﻿{"id":9103,"date":"2017-12-18T15:35:46","date_gmt":"2017-12-18T13:35:46","guid":{"rendered":"http:\/\/www.zsp2.jaworzno.pl\/?p=9103"},"modified":"2017-12-18T16:40:55","modified_gmt":"2017-12-18T14:40:55","slug":"cyberbezpieczenstwo-biuletyn-bezpieczenstwa-komputerowego-ouch","status":"publish","type":"post","link":"https:\/\/zsp2.jaworzno.edu.pl\/?p=9103","title":{"rendered":"Cyberbezpiecze\u0144stwo &#8211; Biuletyn Bezpiecze\u0144stwa Komputerowego OUCH!"},"content":{"rendered":"<p style=\"text-align: justify;\">Ukaza\u0142 si\u0119 nowy grudniowy numer Biuletynu Bezpiecze\u0144stwa Komputerowego OUCH! A&nbsp;w&nbsp;nim <strong><a href=\"https:\/\/securingthehuman.sans.org\/newsletters\/ouch\/issues\/OUCH-201712_po.pdf\" target=\"_blank\" rel=\"noopener\">Bezpieczne logowanie.<\/a><em><br \/>\n<\/em><\/strong><\/p>\n<ul style=\"text-align: justify;\">\n<li>Has\u0142a<\/li>\n<li>Czym jest dwusk\u0142adnikowe uwierzytelnianie?<\/li>\n<li>Jak to dzia\u0142a?<\/li>\n<\/ul>\n<p><!--more--><\/p>\n<div style=\"text-align: justify;\"><em>\u201eHas\u0142a potwierdzaj\u0105 Twoj\u0105 to\u017csamo\u015b\u0107 bazuj\u0105c na tym, co wiesz. Je\u017celi jednak kto\u015b odgadnie, lub w&nbsp;inny spos\u00f3b pozna Twoje has\u0142o, b\u0119dzie m\u00f3g\u0142 podszywaj\u0105c si\u0119 pod Ciebie, uzyska\u0107 dost\u0119p do informacji jakie posiadasz. Skompromitowane has\u0142a sta\u0142y si\u0119 jedn\u0105 z&nbsp;g\u0142\u00f3wnych przyczyn uzyskiwania nieautoryzowanych dost\u0119p\u00f3w do danych.\u201d\u00a0 <\/em>[\u017ar\u00f3d\u0142o: OUCH! Grudzie\u0144 2017]<\/div>\n<p style=\"text-align: justify;\">Polecamy r\u00f3wnie\u017c wydanie listopadowe, w&nbsp;kt\u00f3rym temat <strong><a href=\"https:\/\/securingthehuman.sans.org\/newsletters\/ouch\/issues\/OUCH-201711_po.pdf\" target=\"_blank\" rel=\"noopener\">Bezpieczne zakupy w&nbsp;sieci.<\/a><\/strong><\/p>\n<p><a href=\"http:\/\/www.zsp2.jaworzno.pl\/cyberbezpieczenstwo-biuletyn-bezpieczenstwa-komputerowego-ouch\/indeks-3\/\" rel=\"attachment wp-att-9109\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-9109\" src=\"http:\/\/www.zsp2.jaworzno.pl\/wp-content\/uploads\/2017\/12\/indeks.png\" alt=\"CERT\" width=\"420\" height=\"120\" srcset=\"https:\/\/zsp2.jaworzno.edu.pl\/wp-content\/uploads\/2017\/12\/indeks.png 420w, https:\/\/zsp2.jaworzno.edu.pl\/wp-content\/uploads\/2017\/12\/indeks-300x86.png 300w\" sizes=\"auto, (max-width: 420px) 100vw, 420px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ukaza\u0142 si\u0119 nowy grudniowy numer Biuletynu Bezpiecze\u0144stwa Komputerowego OUCH! A&nbsp;w&nbsp;nim Bezpieczne logowanie. Has\u0142a Czym jest dwusk\u0142adnikowe uwierzytelnianie? Jak to dzia\u0142a?<\/p>\n","protected":false},"author":3,"featured_media":9105,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1,766],"tags":[1114,1115,1113,1116,467,466,1110,916,742,917,918,188,29,28],"class_list":["post-9103","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-aktualnosci","category-informatyk","tag-bezpieczne-logowanie","tag-bezpieczne-zakupy-w-sieci","tag-biuletyn-bezpieczenstwa-komputerowego","tag-cert-polska","tag-najlepsza-szkola-ponadgimnazjalna-w-jaworznie","tag-ouch","tag-szkola-techniczna-jaworzno","tag-technik-informatyk-e-sport-chrzanow","tag-technik-informatyk-e-sport-jaworzno","tag-technik-informatyk-e-sport-myslowice","tag-technik-informatyk-e-sport-sosnowiec","tag-technikum-nr-2","tag-zsp2","tag-zsp2-jaworzno"],"_links":{"self":[{"href":"https:\/\/zsp2.jaworzno.edu.pl\/index.php?rest_route=\/wp\/v2\/posts\/9103","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zsp2.jaworzno.edu.pl\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zsp2.jaworzno.edu.pl\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zsp2.jaworzno.edu.pl\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/zsp2.jaworzno.edu.pl\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=9103"}],"version-history":[{"count":8,"href":"https:\/\/zsp2.jaworzno.edu.pl\/index.php?rest_route=\/wp\/v2\/posts\/9103\/revisions"}],"predecessor-version":[{"id":9121,"href":"https:\/\/zsp2.jaworzno.edu.pl\/index.php?rest_route=\/wp\/v2\/posts\/9103\/revisions\/9121"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/zsp2.jaworzno.edu.pl\/index.php?rest_route=\/wp\/v2\/media\/9105"}],"wp:attachment":[{"href":"https:\/\/zsp2.jaworzno.edu.pl\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=9103"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zsp2.jaworzno.edu.pl\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=9103"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zsp2.jaworzno.edu.pl\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=9103"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}