{"id":709,"date":"2022-10-05T20:20:36","date_gmt":"2022-10-05T20:20:36","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=709"},"modified":"2022-10-05T20:20:36","modified_gmt":"2022-10-05T20:20:36","slug":"a-kiberbiztonsag-fontossaga","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/hu\/kiberbiztonsag\/a-kiberbiztonsag-fontossaga\/","title":{"rendered":"A kiberbiztons\u00e1g fontoss\u00e1ga"},"content":{"rendered":"<p>A t\u00f6rt\u00e9nelem sor\u00e1n a konfliktusban r\u00e9sztvev\u0151k mindig a legkorszer\u0171bb technol\u00f3gi\u00e1t haszn\u00e1lt\u00e1k c\u00e9ljaik el\u0151mozd\u00edt\u00e1s\u00e1ra \u00e9s konkr\u00e9t c\u00e9lok el\u00e9r\u00e9s\u00e9re. Minden h\u00e1bor\u00faban \u00e1tt\u00f6r\u00e9seket alkalmaztak a val\u00f3s vagy v\u00e9lt ellens\u00e9gek elleni k\u00fczdelemben a tudom\u00e1nyos fejl\u0151d\u00e9s r\u00e9v\u00e9n.<\/p>\n\n\n\n<p>Azonban a mai konfliktusok m\u00e1r nem korl\u00e1toz\u00f3dnak a hagyom\u00e1nyos csataterekre; helyette az interneten is megtal\u00e1lhat\u00f3k \u2013 egy ellens\u00e9g, amely gyors \u00e9s f\u00fcrge. A kibert\u00e1mad\u00f3k tudj\u00e1k, hogy civiliz\u00e1ci\u00f3ink a digit\u00e1lis vil\u00e1gra t\u00e1maszkodnak, \u00e9s ha meg tudj\u00e1k zavarni \u00e9s destabiliz\u00e1lni, akkor egyetlen eg\u00e9rkattint\u00e1ssal jelent\u0151s gy\u0151zelmet arathatnak.<\/p>\n\n\n\n<h2><strong>A Stuxnet f\u00e9reg<\/strong><\/h2>\n\n\n\n<p>A szak\u00e9rt\u0151k szerint a Stuxnet sok centrifug\u00e1t k\u00e1ros\u00edtott meg Ir\u00e1n Natanz ur\u00e1nd\u00fas\u00edt\u00f3 \u00fczem\u00e9ben az\u00e1ltal, hogy ki\u00e9gette \u0151ket. M\u00e1s szervezetek id\u0151vel m\u00f3dos\u00edtott\u00e1k a v\u00edrust, \u00e9s az elektromos gener\u00e1torokra, v\u00edzkezel\u0151 \u00fczemekre \u00e9s g\u00e1zvezet\u00e9kekre \u00f6sszpontos\u00edtottak.<\/p>\n\n\n\n<p>A Stuxnet egy t\u00f6bb r\u00e9szb\u0151l \u00e1ll\u00f3 v\u00edrus volt, amely behatolt a Windows sz\u00e1m\u00edt\u00f3g\u00e9pekbe, USB-meghajt\u00f3kon kereszt\u00fcl terjedt, \u00e9s ipari vez\u00e9rl\u0151rendszereket k\u00e1ros\u00edtott. A rosszindulat\u00fa program minden felt\u00f6rt g\u00e9pet megvizsg\u00e1lt a Siemens Step 7 szoftver jelei ut\u00e1n, amelyet a PLC-vel rendelkez\u0151 ipari g\u00e9pek haszn\u00e1lnak az elektromechanikai berendez\u00e9sek automatiz\u00e1l\u00e1s\u00e1ra \u00e9s kezel\u00e9s\u00e9re.<\/p>\n\n\n\n<p>Miut\u00e1n a rosszindulat\u00fa program felfedezett egy PLC sz\u00e1m\u00edt\u00f3g\u00e9pet, friss k\u00f3dot t\u00f6lt\u00f6tt le az internetr\u0151l, \u00e9s rosszindulat\u00fa utas\u00edt\u00e1sokat kezdett kiadni a PC-vez\u00e9relt eszk\u00f6znek. Ugyanakkor hamis adatokat k\u00fcld\u00f6tt a vez\u00e9rl\u0151rendszernek. Ha ezt nem ellen\u0151rzik, s\u00falyos k\u00e1rokat okozhat.<\/p>\n\n\n\n<p>Kiberh\u00edrszerz\u00e9si forr\u00e1sok szerint 2012-ben a Stuxnetet let\u00f6lt\u00f6tt\u00e9k a Natanz ur\u00e1nd\u00fas\u00edt\u00f3 \u00fczem rendszereire. A \u201cf\u00e9reg\u201d rosszindulat\u00fa program behatolt a h\u00e1l\u00f3zatokba, \u00e9s a Windows szoftvert futtat\u00f3 g\u00e9peket c\u00e9lozta meg az elektromechanikai berendez\u00e9sek automatiz\u00e1l\u00e1s\u00e1ra \u00e9s kezel\u00e9s\u00e9re.