{"id":1239,"date":"2022-11-25T20:28:32","date_gmt":"2022-11-25T20:28:32","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1239"},"modified":"2022-11-25T20:28:32","modified_gmt":"2022-11-25T20:28:32","slug":"hogyan-mukodnek-a-halozatok","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/hu\/halozatok\/hogyan-mukodnek-a-halozatok\/","title":{"rendered":"Alapvet\u0151 h\u00e1l\u00f3zat\u00e9p\u00edt\u00e9s: Hogyan m\u0171k\u00f6dnek a h\u00e1l\u00f3zatok"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">A h\u00e1l\u00f3zat egy \u00f6sszekapcsolt eszk\u00f6z\u00f6k rendszere, amely inform\u00e1ci\u00f3t cser\u00e9l egym\u00e1ssal a megfelel\u0151 m\u0171k\u00f6d\u00e9s \u00e9rdek\u00e9ben. Ez mag\u00e1ban foglalhatja a laptopokat, szervereket, okostelefonokat \u00e9s m\u00e9g sok m\u00e1st. Az eszk\u00f6z\u00f6k speci\u00e1lis h\u00e1l\u00f3zatokon kereszt\u00fcl kommunik\u00e1lnak egym\u00e1ssal, amelyeket \u00fatv\u00e1laszt\u00f3knak \u00e9s kapcsol\u00f3knak neveznek. Ahogy az internethez csatlakoz\u00f3 eszk\u00f6z\u00f6k sz\u00e1ma tov\u00e1bb n\u00f6vekszik, meg kell \u00e9rten\u00fcnk, hogyan kommunik\u00e1lnak egym\u00e1ssal. Ebben a cikkben megvizsg\u00e1ljuk a k\u00fcl\u00f6nb\u00f6z\u0151 h\u00e1l\u00f3zati \u00f6sszetev\u0151ket \u00e9s azt, hogyan m\u0171k\u00f6dnek egy\u00fctt, hogy lehet\u0151v\u00e9 tegy\u00e9k sz\u00e1munkra a web b\u00f6ng\u00e9sz\u00e9s\u00e9t, e-mailek k\u00fcld\u00e9s\u00e9t \u00e9s m\u00e9g sok m\u00e1st.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">K\u00fcl\u00f6nb\u00f6z\u0151 t\u00edpus\u00fa h\u00e1l\u00f3zatok l\u00e9teznek, mindegyik elt\u00e9r\u0151 lefedetts\u00e9gi kiterjed\u00e9ssel. Kezdj\u00fck azzal, hogy felfedezz\u00fck a k\u00fcl\u00f6nb\u00f6z\u0151 h\u00e1l\u00f3zati t\u00edpusokat:<\/span><\/p>\n<h2><b>H\u00e1l\u00f3zati t\u00edpusok:<\/b><\/h2>\n<h3><b>LAN \u2013 Helyi h\u00e1l\u00f3zat<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">A LAN, vagy helyi h\u00e1l\u00f3zat, egy kisebb h\u00e1l\u00f3zati t\u00edpus, \u00e9s egy szervezetre vagy otthonra korl\u00e1toz\u00f3dik. P\u00e9ld\u00e1ul az otthoni h\u00e1l\u00f3zathoz csatlakoztatott eszk\u00f6z\u00f6k sz\u00e1ma korl\u00e1tozott egy m\u00e1sik h\u00e1l\u00f3zati t\u00edpushoz k\u00e9pest. Egy iskolai h\u00e1l\u00f3zat, b\u00e1r nagyobb, mint egy otthoni h\u00e1l\u00f3zat, m\u00e9g mindig LAN-nak tekinthet\u0151, mert sok eszk\u00f6zt kapcsol \u00f6ssze ugyanazon fizikai t\u00e9rben. Ez mag\u00e1ban foglalja a sz\u00e1m\u00edt\u00f3g\u00e9peket, szervereket stb.<\/span><\/p>\n<h3><b>MAN \u2013 V\u00e1rosi h\u00e1l\u00f3zat<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">A MAN egy kiterjesztett h\u00e1l\u00f3zat, amely egy v\u00e1ros eg\u00e9sz\u00e9t lefedi.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Ha t\u00f6bb h\u00e1l\u00f3zatot kombin\u00e1lunk \u00e9s \u00f6sszekapcsolunk egy v\u00e1roson bel\u00fcl, egy MAN-t, vagyis v\u00e1rosi h\u00e1l\u00f3zatot alkotunk. Ez a h\u00e1l\u00f3zati t\u00edpus \u00e1tfog\u00f3bb, \u00e9s egy eg\u00e9sz v\u00e1rost lefed. Egy olyan h\u00e1l\u00f3zati t\u00edpus, amely viszonylag gyorsabb adatsebess\u00e9get k\u00edn\u00e1l, mint az \u00e1tlagos internetkapcsolat, v\u00e1rosi h\u00e1l\u00f3zatnak, vagyis MAN-nek nevezik.