{"id":8124,"date":"2023-11-01T08:30:18","date_gmt":"2023-11-01T07:30:18","guid":{"rendered":"https:\/\/orangeacademy.cz\/clanky\/?p=8124"},"modified":"2023-09-29T00:39:19","modified_gmt":"2023-09-28T22:39:19","slug":"kyberneticka-bezpecnost","status":"publish","type":"post","link":"https:\/\/orangeacademy.cz\/clanky\/kyberneticka-bezpecnost\/","title":{"rendered":"Kybernetick\u00e1 bezpe\u010dnost: Ochrana p\u0159ed neviditeln\u00fdmi digit\u00e1ln\u00edmi hrozbami"},"content":{"rendered":"<p><b>V dne\u0161n\u00ed dob\u011b je kybernetick\u00e1 bezpe\u010dnost st\u00e1le d\u016fle\u017eit\u011bj\u0161\u00ed. Digit\u00e1ln\u00ed sv\u011bt se st\u00e1v\u00e1 komplexn\u011bj\u0161\u00edm a \u00fato\u010dn\u00edci jsou st\u00e1le sofistikovan\u011bj\u0161\u00ed. Kybernetick\u00e9 hrozby mohou m\u00edt v\u00e1\u017en\u00e9 d\u016fsledky pro jednotlivce, firmy i vl\u00e1du.<\/b><\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Obsah<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-69e2cac14d64e\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #666666;color:#666666\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #666666;color:#666666\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-69e2cac14d64e\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/orangeacademy.cz\/clanky\/kyberneticka-bezpecnost\/#Co_to_je_kyberneticka_bezpecnost\" >Co to je kybernetick\u00e1 bezpe\u010dnost?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/orangeacademy.cz\/clanky\/kyberneticka-bezpecnost\/#Proc_je_kyberneticka_bezpecnost_dulezita\" >Pro\u010d je kybernetick\u00e1 bezpe\u010dnost d\u016fle\u017eit\u00e1?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/orangeacademy.cz\/clanky\/kyberneticka-bezpecnost\/#Osvedcene_postupy_pro_kybernetickou_bezpecnost\" >Osv\u011bd\u010den\u00e9 postupy pro kybernetickou bezpe\u010dnost<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/orangeacademy.cz\/clanky\/kyberneticka-bezpecnost\/#Proc_se_kyberneticke_utoky_deji\" >Pro\u010d se kybernetick\u00e9 \u00fatoky d\u011bj\u00ed?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/orangeacademy.cz\/clanky\/kyberneticka-bezpecnost\/#Kyberneticka_bezpecnost\" >Kybernetick\u00e1 bezpe\u010dnost<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Co_to_je_kyberneticka_bezpecnost\"><\/span><span style=\"font-weight: 400;\">Co to je kybernetick\u00e1 bezpe\u010dnost?<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Kybernetick\u00e1 bezpe\u010dnost <strong>chr\u00e1n\u00ed po\u010d\u00edta\u010dov\u00e9 syst\u00e9my, s\u00edt\u011b a data p\u0159ed neopr\u00e1vn\u011bn\u00fdm p\u0159\u00edstupem, pou\u017eit\u00edm, zve\u0159ejn\u011bn\u00edm, zm\u011bnou nebo zni\u010den\u00edm.<\/strong> Kybernetick\u00e9 hrozby mohou zahrnovat viry, malware, soci\u00e1ln\u00ed in\u017een\u00fdrstv\u00ed a dal\u0161\u00ed.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\"><strong>Malware:<\/strong> \u0160kodliv\u00fd software, kter\u00fd m\u016f\u017ee po\u0161kodit po\u010d\u00edta\u010d nebo s\u00ed\u0165. Malware m\u016f\u017ee zahrnovat viry, trojsk\u00e9 kon\u011b, a dal\u0161\u00ed.