{"id":1711,"date":"2023-04-08T15:30:07","date_gmt":"2023-04-08T15:30:07","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1711"},"modified":"2023-04-08T15:30:07","modified_gmt":"2023-04-08T15:30:07","slug":"a-kiberbiztonsag-geopolitikaja","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/hu\/kiberbiztonsag\/a-kiberbiztonsag-geopolitikaja\/","title":{"rendered":"A kiberbiztons\u00e1g geopolitik\u00e1ja"},"content":{"rendered":"<p>A kiberbiztons\u00e1g t\u00fall\u00e9pett azon, hogy kiz\u00e1r\u00f3lag technikai k\u00e9rd\u00e9s legyen; ma m\u00e1r jelent\u0151s szerepet j\u00e1tszik a geopolitik\u00e1ban, mik\u00f6zben az inform\u00e1ci\u00f3s korban navig\u00e1lunk. A mai digit\u00e1lis k\u00f6rnyezetben az adatok \u00e9s az \u00e9rt\u00e9kes er\u0151forr\u00e1sok els\u0151sorban h\u00e1l\u00f3zatba k\u00f6t\u00f6tt sz\u00e1m\u00edt\u00f3g\u00e9pes rendszereken t\u00e1rol\u00f3dnak. A fenyeget\u00e9sek potenci\u00e1lis forr\u00e1sai t\u00fall\u00e9ptek a helyi szerepl\u0151k\u00f6n \u00e9s a szomsz\u00e9dos orsz\u00e1gokon, mivel a digit\u00e1lis vil\u00e1g \u00fajradefini\u00e1lta a f\u00f6ldrajzi hat\u00e1rok \u00e9rz\u00e9kel\u00e9s\u00e9t.<\/p>\n\n\n<h2 class=\"simpletoc-title\">Tartalomjegyz\u00e9k<\/h2>\n<ul class=\"simpletoc-list\">\n<li><a href=\"#understanding-of-the-geopolitical-dimension-of-the-internet-and-its-impact-on-cybersecurity\">Az internet geopolitikai dimenzi\u00f3j\u00e1nak \u00e9s annak kiberbiztons\u00e1gra gyakorolt hat\u00e1s\u00e1nak meg\u00e9rt\u00e9se<\/a>\n\n<\/li>\n<li><a href=\"#cybersovereignty\">Kiber-szuverenit\u00e1s<\/a>\n\n<\/li>\n<li><a href=\"#cybersecurity-beyond-its-technical-dimension\">A kiberbiztons\u00e1g technikai dimenzi\u00f3j\u00e1n t\u00fal<\/a>\n\n<\/li>\n<li><a href=\"#conclusion\">K\u00f6vetkeztet\u00e9s<\/a>\n<\/li><\/ul>\n\n\n<p>A digit\u00e1lis eszk\u00f6z\u00f6kt\u0151l \u00e9s az online k\u00f6rnyezetekt\u0151l val\u00f3 n\u00f6vekv\u0151 f\u00fcgg\u0151s\u00e9g\u00fcnk fokozza a k\u00e1ros kibertev\u00e9kenys\u00e9gekkel szembeni sebezhet\u0151s\u00e9g\u00fcnket, n\u00f6velve a kiberb\u0171n\u00f6z\u00e9snek \u00e9s a kiberbiztons\u00e1gi fenyeget\u00e9seknek val\u00f3 kitetts\u00e9g\u00fcnket.<\/p>\n\n\n\n<p>Az alapvet\u0151 kommunik\u00e1ci\u00f3s rendszereket \u00e9s az \u00fajonnan megjelen\u0151 fejleszt\u00e9seket, mint p\u00e9ld\u00e1ul az 5G, a felh\u0151alap\u00fa sz\u00e1m\u00edt\u00e1stechnika, a mesters\u00e9ges intelligencia \u00e9s a kvantumsz\u00e1m\u00edt\u00e1stechnika, magukban foglal\u00f3 alapvet\u0151 technol\u00f3gi\u00e1k \u00faj kiberbiztons\u00e1gi kih\u00edv\u00e1sokat jelentenek, amelyek jelent\u0151sen befoly\u00e1solj\u00e1k a nemzetbiztons\u00e1got, a gazdas\u00e1gi n\u00f6veked\u00e9st \u00e9s a t\u00e1rsadalmi fejl\u0151d\u00e9st egyes nemzetek vagy ak\u00e1r eg\u00e9sz r\u00e9gi\u00f3k sz\u00e1m\u00e1ra.