{"id":4217,"date":"2022-08-30T14:06:36","date_gmt":"2022-08-30T12:06:36","guid":{"rendered":"https:\/\/dev.bezpecnevofirme.eset.com\/sk\/?p=4217"},"modified":"2022-10-18T13:04:01","modified_gmt":"2022-10-18T11:04:01","slug":"strojove-ucenie-ako-je-napomocne-pre-it-spravcov-a-tiez-hackerov","status":"publish","type":"post","link":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/strojove-ucenie-ako-je-napomocne-pre-it-spravcov-a-tiez-hackerov\/","title":{"rendered":"Strojov\u00e9 u\u010denie: ako je n\u00e1pomocn\u00e9 pre IT spr\u00e1vcov (a tie\u017e hackerov)?"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"628\" src=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/09\/hlavny-banner-BVF-1200x628_strojove_ucenie.jpg\" alt=\"strojov\u00e9 u\u010denie a kybernetick\u00e1 bezpe\u010dnos\u0165 n\u00e1h\u013eadov\u00fd obr\u00e1zok\" class=\"wp-image-4333\" srcset=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/09\/hlavny-banner-BVF-1200x628_strojove_ucenie.jpg 1200w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/09\/hlavny-banner-BVF-1200x628_strojove_ucenie-300x157.jpg 300w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/09\/hlavny-banner-BVF-1200x628_strojove_ucenie-1024x536.jpg 1024w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/09\/hlavny-banner-BVF-1200x628_strojove_ucenie-768x402.jpg 768w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/09\/hlavny-banner-BVF-1200x628_strojove_ucenie-370x194.jpg 370w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/09\/hlavny-banner-BVF-1200x628_strojove_ucenie-760x398.jpg 760w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Umel\u00e1 inteligencia (AI) a&nbsp;strojov\u00e9 u\u010denie (ML) patria k&nbsp;jednej z&nbsp;najdiskutovanej\u0161\u00edch t\u00e9m v&nbsp;oblasti&nbsp;IT. Niektor\u00ed v&nbsp;nich vidia potenci\u00e1l poskytova\u0165 dokonal\u00fa ochranu pred \u0161kodliv\u00fdm softv\u00e9rom, zatia\u013e \u010do in\u00ed sa ob\u00e1vaj\u00fa, \u017ee by mohli vydl\u00e1\u017edi\u0165 cestu sofistikovanej\u0161\u00edm kybernetick\u00fdm \u00fatokom. Pokia\u013e ide o&nbsp;digit\u00e1lnu bezpe\u010dnos\u0165, oba poh\u013eady s\u00fa spr\u00e1vne.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Umel\u00e1 inteligencia nie je len strojov\u00e9 u\u010denie<\/h2>\n\n\n\n<p>O&nbsp;umelej inteligencii a&nbsp;strojovom u\u010den\u00ed sa hovor\u00ed u\u017e dlho. E\u0161te v\u0161ak nie je \u00faplne zn\u00e1me, ak\u00fd potenci\u00e1l zmeny sa v&nbsp;t\u00fdchto technol\u00f3gi\u00e1ch skr\u00fdva. Jedna vec je ale ist\u00e1: umel\u00e1 inteligencia, ktor\u00fa pozn\u00e1me z&nbsp;filmov\u00e9ho pl\u00e1tna, je e\u0161te st\u00e1le hudbou bud\u00facnosti.<\/p>\n\n\n\n<p>Pojmy <em>umel\u00e1 inteligencia<\/em> a&nbsp;<em>strojov\u00e9 u\u010denie sa<\/em> \u010dasto nespr\u00e1vne pou\u017e\u00edvaj\u00fa ako synonym\u00e1. Umel\u00e1 inteligencia ozna\u010duje<strong> stroj schopn\u00fd sa u\u010di\u0165 a&nbsp;kona\u0165 samostatne a&nbsp;\u201einteligentne\u201c<\/strong>, bez \u013eudskej interakcie a&nbsp;v\u00fdlu\u010dne na z\u00e1klade vonkaj\u0161\u00edch vstupov. Strojov\u00e9 u\u010denie zasa vyu\u017e\u00edva algoritmy na spracovanie \u00fadajov s&nbsp;cie\u013eom samostatne vykon\u00e1va\u0165 konkr\u00e9tne \u00falohy. Po\u010d\u00edta\u010d tak dok\u00e1\u017ee r\u00fdchlo identifikova\u0165 \u0161trukt\u00fary a&nbsp;anom\u00e1lie vo&nbsp;ve\u013ekom mno\u017estve \u00fadajov a&nbsp;rozdeli\u0165 ich na men\u0161ie jednotky nevyhnutn\u00e9 pre dan\u00fa \u00falohu (generovanie modelu). Strojov\u00e9 u\u010denie sa v\u0161ak st\u00e1le pova\u017euje predov\u0161etk\u00fdm za jadro umelej inteligencie.