{"id":4617,"date":"2024-10-11T08:36:24","date_gmt":"2024-10-11T08:36:24","guid":{"rendered":"https:\/\/howtogeek.blog\/cs\/?p=4617"},"modified":"2024-10-11T08:36:24","modified_gmt":"2024-10-11T08:36:24","slug":"understanding-the-risks-of-public-wifi-and-how-to-safeguard-yourself-while-connecting","status":"publish","type":"post","link":"https:\/\/howtogeek.blog\/cs\/understanding-the-risks-of-public-wifi-and-how-to-safeguard-yourself-while-connecting\/","title":{"rendered":"Pochopen\u00ed rizik ve\u0159ejn\u00e9 Wi-Fi a jak se chr\u00e1nit p\u0159i p\u0159ipojov\u00e1n\u00ed"},"content":{"rendered":"<p>Ve\u0159ejn\u00e9 Wi-Fi nab\u00edz\u00ed bezkonkuren\u010dn\u00ed pohodl\u00ed a umo\u017e\u0148uje v\u00e1m p\u0159ipojit se k internetu na r\u016fzn\u00fdch m\u00edstech, jako jsou leti\u0161t\u011b, kav\u00e1rny a hotely. Vyu\u017eit\u00ed t\u011bchto s\u00edt\u00ed v\u0161ak vystavuje va\u0161e za\u0159\u00edzen\u00ed \u010detn\u00fdm bezpe\u010dnostn\u00edm hrozb\u00e1m, p\u0159i\u010dem\u017e hackov\u00e1n\u00ed je v\u00fdznamn\u00fdm probl\u00e9mem. Absence robustn\u00edch bezpe\u010dnostn\u00edch protokol\u016f na ve\u0159ejn\u00fdch Wi-Fi usnad\u0148uje kyberzlo\u010dinc\u016fm proniknout do p\u0159ipojen\u00fdch za\u0159\u00edzen\u00ed. V d\u016fsledku toho \u00fato\u010dn\u00edci vyu\u017e\u00edvaj\u00ed tyto s\u00edt\u011b k prov\u00e1d\u011bn\u00ed r\u016fzn\u00fdch technik kybernetick\u00fdch \u00fatok\u016f, v\u010detn\u011b \u00fatok\u016f typu man-in-the-middle (MITM), \u00fanos\u016f relac\u00ed a odposlechu paket\u016f.<\/p>\n<h2 id=\"common-attacks\">B\u011b\u017en\u00e9 kybernetick\u00e9 \u00fatoky<\/h2>\n<p>N\u00ed\u017ee jsou uvedeny n\u011bkter\u00e9 p\u0159evl\u00e1daj\u00edc\u00ed kybernetick\u00e9 hrozby, kter\u00e9 se zam\u011b\u0159uj\u00ed na u\u017eivatele ve ve\u0159ejn\u00fdch s\u00edt\u00edch Wi-Fi.<\/p>\n<ul>\n<li><strong>\u00datoky typu Man-in-the-Middle (MITM):<\/strong> P\u0159i \u00fatoku MITM \u00fato\u010dn\u00edk tajn\u011b zachyt\u00ed komunikaci mezi va\u0161\u00edm za\u0159\u00edzen\u00edm a webovou str\u00e1nkou, ke kter\u00e9 p\u0159istupujete, a potenci\u00e1ln\u011b ukradne nebo pozm\u011bn\u00ed citliv\u00e1 data. Jedn\u00e1 se o jeden z nej\u010dast\u011bj\u0161\u00edch \u00fatok\u016f na nezabezpe\u010den\u00e1 p\u0159ipojen\u00ed Wi-Fi.