{"id":5681,"date":"2021-05-03T18:30:30","date_gmt":"2021-05-03T16:30:30","guid":{"rendered":"https:\/\/nethemba.com\/?page_id=5681"},"modified":"2025-05-07T16:28:33","modified_gmt":"2025-05-07T14:28:33","slug":"identifikace-a-hledani-kybernetickych-hrozeb","status":"publish","type":"page","link":"https:\/\/nethemba.com\/cs\/sluzby\/it-bezpecnostni-sluzby\/identifikace-a-hledani-kybernetickych-hrozeb\/","title":{"rendered":"Identifikace a hled\u00e1n\u00ed kybernetick\u00fdch hrozeb"},"content":{"rendered":"<p><strong>Identifikace a hled\u00e1n\u00ed kybernetick\u00fdch hrozeb je proaktivn\u00ed a iterativn\u00ed prohled\u00e1v\u00e1n\u00ed koncov\u00fdch stanic, s\u00edt\u00ed, datab\u00e1z\u00ed, s c\u00edlem odhalit podez\u0159el\u00e9 aktivity nebo u\u017eivatele se zl\u00fdmi \u00famysly, kter\u00e9 nebylo mo\u017en\u00e9 zachytit a detekovat st\u00e1vaj\u00edc\u00edmi automatizovan\u00fdmi n\u00e1stroji.<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">P\u0159i hled\u00e1n\u00ed kybernetick\u00fdch hrozeb se zam\u011b\u0159ujeme na protivn\u00edky, kte\u0159\u00ed se ji\u017e nach\u00e1zej\u00ed v kompromitovan\u00e9 s\u00edti a syst\u00e9mech samotn\u00e9 ob\u011bti, kde sou\u010dasn\u011b m\u00e1me opr\u00e1vn\u011bn\u00ed shroma\u017e\u010fovat \u00fadaje a zav\u00e1d\u011bt protiopat\u0159en\u00ed.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Za hrozbami stoj\u00ed v\u017edy lid\u00e9 &#8211; protivn\u00edci, nejen jejich n\u00e1stroje (nap\u0159\u00edklad malware) a proto n\u00e1s zaj\u00edmaj\u00ed nejv\u00edce. Protivn\u00edci jsou vytrval\u00ed, maj\u00ed sv\u00e9 vlastn\u00ed techniky, taktiky a postupy a \u010dasto se dok\u00e1\u017e\u00ed vyhnout obrann\u00fdm mechanism\u016fm s\u00edt\u011b. Hrozby se \u010dasto ozna\u010duj\u00ed jako pokro\u010dil\u00e9 a trval\u00e9 ( &#8222;APT&#8220;). A to nejen kv\u016fli schopnostem, kter\u00fdmi protivn\u00edci disponuj\u00ed, ale i kv\u016fli jejich vytrvalosti &#8211; schopnosti iniciovat a dlouhodob\u011b udr\u017eovat operace nam\u00ed\u0159en\u00e9 proti zvolen\u00fdm c\u00edl\u016fm ob\u011bt\u00ed.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Ne\u010dek\u00e1me jen na zjevn\u00e9 indik\u00e1tory kompromitace ( &#8222;Indicators of Compromise&#8220;), ale aktivn\u011b vyhled\u00e1v\u00e1me hrozby s c\u00edlem minimalizovat nebo zcela zabr\u00e1nit \u0161kod\u00e1m. Samotn\u00fd akt hled\u00e1n\u00ed hrozeb by m\u011bl v podstat\u011b otestovat schopnost organizace spolehliv\u011b detekovat a reagovat na hrozby.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Hled\u00e1n\u00ed hrozeb p\u0159edstavuje hypot\u00e9zou \u0159\u00edzen\u00fd p\u0159\u00edstup shroma\u017e\u010fov\u00e1n\u00ed, detekce a anal\u00fdzy \u00fadaj\u016f je\u0161t\u011b p\u0159ed samotn\u00fdm incidentem. Jedna ze z\u00e1kladn\u00edch metod generov\u00e1n\u00ed hypot\u00e9z na \u00fasp\u011b\u0161nou identifikaci hrozeb je b\u00fdt neust\u00e1le informov\u00e1n o aktu\u00e1ln\u00edch hrozb\u00e1ch ( &#8222;Threat Intelligence&#8220;). Informovanost zvy\u0161uje po\u010det a \u00fa\u010dinnost v\u0161ech hypot\u00e9z, kter\u00e9 vygenerujeme a testujeme. Proto poskytujeme na\u0161im klient\u016fm i slu\u017ebu &#8222;Threat Intelligence&#8220; s c\u00edlem jim pomoci pochopit a poznat, kter\u00fdm hrozb\u00e1m \u010del\u00ed a to na z\u00e1klad\u011b jejich odv\u011btv\u00ed.