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\u013dudia a&nbsp;androidi? T\u00edm snov schopn\u00fd porazi\u0165 hackerov<\/h2>\n\n\n\n<p>Strojov\u00e9 u\u010denie m\u00e1 ve\u013ek\u00fd v\u00fdznam v&nbsp;boji proti kybernetick\u00e9mu zlo\u010dinu, najm\u00e4 pokia\u013e ide o&nbsp;detekciu malv\u00e9ru. Na z\u00e1klade obrovsk\u00e9ho mno\u017estva \u00fadajov je strojov\u00e9 u\u010denie tr\u00e9novan\u00e9 na <strong>spr\u00e1vne filtrovanie s\u00faborov a&nbsp;vzoriek do kateg\u00f3ri\u00ed \u201ene\u0161kodn\u00e9\u201c a&nbsp;\u201e\u0161kodliv\u00e9\u201c.<\/strong>&nbsp;Ka\u017ed\u00fd nov\u00fd a&nbsp;nezn\u00e1my prvok sa tak automaticky zarad\u00ed do jednej z&nbsp;t\u00fdchto dvoch kateg\u00f3ri\u00ed. Vy\u017eaduje sa v\u0161ak dostato\u010dne ve\u013ek\u00fd objem vstupn\u00fdch \u00fadajov, aby mohla by\u0165 ka\u017ed\u00e1 inform\u00e1cia spr\u00e1vne roztrieden\u00e1. \u010casto sa v\u0161ak nespr\u00e1vne uv\u00e1dza, \u017ee algoritmus dok\u00e1\u017ee nov\u00e9 prvky triedi\u0165 s&nbsp;dokonalou presnos\u0165ou v\u010faka dodaniu rozsiahleho s\u00faboru \u00fadajov. Skuto\u010dnos\u0165 je tak\u00e1, \u017ee v&nbsp;pr\u00edpade sporn\u00fdch v\u00fdsledkov je aj na\u010falej potrebn\u00e1 z\u00e1vere\u010dn\u00e1 kontrola a&nbsp;overenie zo strany \u010dloveka.<\/p>\n\n\n\n<p>Pokia\u013e ide o&nbsp;u\u010denie sa z&nbsp;kontextu a&nbsp;kreat\u00edvne rie\u0161enie, \u013eudia st\u00e1le vynikaj\u00fa nad strojmi. V&nbsp;tejto oblasti sa algoritmy e\u0161te maj\u00fa \u010do u\u010di\u0165. Profesion\u00e1lni v\u00fdvoj\u00e1ri \u0161kodliv\u00e9ho softv\u00e9ru m\u00f4\u017eu napr\u00edklad \u0161ikovne zamaskova\u0165 skuto\u010dn\u00fd z\u00e1mer k\u00f3du. \u0160kodliv\u00fd k\u00f3d m\u00f4\u017ee by\u0165 ukryt\u00fd v&nbsp;pixeloch napoh\u013ead \u010dist\u00e9ho obrazov\u00e9ho s\u00faboru a&nbsp;podobne sa m\u00f4\u017eu mal\u00e9 \u010dasti \u0161kodliv\u00e9ho k\u00f3du skr\u00fdva\u0165 v&nbsp;konkr\u00e9tnych s\u00faboroch. \u0160kodliv\u00fd \u00fa\u010dinok sa tak m\u00f4\u017ee prejavi\u0165 a\u017e po spojen\u00ed jednotliv\u00fdch prvkov. Algoritmus strojov\u00e9ho u\u010denia nemus\u00ed by\u0165 schopn\u00fd identifikova\u0165 tak\u00fdto proces a&nbsp;vo&nbsp;v\u00fdsledku m\u00f4\u017ee urobi\u0165 nespr\u00e1vne rozhodnutie. Naopak, ak je v&nbsp;poz\u00edcii \u201elovca malv\u00e9ru\u201c \u010dlovek, ten dok\u00e1\u017ee nebezpe\u010denstvo rozpozna\u0165 presnej\u0161ie na z\u00e1klade svojich odborn\u00fdch vedomost\u00ed, sk\u00fasenost\u00ed \u010di intu\u00edcie. V&nbsp;z\u00e1ujme akt\u00edvnej prevencie \u0161kodliv\u00e9ho k\u00f3du je preto ide\u00e1lne, ak \u013eudia a&nbsp;stroje spolupracuj\u00fa.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Strojov\u00e9 u\u010denie je len malou s\u00fa\u010das\u0165ou strat\u00e9gie IT&nbsp;zabezpe\u010denia<\/h2>\n\n\n\n<p>Strojov\u00e9 u\u010denie je z\u00e1kladom strat\u00e9gie IT&nbsp;zabezpe\u010denia u\u017e od 90.