{"id":1310,"date":"2015-12-10T19:44:07","date_gmt":"2015-12-10T19:44:07","guid":{"rendered":"http:\/\/evosec.eu\/?page_id=1310"},"modified":"2016-09-11T01:02:40","modified_gmt":"2016-09-11T01:02:40","slug":"security","status":"publish","type":"page","link":"https:\/\/evosec.eu\/sv\/security\/","title":{"rendered":"IT-s\u00e4kerhet"},"content":{"rendered":"<div class=\"well well-sm\">\n<p>Datas\u00e4kerhet, \u00e4ven k\u00e4nd som cybers\u00e4kerhet eller IT-s\u00e4kerhet, \u00e4r skyddet av informationssystem fr\u00e5n st\u00f6ld eller skada maskinvaran, programvaran, och att informationen om dem, samt fr\u00e5n avbrott eller vilseledning av tj\u00e4nsterna de tillhandah\u00e5ller. Det omfattar kontroll av fysisk tillg\u00e5ng till maskinvaran, samt skydda mot skada som kan komma via n\u00e4tverket tillg\u00e5ng, data och kod injektion, och p\u00e5 grund av felbehandling av operat\u00f6rer, vare sig avsiktligt, oavsiktliga, eller p\u00e5 grund av dem som luras av att avvika fr\u00e5n s\u00e4kra f\u00f6rfaranden.<\/p>\n<p>Datorsystem nu omfattar ett mycket brett utbud av \\<\/p>\n<\/div>\n<ul class=\"fa-ul\" style=\"list-style-type: none;\">\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i><a href=\"http:\/\/evosec.eu\/smbs-fast-cyber-security-checklist\/\">Snabb SMB kontrollera<\/a><\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Webbplats s\u00e4kerhetsgranskning<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>N\u00e4tverk s\u00e4kerhetsgranskning<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Server s\u00e4kerhet Audit<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Embedded-enheten s\u00e4kerhetsgranskning \/ IoT-s\u00e4kerhetsgranskning<\/li>\n<\/ul>\n<p>Vi kan erbjuda provningar, \u00f6vervakning, l\u00f6sningar och konsulttj\u00e4nster f\u00f6r:<\/p>\n<ul class=\"fa-ul\" style=\"list-style-type: none;\">\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>URL\/kommando injektion<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Bruten autentisering \/ d\u00e5lig sessionshantering<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Direkt objektreferenser<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>K\u00e4nsliga data exponering<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>K\u00e4nda Vulnerabilites av komponenter<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Utnyttja utveckling<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>K\u00e4lla kodanalys &#8211; s\u00e4rskilt protokollet implementerar<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Datas\u00e4kerhet, \u00e4ven k\u00e4nd som cybers\u00e4kerhet eller IT-s\u00e4kerhet, \u00e4r skyddet av informationssystem fr\u00e5n st\u00f6ld eller skada maskinvaran, programvaran, och att informationen om dem, samt fr\u00e5n avbrott eller vilseledning av tj\u00e4nsterna de tillhandah\u00e5ller. Det omfattar kontroll av fysisk tillg\u00e5ng till maskinvaran, samt skydda mot skada som kan komma via n\u00e4tverket tillg\u00e5ng, data &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1310","page","type-page","status-publish","hentry"],"translation":{"provider":"WPGlobus","version":"3.0.2","language":"sv","enabled_languages":["en","da","de","es","fi","fr","it","hu","nl","no","pl","pt","ru","sv"],"languages":{"en":{"title":true,"content":true,"excerpt":false},"da":{"title":true,"content":true,"excerpt":false},"de":{"title":true,"content":true,"excerpt":false},"es":{"title":true,"content":true,"excerpt":false},"fi":{"title":true,"content":true,"excerpt":false},"fr":{"title":true,"content":true,"excerpt":false},"it":{"title":true,"content":true,"excerpt":false},"hu":{"title":true,"content":true,"excerpt":false},"nl":{"title":true,"content":true,"excerpt":false},"no":{"title":true,"content":true,"excerpt":false},"pl":{"title":true,"content":true,"excerpt":false},"pt":{"title":true,"content":true,"excerpt":false},"ru":{"title":true,"content":true,"excerpt":false},"sv":{"title":true,"content":true,"excerpt":false}}},"_links":{"self":[{"href":"https:\/\/evosec.eu\/sv\/wp-json\/wp\/v2\/pages\/1310","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/evosec.eu\/sv\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/evosec.eu\/sv\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/evosec.eu\/sv\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/evosec.eu\/sv\/wp-json\/wp\/v2\/comments?post=1310"}],"version-history":[{"count":3,"href":"https:\/\/evosec.eu\/sv\/wp-json\/wp\/v2\/pages\/1310\/revisions"}],"predecessor-version":[{"id":2136,"href":"https:\/\/evosec.eu\/sv\/wp-json\/wp\/v2\/pages\/1310\/revisions\/2136"}],"wp:attachment":[{"href":"https:\/\/evosec.eu\/sv\/wp-json\/wp\/v2\/media?parent=1310"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}