{"id":22616,"date":"2023-03-17T11:32:57","date_gmt":"2023-03-17T11:32:57","guid":{"rendered":"https:\/\/direc.dk\/cybersikkerhed\/"},"modified":"2025-10-06T07:21:10","modified_gmt":"2025-10-06T07:21:10","slug":"cybersikkerhed","status":"publish","type":"page","link":"https:\/\/direc.dk\/da\/cybersikkerhed\/","title":{"rendered":"Cybersikkerhed"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"22616\" class=\"elementor elementor-22616 elementor-21566\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-a71c0e5 elementor-section-height-min-height elementor-section-items-stretch elementor-section-content-middle elementor-reverse-mobile elementor-reverse-tablet elementor-section-full_width elementor-section-height-default\" data-id=\"a71c0e5\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f06f2bc\" data-id=\"f06f2bc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-c903555 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c903555\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-237ecfd\" data-id=\"237ecfd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-71ee1590 animated-fast elementor-widget-tablet__width-initial elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"71ee1590\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Cybersikkerhed<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2bffe645 elementor-widget-tablet__width-initial elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"2bffe645\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>En af de st\u00f8rste udfordringer for danske virksomheder er truslen fra hackere. Moderne virksomheder og organisationer har et komplekst it-landskab, og det er en konstant kamp at sikre, at der ikke er huller eller svagheder, som hackere kan udnytte.<\/p>\n<p>DIREC har igangsat en r\u00e6kke projekter inden for cybersikkerhed. Projekterne skal udvikle den bagvedliggende teknologi, der muligg\u00f8r et h\u00f8jt niveau af cybersikkerhed og give os viden om de muligheder, der \u00e5bner sig baseret p\u00e5 ny avanceret digital teknologi.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-90a0592 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"90a0592\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-17cdb53\" data-id=\"17cdb53\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1801a10 animated-fast elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"1801a10\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Hvorfor cybersikkerhed?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3b40627 elementor-widget elementor-widget-heading\" data-id=\"3b40627\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Sikring af vores virksomheder og organisationer<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c381af elementor-widget elementor-widget-text-editor\" data-id=\"5c381af\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Mange virksomheder ser det som et sp\u00f8rgsm\u00e5l om tid, f\u00f8r de bliver udsat for et angreb, der p\u00e5virker deres systemer, og de arbejder sidel\u00f8bende med forebyggelse med at styre kritiske forretningsprocesser under og efter et potentielt angreb. Cybersikkerhed rammer ikke kun store virksomheder, men mange sm\u00e5 virksomheder skal i stigende grad kunne dokumentere og opfylde stadig h\u00f8jere krav til sikkerhed for at blive underleverand\u00f8r til st\u00f8rre virksomheder.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fc75188 elementor-widget elementor-widget-heading\" data-id=\"fc75188\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Sikring af kritisk infrastruktur<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8467639 elementor-widget elementor-widget-text-editor\" data-id=\"8467639\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cybersikkerhed omkring kritisk infrastruktur er blevet endnu vigtigere, is\u00e6r med de geopolitiske \u00e6ndringer og en \u00f8get digitalisering af infrastrukturen.