<\/p>\n\n\n\n<p>A kibert\u00e9r csatat\u00e9rr\u00e9 v\u00e1lt, ahol az orsz\u00e1gok versengenek a kulcsfontoss\u00e1g\u00fa technol\u00f3gi\u00e1k uralm\u00e1\u00e9rt \u00e9s a glob\u00e1lis technikai szabv\u00e1nyok feletti digit\u00e1lis f\u00f6l\u00e9ny \u00e9rv\u00e9nyes\u00edt\u00e9s\u00e9\u00e9rt. Az \u00e1llami szerepl\u0151k egyre ink\u00e1bb alkalmazz\u00e1k a digit\u00e1lis technol\u00f3gi\u00e1kat \u00e9s a kiberk\u00e9pess\u00e9geket riv\u00e1lisaik ellen. Ugyanakkor a nem \u00e1llami szerepl\u0151k is fejlesztett\u00e9k ezeket a k\u00e9szs\u00e9geket, c\u00e9lba v\u00e9ve a l\u00e9tfontoss\u00e1g\u00fa infrastrukt\u00far\u00e1kat, mint p\u00e9ld\u00e1ul az eg\u00e9szs\u00e9g\u00fcgyi szolg\u00e1ltat\u00e1sokat, a COVID vakcinakutat\u00e1st \u00e9s a strat\u00e9giai eszk\u00f6z\u00f6ket, potenci\u00e1lisan jelent\u0151s reput\u00e1ci\u00f3s k\u00e1rokat okozva a v\u00e1llalkoz\u00e1soknak \u00e9s a korm\u00e1nyoknak.<\/p>\n\n\n\n<p>A geopolitika seg\u00edt meg\u00e9rteni, megmagyar\u00e1zni \u00e9s el\u0151re jelezni a glob\u00e1lis szerepl\u0151k cselekedeteit. Tov\u00e1bb\u00e1, a kiberbiztons\u00e1g geopolitikai t\u00e9nyez\u0151inek figyelembev\u00e9tele lehet\u0151v\u00e9 teszi az int\u00e9zm\u00e9nyek sz\u00e1m\u00e1ra, hogy el\u0151re l\u00e1ss\u00e1k \u00e9s felk\u00e9sz\u00fcljenek a jelent\u0151s kiberfenyeget\u00e9sekre. Az elm\u00falt t\u00edz \u00e9v kibertev\u00e9kenys\u00e9geinek \u00e1ttekint\u00e9se vil\u00e1gos kapcsolatot mutat a geopolitikai ind\u00edt\u00e9kok \u00e9s az \u00e1llamilag t\u00e1mogatott kiberhadm\u0171veletek k\u00f6z\u00f6tt. Ennek eredm\u00e9nyek\u00e9nt a geopolitikai h\u00edrszerz\u00e9s hagyom\u00e1nyos kiberfenyeget\u00e9s-h\u00edrszerz\u00e9si gy\u0171jt\u00e9si m\u00f3dszerekkel val\u00f3 egyes\u00edt\u00e9se seg\u00edthet a szervezeteknek azonos\u00edtani, hogy mikor, hol \u00e9s hogyan a legsebezhet\u0151bbek a t\u00e1mad\u00e1sokkal szemben.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"understanding-of-the-geopolitical-dimension-of-the-internet-and-its-impact-on-cybersecurity\"><strong>Az internet geopolitikai dimenzi\u00f3j\u00e1nak \u00e9s annak kiberbiztons\u00e1gra gyakorolt hat\u00e1s\u00e1nak meg\u00e9rt\u00e9se<\/strong><\/h2>\n\n\n<p>A geopolitika \u00e1ltal\u00e1nos \u00e9rtelemben az \u00e1llamhatalomra \u00e9s a nemzetk\u00f6zi kapcsolatokra gyakorolt f\u00f6ldrajzi t\u00e9nyez\u0151k hat\u00e1s\u00e1nak tanulm\u00e1nyoz\u00e1sa. A kiberbiztons\u00e1g \u00e9s a geopolitika \u00f6sszekapcsolt fogalmakk\u00e9nt tekinthet\u0151k. A mesters\u00e9ges intelligencia megjelen\u00e9se \u00faj dimenzi\u00f3kat vezetett be az egyenl\u0151tlens\u00e9g, a sebezhet\u0151s\u00e9g \u00e9s a potenci\u00e1lis emberi szenved\u00e9s ter\u00e9n a geopolitik\u00e1ban, valamint a kombin\u00e1lt kock\u00e1zatok megjelen\u00e9s\u00e9vel.