{"id":52607,"date":"2023-05-18T06:01:00","date_gmt":"2023-05-18T05:01:00","guid":{"rendered":"https:\/\/www.soitron.com\/?p=52607"},"modified":"2023-12-21T14:53:43","modified_gmt":"2023-12-21T13:53:43","slug":"aby-se-ot-sit-nestala-zranitelnou","status":"publish","type":"post","link":"https:\/\/new.soitron.com\/cs\/aby-se-ot-sit-nestala-zranitelnou\/","title":{"rendered":"Aby se OT s\u00ed\u0165 nestala zranitelnou"},"content":{"rendered":"\n<p><strong>Zabezpe\u010den\u00ed pr\u016fmyslov\u00fdch s\u00edt\u00ed je v\u00a0sou\u010dasn\u00e9 dob\u011b pro firmy z\u00e1sadn\u00edm t\u00e9matem, a proto mu v\u011bnuj\u00ed v\u00edce pozornosti. Dob\u0159e v\u011bd\u00ed, \u017ee kybernetick\u00e9 \u00fatoky na pr\u016fmyslov\u00e9 technologie (OT, n\u011bkdy t\u00e9\u017e ICS) jsou st\u00e1le \u010dast\u011bj\u0161\u00ed a sofistikovan\u011bj\u0161\u00ed, co\u017e zvy\u0161uje nejen riziko napadnut\u00ed a ztr\u00e1ty dat, ale p\u0159edev\u0161\u00edm v\u00fdpadek ve v\u00fdrob\u011b, kter\u00fd m\u016f\u017ee spole\u010dnosti st\u00e1t i des\u00edtky milion\u016f korun.<\/strong><\/p>\n\n\n\n<p>V minulosti byly OT prim\u00e1rn\u011b zam\u011b\u0159eny na \u0159\u00edzen\u00ed a automatizaci pr\u016fmyslov\u00fdch technologi\u00ed a proces\u016f. Syst\u00e9my byly navr\u017eeny pro zpracov\u00e1n\u00ed velk\u00e9ho mno\u017estv\u00ed dat v re\u00e1ln\u00e9m \u010dase a d\u016fraz se kladl p\u0159edev\u0161\u00edm na to, aby byly spolehliv\u00e9 a odoln\u00e9 v\u016f\u010di poruch\u00e1m. Proto je st\u00e1le d\u016fle\u017eit\u011bj\u0161\u00ed integrovat OT s IT a vytvo\u0159it tak bezpe\u010dn\u00e9 propojen\u00ed mezi ob\u011bma syst\u00e9my. To pr\u016fmyslov\u00fdm firm\u00e1m umo\u017e\u0148uje l\u00e9pe \u0159\u00eddit sv\u00e9 procesy a zlep\u0161it produktivitu.<\/p>\n\n\n\n<p>Modern\u00ed OT mus\u00ed b\u00fdt schopny \u0159\u00eddit a chr\u00e1nit pr\u016fmyslov\u00e9 syst\u00e9my v re\u00e1ln\u00e9m \u010dase a z\u00e1rove\u0148 b\u00fdt odoln\u00e9 proti kybernetick\u00fdm hrozb\u00e1m. Proto je st\u00e1le d\u016fle\u017eit\u011bj\u0161\u00ed integrovat OT s IT a vytvo\u0159it tak bezpe\u010dn\u00e9 propojen\u00ed mezi ob\u011bma syst\u00e9my. To pr\u016fmyslov\u00fdm firm\u00e1m umo\u017e\u0148uje l\u00e9pe \u0159\u00eddit sv\u00e9 procesy a zlep\u0161it produktivitu. A\u010dkoliv to zn\u00ed jako poh\u00e1dka a f\u00faze t\u011bchto dvou sv\u011bt\u016f n\u00e1m p\u0159in\u00e1\u0161\u00ed jen sam\u00e1 pozitiva, tak je t\u0159eba dodat, \u017ee f\u00faz\u00ed \u201eIT sv\u011bta\u201c do \u201eOT sv\u011bta\u201c poodkr\u00fdv\u00e1me problematiku bezpe\u010dnosti z&nbsp;pohledu standardizace a mo\u017en\u00fdch plo\u0161n\u00fdch \u00fatok\u016f. B\u011b\u017en\u00e9 zranitelnosti OT sv\u011bta, kter\u00e9 jsou tu s&nbsp;n\u00e1mi od v\u011bku v\u011bk\u016f, se ve velk\u00e9m tak \u010dasto nezneu\u017e\u00edvaly, jako dnes. Propojen\u00edm obou sv\u011bt\u016f vznik\u00e1 nov\u00fd vektor \u00fatoku, kdy p\u0159es nezabezpe\u010denou IT infrastrukturu m\u016f\u017eeme napadnout zranitelnosti ji\u017e zmi\u0148ovan\u00e9ho OT sv\u011bta a proto je natolik nutn\u00e9, se pr\u016fmyslovou kybernetickou bezpe\u010dnost\u00ed o to v\u00edce zab\u00fdvat.