{"id":1668,"date":"2023-04-07T14:07:26","date_gmt":"2023-04-07T14:07:26","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1668"},"modified":"2023-04-07T14:07:26","modified_gmt":"2023-04-07T14:07:26","slug":"a-kiberbiztonsag-es-annak-hatasa-napjainkban","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/hu\/kiberbiztonsag\/a-kiberbiztonsag-es-annak-hatasa-napjainkban\/","title":{"rendered":"Kiberbiztons\u00e1g \u00e9s annak hat\u00e1sa napjainkban"},"content":{"rendered":"<p>Ahogy a sz\u00e1m\u00edt\u00e1stechnika fejl\u0151dik, k\u00fcl\u00f6nb\u00f6z\u0151 k\u00eds\u00e9rletek t\u00f6rt\u00e9ntek a biztons\u00e1gi hib\u00e1k \u00e9s sebezhet\u0151s\u00e9gek kihaszn\u00e1l\u00e1s\u00e1ra. Az internet terjed\u00e9s\u00e9vel \u00e9s az egyre ink\u00e1bb \u00f6sszekapcsolt vil\u00e1gunkban, ahol a fejlett orsz\u00e1gokban \u00e9l\u0151 egy\u00e9nek t\u00f6bbs\u00e9ge t\u00f6bb internetkapcsolattal rendelkez\u0151 eszk\u00f6zzel rendelkezik, a kibert\u00e1mad\u00e1sok jelent\u0151s n\u00f6veked\u00e9st mutattak.<\/p>\n\n\n\n<p>Egy kiv\u00e1l\u00f3 p\u00e9lda a webalap\u00fa kibert\u00e1mad\u00e1sok n\u00f6veked\u00e9se, amelyek k\u00f6zel 6000%-kal n\u0151ttek, el\u00e9rve az 1,4 milli\u00e1rd esetet 2022-ben. Ez a sz\u00e1m r\u00e1vil\u00e1g\u00edt a hat\u00e9kony kiberbiztons\u00e1gi menedzsment fontoss\u00e1g\u00e1ra a potenci\u00e1lisan s\u00falyos k\u00f6vetkezm\u00e9nyek, p\u00e9ld\u00e1ul jelent\u0151s gazdas\u00e1gi vesztes\u00e9gek kezel\u00e9se \u00e9rdek\u00e9ben.<\/p>\n\n\n\n<p>H2 \u2013 Lehets\u00e9ges-e a teljes kiberbiztons\u00e1g?<\/p>\n\n\n\n<p>Abszol\u00fat biztons\u00e1g sem a fizikai, sem a virtu\u00e1lis vil\u00e1gban nem l\u00e9tezik. Azonban lehets\u00e9ges minimaliz\u00e1lni a kock\u00e1zatokat \u00e9s a kibervesz\u00e9lyek megval\u00f3sul\u00e1s\u00e1nak es\u00e9ly\u00e9t, valamint a sz\u00e1m\u00edt\u00f3g\u00e9pes rendszerek \u00e9s az \u00e1ltaluk gener\u00e1lt \u00e9s t\u00e1rolt \u00e9rt\u00e9kes inform\u00e1ci\u00f3k k\u00e1rosod\u00e1s\u00e1t.<\/p>\n\n\n\n<p>\u201cA \u201dsebezhet\u0151s\u00e9g\u201c a v\u00e9delem gyenges\u00e9geire \u00e9s hi\u00e1nyoss\u00e1gaira utal, amelyek lehet\u0151v\u00e9 teszik egy kibervesz\u00e9ly megval\u00f3sul\u00e1s\u00e1t, negat\u00edv hat\u00e1sokat okozva egy sz\u00e1m\u00edt\u00f3g\u00e9pes rendszerben. P\u00e9ld\u00e1ul egy szervezet sz\u00e1m\u00edt\u00f3g\u00e9pes rendszer\u00e9nek nem megfelel\u0151 t\u0171zv\u00e9delme vagy gyenge jelsz\u00f3rendszere sebezhet\u0151s\u00e9get jelentene. Az ezen sebezhet\u0151s\u00e9gek kihaszn\u00e1l\u00e1s\u00e1nak val\u00f3sz\u00edn\u0171s\u00e9g\u00e9t \u201dkock\u00e1zatnak\u201d nevezik. L\u00e9nyeg\u00e9ben a kiberbiztons\u00e1g a digit\u00e1lis t\u00e9rben jelentkez\u0151 kock\u00e1zatok cs\u00f6kkent\u00e9s\u00e9re \u00f6sszpontos\u00edt.