPHNWHGLU>4@$NÕOOÕ [6] S. Hilton, “Dyn analysis summary of friday October
bir televizyonun ISO/IEC 15408 Ortak Kriterler 21 attack,” Dyn Blog, 26-Oct-2016. [Online].
%HOJHOHQGLUPHVL NDSVDPÕQGD |QFHGHQ EHOLUOHQPLú Available: https://dyn.com/blog/dyn-analysis-
JYHQOLN NULWHUOHULQH X\JXQOX÷XQXQ LNLQFL GHUHFH summary-of-friday-october-21-attack/. [Accessed:
GH÷HUOHQGLUPHVHYL\HVLQGH ($/ WHVWHGLOPHVLG|UW 05-May-2019].
D\ VUPúWU [35]. ISO/IEC 15408 Ortak Kriterler [7] ”jgamblin/Mirai-Source-Code,” GitHub, 25-Oct-
Belgelendirmesi sürecinin ikinci derece 2016. [Online].
GH÷HUOHQGLUPH VHYL\HVLQLQ ($/  PLOOL NDUúÕOÕ÷Õ Available:https://github.com/jgamblin/MiraiSourceC
RODUDN 7UN 6WDQGDUWODUÕ (QVWLWV WDUDIÕQGDQ ode/tree/master/mirai. [Accessed: 01-May-2019].
JHOLúWLULOHQ76(.7HPHO6HYL\H%HOJHOHQGLUPHVL [8] I. Zeifman, B. Herzberg, D. Bekerman, “Breaking
sürecinde daha az maliyetle ve dahD NÕVD VUHGH down mirai: an IoT DDoS botnet analysis,” Imperva,
ELOLúLP WHNQRORMLOHUL UQOHULQLQ WHVW YH 26-Oct-2016. [Online]. Available:
EHOJHOHQGLUPHVLQLQ WDPDPODQDFD÷Õ |QJ|UOPHNWHGLU https://www.imperva.com/blog/malwareanalysis-
[36]. $%' YH øQJLOWHUH¶GHNL \DVDO G]HQOHPHOHULQ mirai-ddos-botnet.html. [Accessed: 07-May-2019].
ONHPL]HGHX\DUODQDUDNONHPL]SD]DUÕQDDU]HGLOHQ [9] Y. Xu, H. Koide, D. V. Vargas and K. Sakurai,
D÷ HULúLP \HWHQHNOL QHVQHOHULQ KHU ELU QHVQH LoLQ "Tracing Mirai malware in networked system,"
IDUNOÕ YDUVD\ÕODQ SDUROD LOH VDWÕúÕQÕQ ]RUXQOX KDOH in 2018 Sixth International Symposium on
getirilmesi ve bu nesnelerin ETSI TS 103 645 Computing and Networking Workshops
“Cyber Security for Consumer Internet of Things” (CANDARW), Takayama, Japan, 2018, pp. 534-538.
WDUDIÕQGDQ WHVSLW HGLOHQ JYHQOLN NULWHUOHUL GLNNDWH

