{"id":52359,"date":"2023-01-05T09:29:56","date_gmt":"2023-01-05T06:29:56","guid":{"rendered":"https:\/\/bilgem.tubitak.gov.tr\/?page_id=52359"},"modified":"2023-07-03T11:03:41","modified_gmt":"2023-07-03T08:03:41","slug":"sge-services","status":"publish","type":"page","link":"https:\/\/en.bilgem.tubitak.gov.tr\/en\/sge-hizmetler\/","title":{"rendered":"SGE Services"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"52359\" class=\"elementor elementor-52359\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3b37caf elementor-section-full_width elementor-section-height-min-height tbw-hero elementor-section-height-default elementor-section-items-middle\" data-id=\"3b37caf\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0ea71b7\" data-id=\"0ea71b7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-8f83cd7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8f83cd7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-6a0749d\" data-id=\"6a0749d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bac1d8b elementor-widget elementor-widget-text-editor\" data-id=\"bac1d8b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/bilgem.tubitak.gov.tr\/sge\/\">SGE Home<\/a>\u00a0 \u00a0\/\u00a0 \u00a0<a href=\"\/en\/sge-services\/\">SGE Services<\/a>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bd13bad uael-heading-align-left animated-slow elementor-invisible elementor-widget elementor-widget-uael-advanced-heading\" data-id=\"bd13bad\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"uael-advanced-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"uael-module-content uael-heading-wrapper\">\n\t\t\t\t\t\t<div class=\"uael-module-content uael-separator-parent\">\n\t\t\t\t\t\t\t\t<div class=\"uael-separator-wrap\">\n\t\t\t\t\t<div class=\"uael-separator-line uael-side-left\">\n\t\t\t\t\t\t<span><\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"uael-divider-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"uael-divider-text elementor-inline-editing\" data-elementor-setting-key=\"heading_line_text\" data-elementor-inline-editing-toolbar=\"basic\">SGE<\/h3>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"uael-separator-line uael-side-right\">\n\t\t\t\t\t\t<span><\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t<h1 class=\"uael-heading\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"uael-heading-text elementor-inline-editing uael-size--default\" data-elementor-setting-key=\"heading_title\" data-elementor-inline-editing-toolbar=\"basic\">Services<\/span>\n\t\t\t\t\t\t\t<\/h1>\n\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8c03531 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"8c03531\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tT\u00dcB\u0130TAK B\u0130LGEM SGE carries out research and development activities in the field of cyber security; carries out solution-oriented projects for military institutions, public institutions and organizations and the private sector. With these studies, it strives to minimize the information security problems of institutions and to raise corporate information security awareness. It provides services within the scope of creating cyber security knowledge in our country with many projects it has successfully carried out so far. \t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-15a627f elementor-align-start elementor-widget__width-auto elementor-fixed e-transform elementor-hidden-mobile elementor-hidden-tablet elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"15a627f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;fixed&quot;,&quot;_transform_translateX_effect&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;0&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect_tablet&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect_mobile&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateX_effect_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateX_effect_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"#iot\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-expand\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">IOT<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"#sizma-testleri\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-draw-polygon\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">LEAK TESTS<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"#guvenlik-denetimleri\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-shield-alt\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">SECURITY CONTROLS<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"#risk-analizi\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chart-bar\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">RISK ANALYSIS<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-f8ecb39 