{"version":"1.0","provider_name":"Nasmedia.id","provider_url":"https:\/\/nasmedia.id\/store","title":"Cyber Security: Thrive Technology, Review And Research - Nasmedia.id","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"PYmxQ3rguG\"><a href=\"https:\/\/nasmedia.id\/store\/cyber-security-thrive-technology-review-and-research\/\">Cyber Security: Thrive Technology, Review And Research<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/nasmedia.id\/store\/cyber-security-thrive-technology-review-and-research\/embed\/#?secret=PYmxQ3rguG\" width=\"600\" height=\"338\" title=\"&#8220;Cyber Security: Thrive Technology, Review And Research&#8221; &#8212; Nasmedia.id\" data-secret=\"PYmxQ3rguG\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/nasmedia.id\/store\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/nasmedia.id\/store\/wp-content\/uploads\/2025\/06\/WhatsApp-Image-2025-06-16-at-14.42.14-dpn.jpeg","thumbnail_width":619,"thumbnail_height":883,"description":"Dr. Eddy Yansen, MSC Retno Setiawati, S.H Benny Rahmat Rp.70.000 Deskripsi Cyber Security, atau keamanan cyber, adalah praktik melindungi sistem komputer, jaringan, perangkat lunak, dan data dari serangan digital, akses yang tidak sah, kerusakan, atau pencurian. Ini melibatkan berbagai teknologi, proses, dan kontrol yang dirancang untuk menjaga kerahasiaan, integritas, dan ketersediaan informasi. Keamanan cyber mencakup&hellip;&nbsp;"}