<\/p>\n\n\n\n<p>A Covid-19 vil\u00e1gj\u00e1rv\u00e1ny sz\u00e1mos v\u00e1llalkoz\u00e1s sz\u00e1m\u00e1ra kih\u00edv\u00e1st jelent\u0151 k\u00f6rnyezetet teremtett, egyes \u00e1gazatoknak el\u0151ny\u00f6s, m\u00edg m\u00e1soknak h\u00e1tr\u00e1nyos volt. A PriceWaterhouseCoopers (PwC) \u2019A p\u00e9nz\u00fcgyi szolg\u00e1ltat\u00e1sok j\u00f6v\u0151je\u201c (2020) c\u00edm\u0171 cikke szerint a vil\u00e1gj\u00e1rv\u00e1ny felgyors\u00edtotta az e-kereskedelem ir\u00e1ny\u00e1ba mutat\u00f3 trendeket a p\u00e9nz\u00fcgyi szolg\u00e1ltat\u00e1sok ter\u00e9n. Ez a fejl\u0151d\u00e9s pozit\u00edv volt a logisztikai szektor \u00e9s az \u00e9rint\u00e9smentes\/mobil fizet\u00e9si ipar\u00e1gak sz\u00e1m\u00e1ra, de negat\u00edv a kiskereskedelmi elad\u00e1sok sz\u00e1m\u00e1ra. Ahogy az internetes tranzakci\u00f3k n\u00f6vekednek, \u00fagy n\u0151 a kiberb\u0171n\u00f6z\u00e9s \u00e9s a kibervesz\u00e9lyek ar\u00e1nya is.<\/p>\n\n\n\n<p>A PriceWaterhouseCoopers \u2019Glob\u00e1lis gazdas\u00e1gi b\u0171n\u00f6z\u00e9s \u00e9s csal\u00e1s felm\u00e9r\u00e9se\u201c (2020) azt mutatja, hogy a csal\u00e1s, az \u00fcgyf\u00e9lcsal\u00e1sok \u00e9s a kiberb\u0171n\u00f6z\u00e9s tapasztalta a legnagyobb n\u00f6veked\u00e9st, a kiberb\u0171n\u00f6z\u00e9s az \u00f6sszes el\u0151fordul\u00e1s 34%-\u00e1t k\u00e9pviseli. A jelent\u00e9s azt is felfedi, hogy \u201da felm\u00e9r\u00e9s v\u00e1laszad\u00f3inak k\u00f6zel 47%-a tapasztalt valamilyen form\u00e1j\u00fa csal\u00e1st az elm\u00falt 24 h\u00f3napban, ami az elm\u00falt h\u00fasz \u00e9v m\u00e1sodik legmagasabb szint\u0171 biztons\u00e1gi incidenseit jelenti.\u201c<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"tools-for-the-analysis-and-detection-of-malware\"><strong>Eszk\u00f6z\u00f6k a rosszindulat\u00fa szoftverek elemz\u00e9s\u00e9re \u00e9s \u00e9szlel\u00e9s\u00e9re<\/strong><\/h2>\n\n\n<p>\u201cA \u201drosszindulat\u00fa szoftver\u201d b\u00e1rmilyen szoftvert jelent, amely k\u00e1rt vagy s\u00e9r\u00fcl\u00e9st okoz a felhaszn\u00e1l\u00f3nak, eszk\u00f6znek vagy h\u00e1l\u00f3zatnak, k\u00fcl\u00f6nb\u00f6z\u0151 form\u00e1kban, mint p\u00e9ld\u00e1ul tr\u00f3jaiak, v\u00edrusok, f\u00e9rgek, rootkitek vagy k\u00e9mprogramok. Ennek k\u00f6vetkezt\u00e9ben az elemz\u0151 eszk\u00f6z\u00f6knek el\u00e9g sokoldal\u00fanak kell lenni\u00fck ahhoz, hogy \u00e9szlelj\u00e9k a rosszindulat\u00fa szoftvereket, felm\u00e9rj\u00e9k az okozott k\u00e1rokat, \u00e9s azonos\u00edts\u00e1k az esetlegesen \u00e9rintett f\u00e1jlokat.<\/p>\n\n\n\n<p>Amikor egy rosszindulat\u00fa f\u00e1jlt megtal\u00e1lnak \u00e9s azonos\u00edtanak, azt hozz\u00e1adj\u00e1k egy rosszindulat\u00fa szoftver al\u00e1\u00edr\u00e1si adatb\u00e1zis\u00e1hoz, hogy megakad\u00e1lyozz\u00e1k a j\u00f6v\u0151beli behatol\u00e1st a h\u00e1l\u00f3zatba vagy eszk\u00f6zbe. K\u00e9t f\u0151 m\u00f3dszer l\u00e9tezik a rosszindulat\u00fa szoftverek elemz\u00e9s\u00e9re: statikus \u00e9s dinamikus. Mindk\u00e9t megk\u00f6zel\u00edt\u00e9sr\u0151l r\u00e9szleteket fogunk ny\u00fajtani.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"static-analysis\"><strong>Statikus elemz\u00e9s<\/strong><\/h2>\n\n\n<p>A statikus elemz\u00e9s egy f\u00e1jl vizsg\u00e1lat\u00e1nak folyamata annak szerkezet\u00e9r\u0151l \u00e9s funkcionalit\u00e1s\u00e1r\u00f3l sz\u00f3l\u00f3 inform\u00e1ci\u00f3k megszerz\u00e9se \u00e9rdek\u00e9ben an\u00e9lk\u00fcl, hogy azt v\u00e9grehajtan\u00e1nk. Ez a megk\u00f6zel\u00edt\u00e9s alapvet\u0151bb \u00e9s biztons\u00e1gosabb, mivel elker\u00fcli b\u00e1rmilyen potenci\u00e1lisan k\u00e1ros k\u00f3d