{"id":44719,"date":"2021-11-09T13:34:19","date_gmt":"2021-11-09T12:34:19","guid":{"rendered":"https:\/\/www.soitron.com\/?p=44719"},"modified":"2022-03-22T11:14:35","modified_gmt":"2022-03-22T10:14:35","slug":"slovnik-kybernetickej-bezpecnosti","status":"publish","type":"post","link":"https:\/\/new.soitron.com\/sk\/slovnik-kybernetickej-bezpecnosti\/","title":{"rendered":"Slovn\u00edk kybernetickej bezpe\u010dnosti"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<p>V&nbsp;kybernetickom svete na n\u00e1s \u010d\u00edha mno\u017estvo n\u00e1strah. \u00datoky s\u00fa \u010doraz sofistikovanej\u0161ie, \u00fato\u010dn\u00edci zasa sebavedomej\u0161\u00ed a&nbsp;pripraven\u00ed vym\u00fd\u0161\u013ea\u0165 nov\u00e9 met\u00f3dy pre dosahovanie svojich cie\u013eov. Ak\u00e9 sp\u00f4soby pou\u017e\u00edvaj\u00fa, aby sa dostali bli\u017e\u0161ie k&nbsp;v\u00e1m a&nbsp;va\u0161im d\u00e1tam? Pripravili sme pre v\u00e1s slovn\u00edk pojmov kybernetickej bezpe\u010dnosti, aby ste lep\u0161ie pochopili spr\u00e1vanie \u00fato\u010dn\u00edkov a&nbsp;nenechali sa oklama\u0165.<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center\"><a href=\"#A\">A-K<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center\"><a href=\"#M\">L-P<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center\"><a href=\"#R\">R-Z<\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"A\">Botnet <\/h2>\n\n\n\n<p>je sie\u0165 je sie\u0165 tvoren\u00e1 zariadeniami (po\u010d\u00edta\u010dmi, telef\u00f3nmi, IoT) napadnut\u00fdmi malv\u00e9rom, ktor\u00e1 je ovl\u00e1dan\u00e1 \u00fato\u010dn\u00edkom. Viacero infikovan\u00fdch zariaden\u00ed spojen\u00fdch do botnetu n\u00e1sledne vykon\u00e1va zvolen\u00fa \u00falohu. Pr\u00edkladom s\u00fa DDoS \u00fatoky, \u010di zasielanie hromadn\u00e9ho spamu. Vytvoren\u00e9 botnety m\u00f4\u017eu by\u0165 taktie\u017e za prov\u00edziu prenaj\u00edman\u00e9 tret\u00edm stran\u00e1m (\u010fal\u0161\u00edm \u00fato\u010dn\u00edkom).<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft size-large is-resized\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/www.soitron.com\/wp-content\/uploads\/2021\/11\/exploit-min-1-1024x724.png\" alt=\"\" class=\"wp-image-44745\" width=\"355\" height=\"250\" srcset=\"https:\/\/new.soitron.com\/wp-content\/uploads\/2021\/11\/exploit-min-1-1024x724.png 1024w, https:\/\/new.soitron.com\/wp-content\/uploads\/2021\/11\/exploit-min-1-300x212.png 300w, https:\/\/new.soitron.com\/wp-content\/uploads\/2021\/11\/exploit-min-1-768x543.png 768w, https:\/\/new.soitron.com\/wp-content\/uploads\/2021\/11\/exploit-min-1-1536x1086.png 1536w, https:\/\/new.soitron.com\/wp-content\/uploads\/2021\/11\/exploit-min-1-331x234.png 331w, https:\/\/new.soitron.com\/wp-content\/uploads\/2021\/11\/exploit-min-1.png 1920w\" sizes=\"(max-width: 355px) 100vw, 355px\" \/><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Exploit<\/h2>\n\n\n\n<p><strong> <\/strong>je \u0161peci\u00e1lny program, \u010das\u0165 k\u00f3du alebo sekvencia pr\u00edkazov, ktor\u00e1 vyu\u017e\u00edva chybu alebo zranite\u013enos\u0165 v&nbsp;softv\u00e9ri alebo hardv\u00e9ri, obvykle