{"id":1536,"date":"2015-04-01T21:20:44","date_gmt":"2015-04-01T21:20:44","guid":{"rendered":"http:\/\/nethemba.com\/sk\/?p=1536"},"modified":"2016-01-30T08:13:19","modified_gmt":"2016-01-30T08:13:19","slug":"co-nas-caka-v-it-bezpecnosti-v-roku-2015","status":"publish","type":"post","link":"https:\/\/nethemba.com\/sk\/co-nas-caka-v-it-bezpecnosti-v-roku-2015\/","title":{"rendered":"\u010co n\u00e1s \u010dak\u00e1 v IT bezpe\u010dnosti v roku 2015"},"content":{"rendered":"<p>Na za\u010diatku by som r\u00e1d podotkol, \u017ee k ak\u00fdmko\u013evek predpovediam som osobne dos\u0165 skeptick\u00fd a ned\u00f4ver\u010div\u00fd, tak\u017ee budem r\u00e1d, ke\u010f rovnako prezierav\u00fd postoj zaujmete aj k nasleduj\u00facemu \u010dl\u00e1nku.<\/p>\n<p><strong>1. &#8222;Divadlo&#8220; kyber vojny, ktor\u00e1 ohrozuje \u0161t\u00e1ty, bude pokra\u010dova\u0165<\/strong>.<\/p>\n<p>Hrozba &#8222;nebezpe\u010dn\u00fdch kybernetick\u00fdch&#8220; \u00fatokov bude v roku 2015 v\u00fdrazne medializovan\u00e1 a adekv\u00e1tne k tomu bud\u00fa zvy\u0161ovan\u00e9 rozpo\u010dty vl\u00e1d v krajin\u00e1ch EU\/USA na boj proti t\u00fdmto \u00fatokom.<\/p>\n<p>Hacky komer\u010dn\u00fdch spolo\u010dnost\u00ed (ako <a href=\"https:\/\/www.riskbasedsecurity.com\/2014\/12\/a-breakdown-and-analysis-of-the-december-2014-sony-hack\/\">Sony<\/a>) bud\u00fa aj napriek <a href=\"http:\/\/www.thedailybeast.com\/articles\/2014\/12\/24\/no-north-korea-didn-t-hack-sony.html\">nedostato\u010dn\u00fdm d\u00f4kazom<\/a> falo\u0161ne ozna\u010dovan\u00e9 za n\u00e1rodn\u00fa kyber teroristick\u00fa hrozbu a vhodn\u00fa z\u00e1mienku na \u010fal\u0161ie zvy\u0161ovanie &#8222;kyber rozpo\u010dtov&#8220; v\u0161etk\u00fdch agent\u00far chr\u00e1niacich &#8222;n\u00e1rodn\u00fa bezpe\u010dnos\u0165&#8220;. Je pravdepodobn\u00e9, \u017ee sa to bude zneu\u017e\u00edva\u0165 aj na politick\u00fd boj vo <a href=\"http:\/\/www.mediaite.com\/tv\/obama-imposes-economic-sanctions-on-north-korea-as-punishment-for-sony-hack\/\">forme embarga<\/a>.<\/p>\n<p><strong>2. N\u00e1rast Crypto \/ Dark marketov<\/strong>.<\/p>\n<p>Napriek tomu, \u017ee Silk Road Market 2.0 bol \u00faspe\u0161ne zhoden\u00fd FBI a Tor anonymiza\u010dn\u00e1 sie\u0165 v poslednej dobe utrpela nieko\u013eko v\u00e1\u017en\u00fdch probl\u00e9mov, &#8222;temn\u00e9&#8220; neregulovan\u00e9 markety s\u00fa jednozna\u010dne na vzostupe ako nikdy predt\u00fdm a st\u00e1vaj\u00fa sa \u010d\u00edm \u010falej t\u00fdm viac sofistikovan\u00e9 <a href=\"http:\/\/www.deepdotweb.com\/dark-net-market-comparison-chart\/\">(aktu\u00e1lne porovnanie tu<\/a>), napr\u00edklad <a href=\"http:\/\/www.wired.com\/2014\/11\/darkcoin-and-online-drug-dealers\/\">za\u010d\u00ednaj\u00fa pou\u017e\u00edva\u0165<\/a> nevystopovate\u013en\u00fa kryptomenu <a href=\"https:\/\/www.darkcoin.io\/\">darkcoin<\/a>.<\/p>\n<p>Dark markety za\u010d\u00ednaj\u00fa by\u0165 atrakt\u00edvne nielen pre drogov\u00fdch d\u00edlerov, ale aj pre \u013eud\u00ed obchoduj\u00facich s ukradnut\u00fdmi kreditn\u00fdmi kartami, crimeware-om (exploit kity, malware apod) a bohu\u017eia\u013e aj pre norm\u00e1lnych \u013eud\u00ed, ktor\u00ed do tohto neregulovan\u00e9ho slobodn\u00e9ho sveta odch\u00e1dzaj\u00fa pod tiahou nespo\u010detn\u00e9ho mno\u017estva \u0161t\u00e1tnych regul\u00e1ci\u00ed a vysok\u00e9ho da\u0148ov\u00e9ho za\u0165a\u017eenia.