Loading
Created by:eblochebloch
{"id":653965,"type":0,"block_id":"ebloch_1361737291","theme_id":32,"user_id":230524,"path":"Cyberwarfare-6888","title":"","pubtitle":"Cyberwarfare","tags":"","public":true,"publicAccess":true,"private_link_enabled":0,"thumb":"https://s3-eu-west-1.amazonaws.com/infogram-thumbs-200/ebloch_1361737291.jpg","width":700,"copyright":"","properties":{"transparent":false,"rtl":false,"export_settings":{"showGrid":true,"showValues":true},"whitelabel":false,"embed_button":"enabled","title_link":"infogram","custom_logo":"infogram","custom_link_url":"","embed_button_text":"Share","decimal_separator":".,"},"elements":[{"type":"particle","particle_id":637589,"object_id":"ebloch1361741541","particle_type":"maintitle","picture":null,"text":"Cyberwarfare","content_type":"","title":"","shrink":null},{"type":"particle","particle_id":637767,"object_id":"ebloch1361744566","particle_type":"quote","picture":null,"text":"\"Cyberwarfare ... actions by a nation-state to penetrate another nation&#39;s computers or networks for the purposes of causing damage or disruption.\" ","content_type":"","title":"-Richard A. Clarke","shrink":null},{"type":"particle","particle_id":638066,"object_id":"ebloch1361749778","particle_type":"bodytitle","picture":null,"text":"Estimated Cost of Damages","content_type":"","title":"","shrink":null},{"type":"particle","particle_id":638407,"object_id":"ebloch1361753823","particle_type":"bodytext","picture":null,"text":"The top four most attacked countries of 2012 - Average cost of damages per business","content_type":"","title":"","shrink":null},{"type":"chart","chart_id":973807,"object_id":"ebloch_1361753162","chart_type_nr":7,"data":[[[],["United Kingdom","$3.3 Million/Business"],["Australia","$3.4 Million/Business"],["Germany","$6.0 Million/Business"],["United States","$8.9 Million/Business"]]],"custom":{},"colors":["#e4ba51","#e37900","#e84f2c","#e31307","#e3b786","#825846","#59392a","#564c30","#897d6e","#627c82","#93af8a","#a0ba5e","#63ba5e","#5ebab2","#6596b7","#b477ba","#473057","#bc416e","#c896af","#e4ba51","#e37900","#e84f2c","#e31307"],"dimensions":[],"modifier":0,"sheetnames":[],"sheets_settings":[]},{"type":"particle","particle_id":638531,"object_id":"ebloch1361755256","particle_type":"bodytitle","picture":null,"text":"Organizations Targeted","content_type":"","title":"","shrink":null},{"type":"particle","particle_id":658414,"object_id":"ebloch1362001840","particle_type":"bodytext","picture":null,"text":"A contrast, in the types of organizations targeted, between large organizations and all reported organization that are targeted","content_type":"","title":"","shrink":null},{"type":"chart","chart_id":974075,"object_id":"ebloch_1361756487","chart_type_nr":2,"data":[[["","All Organizations","Large Organizations"],["Accommodation and Food Services","54%"],["Finance and Insurance","","28%"],["Information","","22%"],["Retail Trade","20%","12%"],["Finance and Insurance","10%"],["Manufacturing","","8%"],["Public Administration","","7%"],["Transportation and Warehouseing","","5%"],["Health Care and Social Assistance","7%"],["Information","3%"],["Other","6%","18%"]]],"custom":{"height":"352"},"colors":["#e84f2c","#e3b786","#e37900","#e4ba51","#e3b786","#825846","#59392a","#564c30","#897d6e","#e37900","#c5c5c5","#a0ba5e","#63ba5e","#5ebab2","#6596b7","#b477ba","#627c82","#e31307","#c896af"],"dimensions":[],"modifier":0,"sheetnames":[],"sheets_settings":[]},{"type":"particle","particle_id":638534,"object_id":"ebloch1361755265","particle_type":"bodytitle","picture":null,"text":"Reason