{"id":4259,"date":"2022-08-31T11:11:44","date_gmt":"2022-08-31T09:11:44","guid":{"rendered":"https:\/\/dev.bezpecnevofirme.eset.com\/sk\/?p=4259"},"modified":"2022-10-18T13:29:50","modified_gmt":"2022-10-18T11:29:50","slug":"informacie-z-otvorenych-zdrojov-cenny-pramen-udajov-pre-it-specialistov-aj-utocnikov","status":"publish","type":"post","link":"https:\/\/bezpecnevofirme.eset.com\/sk\/cybernews\/informacie-z-otvorenych-zdrojov-cenny-pramen-udajov-pre-it-specialistov-aj-utocnikov\/","title":{"rendered":"Inform\u00e1cie z otvoren\u00fdch zdrojov \u2013 Cenn\u00fd prame\u0148 \u00fadajov pre IT \u0161pecialistov aj \u00fato\u010dn\u00edkov"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"628\" src=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/hlavny-banner-BVF-1200x628_2022_3.jpg\" alt=\"informacie z otvorenych zdrojov\" class=\"wp-image-4260\" srcset=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/hlavny-banner-BVF-1200x628_2022_3.jpg 1200w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/hlavny-banner-BVF-1200x628_2022_3-300x157.jpg 300w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/hlavny-banner-BVF-1200x628_2022_3-1024x536.jpg 1024w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/hlavny-banner-BVF-1200x628_2022_3-768x402.jpg 768w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/hlavny-banner-BVF-1200x628_2022_3-370x194.jpg 370w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/hlavny-banner-BVF-1200x628_2022_3-760x398.jpg 760w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Vyu\u017e\u00edvanie inform\u00e1ci\u00ed z&nbsp;otvoren\u00fdch zdrojov (OSINT) je v&nbsp;r\u00e1mci oddelen\u00ed IT bezpe\u010dnosti \u010doraz d\u00f4le\u017eitej\u0161ie. Cel\u00fd proces zah\u0155\u0148a z\u00edskavanie, zhroma\u017e\u010fovanie, anal\u00fdzu a&nbsp;usporiadanie inform\u00e1ci\u00ed, ktor\u00e9 s\u00fa pr\u00edstupn\u00e9 z&nbsp;verejne dostupn\u00fdch zdrojov, napr\u00edklad z&nbsp;internetu.<\/p>\n\n\n\n<p>T\u00edmy zameran\u00e9 na&nbsp;IT bezpe\u010dnos\u0165 tak dok\u00e1\u017eu vystopova\u0165 intern\u00e9 \u00fadaje, ktor\u00e9 by nemali by\u0165 verejn\u00e9, vr\u00e1tane otvoren\u00fdch portov a&nbsp;sie\u0165ov\u00fdch zariaden\u00ed. Mno\u017estvo inform\u00e1ci\u00ed, ktor\u00e9 nemali by\u0165 zverejnen\u00e9, mo\u017eno n\u00e1js\u0165 aj&nbsp;na&nbsp;soci\u00e1lnych sie\u0165ach \u010di webov\u00fdch str\u00e1nkach. Napriek tomu s\u00fa&nbsp;<strong>otvoren\u00e9 zdroje skvel\u00fdm prame\u0148om inform\u00e1ci\u00ed<\/strong>&nbsp;nielen pre&nbsp;IT spr\u00e1vcov a&nbsp;in\u00fdch odborn\u00edkov dohliadaj\u00facich na&nbsp;bezpe\u010dnos\u0165 spolo\u010dnosti, ale aj&nbsp;kybernetick\u00fdch zlo\u010dincov, pre&nbsp;ktor\u00fdch verejn\u00e9 \u00fadaje pri&nbsp;\u00fatokoch na&nbsp;firmy predstavuj\u00fa u\u017eito\u010dn\u00fa datab\u00e1zu.<\/p>\n\n\n\n<p><strong>V&nbsp;tomto \u010dl\u00e1nku sa budeme zaobera\u0165:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Dostupn\u00fdmi n\u00e1strojmi na&nbsp;z\u00edskavanie inform\u00e1ci\u00ed z&nbsp;otvoren\u00fdch zdrojov a&nbsp;ich \u00fa\u010delom,<\/li><li>Z\u00e1konnos\u0165ou OSINT zdrojov,<\/li><li>Sp\u00f4sobmi, ak\u00fdmi \u00fato\u010dn\u00edci vyu\u017e\u00edvaj\u00fa OSINT zdroje,<\/li><li>Sp\u00f4sobmi, ak\u00fdmi bezpe\u010dnostn\u00e9 t\u00edmy pou\u017e\u00edvaj\u00fa OSINT zdroje na&nbsp;zv\u00fd\u0161enie zabezpe\u010denia svojej spolo\u010dnosti,<\/li><li>A ot\u00e1zkami, ktor\u00e9 treba zv\u00e1\u017ei\u0165 v&nbsp;pr\u00edpade, ak chcete pou\u017e\u00edva\u0165 OSINT zdroje ako s\u00fa\u010das\u0165 riadenia kybernetick\u00fdch riz\u00edk.