{"id":9095,"date":"2026-04-06T09:07:16","date_gmt":"2026-04-06T07:07:16","guid":{"rendered":"https:\/\/cyberawareness.sk\/?page_id=9095"},"modified":"2026-04-07T00:08:21","modified_gmt":"2026-04-06T22:08:21","slug":"metodicka_cinnost","status":"publish","type":"page","link":"https:\/\/cyberawareness.sk\/en\/metodicka_cinnost\/","title":{"rendered":"Metodick\u00e1 \u010dinnos\u0165 v\u00a0oblasti KIB"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"9095\" class=\"elementor elementor-9095\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0dbe076 elementor-hidden-tablet elementor-hidden-mobile e-flex e-con-boxed e-con e-parent\" data-id=\"0dbe076\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d7c6a74 e-flex e-con-boxed e-con e-child\" data-id=\"d7c6a74\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b46c502 elementor-widget elementor-widget-spacer\" data-id=\"b46c502\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b1cbd28 elementor-widget elementor-widget-heading\" data-id=\"b1cbd28\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Expertn\u00e1<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0d96ee1 elementor-widget elementor-widget-heading\" data-id=\"0d96ee1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">a odborn\u00e1 \u010dinnos\u0165<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-87736eb e-flex e-con-boxed e-con e-parent\" data-id=\"87736eb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-84a5673 elementor-widget elementor-widget-text-editor\" data-id=\"84a5673\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>A3. Metodick\u00e1 \u010dinnos\u0165 v oblasti kybernetickej a informa\u010dnej bezpe\u010dnosti<\/h2><p><strong>Metodick\u00e1 \u010dinnos\u0165<\/strong> KC KB UPJ\u0160 v oblasti kybernetickej a informa\u010dnej bezpe\u010dnosti je zameran\u00e1 na tvorbu prakticky vyu\u017eite\u013en\u00fdch metod\u00edk a postupov pre potreby verejnej spr\u00e1vy reflektuj\u00facich aktu\u00e1lne technologick\u00e9 a bezpe\u010dnostn\u00e9 trendy. D\u00f4raz sa kladie najm\u00e4 na formulovanie odpor\u00fa\u010dan\u00ed reaguj\u00facich na vznikaj\u00face kybernetick\u00e9 bezpe\u010dnostn\u00e9 hrozby vr\u00e1tane dopadov umelej inteligencie a riz\u00edk spojen\u00fdch s dod\u00e1vate\u013esk\u00fdmi vz\u0165ahmi. S\u00fa\u010das\u0165ou metodickej \u010dinnosti je aj podpora implement\u00e1cie novej legislat\u00edvy v\u00a0oblasti kybernetickej a\u00a0informa\u010dnej bezpe\u010dnosti s cie\u013eom zabezpe\u010di\u0165 jej efekt\u00edvne uplat\u0148ovanie v praxi. V\u00fdznamn\u00fa oblas\u0165 predstavuj\u00fa odpor\u00fa\u010dania pre rie\u0161enie \u0161tandardn\u00fdch kybernetick\u00fdch bezpe\u010dnostn\u00fdch incidentov a postupy strategickej komunik\u00e1cie smerom k verejnosti. Metodiky z\u00e1rove\u0148 zoh\u013ead\u0148uj\u00fa \u0161pecifik\u00e1 vybran\u00fdch sektorov, najm\u00e4 zdravotn\u00edctva, kde je spracovanie citliv\u00fdch \u00fadajov kritick\u00e9. Osobitn\u00e1 pozornos\u0165 je venovan\u00e1 aj problematike hoaxov a dezinform\u00e1ci\u00ed a n\u00e1vrhu opatren\u00ed na posilnenie odolnosti verejnej spr\u00e1vy vo\u010di t\u00fdmto hrozb\u00e1m.