&nbsp;rokov minul\u00e9ho storo\u010dia. Uplynul\u00e9 desa\u0165ro\u010die digit\u00e1lnej \u00e9ry n\u00e1s nau\u010dilo, \u017ee na zlo\u017eit\u00e9 probl\u00e9my neexistuj\u00fa jednoduch\u00e9 rie\u0161enia. Plat\u00ed to najm\u00e4 v&nbsp;kybernetickom priestore, kde sa podmienky m\u00f4\u017eu zmeni\u0165 v&nbsp;priebehu nieko\u013ek\u00fdch sek\u00fand. V dne\u0161nom svete by bolo nerozumn\u00e9 spolieha\u0165 sa pri budovan\u00ed odolnej kybernetickej obrany len na jednu technol\u00f3giu. Pracovn\u00edci na rozhoduj\u00facich poz\u00edci\u00e1ch v&nbsp;oblasti IT si musia uvedomi\u0165, \u017ee hoci je strojov\u00e9 u\u010denie nepochybne cenn\u00fdm n\u00e1strojom v&nbsp;boji proti po\u010d\u00edta\u010dovej kriminalite, malo by by\u0165 v\u017edy len jednou zo&nbsp;s\u00fa\u010dast\u00ed celkovej bezpe\u010dnostnej strat\u00e9gie firmy. Implement\u00e1cia sofistikovan\u00fdch IT rie\u0161en\u00ed si st\u00e1le vy\u017eaduje odborn\u00e9 znalosti re\u00e1lnych \u013eud\u00ed: bezpe\u010dnostn\u00fdch pracovn\u00edkov a&nbsp;IT spr\u00e1vcov.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Kybernetick\u00ed zlo\u010dinci dr\u017eia krok s&nbsp;\u201einteligentnou\u201c \u00e9rou<\/h2>\n\n\n\n<p>Strojov\u00e9 u\u010denie je popul\u00e1rne aj v&nbsp;odvetv\u00ed po\u010d\u00edta\u010dovej kriminality.&nbsp;<strong>\u010coraz viac hackerov vyu\u017e\u00edva strojov\u00e9 u\u010denie na vyh\u013ead\u00e1vanie potenci\u00e1lnych obet\u00ed, na samotn\u00e9 \u00fatoky alebo na kr\u00e1de\u017e cenn\u00fdch \u00fadajov prostredn\u00edctvom spamov\u00fdch a&nbsp;phishingov\u00fdch kampan\u00ed.<\/strong>&nbsp;Strojov\u00e9 u\u010denie tie\u017e dok\u00e1\u017ee n\u00e1js\u0165 medzery a&nbsp;slab\u00e9 miesta. Zlo\u010dinci pou\u017e\u00edvaj\u00fa algoritmy strojov\u00e9ho u\u010denia aj na ochranu svojej IT&nbsp;infra\u0161trukt\u00fary (napr. botnetov).<\/p>\n\n\n\n<p>Pre \u00fato\u010dn\u00edkov m\u00f4\u017eu by\u0165 mimoriadne atrakt\u00edvnym cie\u013eom spolo\u010dnosti, ktor\u00e9 pou\u017e\u00edvaj\u00fa strojov\u00e9 u\u010denie vo&nbsp;v\u00e4\u010d\u0161om rozsahu. Infikovan\u00edm vstupn\u00fdch \u00fadajov toti\u017e kybernetick\u00ed zlo\u010dinci dok\u00e1\u017eu sp\u00f4sobi\u0165, \u017ee inak funk\u010dn\u00e9 syst\u00e9my za\u010dn\u00fa vykazova\u0165 chybn\u00e9 v\u00fdsledky. Za\u010dn\u00fa robi\u0165 zl\u00e9 strategick\u00e9 rozhodnutia, \u010do <strong>vy\u00fasti do&nbsp;chaosu, naru\u0161enia prev\u00e1dzky a&nbsp;niekedy aj nenapravite\u013enej \u0161kody.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Emotet: malv\u00e9r zalo\u017een\u00fd na strojovom u\u010den\u00ed<\/h2>\n\n\n\n<p>Emotet, malv\u00e9r vytvoren\u00fd na z\u00e1klade strojov\u00e9ho u\u010denia, koluje po internete u\u017e dlh\u00e9 roky. Hackeri ho pou\u017e\u00edvaj\u00fa na automatick\u00e9 s\u0165ahovanie ne\u017eelan\u00fdch aplik\u00e1ci\u00ed, ako s\u00fa bankov\u00e9 tr\u00f3jske kone, do po\u010d\u00edta\u010da obete. V\u010faka strojov\u00e9mu u\u010deniu <strong>si Emotet dok\u00e1\u017ee svoje obete vybera\u0165 ve\u013emi cielene<\/strong>.&nbsp;Z\u00e1rove\u0148 je prekvapivo efekt\u00edvny pri vyh\u00fdban\u00ed sa v\u00fdskumn\u00fdm zariadeniam z\u00e1merne nasaden\u00fdm na zl\u00e1kanie malv\u00e9ru (tzv. honeypots) a&nbsp;n\u00e1strojom na sledovanie botnetov.