{"id":36077,"date":"2021-07-20T08:30:34","date_gmt":"2021-07-20T11:30:34","guid":{"rendered":"https:\/\/abes.org.br\/?p=36077"},"modified":"2021-07-19T11:38:43","modified_gmt":"2021-07-19T14:38:43","slug":"fabricas-inteligentes-enfrentam-um-dilema-de-seguranca-ao-lidar-com-as-emergentes-ameacas-ao-5g","status":"publish","type":"post","link":"https:\/\/abes.org.br\/en\/fabricas-inteligentes-enfrentam-um-dilema-de-seguranca-ao-lidar-com-as-emergentes-ameacas-ao-5g\/","title":{"rendered":"Smart Factories Face a Security Dilemma in Dealing with Emerging 5G Threats"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-36078 aligncenter\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/07\/PESQUISA-TREND-MICRO.jpg\" alt=\"\" width=\"531\" height=\"297\" srcset=\"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/07\/PESQUISA-TREND-MICRO.jpg 531w, https:\/\/abes.org.br\/wp-content\/uploads\/2021\/07\/PESQUISA-TREND-MICRO-480x268.jpg 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 531px, 100vw\" \/><\/p>\n<p><em>Trend Micro research, conducted by Proof of Concept (PoC), reveals the possibility of multiple attacks on connected systems<\/em><\/p>\n<p>THE\u00a0<strong>Trend Micro<\/strong>, a world leader in cybersecurity solutions, conducted in-depth research highlighting the\u00a0<strong>new threats to 4G\/5G campus networks, many of which capitalize on the difficulty organizations have in remediating critical Operating Technology (OT) environments.<\/strong>\u00a0The report details various attack scenarios and possible mitigations using a test environment designed to mimic an intelligent factory network.<\/p>\n<p>\u201cManufacturers are at the forefront of deploying the IIoT (Industrial Internet of Things), and are gearing up to harness the power of 5G connectivity everywhere to drive greater speed, security and efficiency. But with the new technology also come new threats to the challenges assumed\u201d, highlights Yohei Ishihara, Security Evangelist at Trend Micro. \u201cAs the report warns, many are stuck in a dead end \u2014 unable to afford the downtime necessary to fix critical system vulnerabilities that could otherwise be exploited. Fortunately, our extensive research also highlights multiple mitigations and best practices to protect smart factories today and tomorrow.\u201d<\/p>\n<p>The report identifies several key entry points for attackers to compromise a core 4G\/5G network:<\/p>\n<p>\u2022\u00a0<strong>Servers that host core network services:<\/strong>\u00a0targeting vulnerabilities and weak passwords on these standard COTS x86 servers;<br \/>\n\u2022\u00a0<strong>VMs or containers:<\/strong>\u00a0these can also be exposed if the\u00a0<em>patches<\/em>\u00a0not applied promptly;<br \/>\n\u2022<strong>Network infrastructure:<\/strong>\u00a0devices are often forgotten during cycles of\u00a0<em>patch<\/em>;<br \/>\n\u2022\u00a0<strong>Base stations:<\/strong>\u00a0also contain\u00a0<em>firmware<\/em>\u00a0(embedded software) that needs to be updated from time to time.<u><\/u><u><\/u><\/p>\n<p>Once the attacker enters the core network from any of these entry points, it will move sideways in an attempt to intercept and alter the data packets. By attacking intelligent factory industrial control systems, such as the one simulated at the test site, attackers can steal sensitive data, sabotage production, or demand rescue from companies for information hijacking.<u><\/u><u><\/u><\/p>\n<p>Of the\u00a0<strong>11 Attack Scenarios Evaluated<\/strong>, which showed greater damage power involves the servers\u00a0<em>Microsoft Remote Desktop Protocol<\/em>\u00a0(RDP \u2013 Remote Desktop Protocol), which are commonly used by IT and field engineers. Upgrading to 5G does not automatically protect RDP traffic, so hackers can use this access to download malware and\u00a0<em>ransomware<\/em>, or directly hijack industrial control systems. RDP v 10.0 is the most secure version and may offer some protections against intrusion, but again it can be difficult.<u><\/u><u><\/u><\/p>\n<p>Building a mobile network in an enterprise environment involves both end users and multiple stakeholders, including service providers and integrators. Furthermore, private 4G\/5G networks are large-scale infrastructures with a long life, so once built they are difficult to replace or modify. Therefore, it is essential to implement \u201csecurity by default\u201d to identify and mitigate security risks in the design phase of the project.