{"id":54833,"date":"2024-03-02T11:34:05","date_gmt":"2024-03-02T08:34:05","guid":{"rendered":"https:\/\/onhexgroup.ir\/?p=5994"},"modified":"2024-03-02T12:11:20","modified_gmt":"2024-03-02T08:41:20","slug":"%d9%86%da%af%d8%a7%d9%87%db%8c-%d8%a8%d9%87-nist-cybersecurity-framework-2-0","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/%d9%86%da%af%d8%a7%d9%87%db%8c-%d8%a8%d9%87-nist-cybersecurity-framework-2-0\/","title":{"rendered":"NIST CyberSecurity Framework 2.0"},"content":{"rendered":"<p>\u0645\u0648\u0633\u0633\u0647 NIST \u0631\u0648\u0632 \u062f\u0648\u0634\u0646\u0628\u0647 \u0628\u0637\u0648\u0631 \u0631\u0633\u0645\u06cc \u0646\u0633\u062e\u0647 \u06cc \u062f\u0648\u0645 CyberSecurity Framework (CSF) \u0631\u0648 \u0645\u0646\u062a\u0634\u0631 \u06a9\u0631\u062f.<\/p>\n<p>\u0646\u0633\u062e\u0647 \u0627\u0648\u0644 CSF \u0628\u0647 \u062f\u0633\u062a\u0648\u0631 \u0631\u0626\u06cc\u0633 \u062c\u0645\u0647\u0648\u0631 \u0648\u0642\u062a \u0622\u0645\u0631\u06cc\u06a9\u0627 \u060c \u0628\u0627\u0631\u0627\u06a9 \u0627\u0648\u0628\u0627\u0645\u0627 \u060c\u062f\u0631 12 \u0641\u0648\u0631\u06cc\u0647 2014 \u060c \u0645\u0646\u062a\u0634\u0631 \u0634\u062f\u0647 \u0628\u0648\u062f \u0648 \u0628\u06cc\u0634\u062a\u0631 \u0633\u0627\u0632\u0645\u0627\u0646\u0647\u0627\u06cc \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u06cc \u062d\u06cc\u0627\u062a\u06cc \u0631\u0648 \u0647\u062f\u0641 \u0642\u0631\u0627\u0631 \u062f\u0627\u062f\u0647 \u0628\u0648\u062f. \u0627\u06cc\u0646 \u0686\u0627\u0631\u0686\u0648\u0628 \u0627\u0632 \u0637\u0631\u06cc\u0642 \u0647\u0645\u06a9\u0627\u0631\u06cc \u0645\u06cc\u0627\u0646 \u0635\u0646\u0639\u062a \u0648 \u062f\u0648\u0644\u062a \u0627\u06cc\u062c\u0627\u062f \u0648 \u0634\u0627\u0645\u0644 \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f\u0647\u0627\u060c \u0631\u0647\u0646\u0645\u0648\u062f\u0647\u0627 \u0648 \u0627\u0642\u062f\u0627\u0645\u0627\u062a\u06cc \u0647\u0633\u062a\u0634 \u06a9\u0647 \u0628\u0631\u0627\u06cc \u0628\u0647\u0628\u0648\u062f \u062d\u0641\u0627\u0638\u062a \u0627\u0632 \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u0647\u0627\u06cc \u062d\u06cc\u0627\u062a\u06cc \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u06cc\u0634\u0646. \u0631\u0648\u06cc\u06a9\u0631\u062f \u0645\u0642\u0631\u0648\u0646 \u0628\u0647 \u0635\u0631\u0641\u0647\u060c \u062a\u06a9\u0631\u0627\u0631 \u067e\u0630\u06cc\u0631\u060c \u0645\u0646\u0639\u0637\u0641 \u0648 \u0627\u0648\u0644\u0648\u06cc\u062a\u200c\u06af\u0630\u0627\u0631\u06cc \u0634\u062f\u0647 \u0686\u0627\u0631\u0686\u0648\u0628 \u0628\u0647 \u0645\u0627\u0644\u06a9\u0627\u0646 \u0648 \u06af\u0631\u062f\u0627\u0646\u0646\u062f\u06af\u0627\u0646 \u0632\u06cc\u0631\u0633\u0627\u062e\u062a \u062d\u06cc\u0627\u062a\u06cc \u062f\u0631 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0631\u06cc\u0633\u06a9 \u0647\u0627\u06cc \u0645\u0631\u062a\u0628\u0637 \u0628\u0627 \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u06a9\u0645\u06a9 \u0645\u06cc\u06a9\u0646\u0647.