so z\u00e1merom z\u00edska\u0165 kontrolu nad syst\u00e9mom, z\u00edska\u0165 privilegovan\u00fd pr\u00edstup, alebo naru\u0161i\u0165 slu\u017ebu. Preto je d\u00f4le\u017eit\u00e9, \u010do najsk\u00f4r identifikova\u0165 tak\u00e9to chyby alebo zranite\u013enosti a&nbsp;opravi\u0165 (patchova\u0165 z anglick\u00e9ho \u201epatch\u201c=z\u00e1plata) ich sk\u00f4r, ako by mohli by\u0165 zneu\u017eit\u00e9. Exploity, ktor\u00e9 e\u0161te nie s\u00fa verejne zn\u00e1me sa naz\u00fdvaju &nbsp;\u201czero day\u201c exploity a&nbsp;s\u00fa nebezpe\u010dn\u00e9 pr\u00e1ve t\u00fdm, \u017ee proti nim e\u0161te neexistuje obrana. Pou\u017e\u00edvate\u013e by mal pravidelne aktualizova\u0165 svoj syst\u00e9m a&nbsp;aplik\u00e1cie, aby odstr\u00e1nil tie chyby a&nbsp;zranite\u013enosti, ktor\u00e9 s\u00fa u\u017e zn\u00e1me.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Honeypot <\/h2>\n\n\n\n<p>je bezpe\u010dnostn\u00fd mechanizmus (obvykle server v sieti), ktor\u00e9ho cie\u013eom je pril\u00e1ka\u0165 potenci\u00e1lne \u00fatoky a&nbsp;zaznamen\u00e1va\u0165 ich pre \u010fal\u0161iu anal\u00fdzu. Ide v&nbsp;podstate o&nbsp;pascu pre nal\u00e1kanie \u00fato\u010dn\u00edka. &nbsp;Ke\u010f\u017ee honeypot nem\u00e1 in\u00fa legit\u00edmnu funkciu, takmer ak\u00e1ko\u013evek interakcia s&nbsp;n\u00edm je sign\u00e1lom podozrivej aktivity. Vyu\u017e\u00edvan\u00fd je obvykle na z\u00edskavanie inform\u00e1cii o&nbsp;\u00fato\u010dn\u00edkoch, ich mot\u00edvoch, n\u00e1strojoch, \u010di taktike. Takto je mo\u017en\u00e9 lep\u0161ie porozumie\u0165 spr\u00e1vaniu \u00fato\u010dn\u00edkov a&nbsp;h\u013eada\u0165 efekt\u00edvne sp\u00f4soby obrany.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"M\">Malv\u00e9r (Malware) <\/h2>\n\n\n\n<p>je ak\u00fdko\u013evek softv\u00e9r \u00famyselne navrhnut\u00fd za \u00fa\u010delom po\u0161kodenia po\u010d\u00edta\u010dov, serverov, klientov, alebo po\u010d\u00edta\u010dov\u00fdch siet\u00ed. Pozn\u00e1me viacero typov malv\u00e9ru, napr\u00edklad v\u00edrusy, \u010dervy, tr\u00f3jske kone, spyware, adware, \u010di nechv\u00e1lne zn\u00e1my ransomv\u00e9r.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Phishing<\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/www.soitron.com\/wp-content\/uploads\/2021\/11\/phishing-1-1024x724.png\" alt=\"\" class=\"wp-image-44729\" width=\"322\" height=\"228\"\/><\/figure><\/div>\n\n\n\n<p><strong> <\/strong>je typ \u00fatoku, pri ktorom sa \u00fato\u010dn\u00edk pok\u00fa\u0161a z\u00edska\u0165 osobn\u00e9 \u00fadaje je typ \u00fatoku, pri ktorom sa \u00fato\u010dn\u00edk pok\u00fa\u0161a z\u00edska\u0165 citliv\u00e9 \u00fadaje pou\u017e\u00edvate\u013ea prostredn\u00edctvom spr\u00e1v. Ide najm\u00e4 o hesl\u00e1, pou\u017e\u00edvate\u013esk\u00e9 men\u00e1 alebo \u00fadaje o&nbsp;platobn\u00fdch kart\u00e1ch. Tie m\u00f4\u017eu by\u0165 n\u00e1sledne vyu\u017eit\u00e9 na okradnutie pou\u017e\u00edvate\u013ea, z\u00edskanie neopr\u00e1vnen\u00fdch pr\u00edstupov&nbsp; (k zariadeniam, sie\u0165am, inform\u00e1ci\u00e1m, \u010di \u010fal\u0161\u00edm \u013eu\u010fom), in\u0161tal\u00e1ciu malv\u00e9ru, kr\u00e1de\u017e