{"id":2135,"date":"2022-04-19T18:19:43","date_gmt":"2022-04-19T18:19:43","guid":{"rendered":"https:\/\/smartit.ws\/?page_id=2135"},"modified":"2022-10-18T15:25:01","modified_gmt":"2022-10-18T15:25:01","slug":"it-infrastructure-security-assessment","status":"publish","type":"page","link":"https:\/\/smartit.ws\/az\/solutions\/vulnerabilty-management-solutions\/it-infrastructure-security-assessment\/","title":{"rendered":"\u0130T infrastrukturunun t\u0259hl\u00fck\u0259sizliyinin qiym\u0259tl\u0259ndirilm\u0259si"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"2135\" class=\"elementor elementor-2135\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6090fb7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6090fb7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0a1f969\" data-id=\"0a1f969\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-e9cf3f5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e9cf3f5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-f5f3019\" data-id=\"f5f3019\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dd83ff8 elementor-widget elementor-widget-image\" data-id=\"dd83ff8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"37\" height=\"36\" src=\"https:\/\/smartit.ws\/wp-content\/uploads\/2022\/08\/IT-Infrastructure-Security-Assessment.png\" class=\"attachment-full size-full wp-image-2898\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-0f54ea4\" data-id=\"0f54ea4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1490c78 elementor-widget elementor-widget-heading\" data-id=\"1490c78\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\u0130T infrastrukturunun t\u0259hl\u00fck\u0259sizliyinin qiym\u0259tl\u0259ndirilm\u0259si<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-dbe1aa5 elementor-widget elementor-widget-text-editor\" data-id=\"dbe1aa5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u0130T \u0130nfrastrukturunun T\u0259hl\u00fck\u0259sizliyinin Qiym\u0259tl\u0259ndirilm\u0259si prosesi host, \u015f\u0259b\u0259k\u0259, t\u0259tbiq v\u0259 \u0259traf m\u00fchit\u0259 n\u0259zar\u0259t d\u0259 daxil olmaqla b\u00fct\u00fcn infrastrukturun h\u0259rt\u0259r\u0259fli n\u0259z\u0259rd\u0259n ke\u00e7irilm\u0259sidir. Bu qiym\u0259tl\u0259ndirm\u0259 h\u0259m\u00e7inin m\u00f6vcud siyas\u0259t v\u0259 prosedurlar\u0131n n\u0259z\u0259rd\u0259n ke\u00e7irilm\u0259sini d\u0259 \u0259hat\u0259 edir.<\/p><p>Kibert\u0259hl\u00fck\u0259sizliyin qiym\u0259tl\u0259ndirilm\u0259si z\u0259iflik bo\u015fluqlar\u0131n\u0131 ba\u011flamaq v\u0259 z\u0259iflikl\u0259ri aradan qald\u0131rmaq m\u0259qs\u0259di da\u015f\u0131y\u0131r, n\u0259tic\u0259 etibar\u0131 il\u0259 t\u0259sir \u00fc\u00e7\u00fcn \u0259n y\u00fcks\u0259k potensial\u0131 olan m\u0259s\u0259l\u0259l\u0259rin aradan qald\u0131r\u0131lmas\u0131n\u0131 prioritetl\u0259\u015fdirir.<\/p><p>Qiym\u0259tl\u0259ndirm\u0259l\u0259r h\u0259m\u00e7inin kibert\u0259hl\u00fck\u0259sizlik komandalar\u0131na r\u0259hb\u0259rlikl\u0259 \u0259laq\u0259ni yax\u015f\u0131la\u015fd\u0131rma\u011fa k\u00f6m\u0259k edir. \u018fn effektiv t\u0259hl\u00fck\u0259sizlik strategiyalar\u0131 \u015firk\u0259tin b\u00fct\u00fcn \u0259m\u0259liyyatlar\u0131na inteqrasiya olunub.<\/p><p>\u0130T \u0130nfrastrukturunun T\u0259hl\u00fck\u0259sizliyinin Qiym\u0259tl\u0259ndirilm\u0259sini t\u0259min etm\u0259kl\u0259 siz a\u015fa\u011f\u0131dak\u0131 suallara cavab tapa bil\u0259c\u0259ksiniz:<\/p><p>- \u0130T sisteml\u0259rinin hans\u0131 hiss\u0259l\u0259ri (yerli v\u0259 ya bulud) hakerl\u0259r, \u201cransomware\u201d v\u0259 dig\u0259r cari kiber t\u0259hl\u00fck\u0259l\u0259r\u0259 qar\u015f\u0131 h\u0259ssasd\u0131r v\u0259 onlar\u0131 nec\u0259 qoruya bil\u0259rik\/onlar\u0131 daha t\u0259hl\u00fck\u0259siz ed\u0259 bil\u0259rik?<\/p><p>- \u0130T infrastrukturumuz z\u0259r\u0259rli niyy\u0259ti olanlar \u00fc\u00e7\u00fcn \u0259l\u00e7atand\u0131rm\u0131? WiFi \u015f\u0259b\u0259k\u0259miz t\u0259hl\u00fck\u0259sizdirmi?<\/p><p>- T\u0259cav\u00fczkarlar \u015f\u0259b\u0259k\u0259miz\u0259 daxil olsalar, hans\u0131 miqyasda z\u0259r\u0259r vura bil\u0259rl\u0259r?<\/p><p>- Hans\u0131 m\u0259lumatlar\u0131 \u0259l\u0259 ke\u00e7ir\u0259 bil\u0259rl\u0259r? Bu m\u0259lumatlar\u0131 nec\u0259 istifad\u0259 ed\u0259 bil\u0259rl\u0259r?<\/p><p>- Hans\u0131 sisteml\u0259r vasit\u0259sil\u0259 biz h\u0259ssas\u0131q?<\/p><p>- \u015eirk\u0259t \u015f\u0259b\u0259k\u0259mizd\u0259 m\u00f6vcud t\u0259hl\u00fck\u0259sizlik t\u0259dbirl\u0259ri \u201cransomware\u201d kimi cari kibert\u0259hl\u00fck\u0259l\u0259r\u0259 tab g\u0259tirm\u0259k \u00fc\u00e7\u00fcn kifay\u0259tdirmi?<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>IT Infrastructure Security Assessment An IT Infrastructure Security Assessment is a &#8230; <\/p>","protected":false},"author":1,"featured_media":0,"parent":1934,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2135","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/smartit.ws\/az\/wp-json\/wp\/v2\/pages\/2135","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smartit.ws\/az\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/smartit.ws\/az\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/smartit.ws\/az\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smartit.ws\/az\/wp-json\/wp\/v2\/comments?post=2135"}],"version-history":[{"count":3,"href":"https:\/\/smartit.ws\/az\/wp-json\/wp\/v2\/pages\/2135\/revisions"}],"predecessor-version":[{"id":3794,"href":"https:\/\/smartit.ws\/az\/wp-json\/wp\/v2\/pages\/2135\/revisions\/3794"}],"up":[{"embeddable":true,"href":"https:\/\/smartit.ws\/az\/wp-json\/wp\/v2\/pages\/1934"}],"wp:attachment":[{"href":"https:\/\/smartit.ws\/az\/wp-json\/wp\/v2\/media?parent=2135"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}