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b6d8aec elementor-widget elementor-widget-text-editor\" data-id=\"b6d8aec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><span style=\"color: #ff6600;\"><strong>1. Metodiky a postupy pre subjekty verejnej spr\u00e1vy<\/strong><\/span><\/h3><p>V r\u00e1mci KC KB UPJ\u0160 sa pripravili nasleduj\u00face v\u00fdstupy:<\/p><p><strong>\u00a0Pr\u00e1vne aspekty ochrany osobn\u00fdch \u00fadajov<\/strong><\/p><p>Metodika sa zameriava na systematick\u00e9 vysvetlenie pr\u00e1vneho r\u00e1mca ochrany osobn\u00fdch \u00fadajov v podmienkach verejnej spr\u00e1vy, najm\u00e4 v kontexte GDPR a n\u00e1rodnej legislat\u00edvy. Poskytuje v\u00fdklad z\u00e1kladn\u00fdch pojmov, z\u00e1sad sprac\u00favania osobn\u00fdch \u00fadajov a identifikuje k\u013e\u00fa\u010dov\u00e9 povinnosti spr\u00e1vcov a spracovate\u013eov. V\u00fdznamnou s\u00fa\u010das\u0165ou je anal\u00fdza praktick\u00fdch v\u00fdziev vypl\u00fdvaj\u00facich z digitaliz\u00e1cie a vyu\u017e\u00edvania modern\u00fdch technol\u00f3gi\u00ed, vr\u00e1tane umelej inteligencie. Dokument z\u00e1rove\u0148 pon\u00faka odpor\u00fa\u010dania pre spr\u00e1vnu aplik\u00e1ciu pr\u00e1vnych predpisov v praxi verejnej spr\u00e1vy.<\/p><p><strong>Kybernetick\u00e1 bezpe\u010dnos\u0165 v zdravotn\u00edckych zariadeniach<\/strong><\/p><p>Metodika sa venuje \u0161pecifick\u00fdm rizik\u00e1m kybernetickej a informa\u010dnej bezpe\u010dnosti v sektore zdravotn\u00edctva, ktor\u00fd patr\u00ed medzi kritick\u00fa infra\u0161trukt\u00faru, ale s\u00fa\u010dasne viacer\u00e9 subjekty m\u00f4\u017eeme zaradi\u0165 medzi spr\u00e1vcov informa\u010dn\u00fdch technol\u00f3gi\u00ed verejnej spr\u00e1vy. Metodika analyzuje typick\u00e9 scen\u00e1re \u00fatokov, ako s\u00fa ransomv\u00e9r, \u00fanik zdravotn\u00fdch \u00fadajov \u010di naru\u0161enie prev\u00e1dzky nemocni\u010dn\u00fdch syst\u00e9mov. Dokument identifikuje hlavn\u00e9 zranite\u013enosti zdravotn\u00edckych informa\u010dn\u00fdch syst\u00e9mov a navrhuje konkr\u00e9tne opatrenia na ich ochranu. Z\u00e1rove\u0148 zd\u00f4raz\u0148uje potrebu systematick\u00e9ho riadenia bezpe\u010dnosti a implement\u00e1cie legislat\u00edvnych po\u017eiadaviek v tomto citlivom sektore.<\/p><p><strong>Kritick\u00e9 myslenie a odolnos\u0165 vo\u010di dezinform\u00e1ci\u00e1m<\/strong><\/p><p>Metodika je zameran\u00e1 na rozvoj kritick\u00e9ho myslenia ako k\u013e\u00fa\u010dovej kompetencie zamestnancov verejnej spr\u00e1vy v prostred\u00ed informa\u010dn\u00e9ho pre\u0165a\u017eenia. Vysvet\u013euje z\u00e1kladn\u00e9 princ\u00edpy hodnotenia inform\u00e1ci\u00ed, identifik\u00e1cie manipulat\u00edvnych techn\u00edk a rozli\u0161ovania medzi faktami a dezinform\u00e1ciami. S\u00fa\u010das\u0165ou s\u00fa aj praktick\u00e9 n\u00e1stroje a postupy vyu\u017eite\u013en\u00e9 pri ka\u017edodennej pr\u00e1ci, vr\u00e1tane overovania zdrojov a anal\u00fdzy argumentov. Dokument prispieva k posilneniu informa\u010dnej odolnosti verejnej spr\u00e1vy a zni\u017eovaniu dopadov hoaxov a dezinform\u00e1ci\u00ed.