futtat\u00e1s\u00e1t. Azonban kev\u00e9sb\u00e9 hat\u00e9kony az elhom\u00e1lyos\u00edtott rosszindulat\u00fa f\u00e1jlok kezel\u00e9s\u00e9ben. A rosszindulat\u00fa szoftverek \u00e9szlel\u00e9s\u00e9nek elterjedt technik\u00e1ja az al\u00e1\u00edr\u00e1sok haszn\u00e1lata. Amikor egy gyan\u00fas f\u00e1jl bel\u00e9p a rendszerbe, annak hash \u00e9rt\u00e9k\u00e9t el\u0151\u00e1ll\u00edtj\u00e1k, \u00e9s \u00f6sszevetik egy ismert rosszindulat\u00fa szoftver al\u00e1\u00edr\u00e1si adatb\u00e1zissal. Ennek a megk\u00f6zel\u00edt\u00e9snek a h\u00e1tr\u00e1nya, hogy a rosszindulat\u00fa szoftverek k\u00e9sz\u00edt\u0151i k\u00f6nnyed\u00e9n m\u00f3dos\u00edthatj\u00e1k a k\u00f3djukat, ami lehet\u0151v\u00e9 teszi sz\u00e1mukra, hogy megker\u00fclj\u00e9k ezt az elemz\u00e9si form\u00e1t.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"dynamic-analysis\"><strong>Dinamikus elemz\u00e9s<\/strong><\/h2>\n\n\n<p>Ez az elemz\u00e9s lehet\u0151v\u00e9 teszi a rosszindulat\u00fa szoftver viselked\u00e9s\u00e9nek megfigyel\u00e9s\u00e9t a rendszer v\u00e9grehajt\u00e1sa sor\u00e1n, valamint a rosszindulat\u00fa szoftver \u00e9szlel\u00e9s\u00e9t \u00e9s m\u0171k\u00f6d\u00e9s\u00e9t. A dinamikus rosszindulat\u00fa szoftver elemz\u00e9s\u00e9hez biztons\u00e1gos k\u00f6rnyezet sz\u00fcks\u00e9ges, amelyben a rosszindulat\u00fa f\u00e1jlok biztons\u00e1gosan v\u00e9grehajthat\u00f3k an\u00e9lk\u00fcl, hogy k\u00e1rt okozn\u00e1nak az eszk\u00f6zben vagy h\u00e1l\u00f3zatban. Ennek eredm\u00e9nyek\u00e9nt ezek az elemz\u00e9sek \u00e1ltal\u00e1ban homokoz\u00f3nak nevezett virtu\u00e1lis g\u00e9pekben t\u00f6rt\u00e9nnek, amelyek el\u0151re telep\u00edtett szoftverekkel rendelkeznek a rosszindulat\u00fa szoftverek vizsg\u00e1lat\u00e1hoz, \u00e9s virtu\u00e1lis h\u00e1l\u00f3zatokat hoznak l\u00e9tre a rosszindulat\u00fa szoftverek interakci\u00f3inak megfigyel\u00e9s\u00e9re.<\/p>\n\n\n\n<p>Rosszindulat\u00fa szoftver elemz\u0151 eszk\u00f6z\u00f6k 2023-ban:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Yara<\/strong>: Egy t\u00f6bbplatformos alkalmaz\u00e1s Windows, Linux \u00e9s macOS rendszerekhez, a Yara seg\u00edt azonos\u00edtani \u00e9s oszt\u00e1lyozni a potenci\u00e1lis rosszindulat\u00fa szoftvercsal\u00e1dokat. <a href=\"https:\/\/www.varonis.com\/blog\/yara-rules\" target=\"_blank\" rel=\"noreferrer noopener\">Bin\u00e1ris vagy sz\u00f6veges f\u00e1jlokkal<\/a> t\u00e1rolt inform\u00e1ci\u00f3val dolgozik szab\u00e1lyokban, meghat\u00e1rozva, hogy egy f\u00e1jl egy adott oszt\u00e1lyba tartozik-e. Minden szab\u00e1lynak k\u00e9t kulcsszava van: \u201c<strong>karakterl\u00e1ncok<\/strong>\u201d (az el\u0151re meghat\u00e1rozott sorozatok, amelyeket a YARA keres a bin\u00e1risban) \u00e9s \u201c<strong>felt\u00e9tel<\/strong>\u201d (a meghat\u00e1rozott krit\u00e9riumok az \u00e9szlel\u00e9shez).<\/li>\n\n\n\n<li><strong>Metascan<\/strong>: Egy ingyenes online rosszindulat\u00fa szoftver elemz\u0151 eszk\u00f6z, a Metascan t\u00f6bb elemz\u0151 motorral vizsg\u00e1lja a f\u00e1jlokat, \u00e9s Java API-t biztos\u00edt. Jelsz\u00f3 sz\u00fcks\u00e9ges, amelyet a <a href=\"https:\/\/portal.opswat.