{"id":33,"date":"2008-03-12T09:14:17","date_gmt":"2008-03-12T08:14:17","guid":{"rendered":"http:\/\/kneb.pl\/bezpieczenstwo-danych-w-firmie.html"},"modified":"2014-03-05T15:29:33","modified_gmt":"2014-03-05T14:29:33","slug":"bezpieczenstwo-danych-w-firmie","status":"publish","type":"post","link":"https:\/\/kneb.wznj.umg.edu.pl\/?p=33","title":{"rendered":"Bezpiecze\u0144stwo danych w firmie"},"content":{"rendered":"<p>Prezentacja kt\u00f3r\u0105 przygotowa\u0142 \u0141ukasz Tomczak po\u015bwi\u0119cona zagro\u017ceniom danych w firmach.<\/p>\n<p><!--more--><br \/>\n<object style=\"margin:0px auto\" width=\"425\" height=\"355\"><param name=\"movie\" value=\"http:\/\/static.slideshare.net\/swf\/ssplayer2.swf?doc=bezpieczenstwo-danych-w-firmie-1205319751257003-3\"\/><param name=\"allowFullScreen\" value=\"true\"\/><param name=\"allowScriptAccess\" value=\"always\"\/><embed src=\"http:\/\/static.slideshare.net\/swf\/ssplayer2.swf?doc=bezpieczenstwo-danych-w-firmie-1205319751257003-3\" type=\"application\/x-shockwave-flash\" allowscriptaccess=\"always\" allowfullscreen=\"true\" width=\"425\" height=\"355\"\/><\/object><\/p>\n<ul>\n<li>Bezpiecze\u0144stwo Danych w Firmie<\/li>\n<li>Slajd  2: Wykradanie danych \u2022 Drukowanie \u2022 E-Mail \u2022 P\u0142yty CD\/DVD \u2022 Pami\u0119ci USB\n<\/li>\n<li>Slajd  3: Rozwi\u0105zanie Data Loss Prevention (DLP)\n<\/li>\n<li>Slajd  5: Inne podej\u015bcie \u2022 Spam \u2022 Wirusy, z\u0142o\u015bliwe oprogramowanie \u2022 W\u0142amania\n<\/li>\n<li>Slajd  6: Awangarda\n<\/li>\n<li>Slajd  9: Mo\u017cliwo\u015bci administratora \u2022 Przeskanowanie dowolnej stacji roboczej \u2022 Zablokowanie ruchu z okre\u015blonej stacji \u2022 Logowanie po\u0142\u0105cze\u0144, monitorowanie ruchu z\/do okre\u015blonego u\u017cytkownika \u2022 Zaawansowane regu\u0142y filtrowania ruchu sieciowego \u2022 Itd\u2026\n<\/li>\n<li>Slajd  13: Centrum Zarz\u0105dzania Sieci\u0105 MKS <\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Prezentacja przygotowana przez \u0141ukasza Tomczaka dotycz\u0105ca zagro\u017ce\u0144 danych w firmach.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,1],"tags":[31,45,46,47],"_links":{"self":[{"href":"https:\/\/kneb.wznj.umg.edu.pl\/index.php?rest_route=\/wp\/v2\/posts\/33"}],"collection":[{"href":"https:\/\/kneb.wznj.umg.edu.pl\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kneb.wznj.umg.edu.pl\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kneb.wznj.umg.edu.pl\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kneb.wznj.umg.edu.pl\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=33"}],"version-history":[{"count":1,"href":"https:\/\/kneb.wznj.umg.edu.pl\/index.php?rest_route=\/wp\/v2\/posts\/33\/revisions"}],"predecessor-version":[{"id":299,"href":"https:\/\/kneb.wznj.umg.edu.pl\/index.php?rest_route=\/wp\/v2\/posts\/33\/revisions\/299"}],"wp:attachment":[{"href":"https:\/\/kneb.wznj.umg.edu.pl\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=33"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kneb.wznj.umg.edu.pl\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=33"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kneb.wznj.umg.edu.pl\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=33"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}