<\/p>\n<p>To read the report\u00a0<strong>Attacks on 4G\/5G Core Networks: Industrial IoT Risks,\u00a0<\/strong>click<strong>\u00a0<\/strong><a href=\"https:\/\/www.trendmicro.com\/pt_br\/business\/solutions\/iot\/5g-and-iot.html\" target=\"_blank\" rel=\"noopener noreferrer\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/na01.safelinks.protection.outlook.com\/?url%3Dhttps%253A%252F%252Fwww.trendmicro.com%252Fpt_br%252Fbusiness%252Fsolutions%252Fiot%252F5g-and-iot.html%26data%3D04%257C01%257C%257C906d8667d287467dfac808d94a9cab71%257C84df9e7fe9f640afb435aaaaaaaaaaaa%257C1%257C0%257C637622859023033959%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C1000%26sdata%3DgDPK9tW9iKJbs9m3Sl%252FzUJpuVD1W%252FsFXi0p9V%252F4IHqU%253D%26reserved%3D0&amp;source=gmail&amp;ust=1626791415624000&amp;usg=AFQjCNFKjNuDlcwU7uIQZYJYrRYJj-gonw\"><strong>ON HERE<\/strong><\/a><strong>.<\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>Pesquisa da Trend Micro, realizada por Prova de Conceito (PoC), revela possibilidade de v\u00e1rios ataques em sistemas conectados A\u00a0Trend Micro, l\u00edder mundial em solu\u00e7\u00f5es de ciberseguran\u00e7a, realizou uma pesquisa aprofundada destacando as\u00a0novas amea\u00e7as \u00e0s redes de campus 4G\/5G, muitas das quais capitalizam a dificuldade que as organiza\u00e7\u00f5es t\u00eam em corrigir ambientes cr\u00edticos de Tecnologia Operacional [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[39,19],"tags":[109,1906,1905,120,1904],"class_list":["post-36077","post","type-post","status-publish","format-standard","hentry","category-coluna-4","category-ultimas-noticias","tag-5g","tag-desktop-remoto","tag-fabricas-inteligentes","tag-novas-tecnologias","tag-servidores"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>F\u00e1bricas inteligentes enfrentam um dilema de seguran\u00e7a ao lidar com as emergentes amea\u00e7as ao 5G - ABES<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abes.org.br\/en\/fabricas-inteligentes-enfrentam-um-dilema-de-seguranca-ao-lidar-com-as-emergentes-ameacas-ao-5g\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"F\u00e1bricas inteligentes enfrentam um dilema de seguran\u00e7a ao lidar com as emergentes amea\u00e7as ao 5G - ABES\" \/>\n<meta property=\"og:description\" content=\"Pesquisa da Trend Micro, realizada por Prova de Conceito (PoC), revela possibilidade de v\u00e1rios ataques em sistemas conectados A\u00a0Trend Micro, l\u00edder mundial em solu\u00e7\u00f5es de ciberseguran\u00e7a, realizou uma pesquisa aprofundada destacando as\u00a0novas amea\u00e7as \u00e0s redes de campus 4G\/5G, muitas das quais capitalizam a dificuldade que as organiza\u00e7\u00f5es t\u00eam em corrigir ambientes cr\u00edticos de Tecnologia Operacional [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abes.org.br\/en\/fabricas-inteligentes-enfrentam-um-dilema-de-seguranca-ao-lidar-com-as-emergentes-ameacas-ao-5g\/\" \/>\n<meta property=\"og:site_name\" content=\"ABES\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ABES.software\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-20T11:30:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/07\/PESQUISA-TREND-MICRO.jpg\" \/>\n<meta name=\"author\" content=\"Editor ABES\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:site\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor ABES\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/fabricas-inteligentes-enfrentam-um-dilema-de-seguranca-ao-lidar-com-as-emergentes-ameacas-ao-5g\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/fabricas-inteligentes-enfrentam-um-dilema-de-seguranca-ao-lidar-com-as-emergentes-ameacas-ao-5g\\\/\"},\"author\":{\"name\":\"Editor ABES\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\"},\"headline\":\"F\u00e1bricas inteligentes enfrentam um dilema de seguran\u00e7a ao lidar com as emergentes amea\u00e7as ao 5G\",\"datePublished\":\"2021-07-20T11:30:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/fabricas-inteligentes-enfrentam-um-dilema-de-seguranca-ao-lidar-com-as-emergentes-ameacas-ao-5g\\\/\"},\"wordCount\":592,\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/fabricas-inteligentes-enfrentam-um-dilema-de-seguranca-ao-lidar-com-as-emergentes-ameacas-ao-5g\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/PESQUISA-TREND-MICRO.jpg\",\"keywords\":[\"5G\",\"Desktop Remoto\",\"f\u00e1bricas inteligentes\",\"novas tecnologias\",\"servidores\"],\"articleSection\":[\"-Coluna 