{"id":148,"date":"2019-03-13T12:56:02","date_gmt":"2019-03-13T12:56:02","guid":{"rendered":"https:\/\/daten-schutz-nrw.de\/?page_id=148"},"modified":"2019-11-21T16:31:58","modified_gmt":"2019-11-21T16:31:58","slug":"angriffsszenarien","status":"publish","type":"page","link":"https:\/\/daten-schutz-nrw.de\/index.php\/angriffsszenarien\/","title":{"rendered":"Angriffsszenarien"},"content":{"rendered":"<div  data-id=\"initial-content-section\" data-export-id=\"initial-content-section\" data-label=\"Initial Content\" id=\"initial-content-section\" class=\"content-section content-section-spacing\">\n   <div  class=\"gridContainer\">\n     <div  class=\"row\">\n\n        <div  class=\"col-xs-12 col-sm-12\">                <p ><\/p>\n<p ><strong >In Unserer hochtechnologisierten Gesellschaft gibt es eine Vielzahl an Gefahren f\u00fcr unsere Daten<\/strong><\/p>\n<p ><\/p>\n<p ><\/p>\n<p  class=\"has-text-color has-background has-vivid-red-color has-very-dark-gray-background-color\"> <strong >Intern (Social Hacking, Datenklau, \u2026 &gt; 90% aller F\u00e4lle!)&nbsp;  <\/strong><\/p>\n<p ><\/p>\n<p ><\/p>\n<p  class=\"has-text-color has-background has-vivid-red-color has-very-dark-gray-background-color\"><strong >Trojaner, Phishing, Viren, Erpressung<\/strong><\/p>\n<p ><\/p>\n<p ><\/p>\n<p  class=\"has-text-color has-background has-vivid-red-color has-very-dark-gray-background-color\"><strong >Zero-Day-Exploits<\/strong><\/p>\n<p ><\/p>\n<p ><\/p>\n<p  class=\"has-text-color has-background has-vivid-red-color has-very-dark-gray-background-color\"><strong > Automatisierte Angriffe \/ Hardware-Fehler <\/strong><\/p>\n<p ><\/p>\n<p ><\/p>\n<p  class=\"has-text-color has-background has-vivid-red-color has-very-dark-gray-background-color\"><strong >Reputation <\/strong><\/p>\n<p ><\/p>\n<p ><\/p>\n<p  class=\"has-text-color has-background has-vivid-red-color has-very-dark-gray-background-color\"><strong >Distributed Denial of Service (DDoS) <\/strong><\/p>\n<p ><\/p>\n\n          <\/div>\n      <\/div>\n  <\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>In Unserer hochtechnologisierten Gesellschaft gibt es eine Vielzahl an Gefahren f\u00fcr unsere Daten Intern (Social Hacking, Datenklau, \u2026 &gt; 90% aller F\u00e4lle!)&nbsp; Trojaner, Phishing, Viren, Erpressung Zero-Day-Exploits Automatisierte Angriffe \/ Hardware-Fehler Reputation Distributed Denial of Service (DDoS)<\/p>\n","protected":false},"author":1,"featured_media":153,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"pro\/page-templates\/full-width-page.php","meta":{"footnotes":""},"class_list":["post-148","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Angriffsszenarien - Datenschutz NRW<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/daten-schutz-nrw.de\/index.php\/angriffsszenarien\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Angriffsszenarien - Datenschutz NRW\" \/>\n<meta property=\"og:description\" content=\"In Unserer hochtechnologisierten Gesellschaft gibt es eine Vielzahl an Gefahren f\u00fcr unsere Daten Intern (Social Hacking, Datenklau, \u2026 &gt; 90% aller F\u00e4lle!)&nbsp; Trojaner, Phishing, Viren, Erpressung Zero-Day-Exploits Automatisierte Angriffe \/ Hardware-Fehler Reputation Distributed Denial of Service (DDoS)\" \/>\n<meta property=\"og:url\" content=\"https:\/\/daten-schutz-nrw.de\/index.php\/angriffsszenarien\/\" \/>\n<meta property=\"og:site_name\" content=\"Datenschutz NRW\" \/>\n<meta property=\"article:modified_time\" content=\"2019-11-21T16:31:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/daten-schutz-nrw.de\/wp-content\/uploads\/2019\/03\/anonymous-2755365_1280.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"854\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/daten-schutz-nrw.de\/index.php\/angriffsszenarien\/\",\"url\":\"https:\/\/daten-schutz-nrw.de\/index.php\/angriffsszenarien\/\",\"name\":\"Angriffsszenarien - Datenschutz NRW\",\"isPartOf\":{\"@id\":\"https:\/\/daten-schutz-nrw.de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/daten-schutz-nrw.de\/index.php\/angriffsszenarien\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/daten-schutz-nrw.de\/index.php\/angriffsszenarien\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/daten-schutz-nrw.de\/wp-content\/uploads\/2019\/03\/anonymous-2755365_1280.jpg\",\"datePublished\":\"2019-03-13T12:56:02+00:00\",\"dateModified\":\"2019-11-21T16:31:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/daten-schutz-nrw.de\/index.php\/angriffsszenarien\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/daten-schutz-nrw.de\/index.php\/angriffsszenarien\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/daten-schutz-nrw.de\/index.php\/angriffsszenarien\/#primaryimage\",\"url\":\"https:\/\/daten-schutz-nrw.de\/wp-content\/uploads\/2019\/03\/anonymous-2755365_1280.jpg\",\"contentUrl\":\"https:\/\/daten-schutz-nrw.de\/wp-content\/uploads\/2019\/03\/anonymous-2755365_1280.jpg\",\"width\":1280,\"height\":854},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/daten-schutz-nrw.de\/index.php\/angriffsszenarien\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/daten-schutz-nrw.de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Angriffsszenarien\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/daten-schutz-nrw.de\/#website\",\"url\":\"https:\/\/daten-schutz-nrw.de\/\",\"name\":\"Datenschutz