{"id":4773,"date":"2025-11-03T10:11:32","date_gmt":"2025-11-03T07:11:32","guid":{"rendered":"https:\/\/bilisimacademy.com\/blog\/?p=4773"},"modified":"2025-12-16T13:48:54","modified_gmt":"2025-12-16T10:48:54","slug":"siber-guvenlikte-siem-sistemleri","status":"publish","type":"post","link":"https:\/\/bilisimacademy.com\/blog\/2025\/11\/siber-guvenlikte-siem-sistemleri\/","title":{"rendered":"Siber G\u00fcvenlikte SIEM Sistemleri ve Tehdit \u0130zleme S\u00fcre\u00e7leri"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">G\u00fcn\u00fcm\u00fcz\u00fcn dijital d\u00fcnyas\u0131nda <strong><a href=\"https:\/\/bilisimacademy.com\/blog\/2025\/10\/siber-guvenlik-egitimi-nedir-onemi\/\" target=\"_blank\" rel=\"noreferrer noopener\">Siber G\u00fcvenlik<\/a><\/strong>, sadece teknoloji departmanlar\u0131n\u0131n de\u011fil, t\u00fcm kurumlar\u0131n \u00f6ncelikli konusu haline geldi. Art\u0131k her veri, her i\u015flem ve her kullan\u0131c\u0131 etkile\u015fimi potansiyel bir hedef olabilir. Bu y\u00fczden i\u015fletmeler yaln\u0131zca sald\u0131r\u0131lara kar\u015f\u0131 savunma yapm\u0131yor; ayn\u0131 zamanda tehditleri ger\u00e7ek zamanl\u0131 olarak izleyen, analiz eden ve yan\u0131tlayan sistemler kuruyor.<\/p><div id=\"ez-toc-container\" class=\"ez-toc-v2_0_83 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">\u0130\u00e7indekiler<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"\u0130\u00e7indekiler Tablosunu A\u00e7\/Kapat\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/bilisimacademy.com\/blog\/2025\/11\/siber-guvenlikte-siem-sistemleri\/#SIEM_Nedir_ve_Nasil_Calisir\" >SIEM Nedir ve Nas\u0131l \u00c7al\u0131\u015f\u0131r?<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/bilisimacademy.com\/blog\/2025\/11\/siber-guvenlikte-siem-sistemleri\/#1_Veri_Toplama_Katmani\" >1. Veri Toplama Katman\u0131<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/bilisimacademy.com\/blog\/2025\/11\/siber-guvenlikte-siem-sistemleri\/#2_Normalizasyon_ve_Korelasyon\" >2. Normalizasyon ve Korelasyon<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/bilisimacademy.com\/blog\/2025\/11\/siber-guvenlikte-siem-sistemleri\/#3_Gorsellestirme_ve_Raporlama\" >3. G\u00f6rselle\u015ftirme ve Raporlama<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/bilisimacademy.com\/blog\/2025\/11\/siber-guvenlikte-siem-sistemleri\/#Siber_Guvenlikte_Log_Analizi_ve_Olay_Korelasyonu\" >Siber G\u00fcvenlikte Log Analizi ve Olay Korelasyonu<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/bilisimacademy.com\/blog\/2025\/11\/siber-guvenlikte-siem-sistemleri\/#Gercek_Zamanli_Tehdit_Algilama_Mekanizmalari\" >Ger\u00e7ek Zamanl\u0131 Tehdit Alg\u0131lama Mekanizmalar\u0131<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/bilisimacademy.com\/blog\/2025\/11\/siber-guvenlikte-siem-sistemleri\/#SIEM_Sistemlerinin_Faydalari\" >SIEM Sistemlerinin Faydalar\u0131<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/bilisimacademy.com\/blog\/2025\/11\/siber-guvenlikte-siem-sistemleri\/#Uyumluluk_Denetimleri_KVKK_ISO_27001\" >Uyumluluk Denetimleri (KVKK, ISO 27001)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/bilisimacademy.com\/blog\/2025\/11\/siber-guvenlikte-siem-sistemleri\/#Otomatik_Uyari_Mekanizmalari\" >Otomatik Uyar\u0131 Mekanizmalar\u0131<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/bilisimacademy.com\/blog\/2025\/11\/siber-guvenlikte-siem-sistemleri\/#Populer_SIEM_Araclari\" >Pop\u00fcler SIEM Ara\u00e7lar\u0131<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/bilisimacademy.com\/blog\/2025\/11\/siber-guvenlikte-siem-sistemleri\/#Splunk\" >Splunk<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/bilisimacademy.com\/blog\/2025\/11\/siber-guvenlikte-siem-sistemleri\/#QRadar\" >QRadar<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/bilisimacademy.com\/blog\/2025\/11\/siber-guvenlikte-siem-sistemleri\/#Elastic_Stack\" >Elastic