<\/p>\n\n\n\n<p>Miut\u00e1n a v\u00edrus befejezte az ur\u00e1n m\u00e9r\u00e9seit, elkezdte \u00f6nmag\u00e1t megsemmis\u00edteni, \u00e9s haszn\u00e1lhatatlann\u00e1 tette az ur\u00e1nt.<\/p>\n\n\n\n<p>A program c\u00e9lja az ur\u00e1n min\u0151s\u00e9g\u00e9nek cs\u00f6kkent\u00e9se volt, ez\u00e9rt a v\u00edrus el\u0151sz\u00f6r a l\u00e9tes\u00edtm\u00e9ny centrifug\u00e1lis berendez\u00e9seinek sebess\u00e9g\u00e9t c\u00e9lozta meg. A megfigyel\u0151k sz\u00e1m\u00e1ra norm\u00e1lisnak t\u0171nt, ami \u201c\u00e1lland\u00f3 \u00e1llapotot\u201d eredm\u00e9nyezett. Az ur\u00e1n pusztul\u00e1sa csak akkor der\u00fclt ki, amikor a l\u00e9tes\u00edtm\u00e9ny berendez\u00e9sei \u00f6nmegsemmis\u00edt\u00e9sbe kezdtek. Addigra a Stuxnet teljes\u00edtette c\u00e9lj\u00e1t.<\/p>\n\n\n\n<p>De ennek a v\u00edrusnak a k\u00f3dja nyilv\u00e1noss\u00e1gra ker\u00fclt. Az\u00f3ta m\u00e1sok m\u00f3dos\u00edtott\u00e1k, hogy m\u00e1s infrastruktur\u00e1lis l\u00e9tes\u00edtm\u00e9nyeket c\u00e9lozzanak meg, bele\u00e9rtve a v\u00edzkezel\u0151 \u00fczemeket, g\u00e1zvezet\u00e9keket, er\u0151m\u0171veket \u00e9s kommunik\u00e1ci\u00f3s h\u00e1l\u00f3zatokat.<\/p>\n\n\n\n<h2><strong>A s\u00f6t\u00e9tben: Kritikus ipar\u00e1gak szembes\u00fclnek kibert\u00e1mad\u00e1sokkal<\/strong><\/h2>\n\n\n\n<p>A <a href=\"https:\/\/www.mcafee.com\/blogs\/enterprise\/in-the-dark-crucial-industries-confront-cyberattacks\/\">McAfee<\/a>, szerint 2011-ben a v\u00e1llalatok volt hackereket alkalmaztak, mert nem tal\u00e1ltak el\u00e9g embert a megfelel\u0151 k\u00e9szs\u00e9gekkel, hogy megv\u00e9dj\u00e9k h\u00e1l\u00f3zataikat. A Strat\u00e9giai \u00e9s Nemzetk\u00f6zi Tanulm\u00e1nyok K\u00f6zpontja a k\u00f6vetkez\u0151 aggaszt\u00f3 t\u00e9nyeket emelte ki:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A zsarol\u00e1s a legelterjedtebb kiberfenyeget\u00e9s, amellyel a vil\u00e1g energiaipara szembes\u00fcl.<\/li>\n<li>K\u00f6r\u00fclbel\u00fcl a mexik\u00f3i \u00e1ramszolg\u00e1ltat\u00f3k 80%-\u00e1t c\u00e9lozt\u00e1k meg kibert\u00e1mad\u00e1sok.<\/li>\n<li>A vil\u00e1g energiaell\u00e1t\u00f3inak t\u00f6bb mint negyed\u00e9t zsarolt\u00e1k meg.<\/li>\n<li>Az indiai \u00e1ramszolg\u00e1ltat\u00f3k 60%-\u00e1t felt\u00f6rt\u00e9k.<\/li>\n<li>\u201cA \u201dDuqu\u201d, a Stuxnet egy v\u00e1ltozata, nyolc orsz\u00e1g energia\u00fczemeiben tal\u00e1lhat\u00f3 meg.<\/li>\n<\/ul>\n\n\n\n<h2><strong>A digit\u00e1lis vil\u00e1g csatat\u00e9r<\/strong><\/h2>\n\n\n\n<p>T\u00f6rt\u00e9nelmileg a t\u00e1mad\u00f3k v\u00edz- \u00e9s \u00e9lelmiszerforr\u00e1sokat t\u00e1madtak meg, hogy gyeng\u00edts\u00e9k ellens\u00e9geiket. A m\u00e1sodik vil\u00e1gh\u00e1bor\u00faban p\u00e9ld\u00e1ul k\u00f6zm\u0171veket \u00e9s ipari v\u00e1rosokat puszt\u00edtottak el, hogy akad\u00e1lyozz\u00e1k a megsz\u00e1ll\u00f3 hadseregek h\u00e1bor\u00fas er\u0151fesz\u00edt\u00e9seit. Ezeket a m\u00f3dszereket ma is alkalmazz\u00e1k, mert hat\u00e9konyak; ellenfeleink t\u00f6bb ezer m\u00e9rf\u00f6ldre lehetnek a sz\u00e1m\u00edt\u00f3g\u00e9p k\u00e9perny\u0151je m\u00f6g\u00f6tt, de val\u00f3di vil\u00e1gra kihat\u00f3 t\u00e1mad\u00e1sokat ind\u00edthatnak ellen\u00fcnk.