<\/li><\/ul>\n\n\n\n<p>Hackersk\u00e9 skupiny nikdy nepracovali sofistikovanej\u0161ie, a&nbsp;to aj v\u010faka obrovsk\u00fdm finan\u010dn\u00fdm a&nbsp;\u013eudsk\u00fdm zdrojom, ktor\u00e9 dnes maj\u00fa k&nbsp;dispoz\u00edcii. Samotn\u00e9mu \u00fatoku v\u0161ak predch\u00e1dza snaha o&nbsp;<strong>sledovanie obet\u00ed a&nbsp;zhroma\u017edenie \u010do najv\u00e4\u010d\u0161ieho mno\u017estva inform\u00e1ci\u00ed<\/strong>, aby dok\u00e1zali identifikova\u0165 ich slab\u00e9 miesta. Najjednoduch\u0161\u00ed sp\u00f4sob, ako to dosiahnu\u0165? Prelustrova\u0165 najv\u00e4\u010d\u0161\u00ed zdroj inform\u00e1ci\u00ed na&nbsp;svete, celosvetov\u00fa sie\u0165 (World Wide Web).<\/p>\n\n\n\n<p>Od&nbsp;masm\u00e9di\u00ed a&nbsp;soci\u00e1lnych siet\u00ed a\u017e po&nbsp;verejn\u00e9 \u00fadaje, ako s\u00fa vl\u00e1dne spr\u00e1vy, komer\u010dn\u00e9 \u00fadaje alebo inform\u00e1cie, ktor\u00e9 sa daj\u00fa \u013eahko n\u00e1js\u0165 cez vyh\u013ead\u00e1va\u010de \u2013 \u00fato\u010dn\u00edci dok\u00e1\u017eu mnoh\u00fdmi sp\u00f4sobmi z\u00edska\u0165 cenn\u00fd poh\u013ead na&nbsp;skoro ak\u00fako\u013evek t\u00e9mu. Internet je takmer nekone\u010dn\u00fd zdroj, ktor\u00fd m\u00f4\u017eu kybernetick\u00ed zlo\u010dinci \u013eahko zneu\u017ei\u0165. IT spr\u00e1vcovia v\u0161ak takisto m\u00f4\u017eu vyu\u017ei\u0165 verejne dostupn\u00e9 zdroje na&nbsp;zistenie inform\u00e1ci\u00ed o&nbsp;svojej spolo\u010dnosti, jej stave zabezpe\u010denia a&nbsp;\u010fal\u0161\u00edch \u00fadajov, ktor\u00e9 s\u00fa zbyto\u010dne odha\u013eovan\u00e9.<\/p>\n\n\n\n<p>Hoci sa \u00fa\u010del, pr\u00e1vny r\u00e1mec a&nbsp;z\u00e1mer pou\u017eitia l\u00ed\u0161ia, zd\u00e1 sa, \u017ee v\u010faka OSINT zdrojom odborn\u00edci na&nbsp;IT bezpe\u010dnos\u0165 aj&nbsp;kybernetick\u00ed zlo\u010dinci \u010dasto vyu\u017e\u00edvaj\u00fa rovnak\u00e9 informa\u010dn\u00e9 pramene. Ak sa na&nbsp;cel\u00fa problematiku pozrieme z&nbsp;metaforick\u00e9ho h\u013eadiska, otvoren\u00e9 zdroje s\u00fa ako sklad zbran\u00ed, z&nbsp;ktor\u00e9ho si v\u00fdzbroj zaobstar\u00e1vaj\u00fa policajti aj gangsteri z\u00e1rove\u0148.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Ak\u00e9 n\u00e1stroje na&nbsp;vyh\u013ead\u00e1vanie inform\u00e1ci\u00ed z&nbsp;verejn\u00fdch zdrojov pon\u00faka trh a&nbsp;na&nbsp;\u010do ich mo\u017eno pou\u017ei\u0165?<\/strong><\/h2>\n\n\n\n<p>Pomocou vyh\u013ead\u00e1va\u010da&nbsp;<strong>Shodan<\/strong> je napr\u00edklad mo\u017en\u00e9 h\u013eada\u0165 IoT zariadenia, opera\u010dn\u00e9 technol\u00f3gie a&nbsp;otvoren\u00e9 porty.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Maltego<\/strong> je n\u00e1stroj, ktor\u00fd pom\u00e1ha identifikova\u0165 skryt\u00e9 vz\u0165ahy medzi osobami, dom\u00e9nami, spolo\u010dnos\u0165ami, vlastn\u00edkmi dokumentov a&nbsp;in\u00fdmi subjektmi. Zisten\u00e9 inform\u00e1cie sa n\u00e1sledne vizualizuj\u00fa prostredn\u00edctvom intuit\u00edvneho pou\u017e\u00edvate\u013esk\u00e9ho rozhrania.<\/li><li><strong>Metagoofil<\/strong> je n\u00e1stroj na&nbsp;z\u00edskavanie metad\u00e1t z&nbsp;verejne dostupn\u00fdch zdrojov, ktor\u00fd sprostredk\u00fava d\u00f4le\u017eit\u00e9 inform\u00e1cie o&nbsp;IT syst\u00e9moch (pou\u017e\u00edvate\u013esk\u00e9 men\u00e1, verzie softv\u00e9ru, MAC adresy at\u010f.).