{"id":22643,"date":"2024-01-09T14:25:17","date_gmt":"2024-01-09T12:25:17","guid":{"rendered":"https:\/\/infopolicy.net\/?p=22643"},"modified":"2024-01-09T14:25:19","modified_gmt":"2024-01-09T12:25:19","slug":"","status":"publish","type":"post","link":"https:\/\/infopolicy.net\/en\/infografika-dnya-kak-rabotaet-https-bezopa\/","title":{"rendered":"","raw":""},"content":{"rendered":"","protected":false,"raw":""},"excerpt":{"rendered":"","protected":false,"raw":""},"author":1,"featured_media":22644,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_ru_post_content":"<p>\u041f\u0440\u043e\u0442\u043e\u043a\u043e\u043b HTTPS \u043f\u043e\u0441\u0442\u043e\u044f\u043d\u043d\u043e \u0432\u044b\u0437\u044b\u0432\u0430\u0430\u0435\u0442 \u0432\u043e\u043f\u0440\u043e\u0441\u044b.<\/p>\n<hr \/>\n<p>\u041d\u0435\u0437\u0430\u043c\u044b\u0441\u043b\u043e\u0432\u0430\u0442\u0430\u044f \u0438\u043d\u0444\u043e\u0433\u0440\u0430\u0444\u0438\u043a\u0430 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u043c\u043e\u0436\u0435\u0442 \u0440\u0430\u0437\u043e\u0431\u0440\u0430\u0442\u044c\u0441\u044f.<\/p>\n<a href=\"https:\/\/infopolicy.net\/wp-content\/uploads\/2024\/01\/HTTPS_Encryption_Works.jpg\">\n<img class=\"alignnone size-full wp-image-22645\" src=\"https:\/\/infopolicy.net\/wp-content\/uploads\/2024\/01\/HTTPS_Encryption_Works.jpg\" alt=\"\" width=\"720\" height=\"900\" \/><\/a><\/p>\n\n<!-- wp:paragraph -->\n<p><\/p>\n<!-- \/wp:paragraph -->","_ru_post_name":"infografika-dnya-kak-rabotaet-https-bezopa","_ru_post_excerpt":"","_ru_post_title":"\u0418\u043d\u0444\u043e\u0433\u0440\u0430\u0444\u0438\u043a\u0430 \u0434\u043d\u044f: \u041a\u0430\u043a \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 HTTPS \u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0435 \u0441\u043e\u0435\u0434\u0438\u043d\u0435\u043d\u0438\u0435","_en_post_content":"","_en_post_name":"","_en_post_excerpt":"","_en_post_title":"","edit_language":"en","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[21,14],"tags":[],"class_list":["post-22643","post","type-post","status-publish","format-standard","has-post-thumbnail","","category-security","category-infographic"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/infopolicy.net\/wp-content\/uploads\/2024\/01\/https_encryption.png","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pffTZ2-5Td","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":9359,"url":"https:\/\/infopolicy.net\/en\/infografika-mesyatsa-kiberbezopasnos\/","url_meta":{"origin":22643,"position":0},"title":"\u0418\u043d\u0444\u043e\u0433\u0440\u0430\u0444\u0438\u043a\u0430 \u043c\u0435\u0441\u044f\u0446\u0430: \u041a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c \u0438 \u0441\u0432\u043e\u0431\u043e\u0434\u0430 \u0438\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u0430","author":"infopolicy","date":"20.03.2017","format":false,"excerpt":"\u0413\u0438\u0433\u0430\u043d\u0442\u0441\u043a\u0430\u044f \u0438\u043d\u0444\u043e\u0433\u0440\u0430\u0444\u0438\u043a\u0430 \u0441 \u043e\u0433\u0440\u043e\u043c\u043d\u044b\u043c \u043a\u043e\u043b\u0438\u0447\u0435\u0441\u0442\u0432\u043e\u043c \u0434\u0430\u043d\u043d\u044b\u0445 \u043f\u0440\u043e \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0435 \u0430\u0441\u043f\u0435\u043a\u0442\u044b \u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438. \u0412 \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0433\u0440\u0430\u0444\u0438\u043a\u0430\u0445 \u0443\u043f\u043e\u043c\u0438\u043d\u0430\u0435\u0442\u0441\u044f \u0411\u0435\u043b\u0430\u0440\u0443\u0441\u044c: \u0418\u0441\u0442\u043e\u0447\u043d\u0438\u043a: https:\/\/www.comparitech.com\/blog\/information-security\/cyber-security-statistics\/","rel":"","context":"In &quot;\u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c&quot;","block_context":{"text":"\u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c","link":"https:\/\/infopolicy.net\/en\/category\/security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2017\/03\/Countries-that-are-the-Most-and-Least-Cyber-Safe.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2017\/03\/Countries-that-are-the-Most-and-Least-Cyber-Safe.