{"id":3381,"date":"2020-03-01T12:00:00","date_gmt":"2020-03-01T12:00:00","guid":{"rendered":"https:\/\/bezpecnenanete.eset.com\/sk\/?p=3381"},"modified":"2021-07-30T08:10:16","modified_gmt":"2021-07-30T08:10:16","slug":"umela-inteligencia-a-strojove-ucenie-v-kontexte-kybernetickej-bezpecnosti","status":"publish","type":"post","link":"https:\/\/bezpecnenanete.eset.com\/sk\/it-bezpecnost\/umela-inteligencia-a-strojove-ucenie-v-kontexte-kybernetickej-bezpecnosti\/","title":{"rendered":"Umel\u00e1 inteligencia a strojov\u00e9 u\u010denie v kontexte kybernetickej bezpe\u010dnosti"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"720\" src=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2020\/02\/hlavny_banner-AI-1280x720-1.jpg\" alt=\"\" class=\"wp-image-3382\" srcset=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2020\/02\/hlavny_banner-AI-1280x720-1.jpg 1280w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2020\/02\/hlavny_banner-AI-1280x720-1-300x169.jpg 300w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2020\/02\/hlavny_banner-AI-1280x720-1-1024x576.jpg 1024w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2020\/02\/hlavny_banner-AI-1280x720-1-768x432.jpg 768w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2020\/02\/hlavny_banner-AI-1280x720-1-370x208.jpg 370w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2020\/02\/hlavny_banner-AI-1280x720-1-1170x658.jpg 1170w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2020\/02\/hlavny_banner-AI-1280x720-1-972x546.jpg 972w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2020\/02\/hlavny_banner-AI-1280x720-1-760x428.jpg 760w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2020\/02\/hlavny_banner-AI-1280x720-1-270x152.jpg 270w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/figure>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Aj ke\u010f sa strojov\u00e9 u\u010denie spom\u00edna \u010dastej\u0161ie v&nbsp;poslednom obdob\u00ed, jeho vznik sa datuje u\u017e do p\u00e4\u0165desiatych rokov 20. storo\u010dia. V oblasti kybernetickej bezpe\u010dnosti bolo jeho pou\u017eitie v&nbsp;praxi zaveden\u00e9 pred rokom 2000. Jedn\u00fdm z t\u00fdchto pr\u00edpadov bolo aj <a href=\"https:\/\/www.eset.com\/sk\/o-nas\/antivirusove-technologie\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"detek\u010dn\u00e9 jadro (opens in a new tab)\">detek\u010dn\u00e9 jadro<\/a> spolo\u010dnosti ESET. <\/p>\n\n\n\n<p>V kontexte kybernetickej ochrany sa pou\u017e\u00edvaj\u00fa algoritmy strojov\u00e9ho u\u010denia hlavne pri trieden\u00ed a anal\u00fdze vzoriek, identifik\u00e1cii podobnost\u00ed, ako aj stanoven\u00ed hodnoty pravdepodobnosti pre sprac\u00favan\u00fd objekt, ktor\u00fd sa n\u00e1sledne zarad\u00ed do jednej z troch hlavn\u00fdch kateg\u00f3ri\u00ed: <\/p>\n\n\n\n<ul class=\"is-style-checkbox wp-block-list\"><li>\u0161kodliv\u00fd, <\/li><li>potenci\u00e1lne nechcen\u00fd alebo <\/li><li>bezpe\u010dn\u00fd objekt. <\/li><\/ul>\n\n\n\n<p>To&nbsp;pom\u00e1ha spr\u00e1vne ozna\u010di\u0165 prich\u00e1dzaj\u00facu vzorku ako \u010dist\u00fa, potenci\u00e1lne nechcen\u00fa alebo \u0161kodliv\u00fa. Av\u0161ak, ak je cie\u013eom dosiahnu\u0165 \u010do najlep\u0161ie v\u00fdsledky, treba vyu\u017ei\u0165 <strong>\u013eudsk\u00fa odbornos\u0165<\/strong> a technol\u00f3giu tr\u00e9nova\u0165 na rozsiahlej mno\u017eine spr\u00e1vne identifikovan\u00fdch \u0161kodliv\u00fdch a bezpe\u010dn\u00fdch vzoriek, na z\u00e1klade ktorej sa algoritmus nau\u010d\u00ed vzorky rozli\u0161ova\u0165. <\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>Tento sp\u00f4sob tr\u00e9ningu pod doh\u013eadom odborn\u00edkov sa naz\u00fdva <em>\u201e<\/em>strojov\u00e9 u\u010denie s u\u010dite\u013eom (angl. supervised learning)\u201c.