{"id":427,"date":"2022-02-17T11:40:00","date_gmt":"2022-02-17T17:40:00","guid":{"rendered":"https:\/\/ic4ml.org\/?p=427"},"modified":"2022-03-20T15:53:40","modified_gmt":"2022-03-20T20:53:40","slug":"cybersecurity-and-the-internet-of-things","status":"publish","type":"post","link":"https:\/\/ic4ml.org\/pt-pt\/blogs\/cybersecurity\/cybersecurity-and-the-internet-of-things\/","title":{"rendered":"Cybersecurity and the Internet of Things"},"content":{"rendered":"\n<div class=\"wp-block-image\"><figure class=\"alignleft size-medium\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"190\" height=\"300\" src=\"https:\/\/i0.wp.com\/ic4ml.org\/wp-content\/uploads\/2022\/03\/Promo-for-Apple-IOS-13-update.jpg?resize=190%2C300&#038;ssl=1\" alt=\"Promo for Apple's IOS 13 update\" class=\"wp-image-428\" srcset=\"https:\/\/i0.wp.com\/ic4ml.org\/wp-content\/uploads\/2022\/03\/Promo-for-Apple-IOS-13-update.jpg?resize=190%2C300&amp;ssl=1 190w, https:\/\/i0.wp.com\/ic4ml.org\/wp-content\/uploads\/2022\/03\/Promo-for-Apple-IOS-13-update.jpg?w=393&amp;ssl=1 393w\" sizes=\"auto, (max-width: 190px) 100vw, 190px\" \/><figcaption>Promo for Apple&#8217;s IOS 13 update<\/figcaption><\/figure><\/div>\n\n\n\n<p>The modern issue with media literacy is our production of big data without any knowledge of how it is being used. As technology advances our understanding of how it operates decreases. I feel it is the media\u2019s job to help inform the public more about ways they can learn and prevent possible threats from appearing in their own homes. One huge area with little attention is the Internet of Things (IoT) which consists of all network connected devices. This consists of everything from someone\u2019s smartphone to their smart AC units in their home. Having an internet connection to appliances is great for convenience but detrimental to one\u2019s home security if it isn\u2019t properly cared for. Most of these smart home devices come with a default password which is the same across all similar products. Changing passwords and updating them regularly is the best way to keep safe from outside threats (Thales 2021). The media\u2019s responsibility is to publicize stories about data breaches and vulnerabilities. When Apple had a fatal vulnerability in their release of IOS following the iPhone 13, there was no huge headlines advising all apple product users to update their devices. The vulnerability was big enough to grant an attack access to the device remotely (Naraine 2021).<\/p>\n\n\n<h3 style=\"padding-left: 240px;\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\">Along with IoT attacks one of the most prominent ways for outsiders to attack is by taking advantage of unsuspecting victims. <\/span><\/h3>\n\n\n<p>This can be done through phishing emails or social engineering. Unknown to users some of their inbox contains fake messages pretending to be important companies. For example, a PayPal email, receiving an email from PayPal is common when you have regular transactions. But what some fail to check the legitimacy of their mail. When a user does not notice the ill-formatted email, they click on the links within which brings them to a page that takes their login when they try to access their account. Cybersecurity literacy is a must in this evolving world. Something similar to this is social engineering. Social engineering is the use of abusing another\u2019s authorization to infiltrate a system. An example of this is looking at a receptionist\u2019s desk to see a sticky note with a password written on it. This may not seem like a huge deal to people that have trouble remembering passwords, but it ruins any confidentiality that login has.