Stack<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/bilisimacademy.com\/blog\/2025\/11\/siber-guvenlikte-siem-sistemleri\/#Sonuc_Izlenen_Sistem_Guvenlidir\" >Sonu\u00e7: \u0130zlenen Sistem G\u00fcvenlidir<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/bilisimacademy.com\/blog\/2025\/11\/siber-guvenlikte-siem-sistemleri\/#Siber_Guvenlik_Kariyerine_Bilisim_Academy_ile_Basla\" >Siber G\u00fcvenlik Kariyerine Bili\u015fim Academy ile Ba\u015fla!<\/a><\/li><\/ul><\/nav><\/div>\n\n\n\n\n<p class=\"wp-block-paragraph\">\u0130\u015fte tam bu noktada devreye <a href=\"https:\/\/bilisimacademy.com\/danismanlik\/SIEM-kolarasyon\/\" target=\"_blank\" rel=\"noreferrer noopener\">SIEM<\/a> (Security Information and Event Management) sistemleri giriyor. SIEM, log verilerini toplayarak g\u00fcvenlik olaylar\u0131n\u0131 merkezi bir noktadan izlemeyi, analiz etmeyi ve olas\u0131 tehditlere kar\u015f\u0131 \u00f6nlem almay\u0131 sa\u011flayan g\u00fc\u00e7l\u00fc bir \u00e7\u00f6z\u00fcmd\u00fcr.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Bu yaz\u0131da, SIEM sistemlerinin nas\u0131l \u00e7al\u0131\u015ft\u0131\u011f\u0131n\u0131, <strong>Siber G\u00fcvenlik<\/strong> alan\u0131ndaki \u00f6nemini, pop\u00fcler ara\u00e7lar\u0131n\u0131 ve kurumsal uyumluluk s\u00fcre\u00e7lerindeki rol\u00fcn\u00fc detayl\u0131ca inceleyece\u011fiz.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"SIEM_Nedir_ve_Nasil_Calisir\"><\/span><strong>SIEM Nedir ve Nas\u0131l \u00c7al\u0131\u015f\u0131r?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">SIEM, \u201cSecurity Information and Event Management\u201d ifadesinin k\u0131saltmas\u0131d\u0131r. Temel olarak, bir kurumun t\u00fcm sistemlerinden gelen log verilerini toplayarak bu verileri analiz eder, anormallikleri tespit eder ve potansiyel g\u00fcvenlik olaylar\u0131n\u0131 raporlar.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"1_Veri_Toplama_Katmani\"><\/span><strong>1. Veri Toplama Katman\u0131<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Bir kurumun a\u011f\u0131nda y\u00fczlerce cihaz, sunucu ve uygulama s\u00fcrekli olarak log \u00fcretir. SIEM sistemi bu log\u2019lar\u0131 merkezi bir platformda toplar. Bu sayede a\u011f\u0131n herhangi bir noktas\u0131nda ya\u015fanan ola\u011fand\u0131\u015f\u0131 davran\u0131\u015flar g\u00f6zden ka\u00e7maz.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"2_Normalizasyon_ve_Korelasyon\"><\/span><strong>2. Normalizasyon ve Korelasyon<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Toplanan log\u2019lar farkl\u0131 formatlarda olabilir. SIEM bu verileri normalize eder ve anlaml\u0131 hale getirir. Ard\u0131ndan korelasyon motoru devreye girer; \u00f6rne\u011fin, k\u0131sa s\u00fcrede farkl\u0131 IP adreslerinden gelen ba\u015far\u0131s\u0131z oturum a\u00e7ma denemeleri tespit edilirse, bu bir brute force sald\u0131r\u0131s\u0131n\u0131n i\u015fareti olabilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"3_Gorsellestirme_ve_Raporlama\"><\/span><strong>3. G\u00f6rselle\u015ftirme ve Raporlama<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">SIEM sistemleri, verileri yaln\u0131zca toplamakla kalmaz; bunlar\u0131 anlaml\u0131 grafikler, paneller ve uyar\u0131larla g\u00f6rselle\u015ftirir. G\u00fcvenlik ekipleri bu sayede olaylar\u0131 h\u0131zla de\u011ferlendirebilir.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Modern <strong>Siber G\u00fcvenlik<\/strong> altyap\u0131lar\u0131nda SIEM, tehdit alg\u0131lama ve olay m\u00fcdahalesi s\u00fcre\u00e7lerinin omurgas\u0131n\u0131 olu\u015fturur.