<\/li>\n<li><strong>Fale\u0161n\u00fd hotspot nebo Evil Twin Attacks:<\/strong> K tomuto typu \u00fatoku doch\u00e1z\u00ed, kdy\u017e hacker vytvo\u0159\u00ed podvodn\u00fd hotspot, kter\u00fd napodobuje ten legitimn\u00ed. Kdy\u017e se u\u017eivatel\u00e9 p\u0159ipoj\u00ed k tomuto fale\u0161n\u00e9mu hotspotu, jejich data se zp\u0159\u00edstupn\u00ed pachateli, kter\u00fd je m\u016f\u017ee zneu\u017e\u00edt bez v\u011bdom\u00ed ob\u011bti.<\/li>\n<li><strong>Sniffov\u00e1n\u00ed paket\u016f:<\/strong> Zat\u00edmco sledov\u00e1n\u00ed paket\u016f nemus\u00ed zp\u016fsobit okam\u017eit\u00e9 po\u0161kozen\u00ed, umo\u017e\u0148uje \u00fato\u010dn\u00edk\u016fm zachytit a analyzovat data p\u0159en\u00e1\u0161en\u00e1 p\u0159es otev\u0159enou s\u00ed\u0165 Wi-Fi. A\u010dkoli protokol HTTPS sn\u00ed\u017eil \u00fa\u010dinnost takov\u00fdch \u00fatok\u016f, informace mohou b\u00fdt st\u00e1le vystaveny, pokud jsou odes\u00edl\u00e1ny p\u0159es nezabezpe\u010den\u00e9 webov\u00e9 str\u00e1nky.<\/li>\n<li><strong>Session Hijacking:<\/strong> Hacke\u0159i mohou ukr\u00e1st soubory cookie relace a z\u00edskat tak neopr\u00e1vn\u011bn\u00fd p\u0159\u00edstup k va\u0161im \u00fa\u010dt\u016fm, ani\u017e by pot\u0159ebovali va\u0161e p\u0159ihla\u0161ovac\u00ed \u00fadaje. Tento typ \u00fatoku je b\u011b\u017en\u00fd zejm\u00e9na na nezabezpe\u010den\u00fdch Wi-Fi s\u00edt\u00edch.<\/li>\n<li><strong>Injekce malwaru:<\/strong> P\u0159ipojen\u00ed k ve\u0159ejn\u00e9 s\u00edti Wi-Fi m\u016f\u017ee zp\u016fsobit, \u017ee va\u0161e za\u0159\u00edzen\u00ed bude n\u00e1chyln\u00e9 k malwaru. Kyberzlo\u010dinci mohou zneu\u017e\u00edt slab\u00e1 m\u00edsta ve va\u0161em za\u0159\u00edzen\u00ed k instalaci \u0161kodliv\u00e9ho softwaru, kter\u00fd m\u016f\u017ee sledovat va\u0161i aktivitu a kr\u00e1st citliv\u00e9 informace bez va\u0161eho v\u011bdom\u00ed.<\/li>\n<\/ul>\n<h2 id=\"keeping-yourself-safe-on-public-wi-fi\">Z\u016fsta\u0148te v bezpe\u010d\u00ed na ve\u0159ejn\u00fdch Wi-Fi<\/h2>\n<p>Pokud zjist\u00edte, \u017ee je nutn\u00e9 pou\u017e\u00edvat ve\u0159ejnou Wi-Fi, dodr\u017eov\u00e1n\u00ed ur\u010dit\u00fdch opat\u0159en\u00ed v\u00e1m m\u016f\u017ee pomoci chr\u00e1nit se p\u0159ed r\u016fzn\u00fdmi kybernetick\u00fdmi hrozbami. Zde je n\u011bkolik strategi\u00ed, kter\u00e9 je t\u0159eba zv\u00e1\u017eit:<\/p>\n<h3 id=\"1-use-a-vpn\">1. Vyu\u017eijte VPN<\/h3>\n<p>Virtu\u00e1ln\u00ed priv\u00e1tn\u00ed s\u00ed\u0165 (VPN) funguje jako zabezpe\u010den\u00fd tunel, skr\u00fdv\u00e1 va\u0161i IP adresu a \u0161ifruje va\u0161e data, kdy\u017e se pohybujete online. T\u00edm VPN v\u00fdrazn\u011b minimalizuje riziko p\u0159\u00edstupu hacker\u016f k va\u0161im informac\u00edm. Pro ochranu va\u0161ich za\u0159\u00edzen\u00ed p\u0159ed kybernetick\u00fdmi hrozbami si m\u016f\u017eete vybrat bu\u010f bezplatn\u00e9, nebo p\u0159edplacen\u00e9 slu\u017eby VPN.