{"id":2167,"date":"2022-04-19T18:34:57","date_gmt":"2022-04-19T18:34:57","guid":{"rendered":"https:\/\/smartit.ws\/?page_id=2167"},"modified":"2022-10-18T15:27:55","modified_gmt":"2022-10-18T15:27:55","slug":"threat-intelligence","status":"publish","type":"page","link":"https:\/\/smartit.ws\/az\/solutions\/incident-management-solutions\/threat-intelligence\/","title":{"rendered":"T\u0259hdid k\u0259\u015ffiyyat\u0131"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"2167\" class=\"elementor elementor-2167\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6090fb7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6090fb7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0a1f969\" data-id=\"0a1f969\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-bf71f23 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bf71f23\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-23b1d68\" data-id=\"23b1d68\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2b16956 elementor-widget elementor-widget-image\" data-id=\"2b16956\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"37\" height=\"36\" src=\"https:\/\/smartit.ws\/wp-content\/uploads\/2022\/08\/Threat-Intelligence.png\" class=\"attachment-full size-full wp-image-2932\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-b072577\" data-id=\"b072577\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9e564a0 elementor-widget elementor-widget-heading\" data-id=\"9e564a0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">T\u0259hdid k\u0259\u015ffiyyat\u0131<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-dbe1aa5 elementor-widget elementor-widget-text-editor\" data-id=\"dbe1aa5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>T\u0259hdid k\u0259\u015ffiyyat\u0131 (Threat Intelligence) h\u0259r hans\u0131 bir t\u0259\u015fkilata qar\u015f\u0131 daxili v\u0259 xarici t\u0259hl\u00fck\u0259l\u0259rin sistemli \u015f\u0259kild\u0259 t\u0259hlilidir. T\u0259hdid k\u0259\u015ffiyyat\u0131n\u0131n m\u00fcdafi\u0259 etm\u0259y\u0259 \u00e7al\u0131\u015fd\u0131\u011f\u0131 t\u0259hl\u00fck\u0259l\u0259r\u0259 s\u0131f\u0131r g\u00fcn t\u0259hdidl\u0259ri, eksploitl\u0259r v\u0259 qabaqc\u0131l davaml\u0131 t\u0259hdidl\u0259r (Advanced Persistent Threats, APT) daxildir. T\u0259hdid k\u0259\u015ffiyyat\u0131 h\u0259m daxili, h\u0259m d\u0259 xarici t\u0259hdidl\u0259rin d\u0259rin t\u0259hlilini \u0259hat\u0259 edir. T\u0259hdid k\u0259\u015ffiyyat\u0131 kiber t\u0259hdid k\u0259\u015ffiyyat\u0131 (Cyber Threat Intelligence) kimi d\u0259 tan\u0131n\u0131r.<\/p><p>T\u0259hdid k\u0259\u015ffiyyat\u0131 t\u0259\u015fkilat \u00fc\u00e7\u00fcn potensial komp\u00fcter v\u0259 \u015f\u0259b\u0259k\u0259 t\u0259hl\u00fck\u0259sizliyi t\u0259hdidl\u0259rinin d\u0259rin t\u0259hlilidir. H\u0259rbi k\u0259\u015ffiyyatda oldu\u011fu kimi, burada da m\u0259qs\u0259d t\u0259hdidl\u0259r haqq\u0131nda m\u00fcmk\u00fcn q\u0259d\u0259r \u00e7ox m\u0259lumat \u0259ld\u0259 etm\u0259kdir ki, m\u00fc\u0259ssis\u0259 onlara qar\u015f\u0131 laz\u0131mi t\u0259dbirl\u0259r g\u00f6r\u0259 bilsin. Termin, hadis\u0259l\u0259rin idar\u0259 edilm\u0259si \u00fcsullar\u0131 il\u0259 reaksiya verm\u0259kd\u0259n \u00e7ox, h\u00fccumlar\u0131 g\u00f6zl\u0259m\u0259yi v\u0259 onlara qar\u015f\u0131 m\u00fcdafi\u0259 etm\u0259yi n\u0259z\u0259rd\u0259 tutur.<\/p><p>T\u0259hdid k\u0259\u015ffiyyat\u0131 bir t\u0259\u015fkilat\u0131n \u00fczl\u0259\u015fdiyi t\u0259hdidl\u0259ri ara\u015fd\u0131ra bil\u0259r v\u0259 ya dig\u0259r t\u0259\u015fkilatlarla \u0259m\u0259kda\u015fl\u0131\u011f\u0131n\u0131 \u0259hat\u0259 ed\u0259n daha geni\u015f \u015f\u0259b\u0259k\u0259 yarada bil\u0259r. P\u0259rak\u0259nd\u0259 Kiber K\u0259\u015ffiyyat Payla\u015fma M\u0259rk\u0259zi (Retail Cyber Intelligence Sharing Center, R-CISC) m\u00fcxt\u0259lif \u015firk\u0259tl\u0259rd\u0259ki t\u0259hl\u00fck\u0259sizlik m\u00fct\u0259x\u0259ssisl\u0259rini t\u0259hdidl\u0259r haqq\u0131nda m\u0259lumat m\u00fcbadil\u0259si \u00fc\u00e7\u00fcn bir araya g\u0259l\u0259n bir qrupdur. H\u00fccumlar daha m\u00fcr\u0259kk\u0259bl\u0259\u015fdikc\u0259, t\u0259hl\u00fck\u0259l\u0259ri minimuma endirm\u0259k \u00fc\u00e7\u00fcn \u00e7al\u0131\u015fan m\u00fct\u0259x\u0259ssisl\u0259r bir-biri il\u0259 \u0259m\u0259kda\u015fl\u0131\u011f\u0131 daha s\u0131x edir.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Threat Intelligence Threat intelligence is the analysis of internal and external &#8230; <\/p>","protected":false},"author":1,"featured_media":0,"parent":1936,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2167","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/smartit.ws\/az\/wp-json\/wp\/v2\/pages\/2167","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smartit.ws\/az\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/smartit.ws\/az\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/smartit.ws\/az\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smartit.ws\/az\/wp-json\/wp\/v2\/comments?post=2167"}],"version-history":[{"count":3,"href":"https:\/\/smartit.ws\/az\/wp-json\/wp\/v2\/pages\/2167\/revisions"}],"predecessor-version":[{"id":3806,"href":"https:\/\/smartit.ws\/az\/wp-json\/wp\/v2\/pages\/2167\/revisions\/3806"}],"up":[{"embeddable":true,"href":"https:\/\/smartit.ws\/az\/wp-json\/wp\/v2\/pages\/1936"}],"wp:attachment":[{"href":"https:\/\/smartit.ws\/az\/wp-json\/wp\/v2\/media?parent=2167"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}