<\/p><p><strong>Manu\u00e1l bezpe\u010dn\u00e9ho pou\u017e\u00edvania soci\u00e1lnych siet\u00ed org\u00e1nmi verejnej spr\u00e1vy<\/strong><\/p><p>Tento manu\u00e1l poskytuje komplexn\u00fd s\u00fabor odpor\u00fa\u010dan\u00ed pre bezpe\u010dn\u00e9 a efekt\u00edvne vyu\u017e\u00edvanie soci\u00e1lnych siet\u00ed v komunik\u00e1cii verejnej spr\u00e1vy. Zameriava sa na strategick\u00fd pr\u00edstup k spr\u00e1ve \u00fa\u010dtov, ochranu pr\u00edstupov, zodpovednos\u0165 za obsah a budovanie d\u00f4veryhodnej komunik\u00e1cie s verejnos\u0165ou. D\u00f4le\u017eitou s\u00fa\u010das\u0165ou s\u00fa aj odpor\u00fa\u010dania pre boj proti dezinform\u00e1ci\u00e1m, moderovanie diskusi\u00ed a riadenie reputa\u010dn\u00fdch riz\u00edk. Dokument reflektuje aktu\u00e1lne trendy digit\u00e1lnej komunik\u00e1cie a zd\u00f4raz\u0148uje potrebu kontinu\u00e1lneho prisp\u00f4sobovania sa dynamick\u00e9mu informa\u010dn\u00e9mu prostrediu.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9a00951 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"9a00951\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2026\/04\/KCKB_UPJS_pravne_aspekty_OOU.pdf\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-file-pdf\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M369.9 97.9L286 14C277 5 264.8-.1 252.1-.1H48C21.5 0 0 21.5 0 48v416c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48V131.9c0-12.7-5.1-25-14.1-34zM332.1 128H256V51.9l76.1 76.1zM48 464V48h160v104c0 13.3 10.7 24 24 24h104v288H48zm250.2-143.7c-12.2-12-47-8.7-64.4-6.5-17.2-10.5-28.7-25-36.8-46.3 3.9-16.1 10.1-40.6 5.4-56-4.2-26.2-37.8-23.6-42.6-5.9-4.4 16.1-.4 38.5 7 67.1-10 23.9-24.9 56-35.4 74.4-20 10.3-47 26.2-51 46.2-3.3 15.8 26 55.2 76.1-31.2 22.4-7.4 46.8-16.5 68.4-20.1 18.9 10.2 41 17 55.8 17 25.5 0 28-28.2 17.5-38.7zm-198.1 77.8c5.1-13.7 24.5-29.5 30.4-35-19 30.3-30.4 35.7-30.4 35zm81.6-190.6c7.4 0 6.7 32.1 1.8 40.8-4.4-13.9-4.3-40.8-1.8-40.8zm-24.4 136.6c9.7-16.9 18-37 24.7-54.7 8.3 15.1 18.9 27.2 30.1 35.5-20.8 4.3-38.9 13.1-54.8 19.2zm131.6-5s-5 6-37.3-7.8c35.1-2.6 40.9 5.4 37.3 7.8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Metodika pre subjekty verejnej spr\u00e1vy - Pr\u00e1vne aspekty ochrany osobn\u00fdch \u00fadajov<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2026\/04\/KCKB_UPJS_KB_v_zdravotnickych_zariadeniach.pdf\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-file-pdf\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M369.9 97.9L286 14C277 5 264.8-.1 252.1-.1H48C21.5 0 0 21.5 0 48v416c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48V131.9c0-12.7-5.1-25-14.1-34zM332.1 128H256V51.9l76.1 76.1zM48 464V48h160v104c0 13.3 10.7 24 24 24h104v288H48zm250.2-143.7c-12.2-12-47-8.7-64.4-6.5-17.2-10.5-28.7-25-36.8-46.3 