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"751\" height=\"421\" src=\"https:\/\/i0.wp.com\/ic4ml.org\/wp-content\/uploads\/2022\/03\/an-example-of-a-phishing-scam-via-the-federal-trade-commission-netflix-update-payment-details.jpg?resize=751%2C421&#038;ssl=1\" alt=\"An example of a &quot;phishing&quot; scam via the Federal Trade Commission\" class=\"wp-image-429\" srcset=\"https:\/\/i0.wp.com\/ic4ml.org\/wp-content\/uploads\/2022\/03\/an-example-of-a-phishing-scam-via-the-federal-trade-commission-netflix-update-payment-details.jpg?w=751&amp;ssl=1 751w, https:\/\/i0.wp.com\/ic4ml.org\/wp-content\/uploads\/2022\/03\/an-example-of-a-phishing-scam-via-the-federal-trade-commission-netflix-update-payment-details.jpg?resize=300%2C168&amp;ssl=1 300w\" sizes=\"auto, (max-width: 751px) 100vw, 751px\" \/><figcaption>An example of a &#8220;phishing&#8221; scam via the Federal Trade Commission<\/figcaption><\/figure><\/div>\n\n\n\n<p id=\"viewer-fjshi\">Another example would be plugging in a thumb drive you find out in public or around the office. Thumb drives are a dangerous thing to insert into a computer as it not only infects the computer, but also any network the computer is operating on. A simple way to inject a virus into a closed network is to plant a thumb drive and wait for an unsuspecting employee plug it in out of curiosity (Mills 2008). Overall cybersecurity is a necessity to operate safely online but nobody is well versed in how to do that. Increasing the public\u2019s understanding through the media is imperative.<\/p>\n\n\n\n<p id=\"viewer-4ln02\">\u201cIOT Security Issues in 2021: A Business Perspective.\u201d <em>Thales Group<\/em>, 9 Apr. 2021.<\/p>\n\n\n\n<p id=\"viewer-dd7uc\">Mills, Elinor. \u201cUSB Devices Spreading Viruses.\u201d <em>CNET<\/em>, CNET, 21 Nov. 2008.<\/p>\n\n\n\n<p id=\"viewer-911b0\">Naraine, Ryan. \u201cApple Confirms IOS 15 Zero-Day Exploitation.\u201d <em>SecurityWeek<\/em>, 11 Oct. 2021.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sacred Heart University Junior Bryan Bushey takes a look at media&#8217;s role in ensuring cybersecurity.<\/p>\n","protected":false},"author":1,"featured_media":431,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","_editorskit_title_hidden":false,"_editorskit_reading_time":0,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","advgb_blocks_editor_width":"","advgb_blocks_columns_visual_guide":"","_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[5,117],"tags":[122,121,52,119,118,120],"series":[],"ppma_author":[93],"class_list":["post-427","post","type-post","status-publish","format-standard","has-post-thumbnail","category-blogs","category-cybersecurity","tag-disinformation","tag-internet-of-things","tag-media-literacy","tag-passwords","tag-phishing","tag-thumb-drives","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity and the Internet of Things - Blogs - International Council for Media Literacy<\/title>\n<meta name=\"description\" content=\"Sacred Heart University Junior Bryan Bushey takes a look at media&#039;s role in ensuring cybersecurity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ic4ml.org\/pt-pt\/blogs\/cybersecurity\/cybersecurity-and-the-internet-of-things\/\" \/>\n<meta property=\"og:locale\" content=\"pt_PT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity and the Internet of Things - Blogs - International Council for Media Literacy\" \/>\n<meta property=\"og:description\" content=\"Sacred Heart University Junior Bryan Bushey takes a look at media&#039;s role in ensuring cybersecurity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ic4ml.org\/pt-pt\/blogs\/cybersecurity\/cybersecurity-and-the-internet-of-things\/\" \/>\n<meta property=\"og:site_name\" content=\"International Council for Media Literacy\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/IC4ML\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-17T17:40:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-20T20:53:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ic4ml.org\/wp-content\/uploads\/2022\/02\/three-iphone-screenshot-examples.