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Siber_Guvenlikte_Log_Analizi_ve_Olay_Korelasyonu\"><\/span><strong>Siber G\u00fcvenlikte Log Analizi ve Olay Korelasyonu<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/bilisimacademy.com\/blog\/wp-content\/uploads\/2025\/11\/2.-Icerik-Gorseli-\u2013-Log-Analizi-ve-Olay-Korelasyonu-2-1024x576.webp\" alt=\"Siber G\u00fcvenlikte SIEM Sistemleri ve Tehdit \u0130zleme S\u00fcre\u00e7leri\" class=\"wp-image-4776\" srcset=\"https:\/\/bilisimacademy.com\/blog\/wp-content\/uploads\/2025\/11\/2.-Icerik-Gorseli-\u2013-Log-Analizi-ve-Olay-Korelasyonu-2-1024x576.webp 1024w, https:\/\/bilisimacademy.com\/blog\/wp-content\/uploads\/2025\/11\/2.-Icerik-Gorseli-\u2013-Log-Analizi-ve-Olay-Korelasyonu-2-300x169.webp 300w, https:\/\/bilisimacademy.com\/blog\/wp-content\/uploads\/2025\/11\/2.-Icerik-Gorseli-\u2013-Log-Analizi-ve-Olay-Korelasyonu-2-768x432.webp 768w, https:\/\/bilisimacademy.com\/blog\/wp-content\/uploads\/2025\/11\/2.-Icerik-Gorseli-\u2013-Log-Analizi-ve-Olay-Korelasyonu-2-1536x864.webp 1536w, https:\/\/bilisimacademy.com\/blog\/wp-content\/uploads\/2025\/11\/2.-Icerik-Gorseli-\u2013-Log-Analizi-ve-Olay-Korelasyonu-2.webp 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Log analizi, bir a\u011fdaki her bile\u015fenin davran\u0131\u015f\u0131n\u0131 anlaman\u0131n temel yoludur. Sunucular, g\u00fcvenlik duvarlar\u0131, antivir\u00fcs yaz\u0131l\u0131mlar\u0131 ve hatta kullan\u0131c\u0131 sistemleri s\u00fcrekli log \u00fcretir. Ancak bu veriler tek ba\u015f\u0131na anlam ifade etmez. \u0130\u015fte burada SIEM devreye girer ve log\u2019lar\u0131 bir araya getirerek olay korelasyonu ger\u00e7ekle\u015ftirir.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Bir kullan\u0131c\u0131 gece yar\u0131s\u0131 kritik bir sisteme eri\u015fim sa\u011fl\u0131yorsa, bu durum ola\u011fan d\u0131\u015f\u0131 olabilir. SIEM sistemi, ge\u00e7mi\u015f davran\u0131\u015flarla kar\u015f\u0131la\u015ft\u0131rarak bu olay\u0131 potansiyel tehdit olarak i\u015faretler.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Bu yakla\u015f\u0131m sayesinde g\u00fcvenlik ekipleri art\u0131k reaktif de\u011fil, proaktif hale gelir.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Olay korelasyonu, <strong>Siber G\u00fcvenlik<\/strong> a\u00e7\u0131s\u0131ndan iki temel avantaj sa\u011flar:<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>\u2022&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Zaman tasarrufu:<\/strong> On binlerce log verisini tek tek incelemek yerine, SIEM bunlar\u0131 otomatik olarak analiz eder.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>\u2022&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Do\u011fru \u00f6nceliklendirme:<\/strong> Sistem, risk seviyesine g\u00f6re uyar\u0131 olu\u015fturur. B\u00f6ylece kritik tehditler h\u0131zla ele al\u0131n\u0131r.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Ayr\u0131ca bu s\u00fcre\u00e7, kurumsal g\u00fcvenlik operasyon merkezlerinde (SOC) olay m\u00fcdahalesinin temelini olu\u015fturur. SIEM olmadan b\u00fcy\u00fck a\u011flarda tehditleri manuel olarak izlemek neredeyse imk\u00e2ns\u0131zd\u0131r.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Gercek_Zamanli_Tehdit_Algilama_Mekanizmalari\"><\/span><strong>Ger\u00e7ek Zamanl\u0131 Tehdit Alg\u0131lama Mekanizmalar\u0131<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/bilisimacademy.com\/blog\/wp-content\/uploads\/2025\/11\/3.