NRW\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/daten-schutz-nrw.de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/daten-schutz-nrw.de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/daten-schutz-nrw.de\/#organization\",\"name\":\"Daten Schutz NRW\",\"url\":\"https:\/\/daten-schutz-nrw.de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/daten-schutz-nrw.de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/daten-schutz-nrw.de\/wp-content\/uploads\/2019\/03\/businessman-2606502.jpg\",\"contentUrl\":\"https:\/\/daten-schutz-nrw.de\/wp-content\/uploads\/2019\/03\/businessman-2606502.jpg\",\"width\":4200,\"height\":1813,\"caption\":\"Daten Schutz NRW\"},\"image\":{\"@id\":\"https:\/\/daten-schutz-nrw.de\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Angriffsszenarien - Datenschutz NRW","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/daten-schutz-nrw.de\/index.php\/angriffsszenarien\/","og_locale":"de_DE","og_type":"article","og_title":"Angriffsszenarien - Datenschutz NRW","og_description":"In Unserer hochtechnologisierten Gesellschaft gibt es eine Vielzahl an Gefahren f\u00fcr unsere Daten Intern (Social Hacking, Datenklau, \u2026 &gt; 90% aller F\u00e4lle!)&nbsp; Trojaner, Phishing, Viren, Erpressung Zero-Day-Exploits Automatisierte Angriffe \/ Hardware-Fehler Reputation Distributed Denial of Service (DDoS)","og_url":"https:\/\/daten-schutz-nrw.de\/index.php\/angriffsszenarien\/","og_site_name":"Datenschutz NRW","article_modified_time":"2019-11-21T16:31:58+00:00","og_image":[{"width":1280,"height":854,"url":"https:\/\/daten-schutz-nrw.de\/wp-content\/uploads\/2019\/03\/anonymous-2755365_1280.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/daten-schutz-nrw.de\/index.php\/angriffsszenarien\/","url":"https:\/\/daten-schutz-nrw.de\/index.php\/angriffsszenarien\/","name":"Angriffsszenarien - Datenschutz NRW","isPartOf":{"@id":"https:\/\/daten-schutz-nrw.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/daten-schutz-nrw.de\/index.php\/angriffsszenarien\/#primaryimage"},"image":{"@id":"https:\/\/daten-schutz-nrw.de\/index.php\/angriffsszenarien\/#primaryimage"},"thumbnailUrl":"https:\/\/daten-schutz-nrw.de\/wp-content\/uploads\/2019\/03\/anonymous-2755365_1280.jpg","datePublished":"2019-03-13T12:56:02+00:00","dateModified":"2019-11-21T16:31:58+00:00","breadcrumb":{"@id":"https:\/\/daten-schutz-nrw.de\/index.php\/angriffsszenarien\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/daten-schutz-nrw.de\/index.php\/angriffsszenarien\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/daten-schutz-nrw.de\/index.php\/angriffsszenarien\/#primaryimage","url":"https:\/\/daten-schutz-nrw.de\/wp-content\/uploads\/2019\/03\/anonymous-2755365_1280.jpg","contentUrl":"https:\/\/daten-schutz-nrw.de\/wp-content\/uploads\/2019\/03\/anonymous-2755365_1280.jpg","width":1280,"height":854},{"@type":"BreadcrumbList","@id":"https:\/\/daten-schutz-nrw.de\/index.php\/angriffsszenarien\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/daten-schutz-nrw.de\/"},{"@type":"ListItem","position":2,"name":"Angriffsszenarien"}]},{"@type":"WebSite","@id":"https:\/\/daten-schutz-nrw.de\/#website","url":"https:\/\/daten-schutz-nrw.de\/","name":"Datenschutz NRW","description":"","publisher":{"@id":"https:\/\/daten-schutz-nrw.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/daten-schutz-nrw.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/daten-schutz-nrw.de\/#organization","name":"Daten Schutz NRW","url":"https:\/\/daten-schutz-nrw.de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/daten-schutz-nrw.de\/#\/schema\/logo\/image\/","url":"https:\/\/daten-schutz-nrw.de\/wp-content\/uploads\/2019\/03\/businessman-2606502.jpg","contentUrl":"https:\/\/daten-schutz-nrw.de\/wp-content\/uploads\/2019\/03\/businessman-2606502.jpg","width":4200,"height":1813,"caption":"Daten Schutz NRW"},"image":{"@id":"https:\/\/daten-schutz-nrw.de\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/daten-schutz-nrw.de\/index.php\/wp-json\/wp\/v2\/pages\/148","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/daten-schutz-nrw.de\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/daten-schutz-nrw.de\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/daten-schutz-nrw.de\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/daten-schutz-nrw.de\/index.php\/wp-json\/wp\/v2\/comments?post=148"}],"version-history":[{"count":5,"href":"https:\/\/daten-schutz-nrw.de\/index.php\/wp-json\/wp\/v2\/pages\/148\/revisions"}],"predecessor-version":[{"id":187,"href":"https:\/\/daten-schutz-nrw.de\/index.php\/wp-json\/wp\/v2\/pages\/148\/revisions\/187"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/daten-schutz-nrw.de\/index.php\/wp-json\/wp\/v2\/media\/153"}],"wp:attachment":[{"href":"https:\/\/daten-schutz-nrw.de\/index.php\/wp-json\/wp\/v2\/media?parent=148"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}