{"version":"1.0","provider_name":"Information Technology Office - Hong Kong Metropolitan University","provider_url":"https:\/\/www-uat.hkmu.edu.hk\/ito\/sc\/","author_name":"user","author_url":"https:\/\/www-uat.hkmu.edu.hk\/ito\/sc\/author\/user\/","title":"\u4e3b\u9875","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"D7ttJXxCOK\"><a href=\"https:\/\/www-uat.hkmu.edu.hk\/ito\/sc\/\">\u4e3b\u9875<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www-uat.hkmu.edu.hk\/ito\/sc\/embed\/#?secret=D7ttJXxCOK\" width=\"600\" height=\"338\" title=\"&#8220;\u4e3b\u9875&#8221; &#8212; Information Technology Office - Hong Kong Metropolitan University\" data-secret=\"D7ttJXxCOK\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/*! This file is auto-generated *\/\n!function(c,d){\"use strict\";var e=!1,o=!1;if(d.querySelector)if(c.addEventListener)e=!0;if(c.wp=c.wp||{},c.wp.receiveEmbedMessage);else if(c.wp.receiveEmbedMessage=function(e){var t=e.data;if(!t);else if(!(t.secret||t.message||t.value));else if(\/[^a-zA-Z0-9]\/.test(t.secret));else{for(var r,s,a,i=d.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),n=d.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),o=new RegExp(\"^https?:$\",\"i\"),l=0;l<n.length;l++)n[l].style.display=\"none\";for(l=0;l<i.length;l++)if(r=i[l],e.source!==r.contentWindow);else{if(r.removeAttribute(\"style\"),\"height\"===t.message){if(1e3<(s=parseInt(t.value,10)))s=1e3;else if(~~s<200)s=200;r.height=s}if(\"link\"===t.message)if(s=d.createElement(\"a\"),a=d.createElement(\"a\"),s.href=r.getAttribute(\"src\"),a.href=t.value,!o.test(a.protocol));else if(a.host===s.host)if(d.activeElement===r)c.top.location.href=t.value}}},e)c.addEventListener(\"message\",c.wp.receiveEmbedMessage,!1),d.addEventListener(\"DOMContentLoaded\",t,!1),c.addEventListener(\"load\",t,!1);function t(){if(o);else{o=!0;for(var e,t,r,s=-1!==navigator.appVersion.indexOf(\"MSIE 10\"),a=!!navigator.userAgent.match(\/Trident.*rv:11\\.\/),i=d.querySelectorAll(\"iframe.wp-embedded-content\"),n=0;n<i.length;n++){if(!(r=(t=i[n]).getAttribute(\"data-secret\")))r=Math.random().toString(36).substr(2,10),t.src+=\"#?secret=\"+r,t.setAttribute(\"data-secret\",r);if(s||a)(e=t.cloneNode(!0)).removeAttribute(\"security\"),t.parentNode.replaceChild(e,t);t.contentWindow.postMessage({message:\"ready\",secret:r},\"*\")}}}}(window,document);\n<\/script>\n","description":"\u8d44\u8baf\u79d1\u6280\u5904 Previous Next \u7126\u70b9 \u8d44\u8baf\u79d1\u6280\u5904 \u8d44\u8baf\u79d1\u6280\u90e8\u7684\u6210\u7acb\u81f4\u529b\u4e3a\u5927\u5b66\u63d0\u4f9b\u521b\u65b0\u53ca\u53ef\u9760\u7684IT \u670d\u52a1\u3002\u627f\u8bfa\u5bf9\u5927\u5b66\u63d0\u4f9b\u6559\u5bfc\u3001\u5b66\u4e60\u3001\u7814\u7a76\u53ca\u884c\u653f\u7b49\u63d0\u4f9b\u652f\u63f4\u670d\u52a1\uff0c\u5e76\u900f\u8fc7\u3001\u5efa\u7acb\u3001\u63a8\u51fa\u3001\u6539\u5584\u3001\u4e13\u4e1a\u8c18\u8be2\u53ca\u63d0\u5347IT\u7cfb\u7edf\u3001\u57fa\u5efa\u3001\u8bbe\u65bd\u53ca\u670d\u52a1\u5b9e\u8df5\u3002\u00a0\u00a0 \u901a\u77e5 \u66f4\u591a \u8d44\u8baf\u5b89\u5168\u4fe1\u606f Information Security","thumbnail_url":"https:\/\/www-uat.hkmu.edu.hk\/wp-content\/uploads\/sites\/10\/2021\/06\/phishingicon1.jpg"}