<\/span><\/p>\n<h3><b>WAN \u2013 Sz\u00e9les k\u00f6r\u0171 h\u00e1l\u00f3zat<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">A WAN (sz\u00e9les k\u00f6r\u0171 h\u00e1l\u00f3zat) egy nagy sz\u00e1m\u00edt\u00f3g\u00e9pes h\u00e1l\u00f3zat, amely kisebb h\u00e1l\u00f3zatokat, p\u00e9ld\u00e1ul LAN-okat (helyi h\u00e1l\u00f3zatokat) kapcsol \u00f6ssze.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A WAN egy olyan h\u00e1l\u00f3zat, amely sok v\u00e1rost vagy orsz\u00e1got kapcsol \u00f6ssze, hogy az emberek k\u00f6nnyen haszn\u00e1lhass\u00e1k az internetet vagy kommunik\u00e1lhassanak egym\u00e1ssal nagy ter\u00fcleten. Amikor egy szervezet t\u00f6bb LAN-ja \u00f6sszekapcsol\u00f3dik, WAN-t alkot.<\/span><\/p>\n<h3><b>WWAN<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Alapvet\u0151en az internet egy vil\u00e1gm\u00e9ret\u0171 h\u00e1l\u00f3zat (WWAN).<\/span><\/p>\n<h3><b>WLAN \u2013 Vezet\u00e9k n\u00e9lk\u00fcli LAN<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">A vezet\u00e9k n\u00e9lk\u00fcli LAN, r\u00f6viden Wi-Fi, egy h\u00e1l\u00f3zat, amelyet \u00e1ltal\u00e1ban az otthoni \u00fatv\u00e1laszt\u00f3nk hoz l\u00e9tre.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A WLAN egy olyan LAN t\u00edpus, amelyhez vezet\u00e9k n\u00e9lk\u00fcl csatlakozhatunk okostelefonjainkr\u00f3l, t\u00e1blag\u00e9peinkr\u0151l, laptopjainkr\u00f3l vagy b\u00e1rmely m\u00e1s eszk\u00f6z\u00fcnkr\u0151l. A vezet\u00e9k n\u00e9lk\u00fcli k\u00f6rnyezet, amely r\u00e1di\u00f3hull\u00e1mokat haszn\u00e1l az adatok tov\u00e1bb\u00edt\u00e1s\u00e1ra k\u00e1belek vagy m\u00e1s fizikai m\u00e9dium helyett, elt\u00e9r\u0151 jellemz\u0151kkel b\u00edr a sebess\u00e9g, biztons\u00e1g \u00e9s lefedetts\u00e9g tekintet\u00e9ben a vezet\u00e9kes k\u00e1belalap\u00fa h\u00e1l\u00f3zathoz k\u00e9pest. A vezet\u00e9k n\u00e9lk\u00fcli csatlakoz\u00e1s egyik legjobb el\u0151nye, hogy nagyon rugalmas.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Az eml\u00edtett h\u00e1l\u00f3zati t\u00edpusokon k\u00edv\u00fcl vannak m\u00e1s m\u00e9ret\u0171 vagy c\u00e9l\u00fa h\u00e1l\u00f3zatok is. P\u00e9ld\u00e1ul,<\/span><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">SAN- T\u00e1rol\u00f3h\u00e1l\u00f3zat.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">EPN \u2013 V\u00e1llalati mag\u00e1nh\u00e1l\u00f3zat.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">VPN \u2013 Virtu\u00e1lis mag\u00e1nh\u00e1l\u00f3zat.<\/span><\/li>\n<\/ul>\n<h2><b>A h\u00e1l\u00f3zatok k\u00e9tf\u00e9lek\u00e9ppen \u00e1br\u00e1zolhat\u00f3k:<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">A h\u00e1l\u00f3zatokat \u00e1ltal\u00e1ban \u201ch\u00e1l\u00f3zati topol\u00f3gia\u201d \u00e1br\u00e1zolja, amely arra utal, hogy a h\u00e1l\u00f3zaton l\u00e9v\u0151 eszk\u00f6z\u00f6k hogyan kapcsol\u00f3dnak egym\u00e1shoz. K\u00e9t f\u0151 t\u00edpus\u00fa h\u00e1l\u00f3zati topol\u00f3gia l\u00e9tezik: logikai \u00e9s fizikai.<\/span><\/p>\n<h3><b>Logikai topol\u00f3gi\u00e1k<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">A logikai topol\u00f3gi\u00e1k a h\u00e1l\u00f3zat logikai aspektusait \u00e1br\u00e1zolj\u00e1k, mint p\u00e9ld\u00e1ul az IP-c\u00edmeket, az eszk\u00f6z\u00f6k k\u00f6z\u00f6tti kapcsolatot \u00e9s a haszn\u00e1lt \u00fatv\u00e1laszt\u00e1si protokollokat.