{"id":6638,"date":"2025-12-04T19:42:04","date_gmt":"2025-12-04T15:42:04","guid":{"rendered":"https:\/\/jsnet.biz\/?p=6638"},"modified":"2025-12-04T19:42:06","modified_gmt":"2025-12-04T15:42:06","slug":"mod-t%c9%99hluk%c9%99sizlik-veb-t%c9%99hluk%c9%99sizliyind%c9%99n-guclu-mudafi%c9%99ci","status":"publish","type":"post","link":"https:\/\/jsnet.biz\/az\/mod-t%c9%99hluk%c9%99sizlik-veb-t%c9%99hluk%c9%99sizliyind%c9%99n-guclu-mudafi%c9%99ci\/","title":{"rendered":"Mod T\u0259hl\u00fck\u0259sizlik: Veb T\u0259hl\u00fck\u0259sizliy\u0259 G\u00fccl\u00fc M\u00fcdafi\u0259\u00e7i"},"content":{"rendered":"<article>\n<h2>Mod T\u0259hl\u00fck\u0259sizlik: Veb T\u0259hl\u00fck\u0259sizliy\u0259 G\u00fccl\u00fc M\u00fcdafi\u0259\u00e7i<\/h2>\n<p>\u0130nternet n\u0259h\u0259ng bir ekosistem\u0259 \u00e7evrildi, veb saytlar v\u0259 onlayn platformalar daha \u00e7ox t\u0259hl\u00fck\u0259 il\u0259 \u00fcz-\u00fcz\u0259 qal\u0131r. Bu t\u0259hl\u00fck\u0259l\u0259rd\u0259n qorunmaq \u00fc\u00e7\u00fcn g\u00fccl\u00fc m\u00fcdafi\u0259 mexanizml\u0259ri z\u0259rur\u0259t\u0259 \u00e7evrilib. <strong>Mod T\u0259hl\u00fck\u0259sizliyi<\/strong> bu veb-sayt t\u0259hl\u00fck\u0259sizliyind\u0259 yeni d\u00f6vr\u00fcn qalxmas\u0131 kimi \u00e7\u0131x\u0131\u015f edir. Bu m\u0259qal\u0259d\u0259 Mod Security-nin n\u0259 oldu\u011fu v\u0259 onun h\u00fccumlara qar\u015f\u0131 nec\u0259 geni\u015fyasl\u0131 m\u00fcdafi\u0259 qorunub saxlanmas\u0131 d\u0259qiq \u015f\u0259kild\u0259 t\u0259hlil edilib.<\/p>\n<h3>Mod T\u0259hl\u00fck\u0259sizlik N\u0259dir? Veb T\u0259hl\u00fck\u0259sizliyind\u0259n Yeni D\u00f6vr\u00fcn Qalxan\u0131<\/h3>\n<p><strong>Mod T\u0259hl\u00fck\u0259sizliyi<\/strong>, veb serverl\u0259r a\u00e7\u0131q m\u0259nb\u0259 kodlu v\u0259 g\u00fccl\u00fc bir t\u0259hl\u00fck\u0259sizlik modulu olaraq tan\u0131n\u0131r. \u018fsas\u0259n Apache HTTP Server \u00fc\u00e7\u00fcn saxlan\u0131la bil\u0259r, onu Nginx v\u0259 IIS kimi dig\u0259r serverl\u0259rd\u0259 d\u0259 istifad\u0259 etm\u0259k m\u00fcmk\u00fcnd\u00fcr. Mod Security, veb t\u0259tbiq trafikin\u0259 n\u0259zar\u0259t, z\u0259r\u0259rli sor\u011fular\u0131 edir v\u0259 b\u0259rpa al\u0131r.<\/p>\n<p>Bu modulun \u0259n vacib x\u00fcsusiyy\u0259tl\u0259rind\u0259n biri, Real-Time (Reall\u0131) analizi v\u0259 t\u0259nziml\u0259m\u0259 imkan\u0131d\u0131r. Bu, administratorlara trafikin s\u0259yi il\u0259 ba\u011fl\u0131 t\u0259dbirl\u0259ri an\u0131nda a\u015fkar ed\u0259r\u0259k qura\u015fd\u0131rma \u015f\u0259rait yarad\u0131r. s\u00fcr\u0259t, modul veb t\u0259tbiql\u0259ri \u00e7ox vaxt t\u0259hl\u00fck\u0259li botlardan, SQL Injection v\u0259 Cross-Site Scripting h\u00fccumlar\u0131ndan qoruyur.<\/p>\n<p>Mod Security-nin geni\u015f istifad\u0259 olunmas\u0131n\u0131n ba\u015fqa bir s\u0259b\u0259bi onun \u00e7evik qayda bazas\u0131na malik olmas\u0131d\u0131r. \u0130stifad\u0259\u00e7il\u0259r \u00f6z t\u0259l\u0259bl\u0259rin\u0259 uy\u011fun qaydalar yarada v\u0259 m\u00f6vcud qaydalar d\u0259stini t\u0259kmill\u0259\u015fdirdil\u0259r. Bu da onu f\u0259rdil\u0259\u015fmi\u015f v\u0259 b\u0259zi etibarl\u0131 h\u0259llin\u0259 \u00e7evirir.