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8f2c039 elementor-widget elementor-widget-heading\" data-id=\"8f2c039\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">N\u00e6ste generation af kryptografiske protokoller (post quantum)<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e319fec elementor-widget elementor-widget-text-editor\" data-id=\"e319fec\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tEt andet potentielt fremtidigt scenarie inden for cybersikkerhed er risikoen for, at vores nuv\u00e6rende krypteringsprotokoller bliver brudt af fremtidige kvantecomputere og smarte algoritmer. Derfor er der ogs\u00e5 et kapl\u00f8b om at udvikle post-kvantekryptering, som forventes at kunne modst\u00e5 angreb fra en kvantecomputer. Disse protokoller skal dog b\u00e5de t\u00e6nkes grundigt igennem og v\u00e6re hurtige, hvis de skal v\u00e6re rygraden i vores digitale kommunikationssystem i fremtiden.<br><br>Parallelt med et voksende trusselsbillede udvikles der l\u00f8bende ny avanceret teknologi, der kan v\u00e6re med til at skabe mere gennemsigtighed, sikrere protokoller, bedre systemer til at opdage hackere og bedre v\u00e6rkt\u00f8jer til at analysere programmer og infrastruktur for svagheder.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-c82ccbb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c82ccbb\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-eb1c9f1\" data-id=\"eb1c9f1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1c855c0 animated-fast elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"1c855c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">SIkre IoT-l\u00f8sninger<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-73c4290 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"73c4290\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tSikkerhed er vigtig for alle digitale l\u00f8sninger, men i relation til IoT-l\u00f8sninger st\u00e5r vi over for flere nye udfordringer. Mange af disse systemer er installeret ude i verden, og her kan milj\u00f8et v\u00e6re sv\u00e6rere at kontrollere. Nogle af disse l\u00f8sninger kontrollerer kritiske systemer, og nogle af dem kan have begr\u00e6nsede ressourcer til at behandle data. S\u00e5 hvordan holder vi dem sikre?<br><br>Udforsk DIREC-projektet om dette emne.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1381fb0 elementor-grid-3 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-posts--thumbnail-top elementor-card-shadow-yes elementor-posts__hover-gradient elementor-widget elementor-widget-posts\" data-id=\"1381fb0\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;cards_columns&quot;:&quot;3&quot;,&quot;cards_columns_tablet&quot;:&quot;2&quot;,&quot;cards_columns_mobile&quot;:&quot;1&quot;,&quot;cards_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:35,&quot;sizes&quot;:[]},&quot;cards_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"posts.cards\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-posts-container elementor-posts elementor-posts--skin-cards elementor-grid\" role=\"list\">\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-9744 post type-post status-publish format-standard has-post-thumbnail hentry category-bridge-projekt category-cybersikkerhed category-human-centered-computing category-projekt tag-ws5-da tag-ws6-da tag-ws7-da tag-ws8-da\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/direc.dk\/da\/siot-secure-internet-of-things-risk-analysis-in-design-and-operation\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/direc.dk\/wp-content\/uploads\/2021\/11\/P20_Siot-300x169.jpg\" class=\"attachment-medium size-medium wp-image-24181\" alt=\"\" srcset=\"https:\/\/direc.dk\/wp-content\/uploads\/2021\/11\/P20_Siot-300x169.jpg 300w, https:\/\/direc.dk\/wp-content\/uploads\/2021\/11\/P20_Siot-1024x576.jpg 1024w, https:\/\/direc.dk\/wp-content\/uploads\/2021\/11\/P20_Siot-768x432.jpg 768w, https:\/\/direc.dk\/wp-content\/uploads\/2021\/11\/P20_Siot-1536x864.jpg 1536w, https:\/\/direc.dk\/wp-content\/uploads\/2021\/11\/P20_Siot-1200x675.jpg 1200w, https:\/\/direc.dk\/wp-content\/uploads\/2021\/11\/P20_Siot.jpg 