{"id":3591,"date":"2024-07-01T00:00:51","date_gmt":"2024-06-30T22:00:51","guid":{"rendered":"https:\/\/cyberawareness.sk\/?p=3591"},"modified":"2026-03-27T09:50:50","modified_gmt":"2026-03-27T08:50:50","slug":"identifikacia-relevantnych-digitalnych-stop-pri-forenznom-vysetrovani","status":"publish","type":"post","link":"https:\/\/cyberawareness.sk\/en\/2024\/07\/01\/identifikacia-relevantnych-digitalnych-stop-pri-forenznom-vysetrovani\/","title":{"rendered":"Identifik\u00e1cia relevantn\u00fdch digit\u00e1lnych st\u00f4p pri forenznom vy\u0161etrovan\u00ed"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"3591\" class=\"elementor elementor-3591\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fa18013 e-flex e-con-boxed e-con e-parent\" data-id=\"fa18013\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6e108e7 e-flex e-con-boxed e-con e-child\" data-id=\"6e108e7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-749fbad elementor-widget elementor-widget-ucaddon_square_icon_box\" data-id=\"749fbad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ucaddon_square_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<!-- start Icon Box -->\n\t\t<link id='font-awesome-css' href='https:\/\/cyberawareness.sk\/wp-content\/plugins\/unlimited-elements-for-elementor\/assets_libraries\/font-awesome6\/fontawesome-all.min.css' type='text\/css' rel='stylesheet' >\n\t\t<link id='font-awesome-4-shim-css' href='https:\/\/cyberawareness.sk\/wp-content\/plugins\/unlimited-elements-for-elementor\/assets_libraries\/font-awesome6\/fontawesome-v4-shims.min.css' type='text\/css' rel='stylesheet' >\n\t\t<link id='uc_ac_assets_file_blox_boxed_small_square_icon_box_css_0-css' href='https:\/\/cyberawareness.sk\/wp-content\/uploads\/ac_assets\/blox-boxed-small-square-icon-box\/blox-boxed-small-square-icon-box.css' type='text\/css' rel='stylesheet' >\n\n<style>\/* widget: Icon Box *\/\n\n#uc_square_icon_box_elementor_749fbad * { \n\tbox-sizing: border-box; \n}\n\n#uc_square_icon_box_elementor_749fbad{\n\tfont-family: inherit;\n    transition:0.3s;\n    position:relative;\n}\n\n#uc_square_icon_box_elementor_749fbad .blox-boxed-small-square-icon-box-icon{\n\t\n\tposition:relative;\n    display:flex;\n    justify-content:center;\n    align-items:center;\n    transform:rotate(0deg);\n    z-index:2;\n}\n#uc_square_icon_box_elementor_749fbad .ue-icon {\n  display:inline-block;\n}\n#uc_square_icon_box_elementor_749fbad .blox-boxed-small-square-icon-box-icon > div{\n\t\n\tposition:relative;\n    display:flex;\n    justify-content:center;\n    align-items:center;\n    transform:rotate(-0deg);\n}\n#uc_square_icon_box_elementor_749fbad .ue-icon-inner{\n    line-height:1em;\n\t} \t\n\n\n#uc_square_icon_box_elementor_749fbad .ue-icon-inner svg{\n    height:1em;\n    width:1em;\n\t} \t\n\t\n.blox-boxed-small-square-icon-box-heading{\n\tfont-size:21px;\n\t}\n\n\n#uc_square_icon_box_elementor_749fbad:hover\n{\n  position:relative;\n  z-index:1;\n}\n\n\n#uc_square_icon_box_elementor_749fbad .ue_box_button\n{\n  text-align:center;\n  text-decoration:none;\n  display:inline-block;\n  transition:0.3s;\n}\n\n\n#uc_square_icon_box_elementor_749fbad span.line\n{\n  display:block;\n  position:absolute;\n  top:0;\n  left:0;\n  width:0px;\n  transition:0.3s;\n}\n\n#uc_square_icon_box_elementor_749fbad:hover span.line\n{\n  width:100%;\n}\n\n#uc_square_icon_box_elementor_749fbad .ue-title-separator span\n{\n  display:inline-block;\n  transition:0.3s;\n}\n\n\n\n\n\n<\/style>\n\n<div class=\"square_icon_box\" id=\"uc_square_icon_box_elementor_749fbad\">\n  \n  \t\t  \n  \n              <div class=\"ue-icon\">\n       <a style=\"display:inline-block; text-decoration:none;\" href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/11\/5C91F77C898F463DB8A8867E7A2E96E2.pdf\" >         <div class=\"blox-boxed-small-square-icon-box-icon\" style=\"background-color: ;\">\n           <div class=\"ue-icon-inner\"><i class='fas fa-book'><\/i><\/div>\n         <\/div>\n       <\/a>       <\/div>\n         \n  \t\t        <div class=\"blox-boxed-small-square-icon-box-heading\">\n        \tPr\u00e1ca\n        <\/div>\n          \n  \t\t  \n  \n          \n  \t\t        \n          \n  \t\t  \n<\/div>\n<!-- end Icon Box -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8e851db elementor-widget elementor-widget-text-editor\" data-id=\"8e851db\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Autor: <\/strong>Bc. Franti\u0161ek Kurimsk\u00fd<br \/><strong>\u0160kolite\u013e: <\/strong>doc. RNDr. JUDr. Pavol Sokol, PhD.