{"id":127,"date":"2022-09-16T17:48:37","date_gmt":"2022-09-16T17:48:37","guid":{"rendered":"https:\/\/fastwpdemo.com\/newwp\/finbank\/?p=127"},"modified":"2023-10-02T16:52:41","modified_gmt":"2023-10-02T13:52:41","slug":"siber-guvenlik-nedir","status":"publish","type":"post","link":"https:\/\/www.panterteknoloji.com\/az\/siber-guvenlik-nedir\/","title":{"rendered":"Kiber T\u0259hl\u00fck\u0259sizlik n\u0259dir?"},"content":{"rendered":"<div class=\"blog-details-quote-box\">\n<div class=\"icon\"><\/div>\n<div class=\"text\">\n<div id=\"page-header\" class=\"RepoHeader_pageHeader__grp7r\">\n<div class=\"RepoHeader_container__9RLTe RepoHeader_isArticle__1tOXr\">\n<div class=\"PageHeadline_headline__1oeY3 PageHeadline_isArticle__Zkztp\">\n<div class=\"PageHeadline_titles__ffmTR\">\n<h1 class=\"PageHeadline_title__7fV_Z\">Kiber T\u0259hl\u00fck\u0259sizlik n\u0259dir?<\/h1>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div>\n<div class=\"RepositoryArticle_container__3fiSf\">\n<div class=\"RepositoryArticle_host__ttDWM\">\n<div class=\"RepositoryArticle_content__atmEA\">\n<div class=\"RepositoryArticle_articleContent__D0YRA\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>kibert\u0259hl\u00fck\u0259sizlik; Bu, komp\u00fcterl\u0259rin, serverl\u0259rin, mobil cihazlar\u0131n, elektron sisteml\u0259rin, \u015f\u0259b\u0259k\u0259l\u0259rin v\u0259 m\u0259lumatlar\u0131n z\u0259r\u0259rli h\u00fccumlardan qorunmas\u0131 t\u0259cr\u00fcb\u0259sidir. \u0130nformasiya texnologiyalar\u0131 t\u0259hl\u00fck\u0259sizliyi v\u0259 ya elektron informasiya t\u0259hl\u00fck\u0259sizliyi kimi d\u0259 tan\u0131n\u0131r. Termin biznesl\u0259rd\u0259n tutmu\u015f mobil hesablamalara q\u0259d\u0259r m\u00fcxt\u0259lif kontekstl\u0259rd\u0259 t\u0259tbiq olunur v\u0259 bir ne\u00e7\u0259 \u00fcmumi kateqoriyaya b\u00f6l\u00fcn\u0259 bil\u0259r.<\/p>\n<ul>\n<li><strong>\u015f\u0259b\u0259k\u0259 t\u0259hl\u00fck\u0259sizliyi<\/strong>komp\u00fcter \u015f\u0259b\u0259k\u0259sini t\u0259cav\u00fczkarlardan v\u0259 ya f\u00fcrs\u0259t\u00e7i z\u0259r\u0259rli proqramlardan qorumaq t\u0259cr\u00fcb\u0259sidir.<\/li>\n<li><strong>T\u0259tbiq t\u0259hl\u00fck\u0259sizliyi<\/strong>proqram v\u0259 cihazlar\u0131n t\u0259hdidl\u0259rd\u0259n t\u0259sirl\u0259nm\u0259m\u0259sin\u0259 diqq\u0259t yetirir. T\u0259hl\u00fck\u0259li proqram qorunmaq \u00fc\u00e7\u00fcn n\u0259z\u0259rd\u0259 tutulmu\u015f m\u0259lumatlara giri\u015f \u0259ld\u0259 ed\u0259 bil\u0259r. U\u011furlu t\u0259hl\u00fck\u0259sizlik h\u0259tta dizayn m\u0259rh\u0259l\u0259sind\u0259 bel\u0259 proqram v\u0259 ya cihaz yerl\u0259\u015fdirilm\u0259zd\u0259n \u0259vv\u0259l ba\u015flay\u0131r.<\/li>\n<li><strong>\u0130nformasiya t\u0259hl\u00fck\u0259sizliyi<\/strong>h\u0259m saxlama, h\u0259m d\u0259 \u00f6t\u00fcrm\u0259 zaman\u0131 m\u0259lumatlar\u0131n b\u00fct\u00f6vl\u00fcy\u00fcn\u00fc v\u0259 m\u0259xfiliyini qoruyur.<\/li>\n<li><strong>\u0259m\u0259liyyat t\u0259hl\u00fck\u0259sizliyi<\/strong>m\u0259lumat aktivl\u0259rinin emal\u0131 v\u0259 qorunmas\u0131 il\u0259 ba\u011fl\u0131 prosesl\u0259r v\u0259 q\u0259rarlar daxildir. Bura istifad\u0259\u00e7il\u0259rin \u015f\u0259b\u0259k\u0259y\u0259 daxil olma icaz\u0259l\u0259ri v\u0259 m\u0259lumatlar\u0131n nec\u0259 v\u0259 harada saxlan\u0131la v\u0259 ya payla\u015f\u0131laca\u011f\u0131n\u0131 m\u00fc\u0259yy\u0259n ed\u0259n prosedurlar daxildir.