{"id":403,"date":"2022-06-16T11:11:28","date_gmt":"2022-06-16T09:11:28","guid":{"rendered":"https:\/\/www.nameshield.com\/de\/?page_id=403"},"modified":"2022-11-18T11:03:21","modified_gmt":"2022-11-18T10:03:21","slug":"cyberangriff","status":"publish","type":"page","link":"https:\/\/www.nameshield.com\/de\/glossar\/cyberangriff\/","title":{"rendered":"Cyberangriff"},"content":{"rendered":"\n<div class=\"eplus-g8WmOJ wp-block-cover alignfull is-light eplus-wrapper\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim has-background-gradient\" style=\"background:linear-gradient(135deg,rgb(21,115,191) 0%,rgb(255,0,0) 100%)\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"eplus-jHQ0mn wp-block-spacer eplus-wrapper\"><\/div>\n\n\n<div class=\"eplus-yhMUPb wp-block-columns eplus-wrapper is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex eplus-styles-uid-26cc97\">\n<div class=\"eplus-uZP09p wp-block-column is-vertically-aligned-center eplus-wrapper is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<h2 class=\"eplus-pEGYgg has-nv-text-dark-bg-color has-text-color eplus-wrapper wp-block-heading\">Was ist ein Cyberangriff?<\/h2>\n\n\n\n<p class=\"eplus-co4m7t has-nv-text-dark-bg-color has-text-color eplus-wrapper\">Auf der Web\u00adsite der fran\u00adz\u00f6\u00adsi\u00adschen Regie\u00adrung wird ein Cyber\u00adan\u00adgriff defi\u00adniert als \u201eein in b\u00f6s\u00adwil\u00adli\u00adger Absicht aus\u00adge\u00adf\u00fchr\u00adter Angriff auf IT-Sys\u00adte\u00adme. Er zielt auf ver\u00adschie\u00adde\u00adne Berei\u00adche der IT-Infra\u00adstruk\u00adtur ab: Com\u00adpu\u00adter oder Ser\u00adver, iso\u00adliert oder in Netz\u00adwer\u00adken, mit oder ohne Inter\u00adnet\u00adan\u00adschluss, Peri\u00adphe\u00adrie\u00adge\u00adr\u00e4\u00adte wie Dru\u00adcker oder auch Kom\u00admu\u00adni\u00adka\u00adti\u00adons\u00adge\u00adr\u00e4\u00adte wie Mobil\u00adte\u00adle\u00adfo\u00adne, Smart\u00adphones oder Tablets. Es gibt vier Arten von mit Cyber\u00adan\u00adgrif\u00adfen ver\u00adbun\u00adde\u00adnen Risi\u00adken, die unter\u00adschied\u00adli\u00adchen Fol\u00adgen haben und Pri\u00advat\u00adper\u00adso\u00adnen, Beh\u00f6r\u00adden und Unter\u00adneh\u00admen direkt oder indi\u00adrekt betref\u00adfen k\u00f6n\u00adnen: Cyber\u00adkri\u00admi\u00adna\u00adli\u00adt\u00e4t, Image\u00adsch\u00e4\u00addi\u00adgung, Spio\u00adna\u00adge, Sabo\u00adta\u00adge.\u201c<\/p>\n<\/div>\n\n\n\n<div class=\"eplus-2RXwNF wp-block-column eplus-wrapper is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"eplus-6GKhQJ wp-block-image size-large eplus-wrapper\"><img decoding=\"async\" src=\"https:\/\/www.nameshield.com\/wp-content\/uploads\/2021\/05\/Hacker-bro-red-Storyset-1.png\" alt=\"Was ist ein Cyberangriff?\" class=\"wp-image-4573\"><\/figure>\n<\/div>\n<\/div>\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"eplus-iVeaWN wp-block-spacer eplus-wrapper\"><\/div>\n<\/div><\/div>\n\n\n\n<div style=\"height:47px\" aria-hidden=\"true\" class=\"eplus-zDRyBU wp-block-spacer eplus-wrapper\"><\/div>\n\n\n<div class=\"eplus-4iSPhJ wp-block-columns eplus-wrapper is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex eplus-styles-uid-97facb\">\n<div class=\"eplus-PgiIPw wp-block-column eplus-wrapper is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p class=\" eplus-wrapper\">Die Evo\u00adlu\u00adti\u00adon der Tech\u00adnik und das Auf\u00adkom\u00admen neu\u00ader Tech\u00adno\u00adlo\u00adgien f\u00fch\u00adren zu immer kom\u00adple\u00adxe\u00adren Cyber\u00adan\u00adgrif\u00adfen und bie\u00adten den Angrei\u00adfern neue M\u00f6g\u00adlich\u00adkei\u00adten.