<\/p>\n\n\n\n<p>A \u201cgeopolitikai\u201d fogalom relev\u00e1ns a kiberpolitikai \u00e9s hatalmi dinamik\u00e1k kontextus\u00e1ban. A kibert\u00e9r nemzetek k\u00f6z\u00f6tti verseng\u0151 term\u00e9szete hangs\u00falyozza annak geopolitikai fontoss\u00e1g\u00e1t. Ezenk\u00edv\u00fcl a mesters\u00e9ges intelligencia (AI) mez\u0151gazdas\u00e1gra, k\u00f6zleked\u00e9sre \u00e9s m\u00e1s \u00e1gazatokra gyakorolt hat\u00e1sa kiemeli annak geopolitikai jelent\u0151s\u00e9g\u00e9t. Az AI technol\u00f3gia cser\u00e9je t\u00fckr\u00f6zi az alapvet\u0151 \u00e9rdekek konvergenci\u00e1j\u00e1t, a konfliktus kezel\u00e9s\u00e9t vagy hi\u00e1ny\u00e1t, valamint a bizalom megl\u00e9t\u00e9t, az AI-t er\u0151teljes eszk\u00f6zk\u00e9nt pozicion\u00e1lva geopolitikai k\u00f6vetkezm\u00e9nyekkel.<\/p>\n\n\n\n<p>K\u00eds\u00e9rletek t\u00f6rt\u00e9ntek a hagyom\u00e1nyos geopolitikai elemz\u00e9s kibert\u00e9rhez val\u00f3 igaz\u00edt\u00e1s\u00e1ra, az internetcsere-pontok (IXP-k) fizikai komponenseire \u00f6sszpontos\u00edtva. E k\u00f6zpontok ellen\u0151rz\u00e9se biztos\u00edtja az inform\u00e1ci\u00f3\u00e1raml\u00e1sok feletti ellen\u0151rz\u00e9st. Felvetett\u00e9k, hogy a kommunik\u00e1ci\u00f3s \u00e1raml\u00e1sokat ir\u00e1ny\u00edt\u00f3 f\u00e9l uralja majd a \u201cKibernetikai Sz\u00edvf\u00f6ldet\u201d, \u00e9s k\u00f6vetkez\u00e9sk\u00e9ppen a vil\u00e1got. Azonban az ilyen adapt\u00e1ci\u00f3k szubjekt\u00edvek lehetnek, \u00e9s hi\u00e1nyozhat bel\u0151l\u00fck a sz\u00fcks\u00e9ges elemz\u0151 szigor.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"cybersovereignty\">Kiber-szuverenit\u00e1s<\/h2>\n\n\n<p>A \u201ckiber-szuverenit\u00e1s\u201d fogalma gyakran szenved az elemz\u0151 szigor hi\u00e1ny\u00e1t\u00f3l. A ter\u00fcleti fogalmak virtu\u00e1lis vil\u00e1gra val\u00f3 alkalmaz\u00e1s\u00e1b\u00f3l ered, kiterjesztve a kiberbiztons\u00e1gi int\u00e9zked\u00e9seket az inform\u00e1ci\u00f3 tartalm\u00e1ra a kibert\u00e9rben. A t\u00e1mogat\u00f3k szerint ez elengedhetetlen a felel\u0151s internethaszn\u00e1lat \u00e9s a kock\u00e1zatok m\u00e9rs\u00e9kl\u00e9se \u00e9rdek\u00e9ben. Azonban a kritikusok r\u00e1mutatnak, hogy az autoriter orsz\u00e1gokban, ahol gyenge a jog\u00e1llamis\u00e1g, maga az inform\u00e1ci\u00f3 is fenyeget\u00e9sk\u00e9nt \u00e9rz\u00e9kelhet\u0151. A Freedom House szerint a kiber-szuverenit\u00e1s mag\u00e1ban foglalja, hogy a korm\u00e1nyok saj\u00e1t internetes szab\u00e1lyoz\u00e1sukat \u00e9rv\u00e9nyes\u00edtik, korl\u00e1tozva az inform\u00e1ci\u00f3 \u00e1raml\u00e1s\u00e1t az orsz\u00e1ghat\u00e1rokon.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"cybersecurity-beyond-its-technical-dimension\"><strong>A kiberbiztons\u00e1g technikai dimenzi\u00f3j\u00e1n t\u00fal<\/strong><\/h2>\n\n\n<p>A kiberbiztons\u00e1gi k\u00e9rd\u00e9sek jelent\u0151sek a kritikus geopolitikai strat\u00e9gi\u00e1kban, \u00e9s a nemzetk\u00f6zi kapcsolatok elm\u00e9letein kereszt\u00fcl vizsg\u00e1lhat\u00f3k \u00e9s \u00e9rthet\u0151k meg, k\u00fcl\u00f6n\u00f6sen a nemzetk\u00f6zi biztons\u00e1g ter\u00fclet\u00e9n. A k\u00e9t f\u0151 elm\u00e9leti iskola, a realizmus \u00e9s a liberalizmus, k\u00fcl\u00f6nb\u00f6z\u0151 n\u00e9z\u0151pontokat k\u00edn\u00e1l ezekre a k\u00e9rd\u00e9sekre.