<\/li><li><strong>TheHarvester<\/strong>, jeden z&nbsp;najpreferovanej\u0161\u00edch n\u00e1strojov OSINT s&nbsp;ve\u013emi jednoduch\u00fdm pou\u017e\u00edvan\u00edm, pon\u00faka preh\u013ead o&nbsp;v\u0161etkom, k&nbsp;\u010domu m\u00e1 o&nbsp;va\u0161ej organiz\u00e1cii \u00fato\u010dn\u00edk pr\u00edstup, a&nbsp;to vr\u00e1tane subdom\u00e9n, hostite\u013eov, e-mailov a&nbsp;otvoren\u00fdch portov. TheHarvester analyzuje nielen Google a&nbsp;Bing, ale aj&nbsp;menej zn\u00e1me vyh\u013ead\u00e1va\u010de, ako s\u00fa DNSDumpster alebo vyh\u013ead\u00e1va\u010d metad\u00e1t Exalead.<br><\/li><\/ul>\n\n\n\n<p>Najd\u00f4le\u017eitej\u0161ie pre&nbsp;bezpe\u010dnostn\u00fdch pracovn\u00edkov je, aby bez oh\u013eadu na&nbsp;n\u00e1stroj pou\u017eit\u00fd na&nbsp;testovanie a&nbsp;zhroma\u017e\u010fovanie inform\u00e1ci\u00ed o&nbsp;ochrann\u00fdch mechanizmoch v\u017edy dodr\u017eiavali politiku penetra\u010dn\u00e9ho testovania pr\u00edslu\u0161nej spolo\u010dnosti, ako aj t\u00fdch firiem, <a href=\"https:\/\/aws.amazon.com\/security\/penetration-testing\/\">ktor\u00fdch slu\u017eby pou\u017e\u00edvaj\u00fa<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>S\u00fa OSINT zdroje leg\u00e1lne?<\/strong><\/h2>\n\n\n\n<p>Ako u\u017e bolo vysvetlen\u00e9, v\u010faka&nbsp;<strong>OSINT zdrojom je mo\u017en\u00e9 identifikova\u0165 verejn\u00e9 a&nbsp;vo\u013ene dostupn\u00e9 inform\u00e1cie<\/strong>. Z&nbsp;tohto h\u013eadiska s\u00fa vo&nbsp;v\u00e4\u010d\u0161ine z\u00e1padn\u00fdch kraj\u00edn \u00faplne leg\u00e1lne. Pokia\u013e v\u0161ak ide o&nbsp;po\u017eiadavky na&nbsp;ochranu \u00fadajov, opatrnos\u0165 je na&nbsp;mieste.<br><br>Zhroma\u017e\u010fovanie \u00fadajov chr\u00e1nen\u00fdch heslom alebo ak\u00fdchko\u013evek in\u00fdch neverejn\u00fdch \u00fadajov je nez\u00e1konn\u00e9. Vyu\u017e\u00edvanie inform\u00e1ci\u00ed zo&nbsp;soci\u00e1lnych siet\u00ed poru\u0161uje&nbsp;<a href=\"https:\/\/www.linkedin.com\/legal\/user-agreement#dos\">podmienky pou\u017e\u00edvania<\/a>&nbsp;v\u00e4\u010d\u0161iny platforiem.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Ako presne kybernetick\u00ed zlo\u010dinci vyu\u017e\u00edvaj\u00fa OSINT zdroje pri&nbsp;\u00fatokoch?<\/strong><\/h2>\n\n\n\n<p>Zlo\u010dinci sa sna\u017eia identifikova\u0165 relevantn\u00e9 zdroje \u00fadajov s&nbsp;cie\u013eom vyvin\u00fa\u0165 pr\u00edslu\u0161n\u00e9 met\u00f3dy \u00fatoku, v&nbsp;ide\u00e1lnom pr\u00edpade bez zanechania ak\u00fdchko\u013evek st\u00f4p. Nezriedka vyu\u017e\u00edvaj\u00fa modern\u00e9 informa\u010dn\u00e9 a&nbsp;komunika\u010dn\u00e9 technol\u00f3gie, ktor\u00e9 tieto \u00falohy automatizuj\u00fa.<\/p>\n\n\n\n<p class=\"has-bg-color-color has-text-hover-background-color has-text-color has-background\"><strong>Pr\u00edklad \u010d.&nbsp;1: Spearphishing<\/strong><br><br>Internetov\u00e9 vyh\u013ead\u00e1va\u010de, ako napr\u00edklad Google, s\u00fa skvel\u00fdm prostriedkom na&nbsp;h\u013eadanie osobn\u00fdch a&nbsp;profesijn\u00fdch inform\u00e1ci\u00ed o&nbsp;\u013eu\u010foch. Na&nbsp;tento \u00fa\u010del sa \u010dasto pou\u017e\u00edvaj\u00fa pracovne orientovan\u00e9 soci\u00e1lne siete, ako s\u00fa LinkedIn a&nbsp;XING. Na&nbsp;in\u00fdch soci\u00e1lnych platform\u00e1ch sa takisto nach\u00e1dzaj\u00fa u\u017eito\u010dn\u00e9 \u00fadaje (napr\u00edklad men\u00e1 dom\u00e1cich mil\u00e1\u010dikov a&nbsp;pr\u00edbuzn\u00fdch), ktor\u00e9 sa daj\u00fa pou\u017ei\u0165 na&nbsp;<a href=\"https:\/\/digitalsecurityguide.eset.com\/en-uk\/why-you-shouldn-t-pass-on-passwords\">prelomenie hesiel<\/a>. Takto z\u00edskan\u00e9 d\u00e1ta sa daj\u00fa zneu\u017ei\u0165 aj&nbsp;na&nbsp;identifik\u00e1ciu cenn\u00fdch cie\u013eov (v\u00e4\u010d\u0161inou \u013eud\u00ed s&nbsp;rozsiahlymi pr\u00e1vami k&nbsp;vlastn\u00fdm pou\u017e\u00edvate\u013esk\u00fdm \u00fa\u010dtom alebo pr\u00edstupom k&nbsp;d\u00f4vern\u00fdm inform\u00e1ci\u00e1m). <br><br><strong>Pr\u00edklad \u010d.