<\/span><\/p>\n<h3><b>Fizikai topol\u00f3gia<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">A h\u00e1l\u00f3zat fizikai topol\u00f3gi\u00e1ja az, ahogyan fizikailag el van rendezve. Ez mag\u00e1ban foglalja, hogy hol helyezkednek el az eszk\u00f6z\u00f6k, milyen t\u00edpus\u00fa k\u00e1beleket haszn\u00e1lnak, h\u00e1ny port sz\u00fcks\u00e9ges, \u00e9s mely portokhoz\/kapcsol\u00f3khoz csatlakoznak a szerverek. A fizikai topol\u00f3gia egy diagram, amely a berendez\u00e9sek hely\u00e9t \u00e9s c\u00e9lj\u00e1t mutatja a h\u00e1l\u00f3zatban.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Az eszk\u00f6z c\u00e9lja azonban k\u00fcl\u00f6nb\u00f6z\u0151 h\u00e1l\u00f3zati topol\u00f3gi\u00e1kat eredm\u00e9nyez.<\/span><\/p>\n<h2><b>H\u00e1l\u00f3zati topol\u00f3gi\u00e1k<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">T\u00f6bbf\u00e9le m\u00f3don lehet \u00e1br\u00e1zolni az eszk\u00f6z\u00f6ket egy h\u00e1l\u00f3zati k\u00f6rnyezetben. Ezeket k\u00fcl\u00f6nb\u00f6z\u0151 c\u00e9ljaik alapj\u00e1n lehet csoportos\u00edtani.<\/span><\/p>\n<h3><b>Csillag topol\u00f3gia<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">A legn\u00e9pszer\u0171bb topol\u00f3gia, amelyet a LAN-okhoz haszn\u00e1lnak, a csillag topol\u00f3gia. A csillag topol\u00f3gia a legjobban kisebb h\u00e1l\u00f3zatokhoz, p\u00e9ld\u00e1ul kisv\u00e1llalkoz\u00e1sok \u00e1ltal haszn\u00e1lt h\u00e1l\u00f3zatokhoz illik.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">P\u00e9ld\u00e1ul, ha csak h\u00e1l\u00f3zati kapcsolatot vagy internet-hozz\u00e1f\u00e9r\u00e9st ig\u00e9nyl\u00fcnk, az eszk\u00f6z\u00f6ket csillag alak\u00fa topol\u00f3gi\u00e1ban csoportos\u00edthatjuk. Minden g\u00e9p ebben a h\u00e1l\u00f3zatban a k\u00f6zponti HUB-hoz csatlakozik. Ha b\u00e1rmelyik csom\u00f3pont meghib\u00e1sodik, az nem k\u00e1ros\u00edtja vagy rong\u00e1lja meg az eg\u00e9sz h\u00e1l\u00f3zatot, mert nagyon k\u00f6nnyen karbantarthat\u00f3 \u00e9s b\u0151v\u00edthet\u0151.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Azonban a probl\u00e9ma ezzel a forgat\u00f3k\u00f6nyvvel a redundancia hi\u00e1nya, amely elengedhetetlen a sz\u00e1m\u00edt\u00f3g\u00e9pes h\u00e1l\u00f3zatokhoz.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1240\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/starlike-topology.jpg\" alt=\"Csillag topol\u00f3gia\" width=\"620\" height=\"310\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/starlike-topology.jpg 620w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/starlike-topology-300x150.jpg 300w\" sizes=\"auto, (max-width: 620px) 100vw, 620px\" \/><\/p>\n<h3><b>H\u00e1l\u00f3 topol\u00f3gia<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">A h\u00e1l\u00f3 topol\u00f3gia a legjobb egy megb\u00edzhat\u00f3 h\u00e1l\u00f3zathoz, p\u00e9ld\u00e1ul egy internetszolg\u00e1ltat\u00f3hoz (ISP). Ezzel a kialak\u00edt\u00e1ssal minden biztons\u00e1gi ment\u00e9ssel rendelkezik. Teh\u00e1t ha valami probl\u00e9ma van egy k\u00e1bellel vagy kapcsol\u00f3val, vannak m\u00e1s m\u00f3dok az internethez vagy b\u00e1rhova, ahov\u00e1 csatlakozni pr\u00f3b\u00e1l. Ne feledje, hogy a teljes redundancia azt jelenti, hogy t\u00f6bb eszk\u00f6zre \u00e9s hosszabb k\u00e1belekre lesz sz\u00fcks\u00e9ge, ami magasabb k\u00f6lts\u00e9geket jelent. Egy teljes h\u00e1l\u00f3 topol\u00f3gia \u00e1ltal\u00e1ban t\u00f6bbe ker\u00fcl, mint egy csillag topol\u00f3gia megval\u00f3s\u00edt\u00e1sa.