{"id":693,"date":"2024-10-25T12:45:11","date_gmt":"2024-10-25T12:45:11","guid":{"rendered":"https:\/\/pasaulioziniasklaida.lt\/index.php\/2024\/10\/25\/besikeiciantys-daiktu-interneto-kibernetinio-saugumo-vaidmenys-issukiai-ir-strategijos\/"},"modified":"2024-10-25T12:45:11","modified_gmt":"2024-10-25T12:45:11","slug":"besikeiciantys-daiktu-interneto-kibernetinio-saugumo-vaidmenys-issukiai-ir-strategijos","status":"publish","type":"post","link":"https:\/\/pasaulioziniasklaida.lt\/index.php\/2024\/10\/25\/besikeiciantys-daiktu-interneto-kibernetinio-saugumo-vaidmenys-issukiai-ir-strategijos\/","title":{"rendered":"Besikei\u010diantys daikt\u0173 interneto kibernetinio saugumo vaidmenys, i\u0161\u0161\u016bkiai ir strategijos"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<div class=\"td-post-featured-image\"><\/div>\n<p>Kadangi IoT aplinka ir toliau spar\u010diai vystosi, atsiranda nauj\u0173 vaidmen\u0173, kurie yra labai svarb\u016bs siekiant apsaugoti duomen\u0173 vientisum\u0105 daikt\u0173 interneto saugos tinkluose ir apsaugoti asmens privatum\u0105. Daugyb\u0117s daikt\u0173 interneto \u012frengini\u0173 surinkta informacija yra itin jautri ir daro didel\u0119 \u012ftak\u0105 verslo sprendimams. <\/p>\n<p>Duomen\u0173 pa\u017eeidimai \u0161iose sistemose suk\u0117l\u0117 dideli\u0173 socialini\u0173, ekonomini\u0173 ir diplomatini\u0173 pasekmi\u0173. Saugos komandos, pri\u017ei\u016brin\u010dios daikt\u0173 interneto infrastrukt\u016br\u0105, turi laikytis nustatyt\u0173 saugos protokol\u0173, kad gal\u0117t\u0173 veiksmingai u\u017ekirsti keli\u0105 \u0161iems \u017ealingiems pa\u017eeidimams.<\/p>\n<p><span data-sumome-listbuilder-embed-id=\"82bb40261e7c9d48273d88f359151ff6aab87cb5bf573662cf6441949d33e3a5\"\/><\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Turinys:<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/pasaulioziniasklaida.lt\/index.php\/2024\/10\/25\/besikeiciantys-daiktu-interneto-kibernetinio-saugumo-vaidmenys-issukiai-ir-strategijos\/#Kritinis_duomenu_vaidmuo_IoT\" >Kritinis duomen\u0173 vaidmuo IoT<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/pasaulioziniasklaida.lt\/index.php\/2024\/10\/25\/besikeiciantys-daiktu-interneto-kibernetinio-saugumo-vaidmenys-issukiai-ir-strategijos\/#Duomenu_saugumo_issukiai_IoT\" >Duomen\u0173 saugumo i\u0161\u0161\u016bkiai IoT<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/pasaulioziniasklaida.lt\/index.php\/2024\/10\/25\/besikeiciantys-daiktu-interneto-kibernetinio-saugumo-vaidmenys-issukiai-ir-strategijos\/#Didejanti_daiktu_interneto_ir_kibernetinio_saugumo_ziniu_paklausa\" >Did\u0117janti daikt\u0173 interneto ir kibernetinio saugumo \u017eini\u0173 paklausa<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/pasaulioziniasklaida.lt\/index.php\/2024\/10\/25\/besikeiciantys-daiktu-interneto-kibernetinio-saugumo-vaidmenys-issukiai-ir-strategijos\/#Veiksmingos_daiktu_interneto_saugos_priemones\" >Veiksmingos daikt\u0173 interneto saugos priemon\u0117s<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/pasaulioziniasklaida.lt\/index.php\/2024\/10\/25\/besikeiciantys-daiktu-interneto-kibernetinio-saugumo-vaidmenys-issukiai-ir-strategijos\/#IoT_saugumo_gresmes\" >IoT saugumo