<\/p>\n\n\n\n<p>V&nbsp;r\u00e1mci \u00fatoku Emotet zhroma\u017e\u010fuje telemetrick\u00e9 \u00fadaje od potenci\u00e1lnych obet\u00ed a&nbsp;odosiela ich na anal\u00fdzu na riadiaci C&amp;C server \u00fato\u010dn\u00edka. Zo&nbsp;servera potom prij\u00edma pr\u00edkazy alebo bin\u00e1rne moduly. Na z\u00e1klade t\u00fdchto \u00fadajov Emotet vyberie len tie moduly, ktor\u00e9 zodpovedaj\u00fa jeho ur\u010den\u00e9mu z\u00e1meru. Zd\u00e1 sa, \u017ee tie\u017e dok\u00e1\u017ee rozl\u00ed\u0161i\u0165 \u013eudsk\u00e9ho akt\u00e9ra od&nbsp;virtu\u00e1lnych po\u010d\u00edta\u010dov a&nbsp;automatizovan\u00fdch prostred\u00ed, ktor\u00e9 pou\u017e\u00edvaj\u00fa v\u00fdskumn\u00edci a&nbsp;vy\u0161etrovatelia z&nbsp;oblasti kybernetickej bezpe\u010dnosti.<\/p>\n\n\n\n<p><strong>Schopnos\u0165 malv\u00e9ru Emotet nau\u010di\u0165 sa rozli\u0161ova\u0165 medzi skuto\u010dn\u00fdmi a&nbsp;umelo vytvoren\u00fdmi procesmi<\/strong> je obzvl\u00e1\u0161\u0165 pozoruhodn\u00e1. Emotet s\u00edce umel\u00fd proces spo\u010diatku pr\u00edjme, ale do&nbsp;nieko\u013ek\u00fdch hod\u00edn ho zablokuje a&nbsp;zarad\u00ed na blacklist. K\u00fdm napadnut\u00e9 zariadenie na\u010falej posiela \u00fadaje na po\u010d\u00edta\u010de\/boty zaraden\u00e9 na blacklist, Emotet prejde do neakt\u00edvneho re\u017eimu a&nbsp;ukon\u010d\u00ed ak\u00fako\u013evek \u0161kodliv\u00fa \u010dinnos\u0165.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Strojov\u00e9 u\u010denie a&nbsp;internet vec\u00ed<\/h2>\n\n\n\n<p>Internet vec\u00ed (IoT) je u\u017e od svojho po\u010diatku ob\u013e\u00faben\u00fdm cie\u013eom \u00fato\u010dn\u00edkov. V&nbsp;s\u00fa\u010dasnosti rastie po\u010det routerov, monitorovac\u00edch kamier a&nbsp;in\u00fdch inteligentn\u00fdch zariaden\u00ed r\u00fdchlym tempom. V&nbsp;mnoh\u00fdch pr\u00edpadoch s\u00fa v\u0161ak tieto zariadenia ve\u013emi nespo\u013eahliv\u00e9 a&nbsp;\u010dasto sa daj\u00fa zneu\u017ei\u0165 na sledovanie a&nbsp;in\u00e9 \u0161kodliv\u00e9 aktivity. \u010casto je to v&nbsp;d\u00f4sledku nezmenen\u00fdch v\u00fdrobn\u00fdch nastaven\u00ed, slab\u00fdch hesiel alebo in\u00fdch zn\u00e1mych zranite\u013enost\u00ed.<\/p>\n\n\n\n<p class=\"has-bg-color-color has-text-hover-background-color has-text-color has-background\"><strong>Pomocou algoritmov strojov\u00e9ho u\u010denia dok\u00e1\u017eu \u00fato\u010dn\u00edci vyu\u017ei\u0165 bezpe\u010dnostn\u00e9 zranite\u013enosti. M\u00f4\u017eu napr\u00edklad:<\/strong><br><br>N\u00e1js\u0165 doteraz nezn\u00e1me zranite\u013enosti v&nbsp;IoT zariadeniach a&nbsp;zozbiera\u0165 ve\u013ek\u00e9 mno\u017estvo \u00fadajov o&nbsp;prev\u00e1dzke a&nbsp;spr\u00e1van\u00ed pou\u017e\u00edvate\u013eov, ktor\u00e9 sa potom m\u00f4\u017eu pou\u017ei\u0165 na tr\u00e9novanie algoritmov s&nbsp;cie\u013eom zlep\u0161i\u0165 ich skryt\u00e9 mechanizmy.<br><br>Nau\u010di\u0165 sa \u0161tandardn\u00e9 spr\u00e1vanie a&nbsp;procesy niektor\u00fdch konkuren\u010dn\u00fdch \u0161kodliv\u00fdch programov, aby ich v&nbsp;pr\u00edpade potreby mohli odstr\u00e1ni\u0165 alebo vyu\u017ei\u0165 na vlastn\u00e9 \u00fa\u010dely.<br><br>Ka\u017edoro\u010dne vytv\u00e1ra\u0165 tr\u00e9novacie s\u00fabory \u00fadajov naplnen\u00e9 najpou\u017e\u00edvanej\u0161\u00edmi heslami na z\u00e1klade mili\u00f3nov uniknut\u00fdch hesiel a&nbsp;pr\u00edstupov\u00fdch fr\u00e1z. Hacknutie IoT zariaden\u00ed je tak pre \u00fato\u010dn\u00edka e\u0161te jednoduch\u0161ie.