<\/p>\n\n\n\n<p>A realizmus kiemeli a kibert\u00e9r anarchikus term\u00e9szet\u00e9t, azt \u00e1ll\u00edtva, hogy ez a tulajdons\u00e1g elker\u00fclhetetlen\u00fcl \u00faj csatat\u00e9rr\u00e9 alak\u00edtja. Ez az anarchia lehet\u0151v\u00e9 teszi a hagyom\u00e1nyos geopolitikai rivaliz\u00e1l\u00e1sok kiterjeszt\u00e9s\u00e9t a fizikai vil\u00e1gb\u00f3l a kibert\u00e9rbe. K\u00f6vetkez\u00e9sk\u00e9ppen a kibert\u00e9rbeli konfliktusokat gyakran t\u00fcnetekk\u00e9nt, nem pedig f\u00fcggetlen esem\u00e9nyekk\u00e9nt tekintik.<\/p>\n\n\n\n<p>A kibert\u00e9r kaotikus term\u00e9szete els\u0151sorban egy \u00e1tfog\u00f3 \u00e9s hat\u00e9kony Kiberbiztons\u00e1gi Egyezm\u00e9ny hi\u00e1ny\u00e1nak k\u00f6sz\u00f6nhet\u0151, amely ide\u00e1lisan a k\u00f6vetkez\u0151 c\u00e9lokat \u00e9rn\u00e9 el:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Hozzon l\u00e9tre egy sz\u00e9lesk\u00f6r\u0171 jogi keretet a kiberbiztons\u00e1gi k\u00e9rd\u00e9sek kezel\u00e9s\u00e9re;<\/li>\n\n\n\n<li>Val\u00f3s\u00edtsa meg ezt a keretet glob\u00e1lisan, biztos\u00edtva az \u00e9rintett felek betart\u00e1s\u00e1t \u00e9s megfelel\u00e9s\u00e9t; \u00e9s<\/li>\n\n\n\n<li>Szabjon ki b\u00fcntet\u00e9seket azokra, akik nem tartj\u00e1k be.<\/li>\n<\/ol>\n\n\n\n<p>Ezen aspektusok kezel\u00e9se hat\u00e9konyabb megk\u00f6zel\u00edt\u00e9st alak\u00edthat ki a kiberbiztons\u00e1g ter\u00e9n, minimaliz\u00e1lva a konfliktus val\u00f3sz\u00edn\u0171s\u00e9g\u00e9t \u00e9s el\u0151seg\u00edtve a glob\u00e1lis egy\u00fcttm\u0171k\u00f6d\u00e9st.<\/p>\n\n\n\n<p>A realist\u00e1k azt \u00e1ll\u00edtj\u00e1k, hogy az \u00e1llamok a f\u0151 szerepl\u0151k a kibert\u00e9rben, ahol a hatalom kulcsfontoss\u00e1g\u00fa t\u00e9nyez\u0151. A \u201ckiberhatalom\u201d azt jelenti, hogy k\u00e9pesek vagyunk el\u00e9rni a k\u00edv\u00e1nt eredm\u00e9nyeket az \u00f6sszekapcsolt inform\u00e1ci\u00f3s er\u0151forr\u00e1sok kihaszn\u00e1l\u00e1s\u00e1val a kibernetikai ter\u00fcleten. \u00c1ltal\u00e1ban hat\u00e9konyabb, ha t\u00e1mad\u00f3 jelleggel haszn\u00e1lj\u00e1k, mint v\u00e9dekez\u0151 jelleggel, mivel neh\u00e9z azonos\u00edtani a t\u00e1mad\u00e1sokat, alacsony k\u00f6lts\u00e9gekkel j\u00e1r, \u00e9s nagy k\u00e1rokat okozhat.<\/p>\n\n\n\n<p>E realista perspekt\u00edva szerint a kiberfegyverkez\u00e9si versenyek megjelen\u00e9se az anarchia megl\u00e9t\u00e9re adott v\u00e1laszk\u00e9nt magyar\u00e1zhat\u00f3 a kibernetikai t\u00e9rben hatalmas \u00e1llamok \u00e1ltal. Ez a n\u00e9zet k\u00f6zvetetten elismeri a kiberfegyverek jelenl\u00e9t\u00e9t, amelyeket \u201csz\u00e1m\u00edt\u00f3g\u00e9pes k\u00f3dokk\u00e9nt \u00edrnak le, amelyek c\u00e9lja fizikai, funkcion\u00e1lis vagy ment\u00e1lis k\u00e1rok okoz\u00e1sa strukt\u00far\u00e1knak, rendszereknek vagy \u00e9l\u0151l\u00e9nyeknek.\u201d A kiberfegyverek \u00e9s a kiberfegyverkez\u00e9si versenyek fogalma a kibernetikai t\u00e9rben t\u00e1mogatja a realista \u00e9rvel\u00e9st.