{"id":1668,"date":"2023-04-07T14:07:26","date_gmt":"2023-04-07T14:07:26","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1668"},"modified":"2023-04-07T14:07:26","modified_gmt":"2023-04-07T14:07:26","slug":"securitatea-cibernetica-si-impactul-ei-astazi","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ro\/securitate-cibernetica\/securitatea-cibernetica-si-impactul-ei-astazi\/","title":{"rendered":"Securitatea cibernetic\u0103 \u0219i impactul acesteia \u00een prezent"},"content":{"rendered":"<p>Pe m\u0103sur\u0103 ce tehnologia de calcul avanseaz\u0103, au fost f\u0103cute diverse \u00eencerc\u0103ri de a exploata defectele \u0219i vulnerabilit\u0103\u021bile de securitate. Odat\u0103 cu extinderea internetului \u0219i a lumii noastre din ce \u00een ce mai conectate, unde majoritatea indivizilor din \u021b\u0103rile dezvoltate de\u021bin mai multe dispozitive conectate la internet, atacurile cibernetice au cunoscut o cre\u0219tere semnificativ\u0103.<\/p>\n\n\n\n<p>Un exemplu principal este cre\u0219terea atacurilor cibernetice bazate pe web, care au crescut cu aproape 6.000%, ajung\u00e2nd la peste 1,4 miliarde de cazuri \u00een 2022. Aceast\u0103 cifr\u0103 subliniaz\u0103 importan\u021ba unei gestion\u0103ri eficiente a securit\u0103\u021bii cibernetice \u00een abordarea consecin\u021belor poten\u021bial severe, cum ar fi pierderile economice substan\u021biale.<\/p>\n\n\n\n<p>H2 \u2013 Este posibil\u0103 securitatea cibernetic\u0103 complet\u0103?<\/p>\n\n\n\n<p>Securitatea absolut\u0103 nu exist\u0103 nici \u00een lumea fizic\u0103, nici \u00een cea virtual\u0103. Cu toate acestea, este posibil\u0103 minimizarea riscurilor \u0219i a \u0219anselor ca o amenin\u021bare cibernetic\u0103 s\u0103 se materializeze \u0219i s\u0103 cauzeze daune sistemelor informatice \u0219i informa\u021biilor valoroase pe care le genereaz\u0103 \u0219i le stocheaz\u0103.<\/p>\n\n\n\n<p>\u201cVulnerabilitate\u201d se refer\u0103 la sl\u0103biciunile \u0219i lacunele \u00een protec\u021bie care permit materializarea unei amenin\u021b\u0103ri cibernetice, rezult\u00e2nd \u00een impacturi negative asupra unui sistem informatic. De exemplu, protec\u021bia inadecvat\u0103 \u00eempotriva incendiilor sau un sistem de parole slab pentru sistemul informatic al unei organiza\u021bii ar constitui vulnerabilit\u0103\u021bi. Probabilitatea ca aceste vulnerabilit\u0103\u021bi s\u0103 fie exploatate este cunoscut\u0103 sub numele de \u201crisc\u201d. \u00cen esen\u021b\u0103, securitatea cibernetic\u0103 se concentreaz\u0103 pe reducerea riscurilor \u00een domeniul digital.<\/p>\n\n\n\n<p>Pandemia Covid-19 a creat un mediu provocator pentru multe afaceri, beneficiind unele sectoare \u00een timp ce dezavantajeaz\u0103 altele. Conform articolului PriceWaterhouseCoopers\u2019 (PwC), \u201cViitorul Serviciilor Financiare\u201d (2020), pandemia a accelerat tendin\u021bele c\u0103tre comer\u021bul electronic \u00een serviciile financiare. Aceast\u0103 dezvoltare a fost pozitiv\u0103 pentru sectorul logistic \u0219i industriile de pl\u0103\u021bi contactless\/mobile, dar negativ\u0103 pentru v\u00e2nz\u0103rile cu am\u0103nuntul. Pe m\u0103sur\u0103 ce tranzac\u021biile pe internet cresc, la fel cresc \u0219i ratele criminalit\u0103\u021bii cibernetice \u0219i ale amenin\u021b\u0103rilor cibernetice.<\/p>\n\n\n\n<p>\u2019Global Economic Crime and Fraud Survey\u201c (2020) al PriceWaterhouseCoopers demonstreaz\u0103 c\u0103 frauda, escrocheriile clien\u021bilor \u0219i criminalitatea cibernetic\u0103 au \u00eenregistrat cele mai semnificative cre\u0219teri, criminalitatea cibernetic\u0103 reprezent\u00e2nd 34% din frecven\u021ba total\u0103. Raportul mai dezv\u0103luie c\u0103 \u201daproape 47% dintre responden\u021bii sondajului au experimentat o form\u0103 de fraud\u0103 \u00een ultimele 24 de luni, marc\u00e2nd al doilea cel mai \u00eenalt nivel de incidente de securitate din ultimii dou\u0103zeci de ani.\u201c<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"tools-for-the-analysis-and-detection-of-malware\"><strong>Instrumente pentru analiza \u0219i detectarea Malware-ului<\/strong><\/h2>\n\n\n<p>\u201cMalware\u201d se refer\u0103 la orice software care provoac\u0103 r\u0103u sau daune unui utilizator, dispozitiv sau re\u021bea, lu\u00e2nd diverse forme, cum ar fi Troieni, viru\u0219i, viermi, rootkit-uri sau spyware. \u00cen consecin\u021b\u0103, instrumentele de analiz\u0103 trebuie s\u0103 fie suficient de versatile pentru a detecta malware-ul, a evalua daunele provocate \u0219i a identifica orice alte fi\u0219iere afectate.