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Aktu\u00e1lnost Purdue modelu<\/h2>\n\n\n\n<p>U\u017e v\u00a0roce 1990 byl v\u00a0USA vyvinut tzv. Purdue model (zn\u00e1m\u00fd jako PERA). Dodnes je pova\u017eov\u00e1n za jeden z nejroz\u0161\u00ed\u0159en\u011bj\u0161\u00edch architektonick\u00fdch model\u016f v oblasti provozn\u00ed technologie.<\/p>\n\n\n\n<p>Purdue model poskytuje ucelen\u00fd r\u00e1mec pro \u0159\u00edzen\u00ed a automatizaci pr\u016fmyslov\u00fdch proces\u016f a umo\u017e\u0148uje odd\u011blit (segmentovat) funkce a odpov\u011bdnosti mezi r\u016fzn\u00fdmi \u00farovn\u011bmi \u0159\u00edzen\u00ed a automatizac\u00ed. Kybernetick\u00e9 hrozby se neust\u00e1le vyv\u00edjej\u00ed a propojen\u00ed tov\u00e1rn\u00edch IT a OT syst\u00e9m\u016f \u00fato\u010dn\u00edk\u016fm nahr\u00e1v\u00e1 do karet \u2013 mnoho v\u00fdrobn\u00edch a pr\u016fmyslov\u00fdch firem se stalo ter\u010dem nap\u0159. plo\u0161n\u00fdch ransomwarov\u00fdch \u00fatok\u016f pr\u00e1v\u011b z\u00a0d\u016fvodu nedodr\u017een\u00ed \u0159\u00e1dn\u00e9 segmentace. Proto je nutn\u00e9 pr\u016fmyslov\u00e9 s\u00edt\u011b segmentovat, neust\u00e1le monitorovat a aktualizovat bezpe\u010dnostn\u00ed opat\u0159en\u00ed v souladu s nejnov\u011bj\u0161\u00edmi hrozbami a trendy v oblasti kybernetick\u00e9 bezpe\u010dnosti.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Mezi nej\u010dast\u011bj\u0161\u00ed hrozby v&nbsp;pr\u016fmyslu pat\u0159\u00ed:<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>ovl\u00e1dnut\u00ed koncov\u00e9 stanice v pr\u016fmyslov\u00e9 s\u00edti a n\u00e1sledn\u00fd pivoting<\/li>\n\n\n\n<li>podvr\u017een\u00ed\/zneu\u017eit\u00ed autorizovan\u00e9ho vzd\u00e1len\u00e9ho p\u0159\u00edstupu<\/li>\n\n\n\n<li>\u00fatok na bezdr\u00e1tov\u00e1 spojen\u00ed<\/li>\n\n\n\n<li>z\u00edsk\u00e1n\u00ed fyzick\u00e9ho p\u0159\u00edstupu k v\u00fdrobn\u00ed s\u00edti a za\u0159\u00edzen\u00edm<\/li>\n\n\n\n<li>instalace ciz\u00ed fyzick\u00e9 komponenty za \u00fa\u010delem z\u00edsk\u00e1n\u00ed \u010di \u00fapravy p\u0159en\u00e1\u0161en\u00fdch dat.