<\/p><\/blockquote>\n\n\n\n<p>Po\u010das tohto \u201etr\u00e9ningov\u00e9ho\u201c procesu sa algoritmus u\u010d\u00ed, ako analyzova\u0165 a identifikova\u0165 v\u00e4\u010d\u0161inu potenci\u00e1lnych hrozieb a ako akt\u00edvne reagova\u0165 s cie\u013eom tieto hrozby eliminova\u0165.  <\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>Algoritmy, ktor\u00e9 nie s\u00fa tr\u00e9novan\u00e9 na vopred ur\u010denej mno\u017eine roztrieden\u00fdch d\u00e1t, spadaj\u00fa do kateg\u00f3rie tzv. \u201estrojov\u00e9ho u\u010denia bez u\u010dite\u013ea (angl. unsupervised learning)\u201c. <\/p><\/blockquote>\n\n\n\n<p>Tento pr\u00edstup je vhodnej\u0161\u00ed napr\u00edklad na h\u013eadanie podobnost\u00ed a anom\u00e1li\u00ed v mno\u017estve d\u00e1t, ktor\u00e9 by \u013eudsk\u00e9mu oku inak mohli unikn\u00fa\u0165. Z\u00e1rove\u0148 sa v\u0161ak algoritmus nemus\u00ed nevyhnutne nau\u010di\u0165 oddeli\u0165 dobr\u00e9 od zl\u00e9ho, respekt\u00edve ne\u0161kodn\u00e9 vzorky od t\u00fdch \u0161kodliv\u00fdch. Tieto algoritmy n\u00e1jdu vyu\u017eitie pri pr\u00e1ci s ve\u013ek\u00fdm objemom ozna\u010den\u00fdch vzoriek, kde pom\u00f4\u017eu d\u00e1ta rozdeli\u0165 do skup\u00edn, aby sa n\u00e1sledne mohli vytvori\u0165 men\u0161ie tr\u00e9ningov\u00e9 mno\u017einy pre ostatn\u00e9 algoritmy. <\/p>\n\n\n\n<p> \u010eal\u0161ou mo\u017enos\u0165ou je <strong>kombin\u00e1cia strojov\u00e9ho u\u010denia s u\u010dite\u013eom a bez u\u010dite\u013ea. <\/strong><\/p>\n\n\n\n<p>Pri tr\u00e9novan\u00ed algoritmu sa v&nbsp;tomto pr\u00edpade pou\u017e\u00edvaj\u00fa len \u010diasto\u010dne ozna\u010den\u00e9 d\u00e1ta, pri\u010dom v\u00fdsledky n\u00e1sledne odborn\u00edci kontroluj\u00fa a dola\u010fuj\u00fa, a\u017e k\u00fdm sa nedosiahne po\u017eadovan\u00e1 \u00farove\u0148 presnosti. Tak\u00fdto pr\u00edstup sa vyu\u017e\u00edva z toho d\u00f4vodu, \u017ee vytvorenie tr\u00e9ningovej mno\u017einy s kompletne ozna\u010den\u00fdmi d\u00e1tami je \u010dasto zd\u013ahav\u00e9 a n\u00e1kladn\u00e9. Pre niektor\u00e9 probl\u00e9my navy\u0161e ani nie je mo\u017en\u00e9 vytvori\u0165 mno\u017einu \u00faplne a spr\u00e1vne ozna\u010den\u00fdch d\u00e1t. <\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>Na podobnom princ\u00edpe funguje aj jadro strojov\u00e9ho u\u010denia spolo\u010dnosti ESET, nazvan\u00e9 Augur. Vyu\u017e\u00edva sa na klasifik\u00e1ciu polo\u017eiek, ktor\u00e9 neboli s\u00fa\u010das\u0165ou tr\u00e9ningovej mno\u017einy a neboli predt\u00fdm ozna\u010den\u00e9.<\/p><\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading\">M\u00f4\u017ee d\u00f4js\u0165 k zneu\u017eitiu strojov\u00e9ho u\u010denia na tvorbu malv\u00e9ru?<\/h2>\n\n\n\n<p>\u00dato\u010dn\u00edci si uvedomuj\u00fa pr\u00edle\u017eitosti, ktor\u00e9 im technol\u00f3gia strojov\u00e9ho\nu\u010denia, ale aj umel\u00e1 inteligencia prin\u00e1\u0161aj\u00fa. U\u017e teraz je v\u0161ak ist\u00e9, \u017ee pokia\u013e kybernetick\u00ed \u00fato\u010dn\u00edci t\u00fato technol\u00f3giu\npou\u017eij\u00fa vo svoj prospech, nebude to prv\u00fdkr\u00e1t. V roku 2003 tr\u00f3jsky k\u00f4\u0148 Swizzor\npou\u017eil automatiz\u00e1ciu, pri ktorej bol \u0161kodliv\u00fd k\u00f3d ka\u017ed\u00fa min\u00fatu nanovo zabalen\u00fd\na ka\u017ed\u00e1 obe\u0165 tak dostala variant dan\u00e9ho malv\u00e9ru v pozmenenej podobe, \u010do s\u0165a\u017eilo\njeho detekciu a umo\u017enilo rozsiahle \u0161\u00edrenie. Tento pr\u00edstup by nebol \u00fa\u010dinn\u00fd proti\nmodern\u00fdm antimalv\u00e9rov\u00fdm rie\u0161eniam, ako s\u00fa tie od spolo\u010dnosti ESET, ke\u010f\u017ee dnes\nsa u\u017e vyu\u017e\u00edvaj\u00fa viacvrstvov\u00e9, vylep\u0161en\u00e9 detek\u010dn\u00e9 met\u00f3dy.