{"id":84,"date":"2024-01-19T14:00:21","date_gmt":"2024-01-19T14:00:21","guid":{"rendered":"http:\/\/localhost:9000\/?page_id=84"},"modified":"2024-04-24T16:23:50","modified_gmt":"2024-04-24T16:23:50","slug":"nase-publikacie","status":"publish","type":"page","link":"http:\/\/localhost:9000\/nase-publikacie","title":{"rendered":"Na\u0161e publik\u00e1cie"},"content":{"rendered":"\n

V tejto \u010dasti uv\u00e1dzame materi\u00e1ly publikovan\u00e9 \u00fatvarom CSIRT.SK.<\/p>\n\n\n\n

Syst\u00e9m Achilles (Novel Vulnerability Management System)<\/h2>\n\n\n\n

Vl\u00e1dna jednotka CSIRT prev\u00e1dzkuje syst\u00e9m Achilles, ktor\u00fd bol vybudovan\u00fd na mana\u017ement zranite\u013enost\u00ed z poh\u013eadu \u00fato\u010dn\u00edka \u00fato\u010diaceho z prostredia verejn\u00e9ho internetu. V syst\u00e9me Achilles VJ CSIRT skenuje, spracov\u00e1va inform\u00e1cie o zranite\u013enostiach a informuje kontrolovan\u00fa in\u0161tit\u00faciu o zranite\u013enostiach, ktor\u00e9 s\u00fa detegovate\u013en\u00e9 z verejn\u00e9ho internetu.<\/p>\n\n\n\n

Achilles (874 kB)<\/a> [2024]<\/p>\n\n\n\n

Metodiky pre minim\u00e1lne bezpe\u010dnostn\u00e9 opatrenia kateg\u00f3rie I<\/h2>\n\n\n\n

Tento dokument V\u00e1m umo\u017en\u00ed zisti\u0165 z\u00e1kladn\u00fd stav bezpe\u010dnosti va\u0161ich IT syst\u00e9mov. Pomocou checklistu viete odhali\u0165 nedostatky zabezpe\u010denia IT syst\u00e9mov na z\u00e1klade ktor\u00fdch ich viete odstr\u00e1ni\u0165. Verzia 1.1 z 18.11.2021.
Metodika pre minim\u00e1lne bezpe\u010dnostn\u00e9 opatrenia kateg\u00f3rie I (302 kB)<\/a> [posledn\u00e1 aktualiz\u00e1cia: v2.0, 24.04.2024]<\/p>\n\n\n\n

Po\u017eiadavky na zabezpe\u010denie infra\u0161trukt\u00fary a rie\u0161enia implementovan\u00e9ho v r\u00e1mci OPII<\/h2>\n\n\n\n

Metodika predstavuje n\u00e1vrh z\u00e1kladn\u00fdch po\u017eiadaviek na systematick\u00e9 zabezpe\u010denie informa\u010dnej bezpe\u010dnosti v organiz\u00e1cii. Verzia 2.1 z 19.10.2020.
Metodika PDF (374 kB)<\/a> [posledn\u00e1 aktualiz\u00e1cia: v2.1, 19.10.2020]<\/p>\n\n\n\n

Kontroln\u00fd zoznam pre bezpe\u010dnos\u0165 webov\u00fdch aplik\u00e1ci\u00ed<\/h2>\n\n\n\n

Kontroln\u00fd zoznam stru\u010dne sumarizuje najd\u00f4le\u017eitej\u0161ie bezpe\u010dnostn\u00e9 aspekty pri v\u00fdvoji a prev\u00e1dzke webov\u00fdch str\u00e1nok a je mo\u017en\u00e9 ho vyu\u017ei\u0165 pri vykon\u00e1van\u00ed intern\u00e9ho auditu bezpe\u010dnosti webov\u00fdch aplik\u00e1ci\u00ed a webov\u00fdch str\u00e1nok.
Checklist-weby PDF (329 kB)<\/a> [posledn\u00e1 aktualiz\u00e1cia: 24.04.2024]<\/p>\n\n\n\n

Pr\u00edru\u010dka pre hardening – Windows<\/h2>\n\n\n\n

Pr\u00edru\u010dka sa zameriava na opera\u010dn\u00e9 syst\u00e9my zalo\u017een\u00e9 na Microsoft Windows NT jadre a popisuje ako hardenova\u0165 opera\u010dn\u00fd syst\u00e9m Microsoft Windows 7.
HardeningGuideWindows7 PDF (1,37 MB)<\/a><\/p>\n\n\n\n