<\/p>\n<h3>Mod Security il\u0259 H\u00fccumlara Qar\u015f\u0131 Geni\u015fmiqyasl\u0131 M\u00fcdafi\u0259nin Sirl\u0259ri<\/h3>\n<p>Mod Security-nin g\u00fcc\u00fc onun \u00e7oxsah\u0259li m\u00fcdafi\u0259 strategiyas\u0131nda gizlidir. O, h\u0259m trafik anomaliyalar\u0131n\u0131 al\u0131r, h\u0259m d\u0259 imza \u0259sasl\u0131 h\u00fccum t\u0259hl\u00fck\u0259sini aradan qald\u0131r\u0131r. Bu yana\u015fma il\u0259 modulya s\u00fcr\u0259tli h\u00fccuma qar\u015f\u0131 geni\u015fmiqyasl\u0131 qorunma t\u0259min edilir.<\/p>\n<p>Mod Security, istifad\u0259y\u0259 verilmi\u015f qaydalar d\u0259sti il\u0259 kimi t\u0259hl\u00fck\u0259l\u0259ri a\u015fkar edib t\u0259mizl\u0259m\u0259 ala bilir:<\/p>\n<ul>\n<li><strong>SQL inyeksiyas\u0131:<\/strong> Veril\u0259nl\u0259r bazas\u0131na z\u0259r\u0259rli sor\u011fular\u0131n daxil olmas\u0131<\/li>\n<li><strong>XSS H\u00fccumlar\u0131:<\/strong> Scriptl\u0259rin sayt\u0131 t\u0259r\u0259find\u0259n icra edilm\u0259si<\/li>\n<li><strong>Yerli Fayl Daxil Edilm\u0259si (LFI):<\/strong> Yerli fayllar\u0131n icaz\u0259siz \u00e7a\u011fr\u0131lmas\u0131<\/li>\n<li><strong>HTTP T\u0259hl\u00fck\u0259l\u0259ri:<\/strong> S\u0259hv v\u0259 ya t\u0259hl\u00fck\u0259li HTTP sor\u011fular\u0131<\/li>\n<\/ul>\n<table class=\"wp-list-table widefat fixed striped\">\n<thead>\n<tr>\n<th>H\u00fccum N\u00f6v\u00fc<\/th>\n<th>Mod T\u0259hl\u00fck\u0259sizlik \u018fsas M\u00fcdafi\u0259 Mexanizmi<\/th>\n<th>Risk N\u0259tic\u0259si<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>SQL inyeksiyas\u0131<\/td>\n<td>\u015e\u00fcbh\u0259li sor\u011fular\u0131n bloklanmas\u0131<\/td>\n<td>m\u0259lumat s\u0131zmas\u0131, sistem\u0259 giri\u015f<\/td>\n<\/tr>\n<tr>\n<td>XSS<\/td>\n<td>Script qura\u015fd\u0131rma v\u0259 bloklama<\/td>\n<td>\u0130stifad\u0259\u00e7i m\u0259lumatlar\u0131n\u0131n o\u011furlanmas\u0131<\/td>\n<\/tr>\n<tr>\n<td>LFI<\/td>\n<td>Fayl \u00e7a\u011f\u0131r\u0131\u015flar\u0131n\u0131n yoxlan\u0131lmas\u0131<\/td>\n<td>Server idar\u0259etm\u0259sinin itm\u0259si<\/td>\n<\/tr>\n<tr>\n<td>HTTP T\u0259hl\u00fck\u0259l\u0259ri<\/td>\n<td>Qeyri-qanuni ist\u0259kl\u0259rin filtrasiyas\u0131<\/td>\n<td>Sayt\u0131n i\u015fl\u0259k n\u0259tic\u0259sind\u0259<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Mod Security-nin bu m\u00fcdafi\u0259 imkanlar\u0131, onu veb sayt sahibl\u0259ri v\u0259 administratorlar \u00fc\u00e7\u00fcn \u0259v\u0259zolunmaz bir qoruyucu kimi tan\u0131y\u0131r. Qura\u015fd\u0131r\u0131lmas\u0131 konfiqurasiyas\u0131 sad\u0259, ancaq n\u0259tic\u0259d\u0259 t\u0259min edil\u0259n t\u0259mizlik v\u0259 y\u00fcks\u0259k keyfiyy\u0259tlidir.<\/p>\n<p>bundan sonra, Mod Security yaln\u0131z bir t\u0259hl\u00fck\u0259sizlik al\u0259ti deyil, h\u0259m d\u0259 veb t\u0259tbiq idar\u0259\u00e7il\u0259rin\u0259 h\u00fccumlar \u0259vv\u0259li v\u0259 vaxt\u0131 g\u00fccl\u00fc n\u0259zar\u0259t v\u0259 qorunma t\u0259qdim ed\u0259n dinamik bir sistemdir. Bu, veb-sayt\u0131n\u0131n etibarl\u0131l\u0131\u011f\u0131n\u0131n qorunmas\u0131na b\u00f6y\u00fck t\u00f6hf\u0259 verir.