<\/p>\n<h3 id=\"2-connect-to-secure-websites-only\">2. Pou\u017e\u00edvejte pouze zabezpe\u010den\u00e9 webov\u00e9 str\u00e1nky<\/h3>\n<p>Hledejte HTTPS ve webov\u00e9 adrese spolu s ikonou visac\u00edho z\u00e1mku v adresn\u00edm \u0159\u00e1dku prohl\u00ed\u017ee\u010de, kter\u00e1 ozna\u010duje zabezpe\u010den\u00e9 p\u0159ipojen\u00ed. Vyhn\u011bte se web\u016fm, kter\u00e9 nemaj\u00ed HTTPS, proto\u017ee mohou ohrozit zabezpe\u010den\u00ed va\u0161ich dat. Povolen\u00ed funkce \u201eV\u017edy pou\u017e\u00edvat HTTPS\u201c pro \u010dasto nav\u0161t\u011bvovan\u00e9 str\u00e1nky m\u016f\u017ee tak\u00e9 zv\u00fd\u0161it va\u0161i bezpe\u010dnost p\u0159i online aktivit\u00e1ch.<\/p>\n<h3 id=\"3-turn-off-automatic-connections\">3. Zaka\u017ete automatick\u00e1 p\u0159ipojen\u00ed<\/h3>\n<p>Automatick\u00e9 p\u0159ipojen\u00ed je sice pohodln\u00e9, ale m\u016f\u017ee p\u0159edstavovat riziko p\u0159i p\u0159ipojov\u00e1n\u00ed k nezn\u00e1m\u00fdm ve\u0159ejn\u00fdm s\u00edt\u00edm Wi-Fi. Mohou vystavit va\u0161e za\u0159\u00edzen\u00ed hrozb\u00e1m, jako jsou \u00fatoky zl\u00fdch dvoj\u010dat. Ujist\u011bte se, \u017ee jsou va\u0161e za\u0159\u00edzen\u00ed nastavena tak, aby se p\u0159ipojovala pouze ke zn\u00e1m\u00fdm s\u00edt\u00edm, a deaktivujte automatick\u00e1 p\u0159ipojen\u00ed pro ve\u0159ejn\u00e9 s\u00edt\u011b. P\u0159ed p\u0159ipojen\u00edm v\u017edy ov\u011b\u0159te legitimitu ve\u0159ejn\u00e9 Wi-Fi.<\/p>\n<h3 id=\"4-avoid-sensitive-transactions-and-sharing-personal-information\">4. Zdr\u017ete se citliv\u00fdch transakc\u00ed a sd\u00edlen\u00ed osobn\u00edch \u00fadaj\u016f<\/h3>\n<p>P\u0159i prov\u00e1d\u011bn\u00ed finan\u010dn\u00edch transakc\u00ed se ujist\u011bte, \u017ee jste v zabezpe\u010den\u00e9 s\u00edti. P\u0159i p\u0159ipojen\u00ed k nezabezpe\u010den\u00e9 Wi-Fi se vyhn\u011bte zad\u00e1v\u00e1n\u00ed citliv\u00fdch informac\u00ed, jako jsou bankovn\u00ed \u00fadaje. Krom\u011b toho se zdr\u017eujte odes\u00edl\u00e1n\u00ed osobn\u00edch \u00fadaj\u016f, jako jsou \u010d\u00edsla soci\u00e1ln\u00edho poji\u0161t\u011bn\u00ed nebo p\u0159ihla\u0161ov\u00e1n\u00ed k citliv\u00fdm \u00fa\u010dt\u016fm, kdy\u017e pou\u017e\u00edv\u00e1te ve\u0159ejn\u00e9 Wi-Fi.