identity a podobne. \u00dato\u010dn\u00edk sa pok\u00fa\u0161a pou\u017e\u00edvate\u013ea, naj\u010dastej\u0161ie prostredn\u00edctvom emailu, vyl\u00e1ka\u0165 na \u0161kodliv\u00fa str\u00e1nku, pr\u00edpadne nab\u00e1da otvori\u0165 \u0161kodliv\u00fa pr\u00edlohu. Nezabudnite by\u0165 preto obozretn\u00ed. Podozriv\u00e9 s\u00fa najm\u00e4 spr\u00e1vy od nezn\u00e1mych os\u00f4b, alebo z&nbsp;nezn\u00e1mych adries, ktor\u00e9 v\u00e1s nab\u00e1daj\u00fa klikn\u00fa\u0165 na link, otvori\u0165 pr\u00edlohu, alebo odosla\u0165 citliv\u00e9 \u00fadaje. Podozriv\u00e9 s\u00fa aj spr\u00e1vy obsahuj\u00face gramatick\u00e9 \u010di faktick\u00e9&nbsp; chyby. V\u017edy sa rad\u0161ej zamyslite, \u010di nem\u00f4\u017ee \u00eds\u0165 o&nbsp;podvod.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"R\">Ransomv\u00e9r (Ransomware)<\/h2>\n\n\n\n<p>zablokuje pou\u017e\u00edvate\u013eovi jeho d\u00e1ta (obvykle \u0161ifrovan\u00edm) a&nbsp;n\u00e1sledne ho vydiera a&nbsp;vy\u017eaduje v\u00fdkupn\u00e9 za ich op\u00e4tovn\u00e9 spr\u00edstupnenie. S\u00fa\u010das\u0165ou \u00fatoku je \u010dasto aj hrozba zverejnenia t\u00fdchto d\u00e1t.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Smishing<\/h2>\n\n\n\n<p>je typ \u00fatoku cez podvodn\u00e9 SMS spr\u00e1vy. N\u00e1zov smishing je kombin\u00e1ciou pojmov SMS a phishing. Ke\u010f\u017ee phishing je pomerne zn\u00e1my, \u013eudia za\u010d\u00ednaj\u00fa na podozriv\u00e9 maily reagova\u0165 opatrnej\u0161ie. Zdokona\u013euj\u00fa sa tie\u017e technick\u00e9 rie\u0161enia, ktor\u00e9 tieto maily filtruj\u00fa, preto sa \u00fato\u010dn\u00edci pres\u00favaj\u00fa do prostredia mobiln\u00fdch telef\u00f3nov.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Spam <\/h2>\n\n\n\n<p>je hromadn\u00e1 nevy\u017eiadan\u00e1 komunik\u00e1cia. \u010casto ide o&nbsp;hromadn\u00fd mailing pre ve\u013ek\u00e9 mno\u017estvo pou\u017e\u00edvate\u013eov. Samotn\u00fd spam je sk\u00f4r otravn\u00fd, ako vyslovene nje hromadn\u00e1 nevy\u017eiadan\u00e1 komunik\u00e1cia. Obvykle ide o&nbsp;hromadn\u00fd email pre ve\u013ek\u00e9 mno\u017estvo pou\u017e\u00edvate\u013eov, za \u00fa\u010delom \u0161\u00edrenia reklamy. Samotn\u00fd spam je sk\u00f4r otravn\u00fd, ako vyslovene nebezpe\u010dn\u00fd, av\u0161ak \u010dastokr\u00e1t spamov\u00e9 kampane obsahuj\u00fa aj prvky phisingu, smishingu \u010di \u0161\u00edria \u0161kodliv\u00e9 odkazy a pr\u00edlohy.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Spyware <\/h2>\n\n\n\n<p>je \u0161kodliv\u00fd softv\u00e9r, ktor\u00fd zhroma\u017e\u010fuje inform\u00e1cie o&nbsp;pou\u017e\u00edvate\u013eovi alebo organiz\u00e1cii s&nbsp;cie\u013eom odosla\u0165 ich \u010fal\u0161iemu subjektu a&nbsp;sp\u00f4sobi\u0165 tak pou\u017e\u00edvate\u013eovi \u0161kodu. Napr\u00edklad m\u00f4\u017ee \u00eds\u0165 o&nbsp;naru\u0161enie s\u00fakromia zdie\u013ean\u00edm z\u00edskan\u00fdch \u00fadajov alebo ohrozen\u00edm bezpe\u010dnosti zariadenia. Toto spr\u00e1vanie m\u00f4\u017ee by\u0165 pr\u00edtomn\u00e9 v&nbsp;malv\u00e9ri, ale aj v&nbsp;legit\u00edmnom softv\u00e9ri. Niektor\u00e9 webov\u00e9 str\u00e1nky vyu\u017e\u00edvaj\u00fa praktiky podobn\u00e9 spyware pri trackovan\u00ed pou\u017e\u00edvate\u013ea webu.