-Icerik-Gorseli-\u2013-Gercek-Zamanli-Tehdit-Algilama-ve-Uyari-Mekanizmalari-2-1024x576.webp\" alt=\"Siber G\u00fcvenlikte SIEM Sistemleri ve Tehdit \u0130zleme S\u00fcre\u00e7leri\" class=\"wp-image-4777\" srcset=\"https:\/\/bilisimacademy.com\/blog\/wp-content\/uploads\/2025\/11\/3.-Icerik-Gorseli-\u2013-Gercek-Zamanli-Tehdit-Algilama-ve-Uyari-Mekanizmalari-2-1024x576.webp 1024w, https:\/\/bilisimacademy.com\/blog\/wp-content\/uploads\/2025\/11\/3.-Icerik-Gorseli-\u2013-Gercek-Zamanli-Tehdit-Algilama-ve-Uyari-Mekanizmalari-2-300x169.webp 300w, https:\/\/bilisimacademy.com\/blog\/wp-content\/uploads\/2025\/11\/3.-Icerik-Gorseli-\u2013-Gercek-Zamanli-Tehdit-Algilama-ve-Uyari-Mekanizmalari-2-768x432.webp 768w, https:\/\/bilisimacademy.com\/blog\/wp-content\/uploads\/2025\/11\/3.-Icerik-Gorseli-\u2013-Gercek-Zamanli-Tehdit-Algilama-ve-Uyari-Mekanizmalari-2-1536x864.webp 1536w, https:\/\/bilisimacademy.com\/blog\/wp-content\/uploads\/2025\/11\/3.-Icerik-Gorseli-\u2013-Gercek-Zamanli-Tehdit-Algilama-ve-Uyari-Mekanizmalari-2.webp 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Siber tehditler saniyeler i\u00e7inde geli\u015febilir. Bu nedenle bir g\u00fcvenlik sisteminin yaln\u0131zca ge\u00e7mi\u015f log\u2019lar\u0131 incelemesi yeterli de\u011fildir; ayn\u0131 zamanda ger\u00e7ek zamanl\u0131 tehdit izleme yetene\u011fine sahip olmas\u0131 gerekir.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">SIEM sistemleri, anl\u0131k veri ak\u0131\u015f\u0131n\u0131 izleyerek ola\u011fand\u0131\u015f\u0131 aktiviteleri tespit eder. \u00d6rne\u011fin:<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u2022&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Bir kullan\u0131c\u0131n\u0131n farkl\u0131 co\u011frafi konumlardan ayn\u0131 anda oturum a\u00e7mas\u0131,<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u2022&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Yetkisiz bir kullan\u0131c\u0131n\u0131n kritik dosyalara eri\u015fmeye \u00e7al\u0131\u015fmas\u0131,<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u2022&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; A\u011f trafi\u011finde aniden art\u0131\u015f ya\u015fanmas\u0131,<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">gibi durumlar an\u0131nda analiz edilir ve alarm olu\u015fturulur.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Bu mekanizmalar, <strong>Siber G\u00fcvenlik<\/strong> ekiplerine olay an\u0131nda m\u00fcdahale etme f\u0131rsat\u0131 verir. Ayr\u0131ca sistemler, \u00f6nceden tan\u0131mlanm\u0131\u015f kurallara veya yapay zek\u00e2 destekli anomali tespit algoritmalar\u0131na dayanarak otomatik olarak aksiyon alabilir.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Geli\u015fmi\u015f tehdit alg\u0131lama \u00e7\u00f6z\u00fcmleri, yaln\u0131zca sald\u0131r\u0131y\u0131 fark etmekle kalmaz; ayn\u0131 zamanda sald\u0131r\u0131n\u0131n kayna\u011f\u0131n\u0131, hedefini ve olas\u0131 yay\u0131l\u0131m alanlar\u0131n\u0131 da g\u00f6sterir. Bu sayede olay m\u00fcdahale ekipleri h\u0131zl\u0131ca \u00f6nlem alabilir.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"SIEM_Sistemlerinin_Faydalari\"><\/span><strong>SIEM Sistemlerinin Faydalar\u0131<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Bir SIEM sistemi, kurumun genel <strong>Siber G\u00fcvenlik<\/strong> stratejisinde merkezi bir rol oynar. Sa\u011flad\u0131\u011f\u0131 avantajlar, sadece olay izleme ile s\u0131n\u0131rl\u0131 de\u011fildir; ayn\u0131 zamanda operasyonel verimlilik, raporlama kolayl\u0131\u011f\u0131 ve uyumluluk a\u00e7\u0131s\u0131ndan da b\u00fcy\u00fck katk\u0131 sa\u011flar.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>1.