{"id":709,"date":"2022-10-05T20:20:36","date_gmt":"2022-10-05T20:20:36","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=709"},"modified":"2022-10-05T20:20:36","modified_gmt":"2022-10-05T20:20:36","slug":"importanta-securitatii-cibernetice","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ro\/securitate-cibernetica\/importanta-securitatii-cibernetice\/","title":{"rendered":"Importan\u021ba securit\u0103\u021bii cibernetice"},"content":{"rendered":"<p>De-a lungul istoriei, cei implica\u021bi \u00een conflicte au folosit \u00eentotdeauna cea mai modern\u0103 tehnologie pentru a-\u0219i avansa cauza \u0219i a atinge obiective specifice. \u00cen fiecare r\u0103zboi, descoperirile au fost folosite pentru a combate inamicii reali sau percepu\u021bi folosind progresele \u0219tiin\u021bifice.<\/p>\n\n\n\n<p>\u00cen zilele noastre, conflictele nu mai sunt limitate la c\u00e2mpurile de lupt\u0103 conven\u021bionale; \u00een schimb, ele pot fi g\u0103site pe internet - un inamic agil \u0219i rapid. Atacatorii cibernetici \u0219tiu c\u0103 civiliza\u021biile noastre se bazeaz\u0103 pe lumea digital\u0103, iar dac\u0103 reu\u0219esc s\u0103 o perturbe \u0219i s\u0103 o destabilizeze, pot ob\u021bine o victorie semnificativ\u0103 cu un singur clic.<\/p>\n\n\n\n<h2><strong>Viermele Stuxnet<\/strong><\/h2>\n\n\n\n<p>Potrivit exper\u021bilor, Stuxnet a avariat numeroase centrifuge de la uzina iranian\u0103 de \u00eembog\u0103\u021bire a uraniului Natanz, prin incendierea acestora. Alte organiza\u021bii au modificat virusul \u00een timp, concentr\u00e2ndu-se pe generatoarele de electricitate, instala\u021biile de tratare a apei \u0219i conductele de gaz.<\/p>\n\n\n\n<p>Stuxnet a fost un virus \u00een mai multe p\u0103r\u021bi care s-a infiltrat \u00een computerele Windows, s-a r\u0103sp\u00e2ndit prin intermediul unit\u0103\u021bilor USB \u0219i a deteriorat sistemele de control industrial. Programul malware a examinat fiecare ma\u0219in\u0103 piratat\u0103 pentru a g\u0103si semne de software Siemens Step 7, pe care ma\u0219inile industriale cu PLC \u00eel folosesc pentru a automatiza \u0219i gestiona echipamentele electromecanice.<\/p>\n\n\n\n<p>Dup\u0103 ce malware-ul a descoperit un computer PLC, a desc\u0103rcat cod nou de pe internet \u0219i a \u00eenceput s\u0103 emit\u0103 instruc\u021biuni maligne c\u0103tre dispozitivul controlat de PC. \u00cen acela\u0219i timp, date frauduloase au fost trimise la sistemul de control. Dac\u0103 nu este verificat, acest lucru ar putea provoca daune serioase.<\/p>\n\n\n\n<p>Potrivit unor surse de informa\u021bii cibernetice, \u00een 2012, Stuxnet a fost desc\u0103rcat \u00een sistemele uzinei de \u00eembog\u0103\u021bire a uraniului Natanz. Malware-ul \"vierme\" s-a infiltrat \u00een re\u021bele \u0219i a vizat ma\u0219inile care rulau software Windows pentru automatizarea \u0219i gestionarea echipamentelor electromecanice.<\/p>\n\n\n\n<p>Odat\u0103 ce virusul a finalizat m\u0103sur\u0103torile de uraniu, a \u00eenceput s\u0103 se distrug\u0103 \u0219i s\u0103 fac\u0103 uraniul inutil.<\/p>\n\n\n\n<p>Obiectivul programului a fost sc\u0103derea calit\u0103\u021bii uraniului, motiv pentru care virusul a vizat mai \u00eent\u00e2i viteza echipamentului centrifugal al instala\u021biei. Aceasta ar fi p\u0103rut apoi normal\u0103 pentru cei care o monitorizau, rezult\u00e2nd o \"stare de echilibru\". Distrugerea uraniului ar fi fost dezv\u0103luit\u0103 doar atunci c\u00e2nd echipamentul instala\u021biei ar fi \u00eenceput s\u0103 se autodistrug\u0103. \u00cen acel moment, Stuxnet \u0219i-ar fi \u00eendeplinit obiectivul.<\/p>\n\n\n\n<p>Dar codul acestui virus a fost f\u0103cut public. De atunci, al\u021bii l-au modificat pentru a viza alte instala\u021bii de infrastructur\u0103, inclusiv sta\u021bii de tratare a apei, conducte de gaz, centrale electrice \u0219i re\u021bele de comunica\u021bii.<\/p>\n\n\n\n<h2><strong>\u00cen \u00eentuneric: Industriile esen\u021biale se confrunt\u0103 cu atacurile cibernetice<\/strong><\/h2>\n\n\n\n<p>\u00cen conformitate cu <a href=\"https:\/\/www.mcafee.com\/blogs\/enterprise\/in-the-dark-crucial-industries-confront-cyberattacks\/\">McAfee<\/a>, \u00een 2011, companiile au recurs la angajarea unor fo\u0219ti hackeri deoarece nu au putut g\u0103si suficiente persoane cu competen\u021bele necesare pentru a-\u0219i proteja re\u021belele. Centrul pentru Studii Strategice \u0219i Interna\u021bionale a eviden\u021biat urm\u0103toarele fapte \u00eengrijor\u0103toare:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Extorcarea este cea mai r\u0103sp\u00e2ndit\u0103 amenin\u021bare informatic\u0103 cu care se confrunt\u0103 industria energetic\u0103 mondial\u0103.