elementor-hidden-tablet elementor-hidden-mobile\" data-id=\"f8ecb39\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-37fce98 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"37fce98\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4d3b52e\" data-id=\"4d3b52e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7a31500 elementor-section-full_width elementor-section-height-min-height elementor-section-height-default\" data-id=\"7a31500\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-2fe0663\" data-id=\"2fe0663\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9d17cd9 elementor-widget elementor-widget-menu-anchor\" data-id=\"9d17cd9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"iot\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8bf31a7 elementor-widget elementor-widget-heading\" data-id=\"8bf31a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">IOT Security Studies<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c85eaf elementor-widget elementor-widget-text-editor\" data-id=\"6c85eaf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<span style=\"font-style: inherit;font-weight: inherit;color: var( --e-global-color-accent );font-family: var( --e-global-typography-text-font-family ), Manrope\">Internet of Things (IoT) is a network of physical objects embedded with sensors, software and other technologies for the purpose of data connection and sharing with other devices and systems over the Internet.<\/span> \t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-359b32c horizontal-scroll-tab elementor-widget elementor-widget-eael-adv-tabs\" data-id=\"359b32c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-adv-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div data-scroll-on-click=\"no\" data-scroll-speed=\"300\" id=\"eael-advance-tabs-359b32c\" class=\"eael-advance-tabs eael-tabs-horizontal eael-tab-auto-active  active-caret-on\" data-tabid=\"359b32c\">\n            <div class=\"eael-tabs-nav\">\n                <ul class=\"\" role=\"tablist\">\n                                            <li id=\"ne-kadar-yaygn-kullanlyor\" class=\"inactive eael-tab-item-trigger eael-tab-nav-item\" aria-selected=\"true\" data-tab=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"ne-kadar-yaygn-kullanlyor-tab\" aria-expanded=\"false\">\n                            \n                            \n                            \n                                                            <span class=\"eael-tab-title title-after-icon\" >How Widely Used?<\/span>                                                    <\/li>\n                                            <li id=\"szma-testi-hangi-admlar-erir\" class=\"inactive eael-tab-item-trigger eael-tab-nav-item\" aria-selected=\"false\" data-tab=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"szma-testi-hangi-admlar-erir-tab\" aria-expanded=\"false\">\n                            \n                            \n                            \n                                                            <span class=\"eael-tab-title title-after-icon\" >What Steps Does a Penetration Test Include?<\/span>                                                    <\/li>\n                                            <li id=\"1-iot-hizmet-kapsamnn-tespiti\" class=\"inactive eael-tab-item-trigger eael-tab-nav-item\" aria-selected=\"false\" data-tab=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"1-iot-hizmet-kapsamnn-tespiti-tab\" aria-expanded=\"false\">\n                            \n                            \n                            \n                                                            <span class=\"eael-tab-title title-after-icon\" >1. Determination of IoT Service Scope<\/span>                                                    <\/li>\n                                            <li id=\"2-bilgi-toplama\" class=\"inactive eael-tab-item-trigger eael-tab-nav-item\" aria-selected=\"false\" data-tab=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"2-bilgi-toplama-tab\" aria-expanded=\"false\">\n                            \n                            \n                            \n                                                            <span class=\"eael-tab-title title-after-icon\" >2. Information Gathering<\/span>                                                    <\/li>\n                                            <li id=\"3-gvenlik-a-deerlendirmesi\" class=\"inactive eael-tab-item-trigger eael-tab-nav-item\" aria-selected=\"false\" data-tab=\"5\" role=\"tab\" tabindex=\"-1\" aria-controls=\"3-gvenlik-a-deerlendirmesi-tab\" aria-expanded=\"false\">\n                            \n                            \n                            \n                                                            <span class=\"eael-tab-title title-after-icon\" >3. Vulnerability Assessment<\/span>                                                    <\/li>\n                                            <li id=\"4-smr-aamas\" class=\"inactive eael-tab-item-trigger eael-tab-nav-item\" aria-selected=\"false\" data-tab=\"6\" role=\"tab\" tabindex=\"-1\" aria-controls=\"4-smr-aamas-tab\" aria-expanded=\"false\">\n                            \n                            \n                            \n                                                            <span class=\"eael-tab-title title-after-icon\" >4. Exploitation Phase<\/span>                                                    <\/li>\n                                            <li id=\"5-raporlama\" class=\"inactive eael-tab-item-trigger eael-tab-nav-item\" aria-selected=\"false\" data-tab=\"7\" role=\"tab\" tabindex=\"-1\" aria-controls=\"5-raporlama-tab\" aria-expanded=\"false\">\n                            \n                            \n                            \n                                                            <span class=\"eael-tab-title title-after-icon\" >5. Reporting<\/span>                                                    <\/li>\n                                            <li id=\"neden-gvenlik-bak-as-gerekli\" class=\"inactive eael-tab-item-trigger eael-tab-nav-item\" aria-selected=\"false\" data-tab=\"8\" role=\"tab\" tabindex=\"-1\" aria-controls=\"neden-gvenlik-bak-as-gerekli-tab\" aria-expanded=\"false\">\n                            \n                            \n                            \n                                                            <span class=\"eael-tab-title title-after-icon\" >Why is a Security Perspective Necessary?<\/span>                                                    <\/li>\n                                            <li id=\"hangi-aamada-allmal\" class=\"inactive eael-tab-item-trigger eael-tab-nav-item\" aria-selected=\"false\" data-tab=\"9\" role=\"tab\" tabindex=\"-1\" aria-controls=\"hangi-aamada-allmal-tab\" aria-expanded=\"false\">\n                            \n                            \n                            \n                                                            <span class=\"eael-tab-title title-after-icon\" >At What Stage Should You Work?<\/span>                                                    <\/li>\n                    \n                                  <\/ul>\n            <\/div>\n            \n            <div class=\"eael-tabs-content\">\n\t\t        \n                    <div id=\"ne-kadar-yaygn-kullanlyor-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"ne-kadar-yaygn-kullanlyor-tab\">\n\t\t\t\t        Statista\u2019n\u0131n \u00f6ng\u00f6r\u00fclerine g\u00f6re, 2018 y\u0131l\u0131nda internete ba\u011fl\u0131 olan cihaz say\u0131s\u0131 22 milyar iken, 2025 y\u0131l\u0131nda bu say\u0131n\u0131n 38,6 milyar\u0131 bulmas\u0131 beklenmektedir. 2030 y\u0131l\u0131nda ise bu say\u0131n\u0131n 50 milyara \u00e7\u0131kmas\u0131 beklenmektedir. Business Insider ise Statista\u2019n\u0131n tahmininden daha yukar\u0131da veriler olaca\u011f\u0131n\u0131 \u00f6ng\u00f6r\u00fcyor. Business Insider\u2019\u0131n 2016 ve 2017 y\u0131llar\u0131 i\u00e7in yay\u0131nlad\u0131\u011f\u0131 IoT Pazar\u0131 Raporu&#8217;na g\u00f6re, 2025 y\u0131l\u0131nda 55 milyardan fazla IoT cihaz\u0131 olaca\u011f\u0131 \u00f6ng\u00f6r\u00fcl\u00fcyor. Rapora g\u00f6re, 2017-2025 y\u0131llar\u0131 aras\u0131nda 15 trilyon dolara yak\u0131n IoT yat\u0131r\u0131m\u0131 yap\u0131lmas\u0131 bekleniyor. 2025 y\u0131l\u0131n\u0131n sonunda 75 milyar cihaz\u0131n internete ba\u011fl\u0131 olmas\u0131 bekleniyor. 2026 y\u0131l\u0131nda IoT pazar\u0131n\u0131n 3 trilyon dolar\u0131n \u00fczerine \u00e7\u0131kaca\u011f\u0131 tahmin ediliyor.                     <\/div>\n\t\t        \n                    <div id=\"szma-testi-hangi-admlar-erir-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"szma-testi-hangi-admlar-erir-tab\">\n\t\t\t\t        <p><strong>A typical IoT Penetration Test includes the following steps:<\/strong><\/p><p>1. Determination of IoT Service Scope<br \/>2. Information Gathering<br \/>3. Vulnerability Assessment<br \/>4. Exploitation Phase<br \/>5. Reporting<\/p>                    <\/div>\n\t\t        \n                    <div id=\"1-iot-hizmet-kapsamnn-tespiti-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"1-iot-hizmet-kapsamnn-tespiti-tab\">\n\t\t\t\t        <ul><li>In order to ensure that security tests are carried out in the most effective way, all your needs are listened to and information is exchanged. Thus, the scope, type and required information are determined at the first safety meeting.