<\/p>\n\n\n\n<p>H\u00e1bor\u00faban \u00e1llunk, \u00e9s meg kell v\u00e1ltoztatnunk gondolkod\u00e1sunkat, hogy alkalmazkodjunk ehhez az \u00faj csatat\u00e9rhez. B\u00e1rmelyik\u00fcnk c\u00e9lpont lehet. Ha le akarjuk gy\u0151zni ellens\u00e9g\u00fcnket, el\u0151sz\u00f6r meg kell \u00e9rten\u00fcnk az \u00faj k\u00f6rnyezetet \u00e9s szab\u00e1lyokat.<\/p>\n\n\n\n<h2><strong>A kiberbiztons\u00e1g fontosabb, mint valaha<\/strong><\/h2>\n\n\n\n<p>A kiberbiztons\u00e1g ir\u00e1nti ig\u00e9ny soha nem volt nagyobb. Az internet megjelen\u00e9s\u00e9vel \u00e9let\u00fcnk egyre ink\u00e1bb a technol\u00f3gi\u00e1t\u00f3l f\u00fcgg. A sz\u00e1m\u00edt\u00f3g\u00e9pekre t\u00e1maszkodunk mindenben, a kommunik\u00e1ci\u00f3t\u00f3l a banki \u00fcgyint\u00e9z\u00e9sig \u00e9s sz\u00f3rakoz\u00e1sig. De ez a f\u00fcgg\u0151s\u00e9g \u00e1rat k\u00f6vetel. Ahogy \u00e9let\u00fcnk az online t\u00e9rbe k\u00f6lt\u00f6zik, egyre sebezhet\u0151bb\u00e9 v\u00e1lunk a kibert\u00e1mad\u00e1sokkal szemben.<\/p>\n\n\n\n<p>\u00c9s ezek a fenyeget\u00e9sek egyre gyakoribbak \u00e9s kifinomultabbak. A hackerek m\u00e1r nem el\u00e9gednek meg azzal, hogy ellopj\u00e1k az inform\u00e1ci\u00f3inkat; most m\u00e1r \u00e9let\u00fcnket \u00e9s gazdas\u00e1gunkat akarj\u00e1k megzavarni. 2017-ben egy jelent\u0151s kibert\u00e1mad\u00e1s b\u00e9n\u00edtotta meg Nagy-Britannia Nemzeti Eg\u00e9szs\u00e9g\u00fcgyi Szolg\u00e1lat\u00e1t. A WannaCry zsarol\u00f3v\u00edrus titkos\u00edtotta az adatokat, \u00e9s v\u00e1lts\u00e1gd\u00edjat k\u00f6vetelt a visszaad\u00e1suk\u00e9rt. A t\u00e1mad\u00e1s sz\u00e9lesk\u00f6r\u0171 zavart okozott, \u00e9s milli\u00f3kba ker\u00fclt az NHS-nek.<\/p>\n\n\n\n<p>2018-ban l\u00e1ttuk a t\u00f6rt\u00e9nelem legnagyobb kibert\u00e1mad\u00e1s\u00e1t. A NotPetya v\u00edrus vil\u00e1gszerte megfert\u0151zte a sz\u00e1m\u00edt\u00f3g\u00e9peket, milli\u00e1rd doll\u00e1ros k\u00e1rokat okozva. A v\u00edrus titkos\u00edtotta az adatokat \u00e9s v\u00e1lts\u00e1gd\u00edjat k\u00f6vetelt, de a t\u00e1mad\u00f3k nem biztos\u00edtottak m\u00f3dot az adatok visszafejt\u00e9s\u00e9re. Ennek eredm\u00e9nyek\u00e9nt sok v\u00e1llalat elvesztette hozz\u00e1f\u00e9r\u00e9s\u00e9t l\u00e9tfontoss\u00e1g\u00fa adataihoz.<\/p>\n\n\n\n<p>Ezek a t\u00e1mad\u00e1sok megmutatj\u00e1k, hogy sebezhet\u0151ek vagyunk. Azt is megmutatj\u00e1k, hogy a jelenlegi kiberbiztons\u00e1gi megk\u00f6zel\u00edt\u00e9s\u00fcnk nem m\u0171k\u00f6dik. T\u00f6bbet kell tenn\u00fcnk, hogy megv\u00e9dj\u00fck magunkat a kibert\u00e1mad\u00e1sokt\u00f3l.