{"id":116984,"date":"2002-09-13T08:30:00","date_gmt":"2002-09-13T06:30:00","guid":{"rendered":"https:\/\/mediarun.com\/index.php\/news-posts\/konflikt-iracki-w-sieci\/"},"modified":"2002-09-13T08:30:00","modified_gmt":"2002-09-13T06:30:00","slug":"konflikt-iracki-w-sieci","status":"publish","type":"post","link":"https:\/\/mediarun.com\/pl\/digital\/internet\/konflikt-iracki-w-sieci.html","title":{"rendered":"Konflikt iracki w sieci"},"content":{"rendered":"<p><P>W komunikacie przes\u0142anym do zaatakowanych system\u00f3w podczas w\u0142ama\u0144 zawarto protest przeciwko planowanej inwazji na Irak.<\/P><br \/>\n<P>Do zamach\u00f3w przyzna\u0142a si\u0119 proislamska grupa haker\u00f3w USG. Wed\u0142ug specjalist\u00f3w mi2g, od maja &#8211; kiedy za\u0142o\u017cono grup\u0119 &#8211; dokona\u0142a ona ponad 100 podobnych atak\u00f3w. <\/P><br \/>\n<P>W\u015br\u00f3d cel\u00f3w znalaz\u0142a si\u0119 ameryka\u0144ska grupa bankowa. Wed\u0142ug specjalist\u00f3w na \u015bwiecie jest kilka podobnych i r\u00f3wnie aktywnych grup, zajmuj\u0105cych si\u0119 dzia\u0142alno\u015bci\u0105 zwan\u0105 cyberterroryzmem.<\/P><br \/>\n<P>Do przeprowadzenia skutecznego i dotkliwego ataku niezb\u0119dna jest cz\u0119sto wsp\u00f3\u0142praca kogo\u015b zatrudnionego w organizacji b\u0119d\u0105cej celem akcji. <\/P><br \/>\n<P>Cyberterror sta\u0142 si\u0119 dotkliwy po bombardowaniach Jugos\u0142awii w 1999 roku. Nasili\u0142 si\u0119 po tym jak zaostrzy\u0142 si\u0119 konflikt na Bliskim Wschodzie. <\/P><br \/>\n<P>S\u0142u\u017cby specjalne obawiaj\u0105 si\u0119, \u017ce ofiar\u0105 haker\u00f3w mo\u017ce pewnego dnia pa\u015b\u0107 ca\u0142a struktura informatyczna kt\u00f3rego\u015b z pa\u0144stw albo jednej z wielkich korporacji.<\/P><br \/>\n<P>Skuteczny atak mo\u017ce si\u0119 sko\u0144czy\u0107 np. dezorganizacj\u0105 transportu, telekomunikacji i finans\u00f3w.<\/P><\/p>\n","protected":false},"excerpt":{"rendered":"Wed\u0142ug firmy mi2g, zajmuj\u0105cej si\u0119 zabezpieczeniami w sieci, w ostatnich dniach dosz\u0142o do trzech du\u017cych atak\u00f3w na systemy komputerowe.","protected":false},"author":1,"featured_media":116985,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"csco_display_header_overlay":false,"csco_singular_sidebar":"","csco_page_header_type":"","csco_page_load_nextpost":"","csco_post_video_location":[],"csco_post_video_location_hash":"","csco_post_video_url":"","csco_post_video_bg_start_time":0,"csco_post_video_bg_end_time":0,"footnotes":""},"categories":[9676],"tags":[],"class_list":{"0":"post-116984","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-internet","8":"cs-entry","9":"cs-video-wrap"},"_links":{"self":[{"href":"https:\/\/mediarun.com\/pl\/wp-json\/wp\/v2\/posts\/116984","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mediarun.com\/pl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mediarun.com\/pl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mediarun.com\/pl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mediarun.com\/pl\/wp-json\/wp\/v2\/comments?post=116984"}],"version-history":[{"count":0,"href":"https:\/\/mediarun.com\/pl\/wp-json\/wp\/v2\/posts\/116984\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mediarun.com\/pl\/wp-json\/wp\/v2\/media\/116985"}],"wp:attachment":[{"href":"https:\/\/mediarun.com\/pl\/wp-json\/wp\/v2\/media?parent=116984"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mediarun.com\/pl\/wp-json\/wp\/v2\/categories?post=116984"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mediarun.com\/pl\/wp-json\/wp\/v2\/tags?post=116984"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}