<\/li>\n<li>Atacurile cibernetice au vizat aproximativ 80% din corpora\u021biile energetice mexicane.<\/li>\n<li>Mai mult de un sfert din furnizorii mondiali de energie au fost \u0219antaja\u021bi.<\/li>\n<li>60% din companiile energetice din India au fost infiltrate.<\/li>\n<li>\"Duqu\", o variant\u0103 a Stuxnet, a fost g\u0103sit \u00een centrale energetice din opt \u021b\u0103ri.<\/li>\n<\/ul>\n\n\n\n<h2><strong>Lumea digital\u0103 este un c\u00e2mp de lupt\u0103<\/strong><\/h2>\n\n\n\n<p>Din punct de vedere istoric, invadatorii au atacat sursele de ap\u0103 \u0219i hran\u0103 pentru a-\u0219i sl\u0103bi inamicii. \u00cen Al Doilea R\u0103zboi Mondial, de exemplu, au fost distruse utilit\u0103\u021bi \u0219i ora\u0219e industriale pentru a \u00eempiedica efortul de r\u0103zboi al armatelor invadatoare. Aceste metode sunt folosite \u0219i \u00een prezent pentru c\u0103 sunt eficiente; adversarii no\u0219tri ar putea fi la mii de kilometri distan\u021b\u0103, \u00een spatele unor ecrane de computer, dar ar putea lansa atacuri \u00een lumea real\u0103 care ne afecteaz\u0103 totu\u0219i pe to\u021bi.<\/p>\n\n\n\n<p>Suntem \u00een r\u0103zboi \u0219i trebuie s\u0103 ne schimb\u0103m modul de g\u00e2ndire pentru a ne adapta la acest nou c\u00e2mp de lupt\u0103. Oricare dintre noi ar putea fi o \u021bint\u0103. Dac\u0103 vrem s\u0103 ne \u00eenvingem inamicul, trebuie mai \u00eent\u00e2i s\u0103 \u00een\u021belegem noul peisaj \u0219i noile reguli.<\/p>\n\n\n\n<h2><strong>Securitatea cibernetic\u0103 este mai important\u0103 ca niciodat\u0103<\/strong><\/h2>\n\n\n\n<p>Nevoia de securitate cibernetic\u0103 nu a fost niciodat\u0103 mai mare. Odat\u0103 cu apari\u021bia internetului, vie\u021bile noastre au devenit din ce \u00een ce mai dependente de tehnologie. Ne baz\u0103m pe computere pentru orice, de la comunicare la servicii bancare \u0219i divertisment. Dar aceast\u0103 dependen\u021b\u0103 are un pre\u021b. Pe m\u0103sur\u0103 ce via\u021ba noastr\u0103 evolueaz\u0103 online, devenim mai vulnerabili la atacurile cibernetice.<\/p>\n\n\n\n<p>Iar aceste tipuri de amenin\u021b\u0103ri sunt din ce \u00een ce mai frecvente \u0219i mai sofisticate. Hackerii nu se mai mul\u021bumesc s\u0103 ne fure informa\u021biile; ei vor acum s\u0103 ne perturbe via\u021ba \u0219i economia. \u00cen 2017, am asistat la un atac cibernetic major care a paralizat serviciul na\u021bional de s\u0103n\u0103tate din Marea Britanie. Atacul ransomware WannaCry a criptat datele \u0219i a cerut o r\u0103scump\u0103rare pentru returnarea lor. Atacul a provocat perturb\u0103ri pe scar\u0103 larg\u0103 \u0219i a costat NHS milioane de lire sterline.<\/p>\n\n\n\n<p>\u00cen 2018, am asistat la cel mai mare atac cibernetic din istorie. Virusul NotPetya a infectat computere din \u00eentreaga lume, provoc\u00e2nd pagube \u00een valoare de miliarde de dolari. Virusul a criptat datele \u0219i a cerut o r\u0103scump\u0103rare, dar atacatorii nu au reu\u0219it s\u0103 ofere o modalitate de decriptare a datelor. Ca urmare, multe companii au pierdut accesul la datele lor vitale.<\/p>\n\n\n\n<p>Aceste atacuri ne arat\u0103 c\u0103 suntem vulnerabili. Ele ne arat\u0103, de asemenea, c\u0103 abordarea noastr\u0103 actual\u0103 privind securitatea cibernetic\u0103 nu func\u021bioneaz\u0103. Trebuie s\u0103 facem mai mult pentru a ne proteja de atacurile cibernetice.<\/p>\n\n\n\n<p>Putem lua multe m\u0103suri pentru a ne \u00eembun\u0103t\u0103\u021bi securitatea cibernetic\u0103, dar trebuie s\u0103 \u00eencepem cu o schimbare fundamental\u0103 a modului \u00een care g\u00e2ndim despre securitate. \u00cen primul r\u00e2nd, trebuie s\u0103 ne \u00eendep\u0103rt\u0103m de ideea c\u0103 securitatea este ceva ce poate fi realizat doar prin tehnologie. Tehnologia este important\u0103, dar nu este suficient\u0103. De asemenea, trebuie s\u0103 ne schimb\u0103m mentalit\u0103\u021bile.