&nbsp;2: Bezpe\u010dnostn\u00e9 zranite\u013enosti<\/strong><br><br>Pomocou OSINT zdrojov \u00fato\u010dn\u00edci h\u013eadaj\u00fa medzery v&nbsp;bezpe\u010dnosti, ako s\u00fa nezapl\u00e1tan\u00e9 zariadenia, otvoren\u00e9 porty, zle nakonfigurovan\u00e9 cloudov\u00e9 \u00falo\u017eisk\u00e1 alebo dokonca n\u00e1hodne zverejnen\u00e9 inform\u00e1cie, aby identifikovali potenci\u00e1lne ciele.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Ako m\u00f4\u017eu OSINT zdroje vyu\u017e\u00edva\u0165 IT \u0161pecialisti na&nbsp;zabezpe\u010denie spolo\u010dnosti?<\/strong><\/h2>\n\n\n\n<p>Pri&nbsp;pou\u017e\u00edvan\u00ed OSINT zdrojov sa bezpe\u010dnostn\u00e9 t\u00edmy prim\u00e1rne sna\u017eia zisti\u0165, ak\u00e9 inform\u00e1cie s\u00fa verejne dostupn\u00e9 o&nbsp;IT syst\u00e9moch ich firmy s&nbsp;cie\u013eom odstr\u00e1ni\u0165 ak\u00e9ko\u013evek bezpe\u010dnostn\u00e9 zranite\u013enosti. Patria sem napr\u00edklad:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Otvoren\u00e9 porty a&nbsp;nezabezpe\u010den\u00e9 sie\u0165ov\u00e9 zariadenia<\/li><li>Nezapl\u00e1tan\u00fd softv\u00e9r<\/li><li>Inform\u00e1cie o&nbsp;softv\u00e9ri a&nbsp;zariadeniach, ktor\u00e9 pou\u017e\u00edvaj\u00fa, ako s\u00fa verzie softv\u00e9ru, n\u00e1zvy zariaden\u00ed, siete a&nbsp;IP adresy<\/li><\/ul>\n\n\n\n<p>OSINT zdroje s\u00fa tie\u017e u\u017eito\u010dn\u00e9 pre&nbsp;IT mana\u017e\u00e9rov, preto\u017ee im pom\u00e1haj\u00fa identifikova\u0165 verejne dostupn\u00e9 inform\u00e1cie mimo spolo\u010dnosti, ako je obsah na&nbsp;webov\u00fdch str\u00e1nkach a&nbsp;soci\u00e1lnych sie\u0165ach. Okrem toho m\u00f4\u017eu z\u00edskava\u0165 inform\u00e1cie z&nbsp;neindexovan\u00fdch webov\u00fdch str\u00e1nok a&nbsp;s\u00faborov, ktor\u00e9 sa ozna\u010duj\u00fa aj ako deep web. Aj ke\u010f sa nezobrazuj\u00fa vo&nbsp;v\u00fdsledkoch vyh\u013ead\u00e1vania, s\u00fa v&nbsp;podstate verejn\u00e9, a&nbsp;teda dostupn\u00e9 prostredn\u00edctvom n\u00e1strojov OSINT.<\/p>\n\n\n\n<p><strong>V&nbsp;pr\u00edpade, ak chcete pou\u017e\u00edva\u0165 OSINT zdroje ako s\u00fa\u010das\u0165 riadenia kybernetick\u00fdch riz\u00edk, mus\u00edte si vopred stanovi\u0165 presn\u00fa strat\u00e9giu a&nbsp;odpoveda\u0165 na&nbsp;nasleduj\u00face ot\u00e1zky:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Chcete identifikova\u0165 sie\u0165ov\u00e9 a&nbsp;softv\u00e9rov\u00e9 zranite\u013enosti?<\/li><li>Chcete identifikova\u0165 verejne dostupn\u00e9 prostriedky, ktor\u00e9 m\u00f4\u017eu hackeri vyu\u017ei\u0165 na&nbsp;v\u00fdber vhodn\u00fdch vektorov \u00fatoku?<\/li><li>Chcete zisti\u0165, \u010di existuj\u00fa nejak\u00e9 rizik\u00e1 spojen\u00e9 s&nbsp;pr\u00edspevkami, ktor\u00e9 zamestnanci zdie\u013eaj\u00fa na&nbsp;soci\u00e1lnych sie\u0165ach?<\/li><\/ul>\n\n\n\n<p>Je tie\u017e d\u00f4le\u017eit\u00e9 si uvedomi\u0165, \u017ee po\u010das anal\u00fdzy sa generuje ve\u013ek\u00e9 mno\u017estvo \u00fadajov. Cel\u00fd proces preto mus\u00ed by\u0165 do&nbsp;zna\u010dnej miery automatizovan\u00fd. Uk\u00e1zalo sa, \u017ee u\u017eito\u010dn\u00e9 s\u00fa aj&nbsp;pravideln\u00e9&nbsp;<strong>penetra\u010dn\u00e9 testy<\/strong>, ktor\u00e9 zoh\u013ead\u0148uj\u00fa OSINT zdroje.