3.9-16.1 10.1-40.6 5.4-56-4.2-26.2-37.8-23.6-42.6-5.9-4.4 16.1-.4 38.5 7 67.1-10 23.9-24.9 56-35.4 74.4-20 10.3-47 26.2-51 46.2-3.3 15.8 26 55.2 76.1-31.2 22.4-7.4 46.8-16.5 68.4-20.1 18.9 10.2 41 17 55.8 17 25.5 0 28-28.2 17.5-38.7zm-198.1 77.8c5.1-13.7 24.5-29.5 30.4-35-19 30.3-30.4 35.7-30.4 35zm81.6-190.6c7.4 0 6.7 32.1 1.8 40.8-4.4-13.9-4.3-40.8-1.8-40.8zm-24.4 136.6c9.7-16.9 18-37 24.7-54.7 8.3 15.1 18.9 27.2 30.1 35.5-20.8 4.3-38.9 13.1-54.8 19.2zm131.6-5s-5 6-37.3-7.8c35.1-2.6 40.9 5.4 37.3 7.8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Metodika pre subjekty verejnej spr\u00e1vy - Kybernetick\u00e1 bezpe\u010dnos\u0165 v zdravotn\u00edckych zariadeniach<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2026\/04\/KCKB_UPJS_kriticke_myslenie.pdf\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-file-pdf\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M369.9 97.9L286 14C277 5 264.8-.1 252.1-.1H48C21.5 0 0 21.5 0 48v416c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48V131.9c0-12.7-5.1-25-14.1-34zM332.1 128H256V51.9l76.1 76.1zM48 464V48h160v104c0 13.3 10.7 24 24 24h104v288H48zm250.2-143.7c-12.2-12-47-8.7-64.4-6.5-17.2-10.5-28.7-25-36.8-46.3 3.9-16.1 10.1-40.6 5.4-56-4.2-26.2-37.8-23.6-42.6-5.9-4.4 16.1-.4 38.5 7 67.1-10 23.9-24.9 56-35.4 74.4-20 10.3-47 26.2-51 46.2-3.3 15.8 26 55.2 76.1-31.2 22.4-7.4 46.8-16.5 68.4-20.1 18.9 10.2 41 17 55.8 17 25.5 0 28-28.2 17.5-38.7zm-198.1 77.8c5.1-13.7 24.5-29.5 30.4-35-19 30.3-30.4 35.7-30.4 35zm81.6-190.6c7.4 0 6.7 32.1 1.8 40.8-4.4-13.9-4.3-40.8-1.8-40.8zm-24.4 136.6c9.7-16.9 18-37 24.7-54.7 8.3 15.1 18.9 27.2 30.1 35.5-20.8 4.3-38.9 13.1-54.8 19.2zm131.6-5s-5 6-37.3-7.8c35.1-2.6 40.9 5.4 37.3 7.8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Metodika pre subjekty verejnej spr\u00e1vy - Kritick\u00e9 myslenie a odolnos\u0165 vo\u010di dezinform\u00e1ci\u00e1m<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2026\/04\/KCKB_UPJS_manual_bezpecneho_pouzivania_socialnych_sieti_OVS.pdf\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-file-pdf\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M369.9 97.9L286 14C277 5 264.8-.1 252.1-.1H48C21.5 0 0 21.5 0 48v416c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48V131.9c0-12.7-5.1-25-14.1-34zM332.1 128H256V51.9l76.1 76.1zM48 464V48h160v104c0 13.3 10.7 24 24 24h104v288H48zm250.2-143.7c-12.2-12-47-8.7-64.4-6.5-17.2-10.5-28.7-25-36.8-46.3 3.9-16.1 10.1-40.6 5.4-56-4.2-26.2-37.8-23.6-42.6-5.9-4.4 16.1-.4 38.5 7 67.1-10 23.9-24.9 56-35.4 74.4-20 10.3-47 26.2-51 46.2-3.3 15.8 26 55.2 76.1-31.2 22.4-7.4 46.8-16.5 68.4-20.1 18.9 10.2 41 17 55.8 17 25.5 0 28-28.2 17.5-38.7zm-198.1 77.8c5.1-13.7 24.5-29.5 30.4-35-19 30.3-30.4 35.7-30.4 35zm81.6-190.6c7.4 0 6.7 32.1 1.8 40.8-4.4-13.9-4.3-40.8-1.8-40.8zm-24.4 136.6c9.7-16.9 18-37 24.7-54.7 8.3 15.1 18.9 27.2 30.1 35.5-20.8 4.3-38.9 13.1-54.8 19.2zm131.6-5s-5 6-37.3-7.8c35.1-2.6 40.9 5.4 37.3 7.8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Metodika