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>Existuje v\u0161ak ve\u013ea scen\u00e1rov, ako by mohli kybernetick\u00ed zlo\u010dinci vyu\u017ei\u0165 strojov\u00e9 u\u010denie v&nbsp;bud\u00facnosti. <\/p><\/blockquote>\n\n\n\n<p>Ako pr\u00edklad uv\u00e1dzame len zop\u00e1r z&nbsp;nich. Strojov\u00e9 u\u010denie m\u00f4\u017ee by\u0165 v&nbsp;bud\u00facnosti pou\u017eit\u00e9: <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Pri vytv\u00e1ran\u00ed nov\u00fdch druhov <a href=\"https:\/\/bezpecnenanete.eset.com\/sk\/it-bezpecnost\/skodlivy-kod\/malver-adver-ransomver-nie-je-ver-ako-ver\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"malv\u00e9ru (opens in a new tab)\">malv\u00e9ru<\/a>. \u00dato\u010dn\u00edci sa m\u00f4\u017eu pok\u00fasi\u0165 o vytv\u00e1ranie alebo zdokona\u013eovanie malv\u00e9ru preroben\u00edm existuj\u00facich automatiz\u00e1ci\u00ed, ktor\u00e9 boli pou\u017eit\u00e9 na generovanie nov\u00fdch variantov star\u0161\u00edch malv\u00e9rov.<\/li><li>Pri zlep\u0161ovan\u00ed zacielenia malv\u00e9ru prostredn\u00edctvom profilovania obet\u00ed na z\u00e1klade verejne dostupn\u00fdch a&nbsp;zozbieran\u00fdch d\u00e1t.<\/li><li>Pri vytv\u00e1ran\u00ed falo\u0161n\u00fdch pr\u00edznakov poukazuj\u00facich na in\u00fd malv\u00e9r s&nbsp;cie\u013eom zmias\u0165 v\u00fdskumn\u00edkov.<\/li><li>Pri vyh\u013ead\u00e1van\u00ed nov\u00fdch zranite\u013enost\u00ed, ktor\u00e9 by sa dali zneu\u017ei\u0165 na infiltr\u00e1ciu \u010di ukr\u00fdvanie malv\u00e9ru v sieti obete alebo kombinovanie r\u00f4znych techn\u00edk \u00fatoku. <\/li><li>Pri zvy\u0161ovan\u00ed r\u00fdchlosti \u00fatokov, \u010do m\u00f4\u017ee by\u0165 rozhoduj\u00face najm\u00e4 v&nbsp;pr\u00edpadoch, ak ide o&nbsp;kr\u00e1de\u017e osobn\u00fdch alebo firemn\u00fdch d\u00e1t. &nbsp;<\/li><\/ul>\n\n\n\n<p>Mnoh\u00e9 zo spomenut\u00fdch mo\u017enost\u00ed v\u0161ak nemusia by\u0165 len predzves\u0165ou toho, \u010do pr\u00edde. Pr\u00edkladom m\u00f4\u017ee by\u0165 u\u017e s\u00fa\u010dasn\u00e9 vytv\u00e1ranie nov\u00e9ho, kvalitn\u00e9ho spamu \u010di identifikovanie spamov\u00e9ho\/phishingov\u00e9ho \u00fatoku. Ako sme spom\u00ednali v predch\u00e1dzaj\u00facej t\u00e9me venovanej <a rel=\"noreferrer noopener\" aria-label=\"podvodn\u00fdm praktik\u00e1m (opens in a new tab)\" href=\"https:\/\/bezpecnenanete.eset.com\/sk\/it-bezpecnost\/co-ma-spolocne-phishing-s-rybarcenim\/\" target=\"_blank\">podvodn\u00fdm praktik\u00e1m<\/a>, pravopisn\u00e9 chyby, preklepy a nezvy\u010dajn\u00e9 vetn\u00e9 formul\u00e1re \u010dasto nazna\u010duj\u00fa, \u017ee ide o spam alebo <a rel=\"noreferrer noopener\" aria-label=\"phishingov\u00fd (opens in a new tab)\" href=\"https:\/\/bezpecnenanete.eset.com\/sk\/it-bezpecnost\/ako-sa-chranit-pred-phishingovym-utokom\/\" target=\"_blank\">phishingov\u00fd<\/a> e-mail. <\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-coblocks-author\"><figure class=\"wp-block-coblocks-author__avatar\"><img decoding=\"async\" class=\"wp-block-coblocks-author__avatar-img\" src=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2020\/02\/hlavny_banner-machine-learning.jpg\" alt=\"Strojov\u00e9 u\u010denie a umel\u00e1 inteligencia\"\/><\/figure><div class=\"wp-block-coblocks-author__content\"><span class=\"wp-block-coblocks-author__name\">Strojov\u00e9 u\u010denie a umel\u00e1 inteligencia<\/span><p class=\"wp-block-coblocks-author__biography\"><br\/>\u010co je to strojov\u00e9 u\u010denie, \u010do m\u00e1 spolo\u010dn\u00e9 s\u00a0umelou inteligenciou a\u00a0ako sa t\u00e1to technol\u00f3gia vyu\u017e\u00edva v\u00a0kybernetickej bezpe\u010dnosti?