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\"><strong>Soci\u00e1ln\u00ed in\u017een\u00fdrstv\u00ed:<\/strong> Forma kybernetick\u00e9ho \u00fatoku, kter\u00e1 se spol\u00e9h\u00e1 na manipulaci s lidmi k tomu, aby provedli akce, kter\u00e9 by jinak neud\u011blali. C\u00edlem \u00fato\u010dn\u00edka je <strong>z\u00edskat citliv\u00e9 informace nebo p\u0159\u00edstup k syst\u00e9mu nebo s\u00edti.<\/strong> Soci\u00e1ln\u00ed in\u017een\u00fd\u0159i \u010dasto pou\u017e\u00edvaj\u00ed r\u016fzn\u00e9 techniky, aby z\u00edskali d\u016fv\u011bru sv\u00fdch ob\u011bt\u00ed, jako je vytv\u00e1\u0159en\u00ed fale\u0161n\u00fdch email\u016f nebo webov\u00fdch str\u00e1nek.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\"><strong>Phishing<\/strong>: Druh soci\u00e1ln\u00edho in\u017een\u00fdrstv\u00ed, kter\u00fd vyu\u017e\u00edv\u00e1 fale\u0161n\u00fdch email\u016f nebo zpr\u00e1v, aby z\u00edskal p\u0159\u00edstup k informac\u00edm nebo syst\u00e9m\u016fm. Fale\u0161n\u00e9 emaily nebo zpr\u00e1vy \u010dasto <strong>vypadaj\u00ed jako zpr\u00e1vy od ofici\u00e1ln\u00edch u\u017eivatel\u016f, jako jsou banky nebo \u00fa\u0159ady.<\/strong><\/span><\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Proc_je_kyberneticka_bezpecnost_dulezita\"><\/span><span style=\"font-weight: 400;\">Pro\u010d je kybernetick\u00e1 bezpe\u010dnost d\u016fle\u017eit\u00e1?<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/orangeacademy.cz\/clanky\/bezpecnost-na-internetu\/\" target=\"_blank\" rel=\"noopener\">Kybernetick\u00e1 bezpe\u010dnost<\/a> je d\u016fle\u017eit\u00e1, proto\u017ee m\u016f\u017ee chr\u00e1nit jednotlivce, firmy i vl\u00e1du p\u0159ed v\u00e1\u017en\u00fdmi d\u016fsledky kybernetick\u00fdch \u00fatok\u016f. Kybernetick\u00e9 \u00fatoky mohou zp\u016fsobit:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><b>Ztr\u00e1tu dat:<\/b><span style=\"font-weight: 400;\"> Kybernetick\u00e9 \u00fatoky mohou v\u00e9st ke ztr\u00e1t\u011b citliv\u00fdch dat, jako jsou osobn\u00ed \u00fadaje, finan\u010dn\u00ed informace nebo obchodn\u00ed tajemstv\u00ed.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Po\u0161kozen\u00ed syst\u00e9m\u016f:<\/b><span style=\"font-weight: 400;\"> Kybernetick\u00e9 \u00fatoky mohou zp\u016fsobit po\u0161kozen\u00ed po\u010d\u00edta\u010dov\u00fdch syst\u00e9m\u016f, co\u017e m\u016f\u017ee v\u00e9st k p\u0159eru\u0161en\u00ed provozu a n\u00e1sledn\u011b i ztr\u00e1t\u011b p\u0159\u00edjm\u016f.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>\u00dav\u011brov\u00e9 podvody<\/b><span style=\"font-weight: 400;\">: Kybernetick\u00e9 \u00fatoky mohou b\u00fdt pou\u017eity k z\u00edsk\u00e1n\u00ed citliv\u00fdch informac\u00ed, jako jsou \u010d\u00edsla platebn\u00edch karet, \u010d\u00edsla ob\u010dansk\u00fdch pr\u016fkaz\u016f a dal\u0161\u00ed. \u00danik t\u011bchto dat m\u016f\u017ee m\u00edt <strong>negativn\u00ed dopad na finan\u010dn\u00ed situaci jednotlivce i firmy.<\/strong><\/span><\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Osvedcene_postupy_pro_kybernetickou_bezpecnost\"><\/span><span style=\"font-weight: 400;\">Osv\u011bd\u010den\u00e9 postupy pro kybernetickou bezpe\u010dnost<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Existuje mnoho zp\u016fsob\u016f, jak zajistit kybernetickou bezpe\u010dnost. Mezi nejd\u016fle\u017eit\u011bj\u0161\u00ed opat\u0159en\u00ed pat\u0159\u00ed:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><b>Bezpe\u010dnostn\u00ed software a aktualizace:<\/b><span style=\"font-weight: 400;\"> Nainstalujte a aktualizujte antivirov\u00fd software, firewall a dal\u0161\u00ed bezpe\u010dnostn\u00ed software.