gr\u0117sm\u0117s<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/pasaulioziniasklaida.lt\/index.php\/2024\/10\/25\/besikeiciantys-daiktu-interneto-kibernetinio-saugumo-vaidmenys-issukiai-ir-strategijos\/#Kibernetiniu_nusikaltimu_ekonominis_poveikis\" >Kibernetini\u0173 nusikaltim\u0173 ekonominis poveikis<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/pasaulioziniasklaida.lt\/index.php\/2024\/10\/25\/besikeiciantys-daiktu-interneto-kibernetinio-saugumo-vaidmenys-issukiai-ir-strategijos\/#Zala_reputacijai_del_duomenu_pazeidimu\" >\u017dala reputacijai d\u0117l duomen\u0173 pa\u017eeidim\u0173<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/pasaulioziniasklaida.lt\/index.php\/2024\/10\/25\/besikeiciantys-daiktu-interneto-kibernetinio-saugumo-vaidmenys-issukiai-ir-strategijos\/#Spragu_isnaudojimas_daiktu_interneto_aplinkoje\" >Sprag\u0173 i\u0161naudojimas daikt\u0173 interneto aplinkoje<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/pasaulioziniasklaida.lt\/index.php\/2024\/10\/25\/besikeiciantys-daiktu-interneto-kibernetinio-saugumo-vaidmenys-issukiai-ir-strategijos\/#Apsaugos_spragu_prevencija\" >Apsaugos sprag\u0173 prevencija<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/pasaulioziniasklaida.lt\/index.php\/2024\/10\/25\/besikeiciantys-daiktu-interneto-kibernetinio-saugumo-vaidmenys-issukiai-ir-strategijos\/#Galimu_pazeidimu_prevencija\" >Galim\u0173 pa\u017eeidim\u0173 prevencija<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\" id=\"h-the-critical-role-of-data-in-iot\"><span class=\"ez-toc-section\" id=\"Kritinis_duomenu_vaidmuo_IoT\"><\/span>Kritinis duomen\u0173 vaidmuo IoT<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>IoT i\u0161 esm\u0117s sukasi apie \u201e\u017eini\u0173 valdymo\u201c s\u0105vok\u0105, kuri apima did\u017eiuli\u0173 duomen\u0173 rinkini\u0173 panaudojim\u0105, kad b\u016bt\u0173 galima priimti gerai informuotus sprendimus. Negalima pervertinti kritinio duomen\u0173 vaidmens IoT. Jutikliai su SIM kortel\u0117mis jungia \u0161iuos \u012frenginius prie tinkl\u0173, kurie gali b\u016bti standartiniai korinio ry\u0161io tinklai, pvz., 3G arba 4G, arba specializuoti daikt\u0173 interneto tinklai, tokie kaip LTE-M ir NB-IoT.<\/p>\n<p>Kai kuriems jutikliams nereikia SIM korteli\u0173, jie jungiasi naudojant kit\u0173 tip\u0173 tinklus, pvz., LoRaWAN\u00ae, ma\u017eos galios pla\u010diajuost\u012f tinkl\u0105 (LPWAN). LoRaWAN\u00ae tinka ilgo nuotolio, ma\u017eos galios daikt\u0173 interneto programoms, si\u016blant lankstum\u0105 \u012fvairiems naudojimo atvejams, pavyzd\u017eiui, i\u0161maniesiems miestams ir aplinkos steb\u0117jimui.<\/p>\n<p>IoT jutikliai renka duomenis i\u0161 savo aplinkos ir dalijasi jais su kitais \u012frenginiais. \u0160ie duomenys saugomi debesyje, kur juos analizuoja AI sistemos, kad gaut\u0173 prasmingas \u012f\u017evalgas.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-challenges-of-data-security-in-iot\"><span class=\"ez-toc-section\" id=\"Duomenu_saugumo_issukiai_IoT\"><\/span>Duomen\u0173 saugumo i\u0161\u0161\u016bkiai IoT<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Net nedideli vieno jutiklio duomen\u0173 pa\u017eeidimai gali tur\u0117ti \u012ftakos bendram AI analiz\u0117s tikslumui. Ta\u010diau kolektyviniai daugelio jutikli\u0173 duomenys yra labai svarb\u016bs ir labai jautr\u016bs, o tai daro didel\u0119 \u012ftak\u0105 AI grind\u017eiamiems sprendimams. <\/p>\n<p>Jei \u0161ie jautr\u016bs \u012fmon\u0117s duomenys bus pa\u017eeisti, tai gali sukelti dideli\u0173 finansini\u0173 nuostoli\u0173. Labai svarbu u\u017etikrinti patikim\u0105 debes\u0173 saug\u0105, nes \u012fsilau\u017e\u0117liai da\u017enai taikosi \u012f daikt\u0173 interneto ekosistem\u0173 arba atskir\u0173 jutikli\u0173 programin\u0117s \u012frangos pa\u017eeid\u017eiamum\u0105, kad gaut\u0173 neteis\u0117t\u0105 prieig\u0105.