<\/p>\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link\" href=\"https:\/\/bezpecnenanete.eset.com\/sk\/it-bezpecnost\/strojove-ucenie-a-umela-inteligencia\/\">\u010c\u00edta\u0165 viac<\/a><\/div>\n<\/div><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Absencia tak\u00fdchto ch\u00fdb v\u0161ak nie je z\u00e1rukou toho, \u017ee ide o pravdiv\u00fa spr\u00e1vu.&nbsp;Najm\u00e4 dnes, ke\u010f kybernetick\u00ed zlo\u010dinci nevyu\u017e\u00edvaj\u00fa len slu\u017eby profesion\u00e1lnych prekladate\u013eov, ale aj strojov\u00e9 u\u010denie \u2013 napr\u00edklad v podobe be\u017ene dostupn\u00fdch prekladov\u00fdch slu\u017eieb, ktor\u00e9 v\u00fdrazne zlep\u0161ili lokaliz\u00e1cie zdrojov\u00fdch textov. Aj v\u010faka pokroku technol\u00f3gi\u00ed dne\u0161n\u00e9 spamov\u00e9 spr\u00e1vy vyzeraj\u00fa profesion\u00e1lnej\u0161ie a d\u00f4veryhodnej\u0161ie, zatia\u013e \u010do ich detekcia je ove\u013ea n\u00e1ro\u010dnej\u0161ia. <\/p>\n\n\n\n<p>No pomocou\nalgoritmu strojov\u00e9ho u\u010denia a dostupn\u00fdch d\u00e1t by mohli \u00fato\u010dn\u00edci phishingov\u00e9\ne-maily aj automaticky alebo \u010diasto\u010dne prisp\u00f4sobi\u0165 obeti, napr\u00edklad pod\u013ea jej\njazyka, z\u00e1ujmov, sledovan\u00fdch t\u00e9m a noviniek, pr\u00edpadne ak\u00fdchko\u013evek in\u00fdch\nkrit\u00e9ri\u00ed, pre ktor\u00e9 z\u00edskaj\u00fa vhodn\u00e9 tr\u00e9ningov\u00e9 d\u00e1ta. Personaliz\u00e1cia obsahu\npritom predstavuje ove\u013ea v\u00fdrazne vy\u0161\u0161ie riziko, nako\u013eko zvy\u0161uje \u0161ancu, \u017ee obe\u0165\ne-mail otvor\u00ed. <strong><\/strong><\/p>\n\n\n\n<p>Bud\u00facnos\u0165 e\u0161te len uk\u00e1\u017ee, \u010di sa tieto obavy skuto\u010dne naplnia a do akej miery. Nie je jednoduch\u00e9 poveda\u0165, \u010di bud\u00fa nakoniec prevl\u00e1da\u0165 pozit\u00edvne alebo negat\u00edvne vplyvy technol\u00f3gi\u00ed, ako je strojov\u00e9 u\u010denie. No u\u017e dnes m\u00f4\u017eeme na oboch p\u00f3loch vidie\u0165 nepopierate\u013en\u00fd n\u00e1rast syst\u00e9mov, ktor\u00e9 nezvratne menia bezpe\u010dnos\u0165 cel\u00e9ho internetu. <\/p>\n\n\n\n<p><strong>Autor: T\u00edm ESET<\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p>Zdroje: <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Ondrej Kubovi\u010d, Juraj J\u00e1no\u0161\u00edk, Peter Ko\u0161in\u00e1r,<a href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/02\/ESET_MACHINE_LEARNING_ERA.pdf\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\"><em>Doba Machine learningu v&nbsp;oblasti kybernetickej bezpe\u010dnosti, White paper, febru\u00e1r 2019. <\/em><\/a><\/li><li>Tony Anscombe, What if Artificial Intelligence (AI) could be used to power future malware?