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"866\" \/>\n\t<meta property=\"og:image:height\" content=\"580\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bryan Bushey\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@IC4ML\" \/>\n<meta name=\"twitter:site\" content=\"@IC4ML\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"IC4ML Admininstrator\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo estimado de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/blogs\\\/cybersecurity\\\/cybersecurity-and-the-internet-of-things\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/blogs\\\/cybersecurity\\\/cybersecurity-and-the-internet-of-things\\\/\"},\"author\":{\"name\":\"ic4mladmin75\",\"@id\":\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/#\\\/schema\\\/person\\\/0310600ca60f8c9310e86d06d8a161f9\"},\"headline\":\"Cybersecurity and the Internet of Things\",\"datePublished\":\"2022-02-17T17:40:00+00:00\",\"dateModified\":\"2022-03-20T20:53:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/blogs\\\/cybersecurity\\\/cybersecurity-and-the-internet-of-things\\\/\"},\"wordCount\":547,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/blogs\\\/cybersecurity\\\/cybersecurity-and-the-internet-of-things\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/ic4ml.org\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/three-iphone-screenshot-examples.jpg?fit=866%2C580&ssl=1\",\"keywords\":[\"Disinformation\",\"Internet of Things\",\"Media Literacy\",\"Passwords\",\"Phishing\",\"Thumb Drives\"],\"articleSection\":[\"Blogs\",\"Cybersecurity\"],\"inLanguage\":\"pt-PT\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/blogs\\\/cybersecurity\\\/cybersecurity-and-the-internet-of-things\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/blogs\\\/cybersecurity\\\/cybersecurity-and-the-internet-of-things\\\/\",\"url\":\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/blogs\\\/cybersecurity\\\/cybersecurity-and-the-internet-of-things\\\/\",\"name\":\"Cybersecurity and the Internet of Things - Blogs - International Council for Media Literacy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/blogs\\\/cybersecurity\\\/cybersecurity-and-the-internet-of-things\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/blogs\\\/cybersecurity\\\/cybersecurity-and-the-internet-of-things\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/ic4ml.org\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/three-iphone-screenshot-examples.jpg?fit=866%2C580&ssl=1\",\"datePublished\":\"2022-02-17T17:40:00+00:00\",\"dateModified\":\"2022-03-20T20:53:40+00:00\",\"description\":\"Sacred Heart University Junior Bryan Bushey takes a look at media's role in ensuring cybersecurity.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/blogs\\\/cybersecurity\\\/cybersecurity-and-the-internet-of-things\\\/#breadcrumb\"},\"inLanguage\":\"pt-PT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/blogs\\\/cybersecurity\\\/cybersecurity-and-the-internet-of-things\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/blogs\\\/cybersecurity\\\/cybersecurity-and-the-internet-of-things\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/ic4ml.org\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/three-iphone-screenshot-examples.jpg?fit=866%2C580&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/ic4ml.org\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/three-iphone-screenshot-examples.jpg?fit=866%2C580&ssl=1\",\"width\":866,\"height\":580,\"caption\":\"Three iphone screenshots\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/blogs\\\/cybersecurity\\\/cybersecurity-and-the-internet-of-things\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity and the Internet of Things\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/#website\",\"url\":\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/\",\"name\":\"International Council for Media Literacy\",\"description\":\"Bridging Academia to Action\",\"publisher\":{\"@id\":\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/#organization\"},\"alternateName\":\"IC4ML\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-PT\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/#organization\",\"name\":\"International Council for Media