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">P\u011bt z\u00e1kladn\u00edch bezpe\u010dnostn\u00edch princip\u016f a pil\u00ed\u0159\u016f<\/h2>\n\n\n\n<p>Existuje n\u011bkolik z\u00e1kladn\u00edch bezpe\u010dnostn\u00edch princip\u016f a pil\u00ed\u0159\u016f, kter\u00e9 jsou \u00fa\u010dinn\u00e9 a d\u016fle\u017eit\u00e9 pro zaji\u0161t\u011bn\u00ed kybernetick\u00e9 bezpe\u010dnosti v pr\u016fmyslu. Nen\u00ed novinkou, \u017ee d\u00edky f\u00fazi IT sv\u011bta do sv\u011bta OT, jsou tyto pil\u00ed\u0159e p\u0159evzaty pr\u00e1v\u011b z\u00a0IT sv\u011bta (av\u0161ak dopln\u011bny o specifika OT &#8211; nap\u0159. propriet\u00e1rn\u00ed ICS protokoly atp.) Mezi hlavn\u00ed principy a pil\u00ed\u0159e pat\u0159\u00ed:<\/p>\n\n\n\n<p><strong>Viditelnost <\/strong>\u2013 nelze chr\u00e1nit to, o \u010dem se nev\u00ed. Proto je vhodn\u00e9 udr\u017eovat aktu\u00e1ln\u00ed seznam v\u0161ech za\u0159\u00edzen\u00ed p\u0159ipojen\u00fdch k\u00a0s\u00edti a prov\u00e1d\u011bt behavior\u00e1ln\u00ed anal\u00fdzu jejich komunikace. Dal\u0161\u00edm p\u0159edpokladem je pravideln\u00e9 skenov\u00e1n\u00ed stavu a verz\u00ed (OT\/IT) za\u0159\u00edzen\u00ed. Objeven\u00e9 zranitelnosti je nutn\u00e9 z\u00e1platovat.<\/p>\n\n\n\n<p><strong>Segmentace<\/strong> \u2013 dal\u0161\u00edm pil\u00ed\u0159em je izolace, filtrov\u00e1n\u00ed a inspekce s\u00ed\u0165ov\u00e9ho provozu. P\u0159edpokladem je nasazen\u00ed NGFW (OT) pro \u0159\u00e1dnou (micro)segmentaci a filtraci s\u00edtov\u00e9ho provozu. Vyu\u017e\u00edvat by se m\u011bly funkce IPS\/IDS (OT) a virtu\u00e1ln\u00ed z\u00e1platov\u00e1n\u00ed. Zapomenout se nesm\u00ed ani na zabezpe\u010den\u00ed e-mailov\u00e9ho a internetov\u00e9ho provozu a kontrolu nezn\u00e1m\u00fdch soubor\u016f.<\/p>\n\n\n\n<p><strong>Endpointy \u2013<\/strong> EDR\/XDR \u0159e\u0161en\u00ed umo\u017en\u00ed sb\u00edrat informace o tom, co se na za\u0159\u00edzen\u00edch d\u011bje (v\u010detn\u011b spr\u00e1vy USB za\u0159\u00edzen\u00ed).<\/p>\n\n\n\n<p><strong>Access Management \u2013 <\/strong>vhodn\u00e1 je rovn\u011b\u017e centralizovan\u00e1 spr\u00e1va u\u017eivatelsk\u00fdch\/strojov\u00fdch identit, av\u0161ak za p\u0159edpokladu striktn\u011b odd\u011blen\u00e9 pr\u016fmyslov\u00e9 a korpor\u00e1tn\u00ed identity. S&nbsp;t\u00edm souvis\u00ed, \u017ee vzd\u00e1len\u00e9 p\u0159\u00edstupy by m\u011bly b\u00fdt zabezpe\u010den\u00e9 pomoc\u00ed MFA. Ke spr\u00e1v\u011b s\u00edt\u011b a \u0159\u00edzen\u00ed za\u0159\u00edzen\u00ed by m\u011bly b\u00fdt vyu\u017eity Jump Servery a implementov\u00e1ny syst\u00e9my ur\u010den\u00e9 k \u0159\u00edzen\u00ed p\u0159\u00edstupu k s\u00edti (NAC, 802.1x).<\/p>\n\n\n\n<p><strong>Auditing, Backup, Compliance, Response, Risk, SIEM\/SOC \u2013<\/strong> po zapojen\u00ed sb\u011bru dat je vhodn\u00e9 centralizovat a vyhodnocovat bezpe\u010dnostn\u00ed logy. Robustn\u00ed backup strategi\u00ed lze p\u0159ipravit na neo\u010dek\u00e1van\u00e9 situace. Zapom\u00ednat by se nem\u011blo ani na pravideln\u00e9 \u0161kolen\u00ed administr\u00e1tor\u016f a zam\u011bstnanc\u016f. Stejn\u011b tak nepodce\u0148ovat anal\u00fdzu rizik, co\u017e lze vy\u0159e\u0161it zaveden\u00edm nebo alespo\u0148 inspirov\u00e1n\u00edm se normou IEC 62443. A samoz\u0159ejmost\u00ed je vy\u017eadovat dodr\u017eov\u00e1n\u00ed bezpe\u010dnostn\u00edch z\u00e1sad po dodavatel\u00edch.