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Siln\u00e1 hesla:<\/b><span style=\"font-weight: 400;\"> Pou\u017e\u00edvejte siln\u00e1 a jedine\u010dn\u00e1 hesla pro ka\u017ed\u00fd \u00fa\u010det.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Dodr\u017eov\u00e1n\u00ed bezpe\u010dnostn\u00edch z\u00e1sad:<\/b><span style=\"font-weight: 400;\"> Dodr\u017eujte bezpe\u010dnostn\u00ed z\u00e1sady, jako je nap\u0159\u00edklad pou\u017e\u00edv\u00e1n\u00ed siln\u00e9ho hesla a dvouf\u00e1zov\u00e9ho ov\u011b\u0159ov\u00e1n\u00ed.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Z\u00e1lohov\u00e1n\u00ed dat:<\/b><span style=\"font-weight: 400;\"> Z\u00e1lohujte pravideln\u011b sv\u00e1 data. Jejich v\u010dasn\u00e9 z\u00e1lohov\u00e1n\u00ed je d\u016fle\u017eit\u00e9 pro pozd\u011bj\u0161\u00ed obnovu, kdyby n\u00e1hodou do\u0161lo k jejich ztr\u00e1t\u011b nebo po\u0161kozen\u00ed.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\"><strong>P\u0159\u00edlohy v emailech:<\/strong> Bu\u010fte opatrn\u00ed p\u0159i otev\u00edr\u00e1n\u00ed p\u0159\u00edloh a odkaz\u016f v emailech a zpr\u00e1v\u00e1ch.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Ve\u0159ejn\u00e9 Wifi:<\/b><span style=\"font-weight: 400;\"> Co nejm\u00e9n\u011b se p\u0159ipojujte k ve\u0159ejn\u00fdm wifi s\u00edt\u00edm.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Vzd\u011bl\u00e1n\u00ed:<\/b><span style=\"font-weight: 400;\"> Sledujte informace o nejnov\u011bj\u0161\u00edch kybernetick\u00fdch hrozb\u00e1ch.<\/span><\/li>\n<\/ul>\n<div id=\"attachment_8126\" style=\"width: 940px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-8126\" class=\"wp-image-8126 size-large\" src=\"https:\/\/orangeacademy.cz\/clanky\/wp-content\/uploads\/2023\/08\/AdobeStock_434989281-930x455.jpeg\" alt=\"kybernetick\u00e1 bezpe\u010dnost\" width=\"930\" height=\"455\" \/><p id=\"caption-attachment-8126\" class=\"wp-caption-text\">Trojsk\u00fd k\u016f\u0148 je druh malwaru, kter\u00fd se skr\u00fdv\u00e1 uvnit\u0159 jin\u00e9ho programu nebo aplikace. Na rozd\u00edl od viru se nedok\u00e1\u017ee s\u00e1m \u0161\u00ed\u0159it ani infikovat jin\u00e9 soubory. Do za\u0159\u00edzen\u00ed se dostane nej\u010dast\u011bji za pomoci technik soci\u00e1ln\u00edho in\u017een\u00fdrstv\u00ed.<\/p><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Proc_se_kyberneticke_utoky_deji\"><\/span><span style=\"font-weight: 400;\">Pro\u010d se kybernetick\u00e9 \u00fatoky d\u011bj\u00ed?<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Kyberneti\u010dt\u00ed \u00fato\u010dn\u00edci mohou m\u00edt r\u016fznou motivaci pro kybernetick\u00fd \u00fatok a to <strong>finan\u010dn\u00ed zisk, politick\u00fd dopad nebo osobn\u00ed d\u016fvody.