<\/li><li>Tony Anscombe, What does artificial intelligence\/machine learning, in the context of cybersecurity, actually mean? <a href=\"https:\/\/www.youtube.com\/watch?v=5gzIz5VXX_k\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">https:\/\/www.youtube.com\/watch?v=5gzIz5VXX_k<\/a><\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Aj ke\u010f sa strojov\u00e9 u\u010denie spom\u00edna \u010dastej\u0161ie v poslednom obdob\u00ed, jeho vznik sa datuje u\u017e do 20. storo\u010dia. <\/p>\n","protected":false},"author":5,"featured_media":3393,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[82,114],"tags":[],"class_list":["post-3381","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-bezpecnost","category-strojove-ucenie-a-ai"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Umel\u00e1 inteligencia a strojov\u00e9 u\u010denie v IT bezpe\u010dnosti | ESET<\/title>\n<meta name=\"description\" content=\"M\u00f4\u017ee d\u00f4js\u0165 k zneu\u017eitiu strojov\u00e9ho u\u010denia na tvorbu malv\u00e9ru? A ako funguje AI v internetovej bezpe\u010dnosti?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bezpecnenanete.eset.com\/sk\/it-bezpecnost\/umela-inteligencia-a-strojove-ucenie-v-kontexte-kybernetickej-bezpecnosti\/\" \/>\n<meta property=\"og:locale\" content=\"sk_SK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Umel\u00e1 inteligencia a strojov\u00e9 u\u010denie v IT bezpe\u010dnosti | ESET\" \/>\n<meta property=\"og:description\" content=\"M\u00f4\u017ee d\u00f4js\u0165 k zneu\u017eitiu strojov\u00e9ho u\u010denia na tvorbu malv\u00e9ru? A ako funguje AI v internetovej bezpe\u010dnosti?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bezpecnenanete.eset.com\/sk\/it-bezpecnost\/umela-inteligencia-a-strojove-ucenie-v-kontexte-kybernetickej-bezpecnosti\/\" \/>\n<meta property=\"og:site_name\" content=\"Bezpe\u010dne na nete | ESET\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ESETnaSlovensku\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-01T12:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-30T08:10:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2020\/02\/hlavny_banner-AI.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2025\" \/>\n\t<meta property=\"og:image:height\" content=\"1350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ESET User\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Autor\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET User\" \/>\n\t<meta name=\"twitter:label2\" content=\"Predpokladan\u00fd \u010das \u010d\u00edtania\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 min\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/it-bezpecnost\\\/umela-inteligencia-a-strojove-ucenie-v-kontexte-kybernetickej-bezpecnosti\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/it-bezpecnost\\\/umela-inteligencia-a-strojove-ucenie-v-kontexte-kybernetickej-bezpecnosti\\\/\"},\"author\":{\"name\":\"ESET User\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#\\\/schema\\\/person\\\/dea8a7aed2893ceadc39b5e354c5b05e\"},\"headline\":\"Umel\u00e1 inteligencia a strojov\u00e9 u\u010denie v kontexte kybernetickej bezpe\u010dnosti\",\"datePublished\":\"2020-03-01T12:00:00+00:00\",\"dateModified\":\"2021-07-30T08:10:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/it-bezpecnost\\\/umela-inteligencia-a-strojove-ucenie-v-kontexte-kybernetickej-bezpecnosti\\\/\"},\"wordCount\":1265,\"publisher\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/it-bezpecnost\\\/umela-inteligencia-a-strojove-ucenie-v-kontexte-kybernetickej-bezpecnosti\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/hlavny_banner-AI.jpg\",\"articleSection\":[\"IT bezpe\u010dnos\u0165\",\"Strojov\u00e9 u\u010denie a AI\"],\"inLanguage\":\"sk-SK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/it-bezpecnost\\\/umela-inteligencia-a-strojove-ucenie-v-kontexte-kybernetickej-bezpecnosti\\\/\",\"url\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/it-bezpecnost\\\/umela-inteligencia-a-strojove-ucenie-v-kontexte-kybernetickej-bezpecnosti\\\/\",\"name\":\"Umel\u00e1 