{"id":2763,"date":"2018-07-01T00:00:14","date_gmt":"2018-06-30T22:00:14","guid":{"rendered":"https:\/\/cyberawareness.sk\/?p=2763"},"modified":"2024-10-31T13:36:49","modified_gmt":"2024-10-31T12:36:49","slug":"testovanie-zranitelnosti-aplikacii","status":"publish","type":"post","link":"https:\/\/cyberawareness.sk\/en\/2018\/07\/01\/testovanie-zranitelnosti-aplikacii\/","title":{"rendered":"Testovanie zranite\u013enost\u00ed aplik\u00e1ci\u00ed"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"2763\" class=\"elementor elementor-2763\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fa18013 e-flex e-con-boxed e-con e-parent\" data-id=\"fa18013\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6e108e7 e-flex e-con-boxed e-con e-child\" data-id=\"6e108e7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-749fbad elementor-widget elementor-widget-ucaddon_square_icon_box\" data-id=\"749fbad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ucaddon_square_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<!-- start Icon Box -->\n\t\t<link id='font-awesome-css' href='https:\/\/cyberawareness.sk\/wp-content\/plugins\/unlimited-elements-for-elementor\/assets_libraries\/font-awesome6\/fontawesome-all.min.css' type='text\/css' rel='stylesheet' >\n\t\t<link id='font-awesome-4-shim-css' href='https:\/\/cyberawareness.sk\/wp-content\/plugins\/unlimited-elements-for-elementor\/assets_libraries\/font-awesome6\/fontawesome-v4-shims.min.css' type='text\/css' rel='stylesheet' >\n\t\t<link id='uc_ac_assets_file_blox_boxed_small_square_icon_box_css_0-css' href='https:\/\/cyberawareness.sk\/wp-content\/uploads\/ac_assets\/blox-boxed-small-square-icon-box\/blox-boxed-small-square-icon-box.css' type='text\/css' rel='stylesheet' >\n\n<style>\/* widget: Icon Box *\/\n\n#uc_square_icon_box_elementor_749fbad * { \n\tbox-sizing: border-box; \n}\n\n#uc_square_icon_box_elementor_749fbad{\n\tfont-family: inherit;\n    transition:0.3s;\n    position:relative;\n}\n\n#uc_square_icon_box_elementor_749fbad .blox-boxed-small-square-icon-box-icon{\n\t\n\tposition:relative;\n    display:flex;\n    justify-content:center;\n    align-items:center;\n    transform:rotate(0deg);\n    z-index:2;\n}\n#uc_square_icon_box_elementor_749fbad .ue-icon {\n  display:inline-block;\n}\n#uc_square_icon_box_elementor_749fbad .blox-boxed-small-square-icon-box-icon > div{\n\t\n\tposition:relative;\n    display:flex;\n    justify-content:center;\n    align-items:center;\n    transform:rotate(-0deg);\n}\n#uc_square_icon_box_elementor_749fbad .ue-icon-inner{\n    line-height:1em;\n\t} \t\n\n\n#uc_square_icon_box_elementor_749fbad .ue-icon-inner svg{\n    height:1em;\n    width:1em;\n\t} \t\n\t\n.blox-boxed-small-square-icon-box-heading{\n\tfont-size:21px;\n\t}\n\n\n#uc_square_icon_box_elementor_749fbad:hover\n{\n  position:relative;\n  z-index:1;\n}\n\n\n#uc_square_icon_box_elementor_749fbad .ue_box_button\n{\n  text-align:center;\n  text-decoration:none;\n  display:inline-block;\n  transition:0.3s;\n}\n\n\n#uc_square_icon_box_elementor_749fbad span.line\n{\n  display:block;\n  position:absolute;\n  top:0;\n  left:0;\n  width:0px;\n  transition:0.3s;\n}\n\n#uc_square_icon_box_elementor_749fbad:hover span.line\n{\n  width:100%;\n}\n\n#uc_square_icon_box_elementor_749fbad .ue-title-separator span\n{\n  display:inline-block;\n  transition:0.3s;\n}\n\n\n\n\n\n<\/style>\n\n<div class=\"square_icon_box\" id=\"uc_square_icon_box_elementor_749fbad\">\n  \n  \t\t  \n  \n              <div class=\"ue-icon\">\n       <a style=\"display:inline-block; text-decoration:none;\" href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/10\/240FB5E4D75942AAB26137589243BC04.pdf\" >         <div class=\"blox-boxed-small-square-icon-box-icon\" style=\"background-color: ;\">\n           <div class=\"ue-icon-inner\"><i class='fas fa-book'><\/i><\/div>\n         <\/div>\n       <\/a>       <\/div>\n         \n  \t\t        <div class=\"blox-boxed-small-square-icon-box-heading\">\n        \tPr\u00e1ca\n        <\/div>\n          \n  \t\t  \n  \n          \n  \t\t        \n          \n  \t\t  \n<\/div>\n<!-- end Icon Box -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8e851db elementor-widget elementor-widget-text-editor\" data-id=\"8e851db\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Autor: <\/strong>Bc. Lucia Koku\u013eov\u00e1<br \/><strong>\u0160kolite\u013e: <\/strong>doc. RNDr. JUDr. Pavol Sokol, PhD.