{"version":"1.0","provider_name":"Hostnic.id","provider_url":"https:\/\/www.hostnic.id\/blog","title":"Model Keamanan Cloud Computing: Mengenal Lebih Lanjut - Hostnic.id","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"ijyQRhjgYG\"><a href=\"https:\/\/www.hostnic.id\/blog\/cloud\/model-keamanan-cloud-computing-mengenal-lebih-lanjut\/\">Model Keamanan Cloud Computing: Mengenal Lebih Lanjut<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.hostnic.id\/blog\/cloud\/model-keamanan-cloud-computing-mengenal-lebih-lanjut\/embed\/#?secret=ijyQRhjgYG\" width=\"600\" height=\"338\" title=\"&#8220;Model Keamanan Cloud Computing: Mengenal Lebih Lanjut&#8221; &#8212; Hostnic.id\" data-secret=\"ijyQRhjgYG\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.hostnic.id\/blog\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/08\/vibrant-colored-autumn-trees-fie.jpg?v=1692735876","thumbnail_width":826,"thumbnail_height":472,"description":"Ancaman keamanan pada cloud computing semakin meningkat seiring dengan semakin banyaknya data yang disimpan di cloud. Beberapa ancaman yang mungkin terjadi adalah pencurian data, kehilangan data, dan penggunaan data tanpa izin."}