TÜRKøYE BøLøùøM VAKFI BøLGøSAYAR BøLøMLERø ve MÜHENDøSLøöø DERGøSø (2019 Cilt:12 - SayÕ:2) - 10
[10] + 6LQDQRYLü DQG 6 0UGRYLF $QDO\VLV RI 0LUDL variant-targets-enterprise-wireless-presentation-
malicious software," in 2017 25th International display-systems/. [Accessed: 06-May-2019].
Conference on Software, Telecommunications and [20] K. W. Chang, “Mirai is still alive and using multiple
Computer Networks (SoftCOM), Split, 2017, pp. 1-5. old exploits on home routers,” Ixia. 15-Apr-2019.
[11] T. S. Gopal, M. Meerolla, G. Jyostna, P. Reddy [Online]. Available:
Lakshmi Eswari and E. Magesh, "Mitigating Mirai https://www.ixiacom.com/company/blog/mirai-still-
malware spreading in IoT environment," in 2018 alive-and-using-multiple-old-exploits-home-routers.
International Conference on Advances in [Accessed: 03-May-2019].
Computing, Communications and Informatics [21] 067RN ³1HVQHOHULQ øQWHUQHWLQGH %RWQHWOHU´
(ICACCI), Bangalore, Karnataka, India, 2018, pp. Yüksek Lisans Tezi, TOBB Ekonomi ve Teknoloji
2226-2230. Üniversitesi, A÷XVWRV
[12] L. Labrovic, “The new Okiru mirai botnet, spectre is [22] USCERT, “Heightened ddos threat posed by Mirai
slowing down ecommerce websites and more in this and other botnets”, Alert TA16-288A, 14-Oct-2016
weeks news,” GlobalDots, 19-Jan-2018. [Online]. (revised 30-Oct-2017). [Online]. Available: www.us-
Available: https://www.globaldots .com/new-okiru- cert.gov/ncas/alerts/TA16-288A. [Accessed: 02-
mirai-botnet-spectre-slowing-ecommerce-websites- May-2019].
weeks-news/. [Accessed: 08-May-2019]. [23] “SB-327 Information privacy: connected
[13] G. Kambourakis, C. Kolias and A. Stavrou, "The devices”, Senate Bill No.327, 28-Sep-2018. [Online].
Mirai botnet and the IoT zombie armies," Available: https://leginfo.
in MILCOM 2017 - 2017 IEEE Military legislature.ca.gov/faces/billNavClient.xhtml?bill_id=
Communications Conference, Baltimore, MD, USA, 201720180SB327. [Accessed: 05-May-2019].
2017, pp. 267-272. [24] “Code of practice for consumer IOT
[14] “Hacker creates seven new variants of the Mirai security,” Secure by Design, 28-Feb-2019. [Online].
botnet,” AvastBlog, 25-Oct-2018. [Online]. Available: https://www.gov.uk/government/
Available: https://blog.avast.com/hacker-creates- publications/secure-by-design/code-of-practice-for-
seven-new-variants-of-the-mirai-botnet. [Accessed: consumer-iot-security. [Accessed: 06-May-2019].
06-May-2019]. [25] ETSI TS 103 645 (2019). CYBER; Cyber Security
[15] C. Kolias, G. Kambourakis, A. Stavrou, and J. Voas, for Consumer Internet of Things, European
“DDoS in the IoT: Mirai and other Telecommunications Standards Institute, Sophia-
botnets,” Computer, vol. 50, no. 7, pp. 80–84, 2017. Antipolis, France.
[16] Y. Ji, L. Yao, S. Liu, H. Yao, Q. Ye and R. Wang, [26] “Our Increasingly Connected Lives: Survey
"The study on the botnet and its prevention policies conducted by ESET in collaboration with the
in the internet of things," in 2018 IEEE 22nd National Cyber Security Alliance,” 24-Oct-2016.
International Conference on Computer Supported [Online]. Available:
Cooperative Work in Design (CSCWD), Nanjing, https://cdn3.esetstatic.com/eset/US/
2018, pp. 837-842. resources/press/ESET_ConnectedLives-
[17] M. Antonakakis et al. “Understanding the mirai DataSummary.pdf. [Accessed: 01-May-2019].
botnet”, in Proceedings of the 26th USENIX [27] M. Ghiglieri, M. Volkamer, and K. Renaud,
Conference on Security Symposium, 2017, “Exploring consumers’ attitudes of smart tv related
Vancouver, BC, Canada; pp. 1093-1110. privacy risks,” in International Conference on
[18] “Nokia threat intelligence report – 2019,” [Online]. Human Aspects of Information Security, Privacy and
Available: Trust Lecture Notes in Computer Science (HAS
https://onestore.nokia.com/asset/205835?did=d00000 2017), Vancouver, Canada, 2017, pp. 656–674.
00016z&utm_campaign=threatintelligence18&utm_s [28] C. Mcdermott, J. Isaacs, and A. Petrovski,
ource=marketo&utm_medium=LandingPage&utm_c “Evaluating awareness and perception of botnet
ontent=report&utm_term=awareness. [Accessed: 02- activity within consumer internet-of-things (IoT)
May-2019]. networks,” Informatics, vol. 6, no. 1, p. 8, 2019.
[19] R. Nigam, “New Mirai variant targets enterprise [29] T. Talan, C. Aktürk, A. Korkmaz, S. Gülseçen,
wireless presentation & display systems,” Unit42, ³hQLYHUVLWH|÷UHQFLOHULQLQDNÕOOÕWHOHIRQNXOODQÕPÕQGD
01-Apr-2019. [Online]. Available: JYHQOLNIDUNÕQGDOÕ÷Õ´Istanbul Journal of Open and
https://unit42.paloaltonetworks.com/new-mirai- Distance Education, vol. 1, no. 2, pp. 61-75, 2016.

TÜRKøYE BøLøùøM VAKFI BøLGøSAYAR BøLøMLERø ve MÜHENDøSLøöø DERGøSø (2019 Cilt:12 - SayÕ:2) - 11
[30] g( $NJQ 0 7RSDO ³(÷LWLP IDNOWHVL VRQ VÕQÕI http://unpan1.un.org/intradoc/groups/public/docume
|÷UHQFLOHULQLQ ELOLúLP JYHQOL÷L IDUNÕQGDOÕNODUÕ nts /aspa/unpan002507.pdf [Accessed: 01-May-
6DNDU\D hQLYHUVLWHVL (÷LWLP )DNOWHVL |UQH÷L´ 2019].
6DNDU\D hQLYHUVLWHVL (÷LWLP )DNOWHVL 'HUJLVL, vol. [34] G. Baldini, A. Skarmeta, E. Fourneret, R. Neisse, B.
5, no. 2, pp. 98-121, 2015. Legeard and F. Le Gall, "Security certification and
[31] 0 7HNHUHN $ 7HNHUHN ³g÷UHQFLOHULQ ELOJL labelling in internet of things," in 2016 IEEE 3rd
JYHQOL÷LIDUNÕQGDOÕ÷Ձ]HULQHELUDUDúWÕUPD´Turkish World Forum on Internet of Things (WF-IoT),
Journal of Education, vol. 2, no. 3, pp. 61-70, 2013. Reston, VA, 2016, pp. 627-632.
[32] “Digital in 2018 in Western Asia Part 1 - North- [35] S. Kang and S. Kim, “How to obtain common
West”, 29-Jan-2018. [Online]. Available: criteria certification of smart TV for home IoT
https://www.slideshare.net/wearesocial/digital-in- security and reliability,” Symmetry, vol. 9, no. 10, p.
2018-in-western-asia-part-1-northwest-86865983. 233, 2017.
[Accessed: 07-May-2019]. [36] “Temel seviye güvenlik belgelendirmesi”, TSE.
[33] A. Houston, The survey handbook, Washington, DC: [Online]. Available:
Department of the Navy Total Quality Leadership https://www.tse.org.tr/IcerikDetay?ID=2061&Parent
ID=3312. [Accessed: 02-May-2019].
Office, 1997. [Online]. Available:

TÜRKøYE BøLøùøM VAKFI BøLGøSAYAR BøLøMLERø ve MÜHENDøSLøöø DERGøSø (2019 Cilt:12 - SayÕ:2) - 12

You might also like