<br \/><strong>Konzultant:<\/strong> MSc. Ter\u00e9zia M\u00e9ze\u0161ov\u00e1<span dir=\"ltr\" style=\"left: 58.83%;top: 74.06%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\"><br \/><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e5a0a23 elementor-widget elementor-widget-heading\" data-id=\"e5a0a23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Abstrakt<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b77c4c2 elementor-widget elementor-widget-text-editor\" data-id=\"b77c4c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Pr\u00e1ca sa zaober\u00e1 jednou z d\u00f4le\u017eit\u00fdch t\u00e9m informa\u010dnej bezpe\u010dnosti, testovan\u00edm zranite\u013enost\u00ed aplik\u00e1ci\u00ed. Ka\u017edoro\u010dne sa na internete objavuje \u010doraz viac nov\u00fdch aplik\u00e1ci\u00ed. Spolu s nimi sa objavuj\u00fa \u00fato\u010dn\u00edci h\u013eadaj\u00faci ich slab\u00e9 str\u00e1nky, teda zranite\u013enosti, ktor\u00e9 by vyu\u017eili vo svoj prospech. Je preto nutn\u00e9 neust\u00e1le odha\u013eova\u0165 a odstra\u0148ova\u0165 zranite\u013enosti aplik\u00e1ci\u00ed, napr\u00edklad testovan\u00edm zranite\u013enost\u00ed. To zah\u0155\u0148a nieko\u013eko r\u00f4znych met\u00f3d, ktor\u00e9 pokr\u00fdvaj\u00fa r\u00f4zne typy zranite\u013enost\u00ed. Pri testovan\u00ed zranite\u013enost\u00ed aplik\u00e1ci\u00ed je prv\u00fdm d\u00f4le\u017eit\u00fdm krokom, rozhodn\u00fa\u0165 sa ak\u00fdm sp\u00f4sobom sa tieto zranite\u013enosti bud\u00fa testova\u0165. V na\u0161ej pr\u00e1ci popisujeme tieto sp\u00f4soby a tie\u017e r\u00f4zne met\u00f3dy, ktor\u00e9 sa v s\u00fa\u010dasnosti naj\u010dastej\u0161ie pou\u017e\u00edvaj\u00fa pri statickej anal\u00fdze k\u00f3du, ktorou sa zaober\u00e1me. Hlavn\u00fdm cie\u013eom praktickej \u010dasti na\u0161ej pr\u00e1ce je implementova\u0165 jednu z t\u00fdchto met\u00f3d a takto prispie\u0165 do tvorby open source projektu SonarQube. Pravidl\u00e1 ktor\u00e9 sme implementovali, boli vybran\u00e9 tak, aby sa v n\u00e1stroji SonarQube ich implement\u00e1cia e\u0161te nenach\u00e1dzala. V tomto n\u00e1stroji sme takisto otestovali dve z aplik\u00e1ci\u00ed, ktor\u00e9 boli vytvoren\u00e9 na na\u0161ej univerzite.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e39a89a elementor-widget elementor-widget-heading\" data-id=\"e39a89a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Ciele<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-05fb267 elementor-widget elementor-widget-text-editor\" data-id=\"05fb267\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><span dir=\"ltr\" style=\"left: 24.77%;top: 37.19%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">Analyzova\u0165 mo\u017enosti testovania zranite\u013enost\u00ed aplik\u00e1cii<\/span><\/li><li><span dir=\"ltr\" style=\"left: 27.82%;top: 38.9%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">Porovna\u0165<\/span> <span dir=\"ltr\" style=\"left: 36.76%;top: 38.9%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">aktu\u00e1lne<\/span> <span dir=\"ltr\" style=\"left: 44.95%;top: 38.9%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">pr\u00edstupy<\/span> <span dir=\"ltr\" style=\"left: 52.92%;top: 38.9%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">and<\/span> <span dir=\"ltr\" style=\"left: 55.17%;top: 38.9%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">implement\u00e1cie<\/span> <span dir=\"ltr\" style=\"left: 68.39%;top: 38.9%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">testovania<\/span> <span dir=\"ltr\" style=\"left: 77.92%;top: 38.9%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">vulnerabilities <\/span><span dir=\"ltr\" style=\"left: 24.77%;top: 40.61%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">aplik\u00e1ci\u00ed<\/span><\/li><li><span dir=\"ltr\" style=\"left: 24.77%;top: 42.32%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">Navrhn\u00fa\u0165 a implementova\u0165 rozhranie pre vybran\u00e9 met\u00f3dy testovania <\/span><span dir=\"ltr\" style=\"left: 24.77%;top: 44.03%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">zranite\u013enosti aplik\u00e1cii<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-89aa96b elementor-widget elementor-widget-heading\" data-id=\"89aa96b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Literat\u00fara<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d149794 elementor-widget elementor-widget-text-editor\" data-id=\"d149794\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><span dir=\"ltr\" style=\"left: 24.77%;top: 46.42%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">MUELLER, John Paul. Security for Web Developers: Using JavaScript, <\/span><span dir=\"ltr\" style=\"left: 24.77%;top: 48.13%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">HTML, and CSS. &#8220; O&#8217;Reilly Media, Inc.&#8220;, 2015.