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Odborn\u00fd p\u0159\u00edstup<\/h2>\n\n\n\n<p>Pr\u016fmyslov\u00e9 \u0159\u00eddic\u00ed syst\u00e9my kombinuj\u00ed mnoho slo\u017eit\u00e9ho hardwaru a softwaru (mnohdy bohu\u017eel i velice zastaral\u00e9ho). Aby si v\u00fdrobn\u00ed spole\u010dnosti udr\u017eely nejvy\u0161\u0161\u00ed \u00farove\u0148 p\u0159ipravenosti na kybernetickou bezpe\u010dnost v OT, mus\u00ed b\u00fdt p\u0159i implementaci ochrany proaktivn\u00ed. S&nbsp;t\u00edm mohou pomoci specializovan\u00e9 t\u00fdmy. Proto ne\u010dekejte, domluvte si konzultaci a zjist\u011bte, jak je na tom va\u0161e firma.<\/p>\n\n\n\n<div style=\"height:59px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Zabezpe\u010den\u00ed pr\u016fmyslov\u00fdch s\u00edt\u00ed je v\u00a0sou\u010dasn\u00e9 dob\u011b pro firmy z\u00e1sadn\u00edm t\u00e9matem, a proto mu v\u011bnuj\u00ed v\u00edce pozornosti. Dob\u0159e v\u011bd\u00ed, \u017ee kybernetick\u00e9 \u00fatoky na pr\u016fmyslov\u00e9 technologie (OT, n\u011bkdy t\u00e9\u017e ICS) jsou st\u00e1le \u010dast\u011bj\u0161\u00ed a sofistikovan\u011bj\u0161\u00ed, co\u017e zvy\u0161uje nejen riziko napadnut\u00ed a ztr\u00e1ty dat, ale p\u0159edev\u0161\u00edm v\u00fdpadek ve v\u00fdrob\u011b, kter\u00fd m\u016f\u017ee spole\u010dnosti st\u00e1t i des\u00edtky milion\u016f korun. V [&hellip;]<\/p>\n","protected":false},"author":30,"featured_media":52611,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[143],"tags":[313],"news_categories":[371,372],"class_list":["post-52607","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized-cs","tag-kyberneticka-bezpecnost-cs","news_categories-bezpecnost-cs","news_categories-iot-cs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Aby se OT s\u00ed\u0165 nestala zranitelnou<\/title>\n<meta name=\"description\" content=\"Mezi nej\u010dast\u011bj\u0161\u00ed hrozby v pr\u016fmyslu pat\u0159\u00ed: ovl\u00e1dnut\u00ed koncov\u00e9 stanice v pr\u016fmyslov\u00e9 s\u00edti a n\u00e1sledn\u00fd pivoting, podvr\u017een\u00ed\/zneu\u017eit\u00ed autorizovan\u00e9ho vzd\u00e1len\u00e9ho p\u0159\u00edstupu, \u00fatok na bezdr\u00e1tov\u00e1 spojen\u00ed, z\u00edsk\u00e1n\u00ed fyzick\u00e9ho p\u0159\u00edstupu k v\u00fdrobn\u00ed s\u00edti a za\u0159\u00edzen\u00edm, instalace ciz\u00ed fyzick\u00e9 komponenty za \u00fa\u010delem z\u00edsk\u00e1n\u00ed \u010di \u00fapravy p\u0159en\u00e1\u0161en\u00fdch dat.