{"id":85533,"date":"2020-05-12T09:26:52","date_gmt":"2020-05-12T07:26:52","guid":{"rendered":"https:\/\/territorialchallenges.com\/?p=85533"},"modified":"2020-05-12T09:26:52","modified_gmt":"2020-05-12T07:26:52","slug":"industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee","status":"publish","type":"post","link":"https:\/\/territorialchallenges.com\/pt\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/","title":{"rendered":"Ind\u00fastria 4.0: Ciberseguran\u00e7a para uma ind\u00fastria de manufatura redesenhada"},"content":{"rendered":"<p>Sistemas de TI legados, vinculados a novas conex\u00f5es, demonstraram vulnerabilidades nas instala\u00e7\u00f5es das ind\u00fastrias do futuro. Ataques cibern\u00e9ticos podem n\u00e3o estar no topo da lista de prioridades dos instaladores de software, considerando os riscos enfrentados pelos fabricantes que s\u00e3o clientes. Em vez disso, os instaladores podem gravitar\u2026 <\/p>\n<div class=\"pmpro_content_message\">Artigo dispon\u00edvel somente para assinantes.<br \/><a href=\"https:\/\/territorialchallenges.com\/wp-login.php\">Conecte-se<\/a><br \/><a href=\"https:\/\/territorialchallenges.com\/pt\/wp-login.php\/?action=register\">Registrar<\/a><\/div>","protected":false},"excerpt":{"rendered":"<p>Les anciens syst\u00e8mes informatiques li\u00e9s aux nouvelles connexions ont d\u00e9montr\u00e9 des vuln\u00e9rabilit\u00e9s dans les installations des industries du futur. Les cyberattaques peuvent ne pas figurer en t\u00eate de liste des installateurs de logiciels lors de l&rsquo;examen des risques auxquels sont confront\u00e9s les fabricants qui sont les clients. Au lieu de cela, les installateurs peuvent graviter... <\/p>\n<div class=\"pmpro_content_message\">Artigo dispon\u00edvel somente para assinantes.<br \/><a href=\"https:\/\/territorialchallenges.com\/wp-login.php\">Conecte-se<\/a><br \/><a href=\"https:\/\/territorialchallenges.com\/pt\/wp-login.php\/?action=register\">Registrar<\/a><\/div>","protected":false},"author":11,"featured_media":85534,"comment_status":"open","ping_status":"open","sticky":true,"template":"","format":"standard","meta":{"pmpro_default_level":0,"footnotes":""},"categories":[17,127],"tags":[],"blocksy_meta":"","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Industrie 4.0: la cybers\u00e9curit\u00e9 pour une industrie manufacturi\u00e8re repens\u00e9e - Territorial Challenges<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/territorialchallenges.com\/pt\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/\" \/>\n<meta property=\"og:locale\" content=\"pt_PT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Industrie 4.0: la cybers\u00e9curit\u00e9 pour une industrie manufacturi\u00e8re repens\u00e9e - Territorial Challenges\" \/>\n<meta property=\"og:description\" content=\"Les anciens syst\u00e8mes informatiques li\u00e9s aux nouvelles connexions ont d\u00e9montr\u00e9 des vuln\u00e9rabilit\u00e9s dans les installations des industries du futur. Les cyberattaques peuvent ne pas figurer en t\u00eate de liste des installateurs de logiciels lors de l&rsquo;examen des risques auxquels sont confront\u00e9s les fabricants qui sont les clients. Au lieu de cela, les installateurs peuvent graviter [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/territorialchallenges.com\/pt\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/\" \/>\n<meta property=\"og:site_name\" content=\"Territorial Challenges\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-12T07:26:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/territorialchallenges.com\/wp-content\/uploads\/2020\/05\/robot-2791671_1920.