<\/strong><\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>Finan\u010dn\u00ed zisk<\/strong> je jednou z nej\u010dast\u011bj\u0161\u00edch motivac\u00ed kybernetick\u00fdch \u00fatok\u016f. \u00dato\u010dn\u00edci se mohou sna\u017eit z\u00edskat p\u0159\u00edstup k citliv\u00fdm finan\u010dn\u00edm informac\u00edm, jako jsou \u010d\u00edsla bankovn\u00edch karet, aby je mohli pou\u017e\u00edt ke kr\u00e1de\u017ei nebo podvod\u016fm. Kybernetick\u00e9 \u00fatoky mohou b\u00fdt mimo jin\u00e9 pou\u017eity k po\u0161kozen\u00ed chodu firem, co\u017e m\u016f\u017ee m\u00edt <strong>negativn\u00ed dopad na jejich finan\u010dn\u00ed v\u00fdsledky.<\/strong><\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>Politick\u00fd dopad<\/strong> je dal\u0161\u00ed b\u011b\u017enou motivac\u00ed kybernetick\u00fdch \u00fatok\u016f. \u00dato\u010dn\u00edci mohou b\u00fdt motivov\u00e1ni k tomu, aby provedli \u00fatoky na vl\u00e1dn\u00ed nebo politick\u00e9 organizace, aby p<strong>odpo\u0159ili nebo po\u0161kodili konkr\u00e9tn\u00ed politickou stranu.\u00a0<\/strong><\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>Osobn\u00ed d\u016fvody<\/strong> jsou t\u0159et\u00ed mo\u017enou motivac\u00ed kybernetick\u00fdch \u00fatok\u016f. \u00dato\u010dn\u00edci se mohou sna\u017eit z\u00edskat p\u0159\u00edstup k citliv\u00fdm informac\u00edm nebo syst\u00e9m\u016fm, aby se c\u00edtili mocn\u00ed a d\u016fle\u017eit\u00ed. \u00dato\u010dn\u00edci d\u00e1le mohou pou\u017e\u00edt kybernetick\u00e9 \u00fatoky na lidi, kter\u00e9 znaj\u00ed a maj\u00ed <strong>pot\u0159ebu se pomst\u00edt.<\/strong><\/span><\/p>\n<p><span style=\"font-weight: 400;\">Je d\u016fle\u017eit\u00e9 poznamenat, \u017ee <a href=\"https:\/\/rekvalifikacnikurzy.cz\/kurz\/tvorba-www-aplikaci\" target=\"_blank\" rel=\"noopener\">kybernetick\u00e9<\/a> \u00fatoky mohou b\u00fdt \u010dasto <strong>motivov\u00e1ny kombinac\u00ed v\u00fd\u0161e uveden\u00fdch faktor\u016f.<\/strong><\/span><\/p>\n<span class='mb-center maxbutton-10-center'><span class='maxbutton-10-container mb-container'><a class=\"maxbutton-10 maxbutton maxbutton-kurz-programator\" target=\"_blank\" title=\"Kurz program\u00e1tor\" rel=\"noopener\" href=\"https:\/\/orangeacademy.cz\/kurzy-ucetnictvi\/rekvalifikacni-kurz-programator\"><span class='mb-text'>Nau\u010dte se programovat v na\u0161em kurzu<\/span><\/a><\/span><\/span>\n<h2><span class=\"ez-toc-section\" id=\"Kyberneticka_bezpecnost\"><\/span><span style=\"font-weight: 400;\">Kybernetick\u00e1 bezpe\u010dnost<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Kybernetick\u00e1 bezpe\u010dnost je <strong>komplexn\u00ed oblast, kter\u00e1 se neust\u00e1le vyv\u00edj\u00ed.<\/strong> Je d\u016fle\u017eit\u00e9 vn\u00edmat tyto hrozby a podniknout kroky k ochran\u011b sv\u00fdch dat. Kybernetick\u00e1 bezpe\u010dnost je glob\u00e1ln\u00ed probl\u00e9m. Firmy i st\u00e1ty \u010dasto spolupracuj\u00ed, <strong>aby sd\u00edleli informace a \u0159e\u0161ili hrozby.