1920w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/direc.dk\/da\/siot-secure-internet-of-things-risk-analysis-in-design-and-operation\/\" >\n\t\t\t\tSecure Internet of Things \u2013 Risk Analysis in Design and Operation (SIoT)\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-fa8ca78 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fa8ca78\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;shape_divider_top&quot;:&quot;clouds&quot;,&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 283.5 27.8\" preserveAspectRatio=\"xMidYMax slice\">\n  <path class=\"elementor-shape-fill\" d=\"M0 0v6.7c1.9-.8 4.7-1.4 8.5-1 9.5 1.1 11.1 6 11.1 6s2.1-.7 4.3-.2c2.1.5 2.8 2.6 2.8 2.6s.2-.5 1.4-.7c1.2-.2 1.7.2 1.7.2s0-2.1 1.9-2.8c1.9-.7 3.6.7 3.6.7s.7-2.9 3.1-4.1 4.7 0 4.7 0 1.2-.5 2.4 0 1.7 1.4 1.7 1.4h1.4c.7 0 1.2.7 1.2.7s.8-1.8 4-2.2c3.5-.4 5.3 2.4 6.2 4.4.4-.4 1-.7 1.8-.9 2.8-.7 4 .7 4 .7s1.7-5 11.1-6c9.5-1.1 12.3 3.9 12.3 3.9s1.2-4.8 5.7-5.7c4.5-.9 6.8 1.8 6.8 1.8s.6-.6 1.5-.9c.9-.2 1.9-.2 1.9-.2s5.2-6.4 12.6-3.3c7.3 3.1 4.7 9 4.7 9s1.9-.9 4 0 2.8 2.4 2.8 2.4 1.9-1.2 4.5-1.2 4.3 1.2 4.3 1.2.2-1 1.4-1.7 2.1-.7 2.1-.7-.5-3.1 2.1-5.5 5.7-1.4 5.7-1.4 1.5-2.3 4.2-1.1c2.7 1.2 1.7 5.2 1.7 5.2s.3-.1 1.3.5c.5.4.8.8.9 1.1.5-1.4 2.4-5.8 8.4-4 7.1 2.1 3.5 8.9 3.5 8.9s.8-.4 2 0 1.1 1.1 1.1 1.1 1.1-1.1 2.3-1.1 2.1.5 2.1.5 1.9-3.6 6.2-1.2 1.9 6.4 1.9 6.4 2.6-2.4 7.4 0c3.4 1.7 3.9 4.9 3.9 4.9s3.3-6.9 10.4-7.9 11.5 2.6 11.5 2.6.8 0 1.2.2c.4.2.9.9.9.9s4.4-3.1 8.3.2c1.9 1.7 1.5 5 1.5 5s.3-1.1 1.6-1.4c1.3-.3 2.3.2 2.3.2s-.1-1.2.5-1.9 1.9-.9 1.9-.9-4.7-9.3 4.4-13.4c5.6-2.5 9.2.9 9.2.9s5-6.2 15.9-6.2 16.1 8.1 16.1 8.1.7-.2 1.6-.4V0H0z\"\/>\n<\/svg>\n\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-087b721\" data-id=\"087b721\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5f5d927 animated-fast elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"5f5d927\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Sikkerhed og privatliv<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b4a68c0 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"b4a68c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tVi genererer en masse f\u00f8lsomme data som borgere og i vores virksomheder og organisationer. Data er v\u00e6rdifulde fx til at tr\u00e6ne AI-systemer og lave big data-analyse, men hvordan kan vi bruge indsigten fra data og samtidig sikre privatlivet omkring data?<br><br>Udforsk DIREC-projekter, der omhandler dette emne.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-54ddb16 elementor-grid-3 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-posts--thumbnail-top elementor-card-shadow-yes elementor-posts__hover-gradient elementor-widget elementor-widget-posts\" data-id=\"54ddb16\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;cards_columns&quot;:&quot;3&quot;,&quot;cards_columns_tablet&quot;:&quot;2&quot;,&quot;cards_columns_mobile&quot;:&quot;1&quot;,&quot;cards_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:35,&quot;sizes&quot;:[]},&quot;cards_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"posts.cards\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-posts-container elementor-posts elementor-posts--skin-cards elementor-grid\" role=\"list\">\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-12257 post type-post status-publish format-standard has-post-thumbnail hentry category-afsluttet-projekt category-cybersikkerhed category-explore-projekt category-projekt\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/direc.dk\/da\/accountability-privacy-preserving-computation-via-blockchain\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/direc.dk\/wp-content\/uploads\/2022\/04\/blog-blockchain-alexandra-instituttet-300x169.webp\" class=\"attachment-medium size-medium wp-image-13888\" alt=\"\" srcset=\"https:\/\/direc.dk\/wp-content\/uploads\/2022\/04\/blog-blockchain-alexandra-instituttet-300x169.webp 300w, https:\/\/direc.dk\/wp-content\/uploads\/2022\/04\/blog-blockchain-alexandra-instituttet-1024x576.webp 