{"id":878,"date":"2018-12-04T15:20:00","date_gmt":"2018-12-04T14:20:00","guid":{"rendered":"http:\/\/www2.diitet.cnr.it\/?p=878"},"modified":"2018-12-18T15:48:39","modified_gmt":"2018-12-18T14:48:39","slug":"cyber-security","status":"publish","type":"post","link":"https:\/\/www.diitet.cnr.it\/en\/cyber-security\/","title":{"rendered":"Cyber Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"878\" class=\"elementor elementor-878 elementor-bc-flex-widget\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-766f457 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"766f457\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-057f428\" data-id=\"057f428\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9a23a05 elementor-widget elementor-widget-html\" data-id=\"9a23a05\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<strong><u>Objective:<\/u><\/strong> prevention, detection and reaction to cyber-attacks. The needed effort is huge because 1) citizens\u2019 everyday life relies on cyber systems, e.g. energy distribution, and healthcare, and their failures can affect millions of people 2) attacks can be caused by people thousands of kilometers far from the affected area 3) one of the main sources of data helping cyber attackers is the people\u2019s unaware digital behavior. \r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e3db475 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e3db475\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2d86721\" data-id=\"2d86721\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4d2b8ee elementor-widget elementor-widget-html\" data-id=\"4d2b8ee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<strong><u>Approach:<\/u><\/strong> The CNR Project Area Cyber Security fully covers all the above issues by addressing the following topics: (1) Cyber-Physical Systems (CPS) where cyber-attacks may lead to injuries to human beings and loss of lives. (2) Network security i.e. Slow Denial-of-Service (DoS) attacks and monitoring\u00a0 TOR (The Onion Router) WEB network for illegal activities. (3) Intrusion Detection and Protection by means of the measure of (abnormal) power consumption. (4) Privacy risk assessment and privacy-by-design to guarantee high protection of personal data to enable (big) data analytics. (5) Information Sharing and Analytics (ISHA): ma- chine learning, artificial intelligence and data analytics tech- niques to make sense of large amounts of data. (6) Cyber-intelli- gence on Social Media: gathering and analyzing data from Social Media for Intelligence purposes. (7) Secure Software Engineering assures integrated approaches during all the development cycle of software-intensive systems. (8) Access Control and Trust Man- agement are among the most important security tools. (9) Cryp- tography: reliable, efficient implementations of state-of-the-art\u00a0 algorithms and protocols as well as high-performance code breaking platforms. (10) Cloud Security to protect data and re-sources stored and shared on the Cloud, and the business or re- search process that outsourced to the Cloud. (11) Cyber insur- ance is a new domain: damages caused by targeted attacks\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1b5e8bf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1b5e8bf\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-61b5f7f\" data-id=\"61b5f7f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7baf837 elementor-widget elementor-widget-html\" data-id=\"7baf837\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<strong><u>Scientific Impact\/Results:<\/u><\/strong> The current research activities and proposed approaches are showing good results from the theoretical and practical point of view, with successful publications and collaborations with national and international industrial partners, and public bodies. On the one side this shows that the right way has been taken, but also that more resources and effort are needed to provide adequate solutions in a world where cybersecurity is perceived as a major challenge by both citizens and institutions, and rightly so.