<\/strong><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>V dne\u0161n\u00ed dob\u011b je kybernetick\u00e1 bezpe\u010dnost st\u00e1le d\u016fle\u017eit\u011bj\u0161\u00ed. Digit\u00e1ln\u00ed sv\u011bt se st\u00e1v\u00e1 komplexn\u011bj\u0161\u00edm a \u00fato\u010dn\u00edci jsou st\u00e1le sofistikovan\u011bj\u0161\u00ed. Kybernetick\u00e9 hrozby mohou m\u00edt v\u00e1\u017en\u00e9 d\u016fsledky pro jednotlivce, firmy i vl\u00e1du. Co to je kybernetick\u00e1 bezpe\u010dnost? Kybernetick\u00e1 bezpe\u010dnost chr\u00e1n\u00ed po\u010d\u00edta\u010dov\u00e9 syst\u00e9my, s\u00edt\u011b a data p\u0159ed neopr\u00e1vn\u011bn\u00fdm p\u0159\u00edstupem, pou\u017eit\u00edm, zve\u0159ejn\u011bn\u00edm, zm\u011bnou nebo zni\u010den\u00edm. Kybernetick\u00e9 hrozby mohou zahrnovat viry, [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":8127,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[333],"tags":[442,310,32,8],"class_list":["post-8124","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-programovani","tag-it-a-programovani","tag-penize","tag-rekvalifikace","tag-vzdelavani"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Kybernetick\u00e1 bezpe\u010dnost: Ochrana p\u0159ed neviditeln\u00fdmi digit\u00e1ln\u00edmi hrozbami<\/title>\n<meta name=\"description\" content=\"V dne\u0161n\u00ed dob\u011b je kybernetick\u00e1 bezpe\u010dnost st\u00e1le d\u016fle\u017eit\u011bj\u0161\u00ed. Digit\u00e1ln\u00ed sv\u011bt se st\u00e1v\u00e1 st\u00e1le komplexn\u011bj\u0161\u00edm a \u00fato\u010dn\u00edci st\u00e1le sofistikovan\u011bj\u0161\u00edmi.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/orangeacademy.cz\/clanky\/kyberneticka-bezpecnost\/\" \/>\n<meta property=\"og:locale\" content=\"cs_CZ\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Kybernetick\u00e1 bezpe\u010dnost: Ochrana p\u0159ed neviditeln\u00fdmi digit\u00e1ln\u00edmi hrozbami\" \/>\n<meta property=\"og:description\" content=\"V dne\u0161n\u00ed dob\u011b je kybernetick\u00e1 bezpe\u010dnost st\u00e1le d\u016fle\u017eit\u011bj\u0161\u00ed. Digit\u00e1ln\u00ed sv\u011bt se st\u00e1v\u00e1 st\u00e1le komplexn\u011bj\u0161\u00edm a \u00fato\u010dn\u00edci st\u00e1le sofistikovan\u011bj\u0161\u00edmi.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/orangeacademy.cz\/clanky\/kyberneticka-bezpecnost\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog Orange Academy\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/OrangeAcademy.sro\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-01T07:30:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/orangeacademy.cz\/clanky\/wp-content\/uploads\/2023\/08\/AdobeStock_208044195-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1709\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Tereza Mal\u00edkov\u00e1\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Napsal(a)\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tereza Mal\u00edkov\u00e1\" \/>\n\t<meta name=\"twitter:label2\" content=\"Odhadovan\u00e1 doba \u010dten\u00ed\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minuty\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Kybernetick\u00e1 bezpe\u010dnost: Ochrana p\u0159ed neviditeln\u00fdmi digit\u00e1ln\u00edmi hrozbami","description":"V dne\u0161n\u00ed dob\u011b je kybernetick\u00e1 bezpe\u010dnost st\u00e1le d\u016fle\u017eit\u011bj\u0161\u00ed. Digit\u00e1ln\u00ed sv\u011bt se st\u00e1v\u00e1 st\u00e1le komplexn\u011bj\u0161\u00edm a \u00fato\u010dn\u00edci st\u00e1le sofistikovan\u011bj\u0161\u00edmi.