<\/p>\n\n\n\n<p class=\" eplus-wrapper\">Es exis\u00adtie\u00adren ver\u00adschie\u00adde\u00adne Arten von Cyber\u00adan\u00adgrif\u00adfen, wie z. B. auf das DNS abzie\u00adlen\u00adde (DDoS, DNS Cache Poi\u00adso\u00adning, DNS-Spoo\u00adfing, Man in the Midd\u00adle) Angrif\u00adfe oder Angrif\u00adfe, die direkt auf die Nut\u00adzer abzie\u00adlen, um ver\u00adtrau\u00adli\u00adche Infor\u00adma\u00adtio\u00adnen f\u00fcr einen Iden\u00adti\u00adt\u00e4ts\u00addieb\u00adstahl zu erbeu\u00adten (Phis\u00adhing)\u2026<\/p>\n\n\n\n<p class=\" eplus-wrapper\">H\u00e4u\u00adfig\u00adkeit, Inten\u00adsi\u00adt\u00e4t und Raf\u00adfi\u00adniert\u00adheit von Cyber\u00adan\u00adgrif\u00adfen neh\u00admen Tag f\u00fcr Tag zu und erin\u00adnern uns dar\u00adan, dass der Schutz vor Cyber\u00adkri\u00admi\u00adna\u00adli\u00adt\u00e4t von ent\u00adschei\u00adden\u00adder Bedeu\u00adtung ist.<\/p>\n\n\n\n<p class=\" eplus-wrapper\">Names\u00adhield bie\u00adtet Ihnen wirk\u00adsa\u00adme L\u00f6sun\u00adgen f\u00fcr die Ver\u00adrin\u00adge\u00adrung des Risi\u00adkos von Cyber\u00adan\u00adgrif\u00adfen (Cyber\u00adsi\u00adcher\u00adheit) und den opti\u00adma\u00adlen Schutz f\u00fcr Mar\u00adken und Domain\u00adna\u00admen (Mar\u00adken\u00adschutz).<\/p>\n\n\n\n<p class=\" eplus-wrapper\"><em>Quel\u00adlen\u00adan\u00adga\u00adbe f\u00fcr die Defi\u00adni\u00adti\u00adon von Cyber\u00adan\u00adgriff: Gouvernement.fr<\/em><\/p>\n<\/div>\n\n\n\n<div class=\"eplus-q3mV3T wp-block-column is-vertically-aligned-top eplus-wrapper is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\"><p class=\"eplus-4XQcne has-text-align-center eplus-wrapper eplus-styles-uid-0a45e0\">Fin\u00adden Sie die neu\u00ades\u00adten F\u00e4l\u00adle von <strong>Cyber\u00adan\u00adgrif\u00adfen <\/strong>im <a href=\"https:\/\/blog.nameshield.com\/blog\/category\/cybersecurity\/\" target=\"_blank\" rel=\"noreferrer noopener\">Blog<\/a>.<\/p><\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Die Evo\u00adlu\u00adti\u00adon der Tech\u00adnik und das Auf\u00adkom\u00admen neu\u00ader Tech\u00adno\u00adlo\u00adgien f\u00fch\u00adren zu immer kom\u00adple\u00adxe\u00adren Cyber\u00adan\u00adgrif\u00adfen und bie\u00adten den Angrei\u00adfern neue M\u00f6g\u00adlich\u00adkei\u00adten. Es exis\u00adtie\u00adren ver\u00adschie\u00adde\u00adne Arten von Cyber\u00adan\u00adgrif\u00adfen, wie z. B. auf das DNS abzie\u00adlen\u00adde (DDoS, DNS Cache Poi\u00adso\u00adning, DNS-Spoo\u00ad\u00adfing, Man in the Midd\u00adle) Angrif\u00adfe oder Angrif\u00adfe, die direkt auf die Nut\u00adzer abzie\u00adlen, um ver\u00adtrau\u00adli\u00adche Infor\u00adma\u00adtio\u00adnen f\u00fcr\u2026&nbsp;<a href=\"https:\/\/www.nameshield.com\/de\/glossar\/cyberangriff\/\" class rel=\"bookmark\">Wei\u00adter\u00adle\u00adsen \u00bb<span class=\"screen-reader-text\">Cyber\u00adan\u00adgriff<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":391,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"wp_typography_post_enhancements_disabled":false,"editor_plus_copied_stylings":"{}","_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"on","neve_meta_content_width":100,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"class_list":["post-403","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyberangriff<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nameshield.com\/de\/glossar\/cyberangriff\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyberangriff\" \/>\n<meta