For Attack","content_type":"","title":"","shrink":null},{"type":"chart","chart_id":974089,"object_id":"ebloch_1361756684","chart_type_nr":4,"data":[[["","All Organizations","Large Organizations"],["Financial/Personal Gain","94%","59%"],["Disagreement/Protest","3%","21%"],["Fun/Curiosity/Pride","2%","19%"],["Grudge/Personal Offence","1%","1%"]]],"custom":{"absoluteDistribution":true,"xlabel":"Percent of Attacks","height":"352"},"colors":[],"dimensions":[],"modifier":0,"sheetnames":[],"sheets_settings":[]},{"type":"particle","particle_id":637609,"object_id":"ebloch1361741639","particle_type":"bodytitle","picture":null,"text":"Origin of Known Cyber Attacks, by Region","content_type":"","title":"","shrink":null},{"type":"particle","particle_id":637813,"object_id":"ebloch1361745514","particle_type":"bodytext","picture":null,"text":"As of 2011","content_type":"","title":"","shrink":null},{"type":"chart","chart_id":972543,"object_id":"ebloch_1361738287","chart_type_nr":9,"data":[[["","Percent of Attacks coming from Region","group"],["Russia","65%","Europe-East","undefined undefined"],["Turkey","65%","Europe-East","undefined undefined"],["Ukraine","65%","Europe-East","undefined undefined"],["USA","20%","America-North","undefined undefined"],["United Kingdom","4%","Europe-West","undefined undefined"],["France","4%","Europe-West","undefined undefined"],["Germany","4%","Europe-West","undefined undefined"],["China","2%","Asia-East","undefined undefined"],["South Africa","1%","Africa","undefined undefined"],["Ghana","1%","Africa","undefined undefined"],["India","1%","Asia-South/Southeast","undefined undefined"],["Taiwan","1%","Asia-South/Southeast","undefined undefined"],["Thailand","1%","Asia-South/Southeast","undefined undefined"],["","2%","Other","undefined undefined"],["","10%","Unknown","undefined undefined"],["","","","undefined undefined"],["","","","undefined undefined"],["","","","undefined undefined"],[],[],[],[],["","","","undefined undefined"]]],"custom":{"groupedData":true},"colors":["#e31307","#e84f2c","#e37900","#93af8a","#a0ba5e","#5ebab2","#6596b7","#b477ba","#473057","#bc416e"],"dimensions":[],"modifier":0,"sheetnames":[],"sheets_settings":[]},{"type":"particle","particle_id":637848,"object_id":"ebloch1361746390","particle_type":"bodytitle","picture":null,"text":"Countries Who Have Reported Cyber Attacks","content_type":"","title":"","shrink":null},{"type":"chart","chart_id":973116,"object_id":"ebloch_1361746385","chart_type_nr":9,"data":[[["","group"],["Australia","","","undefined undefined"],["France","","","undefined undefined"],["Austria","","","undefined undefined"],["Germany"],["Bahamas","","","undefined undefined"],["Ghana"],["Belgium","","","undefined undefined"],["Greece"],["Brazil","","","undefined undefined"],["India"],["Bulgaria","","","undefined undefined"],["Ireland"],["Canada"],["Israel"],["Denmark"],["Japan"],["Jordan"],["Kuwait"],["Lebanon","","","undefined undefined"],["Luxembourg","","","undefined undefined"],["Mexico"],["Netherlands","","","undefined undefined"],["New Zealand","","","undefined undefined"],["Philippines"],["Poland"],["Romania"],["Russia","","","undefined undefined"],["South Africa","","","undefined