<\/p>\n<h3 id=\"5-protect-yourself-from-malware\">5. Ochrana proti malwaru<\/h3>\n<p>Chcete-li se chr\u00e1nit p\u0159ed malwarem, udr\u017eujte sv\u016fj opera\u010dn\u00ed syst\u00e9m a aplikace aktu\u00e1ln\u00ed pomoc\u00ed nejnov\u011bj\u0161\u00edch bezpe\u010dnostn\u00edch z\u00e1plat. Zajist\u011bte, aby byla br\u00e1na firewall v\u017edy aktivov\u00e1na, \u010dasto spou\u0161t\u011bjte antivirov\u00e9 kontroly a udr\u017eujte aktualizovan\u00e9 definice vir\u016f.<\/p>\n<h3 id=\"6-use-two-factor-authentication\">6. Implementujte dvoufaktorovou autentizaci<\/h3>\n<p>Dvoufaktorov\u00e9 ov\u011b\u0159ov\u00e1n\u00ed (2FA) p\u0159id\u00e1v\u00e1 dal\u0161\u00ed vrstvu ochrany pro va\u0161e \u00fa\u010dty. Po aktivaci obdr\u017e\u00edte na sv\u00e9 mobiln\u00ed za\u0159\u00edzen\u00ed jedine\u010dn\u00fd ov\u011b\u0159ovac\u00ed k\u00f3d, kter\u00fd je nezbytn\u00fd pro p\u0159ihl\u00e1\u0161en\u00ed do aplikace nebo webov\u00e9 str\u00e1nky. Tento dodate\u010dn\u00fd krok v\u00fdrazn\u011b zvy\u0161uje zabezpe\u010den\u00ed, zejm\u00e9na v nezabezpe\u010den\u00fdch s\u00edt\u00edch, tak\u017ee povolte 2FA, kdykoli je to mo\u017en\u00e9.<\/p>\n<h3 id=\"7-turn-off-file-sharing\">7. Zaka\u017ete sd\u00edlen\u00ed soubor\u016f<\/h3>\n<p>Sd\u00edlen\u00ed soubor\u016f zjednodu\u0161uje v\u00fdm\u011bnu soubor\u016f mezi za\u0159\u00edzen\u00edmi, ale v\u00fdrazn\u011b zvy\u0161uje bezpe\u010dnostn\u00ed rizika ve ve\u0159ejn\u00fdch s\u00edt\u00edch. M\u016f\u017ee vystavit va\u0161e soubory hacker\u016fm a poskytnout jim p\u0159\u00edstup k citliv\u00fdm dat\u016fm. Existuj\u00ed r\u016fzn\u00e9 zp\u016fsoby, jak vypnout sd\u00edlen\u00ed soubor\u016f v z\u00e1vislosti na za\u0159\u00edzen\u00ed, kter\u00e9 pou\u017e\u00edv\u00e1te.<\/p>\n<h3 id=\"things-to-know\">D\u016fle\u017eit\u00e9 \u00favahy<\/h3>\n<ul>\n<li>Pou\u017e\u00edv\u00e1n\u00ed mobiln\u00edch dat je bezpe\u010dnou alternativou k ve\u0159ejn\u00e9 Wi-Fi, kter\u00e1 pom\u00e1h\u00e1 vyhnout se bezpe\u010dnostn\u00edm rizik\u016fm. Pokud se va\u0161e za\u0159\u00edzen\u00ed spol\u00e9h\u00e1 pouze na Wi-Fi, zva\u017ete vytvo\u0159en\u00ed hotspotu na va\u0161em mobiln\u00edm telefonu.<\/li>\n<li>P\u0159ed p\u0159ipojen\u00edm k ve\u0159ejn\u00e9 s\u00edti vyma\u017ete historii a mezipam\u011b\u0165 prohl\u00ed\u017ee\u010de jako dal\u0161\u00ed bezpe\u010dnostn\u00ed opat\u0159en\u00ed.<\/li>\n<li>Pokud je na va\u0161em za\u0159\u00edzen\u00ed povoleno Bluetooth, vypn\u011bte jej p\u0159ed p\u0159ipojen\u00edm k ve\u0159ejn\u00e9 s\u00edti Wi-Fi, abyste zabr\u00e1nili neopr\u00e1vn\u011bn\u00e9mu p\u0159\u00edstupu.