<\/li><li>At this meeting, it is decided whether physical security tests will be needed on IoT devices and which components will be included in the test.<\/li><\/ul>                    <\/div>\n\t\t        \n                    <div id=\"2-bilgi-toplama-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"2-bilgi-toplama-tab\">\n\t\t\t\t        <p>In this step, attack vectors on IoT devices are first determined. The basic attack vectors on an IoT device are as follows:<\/p><ul><li>Implementation of Hardware Attacks<\/li><li>Firmware Reviews (Reverse Engineering, etc.)<\/li><li>Implementation of Network Attacks<\/li><li>Implementation of Wireless Network Attacks<\/li><li>Mobile and Web Applications<\/li><li>Penetration Tests<\/li><li>Cloud Services Penetration Tests<\/li><\/ul>                    <\/div>\n\t\t        \n                    <div id=\"3-gvenlik-a-deerlendirmesi-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"3-gvenlik-a-deerlendirmesi-tab\">\n\t\t\t\t        <p>This process starts with vulnerability assessment, firmware and application analysis. The following steps are used in firmware analysis:<\/p><ul><li><strong>Binary Analysis:<\/strong><ul><li>Reverse engineering,<\/li><li>Document analysis in the system (for finding sensitive information or certificates),<\/li><li>Performing all necessary application tests according to the type of application during application analysis.<\/li><\/ul><\/li><li><strong>Researching Communication Protocols:<\/strong><ul><li>Determination of communication protocols (BLE, Zigbee, LoRA, 6LoWPAN)<\/li><li>Sniffing, modifying and replaying communication protocols (relay-replay attacks),<\/li><li>Jam-based attacks,<\/li><li>Third party services (mobile application API services, etc.) that then communicate with the IoT devices specified in the information collection step.<\/li><\/ul><\/li><li><strong>Physical Security Tests:<\/strong><ul><li>External USB Access,<\/li><li>External ports access,<\/li><li>Location and storage environment,<\/li><li>Availability of debug console access<\/li><li>Availability of serial console access<\/li><li>Allowed connection methods (wireless, wired, Bluetooth, etc.)<\/li><li>Test controls.<\/li><\/ul><\/li><\/ul>                    <\/div>\n\t\t        \n                    <div id=\"4-smr-aamas-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"4-smr-aamas-tab\">\n\t\t\t\t        <ul><li class=\"translation-block\">This phase aims to exploit the vulnerabilities collected in the information gathering and vulnerability assessment sections. In this way, the party receiving the penetration test service can see the possible damage after a real cyber attack. In addition, the risks are evaluated for the vulnerabilities found. Similar vulnerabilities may have different levels of criticality based on ease of exploitation, access to information required to exploit, and the like.<\/li><li class=\"translation-block\">Cyber security experts use the necessary attack techniques to show what a malicious attacker can do in this step, without damaging the systems as much as possible.<\/li><\/ul>                    <\/div>\n\t\t        \n                    <div id=\"5-raporlama-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"5-raporlama-tab\">\n\t\t\t\t        <ul><li class=\"translation-block\">All detected vulnerabilities and findings are reported. The report is prepared in a simple language, understandable by the developers, in a standard supported by screenshots and presented to the parties.<\/li><li class=\"translation-block\">The report consists of sections that include the purpose and scope of the test, the general testing methodology, the security tests performed, and finally the evaluation and summary information for administrators.<\/li><\/ul>                    <\/div>\n\t\t        \n                    <div id=\"neden-gvenlik-bak-as-gerekli-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"neden-gvenlik-bak-as-gerekli-tab\">\n\t\t\t\t        <p>The widespread use of these systems causes security vulnerabilities that can have dramatic effects. Cyber Security Institute conducts security research on IoT systems, monitors current vulnerabilities and performs hardware and software penetration tests. Provides detailed technical reports and executive summaries as a result of penetration tests. It contributes to raising the awareness of institutions about security and eliminating possible security vulnerabilities.<br \/><span><\/span><\/p>                    <\/div>\n\t\t        \n                    <div id=\"hangi-aamada-allmal-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"hangi-aamada-allmal-tab\">\n\t\t\t\t        <ul><li><strong>In Software Planning and Pre-Development Phase:<\/strong><ul><li>Helping for designing a secure architecture,<\/li><li>Recommending best practices for developers to follow,<\/li><li>Integrating continuous IoT security testing into the DevOps cycle.