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-increasing-demand-for-iot-and-cybersecurity-expertise\"><span class=\"ez-toc-section\" id=\"Didejanti_daiktu_interneto_ir_kibernetinio_saugumo_ziniu_paklausa\"><\/span>Did\u0117janti daikt\u0173 interneto ir kibernetinio saugumo \u017eini\u0173 paklausa<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Tikimasi, kad padid\u0117s IoT \u012frengini\u0173 diegimas, tod\u0117l kvalifikuot\u0173 \u017einiatinklio k\u016br\u0117j\u0173 ir kibernetinio saugumo ekspert\u0173 poreikis taip pat labai padid\u0117s. \u0160ie specialistai yra b\u016btini sprend\u017eiant ir ma\u017einant saugumo rizik\u0105. <\/p>\n<p>Did\u0117jantis daikt\u0173 interneto ir kibernetinio saugumo \u017eini\u0173 poreikis suteikia didel\u0119 galimyb\u0119 profesionalams patekti \u012f spar\u010diai augan\u010di\u0105 srit\u012f. Pagrindiniai IoT ekosistem\u0173 valdymo i\u0161\u0161\u016bkiai yra \u0161ie:<\/p>\n<ul class=\"wp-block-list\">\n<li><strong>\u012erenginio saugumas<\/strong>: U\u017etikrinti, kad visi prijungti \u012frenginiai b\u016bt\u0173 apsaugoti nuo neteis\u0117tos prieigos<\/li>\n<li><strong>Duomen\u0173 saugumas<\/strong>: surinkt\u0173 duomen\u0173 vientisumo ir konfidencialumo apsauga.<\/li>\n<li><strong>Privatumo apsauga<\/strong>: asmenin\u0117s informacijos apsauga nuo pa\u017eeidim\u0173.<\/li>\n<\/ul>\n<p>Neteis\u0117ta prieiga prie daikt\u0173 interneto sistem\u0173 gali sukelti rimt\u0173 socialini\u0173, ekonomini\u0173 ir net diplomatini\u0173 pasekmi\u0173. Toki\u0173 pa\u017eeidim\u0173 pasekm\u0117s \u2013 nuo \u200b\u200bfinansinio suk\u010diavimo iki tarptautin\u0117s \u012ftampos \u2013 pabr\u0117\u017eia esmin\u012f veiksming\u0173 saugumo priemoni\u0173 poreik\u012f.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-effective-security-measures-for-iot\"><span class=\"ez-toc-section\" id=\"Veiksmingos_daiktu_interneto_saugos_priemones\"><\/span>Veiksmingos daikt\u0173 interneto saugos priemon\u0117s<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Norint apsaugoti daikt\u0173 interneto ekosistemas ir j\u0173 \u012frenginius, labai svarbu \u012fgyvendinti \u012fvairias saugumo priemones. \u0160ios priemon\u0117s apima:<\/p>\n<ul class=\"wp-block-list\">\n<li><strong>Nustatyti gr\u0117smes<\/strong>: aktyviai aptikkite galimus programin\u0117s \u012frangos ir programin\u0117s \u012frangos pa\u017eeid\u017eiamumus, kad i\u0161vengtum\u0117te i\u0161naudojim\u0173.<\/li>\n<li><strong>Apriboti prieig\u0105 prie duomen\u0173<\/strong>: Apribojus darbuotoj\u0173 prieig\u0105 prie duomen\u0173, galima suma\u017einti vidini\u0173 pa\u017eeidim\u0173 rizik\u0105.<\/li>\n<li><strong>Steb\u0117ti \u012frenginio veikl\u0105<\/strong>: Sekite \u012frenginio operacijas, kad greitai atpa\u017eintum\u0117te \u012ftartinus ar kenk\u0117ji\u0161kus veiksmus ir \u012f juos reaguotum\u0117te.