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Ako sa pred online hrozbami br\u00e1ni\u0165<\/h2>\n\n\n\n<p>V\u010faka rozsiahlym objemom d\u00e1t a&nbsp;lep\u0161iemu v\u00fdpo\u010dtov\u00e9mu v\u00fdkonu sa strojov\u00e9 u\u010denie v&nbsp;posledn\u00fdch rokoch roz\u0161\u00edrilo do&nbsp;r\u00f4znych oblast\u00ed vr\u00e1tane IT&nbsp;bezpe\u010dnosti. Svet digit\u00e1lneho zabezpe\u010denia sa v\u0161ak neust\u00e1le vyv\u00edja. Preto nie je mo\u017en\u00e9 dokonale ochr\u00e1ni\u0165 firemn\u00fa infra\u0161trukt\u00faru pred \u010dasto sa meniacimi hrozbami len pomocou algoritmov strojov\u00e9ho u\u010denia.&nbsp;<strong>Viacvrstvov\u00e9 rie\u0161enia v&nbsp;kombin\u00e1cii so&nbsp;\u0161ikovn\u00fdmi a&nbsp;kvalifikovan\u00fdmi \u013eu\u010fmi <\/strong>predstavuj\u00fa jedin\u00fd \u00fa\u010dinn\u00fd sp\u00f4sob, ak chcete by\u0165 pri ochrane svojej firmy v\u017edy o&nbsp;krok vpred pred hackermi.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>M\u00e1 umel\u00e1 inteligencia a strojov\u00e9 u\u010denie potenci\u00e1l prispie\u0165 k dokonalej kybernetickej ochrane? Dok\u00e1\u017eu pokrok zneu\u017ei\u0165 kybernetick\u00ed zlo\u010dinci?<\/p>\n","protected":false},"author":9,"featured_media":4218,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[140,105],"tags":[],"class_list":["post-4217","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-desifrujeme-pre-vas","category-firemna-bezpecnost"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ako strojov\u00e9 u\u010denie pom\u00e1ha IT spr\u00e1vcom a hackerom? | ESET<\/title>\n<meta name=\"description\" content=\"Strojov\u00e9 u\u010denie m\u00e1 ve\u013ek\u00fd v\u00fdznam v boji proti kybernetick\u00e9mu zlo\u010dinu, najm\u00e4 pokia\u013e ide o detekciu malv\u00e9ru. M\u00f4\u017eu ho v\u0161ak zneu\u017ei\u0165 aj hackeri?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/strojove-ucenie-ako-je-napomocne-pre-it-spravcov-a-tiez-hackerov\/\" \/>\n<meta property=\"og:locale\" content=\"sk_SK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ako strojov\u00e9 u\u010denie pom\u00e1ha IT spr\u00e1vcom a hackerom? | ESET\" \/>\n<meta property=\"og:description\" content=\"Strojov\u00e9 u\u010denie m\u00e1 ve\u013ek\u00fd v\u00fdznam v boji proti kybernetick\u00e9mu zlo\u010dinu, najm\u00e4 pokia\u013e ide o detekciu malv\u00e9ru. M\u00f4\u017eu ho v\u0161ak zneu\u017ei\u0165 aj hackeri?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/strojove-ucenie-ako-je-napomocne-pre-it-spravcov-a-tiez-hackerov\/\" \/>\n<meta property=\"og:site_name\" content=\"Bezpe\u010dne vo firme | ESET\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-30T12:06:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-18T11:04:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/hlavny-banner-BVF-1200x628_strojove_ucenie.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Autor\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Predpokladan\u00fd \u010das \u010d\u00edtania\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 min\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/strojove-ucenie-ako-je-napomocne-pre-it-spravcov-a-tiez-hackerov\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/strojove-ucenie-ako-je-napomocne-pre-it-spravcov-a-tiez-hackerov\\\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Strojov\u00e9 u\u010denie: ako je n\u00e1pomocn\u00e9 pre IT spr\u00e1vcov (a tie\u017e hackerov)?