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"cs_CZ\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Aby se OT s\u00ed\u0165 nestala zranitelnou\" \/>\n<meta property=\"og:description\" content=\"Mezi nej\u010dast\u011bj\u0161\u00ed hrozby v pr\u016fmyslu pat\u0159\u00ed: ovl\u00e1dnut\u00ed koncov\u00e9 stanice v pr\u016fmyslov\u00e9 s\u00edti a n\u00e1sledn\u00fd pivoting, podvr\u017een\u00ed\/zneu\u017eit\u00ed autorizovan\u00e9ho vzd\u00e1len\u00e9ho p\u0159\u00edstupu, \u00fatok na bezdr\u00e1tov\u00e1 spojen\u00ed, z\u00edsk\u00e1n\u00ed fyzick\u00e9ho p\u0159\u00edstupu k v\u00fdrobn\u00ed s\u00edti a za\u0159\u00edzen\u00edm, instalace ciz\u00ed fyzick\u00e9 komponenty za \u00fa\u010delem z\u00edsk\u00e1n\u00ed \u010di \u00fapravy p\u0159en\u00e1\u0161en\u00fdch dat.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/new.soitron.com\/in-order-not-to-become-vulnerable\/\" \/>\n<meta property=\"og:site_name\" content=\"Soitron\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-18T05:01:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-21T13:53:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/new.soitron.com\/wp-content\/uploads\/2023\/06\/OT-site.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Leona Dundrova\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leona Dundrova\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Aby se OT s\u00ed\u0165 nestala zranitelnou","description":"Mezi nej\u010dast\u011bj\u0161\u00ed hrozby v pr\u016fmyslu pat\u0159\u00ed: ovl\u00e1dnut\u00ed koncov\u00e9 stanice v pr\u016fmyslov\u00e9 s\u00edti a n\u00e1sledn\u00fd pivoting, podvr\u017een\u00ed\/zneu\u017eit\u00ed autorizovan\u00e9ho vzd\u00e1len\u00e9ho p\u0159\u00edstupu, \u00fatok na bezdr\u00e1tov\u00e1 spojen\u00ed, z\u00edsk\u00e1n\u00ed fyzick\u00e9ho p\u0159\u00edstupu k v\u00fdrobn\u00ed s\u00edti a za\u0159\u00edzen\u00edm, instalace ciz\u00ed fyzick\u00e9 komponenty za \u00fa\u010delem z\u00edsk\u00e1n\u00ed \u010di \u00fapravy p\u0159en\u00e1\u0161en\u00fdch dat.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"cs_CZ","og_type":"article","og_title":"Aby se OT s\u00ed\u0165 nestala zranitelnou","og_description":"Mezi nej\u010dast\u011bj\u0161\u00ed hrozby v pr\u016fmyslu pat\u0159\u00ed: ovl\u00e1dnut\u00ed koncov\u00e9 stanice v pr\u016fmyslov\u00e9 s\u00edti a n\u00e1sledn\u00fd pivoting, podvr\u017een\u00ed\/zneu\u017eit\u00ed autorizovan\u00e9ho vzd\u00e1len\u00e9ho p\u0159\u00edstupu, \u00fatok na bezdr\u00e1tov\u00e1 spojen\u00ed, z\u00edsk\u00e1n\u00ed fyzick\u00e9ho p\u0159\u00edstupu k v\u00fdrobn\u00ed s\u00edti a za\u0159\u00edzen\u00edm, instalace ciz\u00ed fyzick\u00e9 komponenty za \u00fa\u010delem z\u00edsk\u00e1n\u00ed \u010di \u00fapravy p\u0159en\u00e1\u0161en\u00fdch dat.","og_url":"https:\/\/new.soitron.com\/in-order-not-to-become-vulnerable\/","og_site_name":"Soitron","article_published_time":"2023-05-18T05:01:00+00:00","article_modified_time":"2023-12-21T13:53:43+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/new.soitron.com\/wp-content\/uploads\/2023\/06\/OT-site.jpg","type":"image\/jpeg"}],"author":"Leona