Literacy\",\"alternateName\":\"IC4ML\",\"url\":\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/ic4ml.org\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/ic4ml-logo-400-px-no-byline.png?fit=400%2C255&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/ic4ml.org\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/ic4ml-logo-400-px-no-byline.png?fit=400%2C255&ssl=1\",\"width\":400,\"height\":255,\"caption\":\"International Council for Media Literacy\"},\"image\":{\"@id\":\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/IC4ML\",\"https:\\\/\\\/x.com\\\/IC4ML\",\"https:\\\/\\\/www.instagram.com\\\/ICforML\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/#\\\/schema\\\/person\\\/0310600ca60f8c9310e86d06d8a161f9\",\"name\":\"ic4mladmin75\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0fc9bed8e9f662b98a4ef67c62d84963963d84b0e98bcfac60f154ef91ec0417?s=96&d=blank&r=pg9c9d1a7d2b48a423c82a8dea17af784c\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0fc9bed8e9f662b98a4ef67c62d84963963d84b0e98bcfac60f154ef91ec0417?s=96&d=blank&r=pg\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0fc9bed8e9f662b98a4ef67c62d84963963d84b0e98bcfac60f154ef91ec0417?s=96&d=blank&r=pg\",\"caption\":\"ic4mladmin75\"},\"url\":\"https:\\\/\\\/ic4ml.org\\\/pt-pt\\\/author\\\/ic4mladmin75\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity and the Internet of Things - Blogs - International Council for Media Literacy","description":"Sacred Heart University Junior Bryan Bushey takes a look at media's role in ensuring cybersecurity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ic4ml.org\/pt-pt\/blogs\/cybersecurity\/cybersecurity-and-the-internet-of-things\/","og_locale":"pt_PT","og_type":"article","og_title":"Cybersecurity and the Internet of Things - Blogs - International Council for Media Literacy","og_description":"Sacred Heart University Junior Bryan Bushey takes a look at media's role in ensuring cybersecurity.","og_url":"https:\/\/ic4ml.org\/pt-pt\/blogs\/cybersecurity\/cybersecurity-and-the-internet-of-things\/","og_site_name":"International Council for Media Literacy","article_publisher":"https:\/\/www.facebook.com\/IC4ML","article_published_time":"2022-02-17T17:40:00+00:00","article_modified_time":"2022-03-20T20:53:40+00:00","og_image":[{"width":866,"height":580,"url":"https:\/\/ic4ml.org\/wp-content\/uploads\/2022\/02\/three-iphone-screenshot-examples.jpg","type":"image\/jpeg"}],"author":"Bryan Bushey","twitter_card":"summary_large_image","twitter_creator":"@IC4ML","twitter_site":"@IC4ML","twitter_misc":{"Escrito por":"IC4ML Admininstrator","Tempo estimado de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/ic4ml.org\/pt-pt\/blogs\/cybersecurity\/cybersecurity-and-the-internet-of-things\/#article","isPartOf":{"@id":"https:\/\/ic4ml.org\/pt-pt\/blogs\/cybersecurity\/cybersecurity-and-the-internet-of-things\/"},"author":{"name":"ic4mladmin75","@id":"https:\/\/ic4ml.org\/pt-pt\/#\/schema\/person\/0310600ca60f8c9310e86d06d8a161f9"},"headline":"Cybersecurity and the Internet of Things","datePublished":"2022-02-17T17:40:00+00:00","dateModified":"2022-03-20T20:53:40+00:00","mainEntityOfPage":{"@id":"https:\/\/ic4ml.org\/pt-pt\/blogs\/cybersecurity\/cybersecurity-and-the-internet-of-things\/"},"wordCount":547,"commentCount":1,"publisher":{"@id":"https:\/\/ic4ml.org\/pt-pt\/#organization"},"image":{"@id":"https:\/\/ic4ml.org\/pt-pt\/blogs\/cybersecurity\/cybersecurity-and-the-internet-of-things\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/ic4ml.org\/wp-content\/uploads\/2022\/02\/three-iphone-screenshot-examples.jpg?fit=866%2C580&ssl=1","keywords":["Disinformation","Internet of Things","Media Literacy","Passwords","Phishing","Thumb Drives"],"articleSection":["Blogs","Cybersecurity"],"inLanguage":"pt-PT","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ic4ml.org\/pt-pt\/blogs\/cybersecurity\/cybersecurity-and-the-internet-of-things\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ic4ml.org\/pt-pt\/blogs\/cybersecurity\/cybersecurity-and-the-internet-of-things\/","url":"https:\/\/ic4ml.org\/pt-pt\/blogs\/cybersecurity\/cybersecurity-and-the-internet-of-things\/","name":"Cybersecurity