{"id":10796,"date":"2024-03-28T12:45:42","date_gmt":"2024-03-28T11:45:42","guid":{"rendered":"https:\/\/sits.com\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/"},"modified":"2024-11-22T11:32:59","modified_gmt":"2024-11-22T10:32:59","slug":"management-of-cyber-security-risks-in-industrial-iot-and-ot","status":"publish","type":"post","link":"https:\/\/sits.friendventure.dev\/da\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/","title":{"rendered":"H\u00e5ndtering af cybersikkerhedsrisici i industriel IoT og OT"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><p>[vc_row][vc_column]<h1  class=\"h1 smx-headline \">IoT-verdenen udvider sig, og det samme g\u00f8r sikkerhedstruslerne<\/h1>[vc_column_text]IoT er ved at \u00e6ndre forretningsverdenen. Producenter integrerer i stigende grad avancerede teknologier som cloud computing, dataanalyse og AI\/Machine Learning i deres produktionsworkflows. Den potentielle v\u00e6rdi, der skabes af IoT, er allerede enorm og forts\u00e6tter med at stige. McKinsey ansl\u00e5r, at IoT-v\u00e6rdiskabelsen kan n\u00e5 op p\u00e5 12,5 milliarder USD p\u00e5 verdensplan i 2030 (https:\/\/www.mckinsey.com\/de\/news\/presse\/report-internet-der-dinge-iot-wertpotenzial-bis-2030). Is\u00e6r h\u00f8jt specialiserede sektorer oplever i \u00f8jeblikket de st\u00f8rste \u00f8konomiske fordele. Fra applikationer inden for medicinsk teknologi, logistik og transport til l\u00f8sninger til intelligente fabrikker viser IoT vejen for en bredere digital transformation, der genererer, lagrer, analyserer og overf\u00f8rer enorme m\u00e6ngder data p\u00e5 tv\u00e6rs af et stadigt voksende globalt netv\u00e6rk.[\/vc_column_text][vc_column_text]If\u00f8lge Palo Alto Networks er den hurtige udvikling og introduktion af IoT-teknologi allerede ved at transformere forretningsprocesser. IoT-enheder st\u00e5r formentlig allerede for mere end 30 procent af alle enheder i virksomhedens netv\u00e6rk i dag. Dataene indsamlet fra disse enheder giver et v\u00e6ld af v\u00e6rdifuld information, der muligg\u00f8r beslutningstagning i realtid og opbygning af n\u00f8jagtige forudsigelsesmodeller. Derudover er tingenes internet en n\u00f8glemulighed for digital transformation i organisationer og har potentialet til at \u00f8ge medarbejdernes produktivitet, forretningseffektivitet, rentabilitet og forbedre den overordnede arbejdsstyrkeoplevelse.[\/vc_column_text]<div class=\"smx_global_spacer size-s\"><\/div>\n<h2  class=\"h2 smx-headline \">IoT\/OT-sikkerhed bliver stadig vigtigere - ogs\u00e5 for cyberkriminelle<\/h2>[vc_column_text]Bagsiden af medaljen: At forbinde produktionsanl\u00e6g (Operational Technology = OT) med IoT-teknologier og andre avancerede l\u00f8sninger giver nye m\u00e5l for cyberangreb. N\u00e5r alt kommer til alt, skaber milliarder af netv\u00e6rksenheder alle mulige potentielle s\u00e5rbarheder i virksomheder. If\u00f8lge McKinsey har den stigende integration \u00f8get antallet af angrebsvektorer drastisk. F\u00f8r IoT skulle et stort netv\u00e6rk m\u00e5ske tage h\u00f8jde for op til 500.000 s\u00e5rbare endpointsr, mens IoT kan involvere hundreder, tusinder eller endda millioner af endpoints.[\/vc_column_text][vc_column_text]En nylig rapport fra Asimily med titlen \"IoT Device Security in 2024: The High Cost of Doing Nothing\" (https:\/\/asimily.com\/iot-device-security-in-2024-the-high-cost-of-doing-nothing\/) viser, hvor stor truslen ved brugen af IoT-enheder faktisk er. Den analyserer nye angrebs trends rettet mod IoT-infrastrukturer og skitserer mulige konsekvenser for virksomheder, der ikke implementerer tilstr\u00e6kkelige sikkerhedsforanstaltninger. If\u00f8lge rapporten er allerede kendte s\u00e5rbarheder blandt de st\u00f8rste trusler: 34 af de 39 hyppigst anvendte IoT-s\u00e5rbarheder har i gennemsnit v\u00e6ret kendt i mere end tre \u00e5r. Routere st\u00e5r for 75 procent af de inficerede IoT-enheder, da de fungerer som gateways for adgang til andre noder i et netv\u00e6rk. Sikkerhedskameraer, digitale skiltningssystemer, medicinsk udstyr og industrielle kontrolsystemer er ogs\u00e5 blandt de hyppigst angrebne enheder.