{"version":"1.0","provider_name":"EIU Journals","provider_url":"https:\/\/support.iteckdev.com","author_name":"EIU Journals","author_url":"https:\/\/support.iteckdev.com","title":"US Cyber Strategy of 2020 - EIU Journals","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"Igx6uVOd92\"><a href=\"https:\/\/support.iteckdev.com\/index.php\/download\/us-cyber-strategy-of-2020\/\">US Cyber Strategy of 2020<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/support.iteckdev.com\/index.php\/download\/us-cyber-strategy-of-2020\/embed\/#?secret=Igx6uVOd92\" width=\"600\" height=\"338\" title=\"&#8220;US Cyber Strategy of 2020&#8221; &#8212; EIU Journals\" data-secret=\"Igx6uVOd92\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n<\/script>\n","description":"Abstract The principles of confidentiality, integrity and availability of information processing and storing should remain intact. The establishment of a secure electronic environment for the protection of privacy with actions for the protection of critical information infrastructure seems more than necessary. The US\u0391 is not prepared as it should have against a cyber-attack, the reason [&hellip;]"}