and the Internet of Things - Blogs - International Council for Media Literacy","isPartOf":{"@id":"https:\/\/ic4ml.org\/pt-pt\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ic4ml.org\/pt-pt\/blogs\/cybersecurity\/cybersecurity-and-the-internet-of-things\/#primaryimage"},"image":{"@id":"https:\/\/ic4ml.org\/pt-pt\/blogs\/cybersecurity\/cybersecurity-and-the-internet-of-things\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/ic4ml.org\/wp-content\/uploads\/2022\/02\/three-iphone-screenshot-examples.jpg?fit=866%2C580&ssl=1","datePublished":"2022-02-17T17:40:00+00:00","dateModified":"2022-03-20T20:53:40+00:00","description":"Sacred Heart University Junior Bryan Bushey takes a look at media's role in ensuring cybersecurity.","breadcrumb":{"@id":"https:\/\/ic4ml.org\/pt-pt\/blogs\/cybersecurity\/cybersecurity-and-the-internet-of-things\/#breadcrumb"},"inLanguage":"pt-PT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ic4ml.org\/pt-pt\/blogs\/cybersecurity\/cybersecurity-and-the-internet-of-things\/"]}]},{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/ic4ml.org\/pt-pt\/blogs\/cybersecurity\/cybersecurity-and-the-internet-of-things\/#primaryimage","url":"https:\/\/i0.wp.com\/ic4ml.org\/wp-content\/uploads\/2022\/02\/three-iphone-screenshot-examples.jpg?fit=866%2C580&ssl=1","contentUrl":"https:\/\/i0.wp.com\/ic4ml.org\/wp-content\/uploads\/2022\/02\/three-iphone-screenshot-examples.jpg?fit=866%2C580&ssl=1","width":866,"height":580,"caption":"Three iphone screenshots"},{"@type":"BreadcrumbList","@id":"https:\/\/ic4ml.org\/pt-pt\/blogs\/cybersecurity\/cybersecurity-and-the-internet-of-things\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ic4ml.org\/pt-pt\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity and the Internet of Things"}]},{"@type":"WebSite","@id":"https:\/\/ic4ml.org\/pt-pt\/#website","url":"https:\/\/ic4ml.org\/pt-pt\/","name":"International Council for Media Literacy","description":"Bridging Academia to Action","publisher":{"@id":"https:\/\/ic4ml.org\/pt-pt\/#organization"},"alternateName":"IC4ML","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ic4ml.org\/pt-pt\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-PT"},{"@type":"Organization","@id":"https:\/\/ic4ml.org\/pt-pt\/#organization","name":"International Council for Media Literacy","alternateName":"IC4ML","url":"https:\/\/ic4ml.org\/pt-pt\/","logo":{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/ic4ml.org\/pt-pt\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/ic4ml.org\/wp-content\/uploads\/2022\/06\/ic4ml-logo-400-px-no-byline.png?fit=400%2C255&ssl=1","contentUrl":"https:\/\/i0.wp.com\/ic4ml.org\/wp-content\/uploads\/2022\/06\/ic4ml-logo-400-px-no-byline.png?fit=400%2C255&ssl=1","width":400,"height":255,"caption":"International Council for Media Literacy"},"image":{"@id":"https:\/\/ic4ml.org\/pt-pt\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/IC4ML","https:\/\/x.com\/IC4ML","https:\/\/www.instagram.com\/ICforML"]},{"@type":"Person","@id":"https:\/\/ic4ml.org\/pt-pt\/#\/schema\/person\/0310600ca60f8c9310e86d06d8a161f9","name":"ic4mladmin75","image":{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/secure.gravatar.com\/avatar\/0fc9bed8e9f662b98a4ef67c62d84963963d84b0e98bcfac60f154ef91ec0417?s=96&d=blank&r=pg9c9d1a7d2b48a423c82a8dea17af784c","url":"https:\/\/secure.gravatar.com\/avatar\/0fc9bed8e9f662b98a4ef67c62d84963963d84b0e98bcfac60f154ef91ec0417?s=96&d=blank&r=pg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0fc9bed8e9f662b98a4ef67c62d84963963d84b0e98bcfac60f154ef91ec0417?s=96&d=blank&r=pg","caption":"ic4mladmin75"},"url":"https:\/\/ic4ml.org\/pt-pt\/author\/ic4mladmin75\/"}]}},"author_meta":{"display_name":"IC4ML Admininstrator","author_link":"https:\/\/ic4ml.org\/pt-pt\/author\/ic4mladmin75\/"},"featured_img":"https:\/\/i0.wp.com\/ic4ml.org\/wp-content\/uploads\/2022\/02\/three-iphone-screenshot-examples.jpg?fit=300%2C201&ssl=1","featured_image_src":"https:\/\/i0.wp.com\/ic4ml.org\/wp-content\/uploads\/2022\/02\/three-iphone-screenshot-examples.jpg?resize=600%2C400&ssl=1","featured_image_src_square":"https:\/\/i0.wp.com\/ic4ml.org\/wp-content\/uploads\/2022\/02\/three-iphone-screenshot-examples.jpg?resize=600%2C580&ssl=1","author_info":{"display_name":"IC4ML