4\",\"\u00daltimas not\u00edcias\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/fabricas-inteligentes-enfrentam-um-dilema-de-seguranca-ao-lidar-com-as-emergentes-ameacas-ao-5g\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/fabricas-inteligentes-enfrentam-um-dilema-de-seguranca-ao-lidar-com-as-emergentes-ameacas-ao-5g\\\/\",\"name\":\"F\u00e1bricas inteligentes enfrentam um dilema de seguran\u00e7a ao lidar com as emergentes amea\u00e7as ao 5G - ABES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/fabricas-inteligentes-enfrentam-um-dilema-de-seguranca-ao-lidar-com-as-emergentes-ameacas-ao-5g\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/fabricas-inteligentes-enfrentam-um-dilema-de-seguranca-ao-lidar-com-as-emergentes-ameacas-ao-5g\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/PESQUISA-TREND-MICRO.jpg\",\"datePublished\":\"2021-07-20T11:30:34+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/fabricas-inteligentes-enfrentam-um-dilema-de-seguranca-ao-lidar-com-as-emergentes-ameacas-ao-5g\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abes.org.br\\\/fabricas-inteligentes-enfrentam-um-dilema-de-seguranca-ao-lidar-com-as-emergentes-ameacas-ao-5g\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/fabricas-inteligentes-enfrentam-um-dilema-de-seguranca-ao-lidar-com-as-emergentes-ameacas-ao-5g\\\/#primaryimage\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/PESQUISA-TREND-MICRO.jpg\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/PESQUISA-TREND-MICRO.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/fabricas-inteligentes-enfrentam-um-dilema-de-seguranca-ao-lidar-com-as-emergentes-ameacas-ao-5g\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/abes.org.br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"F\u00e1bricas inteligentes enfrentam um dilema de seguran\u00e7a ao lidar com as emergentes amea\u00e7as ao 5G\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"name\":\"ABES\",\"description\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abes.org.br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\",\"name\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"width\":324,\"height\":70,\"caption\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ABES.software\",\"https:\\\/\\\/x.com\\\/ABES_SOFTWARE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abes-software\\\/\",\"https:\\\/\\\/www.instagram.com\\\/abes_software\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\",\"name\":\"Editor ABES\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"caption\":\"Editor ABES\"},\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/author\\\/editor-abes\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Smart factories face a security dilemma in dealing with emerging 5G threats - ABES","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abes.org.br\/en\/fabricas-inteligentes-enfrentam-um-dilema-de-seguranca-ao-lidar-com-as-emergentes-ameacas-ao-5g\/","og_locale":"en_US","og_type":"article","og_title":"F\u00e1bricas inteligentes enfrentam um dilema de seguran\u00e7a ao lidar com as emergentes amea\u00e7as ao 5G - ABES","og_description":"Pesquisa da Trend Micro, realizada por Prova de Conceito (PoC), revela possibilidade de v\u00e1rios ataques em sistemas conectados A\u00a0Trend Micro, l\u00edder mundial em solu\u00e7\u00f5es de ciberseguran\u00e7a, realizou uma pesquisa aprofundada destacando as\u00a0novas amea\u00e7as \u00e0s redes de campus 4G\/5G, muitas das quais capitalizam a dificuldade que as organiza\u00e7\u00f5es t\u00eam em corrigir ambientes cr\u00edticos de Tecnologia Operacional [&hellip;]","og_url":"https:\/\/abes.org.br\/en\/fabricas-inteligentes-enfrentam-um-dilema-de-seguranca-ao-lidar-com-as-emergentes-ameacas-ao-5g\/","og_site_name":"ABES","article_publisher":"https:\/\/www.facebook.com\/ABES.software","article_published_time":"2021-07-20T11:30:34+00:00","og_image":[{"url":"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/07\/PESQUISA-TREND-MICRO.jpg","type":"","width":"","height":""}],"author":"Editor ABES","twitter_card":"summary_large_image","twitter_creator":"@ABES_SOFTWARE","twitter_site":"@ABES_SOFTWARE","twitter_misc":{"Written by":"Editor ABES","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/abes.org.br\/fabricas-inteligentes-enfrentam-um-dilema-de-seguranca-ao-lidar-com-as-emergentes-ameacas-ao-5g\/#article","isPartOf":{"@id":"https:\/\/abes.org.br\/fabricas-inteligentes-enfrentam-um-dilema-de-seguranca-ao-lidar-com-as-emergentes-ameacas-ao-5g\/"},"author":{"name":"Editor