<\/p>\n<p>Ta\u017ek\u00e1 vystopovate\u013enos\u0165 zverej\u0148ovan\u00fdch inform\u00e1ci\u00ed \u010di transakci\u00ed bude vyu\u017e\u00edvan\u00e1 aj na dobr\u00e9 d\u00f4vody &#8211; whistle-bloweri m\u00f4\u017eu na\u010falej bezpe\u010dne zverej\u0148ova\u0165 nov\u00e9 citliv\u00e9 inform\u00e1cie o zneu\u017e\u00edvan\u00ed pr\u00e1vomoc\u00ed verejn\u00fdch \u010dinite\u013eov \u010di s\u00fakromn\u00fdch korpor\u00e1ci\u00ed, podobne ich bude mo\u017en\u00e9 aj (pseudo)anonymne podporova\u0165 (napr\u00edklad na <a href=\"http:\/\/www.ibtimes.co.uk\/edward-snowdens-legal-defence-fund-accepts-bitcoin-donations-1481522\">nevyhnutn\u00fa pr\u00e1vnu ochranu<\/a>).<\/p>\n<p>S\u00fadne rozhodnutia s Rossom Williamom Ulbrichtom a Blakeom Benthallom (prev\u00e1dzkovatelia Silk Road 1.0 a 2.0 kryptomarketov) bud\u00fa k\u013e\u00fa\u010dov\u00e9 pre Internet v 21.storo\u010d\u00ed a jeho \u010fal\u0161\u00ed v\u00fdvoj v ot\u00e1zkach slobody.<\/p>\n<p><strong>3. Nov\u00e9 objavuj\u00face sa zero-day exploit markety, viac sofistikovan\u00e9 a cielen\u00e9 exploity.<\/strong><\/p>\n<p>Prim\u00e1rne kv\u00f4li potreb\u00e1m \u0161t\u00e1tov kontrolova\u0165 a monitorova\u0165 ich ob\u010danov, bude narasta\u0165 <a href=\"https:\/\/prezi.com\/hgiy1j955pdj\/governments-fight-against-cyber-terrorism-vs-finfisher-0-day-economy\/\">trhov\u00fd dopyt po komer\u010dn\u00fdch zero-day<\/a> exploitoch a exploit-packoch (u\u017e teraz pred\u00e1van\u00fdmi spolo\u010dnos\u0165ami <a href=\"https:\/\/www.gammagroup.com\/Default.aspx\">Gamma International<\/a> alebo <a href=\"http:\/\/www.hackingteam.it\/\">Hacking Team<\/a>) ako aj komer\u010dn\u00fdch n\u00e1strojov (ako napr\u00edklad <a href=\"http:\/\/www.scribd.com\/doc\/237697259\/SkyLock-Product-Description-Locate-Track-Manipulate-January-2013\">Skylock<\/a>) na <a href=\"http:\/\/www.washingtonpost.com\/business\/technology\/for-sale-systems-that-can-secretly-track-where-cellphone-users-go-around-the-globe\/2014\/08\/24\/f0700e8a-f003-11e3-bf76-447a5df6411f_story.html\">kompletn\u00e9 trackovanie a \u0161pehovanie<\/a> \u013eud\u00ed na z\u00e1klade polohy ich mobiln\u00fdch telef\u00f3nov.<\/p>\n<p>Tieto exploity a exploity packy bud\u00fa viac sofistikovan\u00e9, komplexn\u00e9 a bud\u00fa adresova\u0165 st\u00e1le viac pou\u017e\u00edvan\u00fdch platforiem a aplik\u00e1ci\u00ed.<\/p>\n<p><strong>4. Z\u00e1ber potenci\u00e1ln\u00fdch bezpe\u010dnostn\u00fdch \u00fatokov sa bude roz\u0161irova\u0165 na nov\u00e9 zariadenia a \u00fatoky bud\u00fa viac adresn\u00e9<\/strong>.<\/p>\n<p>Cory Doctorow predpovedal <a href=\"https:\/\/www.youtube.com\/watch?v=yYqkU1y0AYc\">vojnu be\u017en\u00fdm univerz\u00e1lnym po\u010d\u00edta\u010dom<\/a>. V bud\u00facnosti budeme ma\u0165 viac a viac \u0161pecializovan\u00fdch po\u010d\u00edta\u010dov (inteligentn\u00e9 hodinky, inteligentn\u00e9 auta, \u010di <a href=\"https:\/\/www.youtube.com\/watch?v=P0Wbn0UeZTo\">toalety<\/a> a samozrejme v\u0161etky NFC zariadenia ako \u010dipov\u00e9 karty, \u010di r\u00f4zne pe\u0148a\u017eenky).<\/p>\n<p>V\u0161etky tieto zariadenia bud\u00fa predstavova\u0165 potenci\u00e1lne ciele mno\u017estva hackerov \u010dastokr\u00e1t preto, lebo bud\u00fa pou\u017e\u00edva\u0165 nov\u00e9 OS, \u010di neotestovan\u00e9 aplik\u00e1cie. Zrejme najv\u00e4\u010d\u0161ie mno\u017estvo \u00fatokov bude veden\u00fdch na Android a iOS platformu, ktor\u00e9 bud\u00fa majoritn\u00e9.