<\/p>\n<p>\u0627\u06cc\u0646 \u0686\u0627\u0631\u0686\u0648\u0628 \u0628\u0647 \u0645\u0631\u0648\u0631 \u0628\u0635\u0648\u0631\u062a \u06af\u0633\u062a\u0631\u062f\u0647 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0648 \u062a\u0648\u0635\u06cc\u0647 \u0634\u062f. NIST \u0627\u0639\u0644\u0627\u0645 \u06a9\u0631\u062f\u0647 \u06a9\u0647\u00a0 CSF 2.0 \u0628\u0631\u0627\u06cc \u06a9\u0645\u06a9 \u0628\u0647 \u0647\u0645\u0647 \u06cc \u0633\u0627\u0632\u0645\u0627\u0646\u0647\u0627 \u0628\u0631\u0627\u06cc \u06a9\u0627\u0647\u0634 \u0631\u06cc\u0633\u06a9 \u0647\u0627 \u060c\u0635\u0631\u0641\u0646\u0638\u0631 \u0627\u0632 \u0628\u062e\u0634\u060c \u0627\u0646\u062f\u0627\u0632\u0647 \u06cc\u0627 \u0633\u0637\u062d \u067e\u06cc\u0686\u06cc\u062f\u06af\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u0637\u0631\u0627\u062d\u06cc \u0634\u062f\u0647.<\/p>\n<p>\u0628\u0631\u0627\u0633\u0627\u0633 \u0628\u0627\u0632\u062e\u0648\u0631\u062f\u06cc \u06a9\u0647 \u0627\u0632 \u0637\u0631\u062d \u067e\u06cc\u0634 \u0646\u0648\u06cc\u0633 \u062f\u0631\u06cc\u0627\u0641\u062a \u0634\u062f\u0647\u060c NIST \u062f\u0633\u062a\u0648\u0631\u0627\u0644\u0639\u0645\u0644\u0647\u0627\u06cc \u0627\u0635\u0644\u06cc \u0631\u0648 \u06af\u0633\u062a\u0631\u0634 \u062f\u0627\u062f\u0647 \u0648 \u0645\u0646\u0627\u0628\u0639 \u0627\u0636\u0627\u0641\u06cc \u0631\u0648 \u0628\u0631\u0627\u06cc \u06a9\u0645\u06a9 \u0628\u0647 \u0633\u0627\u0632\u0645\u0627\u0646\u0647\u0627 \u0628\u0631\u0627\u06cc \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 CSF \u0628\u0637\u0648\u0631 \u06a9\u0627\u0645\u0644 \u0627\u06cc\u062c\u0627\u062f \u06a9\u0631\u062f\u0647.<\/p>\n<p>CSF 2.0 \u0645\u06cc\u062a\u0648\u0646\u0647 \u0628\u0647 \u0633\u0627\u0632\u0645\u0627\u0646\u0647\u0627 \u062f\u0631 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0648 \u06a9\u0627\u0647\u0634 \u0631\u06cc\u0633\u06a9 \u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc\u0634\u0648\u0646 \u062f\u0631 \u0647\u0646\u06af\u0627\u0645 \u0634\u0631\u0648\u0639 \u06cc\u0627 \u0628\u0647\u0628\u0648\u062f \u0628\u0631\u0646\u0627\u0645\u0647 \u06cc \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc\u0634\u0648\u0646 \u06a9\u0645\u06a9 \u06a9\u0646\u0647. CSF \u0646\u062a\u0627\u06cc\u062c \u062e\u0627\u0635\u06cc \u0631\u0648 \u0645\u0634\u062e\u0635 \u0645\u06cc\u06a9\u0646\u0647 \u06a9\u0647 \u0633\u0627\u0632\u0645\u0627\u0646\u0647\u0627 \u0645\u06cc\u062a\u0648\u0646\u0646 \u0628\u0631\u0627\u06cc \u0645\u0642\u0627\u0628\u0644\u0647 \u0628\u0627 \u0631\u06cc\u0633\u06a9 \u0628\u062f\u0633\u062a\u0634 \u0628\u06cc\u0627\u0631\u0646. \u0645\u0646\u0627\u0628\u0639 \u062f\u06cc\u06af\u0647 NIST \u0627\u0642\u062f\u0627\u0645\u0627\u062a \u062e\u0627\u0635\u06cc \u0631\u0648 \u06a9\u0647 \u0628\u0631\u0627\u06cc \u062f\u0633\u062a\u06cc\u0627\u0628\u06cc \u0628\u0647 \u0647\u0631 \u0646\u062a\u06cc\u062c\u0647 \u0645\u06cc\u0634\u0647 \u0627\u0646\u062c\u0627\u0645 \u062f\u0627\u062f \u0631\u0648 \u062a\u0648\u0636\u06cc\u062d \u0645\u06cc\u062f\u0647.<\/p>\n<p>CSF 2.0 \u0628\u0647\u0645\u0631\u0627\u0647 \u0645\u0646\u0627\u0628\u0639 \u062a\u06a9\u0645\u06cc\u0644\u06cc NIST \u060c \u0633\u0627\u0632\u0645\u0627\u0646 \u0647\u0627\u0631\u0648 \u0628\u0631\u0627\u06cc \u062f\u0631\u06a9\u060c \u0627\u0631\u0632\u06cc\u0627\u0628\u06cc \u060c \u0627\u0648\u0644\u0648\u06cc\u062a \u0628\u0646\u062f\u06cc \u0648 \u062a\u0627\u06cc\u06cc\u062f \u0631\u06cc\u0633\u06a9 \u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u0645\u06cc\u062a\u0648\u0646\u0647 \u06a9\u0645\u06a9 \u06a9\u0646\u0647. \u0627\u06cc\u0646 \u0645\u0648\u0631\u062f \u0628\u062e\u0635\u0648\u0635 \u0628\u0631\u0627\u06cc \u062a\u0642\u0648\u06cc\u062a \u0627\u0631\u062a\u0628\u0627\u0637\u0627\u062a \u062f\u0627\u062e\u0644\u06cc \u0648 \u062e\u0627\u0631\u062c\u06cc \u0628\u06cc\u0646 \u062a\u06cc\u0645 \u0647\u0627 \u0645\u0641\u06cc\u062f \u0647\u0633\u062a\u0634. \u0647\u0645\u0686\u0646\u06cc\u0646 \u0627\u0645\u06a9\u0627\u0646 \u0627\u062f\u063a\u0627\u0645 \u0628\u0627 \u0627\u0633\u062a\u0631\u0627\u062a\u0698\u06cc \u0647\u0627\u06cc \u0645\u062f\u06cc\u0631\u06cc\u062a \u0631\u06cc\u0633\u06a9 \u0631\u0648 \u0647\u0645 \u0641\u0631\u0627\u0647\u0645 \u0645\u06cc\u06a9\u0646\u0647.<\/p>\n<p>CSF 2.0 \u0627\u0632 \u0627\u062c\u0631\u0627\u06cc National Cybersecurity Strategy \u067e\u0634\u062a\u06cc\u0628\u0627\u0646\u06cc \u0645\u06cc\u06a9\u0646\u0647 \u0648 \u062d\u0648\u0644 \u0634\u0634 \u062d\u0648\u0632\u0647 \u06a9\u0644\u06cc\u062f\u06cc \u0633\u0627\u0632\u0645\u0627\u0646\u062f\u0647\u06cc \u0634\u062f\u0647 \u06a9\u0647 \u0627\u0635\u0644\u0627\u062d\u0627 \u0628\u0647 \u0647\u0631 \u06a9\u062f\u0648\u0645\u0634\u0648\u0646 \u0639\u0645\u0644\u06a9\u0631\u062f \u0645\u06cc\u06af\u0646. \u0627\u06cc\u0646 6 \u0639\u0645\u0644\u06a9\u0631\u062f \u0639\u0628\u0627\u0631\u062a\u0646\u062f \u0627\u0632 : \u0634\u0646\u0627\u062e\u062a\u060c \u0645\u062d\u0627\u0641\u0638\u062a\u060c \u0634\u0646\u0627\u0633\u0627\u06cc\u06cc\u060c \u067e\u0627\u0633\u062e\u060c \u0628\u0627\u0632\u06cc\u0627\u0628\u06cc \u0648 \u06a9\u0646\u062a\u0631\u0644. \u0642\u0633\u0645\u062a \u06a9\u0646\u062a\u0631\u0644 \u062f\u0631 \u0627\u06cc\u0646 \u0646\u0633\u062e\u0647 \u0645\u0639\u0631\u0641\u06cc \u0634\u062f\u0647. \u0627\u06cc\u0646 \u0639\u0645\u0644\u06a9\u0631\u062f\u0647\u0627 \u062f\u0631 \u06a9\u0646\u0627\u0631 \u0647\u0645 \u062f\u06cc\u062f\u06cc \u062c\u0627\u0645\u0639 \u0628\u0631\u0627\u06cc \u0645\u062f\u06cc\u0631\u06cc\u062a \u0631\u06cc\u0633\u06a9 \u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u0627\u0631\u0627\u0626\u0647 \u0645\u06cc\u062f\u0646.<\/p>\n<ul>\n<li>\u06a9\u0646\u062a\u0631\u0644 : \u0627\u0633\u062a\u0631\u0627\u062a\u0698\u06cc \u0645\u062f\u06cc\u0631\u06cc\u062a \u0631\u06cc\u0633\u06a9 \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u060c \u0627\u0646\u062a\u0638\u0627\u0631\u0627\u062a \u0648 \u062e\u0637 \u0645\u0634\u06cc \u0633\u0627\u0632\u0645\u0627\u0646 \u0631\u0648 \u0627\u06cc\u062c\u0627\u062f\u060c \u062a\u0627\u06cc\u06cc\u062f \u0648 \u0646\u0638\u0627\u0631\u062a \u0645\u06cc\u06a9\u0646\u0647.<\/li>\n<li>\u0634\u0646\u0627\u062e\u062a : \u062f\u0631\u06a9 \u0631\u06cc\u0633\u06a9 \u0647\u0627\u06cc \u0641\u0639\u0644\u06cc \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u0633\u0627\u0632\u0645\u0627\u0646<\/li>\n<li>\u0645\u062d\u0627\u0641\u0638\u062a : \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u062a\u062f\u0627\u0628\u06cc\u0631 \u062d\u0641\u0627\u0638\u062a\u06cc \u0628\u0631\u0627\u06cc \u0645\u062f\u06cc\u0631\u06cc\u062a \u0631\u06cc\u0633\u06a9 \u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u0633\u0627\u0632\u0645\u0627\u0646<\/li>\n<li>\u0634\u0646\u0627\u0633\u0627\u06cc\u06cc: \u067e\u06cc\u062f\u0627 \u06a9\u0631\u062f\u0646 \u062d\u0645\u0644\u0627\u062a \u0627\u062d\u062a\u0645\u0627\u0644\u06cc \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u0648 \u0622\u0646\u0627\u0644\u06cc\u0632 \u0627\u0648\u0646\u0627.<\/li>\n<li>\u067e\u0627\u0633\u062e: \u0627\u0642\u062f\u0627\u0645\u0627\u062a\u06cc \u06a9\u0647 \u0628\u0631\u0627\u06cc \u06cc\u06a9 \u062d\u0627\u062f\u062b\u0647 \u0627\u0645\u0646\u06cc\u062a\u06cc \u0634\u0646\u0627\u0633\u0627\u06cc\u06cc \u0634\u062f\u0647\u060c \u0627\u0646\u062c\u0627\u0645 \u0645\u06cc\u0634\u0647<\/li>\n<li>\u0628\u0627\u0632\u06cc\u0627\u0628\u06cc: \u062f\u0627\u0631\u0627\u06cc\u06cc \u0647\u0627 \u0648 \u0641\u0639\u0627\u0644\u06cc\u062a \u0647\u0627\u06cc \u062a\u062d\u062a \u062a\u0627\u062b\u06cc\u0631 \u06cc\u06a9 \u062d\u0627\u062f\u062b\u0647 \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u0628\u0627\u0632\u06cc\u0627\u0628\u06cc \u0645\u06cc\u0634\u0646.