<\/p>\n\n\n\n<p>K\u00fcl\u00f6nb\u00f6z\u0151 szerepl\u0151k priorit\u00e1sk\u00e9nt kezelt\u00e9k a kiberszab\u00e1lyok kidolgoz\u00e1s\u00e1t, egy\u00fcttm\u0171k\u00f6dve korm\u00e1nyzati mechanizmusok l\u00e9trehoz\u00e1s\u00e1ban kifejezetten a kiberbiztons\u00e1g \u00e9rdek\u00e9ben. K\u00f6zponti hat\u00f3s\u00e1g n\u00e9lk\u00fcl a glob\u00e1lis korm\u00e1nyz\u00e1st k\u00fcl\u00f6nf\u00e9le szerepl\u0151k kezelik, bele\u00e9rtve az \u00e1llamokat, multilater\u00e1lis szervezeteket, civil t\u00e1rsadalmi szervezeteket \u00e9s mag\u00e1nv\u00e1llalatokat. Ezek a mechanizmusok hat\u00e9konyan kezelhetik \u00e9s ak\u00e1r meg is el\u0151zhetik a fenyeget\u00e9seket \u00e9s kock\u00e1zatokat a kibert\u00e9rben glob\u00e1lis \u00e9s region\u00e1lis szinten egyar\u00e1nt.<\/p>\n\n\n\n<p>Az egyik ilyen megk\u00f6zel\u00edt\u00e9s a nemzeti kiberbiztons\u00e1gi strat\u00e9gi\u00e1k kidolgoz\u00e1sa, amely ter\u00fcleten a Nemzetk\u00f6zi T\u00e1vk\u00f6zl\u00e9si Uni\u00f3 (ITU) k\u00f6zponti szerepet j\u00e1tszik. Ezek a strat\u00e9gi\u00e1k kulcsfontoss\u00e1g\u00faak a nemzetek kiberbiztons\u00e1g\u00e1nak jav\u00edt\u00e1s\u00e1t c\u00e9lz\u00f3 int\u00e9zked\u00e9sek megfogalmaz\u00e1s\u00e1ban \u00e9s v\u00e9grehajt\u00e1s\u00e1ban. Minden esetben azonos\u00edtj\u00e1k a strat\u00e9gi\u00e1k v\u00e9grehajt\u00e1s\u00e1\u00e9rt felel\u0151s r\u00e9sztvev\u0151ket, valamint azok szerepeit \u00e9s feladatait.<\/p>\n\n\n\n<p>Az ITU \u00fatmutat\u00f3ja mag\u00e1ban foglalja a k\u00fcl\u00f6nb\u00f6z\u0151 f\u00f6ldrajzi r\u00e9gi\u00f3kb\u00f3l sz\u00e1rmaz\u00f3 multilater\u00e1lis szervezetek, korm\u00e1nyk\u00f6zi \u00fcgyn\u00f6ks\u00e9gek, oktat\u00e1si int\u00e9zm\u00e9nyek, informatikai v\u00e1llalatok \u00e9s kock\u00e1zati tan\u00e1csad\u00f3k k\u00f6z\u00f6tti egy\u00fcttm\u0171k\u00f6d\u00e9st. Ez a k\u00f6z\u00f6s er\u0151fesz\u00edt\u00e9s seg\u00edt a kiberbiztons\u00e1g \u00f6sszetett k\u00e9rd\u00e9seinek kezel\u00e9s\u00e9ben \u00e9s mindenki sz\u00e1m\u00e1ra biztons\u00e1gosabb digit\u00e1lis k\u00f6rnyezet kialak\u00edt\u00e1s\u00e1ban.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"conclusion\"><strong>K\u00f6vetkeztet\u00e9s<\/strong><\/h2>\n\n\n<p>Elemz\u0151 szempontb\u00f3l a geopolitika \u00e9s a nemzetk\u00f6zi kapcsolatok elm\u00e9leti \u00e9s fogalmi eszk\u00f6zei \u00e9rt\u00e9kesek a kiberbiztons\u00e1gi elemz\u00e9sek le\u00edr\u00f3 \u00e9s magyar\u00e1z\u00f3 v\u00e9grehajt\u00e1sakor. Az els\u0151 fogalom tekintet\u00e9ben fontos elker\u00fclni azt a gyakori hib\u00e1t, hogy sz\u00e1mos t\u00e9m\u00e1t \u00e9s k\u00e9rd\u00e9st laz\u00e1n \u2019geopolitikainak\u201c min\u0151s\u00edtsenek. Ebben a kontextusban a kritikai geopolitikai megk\u00f6zel\u00edt\u00e9sek friss perspekt\u00edv\u00e1t k\u00edn\u00e1lnak. Ezek a megk\u00f6zel\u00edt\u00e9sek, elt\u00e9r\u0151en a hagyom\u00e1nyos perspekt\u00edv\u00e1kt\u00f3l, \u00faj \u201dter\u00fcletis\u00e9get\u201c biztos\u00edtanak a kibert\u00e9r sz\u00e1m\u00e1ra, jav\u00edtva meg\u00e9rt\u00e9s\u00fcnket.