<\/span><\/p>\n<h1><b>Identifikace a hled\u00e1n\u00ed kybernetick\u00fdch hrozeb ( &#8222;Threat Hunting&#8220;)<\/b><\/h1>\n<p><span style=\"font-weight: 400;\">Pro klienty, kte\u0159\u00ed cht\u011bj\u00ed vylep\u0161it \u00farove\u0148 sv\u00e9ho bezpe\u010dnostn\u00edho programu. Tito klienti mus\u00ed m\u00edt zavedeny SOC ( &#8222;Security Operation Center&#8220;) nebo alespo\u0148 sb\u00edrat logy (ze s\u00edt\u011b, koncov\u00fdch stanic atd). Na z\u00e1klad\u011b posouzen\u00ed jejich sou\u010dasn\u00e9ho stavu bezpe\u010dnosti m\u016f\u017eeme n\u00e1sledn\u011b ur\u010dit, jak jsou p\u0159ipraveni na implementaci \u0159e\u0161en\u00ed, kter\u00e9 je posune na dal\u0161\u00ed \u00farove\u0148. Identifikaci a hled\u00e1n\u00ed kybernetick\u00fdch hrozeb m\u016f\u017eeme prov\u00e1d\u011bt i na po\u017e\u00e1d\u00e1n\u00ed, nap\u0159\u00edklad pokud m\u00e1 z\u00e1kazn\u00edk podez\u0159en\u00ed, \u017ee je ter\u010dem c\u00edlen\u00e9ho \u00fatoku (nap\u0159. u\u017eivatel bitcoinu nebo banka mohou b\u00fdt c\u00edlem pro kyber-zlo\u010dineckou skupinu Lazarus). V tomto p\u0159\u00edpad\u011b hled\u00e1me hrozby p\u0159\u00edmo v s\u00edti z\u00e1kazn\u00edka, s c\u00edlem identifikovat pachatele hrozby nebo odhalit identifik\u00e1tory samotn\u00e9 kompromitace ( &#8222;IoC&#8220;).<\/span><\/p>\n<h1><b>Informace o hrozb\u00e1ch ( &#8222;Threat Intelligence&#8220;)<\/b><\/h1>\n<p><span style=\"font-weight: 400;\">Tato slu\u017eba je vhodn\u00e1 pro ka\u017ed\u00e9ho klienta, dokonce i pro spole\u010dnosti, kter\u00e9 v sou\u010dasnosti nemaj\u00ed zaveden bezpe\u010dnostn\u00ed program. Na z\u00e1klad\u011b odv\u011btv\u00ed klienta shroma\u017e\u010fujeme indik\u00e1tory kompromitace (IoC). Tyto indik\u00e1tory jsou n\u00e1sledn\u011b dod\u00e1v\u00e1ny na\u0161im klient\u016fm. Na z\u00e1klad\u011b t\u011bchto informac\u00ed se klient m\u016f\u017ee rozhodnout, zda relevantn\u00ed hrozby bude d\u00e1le monitorovat, zablokuje na \u00farovni firewall nebo podnikne dal\u0161\u00ed proaktivn\u00ed kroky k zastaven\u00ed \u00fatok\u016f, a to d\u0159\u00edve, ne\u017e k nim re\u00e1ln\u011b dojde. Monitorov\u00e1n\u00edm indik\u00e1tor\u016f kompromitace mohou na\u0161i klienti detekovat \u00fatoky a rychle jednat, tak, aby zabr\u00e1nily hackersk\u00e9mu pr\u016fniku i omezili \u0161kody zastaven\u00edm \u00fatok\u016f v d\u0159\u00edv\u011bj\u0161\u00edch f\u00e1z\u00edch.<\/span><\/p>\n<h1><b>Pro\u010d pot\u0159ebujete tuto slu\u017ebu?<\/b><\/h1>\n<p><span style=\"font-weight: 400;\">V dne\u0161n\u00edm sv\u011bt\u011b ka\u017ed\u00fdch 39 sekund doch\u00e1z\u00ed n\u011bkde k nov\u00e9mu digit\u00e1ln\u00edmu \u00fatoku.<br \/>\n<\/span><span style=\"font-weight: 400;\">64% spole\u010dnost\u00ed na cel\u00e9m sv\u011bt\u011b za\u017eilo alespo\u0148 jednu formu kybernetick\u00e9ho \u00fatoku.