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/orangeacademy.cz\/clanky\/kyberneticka-bezpecnost\/","og_locale":"cs_CZ","og_type":"article","og_title":"Kybernetick\u00e1 bezpe\u010dnost: Ochrana p\u0159ed neviditeln\u00fdmi digit\u00e1ln\u00edmi hrozbami","og_description":"V dne\u0161n\u00ed dob\u011b je kybernetick\u00e1 bezpe\u010dnost st\u00e1le d\u016fle\u017eit\u011bj\u0161\u00ed. Digit\u00e1ln\u00ed sv\u011bt se st\u00e1v\u00e1 st\u00e1le komplexn\u011bj\u0161\u00edm a \u00fato\u010dn\u00edci st\u00e1le sofistikovan\u011bj\u0161\u00edmi.","og_url":"https:\/\/orangeacademy.cz\/clanky\/kyberneticka-bezpecnost\/","og_site_name":"Blog Orange Academy","article_publisher":"https:\/\/www.facebook.com\/OrangeAcademy.sro","article_published_time":"2023-11-01T07:30:18+00:00","og_image":[{"width":2560,"height":1709,"url":"https:\/\/orangeacademy.cz\/clanky\/wp-content\/uploads\/2023\/08\/AdobeStock_208044195-scaled.jpeg","type":"image\/jpeg"}],"author":"Tereza Mal\u00edkov\u00e1","twitter_card":"summary_large_image","twitter_misc":{"Napsal(a)":"Tereza Mal\u00edkov\u00e1","Odhadovan\u00e1 doba \u010dten\u00ed":"4 minuty"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/orangeacademy.cz\/clanky\/kyberneticka-bezpecnost\/#article","isPartOf":{"@id":"https:\/\/orangeacademy.cz\/clanky\/kyberneticka-bezpecnost\/"},"author":{"name":"Tereza Mal\u00edkov\u00e1","@id":"https:\/\/orangeacademy.cz\/clanky\/#\/schema\/person\/4ffd8469465f64a0746bdedcf094510e"},"headline":"Kybernetick\u00e1 bezpe\u010dnost: Ochrana p\u0159ed neviditeln\u00fdmi digit\u00e1ln\u00edmi hrozbami","datePublished":"2023-11-01T07:30:18+00:00","mainEntityOfPage":{"@id":"https:\/\/orangeacademy.cz\/clanky\/kyberneticka-bezpecnost\/"},"wordCount":932,"commentCount":0,"image":{"@id":"https:\/\/orangeacademy.cz\/clanky\/kyberneticka-bezpecnost\/#primaryimage"},"thumbnailUrl":"https:\/\/orangeacademy.cz\/clanky\/wp-content\/uploads\/2023\/08\/AdobeStock_208044195-scaled.jpeg","keywords":["IT a programov\u00e1n\u00ed","pen\u00edze","Rekvalifikace","Vzd\u011bl\u00e1v\u00e1n\u00ed"],"articleSection":["Programov\u00e1n\u00ed"],"inLanguage":"cs","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/orangeacademy.cz\/clanky\/kyberneticka-bezpecnost\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/orangeacademy.cz\/clanky\/kyberneticka-bezpecnost\/","url":"https:\/\/orangeacademy.cz\/clanky\/kyberneticka-bezpecnost\/","name":"Kybernetick\u00e1 bezpe\u010dnost: Ochrana p\u0159ed neviditeln\u00fdmi digit\u00e1ln\u00edmi hrozbami","isPartOf":{"@id":"https:\/\/orangeacademy.cz\/clanky\/#website"},"primaryImageOfPage":{"@id":"https:\/\/orangeacademy.cz\/clanky\/kyberneticka-bezpecnost\/#primaryimage"},"image":{"@id":"https:\/\/orangeacademy.cz\/clanky\/kyberneticka-bezpecnost\/#primaryimage"},"thumbnailUrl":"https:\/\/orangeacademy.cz\/clanky\/wp-content\/uploads\/2023\/08\/AdobeStock_208044195-scaled.jpeg","datePublished":"2023-11-01T07:30:18+00:00","author":{"@id":"https:\/\/orangeacademy.cz\/clanky\/#\/schema\/person\/4ffd8469465f64a0746bdedcf094510e"},"description":"V dne\u0161n\u00ed dob\u011b je kybernetick\u00e1 bezpe\u010dnost st\u00e1le d\u016fle\u017eit\u011bj\u0161\u00ed. Digit\u00e1ln\u00ed sv\u011bt se st\u00e1v\u00e1 st\u00e1le komplexn\u011bj\u0161\u00edm a \u00fato\u010dn\u00edci st\u00e1le