\",\"datePublished\":\"2022-08-30T12:06:36+00:00\",\"dateModified\":\"2022-10-18T11:04:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/strojove-ucenie-ako-je-napomocne-pre-it-spravcov-a-tiez-hackerov\\\/\"},\"wordCount\":1597,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/strojove-ucenie-ako-je-napomocne-pre-it-spravcov-a-tiez-hackerov\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/08\\\/hlavny-banner-BVF-1200x628_strojove_ucenie.jpg\",\"articleSection\":[\"De\u0161ifrujeme pre v\u00e1s\",\"Firemn\u00e1 bezpe\u010dnos\u0165\"],\"inLanguage\":\"sk-SK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/strojove-ucenie-ako-je-napomocne-pre-it-spravcov-a-tiez-hackerov\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/strojove-ucenie-ako-je-napomocne-pre-it-spravcov-a-tiez-hackerov\\\/\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/strojove-ucenie-ako-je-napomocne-pre-it-spravcov-a-tiez-hackerov\\\/\",\"name\":\"Ako strojov\u00e9 u\u010denie pom\u00e1ha IT spr\u00e1vcom a hackerom? | ESET\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/strojove-ucenie-ako-je-napomocne-pre-it-spravcov-a-tiez-hackerov\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/strojove-ucenie-ako-je-napomocne-pre-it-spravcov-a-tiez-hackerov\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/08\\\/hlavny-banner-BVF-1200x628_strojove_ucenie.jpg\",\"datePublished\":\"2022-08-30T12:06:36+00:00\",\"dateModified\":\"2022-10-18T11:04:01+00:00\",\"description\":\"Strojov\u00e9 u\u010denie m\u00e1 ve\u013ek\u00fd v\u00fdznam v boji proti kybernetick\u00e9mu zlo\u010dinu, najm\u00e4 pokia\u013e ide o detekciu malv\u00e9ru. M\u00f4\u017eu ho v\u0161ak zneu\u017ei\u0165 aj hackeri?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/strojove-ucenie-ako-je-napomocne-pre-it-spravcov-a-tiez-hackerov\\\/#breadcrumb\"},\"inLanguage\":\"sk-SK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/strojove-ucenie-ako-je-napomocne-pre-it-spravcov-a-tiez-hackerov\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/strojove-ucenie-ako-je-napomocne-pre-it-spravcov-a-tiez-hackerov\\\/#primaryimage\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/08\\\/hlavny-banner-BVF-1200x628_strojove_ucenie.jpg\",\"contentUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/08\\\/hlavny-banner-BVF-1200x628_strojove_ucenie.jpg\",\"width\":1200,\"height\":628,\"caption\":\"strojov\u00e9 u\u010denie a kybernetick\u00e1 bezpe\u010dnos\u0165 ilustra\u010dn\u00fd obr\u00e1zok\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/firemna-bezpecnost\\\/strojove-ucenie-ako-je-napomocne-pre-it-spravcov-a-tiez-hackerov\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Domovsk\u00e1 str\u00e1nka\",\"item\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Strojov\u00e9 u\u010denie: ako je n\u00e1pomocn\u00e9 pre IT spr\u00e1vcov (a tie\u017e hackerov)?