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">N\u00e9h\u00e1ny p\u00e9lda a h\u00e1l\u00f3 topol\u00f3gi\u00e1ra a Google Wi-Fi, Google Home vagy katonai eszk\u00f6z\u00f6k h\u00e1l\u00f3zatai.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1241\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/mesh-topology.jpg\" alt=\"H\u00e1l\u00f3 topol\u00f3gia\" width=\"620\" height=\"310\" \/><\/p>\n<h3><b>R\u00e9szleges h\u00e1l\u00f3 topol\u00f3gia<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">A r\u00e9szleges h\u00e1l\u00f3 topol\u00f3gia egy megfizethet\u0151bb h\u00e1l\u00f3zati topol\u00f3gia, amely csak n\u00e9h\u00e1ny kapcsol\u00f3 \u00e9s a h\u00e1l\u00f3zat r\u00e9szei sz\u00e1m\u00e1ra biztos\u00edt redundanci\u00e1t. A t\u00f6bbi kapcsol\u00f3 alternat\u00edv \u00fatvonalak n\u00e9lk\u00fcl marad.<\/span><\/p>\n<h3><b>Hub \u00e9s k\u00fcll\u0151 topol\u00f3gia<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">A hub \u00e9s k\u00fcll\u0151 topol\u00f3gi\u00e1t gyakran haszn\u00e1lj\u00e1k a WAN (internet) tervez\u00e9s\u00e9ben. A h\u00e1rom \u00fatv\u00e1laszt\u00f3 ebben a topol\u00f3gi\u00e1ban alap\u00e9rtelmez\u00e9s szerint nem ismeri egym\u00e1st. Teh\u00e1t ahhoz, hogy az adatok eljussanak a c\u00e9ljukhoz, mind R1-nek, mind R3-nak el kell k\u00fcldenie a forgalm\u00e1t R2-nek, aki tudja, hogyan ir\u00e1ny\u00edtsa azt helyesen. P\u00e9ld\u00e1ul, ha R1 forgalmat akar k\u00fcldeni R3-nak, azt a hubon (R2) kereszt\u00fcl fogja megtenni. A hub ezut\u00e1n tudja, hogyan dolgozza fel \u00e9s ir\u00e1ny\u00edtsa \u00e1t azt a forgalmat.<\/span><\/p>\n<h2><b>H\u00e1l\u00f3zati \u00f6sszetev\u0151k<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Azok az elemek, amelyek \u00f6ssze\u00e1llnak, hogy h\u00e1l\u00f3zatot alkossanak:<\/span><\/p>\n<h3><b>V\u00e9gberendez\u00e9s<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">B\u00e1rmely fizikai eszk\u00f6z, amelyet az internethez val\u00f3 csatlakoz\u00e1shoz haszn\u00e1lunk, v\u00e9gberendez\u00e9sk\u00e9nt ismert. Ez mag\u00e1ban foglalja a PC-ket, laptopokat, okostelefonokat, szervereket \u00e9s m\u00e9g sok m\u00e1st. A kapcsolat t\u00f6bb csatorn\u00e1n kereszt\u00fcl is l\u00e9trej\u00f6het, p\u00e9ld\u00e1ul elektromoss\u00e1g, f\u00e9nyimpulzusok vagy r\u00e1di\u00f3hull\u00e1mok r\u00e9v\u00e9n. Az okostelefonjainkr\u00f3l, laptopjainkr\u00f3l \u00e9s PC-inkr\u0151l vezet\u00e9k n\u00e9lk\u00fcl csatlakozhatunk az internethez. Ha laptopot vagy PC-t haszn\u00e1lunk, h\u00e1l\u00f3zati k\u00e1belt (UTP) is haszn\u00e1lhatunk.<\/span><\/p>\n<h3><b>Kapcsol\u00f3<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">A kapcsol\u00f3 t\u00f6bb v\u00e9gberendez\u00e9st, p\u00e9ld\u00e1ul sz\u00e1m\u00edt\u00f3g\u00e9peket \u00e9s nyomtat\u00f3kat kapcsol \u00f6ssze egy h\u00e1l\u00f3zaton (LAN) bel\u00fcl.