sofistikovan\u011bj\u0161\u00edmi.","breadcrumb":{"@id":"https:\/\/orangeacademy.cz\/clanky\/kyberneticka-bezpecnost\/#breadcrumb"},"inLanguage":"cs","potentialAction":[{"@type":"ReadAction","target":["https:\/\/orangeacademy.cz\/clanky\/kyberneticka-bezpecnost\/"]}]},{"@type":"ImageObject","inLanguage":"cs","@id":"https:\/\/orangeacademy.cz\/clanky\/kyberneticka-bezpecnost\/#primaryimage","url":"https:\/\/orangeacademy.cz\/clanky\/wp-content\/uploads\/2023\/08\/AdobeStock_208044195-scaled.jpeg","contentUrl":"https:\/\/orangeacademy.cz\/clanky\/wp-content\/uploads\/2023\/08\/AdobeStock_208044195-scaled.jpeg","width":2560,"height":1709,"caption":"kybernetick\u00e1 bezpe\u010dnost"},{"@type":"BreadcrumbList","@id":"https:\/\/orangeacademy.cz\/clanky\/kyberneticka-bezpecnost\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/orangeacademy.cz\/clanky\/"},{"@type":"ListItem","position":2,"name":"Kybernetick\u00e1 bezpe\u010dnost: Ochrana p\u0159ed neviditeln\u00fdmi digit\u00e1ln\u00edmi hrozbami"}]},{"@type":"WebSite","@id":"https:\/\/orangeacademy.cz\/clanky\/#website","url":"https:\/\/orangeacademy.cz\/clanky\/","name":"Blog Orange Academy","description":"Kurzy, rekvalifikace, lep\u0161\u00ed pr\u00e1ce i \u017eivot","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/orangeacademy.cz\/clanky\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"cs"},{"@type":"Person","@id":"https:\/\/orangeacademy.cz\/clanky\/#\/schema\/person\/4ffd8469465f64a0746bdedcf094510e","name":"Tereza Mal\u00edkov\u00e1","image":{"@type":"ImageObject","inLanguage":"cs","@id":"https:\/\/secure.gravatar.com\/avatar\/0428bf3da72e3ab3df79c9f2997f275a3d67911de1bb6f0e1f4b4ab2f1fa68b9?s=96&d=wavatar&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0428bf3da72e3ab3df79c9f2997f275a3d67911de1bb6f0e1f4b4ab2f1fa68b9?s=96&d=wavatar&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0428bf3da72e3ab3df79c9f2997f275a3d67911de1bb6f0e1f4b4ab2f1fa68b9?s=96&d=wavatar&r=g","caption":"Tereza Mal\u00edkov\u00e1"},"url":"https:\/\/orangeacademy.cz\/clanky\/author\/drbohlavova\/"}]}},"_links":{"self":[{"href":"https:\/\/orangeacademy.cz\/clanky\/wp-json\/wp\/v2\/posts\/8124","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/orangeacademy.cz\/clanky\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/orangeacademy.cz\/clanky\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/orangeacademy.cz\/clanky\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/orangeacademy.cz\/clanky\/wp-json\/wp\/v2\/comments?post=8124"}],"version-history":[{"count":6,"href":"https:\/\/orangeacademy.cz\/clanky\/wp-json\/wp\/v2\/posts\/8124\/revisions"}],"predecessor-version":[{"id":8280,"href":"https:\/\/orangeacademy.cz\/clanky\/wp-json\/wp\/v2\/posts\/8124\/revisions\/8280"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/orangeacademy.cz\/clanky\/wp-json\/wp\/v2\/media\/8127"}],"wp:attachment":[{"href":"https:\/\/orangeacademy.cz\/clanky\/wp-json\/wp\/v2\/media?parent=8124"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/orangeacademy.cz\/clanky\/wp-json\/wp\/v2\/categories?post=8124"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/orangeacademy.cz\/clanky\/wp-json\/wp\/v2\/tags?post=8124"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}