\n

Pr\u00edru\u010dka zameran\u00e1 na hardening opera\u010dn\u00e9ho syst\u00e9mu Microsoft Windows 11.
HardeningGuideWindows11 PDF (899 kB)<\/a><\/p>\n<\/div><\/div>\n\n\n\n

Pr\u00edru\u010dka pre hardening – Linux<\/h2>\n\n\n\n

Star\u0161ia pr\u00edru\u010dka sa zameriava na opera\u010dn\u00e9 syst\u00e9my zalo\u017een\u00e9 na Linuxovom jadre a popisuje ako hardenova\u0165 opera\u010dn\u00e9 syst\u00e9my RHEL 5 a Debian.
HardeningGuideLinux PDF (1,33 MB)<\/a>

Pr\u00edru\u010dka zameran\u00e1 na automatizovan\u00fa konfigur\u00e1ciu syst\u00e9mov s OS Ubuntu Server, pr\u00edpadne Debian.
HardeningGuideUbuntu PDF (465 kB)<\/a>
<\/p>\n\n\n\n

Z\u00e1kladn\u00e1 ochrana pred \u00fatokmi na web I<\/h2>\n\n\n\n

V star\u0161ej pr\u00edru\u010dke sa popisuj\u00fa tri z\u00e1kladne druhy \u00fatokov na webov\u00e9 aplik\u00e1cie a ochrana pred t\u00fdmito \u00fatokmi.
Z\u00e1kladn\u00e1OchranaWeb PDF (469 kB)<\/a> [posledn\u00e1 aktualiz\u00e1cia: 24.04.2024]<\/p>\n\n\n\n

Ochrana pred \u00fatokmi DDoS<\/h2>\n\n\n\n

V star\u0161ej pr\u00edru\u010dke sa popisuj\u00fa druhy DDoS \u00fatokov a prevencia pred \u00fatokmi.
DDoS PDF (1,65 MB)<\/a><\/p>\n\n\n\n

Phishingov\u00e9 emaily: rozpoznanie a obrana<\/h2>\n\n\n\n

Pr\u00edru\u010dka sa zameriava na odha\u013eovanie podvodn\u00fdch phishingov\u00fdch emailov na z\u00e1klade rozpoznania ich znakov a na sp\u00f4soby, ako sa pred nimi chr\u00e1ni\u0165. Obsahuje tie\u017e anal\u00fdzu hlavi\u010dky emailu.
Phishing PDF (1,54 MB)<\/a><\/p>\n\n\n\n

Vedeli ste, \u017ee\u2026 – bezpe\u010dnostn\u00e9 odpor\u00fa\u010dania<\/h2>\n\n\n\n

\u0160estn\u00e1storo z\u00e1sad pre zv\u00fd\u0161enie kybernetickej bezpe\u010dnosti pre pou\u017e\u00edvate\u013eov aj administr\u00e1torov.
Vedeli ste \u017ee PDF (441 kB)<\/a>. [posledn\u00e1 aktualiz\u00e1cia: 27.4.2021]<\/p>\n","protected":false},"excerpt":{"rendered":"

V tejto \u010dasti uv\u00e1dzame materi\u00e1ly publikovan\u00e9 \u00fatvarom CSIRT.SK. Syst\u00e9m Achilles (Novel Vulnerability Management System) Vl\u00e1dna jednotka CSIRT prev\u00e1dzkuje syst\u00e9m Achilles,…<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"http:\/\/localhost:9000\/wp-json\/wp\/v2\/pages\/84"}],"collection":[{"href":"http:\/\/localhost:9000\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/localhost:9000\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/localhost:9000\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/localhost:9000\/wp-json\/wp\/v2\/comments?post=84"}],"version-history":[{"count":10,"href":"http:\/\/localhost:9000\/wp-json\/wp\/v2\/pages\/84\/revisions"}],"predecessor-version":[{"id":850,"href":"http:\/\/localhost:9000\/wp-json\/wp\/v2\/pages\/84\/revisions\/850"}],"wp:attachment":[{"href":"http:\/\/localhost:9000\/wp-json\/wp\/v2\/media?parent=84"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}