{"id":1310,"date":"2015-12-10T19:44:07","date_gmt":"2015-12-10T19:44:07","guid":{"rendered":"http:\/\/evosec.eu\/?page_id=1310"},"modified":"2016-09-11T01:02:40","modified_gmt":"2016-09-11T01:02:40","slug":"security","status":"publish","type":"page","link":"https:\/\/evosec.eu\/da\/security\/","title":{"rendered":"IT-sikkerhed"},"content":{"rendered":"<div class=\"well well-sm\">\n<p>Computersikkerhed, ogs\u00e5 kendt som cybersikkerhed eller IT-sikkerhed, er beskyttelsen af informationssystemer fra tyveri eller beskadigelse til hardware, software, og til oplysninger om dem, samt fra forstyrrelser eller vildledning af tjenesterne, de leverer. Det omfatter kontrol af fysisk adgang til hardwaren, samt beskyttelse mod skader, der kan komme via netv\u00e6rk adgang, data og kode injektion, og p\u00e5 grund af fejlbehandling af operat\u00f8rer, om fors\u00e6tlig, utilsigtet, eller p\u00e5 grund af dem at blive lokket til at afvige fra sikre procedurer.<\/p>\n<p>Edb-systemer omfatter nu en meget bred vifte af \\<\/p>\n<\/div>\n<ul class=\"fa-ul\" style=\"list-style-type: none;\">\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i><a href=\"http:\/\/evosec.eu\/smbs-fast-cyber-security-checklist\/\">Hurtig SMB-Check<\/a><\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>WebSite sikkerhedsrevision<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Netv\u00e6rk sikkerhedsrevision<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Server sikkerhedsrevision<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Integreret enhed sikkerhedsrevision \/ Tingenes internet sikkerhedsrevision<\/li>\n<\/ul>\n<p>Vi kan levere tests, overv\u00e5gning, l\u00f8sninger og konsulentydelser:<\/p>\n<ul class=\"fa-ul\" style=\"list-style-type: none;\">\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>URL\/kommando injektion<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Brudt godkendelse \/ d\u00e5rlig Session forvaltning<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Direkte objektreferencer<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>F\u00f8lsomme data eksponering<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Kendte Vulnerabilites af komponenter<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Udnytte udvikling<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Kilde kodeanalyse &#8211; is\u00e6r protokol gennemf\u00f8rer<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Computersikkerhed, ogs\u00e5 kendt som cybersikkerhed eller IT-sikkerhed, er beskyttelsen af informationssystemer fra tyveri eller beskadigelse til hardware, software, og til oplysninger om dem, samt fra forstyrrelser eller vildledning af tjenesterne, de leverer. Det omfatter kontrol af fysisk adgang til hardwaren, samt beskyttelse mod skader, der kan komme via netv\u00e6rk adgang, &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1310","page","type-page","status-publish","hentry"],"translation":{"provider":"WPGlobus","version":"3.0.2","language":"da","enabled_languages":["en","da","de","es","fi","fr","it","hu","nl","no","pl","pt","ru","sv"],"languages":{"en":{"title":true,"content":true,"excerpt":false},"da":{"title":true,"content":true,"excerpt":false},"de":{"title":true,"content":true,"excerpt":false},"es":{"title":true,"content":true,"excerpt":false},"fi":{"title":true,"content":true,"excerpt":false},"fr":{"title":true,"content":true,"excerpt":false},"it":{"title":true,"content":true,"excerpt":false},"hu":{"title":true,"content":true,"excerpt":false},"nl":{"title":true,"content":true,"excerpt":false},"no":{"title":true,"content":true,"excerpt":false},"pl":{"title":true,"content":true,"excerpt":false},"pt":{"title":true,"content":true,"excerpt":false},"ru":{"title":true,"content":true,"excerpt":false},"sv":{"title":true,"content":true,"excerpt":false}}},"_links":{"self":[{"href":"https:\/\/evosec.eu\/da\/wp-json\/wp\/v2\/pages\/1310","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/evosec.eu\/da\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/evosec.eu\/da\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/evosec.eu\/da\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/evosec.eu\/da\/wp-json\/wp\/v2\/comments?post=1310"}],"version-history":[{"count":3,"href":"https:\/\/evosec.eu\/da\/wp-json\/wp\/v2\/pages\/1310\/revisions"}],"predecessor-version":[{"id":2136,"href":"https:\/\/evosec.eu\/da\/wp-json\/wp\/v2\/pages\/1310\/revisions\/2136"}],"wp:attachment":[{"href":"https:\/\/evosec.eu\/da\/wp-json\/wp\/v2\/media?parent=1310"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}