<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>BOIT | Bezpe&#x10D;nost a ochrana IT</provider_name><provider_url>https://legacy.boit.cz/en/</provider_url><author_name>Pavel Mat&#x11B;j&#xED;&#x10D;ek</author_name><author_url>https://legacy.boit.cz/en/author/spajk/</author_url><title>The alphabet of cyber security - BOIT | Bezpe&#x10D;nost a ochrana IT</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="vaS5bNMyDq"&gt;&lt;a href="https://legacy.boit.cz/en/the-alphabet-of-cyber-security/"&gt;The alphabet of cyber security&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://legacy.boit.cz/en/the-alphabet-of-cyber-security/embed/#?secret=vaS5bNMyDq" width="600" height="338" title="&#x201C;The alphabet of cyber security&#x201D; &#x2014; BOIT | Bezpe&#x10D;nost a ochrana IT" data-secret="vaS5bNMyDq" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
/* ]]&gt; */
&lt;/script&gt;
</html><description>The alphabet of cyber security The online version of the infographic I&nbsp;created under the title Alphabet of Cybersecurity. This version adds expanded information and links to additional study material on each topic. You can find the original infographic in print quality, for example for a&nbsp;bulletin board, here: Cyber Security Alphabet.png Aa antivirus isneedon computerand on [&hellip;]</description></oembed>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Page Caching using Memcache (Requested URI contains query) 
Minified using Disk
Database Caching 16/135 queries in 0.046 seconds using Memcache (Request-wide modification query)

Served from: legacy.boit.cz @ 2026-05-01 17:30:54 by W3 Total Cache
-->