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Soci\u00e1lne in\u017einierstvo<\/h2>\n\n\n\n<p> je netechnicje psychologick\u00e1 manipul\u00e1cia za \u00fa\u010delom navies\u0165 in\u00fa osobu k&nbsp;spr\u00e1vaniu, ktor\u00e9 nie je v&nbsp;jej najlep\u0161om z\u00e1ujme: obvykle s&nbsp;cie\u013eom z\u00edska\u0165 citliv\u00e9 inform\u00e1cie, neopr\u00e1vnen\u00fd pr\u00edstup a&nbsp;podobne. Nevy\u017eaduje technick\u00e9 schopnosti, naopak \u00fato\u010dn\u00edk spolieha na \u013eudsk\u00fa chybu. Za soci\u00e1lne in\u017einierstvo pova\u017eujeme napr\u00edklad phishing, vishing, smishing \u010di spam. Konkr\u00e9tny pr\u00edpad soci\u00e1lneho in\u017einierstva, ktor\u00fd sa odohr\u00e1val aj u&nbsp;n\u00e1s, na Slovensku, v&nbsp;decembri 2020 sme pop\u00edsali v&nbsp;\u010dl\u00e1nku <a href=\"https:\/\/www.soitron.sk\/social-hacking-v-priamom-prenose\/\">Social hacking v&nbsp;priamom prenose<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Tabnabbing<\/h2>\n\n\n\n<p> je \u00fatok, ktor\u00fd manipuluje s&nbsp;webov\u00fdmi str\u00e1nkami. Zvyknete m\u00e1va\u0165 pootv\u00e1ran\u00fdch viacero kariet v&nbsp;prehliada\u010di? Tak sa \u013eahko m\u00f4\u017eete sta\u0165 ter\u010dom tabnabbingu. Tento typ phishingov\u00e9ho \u00fatoku, nenab\u00e1da pou\u017e\u00edvate\u013ea klikn\u00fa\u0165 na podvodn\u00fd je phishingov\u00fd \u00fatok s cie\u013eom z\u00edska\u0165 pr\u00edstupov\u00e9 \u00fadaje pou\u017e\u00edvate\u013ea k&nbsp;popul\u00e1rnym internetov\u00fdm slu\u017eb\u00e1m. Zvyknete m\u00e1va\u0165 pootv\u00e1ran\u00fdch viacero kariet v&nbsp;prehliada\u010di? Tak sa \u013eah\u0161ie m\u00f4\u017eete sta\u0165 ter\u010dom tabnabbingu. Tento \u00fatok pods\u00fava pou\u017e\u00edvate\u013eovi v&nbsp;jednej z&nbsp;otvoren\u00fdch kariet jeho prehliada\u010da falo\u0161n\u00fa str\u00e1nku napodob\u0148uj\u00facu zn\u00e1mu internetov\u00fa slu\u017ebu a spolieha sa na jeho nepozornos\u0165. T\u00fdm, \u017ee pou\u017e\u00edvate\u013e prehliadne detaily a&nbsp;d\u00f4veruje zobrazenej str\u00e1nke, bez probl\u00e9mov zad\u00e1 svoje prihlasovacie \u00fadaje.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/www.soitron.com\/wp-content\/uploads\/2021\/11\/trojan-1024x1024.png\" alt=\"\" class=\"wp-image-44720\" width=\"267\" height=\"267\" srcset=\"https:\/\/new.soitron.com\/wp-content\/uploads\/2021\/11\/trojan-1024x1024.png 1024w, https:\/\/new.soitron.com\/wp-content\/uploads\/2021\/11\/trojan-150x150.png 150w, https:\/\/new.soitron.com\/wp-content\/uploads\/2021\/11\/trojan-300x300.png 300w, https:\/\/new.soitron.com\/wp-content\/uploads\/2021\/11\/trojan-768x768.png 768w, https:\/\/new.soitron.com\/wp-content\/uploads\/2021\/11\/trojan-1536x1536.png 1536w, https:\/\/new.soitron.com\/wp-content\/uploads\/2021\/11\/trojan-64x64.png 64w, https:\/\/new.soitron.com\/wp-content\/uploads\/2021\/11\/trojan-80x80.png 80w, https:\/\/new.soitron.com\/wp-content\/uploads\/2021\/11\/trojan-234x234.png 234w, https:\/\/new.soitron.com\/wp-content\/uploads\/2021\/11\/trojan-214x214.png 