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"not-transparent aligncenter size-full wp-image-5995\" style=\"--dominant-color: #4c768f;\" src=\"https:\/\/afaghhosting.net\/blog\/wp-content\/uploads\/2024\/03\/d986daafd8a7d987db8c-d8a8d987-nist-cybersecurity-framework-2-0.webp\" sizes=\"auto, (max-width: 807px) 100vw, 807px\" srcset=\"https:\/\/afaghhosting.net\/blog\/wp-content\/uploads\/2024\/03\/d986daafd8a7d987db8c-d8a8d987-nist-cybersecurity-framework-2-0.webp 807w, https:\/\/afaghhosting.net\/blog\/wp-content\/uploads\/2024\/03\/d986daafd8a7d987db8c-d8a8d987-nist-cybersecurity-framework-2-0-1.webp 300w, https:\/\/afaghhosting.net\/blog\/wp-content\/uploads\/2024\/03\/d986daafd8a7d987db8c-d8a8d987-nist-cybersecurity-framework-2-0-2.webp 768w\" alt=\"\u0628\u0631\u0631\u0633\u06cc NIST CSF 2.0\" width=\"807\" height=\"489\" data-dominant-color=\"4c768f\" data-has-transparency=\"false\" title=\"\"><\/p>\n<p>CSF 2.0 \u0634\u0627\u0645\u0644 \u0645\u0648\u0627\u0631\u062f \u0632\u06cc\u0631 \u0647\u0633\u062a\u0634 :<\/p>\n<ul>\n<li><a href=\"https:\/\/csrc.nist.gov\/extensions\/nudp\/services\/json\/csf\/download?olirids=all\" target=\"_blank\" rel=\"noopener\">CSF Core<\/a> : \u06cc\u06a9 \u0637\u0628\u0642\u0647 \u0628\u0646\u062f\u06cc \u0627\u0632 \u0646\u062a\u0627\u06cc\u062c \u0633\u0637\u062d \u0628\u0627\u0644\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u060c \u06a9\u0647 \u0645\u06cc\u062a\u0648\u0646\u0647 \u0628\u0647 \u0647\u0631 \u0633\u0627\u0632\u0645\u0627\u0646\u06cc \u062f\u0631 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0631\u06cc\u0633\u06a9 \u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u06a9\u0645\u06a9 \u06a9\u0646\u0647.<\/li>\n<li><a href=\"https:\/\/www.nist.gov\/cyberframework\/csf-20-profiles\" target=\"_blank\" rel=\"noopener\">CSF Organizational Profiles<\/a> :\u0645\u06a9\u0627\u0646\u06cc\u0632\u0645\u06cc \u0628\u0631\u0627\u06cc \u062a\u0648\u0635\u06cc\u0641 \u0648\u0636\u0639\u06cc\u062a \u0641\u0639\u0644\u06cc \u0648\/\u06cc\u0627 \u0648\u0636\u0639\u06cc\u062a \u0647\u062f\u0641 \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u06a9\u0647 \u0634\u0627\u0645\u0644 \u0646\u062a\u0627\u06cc\u062c\u06cc \u0627\u0632 \u062f\u06cc\u062f CSF Core \u0647\u0633\u062a\u0634. \u067e\u0631\u0648\u0641\u0627\u06cc\u0644\u0647\u0627 \u0628\u0647 \u0633\u0627\u0632\u0645\u0627\u0646 \u06a9\u0645\u06a9 \u0645\u06cc\u06a9\u0646\u0646 \u062a\u0627 \u0628\u0627 \u0645\u0642\u0627\u06cc\u0633\u0647 \u067e\u0631\u0648\u0641\u0627\u06cc\u0644 \u0641\u0639\u0644\u06cc \u0628\u0627 \u067e\u0631\u0648\u0641\u0627\u06cc\u0644 \u0647\u062f\u0641\u00a0 \u060c \u0641\u0631\u0635\u062a \u0628\u0647\u0628\u0648\u062f \u0648\u0636\u0639\u06cc\u062a \u0627\u0645\u0646\u06cc\u062a\u06cc \u062e\u0648\u062f\u0634\u0648\u0646 \u0631\u0648 \u062f\u0627\u0634\u062a\u0647 \u0628\u0627\u0634\u0646.