1024w, https:\/\/direc.dk\/wp-content\/uploads\/2022\/04\/blog-blockchain-alexandra-instituttet-768x432.webp 768w, https:\/\/direc.dk\/wp-content\/uploads\/2022\/04\/blog-blockchain-alexandra-instituttet-1536x864.webp 1536w, https:\/\/direc.dk\/wp-content\/uploads\/2022\/04\/blog-blockchain-alexandra-instituttet-1200x675.webp 1200w, https:\/\/direc.dk\/wp-content\/uploads\/2022\/04\/blog-blockchain-alexandra-instituttet.webp 1920w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/direc.dk\/da\/accountability-privacy-preserving-computation-via-blockchain\/\" >\n\t\t\t\tAccountability Privacy Preserving Computation via Blockchain\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-10423 post type-post status-publish format-standard has-post-thumbnail hentry category-afsluttet-projekt category-cybersikkerhed category-projekt category-scitech-projekt tag-ws2-da tag-ws8-da\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/direc.dk\/da\/privacy-and-machine-learning-2\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/direc.dk\/wp-content\/uploads\/2021\/11\/Privacy-and-machine-learning_project-300x169.jpg\" class=\"attachment-medium size-medium wp-image-29786\" alt=\"\" srcset=\"https:\/\/direc.dk\/wp-content\/uploads\/2021\/11\/Privacy-and-machine-learning_project-300x169.jpg 300w, https:\/\/direc.dk\/wp-content\/uploads\/2021\/11\/Privacy-and-machine-learning_project-1024x576.jpg 1024w, https:\/\/direc.dk\/wp-content\/uploads\/2021\/11\/Privacy-and-machine-learning_project-768x432.jpg 768w, https:\/\/direc.dk\/wp-content\/uploads\/2021\/11\/Privacy-and-machine-learning_project-1536x864.jpg 1536w, https:\/\/direc.dk\/wp-content\/uploads\/2021\/11\/Privacy-and-machine-learning_project-1200x675.jpg 1200w, https:\/\/direc.dk\/wp-content\/uploads\/2021\/11\/Privacy-and-machine-learning_project.jpg 1920w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/direc.dk\/da\/privacy-and-machine-learning-2\/\" >\n\t\t\t\tPrivacy and Machine Learning\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-b8f9b31 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b8f9b31\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-79ce7d44\" data-id=\"79ce7d44\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-41d3fbb0 animated-fast elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"41d3fbb0\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Sikre online valg<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-676beebd elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"676beebd\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>I dag tillader nogle lande rundt om i verden online-afstemning, n\u00e5r der er valg. Estland har haft elektronisk afstemning siden 2005, og Gr\u00f8nlands valglov blev \u00e6ndret til at tillade det i 2020. Men hvordan kan vi sikre, at onlinevalg er sikre? Og hvordan kan vi skabe den n\u00f8dvendige tillid til systemet?<\/p>\n<p>Udforsk DIREC-projekter, der omhandler dette emne.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f064b55 elementor-grid-3 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-posts--thumbnail-top elementor-card-shadow-yes elementor-posts__hover-gradient elementor-widget elementor-widget-posts\" data-id=\"f064b55\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;cards_columns&quot;:&quot;3&quot;,&quot;cards_columns_tablet&quot;:&quot;2&quot;,&quot;cards_columns_mobile&quot;:&quot;1&quot;,&quot;cards_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:35,&quot;sizes&quot;:[]},&quot;cards_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"posts.cards\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-posts-container elementor-posts elementor-posts--skin-cards elementor-grid\" role=\"list\">\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-19639 post type-post status-publish format-standard has-post-thumbnail hentry category-bridge-projekt category-cybersikkerhed category-projekt tag-ws10-da tag-ws7-da