<\/p>\n<p><strong>5. Mobiln\u00e9 aplik\u00e1cie sa stan\u00fa cie\u013eom dedikovan\u00fdch \u00fatokov.<\/strong><\/p>\n<p>Bezpe\u010dnos\u0165 mobiln\u00fdch aplik\u00e1ci\u00ed bude kritick\u00e1 ako nikdy predt\u00fdm.<\/p>\n<p>Mlad\u00ed \u013eudia pou\u017e\u00edvaj\u00fa viac mobiln\u00e9 zariadenia ako svoje PC a to sa t\u00fdka aj mno\u017estvo pou\u017e\u00edvan\u00fdch aplik\u00e1ci\u00ed. V\u00e4\u010d\u0161ina \u013eud\u00ed svoje mobiln\u00e9 zariadenia nijako ne\u0161ifruje, neaktualizuje a aplik\u00e1cie in\u0161taluje s pln\u00fdmi mo\u017en\u00fdmi opr\u00e1vneniami (len m\u00e1lokto pou\u017e\u00edva <a href=\"http:\/\/repo.xposed.info\/module\/biz.bokhorst.xprivacy\">XPrivacy<\/a>).<\/p>\n<p>Komer\u010dn\u00e9 exploit packy bud\u00fa viac zacielen\u00e9 na mobiln\u00e9 platformy a aplik\u00e1cie (FinSpy Mobile <a href=\"https:\/\/netzpolitik.org\/wp-upload\/Release-Notes-FinSpy-Mobile-4.51.pdf\">dok\u00e1\u017ee infiltrova\u0165 v\u00e4\u010d\u0161inu mobiln\u00fdch platforiem<\/a>).<\/p>\n<p>Ohrozen\u00e9 bud\u00fa nielen mobiln\u00e9 aplik\u00e1cie, ale aj <a href=\"https:\/\/www.nethemba.com\/bezpecnostny-audit-smartphone\">webove slu\u017eby nimi vyu\u017e\u00edvan\u00e9<\/a>, ktor\u00e9 predstavuj\u00fa kritick\u00fd bod komunik\u00e1cie.<\/p>\n<p><strong>6. \u0160ifrovan\u00e1 komunik\u00e1cia sa stane \u0161tandard.<\/strong><\/p>\n<p>St\u00e1le viac a viac \u013eud\u00ed pou\u017e\u00edva bezpe\u010dn\u00fa (end-to-end \u0161ifrovan\u00fa) komunik\u00e1ciu pre svoje hovory a textov\u00e9 spr\u00e1vy.<\/p>\n<p>Len v mojom okol\u00ed (uzn\u00e1vam, \u017ee nie som typick\u00e1 vzorka) viac ako sto \u013eud\u00ed za posledn\u00fd rok za\u010dali pou\u017e\u00edvat <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=org.thoughtcrime.redphone&amp;hl=sk\">Redphone<\/a>, <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=org.thoughtcrime.securesms&amp;hl=sk\">TextSecure<\/a> alebo <a href=\"https:\/\/threema.ch\/en\">Threema<\/a> aplik\u00e1cie na bezpe\u010dn\u00fa komunik\u00e1ciu. Ve\u013ea \u013eud\u00ed s Gmail schr\u00e1nkou za\u010dalo pou\u017e\u00edva\u0165<a href=\"https:\/\/www.mailvelope.com\/\">mailvelope<\/a> a \u0161ifrovanie vyu\u017e\u00edtim PGP.<\/p>\n<p>V\u010faka whistleblowerom a hrozbe neust\u00e1le zvy\u0161uj\u00faceho sa glob\u00e1lneho \u0161pehovania, je pravdepodobn\u00e9, \u017ee tento trend bude \u00faspe\u0161ne pokra\u010dova\u0165 aj v bud\u00facnosti.<\/p>\n<p>Pokusy tento trend zastavi\u0165 (<a href=\"http:\/\/ekonomika.sme.sk\/c\/7171055\/sis-chce-spehovat-vsetko-nas-internet-banking-aj-e-maily.html\">SIS chce \u0161pehova\u0165 v\u0161etko, n\u00e1\u0161 internet banking aj emaily<\/a>) vyznej\u00fa ako ve\u013emi zl\u00fd vtip.<\/p>\n<p><strong>7. PKI st\u00e1le neuspeje. Dvojfaktorov\u00e1 autentifik\u00e1cia ale \u00e1no.<\/strong><\/p>\n<p>PKI rie\u0161enia pod tlakom s t\u00fdm s\u00favisiacej byrokracie sa ani tento rok v\u00fdrazne nepresadia. Dvojfaktorov\u00e1 autentifik\u00e1cia sa stane ale \u0161tandard pre v\u0161etky soci\u00e1lne siete a kritick\u00e9 aplik\u00e1cie.