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">OPSWAT port\u00e1lon<\/a>, t\u00f6rt\u00e9n\u0151 regisztr\u00e1ci\u00f3 ut\u00e1n kapunk meg. Lehet\u0151v\u00e9 teszi 1500 hash keres\u00e9si k\u00e9r\u00e9st \u00e9s 25 f\u00e1jlelemz\u00e9si k\u00e9r\u00e9st \u00f3r\u00e1nk\u00e9nt.<\/li>\n\n\n\n<li><strong>Cuckoo<\/strong>: Egy ingyenes, ny\u00edlt forr\u00e1sk\u00f3d\u00fa alkalmaz\u00e1s, amely automatiz\u00e1lja a dinamikus rosszindulat\u00fa szoftver elemz\u00e9st,<a href=\"https:\/\/cuckoosandbox.org\/\" target=\"_blank\" rel=\"noreferrer noopener\"> a Cuckoo homokoz\u00f3k\u00e9nt m\u0171k\u00f6dik,<\/a> amely val\u00f3s id\u0151ben futtatja \u00e9s elemzi a f\u00e1jlokat. K\u00f6zponti szoftverb\u0151l \u00e1ll, amely kezeli a f\u00e1jlok v\u00e9grehajt\u00e1s\u00e1t \u00e9s elemz\u00e9s\u00e9t izol\u00e1lt virtu\u00e1lis g\u00e9pekben, egy gazdag\u00e9ppel \u00e9s t\u00f6bb vend\u00e9gg\u00e9ppel, amelyek f\u00e1jlokat futtatnak. A gazdag\u00e9p kezeli az eg\u00e9sz elemz\u00e9si folyamatot, mik\u00f6zben biztons\u00e1gosan deleg\u00e1lja a f\u00e1jlok v\u00e9grehajt\u00e1s\u00e1t minden vend\u00e9gnek.<\/li>\n\n\n\n<li><strong>Fuzzy Hash<\/strong>: A hash algoritmusok egyedileg azonos\u00edtj\u00e1k a f\u00e1jlokat, de a rosszindulat\u00fa szoftverek k\u00e9sz\u00edt\u0151i k\u00f6nnyen m\u00f3dos\u00edthatj\u00e1k a forr\u00e1sk\u00f3dot, hogy elker\u00fclj\u00e9k az \u00e9szlel\u00e9st. A fuzzy hashing a k\u00e9t f\u00e1jl k\u00f6z\u00f6tti hasonl\u00f3s\u00e1g \u00f6sszehasonl\u00edt\u00e1s\u00e1ra \u00f6sszpontos\u00edt, lehet\u0151v\u00e9 t\u00e9ve annak \u00e9szlel\u00e9s\u00e9t, hogy egy szoftver egy m\u00e1sik m\u00f3dos\u00edt\u00e1sa lehet-e, az\u00e1ltal, hogy \u00f6sszehasonl\u00edtja a fuzzy hash \u00e9rt\u00e9keiket.<\/li>\n<\/ol>\n\n\n<h2 class=\"wp-block-heading\" id=\"conclusion\"><strong>K\u00f6vetkeztet\u00e9s<\/strong><\/h2>\n\n\n<p>A kiberbiztons\u00e1g fogalma a kort\u00e1rs t\u00e1rsadalomban egyre nagyobb jelent\u0151s\u00e9get kapott, a kapcsol\u00f3d\u00f3 kifejez\u00e9sekkel, mint p\u00e9ld\u00e1ul a kiberb\u0171n\u00f6z\u00e9s, a kibert\u00e1mad\u00e1s \u00e9s a kiberbiztons\u00e1g. \u00c1ltal\u00e1noss\u00e1gban a kiberbiztons\u00e1g mag\u00e1ban foglalja az adatok el\u00e9rhet\u0151s\u00e9g\u00e9nek, hozz\u00e1f\u00e9rhet\u0151s\u00e9g\u00e9nek, hiteless\u00e9g\u00e9nek, integrit\u00e1s\u00e1nak \u00e9s bizalmass\u00e1g\u00e1nak v\u00e9delm\u00e9t, amelyeket sz\u00e1m\u00edt\u00f3g\u00e9pes rendszerek vagy webalap\u00fa digit\u00e1lis szolg\u00e1ltat\u00e1sok t\u00e1rolnak vagy tov\u00e1bb\u00edtanak, k\u00fcl\u00f6nb\u00f6z\u0151 t\u00e1mad\u00e1sokkal szemben.<\/p>","protected":false},"excerpt":{"rendered":"<p>As computing technology advances, various attempts have been made to exploit security flaws and vulnerabilities. With the expansion of the internet and our increasingly connected world, where most individuals in\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/hu\/kiberbiztonsag\/a-kiberbiztonsag-es-annak-hatasa-napjainkban\/\">Folytat\u00e1s <span class=\"screen-reader-text\">Kiberbiztons\u00e1g \u00e9s annak hat\u00e1sa napjainkban<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":1671,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15],"tags":[],"class_list":["post-1668","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity and its impact today | Security Briefing<\/title>\n<meta name=\"description\" content=\"Discover the impacts of cybersecurity on businesses, individuals &amp; governments. Stay informed with Security Briefing&#039;s in-depth analysis.