{"version":"1.0","provider_name":"BOIT | Bezpe\u010dnost a ochrana IT","provider_url":"https:\/\/legacy.boit.cz\/en\/","author_name":"Pavel Mat\u011bj\u00ed\u010dek","author_url":"https:\/\/legacy.boit.cz\/en\/author\/spajk\/","title":"The alphabet of cyber security - BOIT | Bezpe\u010dnost a ochrana IT","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"a2e0LNSPix\"><a href=\"https:\/\/legacy.boit.cz\/en\/the-alphabet-of-cyber-security\/\">The alphabet of cyber security<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/legacy.boit.cz\/en\/the-alphabet-of-cyber-security\/embed\/#?secret=a2e0LNSPix\" width=\"600\" height=\"338\" title=\"&#8220;The alphabet of cyber security&#8221; &#8212; BOIT | Bezpe\u010dnost a ochrana IT\" data-secret=\"a2e0LNSPix\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","description":"The alphabet of cyber security The online version of the infographic I&nbsp;created under the title Alphabet of Cybersecurity. This version adds expanded information and links to additional study material on each topic. You can find the original infographic in print quality, for example for a&nbsp;bulletin board, here: Cyber Security Alphabet.png Aa antivirus isneedon computerand on [&hellip;]"}