<\/p>\n<p>Trh bude preferova\u0165 lacn\u00e9 (ale dostato\u010dne bezpe\u010dn\u00e9) rie\u0161enia vo forme OTP kalkula\u010diek na smartf\u00f3noch (napr\u00edklad <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.google.android.apps.authenticator2&amp;hl=sk\">Google Authenticator<\/a>).<\/p>\n<p>Hardv\u00e9rov\u00e9 OTP zostan\u00fa \u0161tandardom v korpor\u00e1tnej sf\u00e9re (bud\u00fa ale preferovan\u00e9 bezpe\u010dnostn\u00e9 rie\u0161enia, ktor\u00e9 neboli pod <a href=\"http:\/\/www.reuters.com\/article\/2013\/12\/20\/us-usa-security-rsa-idUSBRE9BJ1C220131220\">tlakom vl\u00e1dnych agent\u00far<\/a>).<\/p>\n<p><strong>8. Otvorenos\u0165 (otvoren\u00e9 \u0161ifry, protokoly, implement\u00e1cie) bude e\u0161te dole\u017eitej\u0161ia.<\/strong><\/p>\n<p>V \u010dase glob\u00e1lneho \u0161pehovania a monitorovania, propriet\u00e1rne implement\u00e1cie vyvinut\u00e9 konkr\u00e9tnou firmou s\u00fa n\u00e1chylnej\u0161ie na zavedenie backdooru (zadn\u00fdch vr\u00e1tok) ako decentralizovan\u00e9 opensource rie\u0161enia. Tlak je veden\u00fd zo strany \u0161t\u00e1tnych agent\u00far (ned\u00e1vny <a href=\"http:\/\/www.reuters.com\/article\/2014\/03\/31\/us-usa-security-nsa-rsa-idUSBREA2U0TY20140331\">pr\u00edpad NSA vs. RSA Security<\/a>, n\u00e1vrh z\u00e1kona <a href=\"https:\/\/www.eff.org\/deeplinks\/2013\/05\/caleatwo\">CALEA II vynucuj\u00faci zavies\u0165 &#8222;zadn\u00e9 vr\u00e1tka&#8220;<\/a> do ak\u00e9hoko\u013evek komunika\u010dn\u00e9ho softv\u00e9ru pon\u00fakan\u00e9ho na \u00fazemi USA, slovensk\u00e1 <a href=\"http:\/\/ekonomika.sme.sk\/c\/7171055\/sis-chce-spehovat-vsetko-nas-internet-banking-aj-e-maily.html\">SIS samozrejme nezaost\u00e1va<\/a>).<\/p>\n<p>Samozrejme otvorenos\u0165 neznamen\u00e1 bezprostredne automaticky vy\u0161\u0161iu bezpe\u010dnos\u0165. Na to je potrebn\u00e1 verejn\u00e1 kontrola \/ vykonanie detailn\u00e9ho auditu, ktor\u00fd re\u00e1lne over\u00ed bezpe\u010dnos\u0165 dan\u00e9ho otvoren\u00e9ho rie\u0161enia.<\/p>\n<p>Ak to vn\u00edmate ako v\u00e1\u017enu hrozbu pre Va\u0161e s\u00fakromie, odpor\u00fa\u010dame V\u00e1m opera\u010dn\u00fd syst\u00e9m a pou\u017e\u00edvan\u00e9 aplik\u00e1cie zmigrova\u0165 na tak\u00e9, ktor\u00e9 s\u00fa otvoren\u00e9, bezpe\u010dn\u00e9 a overen\u00e9 &#8211; <a href=\"http:\/\/prism-break.org\/en\/\">viac inform\u00e1cii tu<\/a>.<\/p>\n<p><strong>9. &#8222;Staronov\u00e9&#8220; kritick\u00e9 zranite\u013enosti vypl\u00fdvaj\u00face z pou\u017e\u00edvania star\u00e9ho zdrojov\u00e9ho k\u00f3du.<\/strong><\/p>\n<p>Star\u00fd zdrojov\u00fd k\u00f3d (st\u00e1le pou\u017e\u00edvan\u00fd napr\u00edklad v jadre, \u010di ovl\u00e1da\u010doch opera\u010dn\u00fdch syst\u00e9mov, v r\u00f4znych programovac\u00edch jazykoch, \u010di r\u00f4znych slu\u017eb\u00e1ch) bude aj na\u010falej zdrojom nov\u00fdch kritick\u00fdch zranite\u013enost\u00ed odhalen\u00fdch v roku 2015.<\/p>\n<p>Za rok 2014 stoja za zmienku kritick\u00e9 zranite\u013enosti ako <a href=\"http:\/\/heartbleed.com\/\">Heartbleed bug<\/a>, <a href=\"http:\/\/en.wikipedia.org\/wiki\/Shellshock_%28software_bug%29\">Shellsock<\/a>, \u010di ned\u00e1vno zverejnen\u00fd <a href=\"http:\/\/events.ccc.de\/congress\/2014\/Fahrplan\/system\/attachments\/2542\/original\/the-perl-jam-netanel-rubin-31c3.pdf\">Perl Jam<\/a>.<\/p>\n<p><strong>10. Nov\u00e9 regul\u00e1cie a z\u00e1kony v oblasti kyberzlo\u010dinu a digit\u00e1lneho s\u00fakromia.