<\/p>\n\n\n\n<p>Sz\u00e1mos l\u00e9p\u00e9st tehet\u00fcnk a kiberbiztons\u00e1gunk jav\u00edt\u00e1sa \u00e9rdek\u00e9ben, de el\u0151sz\u00f6r alapvet\u0151 v\u00e1ltoz\u00e1st kell v\u00e9grehajtanunk a biztons\u00e1gr\u00f3l alkotott gondolkod\u00e1sunkban. El kell t\u00e1volodnunk att\u00f3l a gondolatt\u00f3l, hogy a biztons\u00e1got csak technol\u00f3gi\u00e1val lehet el\u00e9rni. A technol\u00f3gia fontos, de nem el\u00e9g. Meg kell v\u00e1ltoztatnunk a gondolkod\u00e1sm\u00f3dunkat is.<\/p>\n\n\n\n<h2><strong>\u00c9rts\u00fck meg a fenyeget\u00e9st<\/strong><\/h2>\n\n\n\n<p>Az els\u0151 l\u00e9p\u00e9s a fenyeget\u00e9s meg\u00e9rt\u00e9se. Meg kell tanulnunk a fenyeget\u00e9s term\u00e9szet\u00e9r\u0151l \u00e9s az azt elk\u00f6vet\u0151 emberekr\u0151l. Tudat\u00e1ban kell lenn\u00fcnk azoknak a technik\u00e1knak, amelyeket a t\u00e1mad\u00e1sok sor\u00e1n haszn\u00e1lnak. \u00c9s meg kell \u00e9rten\u00fcnk azokat a sebezhet\u0151s\u00e9geket, amelyeket kihaszn\u00e1lnak.<\/p>\n\n\n\n<h2><strong>V\u00e1ltoztassunk a gondolkod\u00e1sm\u00f3dunkon<\/strong><\/h2>\n\n\n\n<p>A m\u00e1sodik l\u00e9p\u00e9s a gondolkod\u00e1sm\u00f3dunk megv\u00e1ltoztat\u00e1sa. A biztons\u00e1got folyamatk\u00e9nt kell kezeln\u00fcnk, nem term\u00e9kk\u00e9nt, \u00e9s be kell \u00e9p\u00edten\u00fcnk mindennapjainkba. M\u00e1s sz\u00f3val, proakt\u00edvnak kell lenn\u00fcnk, nem reakt\u00edvnak. \u00c9s egy\u00fctt kell dolgoznunk, hogy vil\u00e1gunk biztons\u00e1gosabb hely legyen.<\/p>\n\n\n\n<h2><strong>Cselekedj\u00fcnk<\/strong><\/h2>\n\n\n\n<p>A harmadik l\u00e9p\u00e9s a cselekv\u00e9s. Meg kell val\u00f3s\u00edtanunk azokat a v\u00e1ltoztat\u00e1sokat, amelyekr\u0151l besz\u00e9lt\u00fcnk, \u00e9s befektetn\u00fcnk a kiberbiztons\u00e1gba, hogy biztos\u00edtsuk, hogy gyorsan \u00e9s hat\u00e9konyan tudjunk reag\u00e1lni a kiberfenyeget\u00e9sekre.<\/p>\n\n\n\n<h2><strong>A l\u00e9nyeg<\/strong><\/h2>\n\n\n\n<p>A kiberbiztons\u00e1g fontos, mert h\u00e1bor\u00faban \u00e1llunk. Ellens\u00e9g\u00fcnk agilis \u00e9s gyorsan mozg\u00f3, \u00e9s olyan technol\u00f3gi\u00e1t haszn\u00e1l, amellyel olyan m\u00e9rt\u00e9k\u0171 t\u00e1mad\u00e1sokat ind\u00edt, amilyeneket m\u00e9g soha nem l\u00e1ttunk. Meg kell v\u00e1ltoztatnunk a gondolkod\u00e1sm\u00f3dunkat \u00e9s a biztons\u00e1ghoz val\u00f3 hozz\u00e1\u00e1ll\u00e1sunkat. \u00c9s egy\u00fctt kell dolgoznunk, hogy vil\u00e1gunk biztons\u00e1gosabb hely legyen.<\/p>\n\n\n\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>Throughout history, those engaged in conflict have always used the most up-to-date technology to advance their cause and achieve specific goals. In every war, breakthroughs have been utilized to combat\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/hu\/kiberbiztonsag\/a-kiberbiztonsag-fontossaga\/\">Folytat\u00e1s <span class=\"screen-reader-text\">A kiberbiztons\u00e1g fontoss\u00e1ga<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":998,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15],"tags":[],"class_list":["post-709","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The importance of cyber security | Security Briefing<\/title>\n<meta name=\"description\" content=\"Cybersecurity is more important than ever. Learn why you need to take your online security seriously and how to keep yourself safe.