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#website\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/\",\"name\":\"Bezpe\u010dne vo firme | ESET\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sk-SK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#organization\",\"name\":\"Bezpe\u010dne vo firme | ESET\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/08\\\/BVF_logo_svg_new.svg\",\"contentUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/08\\\/BVF_logo_svg_new.svg\",\"caption\":\"Bezpe\u010dne vo firme | ESET\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/author\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ako strojov\u00e9 u\u010denie pom\u00e1ha IT spr\u00e1vcom a hackerom? | ESET","description":"Strojov\u00e9 u\u010denie m\u00e1 ve\u013ek\u00fd v\u00fdznam v boji proti kybernetick\u00e9mu zlo\u010dinu, najm\u00e4 pokia\u013e ide o detekciu malv\u00e9ru. M\u00f4\u017eu ho v\u0161ak zneu\u017ei\u0165 aj hackeri?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/strojove-ucenie-ako-je-napomocne-pre-it-spravcov-a-tiez-hackerov\/","og_locale":"sk_SK","og_type":"article","og_title":"Ako strojov\u00e9 u\u010denie pom\u00e1ha IT spr\u00e1vcom a hackerom? | ESET","og_description":"Strojov\u00e9 u\u010denie m\u00e1 ve\u013ek\u00fd v\u00fdznam v boji proti kybernetick\u00e9mu zlo\u010dinu, najm\u00e4 pokia\u013e ide o detekciu malv\u00e9ru. M\u00f4\u017eu ho v\u0161ak zneu\u017ei\u0165 aj hackeri?","og_url":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/strojove-ucenie-ako-je-napomocne-pre-it-spravcov-a-tiez-hackerov\/","og_site_name":"Bezpe\u010dne vo firme | ESET","article_published_time":"2022-08-30T12:06:36+00:00","article_modified_time":"2022-10-18T11:04:01+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/hlavny-banner-BVF-1200x628_strojove_ucenie.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Autor":"","Predpokladan\u00fd \u010das \u010d\u00edtania":"6 min\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/strojove-ucenie-ako-je-napomocne-pre-it-spravcov-a-tiez-hackerov\/#article","isPartOf":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/strojove-ucenie-ako-je-napomocne-pre-it-spravcov-a-tiez-hackerov\/"},"author":{"name":"","@id":""},"headline":"Strojov\u00e9 u\u010denie: ako je n\u00e1pomocn\u00e9 pre IT spr\u00e1vcov (a tie\u017e hackerov)?","datePublished":"2022-08-30T12:06:36+00:00","dateModified":"2022-10-18T11:04:01+00:00","mainEntityOfPage":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/strojove-ucenie-ako-je-napomocne-pre-it-spravcov-a-tiez-hackerov\/"},"wordCount":1597,"commentCount":0,"publisher":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/strojove-ucenie-ako-je-napomocne-pre-it-spravcov-a-tiez-hackerov\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/hlavny-banner-BVF-1200x628_strojove_ucenie.jpg","articleSection":["De\u0161ifrujeme pre v\u00e1s","Firemn\u00e1 bezpe\u010dnos\u0165"],"inLanguage":"sk-SK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/strojove-ucenie-ako-je-napomocne-pre-it-spravcov-a-tiez-hackerov\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/strojove-ucenie-ako-je-napomocne-pre-it-spravcov-a-tiez-hackerov\/","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/strojove-ucenie-ako-je-napomocne-pre-it-spravcov-a-tiez-hackerov\/","name":"Ako strojov\u00e9 u\u010denie pom\u00e1ha IT spr\u00e1vcom a