<\/p>\n\n\n\n<p>Odat\u0103 ce un fi\u0219ier mali\u021bios este localizat \u0219i identificat, acesta este ad\u0103ugat \u00eentr-o baz\u0103 de date de semn\u0103turi malware pentru a preveni infiltrarea viitoare \u00een re\u021bea sau dispozitiv. Exist\u0103 dou\u0103 metode principale de a efectua analiza malware: static\u0103 \u0219i dinamic\u0103. Vom oferi detalii despre ambele abord\u0103ri.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"static-analysis\"><strong>Analiza Static\u0103<\/strong><\/h2>\n\n\n<p>Analiza static\u0103 este procesul de inspectare a unui fi\u0219ier pentru a ob\u021bine informa\u021bii despre structura \u0219i func\u021bionalitatea sa f\u0103r\u0103 a-l executa. Aceast\u0103 abordare este mai fundamental\u0103 \u0219i mai sigur\u0103, deoarece evit\u0103 rularea oric\u0103rui cod poten\u021bial d\u0103un\u0103tor. Totu\u0219i, este mai pu\u021bin eficient\u0103 \u00een tratarea fi\u0219ierelor malware obfuscate. Tehnica prevalent\u0103 pentru detectarea malware-ului implic\u0103 utilizarea semn\u0103turilor. C\u00e2nd un fi\u0219ier suspect intr\u0103 \u00eentr-un sistem, hash-ul s\u0103u este produs \u0219i comparat cu o baz\u0103 de date de semn\u0103turi malware cunoscute. Dezavantajul acestei abord\u0103ri este c\u0103 creatorii de malware pot modifica cu u\u0219urin\u021b\u0103 codul lor, ceea ce le permite s\u0103 eludeze aceast\u0103 form\u0103 de analiz\u0103.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"dynamic-analysis\"><strong>Analiza Dinamic\u0103<\/strong><\/h2>\n\n\n<p>Aceast\u0103 analiz\u0103 permite observarea comportamentului malware-ului \u00een timpul execu\u021biei sistemului \u0219i detectarea \u0219i operarea malware-ului. Analiza dinamic\u0103 a malware-ului necesit\u0103 un mediu sigur \u00een care fi\u0219ierele mali\u021bioase pot fi executate \u00een siguran\u021b\u0103 f\u0103r\u0103 a provoca daune dispozitivului sau re\u021belei. Ca rezultat, aceste analize sunt de obicei efectuate \u00een ma\u0219ini virtuale cunoscute sub numele de sandbox-uri, care au software preinstalat pentru examinarea malware-ului \u0219i creeaz\u0103 re\u021bele virtuale pentru a observa interac\u021biunile malware-ului.<\/p>\n\n\n\n<p>Instrumente de analiz\u0103 a malware-ului \u00een 2023:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Yara<\/strong>: O aplica\u021bie cross-platform pentru sistemele Windows, Linux \u0219i macOS, Yara ajut\u0103 la identificarea \u0219i clasificarea poten\u021bialelor familii de malware. <a href=\"https:\/\/www.varonis.com\/blog\/yara-rules\" target=\"_blank\" rel=\"noreferrer noopener\">Func\u021bioneaz\u0103 cu fi\u0219iere binare sau textuale<\/a> informa\u021bii stocate \u00een reguli, determin\u00e2nd dac\u0103 un fi\u0219ier apar\u021bine unei clase specifice. Fiecare regul\u0103 are dou\u0103 cuvinte cheie: \u201c<strong>\u0219iruri<\/strong>\u201d (secven\u021bele stabilite pe care YARA le caut\u0103 \u00een binar) \u0219i \u201c<strong>condi\u021bie<\/strong>\u201d (criteriile specificate pentru detectare).<\/li>\n\n\n\n<li><strong>Metascan<\/strong>: Un instrument online gratuit de analiz\u0103 a malware-ului, Metascan scaneaz\u0103 fi\u0219ierele folosind mai multe motoare de analiz\u0103 \u0219i ofer\u0103 un API Java. Este necesar\u0103 o parol\u0103, ob\u021binut\u0103 la \u00eenregistrarea pe <a href=\"https:\/\/portal.opswat.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">portalul OPSWAT<\/a>, . Permite 1500 de cereri de c\u0103utare hash \u0219i 25 de cereri de analiz\u0103 a fi\u0219ierelor pe or\u0103.<\/li>\n\n\n\n<li><strong>Cuckoo<\/strong>: O aplica\u021bie gratuit\u0103, open-source care automatizeaz\u0103 analiza dinamic\u0103 a malware-ului,<a href=\"https:\/\/cuckoosandbox.org\/\" target=\"_blank\" rel=\"noreferrer noopener\"> Cuckoo ac\u021bioneaz\u0103 ca un sandbox<\/a> care ruleaz\u0103 \u0219i analizeaz\u0103 fi\u0219ierele \u00een timp real. Cuprinde software central care gestioneaz\u0103 execu\u021bia \u0219i analiza fi\u0219ierelor \u00een ma\u0219ini virtuale izolate, cu o ma\u0219in\u0103 gazd\u0103 \u0219i mai multe ma\u0219ini oaspete care ruleaz\u0103 fi\u0219iere. Gazda gestioneaz\u0103 \u00eentregul proces de analiz\u0103 \u00een timp ce deleg\u0103 \u00een siguran\u021b\u0103 execu\u021bia fi\u0219ierelor fiec\u0103rei oaspete.