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/hu\/kiberbiztonsag\/a-kiberbiztonsag-fontossaga\/\" \/>\n<meta property=\"og:locale\" content=\"hu_HU\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The importance of cyber security | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity is more important than ever. Learn why you need to take your online security seriously and how to keep yourself safe.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/hu\/kiberbiztonsag\/a-kiberbiztonsag-fontossaga\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-05T20:20:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/The-importance-of-cyber-security-2-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"558\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Szerz\u0151:\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Becs\u00fclt olvas\u00e1si id\u0151\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 perc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"The importance of cyber security\",\"datePublished\":\"2022-10-05T20:20:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/\"},\"wordCount\":1046,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/The-importance-of-cyber-security-2-1.jpg\",\"articleSection\":[\"cybersecurity\"],\"inLanguage\":\"hu\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/\",\"url\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/\",\"name\":\"The importance of cyber security | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/The-importance-of-cyber-security-2-1.jpg\",\"datePublished\":\"2022-10-05T20:20:36+00:00\",\"description\":\"Cybersecurity is more important than ever. Learn why you need to take your online security seriously and how to keep yourself safe.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#breadcrumb\"},\"inLanguage\":\"hu\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/The-importance-of-cyber-security-2-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/The-importance-of-cyber-security-2-1.jpg\",\"width\":558,\"height\":500,\"caption\":\"The importance of cyber security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The importance of cyber security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hu\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/hu\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A kiberbiztons\u00e1g fontoss\u00e1ga | Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","description":"A kiberbiztons\u00e1g fontosabb, mint valaha. Tudja meg, mi\u00e9rt kell komolyan vennie az online biztons\u00e1g\u00e1t, \u00e9s hogyan tarthatja mag\u00e1t biztons\u00e1gban.