<\/p>\n\n\n\n<p>Okrem d\u00f4le\u017eit\u00fdch opatren\u00ed na&nbsp;ochranu koncov\u00fdch zariaden\u00ed, ako je pou\u017e\u00edvanie&nbsp;<strong>antiv\u00edrusu, firewallu alebo cloudov\u00e9ho sandboxingu<\/strong>&nbsp;spolu s&nbsp;<strong>pravideln\u00fdmi \u0161koleniami v\u0161etk\u00fdch zamestnancov vo&nbsp;firme<\/strong>, by ste do&nbsp;svojich princ\u00edpov oh\u013eadom informa\u010dnej bezpe\u010dnosti mali integrova\u0165 aj strat\u00e9gie t\u00fdkaj\u00face sa OSINT zdrojov.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Inform\u00e1cie z otvoren\u00fdch zdrojov pom\u00e1haj\u00fa IT spr\u00e1vcom, ale aj kybernetick\u00fdm \u00fato\u010dn\u00edkom. <\/p>\n","protected":false},"author":9,"featured_media":4312,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[102],"tags":[],"class_list":["post-4259","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybernews"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Inform\u00e1cie z otvoren\u00fdch zdrojov pom\u00e1haj\u00fa aj \u0161kodia | ESET<\/title>\n<meta name=\"description\" content=\"Inform\u00e1cie z otvoren\u00fdch zdrojov s\u00fa v r\u00e1mci oddelen\u00ed IT bezpe\u010dnosti \u010doraz d\u00f4le\u017eitej\u0161ie. Tieto d\u00e1ta s\u00fa v\u0161ak cenn\u00fdm prame\u0148om aj pre \u00fato\u010dn\u00edkov.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bezpecnevofirme.eset.com\/sk\/cybernews\/informacie-z-otvorenych-zdrojov-cenny-pramen-udajov-pre-it-specialistov-aj-utocnikov\/\" \/>\n<meta property=\"og:locale\" content=\"sk_SK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Inform\u00e1cie z otvoren\u00fdch zdrojov pom\u00e1haj\u00fa aj \u0161kodia | ESET\" \/>\n<meta property=\"og:description\" content=\"Inform\u00e1cie z otvoren\u00fdch zdrojov s\u00fa v r\u00e1mci oddelen\u00ed IT bezpe\u010dnosti \u010doraz d\u00f4le\u017eitej\u0161ie. Tieto d\u00e1ta s\u00fa v\u0161ak cenn\u00fdm prame\u0148om aj pre \u00fato\u010dn\u00edkov.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bezpecnevofirme.eset.com\/sk\/cybernews\/informacie-z-otvorenych-zdrojov-cenny-pramen-udajov-pre-it-specialistov-aj-utocnikov\/\" \/>\n<meta property=\"og:site_name\" content=\"Bezpe\u010dne vo firme | ESET\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-31T09:11:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-18T11:29:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/hlavny-banner-BVF-1200x628_2022_3-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Autor\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Predpokladan\u00fd \u010das \u010d\u00edtania\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 min\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/cybernews\\\/informacie-z-otvorenych-zdrojov-cenny-pramen-udajov-pre-it-specialistov-aj-utocnikov\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/cybernews\\\/informacie-z-otvorenych-zdrojov-cenny-pramen-udajov-pre-it-specialistov-aj-utocnikov\\\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Inform\u00e1cie z otvoren\u00fdch zdrojov \u2013 Cenn\u00fd prame\u0148 \u00fadajov pre IT \u0161pecialistov aj \u00fato\u010dn\u00edkov\",\"datePublished\":\"2022-08-31T09:11:44+00:00\",\"dateModified\":\"2022-10-18T11:29:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/cybernews\\\/informacie-z-otvorenych-zdrojov-cenny-pramen-udajov-pre-it-specialistov-aj-utocnikov\\\/\"},\"wordCount\":1543,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/cybernews\\\/informacie-z-otvorenych-zdrojov-cenny-pramen-udajov-pre-it-specialistov-aj-utocnikov\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/08\\\/hlavny-banner-BVF-1200x628_2022_3-1.jpg\",\"articleSection\":[\"Cybernews\"],\"inLanguage\":\"sk-SK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/cybernews\\\/informacie-z-otvorenych-zdrojov-cenny-pramen-udajov-pre-it-specialistov-aj-utocnikov\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/cybernews\\\/informacie-z-otvorenych-zdrojov-cenny-pramen-udajov-pre-it-specialistov-aj-utocnikov\\\/\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/cybernews\\\/informacie-z-otvorenych-zdrojov-cenny-pramen-udajov-pre-it-specialistov-aj-utocnikov\\\/\",\"name\":\"Inform\u00e1cie z otvoren\u00fdch zdrojov pom\u00e1haj\u00fa aj \u0161kodia | ESET\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/cybernews\\\/informacie-z-otvorenych-zdrojov-cenny-pramen-udajov-pre-it-specialistov-aj-utocnikov\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/cybernews\\\/informacie-z-otvorenych-zdrojov-cenny-pramen-udajov-pre-it-specialistov-aj-utocnikov\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/08\\\/hlavny-banner-BVF-1200x628_2022_3-1.jpg\",\"datePublished\":\"2022-08-31T09:11:44+00:00\",\"dateModified\":\"2022-10-18T11:29:50+00:00\",\"description\":\"Inform\u00e1cie z otvoren\u00fdch zdrojov s\u00fa v r\u00e1mci oddelen\u00ed IT bezpe\u010dnosti \u010doraz d\u00f4le\u017eitej\u0161ie. Tieto d\u00e1ta s\u00fa v\u0161ak cenn\u00fdm prame\u0148om aj pre \u00fato\u010dn\u00edkov.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/cybernews\\\/informacie-z-otvorenych-zdrojov-cenny-pramen-udajov-pre-it-specialistov-aj-utocnikov\\\/#breadcrumb\"},\"inLanguage\":\"sk-SK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/cybernews\\\/informacie-z-otvorenych-zdrojov-cenny-pramen-udajov-pre-it-specialistov-aj-utocnikov\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/cybernews\\\/informacie-z-otvorenych-zdrojov-cenny-pramen-udajov-pre-it-specialistov-aj-utocnikov\\\/#primaryimage\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/08\\\/hlavny-banner-BVF-1200x628_2022_3-1.jpg\",\"contentUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/08\\\/hlavny-banner-BVF-1200x628_2022_3-1.jpg\",\"width\":1200,\"height\":628,\"caption\":\"informacie z otvorenych zdrojov ilustracny obrazok\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/cybernews\\\/informacie-z-otvorenych-zdrojov-cenny-pramen-udajov-pre-it-specialistov-aj-utocnikov\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Domovsk\u00e1 str\u00e1nka\",\"item\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Inform\u00e1cie z otvoren\u00fdch zdrojov \u2013 Cenn\u00fd prame\u0148 \u00fadajov pre IT \u0161pecialistov aj \u00fato\u010dn\u00edkov\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#website\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/\",\"name\":\"Bezpe\u010dne vo firme | ESET\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sk-SK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#organization\",\"name\":\"Bezpe\u010dne vo firme | ESET\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/08\\\/BVF_logo_svg_new.svg\",\"contentUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/08\\\/BVF_logo_svg_new.svg\",\"caption\":\"Bezpe\u010dne