[\/vc_column_text]<div class=\"smx_global_spacer size-s\"><\/div>\n<h2  class=\"h2 smx-headline \">Risici i forbindelse med brugen af IoT i virksomheder<\/h2>[vc_column_text]Afh\u00e6ngigt af applikationen, udg\u00f8r et sikkerhedsbrud i et industrielt IoT-milj\u00f8 forskellige risici. Det kan medf\u00f8re afsl\u00f8ring af vigtige oplysninger, der er afg\u00f8rende for virksomhedens drift eller fremstillingen af et produkt, over til skader p\u00e5 industrielle kontrolsystemer til kompromittering af fremstillede produkter. Et eksempel: En angriber f\u00e5r adgang til netv\u00e6rket hos en leverand\u00f8r til bilindustrien og manipulerer maskinindstillingerne for en bremsekomponent uden at blive opdaget. Det kan f\u00f8re til, at bremserne pludselig svigter under belastning. B\u00e5de den materielle og immaterielle skade p\u00e5 virksomheden er n\u00e6sten umulig at kvantificere.[\/vc_column_text]<div class=\"smx_global_spacer size-s\"><\/div>\n<h3  class=\"h3 smx-headline \">IoT er udsat for s\u00e5rbarheder<\/h3>[vc_column_text]Industriel IoT-arkitektur henviser til samlingen af alle IoT-elementer i intelligente fabrikker. Selvom det er forskelligt fra virksomhed til virksomhed, omfatter det altid enheder med sensorer og styringsenheder, netv\u00e6rkselementer, databaser, analysev\u00e6rkt\u00f8jer og forretningsapplikationer. Hver komponent udg\u00f8r specifikke sikkerhedsrisici for hele produktionsmilj\u00f8et.<\/p>\n<p>Som Palo Alto Networks forklarer (https:\/\/www.paloaltonetworks.com\/cybersecurity-perspectives\/expanding-iot-visibility), er enhver netv\u00e6rksforbundet IoT-enhed uden robust sikkerhed s\u00e5rbar over for indtr\u00e6ngen, med risiko for kompromittering og kontrol fra ondsindede akt\u00f8rer, der bryder ind i systemet, stj\u00e6ler brugerdata og f\u00e5r systemerne til at g\u00e5 ned. Efterh\u00e5nden som flere og flere forskellige IoT-enheder forbindes til netv\u00e6rket, \u00f8ges angrebsfladen dramatisk. Som f\u00f8lge heraf falder den samlede netv\u00e6rkssikkerhed med hensyn til integritet og beskyttelse af den mindst sikre enhed. Ud over disse udfordringer er 98 procent af al trafik fra IoT-enheder for det meste ukrypteret, hvilket uds\u00e6tter fortrolige data for stor risiko.<\/p>\n<p>Forskellige angreb p\u00e5 industriel IoT har til form\u00e5l at kompromittere sikkerheden for forskellige elementer i IoT-\u00f8kosystemet, s\u00e5som netv\u00e6rkskommunikation, IoT- og OT-software og -applikationer samt fysiske enheder. DDoS, hijacking eller spoofing af enheder og man in the middle-angreb er blot nogle af sikkerhedsproblemerne i denne sammenh\u00e6ng. Konsekvenserne af et enkelt cyberangreb varierer afh\u00e6ngigt af m\u00e5let, men det mest almindelige og farlige er afsl\u00f8ring af f\u00f8lsomme data. Tabellen viser de mest almindelige IoT-angreb og deres indvirkning p\u00e5 OT-fabrikker.[\/vc_column_text]<div class=\"smx_global_spacer size-s\"><\/div>\n<h3  class=\"h3 smx-headline \">Overblik af IoT-angrebsrisiko <\/h3>[vc_column_text]<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"201\"><\/td>\n<td style=\"text-align: left;\" width=\"201\">Angreb<\/td>\n<td style=\"text-align: left;\" width=\"201\">Effekter<\/td>\n<\/tr>\n<tr>\n<td width=\"201\">Hardware<\/td>\n<td width=\"201\">\n<ul>\n<li>\u00a0Reverse engineering<\/li>\n<li>\u00a0Fysisk manipulation<\/li>\n<li>\u00a0RF-jamming<\/li>\n<li>Denial-of-sleep-angreb<\/li>\n<li>Indirekte Angreb mod komplementerende komponenter<\/li>\n<li>\u00a0Forfalsket hardware<\/li>\n<li>\u00a0Manipulation af konfiguration<\/li>\n<\/ul>\n<\/td>\n<td width=\"201\">\n<ul>\n<li>Adgang til f\u00f8lsomme oplysninger<\/li>\n<li>\u00a0Kontrol af dataflow<\/li>\n<li>\u00a0\u00d8del\u00e6ggelse af ressourcer<\/li>\n<li>\u00a0Nedlukning af server<\/li>\n<\/ul>\n<p>&nbsp;<\/td>\n<\/tr>\n<tr>\n<td width=\"201\">&nbsp;<\/p>\n<p>&nbsp;<\/td>\n<td width=\"201\"><\/td>\n<td width=\"201\"><\/td>\n<\/tr>\n<tr>\n<td width=\"201\">Software<\/td>\n<td width=\"201\">\n<ul>\n<li>Malware, Ransomware, Spyware<\/li>\n<li>\u00a0Bot\/botnet<\/li>\n<li>\u00a0Blandede trusler<\/li>\n<li>\u00a0Rootkits<\/li>\n<li>\u00a0Afventende process afh\u00e6ngighed<\/li>\n<li>\u00a0Udnyttelse af betroede identifikatorer<\/li>\n<li>\u00a0Code