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/hu\/kiberbiztonsag\/a-kiberbiztonsag-fontossaga\/","og_locale":"hu_HU","og_type":"article","og_title":"The importance of cyber security | Security Briefing","og_description":"Cybersecurity is more important than ever. Learn why you need to take your online security seriously and how to keep yourself safe.","og_url":"https:\/\/securitybriefing.net\/hu\/kiberbiztonsag\/a-kiberbiztonsag-fontossaga\/","og_site_name":"Security Briefing","article_published_time":"2022-10-05T20:20:36+00:00","og_image":[{"width":558,"height":500,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/The-importance-of-cyber-security-2-1.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"Szerz\u0151:":"security","Becs\u00fclt olvas\u00e1si id\u0151":"5 perc"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"The importance of cyber security","datePublished":"2022-10-05T20:20:36+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/"},"wordCount":1046,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/The-importance-of-cyber-security-2-1.jpg","articleSection":["cybersecurity"],"inLanguage":"hu"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/","url":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/","name":"A kiberbiztons\u00e1g fontoss\u00e1ga | Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/The-importance-of-cyber-security-2-1.jpg","datePublished":"2022-10-05T20:20:36+00:00","description":"A kiberbiztons\u00e1g fontosabb, mint valaha. Tudja meg, mi\u00e9rt kell komolyan vennie az online biztons\u00e1g\u00e1t, \u00e9s hogyan tarthatja mag\u00e1t biztons\u00e1gban.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#breadcrumb"},"inLanguage":"hu","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/"]}]},{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/The-importance-of-cyber-security-2-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/The-importance-of-cyber-security-2-1.jpg","width":558,"height":500,"caption":"The importance of cyber security"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"The importance of cyber security"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hu"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"biztons\u00e1g","image":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin a Government Technology vezet\u0151 munkat\u00e1rsa. Kor\u00e1bban a PYMNTS \u00e9s a The Bay State Banner sz\u00e1m\u00e1ra \u00edrt, \u00e9s a Carnegie Mellon Egyetemen szerzett B.A. diplom\u00e1t kreat\u00edv \u00edr\u00e1sb\u00f3l. Boston k\u00f6rny\u00e9k\u00e9n \u00e9l.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/hu\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/709","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/comments?post=709"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/709\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media\/998"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media?parent=709"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/categories?post=709"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/tags?post=709"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}