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ni.abdi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Ni.abdi\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"ni.abdi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo estimado de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/\"},\"author\":{\"name\":\"ni.abdi\",\"@id\":\"https:\/\/territorialchallenges.com\/#\/schema\/person\/098f145c7c61a021c425e010f840080f\"},\"headline\":\"Industrie 4.0: la cybers\u00e9curit\u00e9 pour une industrie manufacturi\u00e8re repens\u00e9e\",\"datePublished\":\"2020-05-12T07:26:52+00:00\",\"dateModified\":\"2020-05-12T07:26:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/\"},\"wordCount\":722,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/territorialchallenges.com\/#organization\"},\"articleSection\":[\"Industrie 5.0\",\"Actualit\u00e9 Europe\"],\"inLanguage\":\"pt-PT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/\",\"url\":\"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/\",\"name\":\"Industrie 4.0: la cybers\u00e9curit\u00e9 pour une industrie manufacturi\u00e8re repens\u00e9e - Territorial Challenges\",\"isPartOf\":{\"@id\":\"https:\/\/territorialchallenges.com\/#website\"},\"datePublished\":\"2020-05-12T07:26:52+00:00\",\"dateModified\":\"2020-05-12T07:26:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/#breadcrumb\"},\"inLanguage\":\"pt-PT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/territorialchallenges.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Industrie 4.0: la cybers\u00e9curit\u00e9 pour une industrie manufacturi\u00e8re repens\u00e9e\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/territorialchallenges.com\/#website\",\"url\":\"https:\/\/territorialchallenges.com\/\",\"name\":\"Territorial Challenges\",\"description\":\"Veille Internationale - Strat\u00e9gie Intelligentes - Bonnes pratiques\",\"publisher\":{\"@id\":\"https:\/\/territorialchallenges.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/territorialchallenges.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"pt-PT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/territorialchallenges.com\/#organization\",\"name\":\"Territorial Challenges\",\"url\":\"https:\/\/territorialchallenges.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/territorialchallenges.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/territorialchallenges.com\/wp-content\/uploads\/2023\/10\/logo-1.png\",\"contentUrl\":\"https:\/\/territorialchallenges.com\/wp-content\/uploads\/2023\/10\/logo-1.png\",\"width\":1832,\"height\":576,\"caption\":\"Territorial Challenges\"},\"image\":{\"@id\":\"https:\/\/territorialchallenges.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/territorialchallenges.com\/#\/schema\/person\/098f145c7c61a021c425e010f840080f\",\"name\":\"ni.abdi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/territorialchallenges.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2a2f2491f3c80039986ba989b1e4b510?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2a2f2491f3c80039986ba989b1e4b510?s=96&d=identicon&r=g\",\"caption\":\"ni.abdi\"},\"sameAs\":[\"https:\/\/twitter.com\/Ni.abdi\"],\"url\":\"https:\/\/territorialchallenges.com\/pt\/author\/ni-abdi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Industrie 4.0: la cybers\u00e9curit\u00e9 pour une industrie manufacturi\u00e8re repens\u00e9e - Territorial Challenges","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/territorialchallenges.com\/pt\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/","og_locale":"pt_PT","og_type":"article","og_title":"Industrie 4.0: la cybers\u00e9curit\u00e9 pour une industrie manufacturi\u00e8re repens\u00e9e - Territorial Challenges","og_description":"Les anciens syst\u00e8mes informatiques li\u00e9s aux nouvelles connexions ont d\u00e9montr\u00e9 des vuln\u00e9rabilit\u00e9s dans les installations des industries du futur. Les cyberattaques peuvent ne pas figurer en t\u00eate de liste des installateurs de logiciels lors de l&rsquo;examen des risques auxquels sont confront\u00e9s les fabricants qui sont les clients. Au lieu de cela, les installateurs peuvent graviter [&hellip;]","og_url":"https:\/\/territorialchallenges.com\/pt\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/","og_site_name":"Territorial Challenges","article_published_time":"2020-05-12T07:26:52+00:00","og_image":[{"width":1920,"height":1280,"url":"https:\/\/territorialchallenges.com\/wp-content\/uploads\/2020\/05\/robot-2791671_1920.jpg","type":"image\/jpeg"}],"author":"ni.abdi","twitter_card":"summary_large_image","twitter_creator":"@Ni.abdi","twitter_misc":{"Escrito por":"ni.abdi","Tempo estimado de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/#article","isPartOf":{"@id":"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/"},"author":{"name":"ni.abdi","@id":"https:\/\/territorialchallenges.com\/#\/schema\/person\/098f145c7c61a021c425e010f840080f"},"headline":"Industrie 