<\/li>\n<li><strong>Reguliar\u016bs atnaujinimai ir atsargin\u0117s kopijos<\/strong>: nuosekliai atnaujinkite programin\u0119 \u012frang\u0105 ir atsargines duomen\u0173 kopijas, kad apsaugotum\u0117te nuo pasenusi\u0173 sistem\u0173 i\u0161naudojimo.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\" id=\"h-iot-security-threats\"><span class=\"ez-toc-section\" id=\"IoT_saugumo_gresmes\"><\/span>IoT saugumo gr\u0117sm\u0117s<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3 class=\"wp-block-heading\" id=\"h-economic-impact-of-cybercrime\"><span class=\"ez-toc-section\" id=\"Kibernetiniu_nusikaltimu_ekonominis_poveikis\"><\/span>Kibernetini\u0173 nusikaltim\u0173 ekonominis poveikis <span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Finansin\u0117 rizika, susijusi su elektroniniais nusikaltimais, kelia vis didesn\u012f susir\u016bpinim\u0105, ypa\u010d d\u0117l pavogt\u0173 banko duomen\u0173 ir slapta\u017eod\u017ei\u0173. Kibernetiniai nusikalt\u0117liai naudojasi asmenine informacija suk\u010diavimui, tod\u0117l asmenys ir \u012fmon\u0117s patiria dideli\u0173 finansini\u0173 nuostoli\u0173.<\/p>\n<p>Taikydami sud\u0117ting\u0105 suk\u010diavimo ir socialin\u0117s in\u017einerijos taktik\u0105, aukos gali nety\u010dia pateikti neskelbtin\u0173 duomen\u0173, tod\u0117l \u012fsilau\u017e\u0117liai gali i\u0161eikvoti s\u0105skaitas arba neteis\u0117tai pirkti, o tai galiausiai suma\u017eina pasitik\u0117jim\u0105 skaitmenin\u0117mis operacijomis.<\/p>\n<h3 class=\"wp-block-heading\" id=\"h-reputational-damage-from-data-breaches\"><span class=\"ez-toc-section\" id=\"Zala_reputacijai_del_duomenu_pazeidimu\"><\/span>\u017dala reputacijai d\u0117l duomen\u0173 pa\u017eeidim\u0173 <span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Duomen\u0173 pa\u017eeidimai kelia didel\u0119 gr\u0117sm\u0119 \u012fmon\u0117s reputacijai, tod\u0117l patiriami ilgalaikiai finansiniai nuostoliai. Kai pa\u017eeid\u017eiama klient\u0173 informacija, vartotoj\u0173 pasitik\u0117jimas gali b\u016bti nepataisomai pa\u017eeistas. Be to, suter\u0161ta reputacija da\u017enai suma\u017eina klient\u0173 lojalum\u0105, o tai tiesiogiai veikia pardavimus.<\/p>\n<p>Be to, d\u0117l pa\u017eeidimo padarini\u0173 paprastai reikia imtis brangi\u0173 taisom\u0173j\u0173 veiksm\u0173, pavyzd\u017eiui, sustiprinti saugos protokolus, pabr\u0117\u017eiant grie\u017et\u0173 kibernetinio saugumo priemoni\u0173 i\u0161laikymo svarb\u0105.<\/p>\n<h3 class=\"wp-block-heading\" id=\"h-exploiting-loopholes-in-iot-environments\"><span class=\"ez-toc-section\" id=\"Spragu_isnaudojimas_daiktu_interneto_aplinkoje\"><\/span>Sprag\u0173 i\u0161naudojimas daikt\u0173 interneto aplinkoje <span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>\u012esilau\u017e\u0117liai vis da\u017eniau taikosi \u012f IoT aplinkos pa\u017eeid\u017eiamum\u0105, daugiausia d\u0117mesio skirdami debes\u0173 saugos tr\u016bkumams. \u0160ios spragos da\u017enai kyla d\u0117l pasenusios programin\u0117s \u012frangos ar programin\u0117s \u012frangos, tod\u0117l kibernetiniai nusikalt\u0117liai gali jais pasinaudoti.<\/p>\n<p>Prijungus daikt\u0173 interneto \u012frengin\u012f prie debesies be naujausi\u0173 saugos naujinim\u0173, jis tampa pa\u017eeid\u017eiamas atakoms, kurios gali pa\u017eeisti \u012frengin\u012f ir platesn\u012f tinkl\u0105, o tai gali sukelti rimt\u0173 privatumo ir saugumo problem\u0173.