ABES","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3"},"headline":"F\u00e1bricas inteligentes enfrentam um dilema de seguran\u00e7a ao lidar com as emergentes amea\u00e7as ao 5G","datePublished":"2021-07-20T11:30:34+00:00","mainEntityOfPage":{"@id":"https:\/\/abes.org.br\/fabricas-inteligentes-enfrentam-um-dilema-de-seguranca-ao-lidar-com-as-emergentes-ameacas-ao-5g\/"},"wordCount":592,"publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"image":{"@id":"https:\/\/abes.org.br\/fabricas-inteligentes-enfrentam-um-dilema-de-seguranca-ao-lidar-com-as-emergentes-ameacas-ao-5g\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/07\/PESQUISA-TREND-MICRO.jpg","keywords":["5G","Desktop Remoto","f\u00e1bricas inteligentes","novas tecnologias","servidores"],"articleSection":["-Coluna 4","\u00daltimas not\u00edcias"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/abes.org.br\/fabricas-inteligentes-enfrentam-um-dilema-de-seguranca-ao-lidar-com-as-emergentes-ameacas-ao-5g\/","url":"https:\/\/abes.org.br\/fabricas-inteligentes-enfrentam-um-dilema-de-seguranca-ao-lidar-com-as-emergentes-ameacas-ao-5g\/","name":"Smart factories face a security dilemma in dealing with emerging 5G threats - ABES","isPartOf":{"@id":"https:\/\/abes.org.br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/abes.org.br\/fabricas-inteligentes-enfrentam-um-dilema-de-seguranca-ao-lidar-com-as-emergentes-ameacas-ao-5g\/#primaryimage"},"image":{"@id":"https:\/\/abes.org.br\/fabricas-inteligentes-enfrentam-um-dilema-de-seguranca-ao-lidar-com-as-emergentes-ameacas-ao-5g\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/07\/PESQUISA-TREND-MICRO.jpg","datePublished":"2021-07-20T11:30:34+00:00","breadcrumb":{"@id":"https:\/\/abes.org.br\/fabricas-inteligentes-enfrentam-um-dilema-de-seguranca-ao-lidar-com-as-emergentes-ameacas-ao-5g\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abes.org.br\/fabricas-inteligentes-enfrentam-um-dilema-de-seguranca-ao-lidar-com-as-emergentes-ameacas-ao-5g\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/fabricas-inteligentes-enfrentam-um-dilema-de-seguranca-ao-lidar-com-as-emergentes-ameacas-ao-5g\/#primaryimage","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/07\/PESQUISA-TREND-MICRO.jpg","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/07\/PESQUISA-TREND-MICRO.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/abes.org.br\/fabricas-inteligentes-enfrentam-um-dilema-de-seguranca-ao-lidar-com-as-emergentes-ameacas-ao-5g\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/abes.org.br\/"},{"@type":"ListItem","position":2,"name":"F\u00e1bricas inteligentes enfrentam um dilema de seguran\u00e7a ao lidar com as emergentes amea\u00e7as ao 5G"}]},{"@type":"WebSite","@id":"https:\/\/abes.org.br\/#website","url":"https:\/\/abes.org.br\/","name":"ABES","description":"Brazilian Association of Software Companies","publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abes.org.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abes.org.br\/#organization","name":"Brazilian Association of Software Companies","url":"https:\/\/abes.org.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","width":324,"height":70,"caption":"Associa\u00e7\u00e3o Brasileira das Empresas de Software"},"image":{"@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ABES.software","https:\/\/x.com\/ABES_SOFTWARE","https:\/\/www.linkedin.com\/company\/abes-software\/","https:\/\/www.instagram.com\/abes_software\/"]},{"@type":"Person","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3","name":"ABES Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","caption":"Editor ABES"},"url":"https:\/\/abes.org.br\/en\/author\/editor-abes\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-05-02 19:03:39","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/36077","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/comments?post=36077"}],"version-history":[{"count":1,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/36077\/revisions"}],"predecessor-version":[{"id":36079,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/36077\/revisions\/36079"}],"wp:attachment":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media?parent=36077"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/categories?post=36077"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/tags?post=36077"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}