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Merkezi G\u00f6r\u00fcn\u00fcrl\u00fck:<\/strong> T\u00fcm a\u011f yap\u0131s\u0131ndaki olaylar\u0131n tek bir ekrandan izlenmesi, g\u00fcvenlik ekiplerinin durum fark\u0131ndal\u0131\u011f\u0131n\u0131 art\u0131r\u0131r.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>2.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Erken Uyar\u0131 Mekanizmas\u0131:<\/strong> Sistem, potansiyel sald\u0131r\u0131 belirtilerini daha ger\u00e7ekle\u015fmeden fark edebilir.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>3.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Uyumluluk Y\u00f6netimi:<\/strong> Kurumlar <a href=\"https:\/\/bilisimacademy.com\/blog\/2025\/10\/siber-guvenlikte-kvkk-ve-gdpr-uyum\/\" target=\"_blank\" rel=\"noreferrer noopener\">KVKK<\/a>, <a href=\"https:\/\/bilisimacademy.com\/blog\/2024\/09\/iso-27001-nedir-ve-nasil-uygulanir\/\" target=\"_blank\" rel=\"noreferrer noopener\">ISO 27001<\/a> veya di\u011fer standartlara uygun raporlamay\u0131 otomatik olarak yapabilir.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>4.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Zaman Kazanc\u0131:<\/strong> Manuel analiz s\u00fcre\u00e7leri yerine otomatik korelasyon sayesinde g\u00fcvenlik ekipleri daha stratejik g\u00f6revlere odaklan\u0131r.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Uyumluluk_Denetimleri_KVKK_ISO_27001\"><\/span><strong>Uyumluluk Denetimleri (KVKK, ISO 27001)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">SIEM sistemleri yaln\u0131zca g\u00fcvenlik ihlallerini engellemekle kalmaz; ayn\u0131 zamanda yasal gereklilikleri yerine getirmek i\u00e7in de \u00f6nemli bir ara\u00e7t\u0131r.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u00d6rne\u011fin <a href=\"https:\/\/kvkk.gov.tr\/\" target=\"_blank\" rel=\"noreferrer noopener\">KVKK <\/a>kapsam\u0131nda ki\u015fisel verilerin korunmas\u0131 i\u00e7in eri\u015fim kay\u0131tlar\u0131n\u0131n d\u00fczenli olarak tutulmas\u0131 gerekir. SIEM bu verileri saklar, analiz eder ve gerekti\u011finde raporlar.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/www.tse.org.tr\/bilgi-guvenligi-yonetim-sistemi-bgys-belgelendirmesi-ts-iso-iec-27001\/\" target=\"_blank\" rel=\"noreferrer noopener\">ISO 27001<\/a> standard\u0131 ise bilgi g\u00fcvenli\u011fi y\u00f6netim sistemi kurallar\u0131n\u0131 belirler. SIEM, bu standarda uygun \u015fekilde log kay\u0131tlar\u0131n\u0131 izleyerek \u201cizlenebilirlik\u201d ilkesini destekler. Bu da denetim s\u00fcre\u00e7lerinde kurumlar\u0131n elini g\u00fc\u00e7lendirir.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Uyumluluk yaln\u0131zca bir zorunluluk de\u011fil, ayn\u0131 zamanda marka itibar\u0131n\u0131 koruman\u0131n da bir yoludur. D\u00fczenli raporlar, kurumun g\u00fcvenlik k\u00fclt\u00fcr\u00fcn\u00fcn g\u00fc\u00e7l\u00fc oldu\u011funu g\u00f6sterir.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Otomatik_Uyari_Mekanizmalari\"><\/span><strong>Otomatik Uyar\u0131 Mekanizmalar\u0131<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Bir g\u00fcvenlik ihlalinin dakikalar i\u00e7inde fark edilmesi bile, kurumun milyonlarca lira zarar etmesini \u00f6nleyebilir. Bu nedenle SIEM sistemleri otomatik uyar\u0131 mekanizmalar\u0131na sahiptir.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Belirlenen e\u015fik de\u011ferler a\u015f\u0131ld\u0131\u011f\u0131nda sistem an\u0131nda bildirim g\u00f6nderir. Uyar\u0131lar, e-posta, dashboard veya entegre g\u00fcvenlik uygulamalar\u0131 arac\u0131l\u0131\u011f\u0131yla y\u00f6neticilere iletilir.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Baz\u0131 geli\u015fmi\u015f SIEM \u00e7\u00f6z\u00fcmleri, belirli durumlarda otomatik aksiyon alabilir, \u00f6rne\u011fin \u015f\u00fcpheli IP adresini engellemek veya belirli bir kullan\u0131c\u0131y\u0131 karantinaya almak gibi.