property=\"og:description\" content=\"Die Evo\u00adlu\u00adti\u00adon der Tech\u00adnik und das Auf\u00adkom\u00admen neu\u00ader Tech\u00adno\u00adlo\u00adgien f\u00fch\u00adren zu immer kom\u00adple\u00adxe\u00adren Cyber\u00adan\u00adgrif\u00adfen und bie\u00adten den Angrei\u00adfern neue M\u00f6g\u00adlich\u00adkei\u00adten. Es exis\u00adtie\u00adren ver\u00adschie\u00adde\u00adne Arten von Cyber\u00adan\u00adgrif\u00adfen, wie z. B. auf das DNS abzie\u00adlen\u00adde (DDoS, DNS Cache Poi\u00adso\u00adning, DNS-Spoo\u00adfing, Man in the Midd\u00adle) Angrif\u00adfe oder Angrif\u00adfe, die direkt auf die Nut\u00adzer abzie\u00adlen, um ver\u00adtrau\u00adli\u00adche Infor\u00adma\u00adtio\u00adnen f\u00fcr&hellip;&nbsp;Weiterlesen &raquo;Cyberangriff\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.nameshield.com\/de\/glossar\/cyberangriff\/\" \/>\n<meta property=\"og:site_name\" content=\"Nameshield\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-18T10:03:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.nameshield.com\/wp-content\/uploads\/2021\/05\/Hacker-bro-red-Storyset-1.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"2\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/de\\\/glossar\\\/cyberangriff\\\/\",\"url\":\"https:\\\/\\\/www.nameshield.com\\\/de\\\/glossar\\\/cyberangriff\\\/\",\"name\":\"Cyberangriff\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/de\\\/glossar\\\/cyberangriff\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/de\\\/glossar\\\/cyberangriff\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.nameshield.com\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/Hacker-bro-red-Storyset-1.png\",\"datePublished\":\"2022-06-16T09:11:28+00:00\",\"dateModified\":\"2022-11-18T10:03:21+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/de\\\/glossar\\\/cyberangriff\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.nameshield.com\\\/de\\\/glossar\\\/cyberangriff\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/de\\\/glossar\\\/cyberangriff\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.nameshield.com\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/Hacker-bro-red-Storyset-1.png\",\"contentUrl\":\"https:\\\/\\\/www.nameshield.com\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/Hacker-bro-red-Storyset-1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/de\\\/glossar\\\/cyberangriff\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.nameshield.com\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Glossar\",\"item\":\"https:\\\/\\\/www.nameshield.com\\\/de\\\/glossar\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyberangriff\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/www.nameshield.com\\\/de\\\/\",\"name\":\"Nameshield\",\"description\":\"Online Assets Security\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.nameshield.