<br \/>\n<\/span><span style=\"font-weight: 400;\">Glob\u00e1ln\u011b je denn\u011b hacknut\u00fdch 30 000 webov\u00fdch str\u00e1nek.<br \/>\n<\/span><span style=\"font-weight: 400;\">Denn\u011b se vytvo\u0159\u00ed 300 000 nov\u00fdch vzork\u016f malwaru.<br \/>\n<\/span><span style=\"font-weight: 400;\">60% v\u0161ech \u0161kodliv\u00fdch dom\u00e9n slou\u017e\u00ed k roz\u0161i\u0159ov\u00e1n\u00ed spam\u016f.<br \/>\n<\/span><span style=\"font-weight: 400;\">Ka\u017ed\u00e1 organizace by m\u011bla m\u00edt program identifikace a hled\u00e1n\u00ed hrozeb, \u010d\u00edm\u017e v\u00fdrazn\u011b zv\u00fd\u0161\u00ed hodnotu sv\u00e9ho bezpe\u010dnostn\u00edho programu. Sou\u010dasn\u011b t\u00edm zm\u011bn\u00ed sv\u016fj p\u0159\u00edstup k hrozb\u00e1m z reaktivn\u00edho na proaktivn\u00ed a sn\u00ed\u017e\u00ed \u010das jejich detekce.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Identifikace a hled\u00e1n\u00ed kybernetick\u00fdch hrozeb je proaktivn\u00ed a iterativn\u00ed prohled\u00e1v\u00e1n\u00ed koncov\u00fdch stanic, s\u00edt\u00ed, datab\u00e1z\u00ed, s c\u00edlem odhalit podez\u0159el\u00e9 aktivity nebo u\u017eivatele se zl\u00fdmi \u00famysly, kter\u00e9 nebylo mo\u017en\u00e9 zachytit a detekovat st\u00e1vaj\u00edc\u00edmi automatizovan\u00fdmi n\u00e1stroji. P\u0159i hled\u00e1n\u00ed kybernetick\u00fdch hrozeb se zam\u011b\u0159ujeme na protivn\u00edky, kte\u0159\u00ed se ji\u017e nach\u00e1zej\u00ed v kompromitovan\u00e9 s\u00edti a syst\u00e9mech samotn\u00e9 ob\u011bti, kde sou\u010dasn\u011b m\u00e1me [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":464,"menu_order":3,"comment_status":"closed","ping_status":"closed","template":"services_detail.php","meta":{"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-5681","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Identifikace a hled\u00e1n\u00ed kybernetick\u00fdch hrozeb - Nethemba<\/title>\n<meta name=\"description\" content=\"Proaktivn\u00ed prohled\u00e1v\u00e1n\u00ed koncov\u00fdch stanic, s\u00edt\u00ed, datab\u00e1z\u00ed s c\u00edlem odhalit podez\u0159el\u00e9 aktivity, jejich\u017e nebylo mo\u017en\u00e9 detekovat st\u00e1vaj\u00edc\u00edmi n\u00e1stroji.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nethemba.com\/cs\/sluzby\/it-bezpecnostni-sluzby\/identifikace-a-hledani-kybernetickych-hrozeb\/\" \/>\n<meta property=\"og:locale\" content=\"cs_CZ\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Identifikace a hled\u00e1n\u00ed kybernetick\u00fdch hrozeb - Nethemba\" \/>\n<meta property=\"og:description\" content=\"Proaktivn\u00ed prohled\u00e1v\u00e1n\u00ed koncov\u00fdch stanic, s\u00edt\u00ed, datab\u00e1z\u00ed s c\u00edlem odhalit podez\u0159el\u00e9 aktivity, jejich\u017e nebylo mo\u017en\u00e9 detekovat st\u00e1vaj\u00edc\u00edmi n\u00e1stroji.