{"id":2861,"date":"2019-07-01T00:00:26","date_gmt":"2019-06-30T22:00:26","guid":{"rendered":"https:\/\/cyberawareness.sk\/?p=2861"},"modified":"2024-10-31T13:54:31","modified_gmt":"2024-10-31T12:54:31","slug":"pristupy-k-osetreniu-uniku-dat-z-pamate","status":"publish","type":"post","link":"https:\/\/cyberawareness.sk\/en\/2019\/07\/01\/pristupy-k-osetreniu-uniku-dat-z-pamate\/","title":{"rendered":"Pr\u00edstupy k o\u0161etreniu \u00faniku d\u00e1t z pam\u00e4te"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"2861\" class=\"elementor elementor-2861\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fa18013 e-flex e-con-boxed e-con e-parent\" data-id=\"fa18013\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6e108e7 e-flex e-con-boxed e-con e-child\" data-id=\"6e108e7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-749fbad elementor-widget elementor-widget-ucaddon_square_icon_box\" data-id=\"749fbad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ucaddon_square_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<!-- start Icon Box -->\n\t\t<link id='font-awesome-css' href='https:\/\/cyberawareness.sk\/wp-content\/plugins\/unlimited-elements-for-elementor\/assets_libraries\/font-awesome6\/fontawesome-all.min.css' type='text\/css' rel='stylesheet' >\n\t\t<link id='font-awesome-4-shim-css' href='https:\/\/cyberawareness.sk\/wp-content\/plugins\/unlimited-elements-for-elementor\/assets_libraries\/font-awesome6\/fontawesome-v4-shims.min.css' type='text\/css' rel='stylesheet' >\n\t\t<link id='uc_ac_assets_file_blox_boxed_small_square_icon_box_css_0-css' href='https:\/\/cyberawareness.sk\/wp-content\/uploads\/ac_assets\/blox-boxed-small-square-icon-box\/blox-boxed-small-square-icon-box.css' type='text\/css' rel='stylesheet' >\n\n<style>\/* widget: Icon Box *\/\n\n#uc_square_icon_box_elementor_749fbad * { \n\tbox-sizing: border-box; \n}\n\n#uc_square_icon_box_elementor_749fbad{\n\tfont-family: inherit;\n    transition:0.3s;\n    position:relative;\n}\n\n#uc_square_icon_box_elementor_749fbad .blox-boxed-small-square-icon-box-icon{\n\t\n\tposition:relative;\n    display:flex;\n    justify-content:center;\n    align-items:center;\n    transform:rotate(0deg);\n    z-index:2;\n}\n#uc_square_icon_box_elementor_749fbad .ue-icon {\n  display:inline-block;\n}\n#uc_square_icon_box_elementor_749fbad .blox-boxed-small-square-icon-box-icon > div{\n\t\n\tposition:relative;\n    display:flex;\n    justify-content:center;\n    align-items:center;\n    transform:rotate(-0deg);\n}\n#uc_square_icon_box_elementor_749fbad .ue-icon-inner{\n    line-height:1em;\n\t} \t\n\n\n#uc_square_icon_box_elementor_749fbad .ue-icon-inner svg{\n    height:1em;\n    width:1em;\n\t} \t\n\t\n.blox-boxed-small-square-icon-box-heading{\n\tfont-size:21px;\n\t}\n\n\n#uc_square_icon_box_elementor_749fbad:hover\n{\n  position:relative;\n  z-index:1;\n}\n\n\n#uc_square_icon_box_elementor_749fbad .ue_box_button\n{\n  text-align:center;\n  text-decoration:none;\n  display:inline-block;\n  transition:0.3s;\n}\n\n\n#uc_square_icon_box_elementor_749fbad span.line\n{\n  display:block;\n  position:absolute;\n  top:0;\n  left:0;\n  width:0px;\n  transition:0.3s;\n}\n\n#uc_square_icon_box_elementor_749fbad:hover span.line\n{\n  width:100%;\n}\n\n#uc_square_icon_box_elementor_749fbad .ue-title-separator span\n{\n  display:inline-block;\n  transition:0.3s;\n}\n\n\n\n\n\n<\/style>\n\n<div class=\"square_icon_box\" id=\"uc_square_icon_box_elementor_749fbad\">\n  \n  \t\t  \n  \n              <div class=\"ue-icon\">\n       <a style=\"display:inline-block; text-decoration:none;\" href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/10\/3CA70F295A264024B677BF4F3786524E.pdf\" >         <div class=\"blox-boxed-small-square-icon-box-icon\" style=\"background-color: ;\">\n           <div class=\"ue-icon-inner\"><i class='fas fa-book'><\/i><\/div>\n         <\/div>\n       <\/a>       <\/div>\n         \n  \t\t        <div class=\"blox-boxed-small-square-icon-box-heading\">\n        \tPr\u00e1ca\n        <\/div>\n          \n  \t\t  \n  \n          \n  \t\t        \n          \n  \t\t  \n<\/div>\n<!