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyberangriff","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nameshield.com\/de\/glossar\/cyberangriff\/","og_locale":"de_DE","og_type":"article","og_title":"Cyberangriff","og_description":"Die Evo\u00adlu\u00adti\u00adon der Tech\u00adnik und das Auf\u00adkom\u00admen neu\u00ader Tech\u00adno\u00adlo\u00adgien f\u00fch\u00adren zu immer kom\u00adple\u00adxe\u00adren Cyber\u00adan\u00adgrif\u00adfen und bie\u00adten den Angrei\u00adfern neue M\u00f6g\u00adlich\u00adkei\u00adten. Es exis\u00adtie\u00adren ver\u00adschie\u00adde\u00adne Arten von Cyber\u00adan\u00adgrif\u00adfen, wie z. B. auf das DNS abzie\u00adlen\u00adde (DDoS, DNS Cache Poi\u00adso\u00adning, DNS-Spoo\u00adfing, Man in the Midd\u00adle) Angrif\u00adfe oder Angrif\u00adfe, die direkt auf die Nut\u00adzer abzie\u00adlen, um ver\u00adtrau\u00adli\u00adche Infor\u00adma\u00adtio\u00adnen f\u00fcr&hellip;&nbsp;Weiterlesen &raquo;Cyberangriff","og_url":"https:\/\/www.nameshield.com\/de\/glossar\/cyberangriff\/","og_site_name":"Nameshield","article_modified_time":"2022-11-18T10:03:21+00:00","og_image":[{"url":"https:\/\/www.nameshield.com\/wp-content\/uploads\/2021\/05\/Hacker-bro-red-Storyset-1.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"2\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.nameshield.com\/de\/glossar\/cyberangriff\/","url":"https:\/\/www.nameshield.com\/de\/glossar\/cyberangriff\/","name":"Cyberangriff","isPartOf":{"@id":"https:\/\/www.nameshield.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.nameshield.com\/de\/glossar\/cyberangriff\/#primaryimage"},"image":{"@id":"https:\/\/www.nameshield.com\/de\/glossar\/cyberangriff\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nameshield.com\/wp-content\/uploads\/2021\/05\/Hacker-bro-red-Storyset-1.png","datePublished":"2022-06-16T09:11:28+00:00","dateModified":"2022-11-18T10:03:21+00:00","breadcrumb":{"@id":"https:\/\/www.nameshield.com\/de\/glossar\/cyberangriff\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nameshield.com\/de\/glossar\/cyberangriff\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.nameshield.com\/de\/glossar\/cyberangriff\/#primaryimage","url":"https:\/\/www.nameshield.com\/wp-content\/uploads\/2021\/05\/Hacker-bro-red-Storyset-1.png","contentUrl":"https:\/\/www.nameshield.com\/wp-content\/uploads\/2021\/05\/Hacker-bro-red-Storyset-1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.nameshield.com\/de\/glossar\/cyberangriff\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.nameshield.com\/de\/"},{"@type":"ListItem","position":2,"name":"Glossar","item":"https:\/\/www.nameshield.com\/de\/glossar\/"},{"@type":"ListItem","position":3,"name":"Cyberangriff"}]},{"@type":"WebSite","@id":"https:\/\/www.nameshield.com\/de\/#website","url":"https:\/\/www.nameshield.com\/de\/","name":"Nameshield","description":"Online Assets Security","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nameshield.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"}]}},"_links":{"self":[{"href":"https:\/\/www.nameshield.com\/de\/wp-json\/wp\/v2\/pages\/403","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nameshield.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.nameshield.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.nameshield.com\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nameshield.com\/de\/wp-json\/wp\/v2\/comments?post=403"}],"version-history":[{"count":3,"href":"https:\/\/www.nameshield.com\/de\/wp-json\/wp\/v2\/pages\/403\/revisions"}],"predecessor-version":[{"id":929,"href":"https:\/\/www.nameshield.com\/de\/wp-json\/wp\/v2\/pages\/403\/revisions\/929"}],"up":[{"embeddable":true,"href":"https:\/\/www.nameshield.com\/de\/wp-json\/wp\/v2\/pages\/391"}],"wp:attachment":[{"href":"https:\/\/www.nameshield.com\/de\/wp-json\/wp\/v2\/media?parent=403"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}