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nethemba.com\/cs\/sluzby\/it-bezpecnostni-sluzby\/identifikace-a-hledani-kybernetickych-hrozeb\/\" \/>\n<meta property=\"og:site_name\" content=\"Nethemba\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/nethemba\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-07T14:28:33+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@nethemba\" \/>\n<meta name=\"twitter:label1\" content=\"Odhadovan\u00e1 doba \u010dten\u00ed\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minuty\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nethemba.com\\\/cs\\\/sluzby\\\/it-bezpecnostni-sluzby\\\/identifikace-a-hledani-kybernetickych-hrozeb\\\/\",\"url\":\"https:\\\/\\\/nethemba.com\\\/cs\\\/sluzby\\\/it-bezpecnostni-sluzby\\\/identifikace-a-hledani-kybernetickych-hrozeb\\\/\",\"name\":\"Identifikace a hled\u00e1n\u00ed kybernetick\u00fdch hrozeb - Nethemba\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nethemba.com\\\/de\\\/#website\"},\"datePublished\":\"2021-05-03T16:30:30+00:00\",\"dateModified\":\"2025-05-07T14:28:33+00:00\",\"description\":\"Proaktivn\u00ed prohled\u00e1v\u00e1n\u00ed koncov\u00fdch stanic, s\u00edt\u00ed, datab\u00e1z\u00ed s c\u00edlem odhalit podez\u0159el\u00e9 aktivity, jejich\u017e nebylo mo\u017en\u00e9 detekovat st\u00e1vaj\u00edc\u00edmi n\u00e1stroji.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nethemba.com\\\/cs\\\/sluzby\\\/it-bezpecnostni-sluzby\\\/identifikace-a-hledani-kybernetickych-hrozeb\\\/#breadcrumb\"},\"inLanguage\":\"cs\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nethemba.com\\\/cs\\\/sluzby\\\/it-bezpecnostni-sluzby\\\/identifikace-a-hledani-kybernetickych-hrozeb\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nethemba.com\\\/cs\\\/sluzby\\\/it-bezpecnostni-sluzby\\\/identifikace-a-hledani-kybernetickych-hrozeb\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nethemba.com\\\/cs\\\/home-new-2025\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Slu\u017eby\",\"item\":\"https:\\\/\\\/nethemba.com\\\/cs\\\/sluzby\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IT bezpe\u010dnostn\u00ed slu\u017eby\",\"item\":\"https:\\\/\\\/nethemba.com\\\/cs\\\/sluzby\\\/it-bezpecnostni-sluzby\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Identifikace a hled\u00e1n\u00ed kybernetick\u00fdch hrozeb\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nethemba.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/nethemba.com\\\/de\\\/\",\"name\":\"Nethemba\",\"description\":\"We care about your security\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nethemba.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"cs\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Identifikace a hled\u00e1n\u00ed kybernetick\u00fdch hrozeb - Nethemba","description":"Proaktivn\u00ed prohled\u00e1v\u00e1n\u00ed koncov\u00fdch stanic, s\u00edt\u00ed, datab\u00e1z\u00ed s c\u00edlem odhalit podez\u0159el\u00e9 aktivity, jejich\u017e nebylo mo\u017en\u00e9 detekovat st\u00e1vaj\u00edc\u00edmi n\u00e1stroji.