Admininstrator","author_link":"https:\/\/ic4ml.org\/pt-pt\/author\/ic4mladmin75\/"},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/ic4ml.org\/wp-content\/uploads\/2022\/02\/three-iphone-screenshot-examples.jpg?fit=866%2C580&ssl=1","coauthors":[{"link":"https:\/\/ic4ml.org\/pt-pt\/author\/bryan-bushey\/","display_name":"Bryan Bushey"}],"tax_additional":{"categories":{"linked":["<a href=\"https:\/\/ic4ml.org\/pt-pt\/content\/blogs\/\" class=\"advgb-post-tax-term\">Blogs<\/a>","<a href=\"https:\/\/ic4ml.org\/pt-pt\/content\/blogs\/cybersecurity\/\" class=\"advgb-post-tax-term\">Cybersecurity<\/a>"],"unlinked":["<span class=\"advgb-post-tax-term\">Blogs<\/span>","<span class=\"advgb-post-tax-term\">Cybersecurity<\/span>"]},"tags":{"linked":["<a href=\"https:\/\/ic4ml.org\/pt-pt\/content\/blogs\/cybersecurity\/\" class=\"advgb-post-tax-term\">Disinformation<\/a>","<a href=\"https:\/\/ic4ml.org\/pt-pt\/content\/blogs\/cybersecurity\/\" class=\"advgb-post-tax-term\">Internet of Things<\/a>","<a href=\"https:\/\/ic4ml.org\/pt-pt\/content\/blogs\/cybersecurity\/\" class=\"advgb-post-tax-term\">Media Literacy<\/a>","<a href=\"https:\/\/ic4ml.org\/pt-pt\/content\/blogs\/cybersecurity\/\" class=\"advgb-post-tax-term\">Passwords<\/a>","<a href=\"https:\/\/ic4ml.org\/pt-pt\/content\/blogs\/cybersecurity\/\" class=\"advgb-post-tax-term\">Phishing<\/a>","<a href=\"https:\/\/ic4ml.org\/pt-pt\/content\/blogs\/cybersecurity\/\" class=\"advgb-post-tax-term\">Thumb Drives<\/a>"],"unlinked":["<span class=\"advgb-post-tax-term\">Disinformation<\/span>","<span class=\"advgb-post-tax-term\">Internet of Things<\/span>","<span class=\"advgb-post-tax-term\">Media Literacy<\/span>","<span class=\"advgb-post-tax-term\">Passwords<\/span>","<span class=\"advgb-post-tax-term\">Phishing<\/span>","<span class=\"advgb-post-tax-term\">Thumb Drives<\/span>"]}},"comment_count":"1","relative_dates":{"created":"Posted 4 anos ago","modified":"Updated 4 anos ago"},"absolute_dates":{"created":"Posted on 17 de Fevereiro, 2022","modified":"Updated on 20 de Mar\u00e7o, 2022"},"absolute_dates_time":{"created":"Posted on 17 de Fevereiro, 2022 11:40","modified":"Updated on 20 de Mar\u00e7o, 2022 15:53"},"featured_img_caption":"","series_order":null,"jetpack_sharing_enabled":true,"authors":[{"term_id":93,"user_id":0,"is_guest":1,"slug":"bryan-bushey","display_name":"Bryan Bushey","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=blank&r=pg","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":"","9":"","10":"","11":"","12":""}],"_links":{"self":[{"href":"https:\/\/ic4ml.org\/pt-pt\/wp-json\/wp\/v2\/posts\/427","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ic4ml.org\/pt-pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ic4ml.org\/pt-pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ic4ml.org\/pt-pt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ic4ml.org\/pt-pt\/wp-json\/wp\/v2\/comments?post=427"}],"version-history":[{"count":1,"href":"https:\/\/ic4ml.org\/pt-pt\/wp-json\/wp\/v2\/posts\/427\/revisions"}],"predecessor-version":[{"id":430,"href":"https:\/\/ic4ml.org\/pt-pt\/wp-json\/wp\/v2\/posts\/427\/revisions\/430"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ic4ml.org\/pt-pt\/wp-json\/wp\/v2\/media\/431"}],"wp:attachment":[{"href":"https:\/\/ic4ml.org\/pt-pt\/wp-json\/wp\/v2\/media?parent=427"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ic4ml.org\/pt-pt\/wp-json\/wp\/v2\/categories?post=427"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ic4ml.org\/pt-pt\/wp-json\/wp\/v2\/tags?post=427"},{"taxonomy":"series","embeddable":true,"href":"https:\/\/ic4ml.org\/pt-pt\/wp-json\/wp\/v2\/series?post=427"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/ic4ml.org\/pt-pt\/wp-json\/wp\/v2\/ppma_author?post=427"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}