<\/p>\n\n\n\n<h2><strong>\u00cen\u021belegerea amenin\u021b\u0103rii<\/strong><\/h2>\n\n\n\n<p>Primul pas este s\u0103 \u00een\u021belegem amenin\u021barea. Trebuie s\u0103 ne educ\u0103m cu privire la natura amenin\u021b\u0103rii \u0219i la persoanele din spatele acesteia. Trebuie s\u0103 fim con\u0219tien\u021bi de tehnicile pe care le folosesc pentru a ne ataca. \u0218i trebuie s\u0103 \u00een\u021belegem vulnerabilit\u0103\u021bile pe care le exploateaz\u0103.<\/p>\n\n\n\n<h2><strong>S\u0103 ne schimb\u0103m mentalitatea<\/strong><\/h2>\n\n\n\n<p>Al doilea pas este s\u0103 ne schimb\u0103m mentalitatea. Trebuie s\u0103 ne g\u00e2ndim la securitate ca la un proces, nu ca la un produs, \u0219i s\u0103 o \u00eencorpor\u0103m \u00een tot ceea ce facem. Cu alte cuvinte, trebuie s\u0103 fim proactivi, nu reactivi. \u0218i trebuie s\u0103 lucr\u0103m \u00eempreun\u0103 pentru a face lumea noastr\u0103 un loc mai sigur.<\/p>\n\n\n\n<h2><strong>Lua\u021bi m\u0103suri<\/strong><\/h2>\n\n\n\n<p>Al treilea pas este s\u0103 lu\u0103m m\u0103suri. Trebuie s\u0103 punem \u00een aplicare schimb\u0103rile despre care am vorbit \u0219i s\u0103 investim \u00een securitatea cibernetic\u0103 pentru a ne asigura c\u0103 suntem capabili s\u0103 r\u0103spundem rapid \u0219i eficient la amenin\u021b\u0103rile cibernetice.<\/p>\n\n\n\n<h2><strong>Concluzii<\/strong><\/h2>\n\n\n\n<p>Securitatea cibernetic\u0103 este important\u0103 deoarece suntem \u00een r\u0103zboi. Inamicul nostru este agil \u0219i se mi\u0219c\u0103 rapid \u0219i folose\u0219te tehnologia pentru a lansa atacuri la o scar\u0103 pe care nu am mai v\u0103zut-o p\u00e2n\u0103 acum. Trebuie s\u0103 ne schimb\u0103m mentalitatea \u0219i abordarea fa\u021b\u0103 de securitate. \u0218i trebuie s\u0103 lucr\u0103m \u00eempreun\u0103 pentru a face lumea noastr\u0103 un loc mai sigur.<\/p>\n\n\n\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>De-a lungul istoriei, cei implica\u021bi \u00een conflicte au folosit \u00eentotdeauna cele mai moderne tehnologii pentru a-\u0219i promova cauza \u0219i a-\u0219i atinge obiectivele specifice. \u00cen fiecare r\u0103zboi, au fost utilizate descoperiri pentru a combate... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ro\/securitate-cibernetica\/importanta-securitatii-cibernetice\/\">Continue reading <span class=\"screen-reader-text\">Importan\u021ba securit\u0103\u021bii cibernetice<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":998,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15],"tags":[],"class_list":["post-709","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The importance of cyber security | Security Briefing<\/title>\n<meta name=\"description\" content=\"Cybersecurity is more important than ever. Learn why you need to take your online security seriously and how to keep yourself safe.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ro\/securitate-cibernetica\/importanta-securitatii-cibernetice\/\" \/>\n<meta property=\"og:locale\" content=\"ro_RO\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The importance of cyber security | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity is more important than ever. Learn why you need to take your online security seriously and how to keep yourself safe.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ro\/securitate-cibernetica\/importanta-securitatii-cibernetice\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-05T20:20:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/The-importance-of-cyber-security-2-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"558\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scris de\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Timp estimat pentru citire\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"The importance of cyber security\",\"datePublished\":\"2022-10-05T20:20:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/\"},\"wordCount\":1046,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/The-importance-of-cyber-security-2-1.jpg\",\"articleSection\":[\"cybersecurity\"],\"inLanguage\":\"ro-RO\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/\",\"url\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/\",\"name\":\"The importance of cyber security | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/The-importance-of-cyber-security-2-1.jpg\",\"datePublished\":\"2022-10-05T20:20:36+00:00\",\"description\":\"Cybersecurity is more important than ever. Learn why you need to take your online security seriously and how to keep yourself safe.