<\/li>\n\n\n\n<li><strong>Hash Fuzzy<\/strong>: Algoritmii de hashing identific\u0103 unic fi\u0219ierele, dar creatorii de malware pot modifica u\u0219or codul surs\u0103 pentru a evita detectarea. Hashing-ul fuzzy se concentreaz\u0103 pe compararea similarit\u0103\u021bii \u00eentre dou\u0103 fi\u0219iere, permi\u021b\u00e2nd detectarea software-ului care poate fi o modificare a altuia prin compararea hash-urilor fuzzy.<\/li>\n<\/ol>\n\n\n<h2 class=\"wp-block-heading\" id=\"conclusion\"><strong>\u00cen concluzie<\/strong><\/h2>\n\n\n<p>Conceptul de securitate cibernetic\u0103 a c\u00e2\u0219tigat proeminen\u021b\u0103 \u00een societatea contemporan\u0103 al\u0103turi de termeni \u00eenrudi\u021bi precum criminalitatea cibernetic\u0103, terorismul cibernetic \u0219i ap\u0103rarea cibernetic\u0103. \u00cen linii mari, securitatea cibernetic\u0103 implic\u0103 protejarea disponibilit\u0103\u021bii, accesibilit\u0103\u021bii, autenticit\u0103\u021bii, integrit\u0103\u021bii \u0219i confiden\u021bialit\u0103\u021bii datelor stocate sau transmise prin sisteme informatice sau servicii digitale bazate pe web de diverse forme de atac.<\/p>","protected":false},"excerpt":{"rendered":"<p>Pe m\u0103sur\u0103 ce tehnologia informatic\u0103 avanseaz\u0103, au fost f\u0103cute diverse \u00eencerc\u0103ri de exploatare a deficien\u021belor \u0219i vulnerabilit\u0103\u021bilor de securitate. Odat\u0103 cu extinderea internetului \u0219i a lumii noastre din ce \u00een ce mai conectate, \u00een care majoritatea indivizilor din... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ro\/securitate-cibernetica\/securitatea-cibernetica-si-impactul-ei-astazi\/\">Continue reading <span class=\"screen-reader-text\">Securitatea cibernetic\u0103 \u0219i impactul acesteia \u00een prezent<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":1671,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15],"tags":[],"class_list":["post-1668","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity and its impact today | Security Briefing<\/title>\n<meta name=\"description\" content=\"Discover the impacts of cybersecurity on businesses, individuals &amp; governments. Stay informed with Security Briefing&#039;s in-depth analysis.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ro\/securitate-cibernetica\/securitatea-cibernetica-si-impactul-ei-astazi\/\" \/>\n<meta property=\"og:locale\" content=\"ro_RO\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity and its impact today | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Discover the impacts of cybersecurity on businesses, individuals &amp; governments. Stay informed with Security Briefing&#039;s in-depth analysis.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ro\/securitate-cibernetica\/securitatea-cibernetica-si-impactul-ei-astazi\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-07T14:07:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Cybersecurity-and-its-impact-today-banner-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"696\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scris de\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Timp estimat pentru citire\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"Cybersecurity and its impact today\",\"datePublished\":\"2023-04-07T14:07:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/\"},\"wordCount\":852,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Cybersecurity-and-its-impact-today-banner-1.jpg\",\"articleSection\":[\"cybersecurity\"],\"inLanguage\":\"ro-RO\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/\",\"url\":\"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/\",\"name\":\"Cybersecurity and its impact today | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Cybersecurity-and-its-impact-today-banner-1.jpg\",\"datePublished\":\"2023-04-07T14:07:26+00:00\",\"description\":\"Discover the impacts of cybersecurity on businesses, individuals & governments. Stay informed with Security Briefing's in-depth analysis.