-- end Icon Box -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8e851db elementor-widget elementor-widget-text-editor\" data-id=\"8e851db\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Autor: <\/strong>Bc. Katar\u00edna Amrichov\u00e1<br \/><strong>\u0160kolite\u013e: <\/strong>MSc. Ter\u00e9zia M\u00e9ze\u0161ov\u00e1<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e5a0a23 elementor-widget elementor-widget-heading\" data-id=\"e5a0a23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Abstrakt<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b77c4c2 elementor-widget elementor-widget-text-editor\" data-id=\"b77c4c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Po\u010d\u00edta\u010dov\u00e9 programy \u010dasto pracuj\u00fa s r\u00f4znymi citliv\u00fdmi \u00fadajmi, ktor\u00e9 sa zv\u00e4\u010d\u0161a ukladaj\u00fa a spracov\u00e1vaj\u00fa ako re\u0165azce, pri\u010dom v objektovo orientovan\u00fdch programovac\u00edch jazykoch sa na tento \u00fa\u010del pou\u017e\u00edva trieda String. Ukladanie citliv\u00fdch \u00fadajov do objektu typu String v\u0161ak nie je bezpe\u010dn\u00e9, preto\u017ee String je ne\u0161ifrovan\u00fd a navy\u0161e sa v opera\u010dnej pam\u00e4ti m\u00f4\u017ee nach\u00e1dza\u0165 dlho potom ako prestal by\u0165 potrebn\u00fd, pri\u010dom program\u00e1tor si nedok\u00e1\u017ee vyn\u00fati\u0165 jeho vymazanie \u2013 za to je zodpovedn\u00fd Garbage Collector, ktor\u00fd sa spr\u00e1va ve\u013emi nedeterministicky. Ak sa String obsahuj\u00faci citliv\u00e9 \u00fadaje nach\u00e1dza v opera\u010dnej pam\u00e4ti a \u00fato\u010dn\u00edk sa dostane bu\u010f k jej \u010dasti alebo priamo k cel\u00e9mu obrazu, dok\u00e1\u017ee tieto citliv\u00e9 \u00fadaje po\u013eahky pre\u010d\u00edta\u0165. T\u00e1to pr\u00e1ca sa zaober\u00e1 \u00fatokmi s t\u00fdmto cie\u013eom a analyzuj\u00fa sa v nej existuj\u00face rie\u0161enia vo\u010di podobn\u00fdm \u00fatokom. V\u00fdsledkom na\u0161ej pr\u00e1ce je pseudok\u00f3d, ktor\u00fd popisuje \u0161trukt\u00faru a fungovanie triedy SecureString sl\u00fa\u017eiacej ako bezpe\u010dn\u00e1 alternat\u00edva ku String-u. SecureString \u0161ifruje citliv\u00e9 \u00fadaje, ktor\u00e9 uchov\u00e1va, taktie\u017e poskytuje met\u00f3dy na ich \u00fapravu a porovn\u00e1vanie a dovo\u013euje program\u00e1torovi \u00faplne odstr\u00e1ni\u0165 citliv\u00fd obsah z opera\u010dnej pam\u00e4te, kedyko\u013evek prestane by\u0165 potrebn\u00fd. N\u00e1\u0161 n\u00e1vrh je kompatibiln\u00fd so \u0161tandardom Payment Card Industry Data Security Standard (PCI DSS), je teda mo\u017en\u00e9 pou\u017e\u00edva\u0165 ho aj na sprac\u00favanie \u00fadajov s\u00favisiacich s platobn\u00fdmi kartami.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e39a89a elementor-widget elementor-widget-heading\" data-id=\"e39a89a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Ciele<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-05fb267 elementor-widget elementor-widget-text-editor\" data-id=\"05fb267\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><span dir=\"ltr\" style=\"left: 24.76%;top: 37.19%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">Analyzova\u0165 a spracova\u0165 sp\u00f4soby z\u00edskania d\u00e1t z pam\u00e4te alokovanej aplik\u00e1ciou<\/span><\/li><li><span dir=\"ltr\" style=\"left: 24.76%;top: 38.9%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">Analyzova\u0165 a spracova\u0165 aktu\u00e1lne pr\u00edstupy k o\u0161etreniu \u00faniku d\u00e1t z pam\u00e4te <\/span><span dir=\"ltr\" style=\"left: 24.76%;top: 40.61%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">alokovanej aplik\u00e1ciou<\/span><\/li><li><span dir=\"ltr\" style=\"left: 24.76%;top: 42.32%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">Navrhn\u00fa\u0165, implementova\u0165, a vyhodnoti\u0165 prevent\u00edvne opatrenie vo\u010di \u00faniku <\/span><span dir=\"ltr\" style=\"left: 24.76%;top: 44.03%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">d\u00e1t z pam\u00e4te na \u00farovni zdrojov\u00e9ho k\u00f3du aplik\u00e1cie<br \/><\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-89aa96b elementor-widget