<\/li><\/ul><\/li><li><strong>During Development:<\/strong><ul><li>Iteratively evaluating the product with its security requirements,<\/li><li>Constantly reviewing secure code,<\/li><li>Incorporating a security perspective as part of an automated process.<\/li><\/ul><\/li><li><strong>Post Development:<\/strong><ul><li>Performing penetration tests for all major releases,<\/li><li class=\"translation-block\">Managing the security program and interacting with external developers,<\/li><li>Patch management and recommending security updates.<\/li><\/ul><\/li><\/ul>                    <\/div>\n\t\t                    <\/div>\n        <\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-13b943b elementor-section-full_width elementor-section-height-min-height elementor-section-height-default\" data-id=\"13b943b\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-520c511\" data-id=\"520c511\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4709aa0 elementor-widget elementor-widget-menu-anchor\" data-id=\"4709aa0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"sizma-testleri\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-43fb02a elementor-widget elementor-widget-heading\" data-id=\"43fb02a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Penetration Tests<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f1653f2 horizontal-scroll-tab elementor-widget elementor-widget-eael-adv-tabs\" data-id=\"f1653f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-adv-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div data-scroll-on-click=\"no\" data-scroll-speed=\"300\" id=\"eael-advance-tabs-f1653f2\" class=\"eael-advance-tabs eael-tabs-horizontal eael-tab-auto-active  active-caret-on\" data-tabid=\"f1653f2\">\n            <div class=\"eael-tabs-nav\">\n                <ul class=\"\" role=\"tablist\">\n                                            <li id=\"genel-zellikler\" class=\"inactive eael-tab-item-trigger eael-tab-nav-item\" aria-selected=\"true\" data-tab=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"genel-zellikler-tab\" aria-expanded=\"false\">\n                            \n                            \n                            \n                                                            <span class=\"eael-tab-title title-after-icon\" >General Features<\/span>                                                    <\/li>\n                                            <li id=\"amalar\" class=\"inactive eael-tab-item-trigger eael-tab-nav-item\" aria-selected=\"false\" data-tab=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"amalar-tab\" aria-expanded=\"false\">\n                            \n                            \n                            \n                                                            <span class=\"eael-tab-title title-after-icon\" >Purposes<\/span>                                                    <\/li>\n                    \n                                  <\/ul>\n            <\/div>\n            \n            <div class=\"eael-tabs-content\">\n\t\t        \n                    <div id=\"genel-zellikler-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"genel-zellikler-tab\">\n\t\t\t\t        <p>SGE conducts penetration tests and security audits for both public institutions\/organizations and private sector companies. Penetration tests and security audits cover all components in the IT infrastructure. After the tests are completed, detailed technical reports and executive summaries are produced. In addition to technical security tests, social engineering tests are also carried out to increase the security awareness of the employees.<\/p><p>New exploitation methods and tools are being researched and developed by SGE researchers to perform more efficient and high-standard testing.<\/p>                    <\/div>\n\t\t        \n                    <div id=\"amalar-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"amalar-tab\">\n\t\t\t\t        <p>One of the main goal in this area is information sharing. In addition to the security tests carried out in both the public and private sectors, studies are carried out to increase the quality of the tests carried out within this scope in the sector. Workshops are organized to determine the scope and depth of tests, to increase the quality and objectivity of test result reports, and joint projects are carried out with regulatory agencies.