\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b0721e6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b0721e6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-df8a0d0\" data-id=\"df8a0d0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7156313 elementor-widget elementor-widget-image\" data-id=\"7156313\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"536\" height=\"327\" src=\"https:\/\/www.diitet.cnr.it\/wp-content\/uploads\/2018\/10\/Immagine1-2.png\" class=\"attachment-large size-large wp-image-1611\" alt=\"\" srcset=\"https:\/\/www.diitet.cnr.it\/wp-content\/uploads\/2018\/10\/Immagine1-2.png 536w, https:\/\/www.diitet.cnr.it\/wp-content\/uploads\/2018\/10\/Immagine1-2-300x183.png 300w, https:\/\/www.diitet.cnr.it\/wp-content\/uploads\/2018\/10\/Immagine1-2-328x200.png 328w\" sizes=\"(max-width: 536px) 100vw, 536px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1a6dc3e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1a6dc3e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-38aa125\" data-id=\"38aa125\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-351440e elementor-widget elementor-widget-html\" data-id=\"351440e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p>\n    <strong>Download:<\/strong>\n    <ul>\n        <li><a href=\"..\/wp-content\/uploads\/2018\/12\/AP5-Cyber-Security_completa.pdf\" target=\"_blank\" rel=\"nereferrer noopener\">White Paper<\/a><\/li>\n        <li><a href=\"..\/wp-content\/uploads\/2018\/12\/Area-Progettuale-Cyber-Security-Quad-Chart.pdf\" target=\"_blank\" rel=\"nereferrer noopener\">Quad Chart<\/a><\/li>\n        <li><a href=\"..\/wp-content\/uploads\/2018\/12\/Slides_AP_Cyber_Security.pdf\" target=\"_blank\" rel=\"nereferrer noopener\">Slide<\/a><\/li>\n    <\/ul>\n<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Objective: prevention, detection and reaction to cyber-attacks. The needed effort is huge because 1) citizens\u2019 everyday life relies on cyber systems, e.g. energy distribution, and healthcare, and their failures can affect millions of people 2) attacks can be caused by people thousands of kilometers far from the affected area 3) &hellip;<\/p>\n","protected":false},"author":1,"featured_media":921,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[16],"tags":[],"class_list":["post-878","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-aree-progettuali"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Security - Engineering, ICT and Technologies for Energy and Transportation Department<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.diitet.cnr.it\/cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security - Engineering, ICT and Technologies for Energy and Transportation Department\" \/>\n<meta property=\"og:description\" content=\"Objective: prevention, detection and reaction to cyber-attacks. The needed effort is huge because 1) citizens\u2019 everyday life relies on cyber systems, e.g. energy distribution, and healthcare, and their failures can affect millions of people 2) attacks can be caused by people thousands of kilometers far from the affected area 3) &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.diitet.cnr.it\/cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Engineering, ICT and Technologies for Energy and Transportation Department\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CNR-Diitet-346662776118715\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-12-04T14:20:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-12-18T14:48:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.diitet.cnr.it\/wp-content\/uploads\/2018\/10\/markus-spiske-666905-unsplash-1024x683.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"silvano.rubeo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CNR_DIITET\" \/>\n<meta name=\"twitter:site\" content=\"@CNR_DIITET\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"silvano.rubeo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.diitet.cnr.it\\\/cyber-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.diitet.cnr.it\\\/cyber-security\\\/\"},\"author\":{\"name\":\"silvano.rubeo\",\"@id\":\"https:\\\/\\\/www.diitet.cnr.it\\\/#\\\/schema\\\/person\\\/6cfecbbdb11b48c588b54558f617bbac\"},\"headline\":\"Cyber Security\",\"datePublished\":\"2018-12-04T14:20:00+00:00\",\"dateModified\":\"2018-12-18T14:48:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.diitet.cnr.it\\\/cyber-security\\\/\"},\"wordCount\":356,\"publisher\":{\"@id\":\"https:\\\/\\\/www.diitet.cnr.it\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.diitet.cnr.it\\\/cyber-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.diitet.cnr.it\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/markus-spiske-666905-unsplash.jpg\",\"articleSection\":[\"Project Areas\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.diitet.cnr.it\\\/cyber-security\\\/\",\"url\":\"https:\\\/\\\/www.diitet.cnr.it\\\/cyber-security\\\/\",\"name\":\"Cyber Security - Engineering, ICT and Technologies for Energy and Transportation