214w, https:\/\/new.soitron.com\/wp-content\/uploads\/2021\/11\/trojan-400x400.png 400w, https:\/\/new.soitron.com\/wp-content\/uploads\/2021\/11\/trojan.png 1920w\" sizes=\"(max-width: 267px) 100vw, 267px\" \/><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Trojan\/tr\u00f3jsky k\u00f4\u0148<\/h2>\n\n\n\n<p>je typ malv\u00e9ru, ktor\u00fd zav\u00e1dza o&nbsp;svojom \u00famysle a&nbsp;vyd\u00e1va sa za bezpe\u010dn\u00fd s\u00fabor. Tr\u00f3jske kone sa \u0161\u00edria naj\u010dastej\u0161ie cez nejak\u00fa formu soci\u00e1lneho in\u017einierstva, napr\u00edklad s\u00fa s\u00fa\u010das\u0165ou emailovej pr\u00edlohy, alebo s\u00fa z\u00edskan\u00e9 po kliknut\u00ed na falo\u0161n\u00fa reklamu na soci\u00e1lnych sie\u0165ach alebo kdeko\u013evek na webe. Mnoh\u00e9 s\u00fa\u010dasn\u00e9 tr\u00f3jske kone funguj\u00fa ako zadn\u00e9 vr\u00e1tka, ktor\u00e9 umo\u017e\u0148uj\u00fa neopr\u00e1vnen\u00fd pr\u00edstup k&nbsp;infikovan\u00e9mu zariadeniu. Ransomv\u00e9rov\u00e9 \u00fatoky s\u00fa tie\u017e \u010dasto vykon\u00e1van\u00e9 prostredn\u00edctvom tr\u00f3jskeho ko\u0148a.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Vishing <\/h2>\n\n\n\n<p>je typ phishingov\u00e9ho \u00fatoku realizovan\u00fd cez telefon\u00e1ty, vyu\u017e\u00edvaj\u00faci prvky soci\u00e1lneho in\u017einierstva. Pojem poch\u00e1dza z&nbsp;kombin\u00e1cie slov voice a&nbsp;phishing. \u00dato\u010dn\u00edk sa sna\u017e\u00ed vzbudi\u0165 d\u00f4veru t\u00fdm, \u017ee sa vyd\u00e1va za nejak\u00fa legit\u00edmnu entitu: pol\u00edciu, banku, telekomunika\u010dn\u00fa spolo\u010dnos\u0165, \u010di v\u00e1\u0161ho nov\u00e9ho kolegu. N\u00e1sledne sa sna\u017e\u00ed z\u00edska\u0165 citliv\u00e9 inform\u00e1cie, \u010d\u00edm sa mu otv\u00e1raj\u00fa mo\u017enosti pre \u010fal\u0161ie \u0161kodliv\u00e9 aktivity. \u00dato\u010dn\u00edk sa tie\u017e m\u00f4\u017ee vyd\u00e1va\u0165 za niekoho v&nbsp;n\u00fadzi, kto s\u00farne potrebuje va\u0161u (obvykle finan\u010dn\u00fa) pomoc. Vishing je medzi \u00fato\u010dn\u00edkmi popul\u00e1rny preto, lebo je \u0165a\u017e\u0161ie sledovate\u013en\u00fd.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.soitron.com\/wp-content\/uploads\/2021\/11\/whaling-e1635933640931-1024x1024.png\" alt=\"\" class=\"wp-image-44726\" width=\"260\" height=\"260\" srcset=\"https:\/\/new.soitron.com\/wp-content\/uploads\/2021\/11\/whaling-e1635933640931-1024x1024.png 1024w, https:\/\/new.soitron.com\/wp-content\/uploads\/2021\/11\/whaling-e1635933640931-150x150.png 150w, https:\/\/new.soitron.com\/wp-content\/uploads\/2021\/11\/whaling-e1635933640931-300x300.png 300w, https:\/\/new.soitron.com\/wp-content\/uploads\/2021\/11\/whaling-e1635933640931-768x767.png 768w, https:\/\/new.soitron.com\/wp-content\/uploads\/2021\/11\/whaling-e1635933640931-64x64.png 64w, https:\/\/new.soitron.com\/wp-content\/uploads\/2021\/11\/whaling-e1635933640931-80x80.png 80w, https:\/\/new.soitron.com\/wp-content\/uploads\/2021\/11\/whaling-e1635933640931-234x234.png 234w, https:\/\/new.soitron.com\/wp-content\/uploads\/2021\/11\/whaling-e1635933640931-214x214.png 