<\/li>\n<li>Po odpojen\u00ed od ve\u0159ejn\u00e9 s\u00edt\u011b Wi-Fi vyhledejte v za\u0159\u00edzen\u00ed malware, odstra\u0148te v\u0161echny nezn\u00e1m\u00e9 s\u00edt\u011b a restartujte za\u0159\u00edzen\u00ed.<\/li>\n<\/ul>\n<p><a class=\"xiaomi\" href=\"https:\/\/allthings.how\/why-is-public-wi-fi-risky-and-how-to-protect-yourself-when-connecting-to-it\/\" rel=\"noopener norefferer nofollow\" target=\"_blank\">Zdroj<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ve\u0159ejn\u00e9 Wi-Fi nab\u00edz\u00ed bezkonkuren\u010dn\u00ed pohodl\u00ed a umo\u017e\u0148uje v\u00e1m p\u0159ipojit se k internetu na r\u016fzn\u00fdch m\u00edstech, jako jsou leti\u0161t\u011b, kav\u00e1rny a hotely. Vyu\u017eit\u00ed t\u011bchto s\u00edt\u00ed v\u0161ak vystavuje va\u0161e za\u0159\u00edzen\u00ed \u010detn\u00fdm bezpe\u010dnostn\u00edm hrozb\u00e1m, p\u0159i\u010dem\u017e hackov\u00e1n\u00ed je v\u00fdznamn\u00fdm probl\u00e9mem. Absence robustn\u00edch bezpe\u010dnostn\u00edch protokol\u016f na ve\u0159ejn\u00fdch Wi-Fi usnad\u0148uje kyberzlo\u010dinc\u016fm proniknout do p\u0159ipojen\u00fdch za\u0159\u00edzen\u00ed. V d\u016fsledku toho \u00fato\u010dn\u00edci vyu\u017e\u00edvaj\u00ed tyto [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[126,43],"class_list":["post-4617","post","type-post","status-publish","format-standard","hentry","category-how-to","tag-microsoft","tag-privacy"],"acf":[],"_links":{"self":[{"href":"https:\/\/howtogeek.blog\/cs\/wp-json\/wp\/v2\/posts\/4617","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/howtogeek.blog\/cs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/howtogeek.blog\/cs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/howtogeek.blog\/cs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/howtogeek.blog\/cs\/wp-json\/wp\/v2\/comments?post=4617"}],"version-history":[{"count":1,"href":"https:\/\/howtogeek.blog\/cs\/wp-json\/wp\/v2\/posts\/4617\/revisions"}],"predecessor-version":[{"id":4618,"href":"https:\/\/howtogeek.blog\/cs\/wp-json\/wp\/v2\/posts\/4617\/revisions\/4618"}],"wp:attachment":[{"href":"https:\/\/howtogeek.blog\/cs\/wp-json\/wp\/v2\/media?parent=4617"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/howtogeek.blog\/cs\/wp-json\/wp\/v2\/categories?post=4617"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/howtogeek.blog\/cs\/wp-json\/wp\/v2\/tags?post=4617"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}