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Ez az eszk\u00f6z n\u00e9pszer\u0171, mivel k\u00e9pes sok portot kezelni, portonk\u00e9nt 1 \u00e9s 10 Gbps k\u00f6z\u00f6tti sebess\u00e9ggel. A kapcsol\u00f3 MAC-c\u00edmeket haszn\u00e1l a h\u00e1l\u00f3zathoz csatlakoztatott v\u00e9gberendez\u00e9sek azonos\u00edt\u00e1s\u00e1ra. Ez megk\u00f6nny\u00edti a h\u00e1l\u00f3zathoz csatlakoz\u00f3 eszk\u00f6z\u00f6k nyomon k\u00f6vet\u00e9s\u00e9t, \u00e9s biztos\u00edtja, hogy csak az enged\u00e9lyezett eszk\u00f6z\u00f6k f\u00e9rhessenek hozz\u00e1 az adataihoz.<\/span><\/p>\n<h3><b>\u00datv\u00e1laszt\u00f3<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Az \u00fatv\u00e1laszt\u00f3 t\u00f6bb kisebb h\u00e1l\u00f3zatot (LAN-okat) kapcsol \u00f6ssze, hogy egy nagy h\u00e1l\u00f3zatot (WAN- Sz\u00e9les k\u00f6r\u0171 h\u00e1l\u00f3zat) alkosson. Az \u00fatv\u00e1laszt\u00f3 egy olyan eszk\u00f6z, amely az internethez csatlakoztat minket az\u00e1ltal, hogy kezeli az adatcsomagok k\u00e9zbes\u00edt\u00e9s\u00e9t b\u00e1rmely h\u00e1l\u00f3zati forr\u00e1sb\u00f3l b\u00e1rmely c\u00e9lh\u00e1l\u00f3zatba. Az \u00fatv\u00e1laszt\u00f3 IP-c\u00edmeket haszn\u00e1l az adatok k\u00fcld\u00e9s\u00e9re \u00e9s fogad\u00e1s\u00e1ra szolg\u00e1l\u00f3 eszk\u00f6z\u00f6k azonos\u00edt\u00e1s\u00e1ra. Egy \u00fatv\u00e1laszt\u00f3nak \u00e1ltal\u00e1ban 2-5 portja van, ellent\u00e9tben a kapcsol\u00f3val, amely sokkal t\u00f6bbel rendelkezhet. Ezenk\u00edv\u00fcl mindk\u00e9t eszk\u00f6z hasonl\u00f3 sebess\u00e9ggel rendelkezik, 100 Mbps-t\u00f3l 10 Gbps-ig, a modellt\u0151l f\u00fcgg\u0151en.<\/span><\/p>\n<h3><b>T\u0171zfal<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Jobban fel vagyunk k\u00e9sz\u00fclve a lehets\u00e9ges virtu\u00e1lis bet\u00f6r\u00e9sek meg\u00e1ll\u00edt\u00e1s\u00e1ra egy t\u0171zfal seg\u00edts\u00e9g\u00e9vel.<\/span><\/p>\n<h3><b>\u00c1tvitel k\u00f6zeg<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Az \u00e1tvitel k\u00f6zeg az az eszk\u00f6z, amelyen kereszt\u00fcl az inform\u00e1ci\u00f3 tov\u00e1bb\u00edt\u00f3dik, p\u00e9ld\u00e1ul k\u00e1belen vagy vezet\u00e9k n\u00e9lk\u00fcl.<\/span><\/p>\n<h2><b>Hogyan kommunik\u00e1lnak a sz\u00e1m\u00edt\u00f3g\u00e9pek az interneten kereszt\u00fcl?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">A forgalomnak egyedi azonos\u00edt\u00f3val kell rendelkeznie, hogy kommunik\u00e1lhasson olyan webhelyekkel, mint a Facebook \u00e9s a Google. Ezt IP-nek vagy Internet Protocol-nak h\u00edvj\u00e1k. Az IP, vagy Internet Protocol, az, ahogyan azonos\u00edtunk egy eszk\u00f6zt ak\u00e1r egy h\u00e1l\u00f3zaton, ak\u00e1r az interneten. Ennek a sz\u00e1mnak egyedinek kell lennie. Nem lehet k\u00e9t azonos IP-c\u00edm ugyanazon a h\u00e1l\u00f3zaton vagy az interneten, mert az konfliktust okoz, \u00e9s a kapcsolat nem fog megfelel\u0151en m\u0171k\u00f6dni.<\/span><\/p>\n<h3><b>Az internet n\u00f6veked\u00e9se<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Az elm\u00falt \u00e9vekben a vil\u00e1gszerte csatlakoztatott eszk\u00f6z\u00f6k sz\u00e1ma robban\u00e1sszer\u0171en megn\u0151tt. Tudta, hogy 2020-ban k\u00f6r\u00fclbel\u00fcl 50 milli\u00e1rd eszk\u00f6z volt csatlakoztatva az internethez? \u00c9s ebb\u0151l az 50 milli\u00e1rd eszk\u00f6zb\u0151l egyre nagyobb sz\u00e1m\u00fa az Internet of Things (IoT) r\u00e9sze.