<\/strong><\/p>\n<p>Aj napriek tomu, \u017ee trvalo ve\u013ea rokov, k\u00fdm <a href=\"http:\/\/www.etrend.sk\/technologie\/eu-musi-zrusit-kontroverzny-zber-dat-o-telefonovani.html\">Eur\u00f3psky s\u00fadny dvor vyhl\u00e1sil za neplatn\u00fd kontroverzn\u00fd<\/a> &#8222;<a href=\"http:\/\/en.wikipedia.org\/wiki\/Telecommunications_data_retention\">data retention z\u00e1kon<\/a>&#8222;, lebo predstavoval mimoriadne z\u00e1va\u017en\u00fd a rozsiahly z\u00e1sah do s\u00fakromia a z\u00e1kladn\u00fdch pr\u00e1v ob\u010danov, \u010dakaj\u00fa n\u00e1s nov\u00e9 regul\u00e1cie a z\u00e1kony, ktor\u00fdm sa nevyhneme a ktor\u00e9 maj\u00fa by\u0165 samozrejme &#8222;lep\u0161ie&#8220;.<\/p>\n<p>Za zmienku stoj\u00ed nov\u00fd <a href=\"http:\/\/www.kybernetickyzakon.cz\/\">\u010cesk\u00fd kybernetick\u00fd z\u00e1kon<\/a>, <a href=\"http:\/\/www.cookielaw.org\/the-cookie-law\/\">E\u00da &#8222;cookie&#8220; z\u00e1kon<\/a>, &#8222;<a href=\"http:\/\/en.wikipedia.org\/wiki\/Right_to_be_forgotten\">pr\u00e1vo by\u0165 zabudnut\u00fd<\/a>&#8220; a in\u00e9.<\/p>\n<p>Uveden\u00e9 z\u00e1kony vyzeraj\u00fa na prv\u00fd poh\u013ead vysoko verejne prospe\u0161n\u00e9. Regul\u00e1tori si bohu\u017eia\u013e ale m\u00e1lokedy uvedomuj\u00fa re\u00e1lny negat\u00edvny ekonomick\u00fd dopad na spolo\u010dnosti vo\u010di ktor\u00fdm tieto z\u00e1kony maj\u00fa by\u0165 vynucovan\u00e9. V niektor\u00fdch situ\u00e1ciach to kon\u010d\u00ed odchodom danej korpor\u00e1cie z trhu (napr\u00edklad odchod <a href=\"http:\/\/www.wired.com\/2014\/12\/google-news-shutdown-spain-empty-victory-publishers-\">Google News zo \u0161panielskeho trhu<\/a>).<\/p>\n<p>Moje vyjadrenie k <a href=\"https:\/\/www.nethemba.com\/blog\/-\/blogs\/eu-cookie-zakon-alebo-vynucovana-ochrana-sukromia\">EU &#8222;cookie&#8220; z\u00e1konu<\/a> a <a href=\"https:\/\/www.nethemba.com\/blog\/-\/blogs\/infotrendy-2013-alebo-pohlad-na-it-bezpecnost-a-digitalne-sukromie-ocami-ekonomickeho-pragmatika\">poh\u013ead na IT bezpe\u010dnos\u0165 o\u010dami ekonomick\u00e9ho pragmatika<\/a>.<\/p>\n<p>Samozrejme existenciu ak\u00fdchko\u013evek z\u00e1konov vynucuj\u00facich bezpe\u010dnos\u0165 a digit\u00e1lne s\u00fakromie ocenia v\u0161etky IT bezpe\u010dnostn\u00e9 firmy stojace za vylobbovan\u00edm t\u00fdchto z\u00e1konov, ked\u017ee v\u010faka nim bud\u00fa ma\u0165 garantovan\u00fd pr\u00edsun biznisu.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Na za\u010diatku by som r\u00e1d podotkol, \u017ee k ak\u00fdmko\u013evek predpovediam som osobne dos\u0165 skeptick\u00fd a ned\u00f4ver\u010div\u00fd, tak\u017ee budem r\u00e1d, ke\u010f rovnako prezierav\u00fd postoj zaujmete aj k nasleduj\u00facemu \u010dl\u00e1nku. 1. &#8222;Divadlo&#8220; kyber vojny, ktor\u00e1 ohrozuje \u0161t\u00e1ty, bude pokra\u010dova\u0165. Hrozba &#8222;nebezpe\u010dn\u00fdch kybernetick\u00fdch&#8220; \u00fatokov bude v roku 2015 v\u00fdrazne medializovan\u00e1 a adekv\u00e1tne k tomu bud\u00fa zvy\u0161ovan\u00e9 rozpo\u010dty vl\u00e1d [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[13],"tags":[],"class_list":["post-1536","post","type-post","status-publish","format-standard","hentry","category-uncategorized-sk"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u010co n\u00e1s \u010dak\u00e1 v IT bezpe\u010dnosti v roku 2015 - Nethemba<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nethemba.com\/sk\/co-nas-caka-v-it-bezpecnosti-v-roku-2015\/\" \/>\n<meta property=\"og:locale\" content=\"sk_SK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u010co n\u00e1s \u010dak\u00e1 v IT bezpe\u010dnosti v roku 2015 - Nethemba\" \/>\n<meta property=\"og:description\" content=\"Na za\u010diatku by som r\u00e1d podotkol, \u017ee k ak\u00fdmko\u013evek predpovediam som osobne dos\u0165 skeptick\u00fd a ned\u00f4ver\u010div\u00fd, tak\u017ee budem r\u00e1d, ke\u010f rovnako prezierav\u00fd postoj zaujmete aj k nasleduj\u00facemu \u010dl\u00e1nku. 1. &#8222;Divadlo&#8220; kyber vojny, ktor\u00e1 ohrozuje \u0161t\u00e1ty, bude pokra\u010dova\u0165. Hrozba &#8222;nebezpe\u010dn\u00fdch kybernetick\u00fdch&#8220; \u00fatokov bude v roku 2015 v\u00fdrazne medializovan\u00e1 a adekv\u00e1tne k tomu bud\u00fa zvy\u0161ovan\u00e9 rozpo\u010dty vl\u00e1d [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nethemba.com\/sk\/co-nas-caka-v-it-bezpecnosti-v-roku-2015\/\" \/>\n<meta property=\"og:site_name\" content=\"Nethemba\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/nethemba\" \/>\n<meta property=\"article:published_time\" content=\"2015-04-01T21:20:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-01-30T08:13:19+00:00\" \/>\n<meta name=\"author\" content=\"Pavol Lupt\u00e1k\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@nethemba\" \/>\n<meta name=\"twitter:site\" content=\"@nethemba\" \/>\n<meta name=\"twitter:label1\" content=\"Autor\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pavol Lupt\u00e1k\" \/>\n\t<meta name=\"twitter:label2\" content=\"Predpokladan\u00fd \u010das \u010d\u00edtania\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 min\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nethemba.com\\\/sk\\\/co-nas-caka-v-it-bezpecnosti-v-roku-2015\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nethemba.com\\\/sk\\\/co-nas-caka-v-it-bezpecnosti-v-roku-2015\\\/\"},\"author\":{\"name\":\"Pavol Lupt\u00e1k\",\"@id\":\"https:\\\/\\\/nethemba.com\\\/de\\\/#\\\/schema\\\/person\\\/5f4ba68c8e1a2013d30e0804245b8234\"},\"headline\":\"\u010co n\u00e1s \u010dak\u00e1 v IT bezpe\u010dnosti v roku 2015\",\"datePublished\":\"2015-04-01T21:20:44+00:00\",\"dateModified\":\"2016-01-30T08:13:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nethemba.com\\\/sk\\\/co-nas-caka-v-it-bezpecnosti-v-roku-2015\\\/\"},\"wordCount\":1398,\"commentCount\":0,\"articleSection\":[\"Uncategorized @sk\"],\"inLanguage\":\"sk-SK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nethemba.com\\\/sk\\\/co-nas-caka-v-it-bezpecnosti-v-roku-2015\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nethemba.com\\\/sk\\\/co-nas-caka-v-it-bezpecnosti-v-roku-2015\\\/\",\"url\":\"https:\\\/\\\/nethemba.com\\\/sk\\\/co-nas-caka-v-it-bezpecnosti-v-roku-2015\\\/\",\"name\":\"\u010co n\u00e1s \u010dak\u00e1 v IT bezpe\u010dnosti v roku 2015 - Nethemba\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nethemba.com\\\/de\\\/#website\"},\"datePublished\":\"2015-04-01T21:20:44+00:00\",\"dateModified\":\"2016-01-30T08:13:19+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/nethemba.com\\\/de\\\/#\\\/schema\\\/person\\\/5f4ba68c8e1a2013d30e0804245b8234\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nethemba.com\\\/sk\\\/co-nas-caka-v-it-bezpecnosti-v-roku-2015\\\/#breadcrumb\"},\"inLanguage\":\"sk-SK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nethemba.com\\\/sk\\\/co-nas-caka-v-it-bezpecnosti-v-roku-2015\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nethemba.com\\\/sk\\\/co-nas-caka-v-it-bezpecnosti-v-roku-2015\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nethemba.com\\\/sk\\\/domov\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u010co