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nethemba.com\/cs\/sluzby\/it-bezpecnostni-sluzby\/identifikace-a-hledani-kybernetickych-hrozeb\/","og_locale":"cs_CZ","og_type":"article","og_title":"Identifikace a hled\u00e1n\u00ed kybernetick\u00fdch hrozeb - Nethemba","og_description":"Proaktivn\u00ed prohled\u00e1v\u00e1n\u00ed koncov\u00fdch stanic, s\u00edt\u00ed, datab\u00e1z\u00ed s c\u00edlem odhalit podez\u0159el\u00e9 aktivity, jejich\u017e nebylo mo\u017en\u00e9 detekovat st\u00e1vaj\u00edc\u00edmi n\u00e1stroji.","og_url":"https:\/\/nethemba.com\/cs\/sluzby\/it-bezpecnostni-sluzby\/identifikace-a-hledani-kybernetickych-hrozeb\/","og_site_name":"Nethemba","article_publisher":"https:\/\/www.facebook.com\/nethemba","article_modified_time":"2025-05-07T14:28:33+00:00","twitter_card":"summary_large_image","twitter_site":"@nethemba","twitter_misc":{"Odhadovan\u00e1 doba \u010dten\u00ed":"3 minuty"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/nethemba.com\/cs\/sluzby\/it-bezpecnostni-sluzby\/identifikace-a-hledani-kybernetickych-hrozeb\/","url":"https:\/\/nethemba.com\/cs\/sluzby\/it-bezpecnostni-sluzby\/identifikace-a-hledani-kybernetickych-hrozeb\/","name":"Identifikace a hled\u00e1n\u00ed kybernetick\u00fdch hrozeb - Nethemba","isPartOf":{"@id":"https:\/\/nethemba.com\/de\/#website"},"datePublished":"2021-05-03T16:30:30+00:00","dateModified":"2025-05-07T14:28:33+00:00","description":"Proaktivn\u00ed prohled\u00e1v\u00e1n\u00ed koncov\u00fdch stanic, s\u00edt\u00ed, datab\u00e1z\u00ed s c\u00edlem odhalit podez\u0159el\u00e9 aktivity, jejich\u017e nebylo mo\u017en\u00e9 detekovat st\u00e1vaj\u00edc\u00edmi n\u00e1stroji.","breadcrumb":{"@id":"https:\/\/nethemba.com\/cs\/sluzby\/it-bezpecnostni-sluzby\/identifikace-a-hledani-kybernetickych-hrozeb\/#breadcrumb"},"inLanguage":"cs","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nethemba.com\/cs\/sluzby\/it-bezpecnostni-sluzby\/identifikace-a-hledani-kybernetickych-hrozeb\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/nethemba.com\/cs\/sluzby\/it-bezpecnostni-sluzby\/identifikace-a-hledani-kybernetickych-hrozeb\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nethemba.com\/cs\/home-new-2025\/"},{"@type":"ListItem","position":2,"name":"Slu\u017eby","item":"https:\/\/nethemba.com\/cs\/sluzby\/"},{"@type":"ListItem","position":3,"name":"IT bezpe\u010dnostn\u00ed slu\u017eby","item":"https:\/\/nethemba.com\/cs\/sluzby\/it-bezpecnostni-sluzby\/"},{"@type":"ListItem","position":4,"name":"Identifikace a hled\u00e1n\u00ed kybernetick\u00fdch hrozeb"}]},{"@type":"WebSite","@id":"https:\/\/nethemba.com\/de\/#website","url":"https:\/\/nethemba.com\/de\/","name":"Nethemba","description":"We care about your security","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nethemba.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"cs"}]}},"_links":{"self":[{"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/pages\/5681","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/comments?post=5681"}],"version-history":[{"count":1,"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/pages\/5681\/revisions"}],"predecessor-version":[{"id":8870,"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/pages\/5681\/revisions\/8870"}],"up":[{"embeddable":true,"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/pages\/464"}],"wp:attachment":[{"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/media?parent=5681"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}