{"id":1443,"date":"2023-01-18T16:54:52","date_gmt":"2023-01-18T16:54:52","guid":{"rendered":"https:\/\/guide.trustvalley.swiss\/chapter\/chronologie-eines-cyberangriffs\/"},"modified":"2023-05-31T08:20:11","modified_gmt":"2023-05-31T08:20:11","slug":"chronologie-eines-cyberangriffs","status":"publish","type":"chapter","link":"https:\/\/guide.trustvalley.swiss\/de\/chapter\/chronologie-eines-cyberangriffs\/","title":{"rendered":"Chronologie eines Cyberangriffs"},"content":{"rendered":"\n<p>Dieses Kapitel beschreibt die verschiedenen Phasen eines Cyberangriffs, die damit verbundenen Auswirkungen sowie die von den Angreifenden eingesetzten Techniken. Um sich m\u00f6glichst effizient vor Angriffen zu sch\u00fctzen, sollte man verstehen, wie die Angreifenden klassischerweise vorgehen. <\/p>\n","protected":false},"featured_media":0,"template":"","categories":[],"searchablecategory":[],"class_list":["post-1443","chapter","type-chapter","status-publish","hentry"],"taxonomy_info":[],"featured_image_src_large":false,"author_info":[],"comment_info":"","_links":{"self":[{"href":"https:\/\/guide.trustvalley.swiss\/de\/wp-json\/wp\/v2\/chapter\/1443","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/guide.trustvalley.swiss\/de\/wp-json\/wp\/v2\/chapter"}],"about":[{"href":"https:\/\/guide.trustvalley.swiss\/de\/wp-json\/wp\/v2\/types\/chapter"}],"wp:attachment":[{"href":"https:\/\/guide.trustvalley.swiss\/de\/wp-json\/wp\/v2\/media?parent=1443"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/guide.trustvalley.swiss\/de\/wp-json\/wp\/v2\/categories?post=1443"},{"taxonomy":"searchablecategory","embeddable":true,"href":"https:\/\/guide.trustvalley.swiss\/de\/wp-json\/wp\/v2\/searchablecategory?post=1443"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}