pre subjekty verejnej spr\u00e1vy - Manu\u00e1l bezpe\u010dn\u00e9ho pou\u017e\u00edvania soci\u00e1lnych siet\u00ed org\u00e1nmi verejnej spr\u00e1vy<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c9c575a elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"c9c575a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5af809e elementor-widget elementor-widget-text-editor\" data-id=\"5af809e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><span style=\"color: #ff6600;\">2. Analytick\u00e9 spr\u00e1vy o aktu\u00e1lnych kybernetick\u00fdch hrozb\u00e1ch<\/span><\/h3><p>KC KB UPJ\u0160 pravidelne sprac\u00fava analytick\u00e9 materi\u00e1ly zameran\u00e9 na monitorovanie a vyhodnocovanie aktu\u00e1lnych kybernetick\u00fdch bezpe\u010dnostn\u00fdch hrozieb na z\u00e1klade re\u00e1lnych d\u00e1t z\u00edskan\u00fdch z\u00a0honeypotov (pasc\u00ed pre \u00fato\u010dn\u00edkov). Tieto spr\u00e1vy poskytuj\u00fa detailn\u00fd poh\u013ead na spr\u00e1vanie \u00fato\u010dn\u00edkov, identifikuj\u00fa naj\u010dastej\u0161ie cie\u013eov\u00e9 slu\u017eby a sie\u0165ov\u00e9 porty a analyzuj\u00fa intenzitu a dynamiku \u00fatokov v \u010dase. V\u00fdznamn\u00fdm pr\u00ednosom je aj geografick\u00e1 anal\u00fdza zdrojov \u00fatokov a identifik\u00e1cia trendov v r\u00e1mci r\u00f4znych kampan\u00ed .<\/p><p>Spr\u00e1vy z\u00e1rove\u0148 obsahuj\u00fa predspracovan\u00e9 datasety vhodn\u00e9 na \u010fal\u0161ie vyu\u017eitie vo v\u00fdskume, napr\u00edklad pre tr\u00e9novanie modelov strojov\u00e9ho u\u010denia alebo detekciu anom\u00e1li\u00ed. Anal\u00fdza poukazuje na pretrv\u00e1vaj\u00face kybernetick\u00e9 \u00fatoky, ako s\u00fa \u00fatoky hrubou silou (brute-force \u00fatoky) na secure shell (SSH), \u00fatoky na datab\u00e1zov\u00e9 slu\u017eby \u010di \u0161\u00edrenie malv\u00e9ru prostredn\u00edctvom zranite\u013enost\u00ed v sie\u0165ov\u00fdch protokoloch. V\u00fdstupy tak predstavuj\u00fa praktick\u00fd n\u00e1stroj pre zvy\u0161ovanie situa\u010dn\u00e9ho povedomia a podporu rozhodovania v oblasti kybernetickej a informa\u010dnej bezpe\u010dnosti.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c75b90c elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"c75b90c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2026\/04\/KCKB_UPJS_kyberneticke_hrozby_oct_2024_apr_2025.pdf\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-file-pdf\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M369.9 97.9L286 14C277 5 264.8-.1 252.1-.1H48C21.5 0 0 21.5 0 48v416c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48V131.9c0-12.7-5.1-25-14.1-34zM332.1 128H256V51.9l76.1 76.1zM48 464V48h160v104c0 13.3 10.7 24 24 24h104v288H48zm250.2-143.7c-12.2-12-47-8.7-64.4-6.5-17.2-10.5-28.7-25-36.8-46.3 3.9-16.1 10.1-40.6 5.4-56-4.2-26.2-37.8-23.6-42.6-5.9-4.4 16.1-.4 38.5 7 67.1-10 23.9-24.9 56-35.4 74.4-20 10.3-47 26.2-51 46.2-3.3 15.8 26 55.2 76.1-31.2 22.4-7.4 46.8-16.5 68.4-20.1 18.9 10.2 41 17 55.8 17 25.5 0 28-28.2 17.5-38.7zm-198.1 