{"id":1860,"date":"2022-04-18T17:04:51","date_gmt":"2022-04-18T17:04:51","guid":{"rendered":"https:\/\/smartit.ws\/?page_id=1860"},"modified":"2022-10-18T15:13:02","modified_gmt":"2022-10-18T15:13:02","slug":"deception-for-threat-defence","status":"publish","type":"page","link":"https:\/\/smartit.ws\/az\/solutions\/perimeter-security-solutions\/deception-for-threat-defence\/","title":{"rendered":"Aldatma sisteml\u0259ri"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"1860\" class=\"elementor elementor-1860\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6090fb7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6090fb7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0a1f969\" data-id=\"0a1f969\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b2aef44 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b2aef44\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-180b30d\" data-id=\"180b30d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4c1373c elementor-widget elementor-widget-image\" data-id=\"4c1373c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"36\" height=\"36\" src=\"https:\/\/smartit.ws\/wp-content\/uploads\/2022\/08\/Deception-for-Threat-Defence.png\" class=\"attachment-full size-full wp-image-2858\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-0da9aab\" data-id=\"0da9aab\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e61f054 elementor-widget elementor-widget-heading\" data-id=\"e61f054\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Aldatma sisteml\u0259ri<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-dbe1aa5 elementor-widget elementor-widget-text-editor\" data-id=\"dbe1aa5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Aldatma texnologiyas\u0131, pis niyy\u0259tlil\u0259ri a\u015fkarlamaq v\u0259 onlar haqq\u0131nda daha \u00e7ox m\u0259lumat \u0259ld\u0259 etm\u0259k \u00fc\u00e7\u00fcn saxta \u015f\u0259b\u0259k\u0259 m\u00fchitl\u0259rind\u0259n tutmu\u015f Honeypot-lara q\u0259d\u0259r aldad\u0131c\u0131 taktikalardan istifad\u0259 ed\u0259n kibert\u0259hl\u00fck\u0259sizlik n\u00f6v\u00fcd\u00fcr. Firewall-lar v\u0259 son n\u00f6qt\u0259 a\u015fkarlama sisteml\u0259ri kimi \u0259n\u0259n\u0259vi t\u0259hl\u00fck\u0259sizlik infrastrukturundan f\u0259rqli olaraq, aldatma texnologiyas\u0131 sad\u0259c\u0259 perimetri m\u00fcdafi\u0259 etm\u0259y\u0259 \u00e7al\u0131\u015fm\u0131r. \u041e, h\u0259tta t\u0259\u015fkilat daxilind\u0259n g\u0259l\u0259n h\u0259r hans\u0131 qeyri-qanuni f\u0259aliyy\u0259ti a\u015fkar edir v\u0259 bunu insan t\u0259cav\u00fczkar\u0131 n\u00f6qteyi-n\u0259z\u0259rind\u0259n h\u0259yata ke\u00e7irir. Aldatman\u0131n son m\u0259qs\u0259di - daha yax\u015f\u0131 m\u0259lumatl\u0131 v\u0259 haz\u0131rl\u0131ql\u0131 olmaqla sistem z\u0259d\u0259l\u0259nm\u0259sinin qar\u015f\u0131s\u0131n\u0131 almaqd\u0131r.<\/p><p>Aldatma al\u0259tl\u0259ri vacib m\u0259lumat aktivl\u0259ri v\u0259 sisteml\u0259rini f\u0259al \u015f\u0259kild\u0259 qorumaq v\u0259 davaml\u0131 t\u0259hdid k\u0259\u015ffiyyat\u0131 toplamaqla pis niyy\u0259tlil\u0259ri m\u0259\u015f\u011ful etm\u0259k v\u0259 aldatma \u00fcsullar\u0131 vasit\u0259sil\u0259 yanl\u0131\u015f istiqam\u0259tl\u0259ndirm\u0259k \u00fc\u00e7\u00fcn istifad\u0259 etdiyi s\u00fcni m\u00fchitl\u0259r\u0259 y\u00f6nl\u0259ndirm\u0259k getdikc\u0259 daha tez-tez istifad\u0259 olunur.<\/p><p>Aldatma texnologiyas\u0131n\u0131n m\u0259qs\u0259di \u015f\u0259b\u0259k\u0259y\u0259 s\u0131zma\u011f\u0131 bacaran kibercinay\u0259tkar\u0131n real infrastruktura h\u0259r hans\u0131 \u0259h\u0259miyy\u0259tli ziyan vurmas\u0131n\u0131n qar\u015f\u0131s\u0131n\u0131 almaqd\u0131r. Texnologiya b\u00fct\u00fcn infrastrukturda qanuni texnologiya aktivl\u0259rini t\u0259qlid ed\u0259n t\u0259l\u0259l\u0259r v\u0259 ya aldatma f\u0131r\u0131ldaqlar\u0131 yaratmaqla i\u015fl\u0259yir. Bu t\u0259l\u0259l\u0259r virtual v\u0259 ya real \u0259m\u0259liyyat sistemi m\u00fchitind\u0259 i\u015fl\u0259y\u0259 bil\u0259r v\u0259 kibercinay\u0259tkar\u0131 imtiyazlar\u0131 art\u0131rmaq v\u0259 istifad\u0259\u00e7i m\u0259lumatlar\u0131 o\u011furlamaq \u00fc\u00e7\u00fcn bir vasit\u0259 tapd\u0131qlar\u0131n\u0131 d\u00fc\u015f\u00fcnm\u0259kl\u0259 yan\u0131ltmaq \u00fc\u00e7\u00fcn n\u0259z\u0259rd\u0259 tutulub. T\u0259l\u0259 i\u015f\u0259 d\u00fc\u015fd\u00fckd\u0259n sonra bildiri\u015fl\u0259r \u0259trafl\u0131 m\u0259umatla birg\u0259 m\u0259rk\u0259zl\u0259\u015fdirilmi\u015f aldatma serverin\u0259 g\u00f6nd\u0259rilir.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Deception for Threat Defence Deception technology is a type of cybersecurity &#8230; <\/p>","protected":false},"author":1,"featured_media":0,"parent":1839,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1860","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/smartit.ws\/az\/wp-json\/wp\/v2\/pages\/1860","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smartit.ws\/az\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/smartit.ws\/az\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/smartit.ws\/az\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smartit.ws\/az\/wp-json\/wp\/v2\/comments?post=1860"}],"version-history":[{"count":6,"href":"https:\/\/smartit.ws\/az\/wp-json\/wp\/v2\/pages\/1860\/revisions"}],"predecessor-version":[{"id":3761,"href":"https:\/\/smartit.ws\/az\/wp-json\/wp\/v2\/pages\/1860\/revisions\/3761"}],"up":[{"embeddable":true,"href":"https:\/\/smartit.ws\/az\/wp-json\/wp\/v2\/pages\/1839"}],"wp:attachment":[{"href":"https:\/\/smartit.ws\/az\/wp-json\/wp\/v2\/media?parent=1860"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}