inteligencia a strojov\u00e9 u\u010denie v IT bezpe\u010dnosti | ESET\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/it-bezpecnost\\\/umela-inteligencia-a-strojove-ucenie-v-kontexte-kybernetickej-bezpecnosti\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/it-bezpecnost\\\/umela-inteligencia-a-strojove-ucenie-v-kontexte-kybernetickej-bezpecnosti\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/hlavny_banner-AI.jpg\",\"datePublished\":\"2020-03-01T12:00:00+00:00\",\"dateModified\":\"2021-07-30T08:10:16+00:00\",\"description\":\"M\u00f4\u017ee d\u00f4js\u0165 k zneu\u017eitiu strojov\u00e9ho u\u010denia na tvorbu malv\u00e9ru? A ako funguje AI v internetovej bezpe\u010dnosti?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/it-bezpecnost\\\/umela-inteligencia-a-strojove-ucenie-v-kontexte-kybernetickej-bezpecnosti\\\/#breadcrumb\"},\"inLanguage\":\"sk-SK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/it-bezpecnost\\\/umela-inteligencia-a-strojove-ucenie-v-kontexte-kybernetickej-bezpecnosti\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/it-bezpecnost\\\/umela-inteligencia-a-strojove-ucenie-v-kontexte-kybernetickej-bezpecnosti\\\/#primaryimage\",\"url\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/hlavny_banner-AI.jpg\",\"contentUrl\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/hlavny_banner-AI.jpg\",\"width\":2025,\"height\":1350,\"caption\":\"strojov\u00e9 u\u010denie\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/it-bezpecnost\\\/umela-inteligencia-a-strojove-ucenie-v-kontexte-kybernetickej-bezpecnosti\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Domovsk\u00e1 str\u00e1nka\",\"item\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Umel\u00e1 inteligencia a strojov\u00e9 u\u010denie v kontexte kybernetickej bezpe\u010dnosti\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#website\",\"url\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/\",\"name\":\"Bezpe\u010dne na nete | ESET\",\"description\":\"Praktick\u00e9 rady, ako rozpozna\u0165 digit\u00e1lne hrozby.\",\"publisher\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sk-SK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#organization\",\"name\":\"Bezpe\u010dne na nete | ESET\",\"url\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/bnn.svg\",\"contentUrl\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/bnn.svg\",\"caption\":\"Bezpe\u010dne na nete | ESET\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ESETnaSlovensku\\\/\",\"https:\\\/\\\/www.instagram.com\\\/eset_slovensko\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/eset\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCtuph4SwEvitc5T-0cE1FuA\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#\\\/schema\\\/person\\\/dea8a7aed2893ceadc39b5e354c5b05e\",\"name\":\"ESET User\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/29915b098f8f9677cc5796ee2dd2358dd215824ff925345fe845a1eaf50bbb0d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/29915b098f8f9677cc5796ee2dd2358dd215824ff925345fe845a1eaf50bbb0d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/29915b098f8f9677cc5796ee2dd2358dd215824ff925345fe845a1eaf50bbb0d?s=96&d=mm&r=g\",\"caption\":\"ESET User\"},\"url\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/author\\\/esetuser\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Umel\u00e1 inteligencia a strojov\u00e9 u\u010denie v IT bezpe\u010dnosti | ESET","description":"M\u00f4\u017ee d\u00f4js\u0165 k zneu\u017eitiu strojov\u00e9ho u\u010denia na tvorbu malv\u00e9ru? A ako funguje AI v internetovej bezpe\u010dnosti?