214w, https:\/\/new.soitron.com\/wp-content\/uploads\/2021\/11\/whaling-e1635933640931-400x400.png 400w, https:\/\/new.soitron.com\/wp-content\/uploads\/2021\/11\/whaling-e1635933640931.png 1358w\" sizes=\"(max-width: 260px) 100vw, 260px\" \/><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Whaling<\/h2>\n\n\n\n<p>je cielen\u00fd phishingov\u00fd \u00fatok na vysoko postaven\u00e9ho, d\u00f4le\u017eit\u00e9ho \u010dloveka vo firemnej \u0161trukt\u00fare (\u201eve\u013ek\u00fa rybu\u201c preto whaling, z&nbsp;anglick\u00e9ho whale=ve\u013eryba). Na rozdiel od phishingu je premyslenej\u0161\u00ed, viac selekt\u00edvny, a&nbsp;lep\u0161ie pripraven\u00fd. Cie\u013eom je vyl\u00e1ka\u0165 od obete citliv\u00e9 inform\u00e1cie, alebo presved\u010di\u0165 ju na aktivitu, ktor\u00e1 je v&nbsp;z\u00e1ujme \u00fato\u010dn\u00edka.<\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div style=\"height:13px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Pripravili sme pre v\u00e1s slovn\u00edk pojmov kybernetickej bezpe\u010dnosti, aby ste lep\u0161ie pochopili spr\u00e1vanie \u00fato\u010dn\u00edkov a\u00a0nenechali sa oklama\u0165.<\/p>\n","protected":false},"author":34,"featured_media":44788,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[33,351],"tags":[295],"news_categories":[370],"class_list":["post-44719","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-clanky","category-bezpecnost","tag-kyberneticka-bezpecnost","news_categories-bezpecnost"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Slovn\u00edk kybernetickej bezpe\u010dnosti - Soitron<\/title>\n<meta name=\"description\" content=\"Pripravili sme pre v\u00e1s slovn\u00edk pojmov kybernetickej bezpe\u010dnosti, aby ste lep\u0161ie pochopili spr\u00e1vanie \u00fato\u010dn\u00edkov a\u00a0nenechali sa oklama\u0165.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"sk_SK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Slovn\u00edk kybernetickej bezpe\u010dnosti - Soitron\" \/>\n<meta property=\"og:description\" content=\"Pripravili sme pre v\u00e1s slovn\u00edk pojmov kybernetickej bezpe\u010dnosti, aby ste lep\u0161ie pochopili spr\u00e1vanie \u00fato\u010dn\u00edkov a\u00a0nenechali sa oklama\u0165.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/new.soitron.com\/cybersecurity-dictionary\/\" \/>\n<meta property=\"og:site_name\" content=\"Soitron\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-09T12:34:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-22T10:14:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/new.soitron.com\/wp-content\/uploads\/2021\/11\/cybersecurity_dictionary_g-min-1920x1357.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1357\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Natalia Jurakova\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Autor\" \/>\n\t<meta name=\"twitter:data1\" content=\"Natalia Jurakova\" \/>\n\t<meta name=\"twitter:label2\" content=\"Predpokladan\u00fd \u010das \u010d\u00edtania\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 min\u00fat\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Slovn\u00edk kybernetickej bezpe\u010dnosti - Soitron","description":"Pripravili sme pre v\u00e1s slovn\u00edk pojmov kybernetickej bezpe\u010dnosti, aby ste lep\u0161ie pochopili spr\u00e1vanie \u00fato\u010dn\u00edkov a\u00a0nenechali sa oklama\u0165.