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/hu\/kiberbiztonsag\/a-kiberbiztonsag-es-annak-hatasa-napjainkban\/\" \/>\n<meta property=\"og:locale\" content=\"hu_HU\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity and its impact today | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Discover the impacts of cybersecurity on businesses, individuals &amp; governments. Stay informed with Security Briefing&#039;s in-depth analysis.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/hu\/kiberbiztonsag\/a-kiberbiztonsag-es-annak-hatasa-napjainkban\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-07T14:07:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Cybersecurity-and-its-impact-today-banner-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"696\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Szerz\u0151:\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Becs\u00fclt olvas\u00e1si id\u0151\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 perc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"Cybersecurity and its impact today\",\"datePublished\":\"2023-04-07T14:07:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/\"},\"wordCount\":852,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Cybersecurity-and-its-impact-today-banner-1.jpg\",\"articleSection\":[\"cybersecurity\"],\"inLanguage\":\"hu\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/\",\"url\":\"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/\",\"name\":\"Cybersecurity and its impact today | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Cybersecurity-and-its-impact-today-banner-1.jpg\",\"datePublished\":\"2023-04-07T14:07:26+00:00\",\"description\":\"Discover the impacts of cybersecurity on businesses, individuals & governments. Stay informed with Security Briefing's in-depth analysis.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#breadcrumb\"},\"inLanguage\":\"hu\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Cybersecurity-and-its-impact-today-banner-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Cybersecurity-and-its-impact-today-banner-1.jpg\",\"width\":696,\"height\":300,\"caption\":\"Cybersecurity and its impact today\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity and its impact today\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hu\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/hu\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A kiberbiztons\u00e1g \u00e9s annak mai hat\u00e1sa | Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","description":"Fedezze fel a kiberbiztons\u00e1g hat\u00e1sait a v\u00e1llalkoz\u00e1sokra, egy\u00e9nekre \u00e9s korm\u00e1nyokra. Maradjon t\u00e1j\u00e9kozott a Security Briefing r\u00e9szletes elemz\u00e9seivel.