77.8c5.1-13.7 24.5-29.5 30.4-35-19 30.3-30.4 35.7-30.4 35zm81.6-190.6c7.4 0 6.7 32.1 1.8 40.8-4.4-13.9-4.3-40.8-1.8-40.8zm-24.4 136.6c9.7-16.9 18-37 24.7-54.7 8.3 15.1 18.9 27.2 30.1 35.5-20.8 4.3-38.9 13.1-54.8 19.2zm131.6-5s-5 6-37.3-7.8c35.1-2.6 40.9 5.4 37.3 7.8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Analytick\u00fd materi\u00e1l - Aktu\u00e1lne kybernetick\u00e9 bezpe\u010dnostn\u00e9 hrozby - 10\/2024 \u2013 4\/2025<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2026\/04\/KCKB_UPJS_kyberneticke_hrozby_jul-2025_jan_2026.pdf\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-file-pdf\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M369.9 97.9L286 14C277 5 264.8-.1 252.1-.1H48C21.5 0 0 21.5 0 48v416c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48V131.9c0-12.7-5.1-25-14.1-34zM332.1 128H256V51.9l76.1 76.1zM48 464V48h160v104c0 13.3 10.7 24 24 24h104v288H48zm250.2-143.7c-12.2-12-47-8.7-64.4-6.5-17.2-10.5-28.7-25-36.8-46.3 3.9-16.1 10.1-40.6 5.4-56-4.2-26.2-37.8-23.6-42.6-5.9-4.4 16.1-.4 38.5 7 67.1-10 23.9-24.9 56-35.4 74.4-20 10.3-47 26.2-51 46.2-3.3 15.8 26 55.2 76.1-31.2 22.4-7.4 46.8-16.5 68.4-20.1 18.9 10.2 41 17 55.8 17 25.5 0 28-28.2 17.5-38.7zm-198.1 77.8c5.1-13.7 24.5-29.5 30.4-35-19 30.3-30.4 35.7-30.4 35zm81.6-190.6c7.4 0 6.7 32.1 1.8 40.8-4.4-13.9-4.3-40.8-1.8-40.8zm-24.4 136.6c9.7-16.9 18-37 24.7-54.7 8.3 15.1 18.9 27.2 30.1 35.5-20.8 4.3-38.9 13.1-54.8 19.2zm131.6-5s-5 6-37.3-7.8c35.1-2.6 40.9 5.4 37.3 7.8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Analytick\u00fd materi\u00e1l - Aktu\u00e1lne kybernetick\u00e9 bezpe\u010dnostn\u00e9 hrozby - 7\/2025 \u2013 1\/2026<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Expertn\u00e1 a odborn\u00e1 \u010dinnos\u0165 A3. Metodick\u00e1 \u010dinnos\u0165 v oblasti kybernetickej a informa\u010dnej bezpe\u010dnosti Metodick\u00e1 \u010dinnos\u0165 KC KB UPJ\u0160 v oblasti kybernetickej a informa\u010dnej bezpe\u010dnosti je zameran\u00e1 na tvorbu prakticky vyu\u017eite\u013en\u00fdch metod\u00edk a postupov pre potreby verejnej spr\u00e1vy reflektuj\u00facich aktu\u00e1lne technologick\u00e9 a bezpe\u010dnostn\u00e9 trendy. D\u00f4raz sa kladie najm\u00e4 na formulovanie odpor\u00fa\u010dan\u00ed reaguj\u00facich na vznikaj\u00face kybernetick\u00e9 bezpe\u010dnostn\u00e9 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","footnotes":""},"class_list":["post-9095","page","type-page","status-publish","hentry","entry"],"_links":{"self":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages\/9095","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/comments?post=9095"}],"version-history":[{"count":54,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages\/9095\/revisions"}],"predecessor-version":[{"id":9203,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages\/9095\/revisions\/9203"}],"wp:attachment":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/media?parent=9095"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}