<\/p>\n<h3>N\u0259tic\u0259<\/h3>\n<p>\u0130nternet t\u0259hl\u00fck\u0259sizliyi sah\u0259sind\u0259 artan riskl\u0259r fonunda, Mod Security kimi m\u00fcasir v\u0259 \u00e7evik t\u0259hl\u00fck\u0259sizlik h\u0259ll\u0259ri vacibdir. Bu modul, veb t\u0259tbiql\u0259ri h\u00fccumlardan qorunmaq \u00fc\u00e7\u00fcn effektiv, s\u0259rf\u0259li v\u0259 etibarl\u0131 bir yoldur. Mod Security, veb sayt\u0131n\u0131z\u0131n m\u00fcdafi\u0259 qalxan\u0131 olaraq h\u0259m d\u0259 sayt\u0131n\u0131z\u0131n t\u0259hl\u00fck\u0259sizliyini a\u015fkar edir, h\u0259m d\u0259 onlar\u0131 xilas edir.<\/p>\n<p>\u0130stifad\u0259\u00e7il\u0259rin v\u0259 m\u0259lumatlar\u0131n t\u0259hl\u00fck\u0259sizliyi, internetd\u0259n faydalanan h\u0259r k\u0259s \u00fc\u00e7\u00fcn \u0259sas prioritetdir. Mod Security-nin t\u0259tbiqi, bu prioriteti real olaraq \u0259n m\u00fcasir texnologiya il\u0259 istehsal edilmi\u015f effektiv idar\u0259 edir. H\u0259r bir veb sayt\u0131 idar\u0259 ed\u0259n \u015f\u0259xs bu g\u00fccl\u00fc m\u00fcdafi\u0259 il\u0259 tan\u0131\u015f olmaq v\u0259 t\u0259tbiq etm\u0259k.<\/p>\n<p>Son olaraq, veb t\u0259hl\u00fck\u0259sizliyind\u0259 daima inki\u015faf ed\u0259n h\u00fccum \u00fcsullar\u0131na qar\u015f\u0131 davaml\u0131 olaraq t\u0259nziml\u0259m\u0259 v\u0259 yenil\u0259nm\u0259 prosesi aparmaq vacibdir. Mod Security, arxitekturas\u0131 il\u0259 t\u0259chiz oluna bil\u0259n bu ehtiyaca cavab verir. Ona g\u00f6r\u0259 d\u0259, y\u00fcks\u0259k s\u0259viyy\u0259li t\u0259l\u0259bkar h\u0259r k\u0259s \u00fc\u00e7\u00fcn ideal se\u00e7imdir.<\/p>\n<\/article>","protected":false},"excerpt":{"rendered":"<p>Mod Security, veb t\u0259hl\u00fck\u0259sizliyind\u0259 g\u00fccl\u00fc m\u00fcdafi\u0259\u00e7i olaraq, h\u00fccumlar\u0131 \u00f6nl\u0259yir v\u0259 saytlar\u0131n etibarl\u0131l\u0131\u011f\u0131n\u0131 art\u0131r\u0131r. Dinamik qoruma il\u0259 kibert\u0259hl\u00fck\u0259l\u0259r\u0259 qar\u015f\u0131 dayan\u0131ql\u0131 qal\u0131r.<\/p>","protected":false},"author":1,"featured_media":6637,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[18],"tags":[],"class_list":["post-6638","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security"],"_links":{"self":[{"href":"https:\/\/jsnet.biz\/az\/wp-json\/wp\/v2\/posts\/6638","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jsnet.biz\/az\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jsnet.biz\/az\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jsnet.biz\/az\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jsnet.biz\/az\/wp-json\/wp\/v2\/comments?post=6638"}],"version-history":[{"count":1,"href":"https:\/\/jsnet.biz\/az\/wp-json\/wp\/v2\/posts\/6638\/revisions"}],"predecessor-version":[{"id":6639,"href":"https:\/\/jsnet.biz\/az\/wp-json\/wp\/v2\/posts\/6638\/revisions\/6639"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jsnet.biz\/az\/wp-json\/wp\/v2\/media\/6637"}],"wp:attachment":[{"href":"https:\/\/jsnet.biz\/az\/wp-json\/wp\/v2\/media?parent=6638"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jsnet.biz\/az\/wp-json\/wp\/v2\/categories?post=6638"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jsnet.biz\/az\/wp-json\/wp\/v2\/tags?post=6638"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}