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bezpecnenanete.eset.com\/sk\/it-bezpecnost\/umela-inteligencia-a-strojove-ucenie-v-kontexte-kybernetickej-bezpecnosti\/","og_locale":"sk_SK","og_type":"article","og_title":"Umel\u00e1 inteligencia a strojov\u00e9 u\u010denie v IT bezpe\u010dnosti | ESET","og_description":"M\u00f4\u017ee d\u00f4js\u0165 k zneu\u017eitiu strojov\u00e9ho u\u010denia na tvorbu malv\u00e9ru? A ako funguje AI v internetovej bezpe\u010dnosti?","og_url":"https:\/\/bezpecnenanete.eset.com\/sk\/it-bezpecnost\/umela-inteligencia-a-strojove-ucenie-v-kontexte-kybernetickej-bezpecnosti\/","og_site_name":"Bezpe\u010dne na nete | ESET","article_publisher":"https:\/\/www.facebook.com\/ESETnaSlovensku\/","article_published_time":"2020-03-01T12:00:00+00:00","article_modified_time":"2021-07-30T08:10:16+00:00","og_image":[{"width":2025,"height":1350,"url":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2020\/02\/hlavny_banner-AI.jpg","type":"image\/jpeg"}],"author":"ESET User","twitter_card":"summary_large_image","twitter_misc":{"Autor":"ESET User","Predpokladan\u00fd \u010das \u010d\u00edtania":"5 min\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/it-bezpecnost\/umela-inteligencia-a-strojove-ucenie-v-kontexte-kybernetickej-bezpecnosti\/#article","isPartOf":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/it-bezpecnost\/umela-inteligencia-a-strojove-ucenie-v-kontexte-kybernetickej-bezpecnosti\/"},"author":{"name":"ESET User","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#\/schema\/person\/dea8a7aed2893ceadc39b5e354c5b05e"},"headline":"Umel\u00e1 inteligencia a strojov\u00e9 u\u010denie v kontexte kybernetickej bezpe\u010dnosti","datePublished":"2020-03-01T12:00:00+00:00","dateModified":"2021-07-30T08:10:16+00:00","mainEntityOfPage":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/it-bezpecnost\/umela-inteligencia-a-strojove-ucenie-v-kontexte-kybernetickej-bezpecnosti\/"},"wordCount":1265,"publisher":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#organization"},"image":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/it-bezpecnost\/umela-inteligencia-a-strojove-ucenie-v-kontexte-kybernetickej-bezpecnosti\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2020\/02\/hlavny_banner-AI.jpg","articleSection":["IT bezpe\u010dnos\u0165","Strojov\u00e9 u\u010denie a AI"],"inLanguage":"sk-SK"},{"@type":"WebPage","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/it-bezpecnost\/umela-inteligencia-a-strojove-ucenie-v-kontexte-kybernetickej-bezpecnosti\/","url":"https:\/\/bezpecnenanete.eset.com\/sk\/it-bezpecnost\/umela-inteligencia-a-strojove-ucenie-v-kontexte-kybernetickej-bezpecnosti\/","name":"Umel\u00e1 inteligencia a strojov\u00e9 u\u010denie v IT bezpe\u010dnosti | ESET","isPartOf":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/it-bezpecnost\/umela-inteligencia-a-strojove-ucenie-v-kontexte-kybernetickej-bezpecnosti\/#primaryimage"},"image":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/it-bezpecnost\/umela-inteligencia-a-strojove-ucenie-v-kontexte-kybernetickej-bezpecnosti\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2020\/02\/hlavny_banner-AI.jpg","datePublished":"2020-03-01T12:00:00+00:00","dateModified":"2021-07-30T08:10:16+00:00","description":"M\u00f4\u017ee d\u00f4js\u0165 k zneu\u017eitiu strojov\u00e9ho u\u010denia na tvorbu malv\u00e9ru? A ako funguje AI v internetovej