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Bu otomasyon, <strong>Siber G\u00fcvenlik<\/strong> ekiplerinin y\u00fck\u00fcn\u00fc hafifletir ve olay m\u00fcdahale s\u00fcresini \u00f6nemli \u00f6l\u00e7\u00fcde k\u0131salt\u0131r.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Populer_SIEM_Araclari\"><\/span><strong>Pop\u00fcler SIEM Ara\u00e7lar\u0131<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/bilisimacademy.com\/blog\/wp-content\/uploads\/2025\/11\/4.-Icerik-Gorseli-\u2013-Populer-SIEM-Araclari-Splunk-QRadar-Elastic-Stack-3-1024x576.webp\" alt=\"Siber G\u00fcvenlikte SIEM Sistemleri ve Tehdit \u0130zleme S\u00fcre\u00e7leri\" class=\"wp-image-4778\" srcset=\"https:\/\/bilisimacademy.com\/blog\/wp-content\/uploads\/2025\/11\/4.-Icerik-Gorseli-\u2013-Populer-SIEM-Araclari-Splunk-QRadar-Elastic-Stack-3-1024x576.webp 1024w, https:\/\/bilisimacademy.com\/blog\/wp-content\/uploads\/2025\/11\/4.-Icerik-Gorseli-\u2013-Populer-SIEM-Araclari-Splunk-QRadar-Elastic-Stack-3-300x169.webp 300w, https:\/\/bilisimacademy.com\/blog\/wp-content\/uploads\/2025\/11\/4.-Icerik-Gorseli-\u2013-Populer-SIEM-Araclari-Splunk-QRadar-Elastic-Stack-3-768x432.webp 768w, https:\/\/bilisimacademy.com\/blog\/wp-content\/uploads\/2025\/11\/4.-Icerik-Gorseli-\u2013-Populer-SIEM-Araclari-Splunk-QRadar-Elastic-Stack-3-1536x864.webp 1536w, https:\/\/bilisimacademy.com\/blog\/wp-content\/uploads\/2025\/11\/4.-Icerik-Gorseli-\u2013-Populer-SIEM-Araclari-Splunk-QRadar-Elastic-Stack-3.webp 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Piyasada bir\u00e7ok farkl\u0131 SIEM \u00e7\u00f6z\u00fcm\u00fc bulunmaktad\u0131r. Her biri farkl\u0131 b\u00fcy\u00fckl\u00fckteki kurumlara \u00f6zel \u00f6zellikler sunar. Ancak genel olarak en bilinen ara\u00e7lar \u015fu \u015fekildedir:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Splunk\"><\/span><strong>Splunk<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Splunk, kullan\u0131c\u0131 dostu aray\u00fcz\u00fc ve g\u00fc\u00e7l\u00fc veri analiti\u011fi \u00f6zellikleriyle \u00f6ne \u00e7\u0131kar. Ger\u00e7ek zamanl\u0131 tehdit tespiti, log korelasyonu ve geli\u015fmi\u015f raporlama yetenekleri sunar.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"QRadar\"><\/span><strong>QRadar<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">IBM taraf\u0131ndan geli\u015ftirilen QRadar, yapay zek\u00e2 destekli tehdit analiziyle bilinir. B\u00fcy\u00fck \u00f6l\u00e7ekli a\u011flarda y\u00fcksek performansla \u00e7al\u0131\u015f\u0131r ve uyumluluk raporlamas\u0131nda olduk\u00e7a etkilidir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Elastic_Stack\"><\/span><strong>Elastic Stack<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Elasticsearch, Logstash ve Kibana \u00fc\u00e7l\u00fcs\u00fcnden olu\u015fan Elastic Stack, a\u00e7\u0131k kaynak kodlu ve esnek bir \u00e7\u00f6z\u00fcm sunar. Kurumlar kendi ihtiya\u00e7lar\u0131na g\u00f6re \u00f6zelle\u015ftirme yapabilir.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Bu ara\u00e7lar, <strong>Siber G\u00fcvenlik<\/strong> operasyon merkezlerinde (SOC) en s\u0131k kullan\u0131lan \u00e7\u00f6z\u00fcmler aras\u0131nda yer al\u0131r.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Sonuc_Izlenen_Sistem_Guvenlidir\"><\/span><strong>Sonu\u00e7: \u0130zlenen Sistem G\u00fcvenlidir<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/bilisimacademy.com\/blog\/wp-content\/uploads\/2025\/11\/4.-Icerik-Gorseli-\u2013-Populer-SIEM-Araclari-Splunk-QRadar-Elastic-Stack-4-1024x576.webp\" alt=\"Siber G\u00fcvenlikte SIEM Sistemleri ve Tehdit \u0130zleme S\u00fcre\u00e7leri\" class=\"wp-image-4779\" srcset=\"https:\/\/bilisimacademy.com\/blog\/wp-content\/uploads\/2025\/11\/4.