{"id":6074,"date":"2025-09-10T12:45:40","date_gmt":"2025-09-10T10:45:40","guid":{"rendered":"https:\/\/cyberawareness.sk\/?p=6074"},"modified":"2026-03-27T12:29:27","modified_gmt":"2026-03-27T11:29:27","slug":"evolution-of-legal-issues-of-honeynets","status":"publish","type":"post","link":"https:\/\/cyberawareness.sk\/en\/2025\/09\/10\/evolution-of-legal-issues-of-honeynets\/","title":{"rendered":"Evolution of legal issues of honeynets"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"6074\" class=\"elementor elementor-6074\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fa18013 e-flex e-con-boxed e-con e-parent\" data-id=\"fa18013\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-9f6d137 e-con-full e-flex e-con e-child\" data-id=\"9f6d137\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dd553b0 elementor-widget elementor-widget-ucaddon_square_icon_box\" data-id=\"dd553b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ucaddon_square_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<!-- start Icon Box -->\n\t\t<link id='font-awesome-css' href='https:\/\/cyberawareness.sk\/wp-content\/plugins\/unlimited-elements-for-elementor\/assets_libraries\/font-awesome6\/fontawesome-all.min.css' type='text\/css' rel='stylesheet' >\n\t\t<link id='font-awesome-4-shim-css' href='https:\/\/cyberawareness.sk\/wp-content\/plugins\/unlimited-elements-for-elementor\/assets_libraries\/font-awesome6\/fontawesome-v4-shims.min.css' type='text\/css' rel='stylesheet' >\n\t\t<link id='uc_ac_assets_file_blox_boxed_small_square_icon_box_css_0-css' href='https:\/\/cyberawareness.sk\/wp-content\/uploads\/ac_assets\/blox-boxed-small-square-icon-box\/blox-boxed-small-square-icon-box.css' type='text\/css' rel='stylesheet' >\n\n<style>\/* widget: Icon Box *\/\n\n#uc_square_icon_box_elementor_dd553b0 * { \n\tbox-sizing: border-box; \n}\n\n#uc_square_icon_box_elementor_dd553b0{\n\tfont-family: inherit;\n    transition:0.3s;\n    position:relative;\n}\n\n#uc_square_icon_box_elementor_dd553b0 .blox-boxed-small-square-icon-box-icon{\n\t\n\tposition:relative;\n    display:flex;\n    justify-content:center;\n    align-items:center;\n    transform:rotate(0deg);\n    z-index:2;\n}\n#uc_square_icon_box_elementor_dd553b0 .ue-icon {\n  display:inline-block;\n}\n#uc_square_icon_box_elementor_dd553b0 .blox-boxed-small-square-icon-box-icon > div{\n\t\n\tposition:relative;\n    display:flex;\n    justify-content:center;\n    align-items:center;\n    transform:rotate(-0deg);\n}\n#uc_square_icon_box_elementor_dd553b0 .ue-icon-inner{\n    line-height:1em;\n\t} \t\n\n\n#uc_square_icon_box_elementor_dd553b0 .ue-icon-inner svg{\n    height:1em;\n    width:1em;\n\t} \t\n\t\n.blox-boxed-small-square-icon-box-heading{\n\tfont-size:21px;\n\t}\n\n\n#uc_square_icon_box_elementor_dd553b0:hover\n{\n  position:relative;\n  z-index:1;\n}\n\n\n#uc_square_icon_box_elementor_dd553b0 .ue_box_button\n{\n  text-align:center;\n  text-decoration:none;\n  display:inline-block;\n  transition:0.3s;\n}\n\n\n#uc_square_icon_box_elementor_dd553b0 span.line\n{\n  display:block;\n  position:absolute;\n  top:0;\n  left:0;\n  width:0px;\n  transition:0.3s;\n}\n\n#uc_square_icon_box_elementor_dd553b0:hover span.line\n{\n  width:100%;\n}\n\n#uc_square_icon_box_elementor_dd553b0 .ue-title-separator span\n{\n  display:inline-block;\n  transition:0.3s;\n}\n\n\n\n\n\n<\/style>\n\n<div class=\"square_icon_box \" id=\"uc_square_icon_box_elementor_dd553b0\">\n  \n  \t\t  \n  \n              <div class=\"ue-icon\">\n       <a style=\"display:inline-block; text-decoration:none;\" href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-32525-5_10\" >         <div class=\"blox-boxed-small-square-icon-box-icon\" style=\"background-color: ;\">\n           <div class=\"ue-icon-inner\"><i class='fas fa-book'><\/i><\/div>\n         <\/div>\n       <\/a>       <\/div>\n         \n  \t\t        <div class=\"blox-boxed-small-square-icon-box-heading\">\n        \tArticle\n        <\/div>\n          \n  \t\t  \n  \n          \n  \t\t        \n          \n  \t\t  \n<\/div>\n<!-- end Icon Box -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ad5fbe9 elementor-widget elementor-widget-ucaddon_square_icon_box\" data-id=\"ad5fbe9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ucaddon_square_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<!