bezpe\u010dnosti?","breadcrumb":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/it-bezpecnost\/umela-inteligencia-a-strojove-ucenie-v-kontexte-kybernetickej-bezpecnosti\/#breadcrumb"},"inLanguage":"sk-SK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bezpecnenanete.eset.com\/sk\/it-bezpecnost\/umela-inteligencia-a-strojove-ucenie-v-kontexte-kybernetickej-bezpecnosti\/"]}]},{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/it-bezpecnost\/umela-inteligencia-a-strojove-ucenie-v-kontexte-kybernetickej-bezpecnosti\/#primaryimage","url":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2020\/02\/hlavny_banner-AI.jpg","contentUrl":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2020\/02\/hlavny_banner-AI.jpg","width":2025,"height":1350,"caption":"strojov\u00e9 u\u010denie"},{"@type":"BreadcrumbList","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/it-bezpecnost\/umela-inteligencia-a-strojove-ucenie-v-kontexte-kybernetickej-bezpecnosti\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Domovsk\u00e1 str\u00e1nka","item":"https:\/\/bezpecnenanete.eset.com\/sk\/"},{"@type":"ListItem","position":2,"name":"Umel\u00e1 inteligencia a strojov\u00e9 u\u010denie v kontexte kybernetickej bezpe\u010dnosti"}]},{"@type":"WebSite","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#website","url":"https:\/\/bezpecnenanete.eset.com\/sk\/","name":"Bezpe\u010dne na nete | ESET","description":"Praktick\u00e9 rady, ako rozpozna\u0165 digit\u00e1lne hrozby.","publisher":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bezpecnenanete.eset.com\/sk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sk-SK"},{"@type":"Organization","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#organization","name":"Bezpe\u010dne na nete | ESET","url":"https:\/\/bezpecnenanete.eset.com\/sk\/","logo":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#\/schema\/logo\/image\/","url":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2022\/10\/bnn.svg","contentUrl":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2022\/10\/bnn.svg","caption":"Bezpe\u010dne na nete | ESET"},"image":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ESETnaSlovensku\/","https:\/\/www.instagram.com\/eset_slovensko\/","https:\/\/www.linkedin.com\/company\/eset","https:\/\/www.youtube.com\/channel\/UCtuph4SwEvitc5T-0cE1FuA"]},{"@type":"Person","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#\/schema\/person\/dea8a7aed2893ceadc39b5e354c5b05e","name":"ESET User","image":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/secure.gravatar.com\/avatar\/29915b098f8f9677cc5796ee2dd2358dd215824ff925345fe845a1eaf50bbb0d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/29915b098f8f9677cc5796ee2dd2358dd215824ff925345fe845a1eaf50bbb0d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/29915b098f8f9677cc5796ee2dd2358dd215824ff925345fe845a1eaf50bbb0d?s=96&d=mm&r=g","caption":"ESET User"},"url":"https:\/\/bezpecnenanete.eset.com\/sk\/author\/esetuser\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/posts\/3381","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/comments?post=3381"}],"version-history":[{"count":14,"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/posts\/3381\/revisions"}],"predecessor-version":[{"id":3482,"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/posts\/3381\/revisions\/3482"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/media\/3393"}],"wp:attachment":[{"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/media?parent=3381"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/categories?post=3381"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/tags?post=3381"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}