Department\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.diitet.cnr.it\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.diitet.cnr.it\\\/cyber-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.diitet.cnr.it\\\/cyber-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.diitet.cnr.it\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/markus-spiske-666905-unsplash.jpg\",\"datePublished\":\"2018-12-04T14:20:00+00:00\",\"dateModified\":\"2018-12-18T14:48:39+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.diitet.cnr.it\\\/cyber-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.diitet.cnr.it\\\/cyber-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.diitet.cnr.it\\\/cyber-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.diitet.cnr.it\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/markus-spiske-666905-unsplash.jpg\",\"contentUrl\":\"https:\\\/\\\/www.diitet.cnr.it\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/markus-spiske-666905-unsplash.jpg\",\"width\":5760,\"height\":3840,\"caption\":\"Photo by Markus Spiske on Unsplash\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.diitet.cnr.it\\\/cyber-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.diitet.cnr.it\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.diitet.cnr.it\\\/#website\",\"url\":\"https:\\\/\\\/www.diitet.cnr.it\\\/\",\"name\":\"Dipartimento di Ingegneria, ICT e Tecnologie per l'Energia e i Trasporti\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.diitet.cnr.it\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.diitet.cnr.it\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.diitet.cnr.it\\\/#organization\",\"name\":\"Dipartimento di Ingegneria, ICT e Tecnologie per l'Energia e i Trasporti\",\"url\":\"https:\\\/\\\/www.diitet.cnr.it\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.diitet.cnr.it\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"http:\\\/\\\/www.diitet.cnr.it\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/logo2-low-png.png\",\"contentUrl\":\"http:\\\/\\\/www.diitet.cnr.it\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/logo2-low-png.png\",\"width\":356,\"height\":141,\"caption\":\"Dipartimento di Ingegneria, ICT e Tecnologie per l'Energia e i Trasporti\"},\"image\":{\"@id\":\"https:\\\/\\\/www.diitet.cnr.it\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/CNR-Diitet-346662776118715\\\/\",\"https:\\\/\\\/x.com\\\/CNR_DIITET\",\"https:\\\/\\\/www.instagram.com\\\/cnr_diitet\\\/\",\"https:\\\/\\\/www.youtube.com\\\/results?search_query=diitet\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.diitet.cnr.it\\\/#\\\/schema\\\/person\\\/6cfecbbdb11b48c588b54558f617bbac\",\"name\":\"silvano.rubeo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d8f9e3ba96c6a4476bc4690c0c70a942b22395839b17d5769afb1932fb2da767?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d8f9e3ba96c6a4476bc4690c0c70a942b22395839b17d5769afb1932fb2da767?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d8f9e3ba96c6a4476bc4690c0c70a942b22395839b17d5769afb1932fb2da767?s=96&d=mm&r=g\",\"caption\":\"silvano.rubeo\"},\"url\":\"https:\\\/\\\/www.diitet.cnr.it\\\/en\\\/author\\\/silvano-rubeo\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security - Engineering, ICT and Technologies for Energy and Transportation Department","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.diitet.cnr.it\/cyber-security\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Security - Engineering, ICT and Technologies for Energy and Transportation Department","og_description":"Objective: prevention, detection and reaction to cyber-attacks. The needed effort is huge because 1) citizens\u2019 everyday life relies on cyber systems, e.g. energy distribution, and healthcare, and their failures can affect millions of people 2) attacks can be caused by people thousands of kilometers far from the affected area 3) &hellip;","og_url":"https:\/\/www.diitet.cnr.it\/cyber-security\/","og_site_name":"Engineering, ICT and Technologies for Energy and Transportation Department","article_publisher":"https:\/\/www.facebook.com\/CNR-Diitet-346662776118715\/","article_published_time":"2018-12-04T14:20:00+00:00","article_modified_time":"2018-12-18T14:48:39+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/www.diitet.cnr.it\/wp-content\/uploads\/2018\/10\/markus-spiske-666905-unsplash-1024x683.jpg","type":"image\/jpeg"}],"author":"silvano.rubeo","twitter_card":"summary_large_image","twitter_creator":"@CNR_DIITET","twitter_site":"@CNR_DIITET","twitter_misc":{"Written by":"silvano.rubeo","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.diitet.cnr.it\/cyber-security\/#article","isPartOf":{"@id":"https:\/\/www.diitet.cnr.it\/cyber-security\/"},"author":{"name":"silvano.rubeo","@id":"https:\/\/www.diitet.cnr.it\/#\/schema\/person\/6cfecbbdb11b48c588b54558f617bbac"},"headline":"Cyber