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Az Internet of Things (IoT) olyan eszk\u00f6z\u00f6ket \u00edr le, amelyek k\u00e9pesek adatokat gy\u0171jteni egym\u00e1st\u00f3l, \u00e9s az internetet haszn\u00e1lj\u00e1k a kommunik\u00e1ci\u00f3hoz. N\u00e9h\u00e1ny p\u00e9lda a k\u00f6z\u00f6ns\u00e9ges IoT-eszk\u00f6z\u00f6kre: \u00e9rz\u00e9kel\u0151k, okos otthoni eszk\u00f6z\u00f6k, fizet\u00e9si termin\u00e1lok \u00e9s okos viselhet\u0151 eszk\u00f6z\u00f6k. Ezeknek az eszk\u00f6z\u00f6knek is rendelkezni\u00fck kell IP-c\u00edmmel.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Az IP-c\u00edmek k\u00e9tf\u00e9l\u00e9k:<\/span><\/p>\n<h2><b>Nyilv\u00e1nos IP VS Priv\u00e1t IP<\/b><\/h2>\n<h3><b>Nyilv\u00e1nos IP-c\u00edmek<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Ahogy a nev\u00fck is sugallja, a nyilv\u00e1nos IP-c\u00edmeket az interneten val\u00f3 kommunik\u00e1ci\u00f3hoz haszn\u00e1lj\u00e1k. Szervezetek, mint p\u00e9ld\u00e1ul a NIC (H\u00e1l\u00f3zati Inform\u00e1ci\u00f3s K\u00f6zpont) \u00e9s az IANA regisztr\u00e1lj\u00e1k a nyilv\u00e1nos IP-c\u00edmeket, amelyeket azt\u00e1n internetszolg\u00e1ltat\u00f3knak (ISP-k) vagy m\u00e1s csoportoknak osztanak ki.<\/span><\/p>\n<h3><b>Priv\u00e1t IP-c\u00edmek<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">A priv\u00e1t IP-c\u00edmeket \u00e1ltal\u00e1ban helyi h\u00e1l\u00f3zatokban (LAN-okban), p\u00e9ld\u00e1ul otthoni vagy iskolai h\u00e1l\u00f3zatokban haszn\u00e1lj\u00e1k. K\u00f6vetkez\u00e9sk\u00e9ppen a priv\u00e1t IP-c\u00edmek nem tal\u00e1lhat\u00f3k meg az interneten. Annak \u00e9rdek\u00e9ben, hogy a sz\u00e1m\u00edt\u00f3g\u00e9pek kommunik\u00e1lhassanak egym\u00e1ssal az interneten kereszt\u00fcl, egy protokollt terveztek, amelyet NAT-nak (H\u00e1l\u00f3zati C\u00edmford\u00edt\u00e1s) neveznek. Ez \u00e1talak\u00edtja a priv\u00e1t IP-c\u00edmeket nyilv\u00e1nos IP-kk\u00e9.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A NAT jav\u00edthatja a h\u00e1l\u00f3zatunk biztons\u00e1g\u00e1t az\u00e1ltal, hogy megnehez\u00edti a t\u00e1mad\u00f3k sz\u00e1m\u00e1ra a priv\u00e1t IP-c\u00edmek el\u00e9r\u00e9s\u00e9t.<\/span><\/p>\n<h2><b>R\u00f6viden<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Ahogy az internethez csatlakoz\u00f3 eszk\u00f6z\u00f6k sz\u00e1ma tov\u00e1bb n\u00f6vekszik, meg kell \u00e9rten\u00fcnk, hogyan kommunik\u00e1lnak egym\u00e1ssal. Ez a cikk megvizsg\u00e1lja a k\u00fcl\u00f6nb\u00f6z\u0151 h\u00e1l\u00f3zati \u00f6sszetev\u0151ket \u00e9s azt, hogyan m\u0171k\u00f6dnek egy\u00fctt, hogy lehet\u0151v\u00e9 tegy\u00e9k sz\u00e1munkra a web b\u00f6ng\u00e9sz\u00e9s\u00e9t, e-mailek k\u00fcld\u00e9s\u00e9t \u00e9s m\u00e9g sok m\u00e1st. Megvizsg\u00e1ltuk azt is, hogy az IP-c\u00edmek milyen szerepet j\u00e1tszanak az eszk\u00f6z\u00f6k azonos\u00edt\u00e1s\u00e1ban, \u00e9s mi\u00e9rt haszn\u00e1lnak priv\u00e1t IP-ket a helyi h\u00e1l\u00f3zatokban. Ezen technol\u00f3gi\u00e1k m\u0171k\u00f6d\u00e9s\u00e9nek meg\u00e9rt\u00e9se egyre fontosabb, ahogy egyre ink\u00e1bb \u00f6sszekapcsolt vil\u00e1gba l\u00e9p\u00fcnk.