-Icerik-Gorseli-\u2013-Populer-SIEM-Araclari-Splunk-QRadar-Elastic-Stack-4-1024x576.webp 1024w, https:\/\/bilisimacademy.com\/blog\/wp-content\/uploads\/2025\/11\/4.-Icerik-Gorseli-\u2013-Populer-SIEM-Araclari-Splunk-QRadar-Elastic-Stack-4-300x169.webp 300w, https:\/\/bilisimacademy.com\/blog\/wp-content\/uploads\/2025\/11\/4.-Icerik-Gorseli-\u2013-Populer-SIEM-Araclari-Splunk-QRadar-Elastic-Stack-4-768x432.webp 768w, https:\/\/bilisimacademy.com\/blog\/wp-content\/uploads\/2025\/11\/4.-Icerik-Gorseli-\u2013-Populer-SIEM-Araclari-Splunk-QRadar-Elastic-Stack-4-1536x864.webp 1536w, https:\/\/bilisimacademy.com\/blog\/wp-content\/uploads\/2025\/11\/4.-Icerik-Gorseli-\u2013-Populer-SIEM-Araclari-Splunk-QRadar-Elastic-Stack-4.webp 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">G\u00fcvenlik, yaln\u0131zca duvarlarla de\u011fil, fark\u0131ndal\u0131kla korunur. SIEM sistemleri, kurumlara a\u011flar\u0131ndaki en k\u00fc\u00e7\u00fck hareketi bile izleme ve an\u0131nda m\u00fcdahale etme imk\u00e2n\u0131 verir.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Bu sistemler sayesinde, bir sald\u0131r\u0131 ger\u00e7ekle\u015fmeden \u00f6nce \u00f6nlem al\u0131nabilir; ger\u00e7ekle\u015fti\u011finde ise etkisi en aza indirilebilir.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">K\u0131sacas\u0131, g\u00fc\u00e7l\u00fc bir SIEM altyap\u0131s\u0131 kurmak, kurumlar\u0131n <strong>Siber G\u00fcvenlik<\/strong> olgunlu\u011funu en \u00fcst seviyeye ta\u015f\u0131r.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Verinin en de\u011ferli varl\u0131k oldu\u011fu bu \u00e7a\u011fda, izlenmeyen bir sistem g\u00fcvende de\u011fildir, ama izlenen bir sistem her zaman bir ad\u0131m \u00f6ndedir.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Siber_Guvenlik_Kariyerine_Bilisim_Academy_ile_Basla\"><\/span><strong>Siber G\u00fcvenlik Kariyerine Bili\u015fim Academy ile Ba\u015fla!<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/bilisimacademy.com\/blog\/wp-content\/uploads\/2025\/11\/1.-Kapak-Gorseli-\u2013-SIEM-ve-Tehdit-Izleme-5-1024x576.webp\" alt=\"Siber G\u00fcvenlikte SIEM Sistemleri ve Tehdit \u0130zleme S\u00fcre\u00e7leri\" class=\"wp-image-4780\" srcset=\"https:\/\/bilisimacademy.com\/blog\/wp-content\/uploads\/2025\/11\/1.-Kapak-Gorseli-\u2013-SIEM-ve-Tehdit-Izleme-5-1024x576.webp 1024w, https:\/\/bilisimacademy.com\/blog\/wp-content\/uploads\/2025\/11\/1.-Kapak-Gorseli-\u2013-SIEM-ve-Tehdit-Izleme-5-300x169.webp 300w, https:\/\/bilisimacademy.com\/blog\/wp-content\/uploads\/2025\/11\/1.-Kapak-Gorseli-\u2013-SIEM-ve-Tehdit-Izleme-5-768x432.webp 768w, https:\/\/bilisimacademy.com\/blog\/wp-content\/uploads\/2025\/11\/1.-Kapak-Gorseli-\u2013-SIEM-ve-Tehdit-Izleme-5-1536x864.webp 1536w, https:\/\/bilisimacademy.com\/blog\/wp-content\/uploads\/2025\/11\/1.-Kapak-Gorseli-\u2013-SIEM-ve-Tehdit-Izleme-5.webp 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Tehditleri yaln\u0131zca fark eden de\u011fil, onlar\u0131 durdurabilen bir uzman olmak ister misin?<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong><a href=\"https:\/\/bilisimacademy.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bili\u015fim Academy<\/a><\/strong> olarak, seni gelece\u011fin en kritik alanlar\u0131ndan biri olan <strong>Siber G\u00fcvenlik<\/strong> d\u00fcnyas\u0131na ad\u0131m atmaya davet ediyoruz.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Alan\u0131nda deneyimli e\u011fitmenlerimiz e\u015fli\u011finde, uygulamal\u0131 laboratuvar ortam\u0131nda SIEM sistemleri, log analizi, tehdit izleme ve olay m\u00fcdahalesi (SOC Analyst) konular\u0131nda kapsaml\u0131 e\u011fitimler sunuyoruz.