<\/p>\n\n\n\n<p>Ugyanakkor a nemzetk\u00f6zi kapcsolatok realista \u00e9s liber\u00e1lis elm\u00e9leti iskol\u00e1i seg\u00edtenek \u00e9rtelmezni a kapcsolatok term\u00e9szet\u00e9t \u00e9s dinamik\u00e1j\u00e1t ebben a virtu\u00e1lis t\u00e9rben. A realizmus hangs\u00falyozza annak anarchikus term\u00e9szet\u00e9t, az \u00e1llami szerepl\u0151k dominanci\u00e1j\u00e1t \u00e9s a hatalmi politika jelent\u0151s\u00e9g\u00e9t. Ugyanakkor a liber\u00e1lis perspekt\u00edv\u00e1k kiemelik a k\u00fcl\u00f6nf\u00e9le nem \u00e1llami szerepl\u0151k jelenl\u00e9t\u00e9t, \u00e9s azt \u00e1ll\u00edtj\u00e1k, hogy az anarchia cs\u00f6kken a kiberszab\u00e1lyok, multilater\u00e1lis meg\u00e1llapod\u00e1sok \u00e9s korm\u00e1nyzati mechanizmusok terjed\u00e9se miatt. Hasznos a kiberbiztons\u00e1gi k\u00e9rd\u00e9seket multidiszciplin\u00e1ris szempontb\u00f3l megk\u00f6zel\u00edteni, m\u00e1s tudom\u00e1nyter\u00fcletek fogalmait, technik\u00e1it \u00e9s eszk\u00f6zeit felhaszn\u00e1lva.<\/p>","protected":false},"excerpt":{"rendered":"<p>Cybersecurity has evolved beyond being solely a technical concern; it now plays a significant role in geopolitics as we navigate the information age. In today\u2019s digital environment, data and valuable\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/hu\/kiberbiztonsag\/a-kiberbiztonsag-geopolitikaja\/\">Folytat\u00e1s <span class=\"screen-reader-text\">A kiberbiztons\u00e1g geopolitik\u00e1ja<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":1718,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15],"tags":[],"class_list":["post-1711","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The geopolitics of cybersecurity | Security Briefing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/hu\/kiberbiztonsag\/a-kiberbiztonsag-geopolitikaja\/\" \/>\n<meta property=\"og:locale\" content=\"hu_HU\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The geopolitics of cybersecurity | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity has evolved beyond being solely a technical concern; it now plays a significant role in geopolitics as we navigate the information age. In today&#8217;s digital environment, data and valuable&hellip; Continue reading The geopolitics of cybersecurity\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/hu\/kiberbiztonsag\/a-kiberbiztonsag-geopolitikaja\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-08T15:30:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/The-geopolitics-of-cybersecurity-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"696\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Szerz\u0151:\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Becs\u00fclt olvas\u00e1si id\u0151\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 