<\/span><\/li><li><span dir=\"ltr\" style=\"left: 29.17%;top: 49.84%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">STUTTARD,<\/span> <span dir=\"ltr\" style=\"left: 42.08%;top: 49.84%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">Dafydd;<\/span> <span dir=\"ltr\" style=\"left: 50.73%;top: 49.84%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">PINTO,<\/span> <span dir=\"ltr\" style=\"left: 59.17%;top: 49.84%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">Marcus.<\/span> <span dir=\"ltr\" style=\"left: 67.76%;top: 49.84%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">The<\/span> <span dir=\"ltr\" style=\"left: 72.94%;top: 49.84%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">Web<\/span> <span dir=\"ltr\" style=\"left: 78.62%;top: 49.84%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">Application <\/span><span dir=\"ltr\" style=\"left: 24.77%;top: 51.55%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">Hacker&#8217;s Handbook: Finding and Exploiting Security Flaws. John Wiley &amp; <\/span><span dir=\"ltr\" style=\"left: 24.77%;top: 53.26%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">Sons, 2011.<\/span><\/li><li><span dir=\"ltr\" style=\"left: 28.46%;top: 54.97%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">SHEMA,<\/span> <span dir=\"ltr\" style=\"left: 37.35%;top: 54.97%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">Mike.<\/span> <span dir=\"ltr\" style=\"left: 43.44%;top: 54.97%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">Hacking<\/span> <span dir=\"ltr\" style=\"left: 51.6%;top: 54.97%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">web<\/span> <span dir=\"ltr\" style=\"left: 56.29%;top: 54.97%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">apps:<\/span> <span dir=\"ltr\" style=\"left: 61.87%;top: 54.97%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">detecting<\/span> <span dir=\"ltr\" style=\"left: 70.59%;top: 54.97%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">and<\/span> <span dir=\"ltr\" style=\"left: 74.83%;top: 54.97%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">preventing<\/span> <span dir=\"ltr\" style=\"left: 84.78%;top: 54.97%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">web <\/span><span dir=\"ltr\" style=\"left: 24.77%;top: 56.68%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">application security problems. Newnes, 2012.<\/span><\/li><li><span dir=\"ltr\" style=\"left: 24.77%;top: 58.39%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">MEUCCI, Matteo; MULLER, Andrew. The OWASP Testing Guide 4.0. <\/span><span dir=\"ltr\" style=\"left: 24.77%;top: 60.1%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">Open Web Application Security Project, 2014, 30.<br \/><\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a432df6 elementor-widget elementor-widget-heading\" data-id=\"a432df6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Priebeh pr\u00e1ce<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f13991a elementor-widget elementor-widget-text-editor\" data-id=\"f13991a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Zatia\u013e nezverejnen\u00e9<\/p><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Autor: Bc. Lucia Koku\u013eov\u00e1<br \/>\n\u0160kolite\u013e: doc. RNDr. JUDr. Pavol Sokol, PhD.<br \/>\nKonzultant: MSc. Ter\u00e9zia M\u00e9ze\u0161ov\u00e1<\/p>","protected":false},"author":8,"featured_media":2397,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ocean_post_layout":"full-width","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","ocean_post_oembed":"","ocean_post_self_hosted_media":"","ocean_post_video_embed":"","ocean_link_format":"","ocean_link_format_target":"self","ocean_quote_format":"","ocean_quote_format_link":"post","ocean_gallery_link_images":"on","ocean_gallery_id":[],"footnotes":""},"categories":[12],"tags":[],"class_list":["post-2763","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bakalarske-prace","entry","has-media"],"_links":{"self":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/posts\/2763","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/comments?post=2763"}],"version-history":[{"count":20,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/posts\/2763\/revisions"}],"predecessor-version":[{"id":3401,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/posts\/2763\/revisions\/3401"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/media\/2397"}],"wp:attachment":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/media?parent=2763"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/categories?post=2763"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/tags?post=2763"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}