Injection<\/li>\n<li>\u00a0Brute-force-angreb<\/li>\n<li>\u00a0SQL-Injection<\/li>\n<li>\u00a0Scripting p\u00e5 tv\u00e6rs af websteder (XSS)<\/li>\n<\/ul>\n<\/td>\n<td width=\"201\">\n<ul>\n<li>Offentligg\u00f8relse af f\u00f8lsomme data<\/li>\n<li>\u00a0Afbrydelse af adgang til data<\/li>\n<li>\u00a0Software gjort ubrugelig<\/li>\n<li>\u00a0Blokering af adgang til filer<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"201\">&nbsp;<\/p>\n<p>&nbsp;<\/td>\n<td width=\"201\"><\/td>\n<td width=\"201\"><\/td>\n<\/tr>\n<tr>\n<td width=\"201\">Kommunikation<\/td>\n<td width=\"201\">\n<ul>\n<li>DoS\/DDoS-angreb<\/li>\n<li>\u00a0Aflytning (sniffing og spoofing-angreb)<\/li>\n<li>\u00a0Man-in-the-middle-angreb<\/li>\n<li>\u00a0Kapring af sessioner<\/li>\n<li>\u00a0DNS-tunnelering<\/li>\n<li>\u00a0Port scanning<\/li>\n<li>\u00a0fors\u00f8g p\u00e5 protokolmanipulation<\/li>\n<li>\u00a0Jamming<\/li>\n<li>\u00a0Trafikanalyse<\/li>\n<li>\u00a0Sinkhole-angreb<\/li>\n<\/ul>\n<\/td>\n<td width=\"201\">\n<ul>\n<li>Netv\u00e6rk flooding og overbelastning<\/li>\n<li>Tyveri af data<\/li>\n<li>Uautoriseret adgang til databaser<\/li>\n<li>Systemet g\u00e5r ned<\/li>\n<li>Skjul af malware<\/li>\n<li>Routing-loops<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/vc_column_text]<div class=\"smx_global_spacer size-s\"><\/div>\n<h2  class=\"h2 smx-headline \">Opn\u00e5else af sikkerhed i IoT<\/h2>[vc_column_text]IoT-enheder er dedikerede objekter, der udf\u00f8rer et begr\u00e6nset antal handlinger. De opretter f.eks. forbindelse til et netv\u00e6rk og sender og modtager data. Typiske eksempler p\u00e5 IoT-enheder i virksomheder er stregkodescannere, intelligente lysp\u00e6rer og sikkerhedskameraer samt m\u00e5le- og kontrolsensorer. IoT-enheder adskiller sig fra IT-enheder som f.eks. computere ved, at de generelt kun har \u00e9n specifik opgave. Desuden underst\u00f8tter mange af dem ikke softwareopdateringer og sikkerhedsrettelser. Hvis der findes en s\u00e5rbarhed i software eller firmware, er det sv\u00e6rt at beskytte dem mod udnyttelse og kompromittering. En anden forskel er, at IoT-enheder ofte ogs\u00e5 optr\u00e6der ubem\u00e6rket i et netv\u00e6rk. Derudover er deres unikke netv\u00e6rksadf\u00e6rd udfordrende for administratorer, der er mere vant til at administrere b\u00e6rbare og station\u00e6re computere p\u00e5 grund af deres specialiserede design. Af disse grunde er det obligatorisk, at alle organisationer udvikler deres cybersikkerhedskontroller og tager proaktive skridt til at h\u00e5ndtere dette stadig mere komplekse IoT\/OT-trusselslandskab.[\/vc_column_text]<div class=\"smx_global_spacer size-s\"><\/div>\n<h3  class=\"h3 smx-headline \">De vigtigste IoT-sikkerhedskontroller<\/h3>[vc_column_text]F\u00f8lgende handlinger fra SITS' IoT-sikkerhedstjekliste er vigtige for at implementere en effektiv sikkerhedsstrategi og mindske de risici, der er forbundet med IoT\/OT-trusler:<\/p>\n<ul>\n<li>Implementer zero trust-arkitektur<\/li>\n<li>Opdatere database\/liste over alle enheder<\/li>\n<li>Proaktivt scanne for s\u00e5rbarheder<\/li>\n<li>Analyserog checke al datatrafik<\/li>\n<li>Ops\u00e6t overv\u00e5gning i realtid<\/li>\n<li>S\u00f8rg for regelm\u00e6ssige opdateringer<\/li>\n<li>Identificer for\u00e6ldede enheder<\/li>\n<li>Gennemf\u00f8re vurdering af sikkerhedsrisikoen<\/li>\n<li>Etablering af en industriel DMZ zone (IDMZ)<\/li>\n<\/ul>\n<p>[\/vc_column_text]<div class=\"smx_global_spacer size-s\"><\/div>\n<h2  class=\"h2 smx-headline \">Konklusion<\/h2>[vc_column_text]Indf\u00f8relsen af IoT- og OT-enheder giver virksomheder betydelige fordele, men medf\u00f8rer ogs\u00e5 store risici. En moderne zero-trust-tilgang er n\u00f8dvendig for effektivt og sikkert at kunne h\u00e5ndtere IoT- og OT-enheder i stor skala. Ledere b\u00f8r ogs\u00e5 overveje cybersikkerhed p\u00e5 alle organisatoriske niveauer ved at indf\u00f8re sikkerhedspolitikker, implementere beskyttelsesmekanismer og uddanne deres medarbejdere. Hvis du leder efter en p\u00e5lidelig partner, der kan r\u00e5dgive og st\u00f8tte dig i at beskytte dine IoT-systemer, er SITS klar til at hj\u00e6lpe.