{"guid":"7614ebda-f82a-47dd-8b5b-185dde7050d1","title":"Grundlagen IT Security","subtitle":"","slug":"petit-foo-itsecurity","link":"https://www.chaospott.de","description":"In diesem Petit Foo werden Grundbegriffe der Security erläutert. Was ist der Unterschied zwischen Security und Safety? Und warum ist nicht jede Vulnerability ein ausnutzbar?","original_language":"deu","persons":["sirgoofy"],"view_count":1041,"promoted":false,"date":"2021-10-27T20:15:00.000+02:00","release_date":"2021-10-27T00:00:00.000+02:00","updated_at":"2026-04-10T12:45:07.182+02:00","tags":["petitfoo","26","2021"],"length":1304,"duration":1304,"thumb_url":"https://static.media.ccc.de/media/regional/essen/petitfoo/26-7614ebda-f82a-47dd-8b5b-185dde7050d1.jpg","poster_url":"https://static.media.ccc.de/media/regional/essen/petitfoo/26-7614ebda-f82a-47dd-8b5b-185dde7050d1_preview.jpg","timeline_url":"https://static.media.ccc.de/media/regional/essen/petitfoo/26-7614ebda-f82a-47dd-8b5b-185dde7050d1.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/regional/essen/petitfoo/26-7614ebda-f82a-47dd-8b5b-185dde7050d1.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/petit-foo-itsecurity","url":"https://api.media.ccc.de/public/events/7614ebda-f82a-47dd-8b5b-185dde7050d1","conference_title":"Chaospott - Petit Foo","conference_url":"https://api.media.ccc.de/public/conferences/petitfoo","related":[],"recordings":[{"size":105,"length":1304,"mime_type":"video/webm","language":"deu","filename":"petitfoo-26-deu-Grundlagen_IT_Security_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2021-10-27T13:22:06.819+02:00","recording_url":"https://cdn.media.ccc.de/contributors/essen/petitfoo/webm-hd/petitfoo-26-deu-Grundlagen_IT_Security_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/55397","event_url":"https://api.media.ccc.de/public/events/7614ebda-f82a-47dd-8b5b-185dde7050d1","conference_url":"https://api.media.ccc.de/public/conferences/petitfoo"},{"size":68,"length":1304,"mime_type":"video/mp4","language":"deu","filename":"petitfoo-26-deu-Grundlagen_IT_Security_fhd.mp4","state":"new","folder":"h264-fhd","high_quality":true,"width":1920,"height":1080,"updated_at":"2021-10-27T13:01:36.589+02:00","recording_url":"https://cdn.media.ccc.de/contributors/essen/petitfoo/h264-fhd/petitfoo-26-deu-Grundlagen_IT_Security_fhd.mp4","url":"https://api.media.ccc.de/public/recordings/55396","event_url":"https://api.media.ccc.de/public/events/7614ebda-f82a-47dd-8b5b-185dde7050d1","conference_url":"https://api.media.ccc.de/public/conferences/petitfoo"},{"size":45,"length":1304,"mime_type":"video/webm","language":"deu","filename":"petitfoo-26-deu-Grundlagen_IT_Security_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2021-10-27T12:57:04.860+02:00","recording_url":"https://cdn.media.ccc.de/contributors/essen/petitfoo/webm-sd/petitfoo-26-deu-Grundlagen_IT_Security_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/55395","event_url":"https://api.media.ccc.de/public/events/7614ebda-f82a-47dd-8b5b-185dde7050d1","conference_url":"https://api.media.ccc.de/public/conferences/petitfoo"},{"size":11,"length":1304,"mime_type":"audio/opus","language":"deu","filename":"petitfoo-26-deu-Grundlagen_IT_Security_opus.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2021-10-27T12:39:59.067+02:00","recording_url":"https://cdn.media.ccc.de/contributors/essen/petitfoo/opus/petitfoo-26-deu-Grundlagen_IT_Security_opus.opus","url":"https://api.media.ccc.de/public/recordings/55394","event_url":"https://api.media.ccc.de/public/events/7614ebda-f82a-47dd-8b5b-185dde7050d1","conference_url":"https://api.media.ccc.de/public/conferences/petitfoo"},{"size":19,"length":1304,"mime_type":"audio/mpeg","language":"deu","filename":"petitfoo-26-deu-Grundlagen_IT_Security_mp3.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2021-10-27T12:39:34.712+02:00","recording_url":"https://cdn.media.ccc.de/contributors/essen/petitfoo/mp3/petitfoo-26-deu-Grundlagen_IT_Security_mp3.mp3","url":"https://api.media.ccc.de/public/recordings/55393","event_url":"https://api.media.ccc.de/public/events/7614ebda-f82a-47dd-8b5b-185dde7050d1","conference_url":"https://api.media.ccc.de/public/conferences/petitfoo"},{"size":34,"length":1304,"mime_type":"video/mp4","language":"deu","filename":"petitfoo-26-deu-Grundlagen_IT_Security_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2021-10-27T12:38:35.340+02:00","recording_url":"https://cdn.media.ccc.de/contributors/essen/petitfoo/h264-sd/petitfoo-26-deu-Grundlagen_IT_Security_sd.mp4","url":"https://api.media.ccc.de/public/recordings/55392","event_url":"https://api.media.ccc.de/public/events/7614ebda-f82a-47dd-8b5b-185dde7050d1","conference_url":"https://api.media.ccc.de/public/conferences/petitfoo"},{"size":77,"length":1304,"mime_type":"video/mp4","language":"deu","filename":"petitfoo-26-deu-Grundlagen_IT_Security_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2021-10-27T12:35:20.666+02:00","recording_url":"https://cdn.media.ccc.de/contributors/essen/petitfoo/h264-hd/petitfoo-26-deu-Grundlagen_IT_Security_hd.mp4","url":"https://api.media.ccc.de/public/recordings/55391","event_url":"https://api.media.ccc.de/public/events/7614ebda-f82a-47dd-8b5b-185dde7050d1","conference_url":"https://api.media.ccc.de/public/conferences/petitfoo"}]}