<\/p>                    <\/div>\n\t\t                    <\/div>\n        <\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5161bd3 elementor-section-full_width elementor-section-height-min-height elementor-section-height-default\" data-id=\"5161bd3\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-ebbbe44\" data-id=\"ebbbe44\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5b7c5fc elementor-widget elementor-widget-menu-anchor\" data-id=\"5b7c5fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"guvenlik-denetimleri\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0991377 elementor-widget elementor-widget-heading\" data-id=\"0991377\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Security Controls<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9e7afc7 horizontal-scroll-tab elementor-widget elementor-widget-eael-adv-tabs\" data-id=\"9e7afc7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-adv-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div data-scroll-on-click=\"no\" data-scroll-speed=\"300\" id=\"eael-advance-tabs-9e7afc7\" class=\"eael-advance-tabs eael-tabs-horizontal eael-tab-auto-active  active-caret-on\" data-tabid=\"9e7afc7\">\n            <div class=\"eael-tabs-nav\">\n                <ul class=\"\" role=\"tablist\">\n                                            <li id=\"genel-zellikler\" class=\"inactive eael-tab-item-trigger eael-tab-nav-item\" aria-selected=\"true\" data-tab=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"genel-zellikler-tab\" aria-expanded=\"false\">\n                            \n                            \n                            \n                                                            <span class=\"eael-tab-title title-after-icon\" >General Features<\/span>                                                    <\/li>\n                                            <li id=\"teknik-zellikler\" class=\"inactive eael-tab-item-trigger eael-tab-nav-item\" aria-selected=\"false\" data-tab=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"teknik-zellikler-tab\" aria-expanded=\"false\">\n                            \n                            \n                            \n                                                            <span class=\"eael-tab-title title-after-icon\" >Technicial Features<\/span>                                                    <\/li>\n                    \n                                  <\/ul>\n            <\/div>\n            \n            <div class=\"eael-tabs-content\">\n\t\t        \n                    <div id=\"genel-zellikler-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"genel-zellikler-tab\">\n\t\t\t\t        <p>G\u00fcvenlik, yaz\u0131l\u0131mlara ve sisteme sonradan eklenebilecek bir \u00f6zellik de\u011fildir. Geli\u015ftirme s\u00fcrecinin par\u00e7as\u0131 olarak ele al\u0131nmal\u0131d\u0131r. Geli\u015ftirme ve kurulum s\u00fcre\u00e7lerinde g\u00fcvenlik i\u015flevlerini uygulamak hem daha kolay hem daha etkilidir. SGE bu ba\u011flamda &#8220;G\u00fcvenlik Denetimleri&#8221; hizmeti vermektedir.<\/p>                    <\/div>\n\t\t        \n                    <div id=\"teknik-zellikler-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"teknik-zellikler-tab\">\n\t\t\t\t        SGE provides the following support to public institutions\/organizations and the private sector:\n<ul>\n \t<li>Secure software development trainings,<\/li>\n \t<li>Software source code analysis to detect vulnerabilities as a result of mistakes made while developing software,<\/li>\n \t<li>Risk analysis and threat modeling to make secure software development processes more effective,<\/li>\n \t<li>Researching and implementing new secure software development methods,<\/li>\n \t<li>Conducting secure software development workshops and conferences.<\/li>\n<\/ul>\nIn this regard, SGE has been involved in multiple NATO information systems development projects. Within the scope of the system and software security accreditation process of these projects, it supported the design of secure systems, the preparation of accreditation documents, and performed the security tests of the developed systems.                     <\/div>\n\t\t                    <\/div>\n        <\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-d8addd2 elementor-section-full_width elementor-section-height-min-height elementor-section-height-default\" data-id=\"d8addd2\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-063ca87\" data-id=\"063ca87\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-04ace1b elementor-widget elementor-widget-menu-anchor\" data-id=\"04ace1b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"risk-analizi\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d755bba elementor-widget elementor-widget-heading\" data-id=\"d755bba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Risk Analysis<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bf372ec horizontal-scroll-tab elementor-widget elementor-widget-eael-adv-tabs\" data-id=\"bf372ec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-adv-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div data-scroll-on-click=\"no\" data-scroll-speed=\"300\" id=\"eael-advance-tabs-bf372ec\" class=\"eael-advance-tabs eael-tabs-horizontal eael-tab-auto-active  active-caret-on\" data-tabid=\"bf372ec\">\n            <div class=\"eael-tabs-nav\">\n                <ul class=\"\" role=\"tablist\">\n                                            <li id=\"genel-zellikler\" class=\"inactive eael-tab-item-trigger eael-tab-nav-item\" aria-selected=\"true\" data-tab=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"genel-zellikler-tab\" aria-expanded=\"false\">\n                            \n                            \n                            \n                                                            <span class=\"eael-tab-title title-after-icon\" >General Features<\/span>                                                    <\/li>\n                                            <li id=\"teknik-zellikler\" class=\"inactive eael-tab-item-trigger eael-tab-nav-item\" aria-selected=\"false\" data-tab=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"teknik-zellikler-tab\" aria-expanded=\"false\">\n                            \n                            \n                            \n                                                            <span class=\"eael-tab-title title-after-icon\" >Technicial Features<\/span>                                                    <\/li>\n                    \n                                  <\/ul>\n            <\/div>\n            \n            <div class=\"eael-tabs-content\">\n\t\t        \n                    <div id=\"genel-zellikler-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"genel-zellikler-tab\">\n\t\t\t\t        <p>SGE provides information security risk analysis services for military, public and private sector organizations. Risk analysis projects can be done on software and system basis. Risk analysis services are also provided within the scope of ISO 27001 certification on a corporate basis.\u00a0<\/p>                    <\/div>\n\t\t        \n                    <div id=\"teknik-zellikler-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"teknik-zellikler-tab\">\n\t\t\t\t        <p>In this context, the business processes of the institution are analyzed and critical business processes are determined; assets in these business processes and dependencies between assets are removed and asset valuation is carried out. Afterwards, the probability and impact values for the risks that affect these assets are determined and the risk values for the asset or process are calculated. Risks are documented in detail in accordance with the content of the project. In accordance with the threats, the measures are issued according to the requirements defined in ISO 27001 and NIST SP 800-53 standards, the maturity levels of the measures are determined together with the customer and they are documented in accordance with the project content. Finally, after the implementation of the measures, a risk study is carried out and the remaining risk is evaluated.<\/p>                    <\/div>\n\t\t                    <\/div>\n        <\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>SGE Ana Sayfa\u00a0 \u00a0\/\u00a0 \u00a0SGE Hizmetler SGE Hizmetler T\u00dcB\u0130TAK B\u0130LGEM SGE siber g\u00fcvenlik alan\u0131nda ara\u015ft\u0131rma-geli\u015ftirme faaliyetleri y\u00fcr\u00fctmekte; asker\u00ee kurumlara, kamu [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"elementor_header_footer","meta":{"_acf_changed":false,"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-52359","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/en.bilgem.tubitak.gov.tr\/en\/wp-json\/wp\/v2\/pages\/52359","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/en.bilgem.tubitak.gov.tr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/en.bilgem.tubitak.gov.tr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/en.bilgem.tubitak.gov.tr\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/en.bilgem.tubitak.gov.tr\/en\/wp-json\/wp\/v2\/comments?post=52359"}],"version-history":[{"count":4,"href":"https:\/\/en.bilgem.tubitak.gov.tr\/en\/wp-json\/wp\/v2\/pages\/52359\/revisions"}],"predecessor-version":[{"id":107670,"href":"https:\/\/en.bilgem.tubitak.gov.tr\/en\/wp-json\/wp\/v2\/pages\/52359\/revisions\/107670"}],"wp:attachment":[{"href":"https:\/\/en.bilgem.tubitak.gov.tr\/en\/wp-json\/wp\/v2\/media?parent=52359"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}