{"id":2129,"date":"2022-04-19T18:17:19","date_gmt":"2022-04-19T18:17:19","guid":{"rendered":"https:\/\/smartit.ws\/?page_id=2129"},"modified":"2022-10-18T15:22:58","modified_gmt":"2022-10-18T15:22:58","slug":"vulnerability-scanners","status":"publish","type":"page","link":"https:\/\/smartit.ws\/az\/solutions\/vulnerabilty-management-solutions\/vulnerability-scanners\/","title":{"rendered":"Bo\u015fluq skanerl\u0259ri"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"2129\" class=\"elementor elementor-2129\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6090fb7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6090fb7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0a1f969\" data-id=\"0a1f969\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-96383f9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"96383f9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-27ab156\" data-id=\"27ab156\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3a02891 elementor-widget elementor-widget-image\" data-id=\"3a02891\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"36\" height=\"36\" src=\"https:\/\/smartit.ws\/wp-content\/uploads\/2022\/08\/Vulnerability-Scanners.png\" class=\"attachment-full size-full wp-image-2899\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a359577\" data-id=\"a359577\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-181b7d0 elementor-widget elementor-widget-heading\" data-id=\"181b7d0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Bo\u015fluq skanerl\u0259ri<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-dbe1aa5 elementor-widget elementor-widget-text-editor\" data-id=\"dbe1aa5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Bo\u015fluq (z\u0259iflik) skanerl\u0259ri t\u0259\u015fkilatlara onlar\u0131n \u015f\u0259b\u0259k\u0259l\u0259rind\u0259, sisteml\u0259rind\u0259 v\u0259 t\u0259tbiql\u0259rind\u0259 h\u00fccumlara m\u0259ruz qala bil\u0259c\u0259k t\u0259hl\u00fck\u0259sizlik z\u0259iflikl\u0259rinin olub-olmad\u0131\u011f\u0131n\u0131 yoxlama\u011fa imkan ver\u0259n avtomatla\u015fd\u0131r\u0131lm\u0131\u015f al\u0259tl\u0259rdir. Z\u0259iflikl\u0259rin skan edilm\u0259si \u00fcmumi t\u0259cr\u00fcb\u0259dir v\u0259 t\u0259\u015fkilatlar\u0131n t\u0259hl\u00fck\u0259sizlik v\u0259ziyy\u0259tini yax\u015f\u0131la\u015fd\u0131rmaq \u00fc\u00e7\u00fcn beyn\u0259lxalq standartlar v\u0259 n\u0259zar\u0259tedici orqanlar\u0131n qaydalar\u0131 il\u0259 t\u0259l\u0259b olunur. \u015e\u0259b\u0259k\u0259nin, veb serverl\u0259rin v\u0259 proqramlar\u0131n m\u00fcnt\u0259z\u0259m skan edilm\u0259si t\u0259cav\u00fczkarlar\u0131n potensial istifad\u0259 ed\u0259 bil\u0259c\u0259yi z\u0259if c\u0259h\u0259tl\u0259ri a\u015fkar etm\u0259y\u0259 k\u00f6m\u0259k edir.<\/p><p>Z\u0259iflik skanlar\u0131 \u015f\u0259b\u0259k\u0259 xaricind\u0259n v\u0259 ya \u015f\u0259b\u0259k\u0259 daxilind\u0259n h\u0259yata ke\u00e7iril\u0259 bil\u0259r. T\u0259\u015fkilatlar birba\u015fa internetd\u0259n \u0259ld\u0259 edil\u0259 bil\u0259n server v\u0259 proqramlar\u0131n h\u00fccumlar\u0131na m\u0259ruz qalmas\u0131n\u0131 m\u00fc\u0259yy\u0259n etm\u0259k \u00fc\u00e7\u00fcn \u015f\u0259b\u0259k\u0259 perimetri xaricind\u0259 xarici skanlar h\u0259yata ke\u00e7ir\u0259 bil\u0259r. Eyni zamanda, daxili z\u0259iflik skanlar\u0131 n\u0259z\u0259ri olaraq hakerl\u0259rin yerli \u015f\u0259b\u0259k\u0259y\u0259 daxil oldu\u011fu halda m\u00fcxt\u0259lif sisteml\u0259r\u0259 v\u0259 serverl\u0259r\u0259 h\u00fccuma ke\u00e7m\u0259k \u00fc\u00e7\u00fcn istifad\u0259 ed\u0259 bil\u0259c\u0259yi q\u00fcsurlar\u0131 m\u00fc\u0259yy\u0259n etm\u0259k m\u0259qs\u0259di da\u015f\u0131y\u0131r.<\/p><p>\u00d6d\u0259ni\u015f Kartlar\u0131 \u00fczr\u0259 PCI-DSS standart\u0131 kimi b\u0259zi beyn\u0259lxalq standartlar t\u0259\u015fkilatlardan r\u00fcbl\u00fck olaraq h\u0259m xarici, h\u0259m d\u0259 daxili z\u0259ifliyin skan edilm\u0259sini t\u0259l\u0259b edir, h\u0259m\u00e7inin h\u0259r d\u0259f\u0259 yeni sisteml\u0259r v\u0259 ya komponentl\u0259r qura\u015fd\u0131r\u0131ld\u0131qda \u015f\u0259b\u0259k\u0259 topologiyas\u0131 d\u0259yi\u015fir, firewall qaydalar\u0131 d\u0259yi\u015fdirilir v\u0259 ya m\u00fcxt\u0259lif proqram m\u0259hsullar\u0131 t\u0259kmill\u0259\u015fdirilir.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Vulnerability Scanners Vulnerability scanners are automated tools that allow organizations to &#8230; <\/p>","protected":false},"author":1,"featured_media":0,"parent":1934,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2129","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/smartit.ws\/az\/wp-json\/wp\/v2\/pages\/2129","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smartit.ws\/az\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/smartit.ws\/az\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/smartit.ws\/az\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smartit.ws\/az\/wp-json\/wp\/v2\/comments?post=2129"}],"version-history":[{"count":3,"href":"https:\/\/smartit.ws\/az\/wp-json\/wp\/v2\/pages\/2129\/revisions"}],"predecessor-version":[{"id":3785,"href":"https:\/\/smartit.ws\/az\/wp-json\/wp\/v2\/pages\/2129\/revisions\/3785"}],"up":[{"embeddable":true,"href":"https:\/\/smartit.ws\/az\/wp-json\/wp\/v2\/pages\/1934"}],"wp:attachment":[{"href":"https:\/\/smartit.ws\/az\/wp-json\/wp\/v2\/media?parent=2129"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}