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#breadcrumb\"},\"inLanguage\":\"ro-RO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Cybersecurity-and-its-impact-today-banner-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Cybersecurity-and-its-impact-today-banner-1.jpg\",\"width\":696,\"height\":300,\"caption\":\"Cybersecurity and its impact today\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity and its impact today\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ro-RO\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/ro\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Securitatea cibernetic\u0103 \u0219i impactul s\u0103u ast\u0103zi | Informare de securitate","description":"Descoperi\u021bi impactul securit\u0103\u021bii cibernetice asupra afacerilor, indivizilor \u0219i guvernelor. R\u0103m\u00e2ne\u021bi informat cu analiza detaliat\u0103 a Security Briefing.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ro\/securitate-cibernetica\/securitatea-cibernetica-si-impactul-ei-astazi\/","og_locale":"ro_RO","og_type":"article","og_title":"Cybersecurity and its impact today | Security Briefing","og_description":"Discover the impacts of cybersecurity on businesses, individuals & governments. Stay informed with Security Briefing's in-depth analysis.","og_url":"https:\/\/securitybriefing.net\/ro\/securitate-cibernetica\/securitatea-cibernetica-si-impactul-ei-astazi\/","og_site_name":"Security Briefing","article_published_time":"2023-04-07T14:07:26+00:00","og_image":[{"width":696,"height":300,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Cybersecurity-and-its-impact-today-banner-1.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"Scris de":"security","Timp estimat pentru citire":"4 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"Cybersecurity and its impact today","datePublished":"2023-04-07T14:07:26+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/"},"wordCount":852,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Cybersecurity-and-its-impact-today-banner-1.jpg","articleSection":["cybersecurity"],"inLanguage":"ro-RO"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/","url":"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/","name":"Securitatea cibernetic\u0103 \u0219i impactul s\u0103u ast\u0103zi | Informare de securitate","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Cybersecurity-and-its-impact-today-banner-1.jpg","datePublished":"2023-04-07T14:07:26+00:00","description":"Descoperi\u021bi impactul securit\u0103\u021bii cibernetice asupra afacerilor, indivizilor \u0219i guvernelor. R\u0103m\u00e2ne\u021bi informat cu analiza detaliat\u0103 a Security Briefing.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#breadcrumb"},"inLanguage":"ro-RO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/"]}]},{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Cybersecurity-and-its-impact-today-banner-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/04\/Cybersecurity-and-its-impact-today-banner-1.jpg","width":696,"height":300,"caption":"Cybersecurity and its impact today"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cybersecurity\/cybersecurity-and-its-impact-today\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity and its impact today"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Informare de Securitate","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ro-RO"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Informare de Securitate","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"securitate","image":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin este redactor senior pentru Government Technology. Anterior a scris pentru PYMNTS \u0219i The Bay State Banner \u0219i de\u021bine o diplom\u0103 de licen\u021b\u0103 \u00een scriere creativ\u0103 de la Carnegie Mellon. Ea locuie\u0219te \u00een afara Bostonului.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/ro\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts\/1668","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/comments?post=1668"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts\/1668\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/media\/1671"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/media?parent=1668"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/categories?post=1668"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/tags?post=1668"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}