[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text]IoT er ved at \u00e6ndre forretningsverdenen. Producenter integrerer i stigende grad avancerede teknologier som cloud computing, dataanalyse og AI\/Machine Learning i deres produktionsworkflows. Den potentielle v\u00e6rdi, der skabes af IoT, er allerede enorm og forts\u00e6tter med at stige. McKinsey ansl\u00e5r, at IoT-v\u00e6rdiskabelsen kan n\u00e5 op p\u00e5 12,5 milliarder USD p\u00e5 verdensplan i 2030 (https:\/\/www.mckinsey.com\/de\/news\/presse\/report-internet-der-dinge-iot-wertpotenzial-bis-2030). Is\u00e6r [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":10797,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[313],"tags":[],"class_list":["post-10796","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-defense-en-da"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>H\u00e5ndtering af cybersikkerhedsrisici i industriel IoT og OT | SITS<\/title>\n<meta name=\"description\" content=\"H\u00e5ndtering af cybersikkerhedsrisici i industriel IoT og OT \u00bb Jetzt informieren!\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"da_DK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"H\u00e5ndtering af cybersikkerhedsrisici i industriel IoT og OT | SITS\" \/>\n<meta property=\"og:description\" content=\"H\u00e5ndtering af cybersikkerhedsrisici i industriel IoT og OT \u00bb Jetzt informieren!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sits.friendventure.dev\/da\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/\" \/>\n<meta property=\"og:site_name\" content=\"SITS\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-28T11:45:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-22T10:32:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CyberDefense2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"805\" \/>\n\t<meta property=\"og:image:height\" content=\"1435\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ilackinger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Skrevet af\" \/>\n\t<meta name=\"twitter:data1\" content=\"ilackinger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimeret l\u00e6setid\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sits.friendventure.dev\/da\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sits.friendventure.dev\/da\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/\"},\"author\":{\"name\":\"ilackinger\",\"@id\":\"https:\/\/sits.friendventure.dev\/da\/#\/schema\/person\/1c8a57badeeb21935ae47de41016610d\"},\"headline\":\"H\u00e5ndtering af cybersikkerhedsrisici i industriel IoT og OT\",\"datePublished\":\"2024-03-28T11:45:42+00:00\",\"dateModified\":\"2024-11-22T10:32:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sits.friendventure.dev\/da\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/\"},\"wordCount\":1428,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/sits.friendventure.dev\/da\/#organization\"},\"image\":{\"@id\":\"https:\/\/sits.friendventure.dev\/da\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CyberDefense2.jpg\",\"articleSection\":[\"Cyber Defense\"],\"inLanguage\":\"da-DK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/sits.friendventure.dev\/da\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sits.friendventure.dev\/da\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/\",\"url\":\"https:\/\/sits.friendventure.dev\/da\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/\",\"name\":\"H\u00e5ndtering af cybersikkerhedsrisici i industriel IoT og OT | SITS\",\"isPartOf\":{\"@id\":\"https:\/\/sits.friendventure.dev\/da\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sits.friendventure.dev\/da\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sits.friendventure.dev\/da\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CyberDefense2.jpg\",\"datePublished\":\"2024-03-28T11:45:42+00:00\",\"dateModified\":\"2024-11-22T10:32:59+00:00\",\"description\":\"H\u00e5ndtering af cybersikkerhedsrisici i industriel IoT og OT \u00bb Jetzt informieren!