hackerom? | ESET","isPartOf":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/strojove-ucenie-ako-je-napomocne-pre-it-spravcov-a-tiez-hackerov\/#primaryimage"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/strojove-ucenie-ako-je-napomocne-pre-it-spravcov-a-tiez-hackerov\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/hlavny-banner-BVF-1200x628_strojove_ucenie.jpg","datePublished":"2022-08-30T12:06:36+00:00","dateModified":"2022-10-18T11:04:01+00:00","description":"Strojov\u00e9 u\u010denie m\u00e1 ve\u013ek\u00fd v\u00fdznam v boji proti kybernetick\u00e9mu zlo\u010dinu, najm\u00e4 pokia\u013e ide o detekciu malv\u00e9ru. M\u00f4\u017eu ho v\u0161ak zneu\u017ei\u0165 aj hackeri?","breadcrumb":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/strojove-ucenie-ako-je-napomocne-pre-it-spravcov-a-tiez-hackerov\/#breadcrumb"},"inLanguage":"sk-SK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/strojove-ucenie-ako-je-napomocne-pre-it-spravcov-a-tiez-hackerov\/"]}]},{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/strojove-ucenie-ako-je-napomocne-pre-it-spravcov-a-tiez-hackerov\/#primaryimage","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/hlavny-banner-BVF-1200x628_strojove_ucenie.jpg","contentUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/hlavny-banner-BVF-1200x628_strojove_ucenie.jpg","width":1200,"height":628,"caption":"strojov\u00e9 u\u010denie a kybernetick\u00e1 bezpe\u010dnos\u0165 ilustra\u010dn\u00fd obr\u00e1zok"},{"@type":"BreadcrumbList","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/strojove-ucenie-ako-je-napomocne-pre-it-spravcov-a-tiez-hackerov\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Domovsk\u00e1 str\u00e1nka","item":"https:\/\/bezpecnevofirme.eset.com\/sk\/"},{"@type":"ListItem","position":2,"name":"Strojov\u00e9 u\u010denie: ako je n\u00e1pomocn\u00e9 pre IT spr\u00e1vcov (a tie\u017e hackerov)?"}]},{"@type":"WebSite","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#website","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/","name":"Bezpe\u010dne vo firme | ESET","description":"","publisher":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bezpecnevofirme.eset.com\/sk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sk-SK"},{"@type":"Organization","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization","name":"Bezpe\u010dne vo firme | ESET","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/","logo":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/logo\/image\/","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/BVF_logo_svg_new.svg","contentUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/BVF_logo_svg_new.svg","caption":"Bezpe\u010dne vo firme | ESET"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/author\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/4217","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/comments?post=4217"}],"version-history":[{"count":4,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/4217\/revisions"}],"predecessor-version":[{"id":4880,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/4217\/revisions\/4880"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/media\/4218"}],"wp:attachment":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/media?parent=4217"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/categories?post=4217"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/tags?post=4217"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}