{"id":2098,"date":"2020-06-12T22:42:13","date_gmt":"2020-06-12T19:42:13","guid":{"rendered":"https:\/\/www.technologistwomen.org\/?p=2098"},"modified":"2020-06-12T23:01:13","modified_gmt":"2020-06-12T20:01:13","slug":"siber-savas-cyberwarfare","status":"publish","type":"post","link":"https:\/\/www.technologistwomen.org\/index.php\/2020\/06\/12\/siber-savas-cyberwarfare\/","title":{"rendered":"Siber Sava\u015f (Cyberwarfare)"},"content":{"rendered":"<h2 class=\"entry-title\" style=\"text-align: center;\">Siber Sava\u015f (Cyberwarfare)<\/h2>\n<div class=\"entry-content\">\n<h4 class=\"has-luminous-vivid-amber-color has-text-color\">Siber Sava\u015f Nedir?<\/h4>\n<p>Kurumlar veya devletlerin birbirlerinin bilgisayar a\u011flar\u0131na veya bilgisayar a\u011f\u0131na ba\u011fl\u0131 servislerine eri\u015ferek zarar vermek, \u00f6nemli ve \u00f6zel bilgileri ele ge\u00e7irmek gibi i\u015flemlerin t\u00fcm\u00fcd\u00fcr.<\/p>\n<h4 class=\"has-luminous-vivid-amber-color has-text-color\">Siber Sava\u015f\u0131n Amac\u0131<\/h4>\n<p>D\u00fc\u015fman \u00fclkelerin,uluslar\u0131n bilgilerini ele ge\u00e7irerek \u015fantaj gibi tehditlerle avantaj elde etmek i\u00e7in kullan\u0131l\u0131r.<\/p>\n<p>Vatanda\u015flar, h\u00fck\u00fcmete olan g\u00fcvenini kaybedebilir..<\/p>\n<p class=\"has-text-color has-text-align-center has-luminous-vivid-amber-color\"><em>Anl\u0131k Siber Sava\u015f Hareketlerini G\u00f6zlemlemek \u0130sterseniz Arama Motorunuza Siber Sava\u015f Haritas\u0131 Yazman\u0131z Yeterlidir..<\/em><\/p>\n<h5 class=\"has-luminous-vivid-amber-color has-text-color has-text-align-right\">Bet\u00fcl ULA\u015e<\/h5>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Siber Sava\u015f (Cyberwarfare) Siber Sava\u015f Nedir? Kurumlar veya devletlerin birbirlerinin bilgisayar a\u011flar\u0131na veya bilgisayar a\u011f\u0131na ba\u011fl\u0131 servislerine eri\u015ferek zarar vermek, \u00f6nemli ve [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1864,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7,6],"tags":[15,16],"class_list":["post-2098","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-haberler","category-teknoloji","tag-siberguvenlik","tag-cybersecurity"],"_links":{"self":[{"href":"https:\/\/www.technologistwomen.org\/index.php\/wp-json\/wp\/v2\/posts\/2098","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.technologistwomen.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.technologistwomen.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.technologistwomen.org\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.technologistwomen.org\/index.php\/wp-json\/wp\/v2\/comments?post=2098"}],"version-history":[{"count":2,"href":"https:\/\/www.technologistwomen.org\/index.php\/wp-json\/wp\/v2\/posts\/2098\/revisions"}],"predecessor-version":[{"id":2101,"href":"https:\/\/www.technologistwomen.org\/index.php\/wp-json\/wp\/v2\/posts\/2098\/revisions\/2101"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.technologistwomen.org\/index.php\/wp-json\/wp\/v2\/media\/1864"}],"wp:attachment":[{"href":"https:\/\/www.technologistwomen.org\/index.php\/wp-json\/wp\/v2\/media?parent=2098"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.technologistwomen.org\/index.php\/wp-json\/wp\/v2\/categories?post=2098"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.technologistwomen.org\/index.php\/wp-json\/wp\/v2\/tags?post=2098"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}