\",\"breadcrumb\":{\"@id\":\"https:\/\/sits.friendventure.dev\/da\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/#breadcrumb\"},\"inLanguage\":\"da-DK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sits.friendventure.dev\/da\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/sits.friendventure.dev\/da\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/#primaryimage\",\"url\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CyberDefense2.jpg\",\"contentUrl\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CyberDefense2.jpg\",\"width\":805,\"height\":1435},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sits.friendventure.dev\/da\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/sits.friendventure.dev\/da\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"H\u00e5ndtering af cybersikkerhedsrisici i industriel IoT og OT\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sits.friendventure.dev\/da\/#website\",\"url\":\"https:\/\/sits.friendventure.dev\/da\/\",\"name\":\"SITS\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sits.friendventure.dev\/da\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sits.friendventure.dev\/da\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"da-DK\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sits.friendventure.dev\/da\/#organization\",\"name\":\"SITS\",\"url\":\"https:\/\/sits.friendventure.dev\/da\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/sits.friendventure.dev\/da\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg\",\"contentUrl\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg\",\"width\":557,\"height\":322,\"caption\":\"SITS\"},\"image\":{\"@id\":\"https:\/\/sits.friendventure.dev\/da\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/sits.friendventure.dev\/da\/#\/schema\/person\/1c8a57badeeb21935ae47de41016610d\",\"name\":\"ilackinger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/sits.friendventure.dev\/da\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4374b5318c3e575f35b3cfa5e1c98e1d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4374b5318c3e575f35b3cfa5e1c98e1d?s=96&d=mm&r=g\",\"caption\":\"ilackinger\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"H\u00e5ndtering af cybersikkerhedsrisici i industriel IoT og OT | SITS","description":"H\u00e5ndtering af cybersikkerhedsrisici i industriel IoT og OT \u00bb Jetzt informieren!","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"da_DK","og_type":"article","og_title":"H\u00e5ndtering af cybersikkerhedsrisici i industriel IoT og OT | SITS","og_description":"H\u00e5ndtering af cybersikkerhedsrisici i industriel IoT og OT \u00bb Jetzt informieren!","og_url":"https:\/\/sits.friendventure.dev\/da\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/","og_site_name":"SITS","article_published_time":"2024-03-28T11:45:42+00:00","article_modified_time":"2024-11-22T10:32:59+00:00","og_image":[{"width":805,"height":1435,"url":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CyberDefense2.jpg","type":"image\/jpeg"}],"author":"ilackinger","twitter_card":"summary_large_image","twitter_misc":{"Skrevet af":"ilackinger","Estimeret l\u00e6setid":"5 minutter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sits.friendventure.dev\/da\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/#article","isPartOf":{"@id":"https:\/\/sits.friendventure.dev\/da\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/"},"author":{"name":"ilackinger","@id":"https:\/\/sits.friendventure.dev\/da\/#\/schema\/person\/1c8a57badeeb21935ae47de41016610d"},"headline":"H\u00e5ndtering af cybersikkerhedsrisici i industriel IoT og OT","datePublished":"2024-03-28T11:45:42+00:00","dateModified":"2024-11-22T10:32:59+00:00","mainEntityOfPage":{"@id":"https:\/\/sits.friendventure.dev\/da\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/"},"wordCount":1428,"commentCount":0,"publisher":{"@id":"https:\/\/sits.friendventure.dev\/da\/#organization"},"image":{"@id":"https:\/\/sits.friendventure.dev\/da\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/#primaryimage"},"thumbnailUrl":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CyberDefense2.jpg","articleSection":["Cyber Defense"],"inLanguage":"da-DK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/sits.friendventure.dev\/da\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/sits.friendventure.dev\/da\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/","url":"https:\/\/sits.friendventure.dev\/da\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/","name":"H\u00e5ndtering