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"sk_SK","og_type":"article","og_title":"Slovn\u00edk kybernetickej bezpe\u010dnosti - Soitron","og_description":"Pripravili sme pre v\u00e1s slovn\u00edk pojmov kybernetickej bezpe\u010dnosti, aby ste lep\u0161ie pochopili spr\u00e1vanie \u00fato\u010dn\u00edkov a\u00a0nenechali sa oklama\u0165.","og_url":"https:\/\/new.soitron.com\/cybersecurity-dictionary\/","og_site_name":"Soitron","article_published_time":"2021-11-09T12:34:19+00:00","article_modified_time":"2022-03-22T10:14:35+00:00","og_image":[{"width":1920,"height":1357,"url":"https:\/\/new.soitron.com\/wp-content\/uploads\/2021\/11\/cybersecurity_dictionary_g-min-1920x1357.jpg","type":"image\/jpeg"}],"author":"Natalia Jurakova","twitter_card":"summary_large_image","twitter_misc":{"Autor":"Natalia Jurakova","Predpokladan\u00fd \u010das \u010d\u00edtania":"5 min\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/new.soitron.com\/cybersecurity-dictionary\/#article","isPartOf":{"@id":"https:\/\/new.soitron.com\/cybersecurity-dictionary\/"},"author":{"name":"Natalia Jurakova","@id":"https:\/\/new.soitron.com\/#\/schema\/person\/da4bfcbfdc7cb1175aef5d403061c986"},"headline":"Slovn\u00edk kybernetickej bezpe\u010dnosti","datePublished":"2021-11-09T12:34:19+00:00","dateModified":"2022-03-22T10:14:35+00:00","mainEntityOfPage":{"@id":"https:\/\/new.soitron.com\/cybersecurity-dictionary\/"},"wordCount":1468,"publisher":{"@id":"https:\/\/new.soitron.com\/#organization"},"image":{"@id":"https:\/\/new.soitron.com\/cybersecurity-dictionary\/#primaryimage"},"thumbnailUrl":"https:\/\/new.soitron.com\/wp-content\/uploads\/2021\/11\/cybersecurity_dictionary_g-min-1920x1357.jpg","keywords":["Kybernetick\u00e1 bezpe\u010dnos\u0165"],"articleSection":["\u010cl\u00e1nky","Kybernetick\u00e1 bezpe\u010dnos\u0165"],"inLanguage":"sk-SK"},{"@type":"WebPage","@id":"https:\/\/new.soitron.com\/cybersecurity-dictionary\/","url":"https:\/\/new.soitron.com\/cybersecurity-dictionary\/","name":"Slovn\u00edk kybernetickej bezpe\u010dnosti - Soitron","isPartOf":{"@id":"https:\/\/new.soitron.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/new.soitron.com\/cybersecurity-dictionary\/#primaryimage"},"image":{"@id":"https:\/\/new.soitron.com\/cybersecurity-dictionary\/#primaryimage"},"thumbnailUrl":"https:\/\/new.soitron.com\/wp-content\/uploads\/2021\/11\/cybersecurity_dictionary_g-min-1920x1357.jpg","datePublished":"2021-11-09T12:34:19+00:00","dateModified":"2022-03-22T10:14:35+00:00","description":"Pripravili sme pre v\u00e1s slovn\u00edk pojmov kybernetickej bezpe\u010dnosti, aby ste lep\u0161ie pochopili spr\u00e1vanie \u00fato\u010dn\u00edkov a\u00a0nenechali sa