tag-ws8-da\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/direc.dk\/da\/verified-voting-protocols-and-blockchains\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/direc.dk\/wp-content\/uploads\/2022\/12\/Verified-Voting-Protocols-300x169.jpg\" class=\"attachment-medium size-medium wp-image-25257\" alt=\"\" srcset=\"https:\/\/direc.dk\/wp-content\/uploads\/2022\/12\/Verified-Voting-Protocols-300x169.jpg 300w, https:\/\/direc.dk\/wp-content\/uploads\/2022\/12\/Verified-Voting-Protocols-1024x575.jpg 1024w, https:\/\/direc.dk\/wp-content\/uploads\/2022\/12\/Verified-Voting-Protocols-768x432.jpg 768w, https:\/\/direc.dk\/wp-content\/uploads\/2022\/12\/Verified-Voting-Protocols-1536x863.jpg 1536w, https:\/\/direc.dk\/wp-content\/uploads\/2022\/12\/Verified-Voting-Protocols-1200x674.jpg 1200w, https:\/\/direc.dk\/wp-content\/uploads\/2022\/12\/Verified-Voting-Protocols.jpg 1920w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/direc.dk\/da\/verified-voting-protocols-and-blockchains\/\" >\n\t\t\t\tVerified Voting Protocols and Blockchains\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-16089 post type-post status-publish format-standard has-post-thumbnail hentry category-bridge-projekt category-cybersikkerhed category-projekt tag-ws8-da\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/direc.dk\/da\/privacy-preserving-and-software-independent-voting-protocols\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/direc.dk\/wp-content\/uploads\/2022\/08\/Trust-through-software-independence-300x169.jpg\" class=\"attachment-medium size-medium wp-image-25330\" alt=\"\" srcset=\"https:\/\/direc.dk\/wp-content\/uploads\/2022\/08\/Trust-through-software-independence-300x169.jpg 300w, https:\/\/direc.dk\/wp-content\/uploads\/2022\/08\/Trust-through-software-independence-1024x576.jpg 1024w, https:\/\/direc.dk\/wp-content\/uploads\/2022\/08\/Trust-through-software-independence-768x432.jpg 768w, https:\/\/direc.dk\/wp-content\/uploads\/2022\/08\/Trust-through-software-independence-1536x864.jpg 1536w, https:\/\/direc.dk\/wp-content\/uploads\/2022\/08\/Trust-through-software-independence-1200x675.jpg 1200w, https:\/\/direc.dk\/wp-content\/uploads\/2022\/08\/Trust-through-software-independence.jpg 1920w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/direc.dk\/da\/privacy-preserving-and-software-independent-voting-protocols\/\" >\n\t\t\t\tTrust through Software Independence and Program Verification\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-a5d0b59 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a5d0b59\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3952303\" data-id=\"3952303\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e14d4f0 animated-fast elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"e14d4f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Nyheder<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-dfdbfa9 elementor-section-content-middle elementor-reverse-mobile elementor-reverse-tablet elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"dfdbfa9\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3f5c5a8\" data-id=\"3f5c5a8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-41095d8 animated-fast elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"41095d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Andre indsatsomr\u00e5der<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a032f6 elementor-align-left elementor-widget elementor-widget-button\" data-id=\"2a032f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/direc.dk\/da\/digitalisering-og-den-groenne-omstilling\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Klimaforandringer<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d76bc75 elementor-align-left elementor-widget elementor-widget-button\" data-id=\"d76bc75\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/direc.dk\/da\/digital-transformation\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Fremtidens arbejdsplads<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6f0700d elementor-align-left elementor-widget