<\/p>\n<h3 class=\"wp-block-heading\" id=\"h-preventing-security-loopholes\"><span class=\"ez-toc-section\" id=\"Apsaugos_spragu_prevencija\"><\/span>Apsaugos sprag\u0173 prevencija<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Norint i\u0161vengti sprag\u0173 d\u0117l pasenusios programin\u0117s \u012frangos ir programin\u0117s \u012frangos, b\u016btina reguliariai atnaujinti ir kurti atsargines kopijas. Be to, nuolat atnaujinant sistemas u\u017etikrinamas pa\u017eeid\u017eiamum\u0173 pataisymas, tod\u0117l kibernetiniams nusikalt\u0117liams bus sunkiau pasinaudoti tr\u016bkumais. <\/p>\n<p>Reguliarios atsargin\u0117s kopijos taip pat leid\u017eia organizacijoms greitai atsigauti po duomen\u0173 praradimo ar pa\u017eeidim\u0173. Teikdamos pirmenyb\u0119 prie\u017ei\u016brai, \u012fmon\u0117s gali apsaugoti savo daikt\u0173 interneto \u012frenginius nuo besivystan\u010di\u0173 kibernetini\u0173 gr\u0117smi\u0173.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-preventing-potential-breaches\"><span class=\"ez-toc-section\" id=\"Galimu_pazeidimu_prevencija\"><\/span>Galim\u0173 pa\u017eeidim\u0173 prevencija<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Daikt\u0173 interneto tinklai, priklausantys nuo did\u017eiuli\u0173 AI apdorot\u0173 duomen\u0173 rinkini\u0173, sudaro svarbiausi\u0173 verslo strategij\u0173 stubur\u0105, pabr\u0117\u017eiant tvirt\u0173 kibernetinio saugumo priemoni\u0173 poreik\u012f, siekiant u\u017ekirsti keli\u0105 galimiems pa\u017eeidimams ir juos suma\u017einti. Vis labiau populiar\u0117jant \u0161iems \u012frenginiams, kibernetinio saugumo ekspert\u0173, besispecializuojan\u010di\u0173 daikt\u0173 interneto srityje, paklausa ir toliau augs.<\/p>\n<p>Kibernetini\u0173 nusikaltim\u0173 ekonominis poveikis, pa\u017eeidim\u0173 daroma \u017eala reputacijai ir daikt\u0173 interneto aplinkos pa\u017eeid\u017eiamumas pabr\u0117\u017eia iniciatyvi\u0173 strategij\u0173 b\u016btinyb\u0119. Investuodamos \u012f reguliarius programin\u0117s \u012frangos atnaujinimus, i\u0161samius saugos protokolus ir darbuotoj\u0173 \u0161vietim\u0105 duomen\u0173 saugumo klausimais, organizacijos gali sustiprinti savo apsaug\u0105 nuo augan\u010dios elektronini\u0173 nusikaltim\u0173 gr\u0117sm\u0117s.<\/p>\n<\/p><\/div>\n<p><script defer>(function(d, s, id) {\n \t var js, fjs = d.getElementsByTagName(s)(0);\n \t if (d.getElementById(id)) return;\n \t js = d.createElement(s); js.id = id;\n \t js.src = \"\/\/connect.facebook.net\/en_GB\/sdk.js#xfbml=1&version=v2.8\";\n \t fjs.parentNode.insertBefore(js, fjs);\n\t }(document, 'script', 'facebook-jssdk'));<\/script><script type=\"text\/javascript\">(function(d, s, id) {\n  var js, fjs = d.getElementsByTagName(s)(0);\n  if (d.getElementById(id)) return;\n  js = d.createElement(s); js.id = id;\n  js.src = \"\/\/connect.facebook.net\/en_GB\/sdk.js#xfbml=1&version=v2.8\";\n  fjs.parentNode.insertBefore(js, fjs);\n}(document, 'script', 'facebook-jssdk'));\njQuery(()=>{const o=jQuery('#sidebar')\nconst t=jQuery(window)\nif(!o(0)){return}\nfunction isScrolledIntoView(el){if(typeof jQuery==='function'&&el instanceof jQuery){el=el(0)}else if(typeof jQuery==='function'){el=jQuery(el)(0)}\nif(!el){return!1}\nconst