{"id":2132,"date":"2022-04-19T18:18:44","date_gmt":"2022-04-19T18:18:44","guid":{"rendered":"https:\/\/smartit.ws\/?page_id=2132"},"modified":"2022-10-18T15:24:16","modified_gmt":"2022-10-18T15:24:16","slug":"application-security-assessment","status":"publish","type":"page","link":"https:\/\/smartit.ws\/az\/solutions\/vulnerabilty-management-solutions\/application-security-assessment\/","title":{"rendered":"T\u0259tbiq t\u0259hl\u00fck\u0259sizliyinin qiym\u0259tl\u0259ndirilm\u0259si"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"2132\" class=\"elementor elementor-2132\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6090fb7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6090fb7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0a1f969\" data-id=\"0a1f969\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4e2d9f8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4e2d9f8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-ed0e972\" data-id=\"ed0e972\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f19d2aa elementor-widget elementor-widget-image\" data-id=\"f19d2aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"37\" height=\"36\" src=\"https:\/\/smartit.ws\/wp-content\/uploads\/2022\/08\/Application-Security-Assessment.png\" class=\"attachment-full size-full wp-image-2896\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-49b29aa\" data-id=\"49b29aa\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3ad3a70 elementor-widget elementor-widget-heading\" data-id=\"3ad3a70\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">T\u0259tbiq t\u0259hl\u00fck\u0259sizliyinin qiym\u0259tl\u0259ndirilm\u0259si<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-dbe1aa5 elementor-widget elementor-widget-text-editor\" data-id=\"dbe1aa5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>T\u0259tbiq T\u0259hl\u00fck\u0259sizliyinin Qiym\u0259tl\u0259ndirilm\u0259si (Application Security Assessment) ya \u0259l il\u0259, ya da avtomatik olaraq h\u0259yata ke\u00e7irilir v\u0259 proqram t\u0259minat\u0131n\u0131n b\u00fct\u00fcn inki\u015faf d\u00f6vr\u00fc \u0259rzind\u0259 davam edir. Bu, ad\u0259t\u0259n t\u0259hl\u00fck\u0259siz protokollar\u0131n istifad\u0259sin\u0259 diqq\u0259ti, proqram kodunda m\u00fc\u0259yy\u0259n edilmi\u015f t\u0259hl\u00fck\u0259sizlik yoxlamalar\u0131n\u0131n apar\u0131lmas\u0131n\u0131, m\u00fcnt\u0259z\u0259m kod qiym\u0259tl\u0259ndirm\u0259l\u0259rinin apar\u0131lmas\u0131n\u0131 v\u0259 t\u0259hl\u00fck\u0259siz kodla\u015fd\u0131rma t\u0259cr\u00fcb\u0259l\u0259ri v\u0259 \u00fcmumi s\u0259hvl\u0259r \u00fczr\u0259 t\u0259rtibat\u00e7\u0131lar\u0131n t\u0259limini \u0259hat\u0259 edir (OWASP Top 10).<\/p><p>Veb t\u0259tbiqi t\u0259hl\u00fck\u0259sizliyinin qiym\u0259tl\u0259ndirilm\u0259si veb-sayt t\u0259hl\u00fck\u0259sizliyin\u0259 davaml\u0131 olaraq n\u0259zar\u0259t etm\u0259k, proqram z\u0259iflikl\u0259rini m\u00fc\u0259yy\u0259n etm\u0259y\u0259 v\u0259 qoruma\u011fa k\u00f6m\u0259k etm\u0259k, d\u0259st\u0259kl\u0259yici proqramlar\u0131 v\u0259 \u0259sas sisteml\u0259ri tam \u201cpatch\u201d edilmi\u015f v\u0259 yeni saxlamaq \u00fc\u00e7\u00fcn n\u0259z\u0259rd\u0259 tutulmu\u015fdur.<\/p><p>Veb T\u0259tbiqin T\u0259hl\u00fck\u0259sizlik Qiym\u0259tl\u0259ndirm\u0259l\u0259ri \u015f\u00fcbh\u0259li \u015f\u0259b\u0259k\u0259 trafiki v\u0259 f\u0259aliyy\u0259tini yoxlay\u0131r, monitorinq edir v\u0259 m\u00fcxt\u0259lif z\u0259iflik skanerl\u0259rini, kod analizatorlar\u0131n\u0131 v\u0259 n\u00fcfuzetm\u0259 test al\u0259tl\u0259rini \u0259hat\u0259 edir. \u00d6z proqramlar\u0131n\u0131 haz\u0131rlayan m\u00fc\u0259ssis\u0259l\u0259r bu t\u0259dbirl\u0259ri \u00f6z inki\u015faf f\u0259aliyy\u0259tl\u0259rin\u0259 daxil etm\u0259lidir.<\/p><p>Onlar, h\u0259m\u00e7inin OWASP Top 10 kodla\u015fd\u0131rma s\u0259hvl\u0259rind\u0259n istifad\u0259 etm\u0259kl\u0259 edil\u0259n \u0259n \u00e7ox yay\u0131lm\u0131\u015f t\u0259hl\u00fck\u0259li kodla\u015fd\u0131rma t\u0259cr\u00fcb\u0259l\u0259ri v\u0259 s\u0259hvl\u0259r haqq\u0131nda t\u0259rtibat\u00e7\u0131lar\u0131na t\u0259lim verm\u0259lidirl\u0259r.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Application Security Assessment An Application Security Assessment is performed either manually &#8230; <\/p>","protected":false},"author":1,"featured_media":0,"parent":1934,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2132","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/smartit.ws\/az\/wp-json\/wp\/v2\/pages\/2132","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smartit.ws\/az\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/smartit.ws\/az\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/smartit.ws\/az\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smartit.ws\/az\/wp-json\/wp\/v2\/comments?post=2132"}],"version-history":[{"count":3,"href":"https:\/\/smartit.ws\/az\/wp-json\/wp\/v2\/pages\/2132\/revisions"}],"predecessor-version":[{"id":3791,"href":"https:\/\/smartit.ws\/az\/wp-json\/wp\/v2\/pages\/2132\/revisions\/3791"}],"up":[{"embeddable":true,"href":"https:\/\/smartit.ws\/az\/wp-json\/wp\/v2\/pages\/1934"}],"wp:attachment":[{"href":"https:\/\/smartit.ws\/az\/wp-json\/wp\/v2\/media?parent=2132"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}