perc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-geopolitics-of-cybersecurity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-geopolitics-of-cybersecurity\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"The geopolitics of cybersecurity\",\"datePublished\":\"2023-04-08T15:30:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-geopolitics-of-cybersecurity\/\"},\"wordCount\":1167,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-geopolitics-of-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/The-geopolitics-of-cybersecurity-1.jpg\",\"articleSection\":[\"cybersecurity\"],\"inLanguage\":\"hu\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-geopolitics-of-cybersecurity\/\",\"url\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-geopolitics-of-cybersecurity\/\",\"name\":\"The geopolitics of cybersecurity | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-geopolitics-of-cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-geopolitics-of-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/The-geopolitics-of-cybersecurity-1.jpg\",\"datePublished\":\"2023-04-08T15:30:07+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-geopolitics-of-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"hu\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cybersecurity\/the-geopolitics-of-cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-geopolitics-of-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/The-geopolitics-of-cybersecurity-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/The-geopolitics-of-cybersecurity-1.jpg\",\"width\":696,\"height\":300,\"caption\":\"The geopolitics of cybersecurity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-geopolitics-of-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The geopolitics of cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hu\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/hu\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A kiberbiztons\u00e1g geopolitik\u00e1ja | Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/hu\/kiberbiztonsag\/a-kiberbiztonsag-geopolitikaja\/","og_locale":"hu_HU","og_type":"article","og_title":"The geopolitics of cybersecurity | Security Briefing","og_description":"Cybersecurity has evolved beyond being solely a technical concern; it now plays a significant role in geopolitics as we navigate the information age. In today&#8217;s digital environment, data and valuable&hellip; Continue reading The geopolitics of cybersecurity","og_url":"https:\/\/securitybriefing.net\/hu\/kiberbiztonsag\/a-kiberbiztonsag-geopolitikaja\/","og_site_name":"Security Briefing","article_published_time":"2023-04-08T15:30:07+00:00","og_image":[{"width":696,"height":300,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/The-geopolitics-of-cybersecurity-1.