-- start Icon Box -->\n\n<style>\/* widget: Icon Box *\/\n\n#uc_square_icon_box_elementor_ad5fbe9 * { \n\tbox-sizing: border-box; \n}\n\n#uc_square_icon_box_elementor_ad5fbe9{\n\tfont-family: inherit;\n    transition:0.3s;\n    position:relative;\n}\n\n#uc_square_icon_box_elementor_ad5fbe9 .blox-boxed-small-square-icon-box-icon{\n\t\n\tposition:relative;\n    display:flex;\n    justify-content:center;\n    align-items:center;\n    transform:rotate(0deg);\n    z-index:2;\n}\n#uc_square_icon_box_elementor_ad5fbe9 .ue-icon {\n  display:inline-block;\n}\n#uc_square_icon_box_elementor_ad5fbe9 .blox-boxed-small-square-icon-box-icon > div{\n\t\n\tposition:relative;\n    display:flex;\n    justify-content:center;\n    align-items:center;\n    transform:rotate(-0deg);\n}\n#uc_square_icon_box_elementor_ad5fbe9 .ue-icon-inner{\n    line-height:1em;\n\t} \t\n\n\n#uc_square_icon_box_elementor_ad5fbe9 .ue-icon-inner svg{\n    height:1em;\n    width:1em;\n\t} \t\n\t\n.blox-boxed-small-square-icon-box-heading{\n\tfont-size:21px;\n\t}\n\n\n#uc_square_icon_box_elementor_ad5fbe9:hover\n{\n  position:relative;\n  z-index:1;\n}\n\n\n#uc_square_icon_box_elementor_ad5fbe9 .ue_box_button\n{\n  text-align:center;\n  text-decoration:none;\n  display:inline-block;\n  transition:0.3s;\n}\n\n\n#uc_square_icon_box_elementor_ad5fbe9 span.line\n{\n  display:block;\n  position:absolute;\n  top:0;\n  left:0;\n  width:0px;\n  transition:0.3s;\n}\n\n#uc_square_icon_box_elementor_ad5fbe9:hover span.line\n{\n  width:100%;\n}\n\n#uc_square_icon_box_elementor_ad5fbe9 .ue-title-separator span\n{\n  display:inline-block;\n  transition:0.3s;\n}\n\n\n\n\n\n<\/style>\n\n<div class=\"square_icon_box \" id=\"uc_square_icon_box_elementor_ad5fbe9\">\n  \n  \t\t  \n  \n              <div class=\"ue-icon\">\n       <a style=\"display:inline-block; text-decoration:none;\" href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;#038;hl=sk&amp;#038;user=JXxir4oAAAAJ&amp;#038;cstart=20&amp;#038;pagesize=80&amp;#038;sortby=pubdate&amp;#038;citation_for_view=JXxir4oAAAAJ:MXK_kJrjxJIC\" >         <div class=\"blox-boxed-small-square-icon-box-icon\" style=\"background-color: ;\">\n           <div class=\"ue-icon-inner\"><i class='fas fa-link'><\/i><\/div>\n         <\/div>\n       <\/a>       <\/div>\n         \n  \t\t        <div class=\"blox-boxed-small-square-icon-box-heading\">\n        \tLink to Google Scholar\n        <\/div>\n          \n  \t\t  \n  \n          \n  \t\t        \n          \n  \t\t  \n<\/div>\n<!-- end Icon Box -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8e851db elementor-widget elementor-widget-text-editor\" data-id=\"8e851db\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>Authors: <\/b>Pavol Sokol, J\u00e1n Host<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-79e945b elementor-widget elementor-widget-heading\" data-id=\"79e945b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Abstract<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b77c4c2 elementor-widget elementor-widget-text-editor\" data-id=\"b77c4c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Honeynets are unconventional security tools to study techniques, methods, and goals of attackers. It is very important to consider issues affecting the deployment and usage of these security tools. This paper discusses the legal issues of honeynets taking into account their evolution. Paper focuses on legal issues of core elements of honeynets, namely data control, data capture, data collection and data analysis. This paper also draws attention to the issues pertaining privacy, liability, jurisdiction, applicable law and digital evidence. The analysis of legal issues is based on the EU law.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e5a0a23 elementor-widget elementor-widget-heading\" data-id=\"e5a0a23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Introduction<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-413ae1c elementor-widget elementor-widget-text-editor\" data-id=\"413ae1c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Several tools, methods and techniques aimed at protecting and securing communication between two or more network services have been successfully used for years now. Recently, they seem to have become ineffective against new and advanced security threats, therefore it is absolutely necessary to change and modernize techniques and tools that are used to protect networks from attackers. The honeypot and honeynet principle represents a different approach, which can defend given systems more effectively.<\/p><p>A\u00a0<b>honeypot<\/b>\u00a0is a \u201csecurity resource whose value lies in being probed, attacked, or compromised\u201d [<a id=\"ref-link-section-d54726834e392\" title=\"Pouget, F., Dacier, M., Debar, H.: White paper: honeypot, honeynet, honeytoken: terminological issues. Rapp. Tech. EURECOM. 1\u201326 (2003)\" href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-32525-5_10#ref-CR1\" data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 1\">1<\/a>]. Honeypots are mainly categorized by the level of interaction, purpose, role and deployment. In this paper we will focus on the categorization by level of interaction, specifically low-level interaction honeypot and high-level interaction honeypot.