Dundrova","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Leona Dundrova","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/new.soitron.com\/in-order-not-to-become-vulnerable\/#article","isPartOf":{"@id":"https:\/\/new.soitron.com\/in-order-not-to-become-vulnerable\/"},"author":{"name":"Leona Dundrova","@id":"https:\/\/new.soitron.com\/#\/schema\/person\/64b486d98fdb29ba02e8122361fe0238"},"headline":"Aby se OT s\u00ed\u0165 nestala zranitelnou","datePublished":"2023-05-18T05:01:00+00:00","dateModified":"2023-12-21T13:53:43+00:00","mainEntityOfPage":{"@id":"https:\/\/new.soitron.com\/in-order-not-to-become-vulnerable\/"},"wordCount":1086,"publisher":{"@id":"https:\/\/new.soitron.com\/#organization"},"image":{"@id":"https:\/\/new.soitron.com\/in-order-not-to-become-vulnerable\/#primaryimage"},"thumbnailUrl":"https:\/\/new.soitron.com\/wp-content\/uploads\/2023\/06\/OT-site.jpg","keywords":["Kybernetick\u00e1 bezpe\u010dnost"],"articleSection":["Uncategorized @cs"],"inLanguage":"cs-CZ"},{"@type":"WebPage","@id":"https:\/\/new.soitron.com\/in-order-not-to-become-vulnerable\/","url":"https:\/\/new.soitron.com\/in-order-not-to-become-vulnerable\/","name":"Aby se OT s\u00ed\u0165 nestala zranitelnou","isPartOf":{"@id":"https:\/\/new.soitron.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/new.soitron.com\/in-order-not-to-become-vulnerable\/#primaryimage"},"image":{"@id":"https:\/\/new.soitron.com\/in-order-not-to-become-vulnerable\/#primaryimage"},"thumbnailUrl":"https:\/\/new.soitron.com\/wp-content\/uploads\/2023\/06\/OT-site.jpg","datePublished":"2023-05-18T05:01:00+00:00","dateModified":"2023-12-21T13:53:43+00:00","description":"Mezi nej\u010dast\u011bj\u0161\u00ed hrozby v pr\u016fmyslu pat\u0159\u00ed: ovl\u00e1dnut\u00ed koncov\u00e9 stanice v pr\u016fmyslov\u00e9 s\u00edti a n\u00e1sledn\u00fd pivoting, podvr\u017een\u00ed\/zneu\u017eit\u00ed autorizovan\u00e9ho vzd\u00e1len\u00e9ho p\u0159\u00edstupu, \u00fatok na bezdr\u00e1tov\u00e1 spojen\u00ed, z\u00edsk\u00e1n\u00ed fyzick\u00e9ho p\u0159\u00edstupu k v\u00fdrobn\u00ed s\u00edti a za\u0159\u00edzen\u00edm, instalace ciz\u00ed fyzick\u00e9 komponenty za \u00fa\u010delem z\u00edsk\u00e1n\u00ed \u010di \u00fapravy p\u0159en\u00e1\u0161en\u00fdch dat.","breadcrumb":{"@id":"https:\/\/new.soitron.com\/in-order-not-to-become-vulnerable\/#breadcrumb"},"inLanguage":"cs-CZ","potentialAction":[{"@type":"ReadAction","target":["https:\/\/new.soitron.com\/in-order-not-to-become-vulnerable\/"]}]},{"@type":"ImageObject","inLanguage":"cs-CZ","@id":"https:\/\/new.soitron.com\/in-order-not-to-become-vulnerable\/#primaryimage","url":"https:\/\/new.soitron.com\/wp-content\/uploads\/2023\/06\/OT-site.jpg","contentUrl":"https:\/\/new.soitron.com\/wp-content\/uploads\/2023\/06\/OT-site.jpg","width":1920,"height":1080,"caption":"ot