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2017\/03\/Countries-that-are-the-Most-and-Least-Cyber-Safe.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2017\/03\/Countries-that-are-the-Most-and-Least-Cyber-Safe.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":11230,"url":"https:\/\/infopolicy.net\/en\/infografika-dnya-opasnosti-interneta\/","url_meta":{"origin":22643,"position":1},"title":"\u0418\u043d\u0444\u043e\u0433\u0440\u0430\u0444\u0438\u043a\u0430 \u0434\u043d\u044f: \u041e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0438\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u0430 \u0432\u0435\u0449\u0435\u0439","author":"infopolicy","date":"15.11.2018","format":false,"excerpt":"\u041f\u043e\u0441\u0442\u043e\u044f\u043d\u043d\u043e \u043d\u0430\u0434\u043e \u043f\u043e\u043c\u043d\u0438\u0442\u044c \u043f\u0440\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c IoT. \u041f\u0440\u0438\u0447\u0438\u043d\u044b \u043f\u0435\u0440\u0435\u0447\u0438\u0441\u043b\u0435\u043d\u044b \u043d\u0430 \u043a\u0430\u0440\u0442\u0438\u043d\u043a\u0435: https:\/\/infopolicy.net\/wp-content\/uploads\/2018\/11\/DangersIoT.png \u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c \u0438\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u0430 \u0432\u0435\u0449\u0435\u0439 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c \"\u0443\u043c\u043d\u044b\u0445 \u0433\u043e\u0440\u043e\u0434\u043e\u0432\" \/ smart city.","rel":"","context":"In &quot;Smart City&quot;","block_context":{"text":"Smart City","link":"https:\/\/infopolicy.net\/en\/category\/smart-city\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":11177,"url":"https:\/\/infopolicy.net\/en\/infografika-dnya-bezopasnost-intern\/","url_meta":{"origin":22643,"position":2},"title":"\u0418\u043d\u0444\u043e\u0433\u0440\u0430\u0444\u0438\u043a\u0430 \u0434\u043d\u044f: \u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c \u0438\u043d\u0442\u0435\u0440\u043d\u0435\u0442-\u0432\u0435\u0449\u0435\u0439 (IoT)","author":"infopolicy","date":"02.10.2018","format":false,"excerpt":"\u041c\u043d\u043e\u0436\u0435\u0441\u0442\u0432\u043e \u0432\u043e\u043f\u0440\u043e\u0441\u043e\u0432 \u043d\u0430\u0434\u043e \u0440\u0435\u0448\u0430\u0442\u044c \u0441 \u0438\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u043e\u043c \u0432\u0435\u0449\u0435\u0439 \u0432 \u043e\u0431\u043b\u0430\u0441\u0442\u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438. \u041f\u0440\u043e\u0431\u043b\u0435\u043c\u044b: \u0418\u0441\u0442\u043e\u0447\u043d\u0438\u043a: https:\/\/www.smartresilient.com\/iot-dangers?eid=430933744&bid=2254363","rel":"","context":"In &quot;Smart City&quot;","block_context":{"text":"Smart City","link":"https:\/\/infopolicy.net\/en\/category\/smart-city\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2018\/10\/DangersIoT.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2018\/10\/DangersIoT.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2018\/10\/DangersIoT.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2018\/10\/DangersIoT.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":12507,"url":"https:\/\/infopolicy.net\/en\/infografika-dnya-deti-do-6-let-i-tsifrovy\/","url_meta":{"origin":22643,"position":3},"title":"\u0418\u043d\u0444\u043e\u0433\u0440\u0430\u0444\u0438\u043a\u0430 \u0434\u043d\u044f: \u0414\u0435\u0442\u0438 \u0434\u043e 6 \u043b\u0435\u0442 \u0438 \u0446\u0438\u0444\u0440\u043e\u0432\u044b\u0435 \u043c\u0435\u0434\u0438\u0430","author":"infopolicy","date":"02.03.2020","format":false,"excerpt":"\u041f\u043e\u0441\u0432\u044f\u0449\u0430\u0435\u0442\u0441\u044f \u043f\u0440\u0438\u0431\u043b\u0438\u0436\u0430\u044e\u0449\u0435\u043c\u0443\u0441\u044f \u0434\u043d\u044e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0433\u043e \u0438\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u0430: \u0418\u0441\u0442\u043e\u0447\u043d\u0438\u043a: https:\/\/www.betterinternetforkids.eu\/web\/portal\/practice\/awareness\/detail?articleId=5743956","rel":"","context":"In &quot;Policy&quot;","block_context":{"text":"Policy","link":"https:\/\/infopolicy.net\/en\/category\/policy\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2020\/03\/ChildrenUnder6years-DigitalMedia.