{"id":84,"date":"2024-01-19T14:00:21","date_gmt":"2024-01-19T14:00:21","guid":{"rendered":"http:\/\/localhost:9000\/?page_id=84"},"modified":"2024-04-24T16:23:50","modified_gmt":"2024-04-24T16:23:50","slug":"nase-publikacie","status":"publish","type":"page","link":"http:\/\/localhost:9000\/nase-publikacie","title":{"rendered":"Na\u0161e publik\u00e1cie"},"content":{"rendered":"\n
V tejto \u010dasti uv\u00e1dzame materi\u00e1ly publikovan\u00e9 \u00fatvarom CSIRT.SK.<\/p>\n\n\n\n
Vl\u00e1dna jednotka CSIRT prev\u00e1dzkuje syst\u00e9m Achilles, ktor\u00fd bol vybudovan\u00fd na mana\u017ement zranite\u013enost\u00ed z poh\u013eadu \u00fato\u010dn\u00edka \u00fato\u010diaceho z prostredia verejn\u00e9ho internetu. V syst\u00e9me Achilles VJ CSIRT skenuje, spracov\u00e1va inform\u00e1cie o zranite\u013enostiach a informuje kontrolovan\u00fa in\u0161tit\u00faciu o zranite\u013enostiach, ktor\u00e9 s\u00fa detegovate\u013en\u00e9 z verejn\u00e9ho internetu.<\/p>\n\n\n\n
Achilles (874 kB)<\/a> [2024]<\/p>\n\n\n\n Tento dokument V\u00e1m umo\u017en\u00ed zisti\u0165 z\u00e1kladn\u00fd stav bezpe\u010dnosti va\u0161ich IT syst\u00e9mov. Pomocou checklistu viete odhali\u0165 nedostatky zabezpe\u010denia IT syst\u00e9mov na z\u00e1klade ktor\u00fdch ich viete odstr\u00e1ni\u0165. Verzia 1.1 z 18.11.2021. Metodika predstavuje n\u00e1vrh z\u00e1kladn\u00fdch po\u017eiadaviek na systematick\u00e9 zabezpe\u010denie informa\u010dnej bezpe\u010dnosti v organiz\u00e1cii. Verzia 2.1 z 19.10.2020. Kontroln\u00fd zoznam stru\u010dne sumarizuje najd\u00f4le\u017eitej\u0161ie bezpe\u010dnostn\u00e9 aspekty pri v\u00fdvoji a prev\u00e1dzke webov\u00fdch str\u00e1nok a je mo\u017en\u00e9 ho vyu\u017ei\u0165 pri vykon\u00e1van\u00ed intern\u00e9ho auditu bezpe\u010dnosti webov\u00fdch aplik\u00e1ci\u00ed a webov\u00fdch str\u00e1nok. Pr\u00edru\u010dka sa zameriava na opera\u010dn\u00e9 syst\u00e9my zalo\u017een\u00e9 na Microsoft Windows NT jadre a popisuje ako hardenova\u0165 opera\u010dn\u00fd syst\u00e9m Microsoft Windows 7. Pr\u00edru\u010dka zameran\u00e1 na hardening opera\u010dn\u00e9ho syst\u00e9mu Microsoft Windows 11. Star\u0161ia pr\u00edru\u010dka sa zameriava na opera\u010dn\u00e9 syst\u00e9my zalo\u017een\u00e9 na Linuxovom jadre a popisuje ako hardenova\u0165 opera\u010dn\u00e9 syst\u00e9my RHEL 5 a Debian. V star\u0161ej pr\u00edru\u010dke sa popisuj\u00fa tri z\u00e1kladne druhy \u00fatokov na webov\u00e9 aplik\u00e1cie a ochrana pred t\u00fdmito \u00fatokmi. V star\u0161ej pr\u00edru\u010dke sa popisuj\u00fa druhy DDoS \u00fatokov a prevencia pred \u00fatokmi. Pr\u00edru\u010dka sa zameriava na odha\u013eovanie podvodn\u00fdch phishingov\u00fdch emailov na z\u00e1klade rozpoznania ich znakov a na sp\u00f4soby, ako sa pred nimi chr\u00e1ni\u0165. Obsahuje tie\u017e anal\u00fdzu hlavi\u010dky emailu.Metodiky pre minim\u00e1lne bezpe\u010dnostn\u00e9 opatrenia kateg\u00f3rie I<\/h2>\n\n\n\n
Metodika pre minim\u00e1lne bezpe\u010dnostn\u00e9 opatrenia kateg\u00f3rie I (302 kB)<\/a> [posledn\u00e1 aktualiz\u00e1cia: v2.0, 24.04.2024]<\/p>\n\n\n\nPo\u017eiadavky na zabezpe\u010denie infra\u0161trukt\u00fary a rie\u0161enia implementovan\u00e9ho v r\u00e1mci OPII<\/h2>\n\n\n\n
Metodika PDF (374 kB)<\/a> [posledn\u00e1 aktualiz\u00e1cia: v2.1, 19.10.2020]<\/p>\n\n\n\nKontroln\u00fd zoznam pre bezpe\u010dnos\u0165 webov\u00fdch aplik\u00e1ci\u00ed<\/h2>\n\n\n\n
Checklist-weby PDF (329 kB)<\/a> [posledn\u00e1 aktualiz\u00e1cia: 24.04.2024]<\/p>\n\n\n\nPr\u00edru\u010dka pre hardening – Windows<\/h2>\n\n\n\n
HardeningGuideWindows7 PDF (1,37 MB)<\/a><\/p>\n\n\n\n
HardeningGuideWindows11 PDF (899 kB)<\/a><\/p>\n<\/div><\/div>\n\n\n\nPr\u00edru\u010dka pre hardening – Linux<\/h2>\n\n\n\n
HardeningGuideLinux PDF (1,33 MB)<\/a>
Pr\u00edru\u010dka zameran\u00e1 na automatizovan\u00fa konfigur\u00e1ciu syst\u00e9mov s OS Ubuntu Server, pr\u00edpadne Debian.
HardeningGuideUbuntu PDF (465 kB)<\/a>
<\/p>\n\n\n\nZ\u00e1kladn\u00e1 ochrana pred \u00fatokmi na web I<\/h2>\n\n\n\n
Z\u00e1kladn\u00e1OchranaWeb PDF (469 kB)<\/a> [posledn\u00e1 aktualiz\u00e1cia: 24.04.2024]<\/p>\n\n\n\nOchrana pred \u00fatokmi DDoS<\/h2>\n\n\n\n
DDoS PDF (1,65 MB)<\/a><\/p>\n\n\n\nPhishingov\u00e9 emaily: rozpoznanie a obrana<\/h2>\n\n\n\n
Phishing PDF (1,54 MB)<\/a><\/p>\n\n\n\nVedeli ste, \u017ee\u2026 – bezpe\u010dnostn\u00e9 odpor\u00fa\u010dania<\/h2>\n\n\n\n