n\u00e1s \u010dak\u00e1 v IT bezpe\u010dnosti v roku 2015\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nethemba.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/nethemba.com\\\/de\\\/\",\"name\":\"Nethemba\",\"description\":\"We care about your security\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nethemba.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sk-SK\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nethemba.com\\\/de\\\/#\\\/schema\\\/person\\\/5f4ba68c8e1a2013d30e0804245b8234\",\"name\":\"Pavol Lupt\u00e1k\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/978b23022518d076eaa243b375d2e0272af4f00dd502ce79cc357276d9bc2495?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/978b23022518d076eaa243b375d2e0272af4f00dd502ce79cc357276d9bc2495?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/978b23022518d076eaa243b375d2e0272af4f00dd502ce79cc357276d9bc2495?s=96&d=mm&r=g\",\"caption\":\"Pavol Lupt\u00e1k\"},\"sameAs\":[\"https:\\\/\\\/www.nethemba.com\\\/\"],\"url\":\"https:\\\/\\\/nethemba.com\\\/sk\\\/author\\\/nethemba-admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u010co n\u00e1s \u010dak\u00e1 v IT bezpe\u010dnosti v roku 2015 - Nethemba","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nethemba.com\/sk\/co-nas-caka-v-it-bezpecnosti-v-roku-2015\/","og_locale":"sk_SK","og_type":"article","og_title":"\u010co n\u00e1s \u010dak\u00e1 v IT bezpe\u010dnosti v roku 2015 - Nethemba","og_description":"Na za\u010diatku by som r\u00e1d podotkol, \u017ee k ak\u00fdmko\u013evek predpovediam som osobne dos\u0165 skeptick\u00fd a ned\u00f4ver\u010div\u00fd, tak\u017ee budem r\u00e1d, ke\u010f rovnako prezierav\u00fd postoj zaujmete aj k nasleduj\u00facemu \u010dl\u00e1nku. 1. &#8222;Divadlo&#8220; kyber vojny, ktor\u00e1 ohrozuje \u0161t\u00e1ty, bude pokra\u010dova\u0165. Hrozba &#8222;nebezpe\u010dn\u00fdch kybernetick\u00fdch&#8220; \u00fatokov bude v roku 2015 v\u00fdrazne medializovan\u00e1 a adekv\u00e1tne k tomu bud\u00fa zvy\u0161ovan\u00e9 rozpo\u010dty vl\u00e1d [&hellip;]","og_url":"https:\/\/nethemba.com\/sk\/co-nas-caka-v-it-bezpecnosti-v-roku-2015\/","og_site_name":"Nethemba","article_publisher":"https:\/\/www.facebook.com\/nethemba","article_published_time":"2015-04-01T21:20:44+00:00","article_modified_time":"2016-01-30T08:13:19+00:00","author":"Pavol Lupt\u00e1k","twitter_card":"summary_large_image","twitter_creator":"@nethemba","twitter_site":"@nethemba","twitter_misc":{"Autor":"Pavol Lupt\u00e1k","Predpokladan\u00fd \u010das \u010d\u00edtania":"7 min\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nethemba.com\/sk\/co-nas-caka-v-it-bezpecnosti-v-roku-2015\/#article","isPartOf":{"@id":"https:\/\/nethemba.com\/sk\/co-nas-caka-v-it-bezpecnosti-v-roku-2015\/"},"author":{"name":"Pavol Lupt\u00e1k","@id":"https:\/\/nethemba.com\/de\/#\/schema\/person\/5f4ba68c8e1a2013d30e0804245b8234"},"headline":"\u010co n\u00e1s \u010dak\u00e1 v IT bezpe\u010dnosti v roku 2015","datePublished":"2015-04-01T21:20:44+00:00","dateModified":"2016-01-30T08:13:19+00:00","mainEntityOfPage":{"@id":"https:\/\/nethemba.com\/sk\/co-nas-caka-v-it-bezpecnosti-v-roku-2015\/"},"wordCount":1398,"commentCount":0,"articleSection":["Uncategorized @sk"],"inLanguage":"sk-SK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nethemba.com\/sk\/co-nas-caka-v-it-bezpecnosti-v-roku-2015\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nethemba.com\/sk\/co-nas-caka-v-it-bezpecnosti-v-roku-2015\/","url":"https:\/\/nethemba.com\/sk\/co-nas-caka-v-it-bezpecnosti-v-roku-2015\/","name":"\u010co n\u00e1s \u010dak\u00e1 v IT bezpe\u010dnosti v roku 2015 - Nethemba","isPartOf":{"@id":"https:\/\/nethemba.com\/de\/#website"},"datePublished":"2015-04-01T21:20:44+00:00","dateModified":"2016-01-30T08:13:19+00:00","author":{"@id":"https:\/\/nethemba.com\/de\/#\/schema\/person\/5f4ba68c8e1a2013d30e0804245b8234"},"breadcrumb":{"@id":"https:\/\/nethemba.com\/sk\/co-nas-caka-v-it-bezpecnosti-v-roku-2015\/#breadcrumb"},"inLanguage":"sk-SK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nethemba.com\/sk\/co-nas-caka-v-it-bezpecnosti-v-roku-2015\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/nethemba.com\/sk\/co-nas-caka-v-it-bezpecnosti-v-roku-2015\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nethemba.com\/sk\/domov\/"},{"@type":"ListItem","position":2,"name":"\u010co n\u00e1s \u010dak\u00e1 v IT bezpe\u010dnosti v roku 2015"}]},{"@type":"WebSite","@id":"https:\/\/nethemba.com\/de\/#website","url":"https:\/\/nethemba.com\/de\/","name":"Nethemba","description":"We care about your security","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nethemba.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sk-SK"},{"@type":"Person","@id":"https:\/\/nethemba.com\/de\/#\/schema\/person\/5f4ba68c8e1a2013d30e0804245b8234","name":"Pavol Lupt\u00e1k","image":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/secure.gravatar.com\/avatar\/978b23022518d076eaa243b375d2e0272af4f00dd502ce79cc357276d9bc2495?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/978b23022518d076eaa243b375d2e0272af4f00dd502ce79cc357276d9bc2495?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/978b23022518d076eaa243b375d2e0272af4f00dd502ce79cc357276d9bc2495?s=96&d=mm&r=g","caption":"Pavol Lupt\u00e1k"},"sameAs":["https:\/\/www.nethemba.com\/"],"url":"https:\/\/nethemba.com\/sk\/author\/nethemba-admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nethemba.com\/sk\/wp-json\/wp\/v2\/posts\/1536","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nethemba.com\/sk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nethemba.com\/sk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nethemba.com\/sk\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/nethemba.com\/sk\/wp-json\/wp\/v2\/comments?post=1536"}],"version-history":[{"count":0,"href":"https:\/\/nethemba.com\/sk\/wp-json\/wp\/v2\/posts\/1536\/revisions"}],"wp:attachment":[{"href":"https:\/\/nethemba.com\/sk\/wp-json\/wp\/v2\/media?parent=1536"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nethemba.com\/sk\/wp-json\/wp\/v2\/categories?post=1536"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nethemba.com\/sk\/wp-json\/wp\/v2\/tags?post=1536"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}