af cybersikkerhedsrisici i industriel IoT og OT | SITS","isPartOf":{"@id":"https:\/\/sits.friendventure.dev\/da\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sits.friendventure.dev\/da\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/#primaryimage"},"image":{"@id":"https:\/\/sits.friendventure.dev\/da\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/#primaryimage"},"thumbnailUrl":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CyberDefense2.jpg","datePublished":"2024-03-28T11:45:42+00:00","dateModified":"2024-11-22T10:32:59+00:00","description":"H\u00e5ndtering af cybersikkerhedsrisici i industriel IoT og OT \u00bb Jetzt informieren!","breadcrumb":{"@id":"https:\/\/sits.friendventure.dev\/da\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/#breadcrumb"},"inLanguage":"da-DK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sits.friendventure.dev\/da\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/"]}]},{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/sits.friendventure.dev\/da\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/#primaryimage","url":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CyberDefense2.jpg","contentUrl":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CyberDefense2.jpg","width":805,"height":1435},{"@type":"BreadcrumbList","@id":"https:\/\/sits.friendventure.dev\/da\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/sits.friendventure.dev\/da\/"},{"@type":"ListItem","position":2,"name":"H\u00e5ndtering af cybersikkerhedsrisici i industriel IoT og OT"}]},{"@type":"WebSite","@id":"https:\/\/sits.friendventure.dev\/da\/#website","url":"https:\/\/sits.friendventure.dev\/da\/","name":"SITS","description":"","publisher":{"@id":"https:\/\/sits.friendventure.dev\/da\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sits.friendventure.dev\/da\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"da-DK"},{"@type":"Organization","@id":"https:\/\/sits.friendventure.dev\/da\/#organization","name":"SITS","url":"https:\/\/sits.friendventure.dev\/da\/","logo":{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/sits.friendventure.dev\/da\/#\/schema\/logo\/image\/","url":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg","contentUrl":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg","width":557,"height":322,"caption":"SITS"},"image":{"@id":"https:\/\/sits.friendventure.dev\/da\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sits.friendventure.dev\/da\/#\/schema\/person\/1c8a57badeeb21935ae47de41016610d","name":"ilackinger","image":{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/sits.friendventure.dev\/da\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4374b5318c3e575f35b3cfa5e1c98e1d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4374b5318c3e575f35b3cfa5e1c98e1d?s=96&d=mm&r=g","caption":"ilackinger"}}]}},"_links":{"self":[{"href":"https:\/\/sits.friendventure.dev\/da\/wp-json\/wp\/v2\/posts\/10796","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sits.friendventure.dev\/da\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sits.friendventure.dev\/da\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sits.friendventure.dev\/da\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/sits.friendventure.dev\/da\/wp-json\/wp\/v2\/comments?post=10796"}],"version-history":[{"count":4,"href":"https:\/\/sits.friendventure.dev\/da\/wp-json\/wp\/v2\/posts\/10796\/revisions"}],"predecessor-version":[{"id":18122,"href":"https:\/\/sits.friendventure.dev\/da\/wp-json\/wp\/v2\/posts\/10796\/revisions\/18122"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sits.friendventure.dev\/da\/wp-json\/wp\/v2\/media\/10797"}],"wp:attachment":[{"href":"https:\/\/sits.friendventure.dev\/da\/wp-json\/wp\/v2\/media?parent=10796"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sits.friendventure.dev\/da\/wp-json\/wp\/v2\/categories?post=10796"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sits.friendventure.dev\/da\/wp-json\/wp\/v2\/tags?post=10796"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}