<\/li>\n<li><a href=\"https:\/\/doi.org\/10.6028\/NIST.SP.1302.ipd\" target=\"_blank\" rel=\"noopener\">CSF Tiers<\/a> : \u0645\u06cc\u062a\u0648\u0646\u0647 \u0628\u0631\u0627\u06cc CSF Organizational Profile \u0627\u0639\u0645\u0627\u0644 \u0628\u0634\u0647 \u062a\u0627 \u062f\u0642\u062a \u0631\u0627\u0647\u0628\u0631\u06cc \u0648 \u0634\u06cc\u0648\u0647 \u0647\u0627\u06cc \u0645\u062f\u06cc\u0631\u06cc\u062a \u0631\u06cc\u0633\u06a9 \u0627\u0645\u0646\u06cc\u062a\u06cc \u06cc\u06a9 \u0633\u0627\u0632\u0645\u0627\u0646 \u0631\u0648 \u0645\u0634\u062e\u0635 \u06a9\u0646\u0647.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>\u0645\u0648\u0633\u0633\u0647 NIST \u0631\u0648\u0632 \u062f\u0648\u0634\u0646\u0628\u0647 \u0628\u0637\u0648\u0631 \u0631\u0633\u0645\u06cc \u0646\u0633\u062e\u0647 \u06cc \u062f\u0648\u0645 CyberSecurity Framework (CSF) \u0631\u0648 \u0645\u0646\u062a\u0634\u0631 \u06a9\u0631\u062f. \u0646\u0633\u062e\u0647 \u0627\u0648\u0644 CSF \u0628\u0647 \u062f\u0633\u062a\u0648\u0631 \u0631\u0626\u06cc\u0633 \u062c\u0645\u0647\u0648\u0631 \u0648\u0642\u062a \u0622\u0645\u0631\u06cc\u06a9\u0627 \u060c \u0628\u0627\u0631\u0627\u06a9 \u0627\u0648\u0628\u0627\u0645\u0627 \u060c\u062f\u0631 12 \u0641\u0648\u0631\u06cc\u0647 2014 \u060c \u0645\u0646\u062a\u0634\u0631 \u0634\u062f\u0647 \u0628\u0648\u062f \u0648 \u0628\u06cc\u0634\u062a\u0631 \u0633\u0627\u0632\u0645\u0627\u0646\u0647\u0627\u06cc \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u06cc \u062d\u06cc\u0627\u062a\u06cc \u0631\u0648 \u0647\u062f\u0641 \u0642\u0631\u0627\u0631 \u062f\u0627\u062f\u0647 \u0628\u0648\u062f. \u0627\u06cc\u0646 \u0686\u0627\u0631\u0686\u0648\u0628 \u0627\u0632 \u0637\u0631\u06cc\u0642 \u0647\u0645\u06a9\u0627\u0631\u06cc \u0645\u06cc\u0627\u0646 \u0635\u0646\u0639\u062a \u0648 \u062f\u0648\u0644\u062a \u0627\u06cc\u062c\u0627\u062f &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26,28,29,34],"tags":[],"class_list":["post-54833","post","type-post","status-publish","format-standard","hentry","category-vulnerability","category-28","category-29","category-server"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/54833","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=54833"}],"version-history":[{"count":2,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/54833\/revisions"}],"predecessor-version":[{"id":54835,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/54833\/revisions\/54835"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=54833"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=54833"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=54833"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}