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">E\u011fitimlerimiz, uluslararas\u0131 sertifikasyonlara (<a href=\"https:\/\/bilisimacademy.com\/blog\/2025\/09\/comptia-security-plus-sertifikasi\/\" target=\"_blank\" rel=\"noreferrer noopener\">CompTIA Security+<\/a>, <a href=\"https:\/\/bilisimacademy.com\/CEH\/\" target=\"_blank\" rel=\"noreferrer noopener\">CEH<\/a>, <a href=\"https:\/\/bilisimacademy.com\/danismanlik\/iso27001-danismanligi\/\" target=\"_blank\" rel=\"noreferrer noopener\">ISO 27001 <\/a>vb.) uygun m\u00fcfredatla haz\u0131rlanm\u0131\u015ft\u0131r.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Ger\u00e7ek siber sald\u0131r\u0131 senaryolar\u0131 \u00fczerinde \u00e7al\u0131\u015farak hem teorik bilgini hem de pratik becerilerini geli\u015ftir, g\u00fcvenlik operasyon merkezlerinde \u00e7al\u0131\u015fmaya haz\u0131r hale gel.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong><a href=\"https:\/\/bilisimacademy.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bili\u015fim Academy <\/a>ile \u00f6\u011fren, uygula, kariyerine y\u00f6n ver!<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Bili\u015fim Academy \u2014 Siber G\u00fcvenli\u011fin Gelece\u011fini Seninle \u015eekillendiriyor.<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/bilisimmedia.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">SEO ve Medya Planlama<\/a> \u00e7\u00f6z\u00fcm orta\u011f\u0131m\u0131z ile hizmetinizdeyiz!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>G\u00fcn\u00fcm\u00fcz\u00fcn dijital d\u00fcnyas\u0131nda Siber G\u00fcvenlik, sadece teknoloji departmanlar\u0131n\u0131n de\u011fil, t\u00fcm kurumlar\u0131n \u00f6ncelikli konusu haline geldi. Art\u0131k her veri, her i\u015flem ve her kullan\u0131c\u0131 etkile\u015fimi potansiyel bir hedef olabilir. Bu y\u00fczden i\u015fletmeler yaln\u0131zca sald\u0131r\u0131lara kar\u015f\u0131 savunma yapm\u0131yor; ayn\u0131 zamanda tehditleri ger\u00e7ek zamanl\u0131 olarak izleyen, analiz eden ve yan\u0131tlayan sistemler kuruyor. \u0130\u015fte tam bu noktada devreye SIEM [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":4775,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[30],"tags":[64,138,140,139],"class_list":["post-4773","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-siber-guvenlik","tag-siber-guvenlik","tag-siber-guvenlikte-siem-sistemleri","tag-siem","tag-siem-sistemleri"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/bilisimacademy.com\/blog\/wp-json\/wp\/v2\/posts\/4773","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bilisimacademy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bilisimacademy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bilisimacademy.com\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/bilisimacademy.com\/blog\/wp-json\/wp\/v2\/comments?post=4773"}],"version-history":[{"count":3,"href":"https:\/\/bilisimacademy.com\/blog\/wp-json\/wp\/v2\/posts\/4773\/revisions"}],"predecessor-version":[{"id":4936,"href":"https:\/\/bilisimacademy.com\/blog\/wp-json\/wp\/v2\/posts\/4773\/revisions\/4936"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bilisimacademy.com\/blog\/wp-json\/wp\/v2\/media\/4775"}],"wp:attachment":[{"href":"https:\/\/bilisimacademy.com\/blog\/wp-json\/wp\/v2\/media?parent=4773"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bilisimacademy.com\/blog\/wp-json\/wp\/v2\/categories?post=4773"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bilisimacademy.com\/blog\/wp-json\/wp\/v2\/tags?post=4773"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}