<\/p><p>The\u00a0<b>low-interaction honeypot<\/b>\u00a0uses software emulation of network services and operating systems on the host operating system to detect an attacker. The\u00a0<b>high-interaction honeypot<\/b>\u00a0functions differently; it permits the attacker to access all services on the given operating system and platform, nothing is restricted.<\/p><p>A\u00a0<b>honeynet<\/b>\u00a0is a high-involvement honeypot with the same risks and vulnerabilities that are characteristic for networks of many organizations today. It is \u201cnot a single system but a network of multiple systems\u201d [<a id=\"ref-link-section-d54726834e420\" title=\"Spitzner, L.: Honeypots: Catching the insider threat. In: Computer Security Applications Conference, 2003, pp. 170\u2013179. IEEE (2003)\" href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-32525-5_10#ref-CR2\" data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 2\">2<\/a>]. \u201cHoneynets represent the extreme of research honeypots. They are high interaction honeypots, which allow learning a great deal; however they also have the highest level of risk. Their primary value lies in research and gaining information on existing threats. A Honeynet is a network of production systems. Nothing is emulated. Little or no modifications are made to the honeypots. This gives the attacker a full range of systems, applications, and functionality to attack. From this it can be learnt a great deal, not only their tools and tactics, but their methods of communication, group organization, and motives\u201d [<a id=\"ref-link-section-d54726834e423\" title=\"The Honeynet project: Know Your Enemy: Learning about Security Threats, 2nd edn. Addison Wesley (2004)\" href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-32525-5_10#ref-CR3\" data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 3\">3<\/a>].<\/p><p>According to definitions of the honeynet and virtualization, a\u00a0<b>virtual honeynet<\/b>\u00a0can be defined as \u201ca complete honeynet, running on a single computer in virtual environment\u201d [<a id=\"ref-link-section-d54726834e433\" title=\"The Honeynet project: Know Your Enemy: Learning about Security Threats, 2nd edn. Addison Wesley (2004)\" href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-32525-5_10#ref-CR3\" data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 3\">3<\/a>]. A virtual honeynet can be defined as \u201ca technology that virtually implements many different operating systems in one hardware computer, and hence instead of having a honeynet of different physically separate honeypots, all the honeypots will be virtually set in one machine and still appear to the attacker as different separate machines\u201d [<a id=\"ref-link-section-d54726834e436\" title=\"Mairh, A., Barik, D., Verma, K., Jena, D.: Honeypot in network security: a survey. In: Proceedings of the 2011 International Conference on Communication, Computing &amp; Security. pp. 600\u2013605. ACM, ODISHA, India (2011)\" href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-32525-5_10#ref-CR4\" data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 4\">4<\/a>]. Virtual honeynets combine all the elements of a honeynet into a single physical system. Not only are all of the three requirements of data control, data capture, and data collection met, but also the actual honeypots themselves run on the single system [<a id=\"ref-link-section-d54726834e439\" title=\"Joshi, R.C., Sardana, A.: Honeypots: A New Paradigm to Information Security. Science Publishers, USA (2011)\" href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-32525-5_10#ref-CR5\" data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 5\">5<\/a>].<\/p><p>A successful deployment of a honeynet is a successful deployment of its architecture. There are some core elements of the honeynet architecture [<a id=\"ref-link-section-d54726834e445\" title=\"Spitzner, L.: Honeypots: Catching the insider threat. In: Computer Security Applications Conference, 2003, pp. 170\u2013179. IEEE (2003)\" href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-32525-5_10#ref-CR2\" data-track=\"click\" data-track-action=\"reference anchor\" data-track-label=\"link\" data-test=\"citation-ref\" aria-label=\"Reference 2\">2<\/a>]:<\/p><ul class=\"u-list-style-bullet\"><li><p><b>Data control<\/b>\u00a0is the first requirement whose purpose is to control and contain the activity of the attacker.<\/p><\/li><li><p><b>Data capture<\/b>\u00a0monitors and logs all of the attacker\u2019s activities within the honeynet.<\/p><\/li><li><p><b>Data collection<\/b>\u2014in case when the organization has more than one honeynet, all data has to be captured and stored in one central location.<\/p><\/li><li><p><b>Data analysis<\/b>\u00a0is an ability to analyse the data collected from the honeynet.