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e5a0a23 elementor-widget elementor-widget-heading\" data-id=\"e5a0a23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Abstrakt<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b77c4c2 elementor-widget elementor-widget-text-editor\" data-id=\"b77c4c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>V dne\u0161nej dobe neust\u00e1le narast\u00e1 po\u010det kybernetick\u00fdch \u00fatokov. Adekv\u00e1tna reakcia na bezpe\u010dnostn\u00e9 \u00fatoky a incidenty si vy\u017eaduje vo viacer\u00fdch pr\u00edpadoch vy\u017eaduje pou\u017eitie digit\u00e1lnej forenznej anal\u00fdza. Pri samotnom forenznom vy\u0161etrovan\u00ed je potrebn\u00e9, \u010do najr\u00fdchlej\u0161ie sa dopracova\u0165 k relevantn\u00fdm digit\u00e1lnym stop\u00e1m (d\u00e1tam), ktor\u00e9 obsahuj\u00fa inform\u00e1cie o bezpe\u010dnostnom incidente a postupe \u00fato\u010dn\u00edka. Z\u00e1kladn\u00fdm probl\u00e9mom digit\u00e1lnej forenznej anal\u00fdza je ve\u013ek\u00e9 mno\u017estvo forenzn\u00fdch artefaktov z\u00edskan\u00fdch z napadnut\u00fdch syst\u00e9mov. Tie sa z ve\u013ekej \u010dasti skladaj\u00fa z artefaktov nerelevantn\u00fdch pre vy\u0161etrovanie dan\u00e9ho pr\u00edpadu, resp. bezpe\u010dnostn\u00e9ho incidentu. Cie\u013eom predlo\u017eenej pr\u00e1ce je u\u0161etri\u0165 \u010das forenzn\u00e9ho analytika pri h\u013eadan\u00ed relevantn\u00fdch digit\u00e1lnych st\u00f4p (d\u00e1t) pre \u00fa\u010dely forenznej anal\u00fdzy. To je mo\u017en\u00e9 dosiahnu\u0165 automatiz\u00e1ciou tohto procesu pomocou met\u00f3d strojov\u00e9ho u\u010denia, najm\u00e4 met\u00f3d prim\u00e1rne ur\u010den\u00fdch na h\u013eadanie anom\u00e1lii. N\u00e1jden\u00e9 digit\u00e1lne artefakty poskytuj\u00fa forenzn\u00e9mu analytikovi nadh\u013ead nad bezpe\u010dnostn\u00fdm incidentom a umo\u017e\u0148uj\u00fa r\u00fdchlej\u0161ie stanovenie a n\u00e1sledne potvrdenie alebo vyvr\u00e1tenie forenzn\u00fdch hypot\u00e9z o bezpe\u010dnostnom incidente a \u010dinnosti \u00fato\u010dn\u00edka.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e39a89a elementor-widget elementor-widget-heading\" data-id=\"e39a89a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Ciele<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-05fb267 elementor-widget elementor-widget-text-editor\" data-id=\"05fb267\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Analyzova\u0165 forenzn\u00e9 artefakty v opera\u010dnom syst\u00e9me Windows.<\/li><li>Porovna\u0165 existuj\u00face pr\u00edstupy k identifik\u00e1cii relevantn\u00fdch digit\u00e1lnych st\u00f4p pri forenznom vy\u0161etrovan\u00ed opera\u010dn\u00e9ho syst\u00e9mu Windows.<\/li><li>Navrhn\u00fa\u0165 model pre identifik\u00e1ciu relevantn\u00fdch digit\u00e1lnych st\u00f4p pri forenznom vy\u0161etrovan\u00ed opera\u010dn\u00e9ho syst\u00e9mu Windows, implementova\u0165 model a zhodnoti\u0165 efekt\u00edvnos\u0165 tohto modelu.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-89aa96b elementor-widget elementor-widget-heading\" data-id=\"89aa96b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Literat\u00fara<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d149794 elementor-widget elementor-widget-text-editor\" data-id=\"d149794\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Patcha, A., &amp; Park, J. M. (2007). An overview of anomaly detection techniques: Existing solutions and latest technological trends. Computer networks, 51(12), 3448-3470.<\/li><li>Alabadi, M., &amp; Celik, Y. (2020, June). Anomaly detection for cyber-security based on convolution neural network: A survey. In 2020 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA) (pp. 1-14). \u0399\u0395\u0395\u0395.<\/li><li>Mohammad, R. M. A., &amp; Alqahtani, M. (2019). A comparison of machine learning techniques for file system forensics analysis. Journal of Information Security and Applications, 46, 53-61.<\/li><li>Grajeda, C., Breitinger, F., &amp; Baggili, I. (2017). Availability of datasets for digital forensics-and what is missing. Digital Investigation, 22, S94-S105.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a432df6 elementor-widget elementor-widget-heading\" data-id=\"a432df6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Priebeh pr\u00e1ce<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f13991a elementor-widget elementor-widget-text-editor\" data-id=\"f13991a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Zatia\u013e nezverejnen\u00e9<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Autor: Bc. Franti\u0161ek Kurimsk\u00fd<br \/>\n\u0160kolite\u013e: doc. RNDr. JUDr. Pavol Sokol, PhD.<\/p>","protected":false},"author":9,"featured_media":2397,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ocean_post_layout":"full-width","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","ocean_post_oembed":"","ocean_post_self_hosted_media":"","ocean_post_video_embed":"","ocean_link_format":"","ocean_link_format_target":"self","ocean_quote_format":"","ocean_quote_format_link":"post","ocean_gallery_link_images":"on","ocean_gallery_id":[],"footnotes":""},"categories":[11],"tags":[],"class_list":["post-3591","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-diplomove-prace","entry","has-media"],"_links":{"self":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/posts\/3591","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/comments?post=3591"}],"version-history":[{"count":8,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/posts\/3591\/revisions"}],"predecessor-version":[{"id":8778,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/posts\/3591\/revisions\/8778"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/media\/2397"}],"wp:attachment":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/media?parent=3591"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/categories?post=3591"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/tags?post=3591"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}