vo firme | ESET\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/author\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Inform\u00e1cie z otvoren\u00fdch zdrojov pom\u00e1haj\u00fa aj \u0161kodia | ESET","description":"Inform\u00e1cie z otvoren\u00fdch zdrojov s\u00fa v r\u00e1mci oddelen\u00ed IT bezpe\u010dnosti \u010doraz d\u00f4le\u017eitej\u0161ie. Tieto d\u00e1ta s\u00fa v\u0161ak cenn\u00fdm prame\u0148om aj pre \u00fato\u010dn\u00edkov.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bezpecnevofirme.eset.com\/sk\/cybernews\/informacie-z-otvorenych-zdrojov-cenny-pramen-udajov-pre-it-specialistov-aj-utocnikov\/","og_locale":"sk_SK","og_type":"article","og_title":"Inform\u00e1cie z otvoren\u00fdch zdrojov pom\u00e1haj\u00fa aj \u0161kodia | ESET","og_description":"Inform\u00e1cie z otvoren\u00fdch zdrojov s\u00fa v r\u00e1mci oddelen\u00ed IT bezpe\u010dnosti \u010doraz d\u00f4le\u017eitej\u0161ie. Tieto d\u00e1ta s\u00fa v\u0161ak cenn\u00fdm prame\u0148om aj pre \u00fato\u010dn\u00edkov.","og_url":"https:\/\/bezpecnevofirme.eset.com\/sk\/cybernews\/informacie-z-otvorenych-zdrojov-cenny-pramen-udajov-pre-it-specialistov-aj-utocnikov\/","og_site_name":"Bezpe\u010dne vo firme | ESET","article_published_time":"2022-08-31T09:11:44+00:00","article_modified_time":"2022-10-18T11:29:50+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/hlavny-banner-BVF-1200x628_2022_3-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Autor":"","Predpokladan\u00fd \u010das \u010d\u00edtania":"6 min\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/cybernews\/informacie-z-otvorenych-zdrojov-cenny-pramen-udajov-pre-it-specialistov-aj-utocnikov\/#article","isPartOf":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/cybernews\/informacie-z-otvorenych-zdrojov-cenny-pramen-udajov-pre-it-specialistov-aj-utocnikov\/"},"author":{"name":"","@id":""},"headline":"Inform\u00e1cie z otvoren\u00fdch zdrojov \u2013 Cenn\u00fd prame\u0148 \u00fadajov pre IT \u0161pecialistov aj \u00fato\u010dn\u00edkov","datePublished":"2022-08-31T09:11:44+00:00","dateModified":"2022-10-18T11:29:50+00:00","mainEntityOfPage":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/cybernews\/informacie-z-otvorenych-zdrojov-cenny-pramen-udajov-pre-it-specialistov-aj-utocnikov\/"},"wordCount":1543,"commentCount":0,"publisher":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/cybernews\/informacie-z-otvorenych-zdrojov-cenny-pramen-udajov-pre-it-specialistov-aj-utocnikov\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/hlavny-banner-BVF-1200x628_2022_3-1.jpg","articleSection":["Cybernews"],"inLanguage":"sk-SK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/bezpecnevofirme.eset.com\/sk\/cybernews\/informacie-z-otvorenych-zdrojov-cenny-pramen-udajov-pre-it-specialistov-aj-utocnikov\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/cybernews\/informacie-z-otvorenych-zdrojov-cenny-pramen-udajov-pre-it-specialistov-aj-utocnikov\/","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/cybernews\/informacie-z-otvorenych-zdrojov-cenny-pramen-udajov-pre-it-specialistov-aj-utocnikov\/","name":"Inform\u00e1cie z otvoren\u00fdch zdrojov pom\u00e1haj\u00fa aj \u0161kodia | ESET","isPartOf":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/cybernews\/informacie-z-otvorenych-zdrojov-cenny-pramen-udajov-pre-it-specialistov-aj-utocnikov\/#primaryimage"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/cybernews\/informacie-z-otvorenych-zdrojov-cenny-pramen-udajov-pre-it-specialistov-aj-utocnikov\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/hlavny-banner-BVF-1200x628_2022_3-1.jpg","datePublished":"2022-08-31T09:11:44+00:00","dateModified":"2022-10-18T11:29:50+00:00","description":"Inform\u00e1cie z otvoren\u00fdch zdrojov s\u00fa v r\u00e1mci oddelen\u00ed IT bezpe\u010dnosti \u010doraz d\u00f4le\u017eitej\u0161ie. Tieto d\u00e1ta s\u00fa v\u0161ak cenn\u00fdm prame\u0148om aj pre \u00fato\u010dn\u00edkov.","breadcrumb":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/cybernews\/informacie-z-otvorenych-zdrojov-cenny-pramen-udajov-pre-it-specialistov-aj-utocnikov\/#breadcrumb"},"inLanguage":"sk-SK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bezpecnevofirme.eset.com\/sk\/cybernews\/informacie-z-otvorenych-zdrojov-cenny-pramen-udajov-pre-it-specialistov-aj-utocnikov\/"]}]},{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/cybernews\/informacie-z-otvorenych-zdrojov-cenny-pramen-udajov-pre-it-specialistov-aj-utocnikov\/#primaryimage","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/hlavny-banner-BVF-1200x628_2022_3-1.jpg","contentUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/hlavny-banner-BVF-1200x628_2022_3-1.jpg","width":1200,"height":628,"caption":"informacie z otvorenych zdrojov ilustracny obrazok"},{"@type":"BreadcrumbList","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/cybernews\/informacie-z-otvorenych-zdrojov-cenny-pramen-udajov-pre-it-specialistov-aj-utocnikov\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Domovsk\u00e1 str\u00e1nka","item":"https:\/\/bezpecnevofirme.eset.com\/sk\/"},{"@type":"ListItem","position":2,"name":"Inform\u00e1cie z otvoren\u00fdch zdrojov \u2013 Cenn\u00fd prame\u0148 \u00fadajov pre IT \u0161pecialistov aj \u00fato\u010dn\u00edkov"}]},{"@type":"WebSite","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#website","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/","name":"Bezpe\u010dne vo firme | ESET","description":"","publisher":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bezpecnevofirme.eset.com\/sk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sk-SK"},{"@type":"Organization","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization","name":"Bezpe\u010dne vo firme | ESET","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/","logo":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/logo\/image\/","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/BVF_logo_svg_new.svg","contentUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/BVF_logo_svg_new.svg","caption":"Bezpe\u010dne vo firme | ESET"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/author\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/4259","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/comments?post=4259"}],"version-history":[{"count":3,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/4259\/revisions"}],"predecessor-version":[{"id":4890,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/4259\/revisions\/4890"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/media\/4312"}],"wp:attachment":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/media?parent=4259"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/categories?post=4259"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/tags?post=4259"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}