<\/p><\/li><\/ul><p>Deployment and usage of honeynets may lead to a number of problems and issues. This paper outlines\u00a0<b>legal issues<\/b>\u00a0affecting the deployment and usage of the honeynets. Legal analysis is based on the European Union law (the EU law). Paper discusses the European Union regulations, the EU directives and international agreements. National legislation of member states of the EU are based on these legal documents (the EU directives, international agreements) or legal documents are an integral part of national legislation (the EU regulations, international agreements). Therefore, some native legislation may be slightly different from the concept of the EU law or international law.<\/p><p>There are several contributions of this paper. The first contribution of this paper is the review of the research literature related to legal aspects of honeypots and honeynets. The second contribution of this paper is the legal analysis of the core elements of honeynets from the perspective of the EU law . In the case of data capture and data control we focus on evolution of legal issues of these core elements according to generations of honeynets.<\/p><p>To formalize the scope of our work, we state\u00a0<b>three research questions<\/b>\u00a0:<\/p><ul class=\"u-list-style-bullet\"><li><p>Which legal issues are related to the core elements of honeynets?<\/p><\/li><li><p>What are definitions of honeypots and honeynets from the perspective of the EU law?<\/p><\/li><li><p>What are the legal issues of data capture and data control according to generations of honeynets?<\/p><\/li><li><p>What are the legal issues of data collection, data analysis and data presentation?<\/p><\/li><\/ul><p>This paper is organized into nine sections. In Sect.\u00a0<a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-32525-5_10#Sec2\" data-track=\"click\" data-track-label=\"link\" data-track-action=\"section anchor\">2<\/a>\u00a0paper focuses on the papers related to legal issues of honeypots and honeynets. Section\u00a0<a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-32525-5_10#Sec3\" data-track=\"click\" data-track-label=\"link\" data-track-action=\"section anchor\">3<\/a>\u00a0outlines the honeynet generations. Section\u00a0<a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-32525-5_10#Sec7\" data-track=\"click\" data-track-label=\"link\" data-track-action=\"section anchor\">4<\/a>\u00a0is introduction to legal issues of honeypots and honeynet. This section outlines the definitions of honeypot and honeynet. Sections\u00a0<a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-32525-5_10#Sec8\" data-track=\"click\" data-track-label=\"link\" data-track-action=\"section anchor\">5<\/a>\u00a0and\u00a0<a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-32525-5_10#Sec12\" data-track=\"click\" data-track-label=\"link\" data-track-action=\"section anchor\">6<\/a>\u00a0contain legal analysis of core elements\u2014data capture and data control according to honeynet generations. Section\u00a0<a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-32525-5_10#Sec16\" data-track=\"click\" data-track-label=\"link\" data-track-action=\"section anchor\">7<\/a>\u00a0focuses on data collection and its legal issues. Section\u00a0<a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-32525-5_10#Sec21\" data-track=\"click\" data-track-label=\"link\" data-track-action=\"section anchor\">8<\/a>\u00a0outlines data analysis and data presentation and outlines their legal issues. The last Section contains conclusions and author\u2019s suggestions on the future research.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Authors: Pavol Sokol, J\u00e1n Host<\/p>","protected":false},"author":9,"featured_media":5713,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ocean_post_layout":"full-width","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","ocean_post_oembed":"","ocean_post_self_hosted_media":"","ocean_post_video_embed":"","ocean_link_format":"","ocean_link_format_target":"self","ocean_quote_format":"","ocean_quote_format_link":"post","ocean_gallery_link_images":"on","ocean_gallery_id":[],"footnotes":""},"categories":[15],"tags":[],"class_list":["post-6074","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-clanky","entry","has-media"],"_links":{"self":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/posts\/6074","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/comments?post=6074"}],"version-history":[{"count":5,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/posts\/6074\/revisions"}],"predecessor-version":[{"id":8855,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/posts\/6074\/revisions\/8855"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/media\/5713"}],"wp:attachment":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/media?parent=6074"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/categories?post=6074"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/tags?post=6074"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}