elementor-widget-heading\" data-id=\"89aa96b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Literat\u00fara<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d149794 elementor-widget elementor-widget-text-editor\" data-id=\"d149794\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><span dir=\"ltr\" style=\"left: 24.76%;top: 46.41%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">Zeng, Q., Zhao, M., Liu, P.: HeapTherapy: An Efficient End-to-End Solution <\/span><span dir=\"ltr\" style=\"left: 24.76%;top: 48.12%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">against Heap Buffer Overflows. Proc. Int. Conf. Dependable Syst. Networks. <\/span><span dir=\"ltr\" style=\"left: 24.76%;top: 49.83%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">2015\u2013September, 485\u2013496 (2015).<\/span><\/li><li><span dir=\"ltr\" style=\"left: 24.76%;top: 51.54%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">Focardi, R., Palmarini, F., Squarcina, M., Steel, G., Tempesta, M.: Mind Your <\/span><span dir=\"ltr\" style=\"left: 24.76%;top: 53.25%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">Keys? A Security Evaluation of Java Keystores. Proc. 2018 Netw. Distrib. Syst. <\/span><span dir=\"ltr\" style=\"left: 24.76%;top: 54.96%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">Secur. Symp. (2018).<\/span><\/li><li><span dir=\"ltr\" style=\"left: 24.76%;top: 56.67%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">Asad, A., Ali, H.: Working with Cryptography. In: The C <\/span><span dir=\"ltr\" style=\"left: 24.76%;top: 58.38%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">Programmer\u2019s Study Guide (MCSD). pp. 347\u2013364. Apress, Berkeley, CA <\/span><span dir=\"ltr\" style=\"left: 24.76%;top: 60.09%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">(2017).<\/span><\/li><li><span dir=\"ltr\" style=\"left: 24.76%;top: 61.8%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">Mun, H.-J., Li, Y.: Secure Short URL Generation Method that Recognizes <\/span><span dir=\"ltr\" style=\"left: 24.76%;top: 63.52%;font-size: calc(var(--scale-factor)*12.00px);font-family: sans-serif\" role=\"presentation\">Risk of Target URL. Wirel. Pers. Commun. 93, 269\u2013283 (2017).<br \/><\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a432df6 elementor-widget elementor-widget-heading\" data-id=\"a432df6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Priebeh pr\u00e1ce<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f13991a elementor-widget elementor-widget-text-editor\" data-id=\"f13991a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Zatia\u013e nezverejnen\u00e9<\/p><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Autor: Bc. Katar\u00edna Amrichov\u00e1<br \/>\n\u0160kolite\u013e: MSc. Ter\u00e9zia M\u00e9ze\u0161ov\u00e1<\/p>","protected":false},"author":8,"featured_media":2397,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ocean_post_layout":"full-width","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","ocean_post_oembed":"","ocean_post_self_hosted_media":"","ocean_post_video_embed":"","ocean_link_format":"","ocean_link_format_target":"self","ocean_quote_format":"","ocean_quote_format_link":"post","ocean_gallery_link_images":"on","ocean_gallery_id":[],"footnotes":""},"categories":[12],"tags":[],"class_list":["post-2861","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bakalarske-prace","entry","has-media"],"_links":{"self":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/posts\/2861","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/comments?post=2861"}],"version-history":[{"count":8,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/posts\/2861\/revisions"}],"predecessor-version":[{"id":3413,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/posts\/2861\/revisions\/3413"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/media\/2397"}],"wp:attachment":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/media?parent=2861"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/categories?post=2861"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/tags?post=2861"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}