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/hu\/kiberbiztonsag\/a-kiberbiztonsag-es-annak-hatasa-napjainkban\/","og_locale":"hu_HU","og_type":"article","og_title":"Cybersecurity and its impact today | Security Briefing","og_description":"Discover the impacts of cybersecurity on businesses, individuals & governments. Stay informed with Security Briefing's in-depth analysis.","og_url":"https:\/\/securitybriefing.net\/hu\/kiberbiztonsag\/a-kiberbiztonsag-es-annak-hatasa-napjainkban\/","og_site_name":"Security Briefing","article_published_time":"2023-04-07T14:07:26+00:00","og_image":[{"width":696,"height":300,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Cybersecurity-and-its-impact-today-banner-1.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"Szerz\u0151:":"security","Becs\u00fclt olvas\u00e1si id\u0151":"4 perc"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"Cybersecurity and its impact today","datePublished":"2023-04-07T14:07:26+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/"},"wordCount":852,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Cybersecurity-and-its-impact-today-banner-1.jpg","articleSection":["cybersecurity"],"inLanguage":"hu"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/","url":"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/","name":"A kiberbiztons\u00e1g \u00e9s annak mai hat\u00e1sa | Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Cybersecurity-and-its-impact-today-banner-1.jpg","datePublished":"2023-04-07T14:07:26+00:00","description":"Fedezze fel a kiberbiztons\u00e1g hat\u00e1sait a v\u00e1llalkoz\u00e1sokra, egy\u00e9nekre \u00e9s korm\u00e1nyokra. Maradjon t\u00e1j\u00e9kozott a Security Briefing r\u00e9szletes elemz\u00e9seivel.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#breadcrumb"},"inLanguage":"hu","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/"]}]},{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Cybersecurity-and-its-impact-today-banner-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Cybersecurity-and-its-impact-today-banner-1.jpg","width":696,"height":300,"caption":"Cybersecurity and its impact today"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity and its impact today"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hu"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"biztons\u00e1g","image":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin a Government Technology vezet\u0151 munkat\u00e1rsa. Kor\u00e1bban a PYMNTS \u00e9s a The Bay State Banner sz\u00e1m\u00e1ra \u00edrt, \u00e9s a Carnegie Mellon Egyetemen szerzett B.A. diplom\u00e1t kreat\u00edv \u00edr\u00e1sb\u00f3l. Boston k\u00f6rny\u00e9k\u00e9n \u00e9l.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/hu\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/1668","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/comments?post=1668"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/1668\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media\/1671"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media?parent=1668"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/categories?post=1668"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/tags?post=1668"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}