<\/li>\n<li><strong>F\u0259lak\u0259tin b\u0259rpas\u0131 v\u0259 i\u015fin davaml\u0131l\u0131\u011f\u0131<\/strong>t\u0259\u015fkilat\u0131n \u0259m\u0259liyyatlar\u0131n v\u0259 ya m\u0259lumatlar\u0131n itirilm\u0259si il\u0259 n\u0259tic\u0259l\u0259n\u0259n kibert\u0259hl\u00fck\u0259sizlik insidentin\u0259 v\u0259 ya dig\u0259r hadis\u0259y\u0259 nec\u0259 reaksiya verdiyini t\u0259svir edir. F\u0259lak\u0259tin b\u0259rpas\u0131 siyas\u0259tl\u0259ri t\u0259\u015fkilat\u0131n \u00f6z prosesl\u0259rini v\u0259 m\u0259lumatlar\u0131n\u0131 hadis\u0259d\u0259n \u0259vv\u0259lki \u0259m\u0259liyyat qabiliyy\u0259tin\u0259 qay\u0131tmaq \u00fc\u00e7\u00fcn nec\u0259 b\u0259rpa ed\u0259c\u0259yini m\u00fc\u0259yy\u0259n edir. Biznesin davaml\u0131l\u0131\u011f\u0131 t\u0259\u015fkilat\u0131n m\u00fc\u0259yy\u0259n resurslar olmadan f\u0259aliyy\u0259t g\u00f6st\u0259rm\u0259y\u0259 \u00e7al\u0131\u015fark\u0259n geri \u00e7\u0259kildiyi pland\u0131r.<\/li>\n<li><strong>Son istifad\u0259\u00e7i t\u0259limi<\/strong>, \u0259n g\u00f6zl\u0259nilm\u0259z kibert\u0259hl\u00fck\u0259sizlik faktoruna m\u00fcraci\u0259t edir: insanlar. Yax\u015f\u0131 t\u0259hl\u00fck\u0259sizlik t\u0259cr\u00fcb\u0259l\u0259rin\u0259 \u0259m\u0259l etm\u0259y\u0259n h\u0259r k\u0259s t\u0259sad\u00fcf\u0259n ba\u015fqa bir t\u0259hl\u00fck\u0259siz sistem\u0259 yoluxa bil\u0259r. \u0130stifad\u0259\u00e7il\u0259r\u0259 \u015f\u00fcbh\u0259li e-po\u00e7t qo\u015fmalar\u0131n\u0131 silm\u0259yi, nam\u0259lum USB diskl\u0259ri daxil etm\u0259m\u0259yi v\u0259 dig\u0259r m\u00fcxt\u0259lif vacib d\u0259rsl\u0259ri \u00f6yr\u0259tm\u0259k h\u0259r hans\u0131 bir t\u0259\u015fkilat\u0131n t\u0259hl\u00fck\u0259sizliyi \u00fc\u00e7\u00fcn \u00e7ox vacibdir.<\/li>\n<\/ul>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Kiber T\u0259hl\u00fck\u0259sizlik n\u0259dir? kibert\u0259hl\u00fck\u0259sizlik; Bu, komp\u00fcterl\u0259rin, serverl\u0259rin, mobil cihazlar\u0131n, elektron sisteml\u0259rin, \u015f\u0259b\u0259k\u0259l\u0259rin v\u0259 m\u0259lumatlar\u0131n z\u0259r\u0259rli h\u00fccumlardan qorunmas\u0131 t\u0259cr\u00fcb\u0259sidir. \u0130nformasiya texnologiyalar\u0131 t\u0259hl\u00fck\u0259sizliyi v\u0259 ya elektron informasiya t\u0259hl\u00fck\u0259sizliyi kimi d\u0259 tan\u0131n\u0131r. Termin biznesl\u0259rd\u0259n tutmu\u015f mobil hesablamalara q\u0259d\u0259r m\u00fcxt\u0259lif kontekstl\u0259rd\u0259 t\u0259tbiq olunur v\u0259 bir ne\u00e7\u0259 \u00fcmumi kateqoriyaya b\u00f6l\u00fcn\u0259 bil\u0259r. \u0130st\u0259r \u015f\u0259b\u0259k\u0259 t\u0259hl\u00fck\u0259sizliyi, ist\u0259r h\u0259d\u0259fl\u0259nmi\u015f h\u00fccum\u00e7ular, ist\u0259rs\u0259 d\u0259 f\u00fcrs\u0259t\u00e7i z\u0259r\u0259rli proqram [...]<\/p>","protected":false},"author":1,"featured_media":2088,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-127","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-diger"],"_links":{"self":[{"href":"https:\/\/www.panterteknoloji.com\/az\/wp-json\/wp\/v2\/posts\/127","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.panterteknoloji.com\/az\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.panterteknoloji.com\/az\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.panterteknoloji.com\/az\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.panterteknoloji.com\/az\/wp-json\/wp\/v2\/comments?post=127"}],"version-history":[{"count":0,"href":"https:\/\/www.panterteknoloji.com\/az\/wp-json\/wp\/v2\/posts\/127\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.panterteknoloji.com\/az\/wp-json\/wp\/v2\/media\/2088"}],"wp:attachment":[{"href":"https:\/\/www.panterteknoloji.com\/az\/wp-json\/wp\/v2\/media?parent=127"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.panterteknoloji.com\/az\/wp-json\/wp\/v2\/categories?post=127"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.panterteknoloji.com\/az\/wp-json\/wp\/v2\/tags?post=127"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}