elementor-widget-button\" data-id=\"6f0700d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/direc.dk\/da\/digital-sundhed\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Digital sundhed<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-851e1b7 elementor-align-left elementor-widget elementor-widget-button\" data-id=\"851e1b7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/direc.dk\/da\/direc-innovation-og-ivaerksaetteri\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Digitale tech startups<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-79cc657 elementor-align-left elementor-widget elementor-widget-button\" data-id=\"79cc657\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/direc.dk\/da\/projekter\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Alle projekter<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"","protected":false},"author":7,"featured_media":22716,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-22616","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersikkerhed - DIREC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/direc.dk\/da\/cybersikkerhed\/\" \/>\n<meta property=\"og:locale\" content=\"da_DK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersikkerhed - DIREC\" \/>\n<meta property=\"og:url\" content=\"https:\/\/direc.dk\/da\/cybersikkerhed\/\" \/>\n<meta property=\"og:site_name\" content=\"DIREC\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-06T07:21:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/direc.dk\/wp-content\/uploads\/2023\/03\/Cybersecuirty-matthew-henry-fPxOowbR6ls-unsplash.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1\" \/>\n\t<meta property=\"og:image:height\" content=\"1\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimeret l\u00e6setid\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/direc.dk\\\/da\\\/cybersikkerhed\\\/\",\"url\":\"https:\\\/\\\/direc.dk\\\/da\\\/cybersikkerhed\\\/\",\"name\":\"Cybersikkerhed - DIREC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/direc.dk\\\/da\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/direc.dk\\\/da\\\/cybersikkerhed\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/direc.dk\\\/da\\\/cybersikkerhed\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/direc.dk\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Cybersecuirty-matthew-henry-fPxOowbR6ls-unsplash.png\",\"datePublished\":\"2023-03-17T11:32:57+00:00\",\"dateModified\":\"2025-10-06T07:21:10+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/direc.dk\\\/da\\\/cybersikkerhed\\\/#breadcrumb\"},\"inLanguage\":\"da-DK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/direc.dk\\\/da\\\/cybersikkerhed\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\\\/\\\/direc.dk\\\/da\\\/cybersikkerhed\\\/#primaryimage\",\"url\":\"https:\\\/\\\/direc.dk\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Cybersecuirty-matthew-henry-fPxOowbR6ls-unsplash.png\",\"contentUrl\":\"https:\\\/\\\/direc.dk\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Cybersecuirty-matthew-henry-fPxOowbR6ls-unsplash.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/direc.dk\\\/da\\\/cybersikkerhed\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/direc.dk\\\/da\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersikkerhed\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/direc.dk\\\/da\\\/#website\",\"url\":\"https:\\\/\\\/direc.dk\\\/da\\\/\",\"name\":\"DIREC\",\"description\":\"Digital Research Centre Denmark\",\"publisher\":{\"@id\":\"https:\\\/\\\/direc.dk\\\/da\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/direc.dk\\\/da\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"da-DK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/direc.dk\\\/da\\\/#organization\",\"name\":\"DIREC\",\"url\":\"https:\\\/\\\/direc.dk\\\/da\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\\\/\\\/direc.dk\\\/da\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/direc.dk\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/DIREC_logo_2023_bla.png\",\"contentUrl\":\"https:\\\/\\\/direc.dk\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/DIREC_logo_2023_bla.png\",\"width\":2786,\"height\":786,\"caption\":\"DIREC\"},\"image\":{\"@id\":\"https:\\\/\\\/direc.dk\\\/da\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersikkerhed - DIREC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/direc.dk\/da\/cybersikkerhed\/","og_locale":"da_DK","og_type":"article","og_title":"Cybersikkerhed - DIREC","og_url":"https:\/\/direc.dk\/da\/cybersikkerhed\/","og_site_name":"DIREC","article_modified_time":"2025-10-06T07:21:10+00:00","og_image":[{"url":"https:\/\/direc.dk\/wp-content\/uploads\/2023\/03\/Cybersecuirty-matthew-henry-fPxOowbR6ls-unsplash.png","width":1,"height":1,"type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimeret l\u00e6setid":"3 minutter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/direc.dk\/da\/cybersikkerhed\/","url":"https:\/\/direc.dk\/da\/cybersikkerhed\/","name":"Cybersikkerhed - DIREC","isPartOf":{"@id":"https:\/\/direc.dk\/da\/#website"},"primaryImageOfPage":{"@id":"https:\/\/direc.dk\/da\/cybersikkerhed\/#primaryimage"},"image":{"@id":"https:\/\/direc.dk\/da\/cybersikkerhed\/#primaryimage"},"thumbnailUrl":"https:\/\/direc.dk\/wp-content\/uploads\/2023\/03\/Cybersecuirty-matthew-henry-fPxOowbR6ls-unsplash.png","datePublished":"2023-03-17T11:32:57+00:00","dateModified":"2025-10-06T07:21:10+00:00","breadcrumb":{"@id":"https:\/\/direc.dk\/da\/cybersikkerhed\/#breadcrumb"},"inLanguage":"da-DK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/direc.dk\/da\/cybersikkerhed\/"]}]},{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/direc.dk\/da\/cybersikkerhed\/#primaryimage","url":"https:\/\/direc.dk\/wp-content\/uploads\/2023\/03\/Cybersecuirty-matthew-henry-fPxOowbR6ls-unsplash.png","contentUrl":"https:\/\/direc.dk\/wp-content\/uploads\/2023\/03\/Cybersecuirty-matthew-henry-fPxOowbR6ls-unsplash.png"},{"@type":"BreadcrumbList","@id":"https:\/\/direc.dk\/da\/cybersikkerhed\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/direc.dk\/da\/"},{"@type":"ListItem","position":2,"name":"Cybersikkerhed"}]},{"@type":"WebSite","@id":"https:\/\/direc.dk\/da\/#website","url":"https:\/\/direc.dk\/da\/","name":"DIREC","description":"Digital Research Centre Denmark","publisher":{"@id":"https:\/\/direc.dk\/da\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/direc.dk\/da\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"da-DK"},{"@type":"Organization","@id":"https:\/\/direc.dk\/da\/#organization","name":"DIREC","url":"https:\/\/direc.dk\/da\/","logo":{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/direc.dk\/da\/#\/schema\/logo\/image\/","url":"https:\/\/direc.dk\/wp-content\/uploads\/2021\/02\/DIREC_logo_2023_bla.png","contentUrl":"https:\/\/direc.dk\/wp-content\/uploads\/2021\/02\/DIREC_logo_2023_bla.png","width":2786,"height":786,"caption":"DIREC"},"image":{"@id":"https:\/\/direc.dk\/da\/#\/schema\/logo\/image\/"}}]}},"dynamic_page_title":"","dynamic_page_description":"","dynamic_page_partners":"","dynamic_page_scientific_impact":"","dynamic_page_people":"","dynamic_page_project_period":"","dynamic_page_funding":"","dynamic_page_publications":"","dynamic_page_cover_image":"","_links":{"self":[{"href":"https:\/\/direc.dk\/da\/wp-json\/wp\/v2\/pages\/22616","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/direc.dk\/da\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/direc.dk\/da\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/direc.dk\/da\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/direc.dk\/da\/wp-json\/wp\/v2\/comments?post=22616"}],"version-history":[{"count":3,"href":"https:\/\/direc.dk\/da\/wp-json\/wp\/v2\/pages\/22616\/revisions"}],"predecessor-version":[{"id":37522,"href":"https:\/\/direc.dk\/da\/wp-json\/wp\/v2\/pages\/22616\/revisions\/37522"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/direc.dk\/da\/wp-json\/wp\/v2\/media\/22716"}],"wp:attachment":[{"href":"https:\/\/direc.dk\/da\/wp-json\/wp\/v2\/media?parent=22616"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}