Security","datePublished":"2018-12-04T14:20:00+00:00","dateModified":"2018-12-18T14:48:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.diitet.cnr.it\/cyber-security\/"},"wordCount":356,"publisher":{"@id":"https:\/\/www.diitet.cnr.it\/#organization"},"image":{"@id":"https:\/\/www.diitet.cnr.it\/cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.diitet.cnr.it\/wp-content\/uploads\/2018\/10\/markus-spiske-666905-unsplash.jpg","articleSection":["Project Areas"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.diitet.cnr.it\/cyber-security\/","url":"https:\/\/www.diitet.cnr.it\/cyber-security\/","name":"Cyber Security - Engineering, ICT and Technologies for Energy and Transportation Department","isPartOf":{"@id":"https:\/\/www.diitet.cnr.it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.diitet.cnr.it\/cyber-security\/#primaryimage"},"image":{"@id":"https:\/\/www.diitet.cnr.it\/cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.diitet.cnr.it\/wp-content\/uploads\/2018\/10\/markus-spiske-666905-unsplash.jpg","datePublished":"2018-12-04T14:20:00+00:00","dateModified":"2018-12-18T14:48:39+00:00","breadcrumb":{"@id":"https:\/\/www.diitet.cnr.it\/cyber-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.diitet.cnr.it\/cyber-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.diitet.cnr.it\/cyber-security\/#primaryimage","url":"https:\/\/www.diitet.cnr.it\/wp-content\/uploads\/2018\/10\/markus-spiske-666905-unsplash.jpg","contentUrl":"https:\/\/www.diitet.cnr.it\/wp-content\/uploads\/2018\/10\/markus-spiske-666905-unsplash.jpg","width":5760,"height":3840,"caption":"Photo by Markus Spiske on Unsplash"},{"@type":"BreadcrumbList","@id":"https:\/\/www.diitet.cnr.it\/cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.diitet.cnr.it\/"},{"@type":"ListItem","position":2,"name":"Cyber Security"}]},{"@type":"WebSite","@id":"https:\/\/www.diitet.cnr.it\/#website","url":"https:\/\/www.diitet.cnr.it\/","name":"Dipartimento di Ingegneria, ICT e Tecnologie per l'Energia e i Trasporti","description":"","publisher":{"@id":"https:\/\/www.diitet.cnr.it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.diitet.cnr.it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.diitet.cnr.it\/#organization","name":"Dipartimento di Ingegneria, ICT e Tecnologie per l'Energia e i Trasporti","url":"https:\/\/www.diitet.cnr.it\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.diitet.cnr.it\/#\/schema\/logo\/image\/","url":"http:\/\/www.diitet.cnr.it\/wp-content\/uploads\/2018\/10\/logo2-low-png.png","contentUrl":"http:\/\/www.diitet.cnr.it\/wp-content\/uploads\/2018\/10\/logo2-low-png.png","width":356,"height":141,"caption":"Dipartimento di Ingegneria, ICT e Tecnologie per l'Energia e i Trasporti"},"image":{"@id":"https:\/\/www.diitet.cnr.it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CNR-Diitet-346662776118715\/","https:\/\/x.com\/CNR_DIITET","https:\/\/www.instagram.com\/cnr_diitet\/","https:\/\/www.youtube.com\/results?search_query=diitet"]},{"@type":"Person","@id":"https:\/\/www.diitet.cnr.it\/#\/schema\/person\/6cfecbbdb11b48c588b54558f617bbac","name":"silvano.rubeo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d8f9e3ba96c6a4476bc4690c0c70a942b22395839b17d5769afb1932fb2da767?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d8f9e3ba96c6a4476bc4690c0c70a942b22395839b17d5769afb1932fb2da767?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d8f9e3ba96c6a4476bc4690c0c70a942b22395839b17d5769afb1932fb2da767?s=96&d=mm&r=g","caption":"silvano.rubeo"},"url":"https:\/\/www.diitet.cnr.it\/en\/author\/silvano-rubeo\/"}]}},"_links":{"self":[{"href":"https:\/\/www.diitet.cnr.it\/en\/wp-json\/wp\/v2\/posts\/878","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.diitet.cnr.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.diitet.cnr.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.diitet.cnr.it\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.diitet.cnr.it\/en\/wp-json\/wp\/v2\/comments?post=878"}],"version-history":[{"count":17,"href":"https:\/\/www.diitet.cnr.it\/en\/wp-json\/wp\/v2\/posts\/878\/revisions"}],"predecessor-version":[{"id":3449,"href":"https:\/\/www.diitet.cnr.it\/en\/wp-json\/wp\/v2\/posts\/878\/revisions\/3449"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.diitet.cnr.it\/en\/wp-json\/wp\/v2\/media\/921"}],"wp:attachment":[{"href":"https:\/\/www.diitet.cnr.it\/en\/wp-json\/wp\/v2\/media?parent=878"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.diitet.cnr.it\/en\/wp-json\/wp\/v2\/categories?post=878"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.diitet.cnr.it\/en\/wp-json\/wp\/v2\/tags?post=878"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}