rect=el.getBoundingClientRect();return(rect.top>=0&&rect.left>=0&&rect.bottom<=(window.innerHeight||document.documentElement.clientHeight)&#038;&#038;rect.right<=(window.innerWidth||document.documentElement.clientWidth))}\nt.scroll(()=>{jQuery('#sidebar').css('left',`${( t.width() - jQuery( '.td-pb-row' ).width() ) \/ 2 - 60}px`)\nif(isScrolledIntoView('.td-footer-wrapper')||(jQuery('#sidebar').offset().top+jQuery('#sidebar').height()>jQuery('.td-sidebar-guide').offset().top)){o.hide()}else{o.show()}});t.resize(()=>{jQuery('#sidebar').css('left',`${( t.width() - jQuery( '.td-pb-row' ).width() ) \/ 2 - 60}px`)\nif(isScrolledIntoView('.td-footer-wrapper')||(jQuery('#sidebar').offset().top+jQuery('#sidebar').height()>jQuery('.td-sidebar-guide').offset().top)){o.hide()}else{o.show()}});jQuery(document).ready(()=>{jQuery('#sidebar').css('position','fixed')\njQuery('#sidebar').css('left',`${( t.width() - jQuery( '.td-pb-row' ).width() ) \/ 2 - 60}px`)\nif(isScrolledIntoView('.td-footer-wrapper')||(jQuery('#sidebar').offset().top+jQuery('#sidebar').height()>jQuery('.td-sidebar-guide').offset().top)){o.hide()}else{o.show()}})})<\/script><br \/>\n<br \/><br \/>\n<br \/><a href=\"https:\/\/www.iotforall.com\/securing-iot-evolving-iot-cybersecurity-roles-challenges-and-strategies\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kadangi IoT aplinka ir toliau spar\u010diai vystosi, atsiranda nauj\u0173 vaidmen\u0173, kurie yra labai svarb\u016bs siekiant apsaugoti duomen\u0173 vientisum\u0105 daikt\u0173 interneto saugos tinkluose ir apsaugoti asmens privatum\u0105. Daugyb\u0117s daikt\u0173 interneto \u012frengini\u0173 surinkta informacija yra itin jautri ir daro didel\u0119 \u012ftak\u0105 verslo sprendimams. Duomen\u0173 pa\u017eeidimai \u0161iose sistemose suk\u0117l\u0117 dideli\u0173 socialini\u0173, ekonomini\u0173 ir diplomatini\u0173 pasekmi\u0173. Saugos komandos, pri\u017ei\u016brin\u010dios [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":694,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[602],"tags":[1393,702,556,1395,1073,674,1396,1394],"class_list":["post-693","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ismanieji-irenginiai","tag-besikeiciantys","tag-daiktu","tag-interneto","tag-issukiai","tag-kibernetinio","tag-saugumo","tag-strategijos","tag-vaidmenys"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/pasaulioziniasklaida.lt\/index.php\/wp-json\/wp\/v2\/posts\/693","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pasaulioziniasklaida.lt\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pasaulioziniasklaida.lt\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pasaulioziniasklaida.lt\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pasaulioziniasklaida.lt\/index.php\/wp-json\/wp\/v2\/comments?post=693"}],"version-history":[{"count":0,"href":"https:\/\/pasaulioziniasklaida.lt\/index.php\/wp-json\/wp\/v2\/posts\/693\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pasaulioziniasklaida.lt\/index.php\/wp-json\/wp\/v2\/media\/694"}],"wp:attachment":[{"href":"https:\/\/pasaulioziniasklaida.lt\/index.php\/wp-json\/wp\/v2\/media?parent=693"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pasaulioziniasklaida.lt\/index.php\/wp-json\/wp\/v2\/categories?post=693"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pasaulioziniasklaida.lt\/index.php\/wp-json\/wp\/v2\/tags?post=693"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}