{"id":1310,"date":"2015-12-10T19:44:07","date_gmt":"2015-12-10T19:44:07","guid":{"rendered":"http:\/\/evosec.eu\/?page_id=1310"},"modified":"2016-09-11T01:02:40","modified_gmt":"2016-09-11T01:02:40","slug":"security","status":"publish","type":"page","link":"https:\/\/evosec.eu\/fi\/security\/","title":{"rendered":"Tietoturva"},"content":{"rendered":"<div class=\"well well-sm\">\n<p>Tietokoneen suojaus, jota kutsutaan my\u00f6s tietoverkkojen tai IT-turvallisuus on tietoj\u00e4rjestelmien kohteesta varkaus- tai laitteistot, ohjelmistot, suoja ja tiedot niist\u00e4, sek\u00e4 h\u00e4iri\u00f6it\u00e4 tai harhaanjohtamista palveluja ne tarjoavat. Se sis\u00e4lt\u00e4\u00e4 p\u00e4\u00e4synhallinta fyysinen laitteisto sek\u00e4 suojautua haittaa, jotka voivat tulla kautta verkon yhteys, tiedot ja koodi injektio ja koska v\u00e4\u00e4rink\u00e4yt\u00f6ksi\u00e4 toimijat, tahallinen, vahingossa vai koska ne huijatuksi poikkeavat turvallista menettelyj\u00e4.<\/p>\n<p>Atk-j\u00e4rjestelm\u00e4t ovat nyt hyvin monenlaisia \\<\/p>\n<\/div>\n<ul class=\"fa-ul\" style=\"list-style-type: none;\">\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i><a href=\"http:\/\/evosec.eu\/smbs-fast-cyber-security-checklist\/\">Nopea SMB uloskirjautuminen<\/a><\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Security Audit sivustot<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Network Security Audit<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Server Security Audit<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Sulautetun laitteen suojauksen valvontaa \/ IoT Security Audit<\/li>\n<\/ul>\n<p>Tarjoamme testej\u00e4, seurantaa, ratkaisut ja konsultointi:<\/p>\n<ul class=\"fa-ul\" style=\"list-style-type: none;\">\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>URL-komentoa injektio<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Rikki todennus \/ huono istunnon hallinta<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Suoran objektin viittaukset<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Arkaluonteisten tietojen altistumisen<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Tunnettu Vulnerabilites komponenttien<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Hy\u00f6dynt\u00e4\u00e4 kehitys<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>L\u00e4hdekoodin analysointi &#8211; erityisesti protokolla toteuttaa<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Tietokoneen suojaus, jota kutsutaan my\u00f6s tietoverkkojen tai IT-turvallisuus on tietoj\u00e4rjestelmien kohteesta varkaus- tai laitteistot, ohjelmistot, suoja ja tiedot niist\u00e4, sek\u00e4 h\u00e4iri\u00f6it\u00e4 tai harhaanjohtamista palveluja ne tarjoavat. Se sis\u00e4lt\u00e4\u00e4 p\u00e4\u00e4synhallinta fyysinen laitteisto sek\u00e4 suojautua haittaa, jotka voivat tulla kautta verkon yhteys, tiedot ja koodi injektio ja koska v\u00e4\u00e4rink\u00e4yt\u00f6ksi\u00e4 toimijat, tahallinen, vahingossa &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1310","page","type-page","status-publish","hentry"],"translation":{"provider":"WPGlobus","version":"3.0.2","language":"fi","enabled_languages":["en","da","de","es","fi","fr","it","hu","nl","no","pl","pt","ru","sv"],"languages":{"en":{"title":true,"content":true,"excerpt":false},"da":{"title":true,"content":true,"excerpt":false},"de":{"title":true,"content":true,"excerpt":false},"es":{"title":true,"content":true,"excerpt":false},"fi":{"title":true,"content":true,"excerpt":false},"fr":{"title":true,"content":true,"excerpt":false},"it":{"title":true,"content":true,"excerpt":false},"hu":{"title":true,"content":true,"excerpt":false},"nl":{"title":true,"content":true,"excerpt":false},"no":{"title":true,"content":true,"excerpt":false},"pl":{"title":true,"content":true,"excerpt":false},"pt":{"title":true,"content":true,"excerpt":false},"ru":{"title":true,"content":true,"excerpt":false},"sv":{"title":true,"content":true,"excerpt":false}}},"_links":{"self":[{"href":"https:\/\/evosec.eu\/fi\/wp-json\/wp\/v2\/pages\/1310","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/evosec.eu\/fi\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/evosec.eu\/fi\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/evosec.eu\/fi\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/evosec.eu\/fi\/wp-json\/wp\/v2\/comments?post=1310"}],"version-history":[{"count":3,"href":"https:\/\/evosec.eu\/fi\/wp-json\/wp\/v2\/pages\/1310\/revisions"}],"predecessor-version":[{"id":2136,"href":"https:\/\/evosec.eu\/fi\/wp-json\/wp\/v2\/pages\/1310\/revisions\/2136"}],"wp:attachment":[{"href":"https:\/\/evosec.eu\/fi\/wp-json\/wp\/v2\/media?parent=1310"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}