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>A h\u00e1l\u00f3zat olyan \u00f6sszekapcsolt eszk\u00f6z\u00f6k rendszere, amelyek inform\u00e1ci\u00f3t cser\u00e9lnek egym\u00e1ssal a megfelel\u0151 m\u0171k\u00f6d\u00e9s \u00e9rdek\u00e9ben. Ez mag\u00e1ban foglalhatja a laptopokat, szervereket, okostelefonokat \u00e9s m\u00e9g sok m\u00e1st. Az eszk\u00f6z\u00f6k kommunik\u00e1lnak egym\u00e1ssal\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/hu\/halozatok\/hogyan-mukodnek-a-halozatok\/\">Folytat\u00e1s <span class=\"screen-reader-text\">Alapvet\u0151 h\u00e1l\u00f3zat\u00e9p\u00edt\u00e9s: Hogyan m\u0171k\u00f6dnek a h\u00e1l\u00f3zatok<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":1245,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22],"tags":[],"class_list":["post-1239","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networks","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How do Internet and Networks Work | Security Briefing<\/title>\n<meta name=\"description\" content=\"Do you understand how the internet works? This article takes a deep dive into networks, routers, switches, and more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/hu\/halozatok\/hogyan-mukodnek-a-halozatok\/\" \/>\n<meta property=\"og:locale\" content=\"hu_HU\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How do Internet and Networks Work | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Do you understand how the internet works? This article takes a deep dive into networks, routers, switches, and more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/hu\/halozatok\/hogyan-mukodnek-a-halozatok\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-25T20:28:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"2065\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Szerz\u0151:\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Becs\u00fclt olvas\u00e1si id\u0151\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 perc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"Basic Networking: How do Networks Work\",\"datePublished\":\"2022-11-25T20:28:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/\"},\"wordCount\":1596,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg\",\"articleSection\":[\"Networks\"],\"inLanguage\":\"hu\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/\",\"url\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/\",\"name\":\"How do Internet and Networks Work | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg\",\"datePublished\":\"2022-11-25T20:28:32+00:00\",\"description\":\"Do you understand how the internet works? This article takes a deep dive into networks, routers, switches, and more.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#breadcrumb\"},\"inLanguage\":\"hu\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg\",\"width\":2560,\"height\":2065,\"caption\":\"Basic Networking image\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Basic Networking: How do Networks Work\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hu\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/hu\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hogyan m\u0171k\u00f6dnek az internet \u00e9s a h\u00e1l\u00f3zatok | Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","description":"\u00c9rted, hogyan m\u0171k\u00f6dik az internet? Ez a cikk m\u00e9lyrehat\u00f3an foglalkozik a h\u00e1l\u00f3zatokkal, \u00fatv\u00e1laszt\u00f3kkal, kapcsol\u00f3kkal \u00e9s egyebekkel.