4.0: la cybers\u00e9curit\u00e9 pour une industrie manufacturi\u00e8re repens\u00e9e","datePublished":"2020-05-12T07:26:52+00:00","dateModified":"2020-05-12T07:26:52+00:00","mainEntityOfPage":{"@id":"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/"},"wordCount":722,"commentCount":0,"publisher":{"@id":"https:\/\/territorialchallenges.com\/#organization"},"articleSection":["Industrie 5.0","Actualit\u00e9 Europe"],"inLanguage":"pt-PT"},{"@type":"WebPage","@id":"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/","url":"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/","name":"Industrie 4.0: la cybers\u00e9curit\u00e9 pour une industrie manufacturi\u00e8re repens\u00e9e - Territorial Challenges","isPartOf":{"@id":"https:\/\/territorialchallenges.com\/#website"},"datePublished":"2020-05-12T07:26:52+00:00","dateModified":"2020-05-12T07:26:52+00:00","breadcrumb":{"@id":"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/#breadcrumb"},"inLanguage":"pt-PT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/territorialchallenges.com\/2020\/05\/12\/industrie-4-0-la-cybersecurite-pour-une-industrie-manufacturiere-repensee\/85533\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/territorialchallenges.com\/"},{"@type":"ListItem","position":2,"name":"Industrie 4.0: la cybers\u00e9curit\u00e9 pour une industrie manufacturi\u00e8re repens\u00e9e"}]},{"@type":"WebSite","@id":"https:\/\/territorialchallenges.com\/#website","url":"https:\/\/territorialchallenges.com\/","name":"Desafios territoriais","description":"Monitoramento Internacional - Estrat\u00e9gias Inteligentes - Melhores Pr\u00e1ticas","publisher":{"@id":"https:\/\/territorialchallenges.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/territorialchallenges.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"pt-PT"},{"@type":"Organization","@id":"https:\/\/territorialchallenges.com\/#organization","name":"Desafios territoriais","url":"https:\/\/territorialchallenges.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/territorialchallenges.com\/#\/schema\/logo\/image\/","url":"https:\/\/territorialchallenges.com\/wp-content\/uploads\/2023\/10\/logo-1.png","contentUrl":"https:\/\/territorialchallenges.com\/wp-content\/uploads\/2023\/10\/logo-1.png","width":1832,"height":576,"caption":"Territorial Challenges"},"image":{"@id":"https:\/\/territorialchallenges.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/territorialchallenges.com\/#\/schema\/person\/098f145c7c61a021c425e010f840080f","name":"ni.abdi","image":{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/territorialchallenges.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2a2f2491f3c80039986ba989b1e4b510?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2a2f2491f3c80039986ba989b1e4b510?s=96&d=identicon&r=g","caption":"ni.abdi"},"sameAs":["https:\/\/twitter.com\/Ni.abdi"],"url":"https:\/\/territorialchallenges.com\/pt\/author\/ni-abdi\/"}]}},"_links":{"self":[{"href":"https:\/\/territorialchallenges.com\/pt\/wp-json\/wp\/v2\/posts\/85533"}],"collection":[{"href":"https:\/\/territorialchallenges.com\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/territorialchallenges.com\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/territorialchallenges.com\/pt\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/territorialchallenges.com\/pt\/wp-json\/wp\/v2\/comments?post=85533"}],"version-history":[{"count":1,"href":"https:\/\/territorialchallenges.com\/pt\/wp-json\/wp\/v2\/posts\/85533\/revisions"}],"predecessor-version":[{"id":85538,"href":"https:\/\/territorialchallenges.com\/pt\/wp-json\/wp\/v2\/posts\/85533\/revisions\/85538"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/territorialchallenges.com\/pt\/wp-json\/wp\/v2\/media\/85534"}],"wp:attachment":[{"href":"https:\/\/territorialchallenges.com\/pt\/wp-json\/wp\/v2\/media?parent=85533"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/territorialchallenges.com\/pt\/wp-json\/wp\/v2\/categories?post=85533"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/territorialchallenges.com\/pt\/wp-json\/wp\/v2\/tags?post=85533"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}