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#breadcrumb\"},\"inLanguage\":\"ro-RO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/The-importance-of-cyber-security-2-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/The-importance-of-cyber-security-2-1.jpg\",\"width\":558,\"height\":500,\"caption\":\"The importance of cyber security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The importance of cyber security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ro-RO\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/ro\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Importan\u021ba securit\u0103\u021bii cibernetice | Informare de securitate","description":"Securitatea cibernetic\u0103 este mai important\u0103 ca niciodat\u0103. Afla\u021bi de ce trebuie s\u0103 v\u0103 lua\u021bi \u00een serios securitatea online \u0219i cum s\u0103 v\u0103 men\u021bine\u021bi \u00een siguran\u021b\u0103.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ro\/securitate-cibernetica\/importanta-securitatii-cibernetice\/","og_locale":"ro_RO","og_type":"article","og_title":"The importance of cyber security | Security Briefing","og_description":"Cybersecurity is more important than ever. Learn why you need to take your online security seriously and how to keep yourself safe.","og_url":"https:\/\/securitybriefing.net\/ro\/securitate-cibernetica\/importanta-securitatii-cibernetice\/","og_site_name":"Security Briefing","article_published_time":"2022-10-05T20:20:36+00:00","og_image":[{"width":558,"height":500,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/The-importance-of-cyber-security-2-1.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"Scris de":"security","Timp estimat pentru citire":"5 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"The importance of cyber security","datePublished":"2022-10-05T20:20:36+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/"},"wordCount":1046,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/The-importance-of-cyber-security-2-1.jpg","articleSection":["cybersecurity"],"inLanguage":"ro-RO"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/","url":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/","name":"Importan\u021ba securit\u0103\u021bii cibernetice | Informare de securitate","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/The-importance-of-cyber-security-2-1.jpg","datePublished":"2022-10-05T20:20:36+00:00","description":"Securitatea cibernetic\u0103 este mai important\u0103 ca niciodat\u0103. Afla\u021bi de ce trebuie s\u0103 v\u0103 lua\u021bi \u00een serios securitatea online \u0219i cum s\u0103 v\u0103 men\u021bine\u021bi \u00een siguran\u021b\u0103.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#breadcrumb"},"inLanguage":"ro-RO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/"]}]},{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/The-importance-of-cyber-security-2-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/10\/The-importance-of-cyber-security-2-1.jpg","width":558,"height":500,"caption":"The importance of cyber security"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cybersecurity\/the-importance-of-cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"The importance of cyber security"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Informare de Securitate","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ro-RO"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Informare de Securitate","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"securitate","image":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin este redactor senior pentru Government Technology. Anterior a scris pentru PYMNTS \u0219i The Bay State Banner \u0219i de\u021bine o diplom\u0103 de licen\u021b\u0103 \u00een scriere creativ\u0103 de la Carnegie Mellon. Ea locuie\u0219te \u00een afara Bostonului.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/ro\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts\/709","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/comments?post=709"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts\/709\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/media\/998"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/media?parent=709"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/categories?post=709"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/tags?post=709"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}