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Szerz\u0151:":"C\u00e9sar Daniel Barreto","Becs\u00fclt olvas\u00e1si id\u0151":"6 perc"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-geopolitics-of-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-geopolitics-of-cybersecurity\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"The geopolitics of cybersecurity","datePublished":"2023-04-08T15:30:07+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-geopolitics-of-cybersecurity\/"},"wordCount":1167,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-geopolitics-of-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/The-geopolitics-of-cybersecurity-1.jpg","articleSection":["cybersecurity"],"inLanguage":"hu"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-geopolitics-of-cybersecurity\/","url":"https:\/\/securitybriefing.net\/cybersecurity\/the-geopolitics-of-cybersecurity\/","name":"A kiberbiztons\u00e1g geopolitik\u00e1ja | Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-geopolitics-of-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-geopolitics-of-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/The-geopolitics-of-cybersecurity-1.jpg","datePublished":"2023-04-08T15:30:07+00:00","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-geopolitics-of-cybersecurity\/#breadcrumb"},"inLanguage":"hu","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cybersecurity\/the-geopolitics-of-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-geopolitics-of-cybersecurity\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/The-geopolitics-of-cybersecurity-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/The-geopolitics-of-cybersecurity-1.jpg","width":696,"height":300,"caption":"The geopolitics of cybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-geopolitics-of-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"The geopolitics of cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hu"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"C\u00e9sar D\u00e1niel Barreto","image":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto elismert kiberbiztons\u00e1gi \u00edr\u00f3 \u00e9s szak\u00e9rt\u0151, aki m\u00e9lyrehat\u00f3 tud\u00e1s\u00e1r\u00f3l \u00e9s k\u00e9pess\u00e9g\u00e9r\u0151l ismert, hogy egyszer\u0171s\u00edtse a bonyolult kiberbiztons\u00e1gi t\u00e9m\u00e1kat. Kiterjedt h\u00e1l\u00f3zatbiztons\u00e1gi \u00e9s adatv\u00e9delmi tapasztalattal rendelkezik, rendszeresen k\u00f6z\u00f6l betekint\u0151 cikkeket \u00e9s elemz\u00e9seket a leg\u00fajabb kiberbiztons\u00e1gi trendekr\u0151l, oktatva mind a szakembereket, mind a nagyk\u00f6z\u00f6ns\u00e9get.","url":"https:\/\/securitybriefing.net\/hu\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/1711","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/comments?post=1711"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/1711\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media\/1718"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media?parent=1711"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/categories?post=1711"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/tags?post=1711"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}