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2020\/03\/ChildrenUnder6years-DigitalMedia.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2020\/03\/ChildrenUnder6years-DigitalMedia.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2020\/03\/ChildrenUnder6years-DigitalMedia.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":10592,"url":"https:\/\/infopolicy.net\/en\/infografika-dnya-kak-korporatsii-ident\/","url_meta":{"origin":22643,"position":4},"title":"\u0418\u043d\u0444\u043e\u0433\u0440\u0430\u0444\u0438\u043a\u0430 \u0434\u043d\u044f: \u041a\u0430\u043a \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0446\u0438\u0438 \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u0443\u044e\u0442 \u043b\u044e\u0434\u0435\u0439","author":"infopolicy","date":"21.01.2018","format":false,"excerpt":"\u041f\u043e\u0437\u043d\u0430\u0432\u0430\u0442\u0435\u043b\u044c\u043d\u043e: \u0418\u0441\u0442\u043e\u0447\u043d\u0438\u043a: https:\/\/boingboing.net\/2018\/01\/19\/tickticktick-gdpr.html","rel":"","context":"In &quot;\u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c&quot;","block_context":{"text":"\u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c","link":"https:\/\/infopolicy.net\/en\/category\/security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2018\/01\/How-companies-identify-people.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2018\/01\/How-companies-identify-people.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2018\/01\/How-companies-identify-people.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2018\/01\/How-companies-identify-people.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2018\/01\/How-companies-identify-people.jpg?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":19884,"url":"https:\/\/infopolicy.net\/en\/infografika-dnya-kak-manipulirovat-s\/","url_meta":{"origin":22643,"position":5},"title":"\u0418\u043d\u0444\u043e\u0433\u0440\u0430\u0444\u0438\u043a\u0430 \u0434\u043d\u044f: \u041a\u0430\u043a \u043c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0441\u043e\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u043c\u0438 \u043c\u0435\u0434\u0438\u0430","author":"infopolicy","date":"14.08.2022","format":false,"excerpt":"\u0418\u043b\u043b\u044e\u0441\u0442\u0440\u0430\u0446\u0438\u044f \u043a \u043e\u0442\u0447\u0435\u0442\u0443 \"Social Media Manipulation 2021\/2022: Assessing the Ability of Social Media Companies to Combat Platform Manipulation\" \u0418\u0441\u0442\u043e\u0447\u043d\u0438\u043a: https:\/\/stratcomcoe.org\/publications\/social-media-manipulation-20212022-assessing-the-ability-of-social-media-companies-to-combat-platform-manipulation\/242","rel":"","context":"In &quot;\u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c&quot;","block_context":{"text":"\u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c","link":"https:\/\/infopolicy.net\/en\/category\/security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2022\/08\/SocialMediaManipulate.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2022\/08\/SocialMediaManipulate.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/infopolicy.net\/wp-content\/uploads\/2022\/08\/SocialMediaManipulate.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/posts\/22643","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/comments?post=22643"}],"version-history":[{"count":1,"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/posts\/22643\/revisions"}],"predecessor-version":[{"id":22646,"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/posts\/22643\/revisions\/22646"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/media\/22644"}],"wp:attachment":[{"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/media?parent=22643"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/categories?post=22643"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/infopolicy.net\/en\/wp-json\/wp\/v2\/tags?post=22643"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}