oklama\u0165.","breadcrumb":{"@id":"https:\/\/new.soitron.com\/cybersecurity-dictionary\/#breadcrumb"},"inLanguage":"sk-SK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/new.soitron.com\/cybersecurity-dictionary\/"]}]},{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/new.soitron.com\/cybersecurity-dictionary\/#primaryimage","url":"https:\/\/new.soitron.com\/wp-content\/uploads\/2021\/11\/cybersecurity_dictionary_g-min-1920x1357.jpg","contentUrl":"https:\/\/new.soitron.com\/wp-content\/uploads\/2021\/11\/cybersecurity_dictionary_g-min-1920x1357.jpg","width":1920,"height":1357},{"@type":"BreadcrumbList","@id":"https:\/\/new.soitron.com\/cybersecurity-dictionary\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/new.soitron.com\/"},{"@type":"ListItem","position":2,"name":"Slovn\u00edk kybernetickej bezpe\u010dnosti"}]},{"@type":"WebSite","@id":"https:\/\/new.soitron.com\/#website","url":"https:\/\/new.soitron.com\/","name":"Soitron","description":"Soitron je IT firma s viac ako 30 ro\u010dnou trad\u00edciou.","publisher":{"@id":"https:\/\/new.soitron.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/new.soitron.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sk-SK"},{"@type":"Organization","@id":"https:\/\/new.soitron.com\/#organization","name":"Soitron","url":"https:\/\/new.soitron.com\/","logo":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/new.soitron.com\/#\/schema\/logo\/image\/","url":"https:\/\/new.soitron.com\/wp-content\/uploads\/2016\/10\/Soitron_logo.png","contentUrl":"https:\/\/new.soitron.com\/wp-content\/uploads\/2016\/10\/Soitron_logo.png","width":224,"height":56,"caption":"Soitron"},"image":{"@id":"https:\/\/new.soitron.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/new.soitron.com\/#\/schema\/person\/da4bfcbfdc7cb1175aef5d403061c986","name":"Natalia Jurakova","image":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/new.soitron.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1acd0f0b322c56059c32d84e222e637666ee594f4a6dde61c2fc4ac19b571a9c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1acd0f0b322c56059c32d84e222e637666ee594f4a6dde61c2fc4ac19b571a9c?s=96&d=mm&r=g","caption":"Natalia Jurakova"},"url":"https:\/\/new.soitron.com\/sk\/author\/naty\/"}]}},"_links":{"self":[{"href":"https:\/\/new.soitron.com\/sk\/wp-json\/wp\/v2\/posts\/44719","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/new.soitron.com\/sk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/new.soitron.com\/sk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/new.soitron.com\/sk\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/new.soitron.com\/sk\/wp-json\/wp\/v2\/comments?post=44719"}],"version-history":[{"count":0,"href":"https:\/\/new.soitron.com\/sk\/wp-json\/wp\/v2\/posts\/44719\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/new.soitron.com\/sk\/wp-json\/wp\/v2\/media\/44788"}],"wp:attachment":[{"href":"https:\/\/new.soitron.com\/sk\/wp-json\/wp\/v2\/media?parent=44719"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/new.soitron.com\/sk\/wp-json\/wp\/v2\/categories?post=44719"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/new.soitron.com\/sk\/wp-json\/wp\/v2\/tags?post=44719"},{"taxonomy":"news_categories","embeddable":true,"href":"https:\/\/new.soitron.com\/sk\/wp-json\/wp\/v2\/news_categories?post=44719"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}