{"id":1310,"date":"2015-12-10T19:44:07","date_gmt":"2015-12-10T19:44:07","guid":{"rendered":"http:\/\/evosec.eu\/?page_id=1310"},"modified":"2016-09-11T01:02:40","modified_gmt":"2016-09-11T01:02:40","slug":"security","status":"publish","type":"page","link":"https:\/\/evosec.eu\/hu\/security\/","title":{"rendered":"IT-biztons\u00e1g"},"content":{"rendered":"<div class=\"well well-sm\">\n<p>Sz\u00e1m\u00edt\u00f3g\u00e9pes biztons\u00e1g, m\u00e1s n\u00e9ven a cybersecurity vagy az IT biztons\u00e1g, v\u00e9delme az inform\u00e1ci\u00f3s rendszerek a lop\u00e1s vagy s\u00e9r\u00fcl\u00e9s a hardver, a szoftver, \u00e9s hogy a vel\u00fck kapcsolatos inform\u00e1ci\u00f3t, valamint a zavar vagy a f\u00e9lrevezet\u00e9s, a szolg\u00e1ltat\u00e1sok ny\u00fajtanak. Ez mag\u00e1ban foglalja a hardver fizikai hozz\u00e1f\u00e9r\u00e9s szab\u00e1lyoz\u00e1sa, valamint a k\u00e1r, hogy kereszt\u00fcl h\u00e1l\u00f3zati hozz\u00e1f\u00e9r\u00e9s, \u00e9s a k\u00f3d befecskendez\u00e9s, \u00e9s jogellenes piaci szerepl\u0151k, sz\u00e1nd\u00e9kos, v\u00e9letlen, illetve \u0151ket l\u00e9t becsapott biztons\u00e1gos elj\u00e1r\u00e1sok elt\u00e9rnek ellen v\u00e9d\u0151.<\/p>\n<p>Sz\u00e1m\u00edt\u00f3g\u00e9pes rendszerek most is nagyon sokf\u00e9le \\<\/p>\n<\/div>\n<ul class=\"fa-ul\" style=\"list-style-type: none;\">\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i><a href=\"http:\/\/evosec.eu\/smbs-fast-cyber-security-checklist\/\">Gyors SMB-ellen\u0151rz\u00e9s<\/a><\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Weboldal biztons\u00e1gi Audit<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>H\u00e1l\u00f3zati biztons\u00e1gi Audit<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Kiszolg\u00e1l\u00f3 biztons\u00e1gi Audit<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Be\u00e1gyazott berendez\u00e9s biztons\u00e1gi Audit \/ IoT biztons\u00e1gi Audit<\/li>\n<\/ul>\n<p>Tudunk biztos\u00edtani tesztek, monitoring, megold\u00e1sok \u00e9s tan\u00e1csad\u00e1s:<\/p>\n<ul class=\"fa-ul\" style=\"list-style-type: none;\">\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>URL-t, a parancs injekci\u00f3<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Broken Authentication \/ rossz munkamenet-kezel\u00e9s<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>K\u00f6zvetlen objektum hivatkoz\u00e1sok<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>\u00c9rz\u00e9keny adatok<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Ismert Vulnerabilites alkatr\u00e9szek<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Kihaszn\u00e1lni a fejleszt\u00e9si<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Forr\u00e1sk\u00f3d elemz\u00e9s &#8211; k\u00fcl\u00f6n\u00f6sen protokollt val\u00f3s\u00edtja meg<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Sz\u00e1m\u00edt\u00f3g\u00e9pes biztons\u00e1g, m\u00e1s n\u00e9ven a cybersecurity vagy az IT biztons\u00e1g, v\u00e9delme az inform\u00e1ci\u00f3s rendszerek a lop\u00e1s vagy s\u00e9r\u00fcl\u00e9s a hardver, a szoftver, \u00e9s hogy a vel\u00fck kapcsolatos inform\u00e1ci\u00f3t, valamint a zavar vagy a f\u00e9lrevezet\u00e9s, a szolg\u00e1ltat\u00e1sok ny\u00fajtanak. Ez mag\u00e1ban foglalja a hardver fizikai hozz\u00e1f\u00e9r\u00e9s szab\u00e1lyoz\u00e1sa, valamint a k\u00e1r, hogy kereszt\u00fcl &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1310","page","type-page","status-publish","hentry"],"translation":{"provider":"WPGlobus","version":"3.0.2","language":"hu","enabled_languages":["en","da","de","es","fi","fr","it","hu","nl","no","pl","pt","ru","sv"],"languages":{"en":{"title":true,"content":true,"excerpt":false},"da":{"title":true,"content":true,"excerpt":false},"de":{"title":true,"content":true,"excerpt":false},"es":{"title":true,"content":true,"excerpt":false},"fi":{"title":true,"content":true,"excerpt":false},"fr":{"title":true,"content":true,"excerpt":false},"it":{"title":true,"content":true,"excerpt":false},"hu":{"title":true,"content":true,"excerpt":false},"nl":{"title":true,"content":true,"excerpt":false},"no":{"title":true,"content":true,"excerpt":false},"pl":{"title":true,"content":true,"excerpt":false},"pt":{"title":true,"content":true,"excerpt":false},"ru":{"title":true,"content":true,"excerpt":false},"sv":{"title":true,"content":true,"excerpt":false}}},"_links":{"self":[{"href":"https:\/\/evosec.eu\/hu\/wp-json\/wp\/v2\/pages\/1310","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/evosec.eu\/hu\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/evosec.eu\/hu\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/evosec.eu\/hu\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/evosec.eu\/hu\/wp-json\/wp\/v2\/comments?post=1310"}],"version-history":[{"count":3,"href":"https:\/\/evosec.eu\/hu\/wp-json\/wp\/v2\/pages\/1310\/revisions"}],"predecessor-version":[{"id":2136,"href":"https:\/\/evosec.eu\/hu\/wp-json\/wp\/v2\/pages\/1310\/revisions\/2136"}],"wp:attachment":[{"href":"https:\/\/evosec.eu\/hu\/wp-json\/wp\/v2\/media?parent=1310"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}