s\u00edt\u011b"},{"@type":"BreadcrumbList","@id":"https:\/\/new.soitron.com\/in-order-not-to-become-vulnerable\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/new.soitron.com\/"},{"@type":"ListItem","position":2,"name":"Aby se OT s\u00ed\u0165 nestala zranitelnou"}]},{"@type":"WebSite","@id":"https:\/\/new.soitron.com\/#website","url":"https:\/\/new.soitron.com\/","name":"Soitron","description":"Soitron je IT firma s 30letou tradici.","publisher":{"@id":"https:\/\/new.soitron.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/new.soitron.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"cs-CZ"},{"@type":"Organization","@id":"https:\/\/new.soitron.com\/#organization","name":"Soitron","url":"https:\/\/new.soitron.com\/","logo":{"@type":"ImageObject","inLanguage":"cs-CZ","@id":"https:\/\/new.soitron.com\/#\/schema\/logo\/image\/","url":"https:\/\/new.soitron.com\/wp-content\/uploads\/2016\/10\/Soitron_logo.png","contentUrl":"https:\/\/new.soitron.com\/wp-content\/uploads\/2016\/10\/Soitron_logo.png","width":224,"height":56,"caption":"Soitron"},"image":{"@id":"https:\/\/new.soitron.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/new.soitron.com\/#\/schema\/person\/64b486d98fdb29ba02e8122361fe0238","name":"Leona Dundrova","image":{"@type":"ImageObject","inLanguage":"cs-CZ","@id":"https:\/\/new.soitron.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/84706e8fce5bd5deb417dd627fd43e3484f2ff0129daddd7682fd48948e80a8b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/84706e8fce5bd5deb417dd627fd43e3484f2ff0129daddd7682fd48948e80a8b?s=96&d=mm&r=g","caption":"Leona Dundrova"},"url":"https:\/\/new.soitron.com\/cs\/author\/leona\/"}]}},"_links":{"self":[{"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/posts\/52607","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/users\/30"}],"replies":[{"embeddable":true,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/comments?post=52607"}],"version-history":[{"count":5,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/posts\/52607\/revisions"}],"predecessor-version":[{"id":54273,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/posts\/52607\/revisions\/54273"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/media\/52611"}],"wp:attachment":[{"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/media?parent=52607"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/categories?post=52607"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/tags?post=52607"},{"taxonomy":"news_categories","embeddable":true,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/news_categories?post=52607"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}