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/hu\/halozatok\/hogyan-mukodnek-a-halozatok\/","og_locale":"hu_HU","og_type":"article","og_title":"How do Internet and Networks Work | Security Briefing","og_description":"Do you understand how the internet works? This article takes a deep dive into networks, routers, switches, and more.","og_url":"https:\/\/securitybriefing.net\/hu\/halozatok\/hogyan-mukodnek-a-halozatok\/","og_site_name":"Security Briefing","article_published_time":"2022-11-25T20:28:32+00:00","og_image":[{"width":2560,"height":2065,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"Szerz\u0151:":"security","Becs\u00fclt olvas\u00e1si id\u0151":"8 perc"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"Basic Networking: How do Networks Work","datePublished":"2022-11-25T20:28:32+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/"},"wordCount":1596,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg","articleSection":["Networks"],"inLanguage":"hu"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/","url":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/","name":"Hogyan m\u0171k\u00f6dnek az internet \u00e9s a h\u00e1l\u00f3zatok | Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg","datePublished":"2022-11-25T20:28:32+00:00","description":"\u00c9rted, hogyan m\u0171k\u00f6dik az internet? Ez a cikk m\u00e9lyrehat\u00f3an foglalkozik a h\u00e1l\u00f3zatokkal, \u00fatv\u00e1laszt\u00f3kkal, kapcsol\u00f3kkal \u00e9s egyebekkel.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#breadcrumb"},"inLanguage":"hu","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/"]}]},{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg","width":2560,"height":2065,"caption":"Basic Networking image"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Basic Networking: How do Networks Work"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hu"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"biztons\u00e1g","image":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin a Government Technology vezet\u0151 munkat\u00e1rsa. Kor\u00e1bban a PYMNTS \u00e9s a The Bay State Banner sz\u00e1m\u00e1ra \u00edrt, \u00e9s a Carnegie Mellon Egyetemen szerzett B.A. diplom\u00e1t kreat\u00edv \u00edr\u00e1sb\u00f3l. Boston k\u00f6rny\u00e9k\u00e9n \u00e9l.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/hu\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/1239","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/comments?post=1239"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/1239\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media\/1245"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media?parent=1239"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/categories?post=1239"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/tags?post=1239"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}