undefined"],["Spain","","","undefined undefined"],["Taiwan"],["Thailand"],["Turkey"],["United Arab Emirates","","","undefined undefined"],["Ukraine"],["United Kingdom"],["USA","",null,"undefined undefined"]]],"custom":{"groupedData":true},"colors":["#929292","#929292","#e37900","#e4ba51","#e3b786","#825846","#59392a","#564c30","#897d6e","#627c82","#93af8a","#a0ba5e","#63ba5e","#5ebab2","#6596b7","#b477ba","#473057","#bc416e","#c896af"],"dimensions":[],"modifier":0,"sheetnames":[],"sheets_settings":[]},{"type":"particle","particle_id":638691,"object_id":"ebloch1361758093","particle_type":"bodytext","picture":null,"text":"References:\nhttp://en.wikipedia.org/wiki/Cyberwarfare\nhttp://www.informationweek.com/security/attacks/cybercrime-attacks-costs-escalating/240008658\nwww.verizonenterprise.com/about/events/2012dbir/","content_type":"","title":"","shrink":null}],"theme":{"createdAt":"2016-04-22T04:54:07.000Z","updatedAt":"2016-12-28T10:33:53.000Z","logoImages":[""],"charts":{"table":{"shapeFill":"e84f2c","headerColor":"#6f6f6f","cellColor":"#6f6f6f","headerBackground":"#eeeeee","cellBackground":"#ffffff"},"treemap":{"labels":{"name":{"fontFamily":"PT Sans Narrow","fontWeight":"700"},"value":{"fontFamily":"PT Sans Narrow"}}},"wordcloud":{"labels":{"fontFamily":"Arial","fontWeight":"700"}}},"color":{"bg":"#ffffff","text":"#000000","chart":{"bg":"transparent","text":"#7d7d7d"},"element":{"bg":"transparent","text":"#000000"}},"colorPresets":[],"localFonts":[],"font":{"common":{"fontFamily":"PT Sans Narrow","fontWeight":"400","fontStyle":"normal","fontSize":"16","textAlign":"initial"},"label":{"fontWeight":400,"fontSize":16},"legend":{"fontWeight":"400","fontSize":"16"}},"fontPresets":[],"fontFamilies":["PT Sans Narrow","Verdana","PT Serif","PT Sans"],"id":32,"title":"Asketic-new","usergroup":"archived","picture":"https://d1m5pq7b4fzvad.cloudfront.net/32/thumbnail.png","thumb":"/i/templates/S/asketic.png","order":25,"public":0,"width":550,"fonts":"PT+Sans+Narrow:400,700;PT+Sans:400,700;PT+Serif:400italic","colors":["#e84f2c","#e31307","#e37900","#e4ba51","#e3b786","#825846","#59392a","#564c30","#897d6e","#627c82","#93af8a","#a0ba5e","#63ba5e","#5ebab2","#6596b7","#b477ba","#473057","#bc416e","#c896af"],"logocolor":"000","logoUrl":"","showLogo":"","showEmbed":"","embedButtonText":"Share","top":50,"padding":20,"spacing":20,"shrinkMargin":20,"shrinkPadding":20,"spacingElementMin":null,"spacingElementMax":null,"css":".igc-sheets .igc-sheet .igc-sheet-ico,\n.igc-sheets .igc-sheet:hover .igc-sheet-ico {\n\tborder-color: #7d7d7d;\n}\n.igc-sheets .igc-sheet .igc-sheet-label,\n.igc-sheets .igc-sheet:hover .igc-sheet-label,\n.igc-sheets .igc-sheet.active .igc-sheet-label {\n\tcolor: #7d7d7d;\n}\n.igc-sheet .igc-sheet-ico,\n.igc-sheet.active .igc-sheet-ico {\n\tbackground: transparent;\n}\n.igc-sheets .igc-sheet.active .igc-sheet-ico::after,\n.igc-sheets .igc-sheet:hover .igc-sheet-ico::after {\n\theight: 14px;\n\twidth: 14px;\n\tleft: 2px;\n\ttop: 2px;\n\tbackground: #7d7d7d;\n}\n.igc-textual-figure {\n\tfont-size: 45px;\n}\n.igc-table-scroll {\n\tbackground: #eee;\n}\n.igc-table .igc-table-cell {\n\tfont-size: 16px;\n\tfont-family: PT Sans Narrow;\n\tfont-weight: 700;\n}\n.igc-table .igc-table-header {\n\tfont-size: 16px;\n\tfont-family: PT Sans Narrow;\n\tfont-weight: 700;\n}\n#madewith a,\n#madewith a:link,\n#madewith a:hover,\n#madewith a:visited,\n#madewith a:active {\n\tcolor: #000 !important;\n}\n.ig-copyright {\n\tcolor: #000;\n}\n.sep {\n\twidth: 100%;\n\tbackground-image: url(/i/asketic01/sturis-2.png), url(/i/asketic01/sturis-3.png);\n\tbackground-position: 0 0%, right 0%;\n\tbackground-repeat: no-repeat;\n\theight: 24px;\n}\n.sep .inner {\n\theight: 11px;\n\tborder-bottom: 1px dashed #464646;\n\tmargin-top: 10px;\n\tmargin-left: 20px;\n\tmargin-right: 20px;\n}\n.ig-container {\n\tbackground: url(/i/templates/32/background-light.png);\n}\n.ig-items {\n\tpadding-bottom: 20px;\n\tpadding-left: 20px;\n\tpadding-right: 20px;\n\tmargin: 20px;\n\tbackground: #fff;\n}\n.ig-items:before {\n\tcontent: '';\n\theight: 8px;\n\twidth: 100%;\n\tposition: absolute;\n\tleft: 0px;\n\ttop: 0px;\n\tbackground: #e8e5da url(/i/templates/32/curve-fff.svg) center top repeat-x;\n}\n.ig-items:after,\n.ig-container:after {\n\tcontent: '' !important;\n\tdisplay: block !important;\n\tposition: absolute;\n\tright: 21px;\n\ttop: 26px;\n\tbackground: #e8e5da;\n\twidth: 15px;\n\theight: 15px;\n\tborder-radius: 20px;\n}\n.ig-container:after {\n\tleft: 41px;\n\ttop: 47px;\n\tright: auto;\n}\n.headline {\n\tfont-family: PT Sans Narrow;\n\tfont-weight: 700;\n\tfont-size: 55px;\n\ttext-transform: uppercase;\n\tcolor: #000000;\n\tborder-bottom: 8px solid #000;\n\tline-height: 65px;\n}\n.chart-title {\n\tfont-family: PT Sans Narrow;\n\tfont-weight: 700;\n\tfont-size: 36px;\n\tcolor: #000000;\n\tborder-bottom: 4px solid #000;\n}\n.bodytext {\n\tfont-family: Verdana;\n\tfont-weight: 400;\n\tfont-size: 14px;\n\tcolor: #000000;\n}\n.quote {\n\tpadding: 20px;\n\tfont-family: PT Serif;\n\tfont-style: italic;\n\tfont-size: 30px;\n\tcolor: #ffffff;\n\ttext-align: center;\n\tbackground: #000;\n}\n.quotetitle {\n\tfont-size: 24px;\n}\n.quote:after {\n\tcontent: '';\n\tposition: absolute;\n\tleft: 0%;\n\ttop: 50%;\n\tmargin-top: -13px;\n\twidth: 13px;\n\theight: 27px;\n\tbackground: url(/i/templates/32/left-fff.svg);\n}\n.quote:before {\n\tcontent: '';\n\tbackground: url(/i/templates/32/right-fff.svg);\n\tposition: absolute;\n\ttop: 50%;\n\tmargin-top: -13px;\n\twidth: 13px;\n\theight: 27px;\n\tright: 0%;\n}\n.headline.active:hover {\n\tcolor: #e84f2c;\n}\n#madewith.active a:hover {\n\tcolor: #e84f2c !important;\n}\n.titlepopup1,\n.titlepopup2 {\n\tborder-color: #e84f2c;\n}\n.shrink .chart > .inner {\n\tpadding-left: 10px;\n\tpadding-right: 10px;\n}\n.ig-separator-line {\n\tbackground: rgba(125, 125, 125, 0.5);\n}\n.heatmap-legend {\n\tbackground: rgba(255, 255, 255, 0.7);\n}\n.heatmap-legend-item,\n.heatmap-label {\n\tcolor: #7d7d7d;\n\tfont-size: 11px;\n\tfont-family: PT Sans;\n}\n.igc-graph-pie-piece {\n\tstroke: rgba(255, 255, 255, 0.7);\n}\n.igc-tabs .igc-tab-active {\n background: #ffffff;\n }\n .igc-tabs .igc-tab .igc-tab-content,\n .igc-tabs .igc-tab.icon-down:after {\n font-family: PT Sans Narrow;\n color: #000000;\n font-weight: 400;\n }\n .igc-tabs .igc-tab,\n .igc-tab-switcher {\n color: #000000;\n } .igc-tabs.igc-tabs-dropdown .igc-tab-name {\n font-family: PT Sans Narrow;\n color: #000000;\n font-weight: 400;\n } .captiontext {font-family: PT Sans Narrow;color: #000000;font-weight: 400;} .captiontext .innertext {line-height: 1.5;}","chartOptions":{"progress":{"backgroundInactive":{"fill":"#e1e1e1"}},"map":{"showLegend":false,"countryStroke":"#e1e1e1","countryFill":"#e1e1e1","canvasFill":"transparent"},"candle":{"colors":"e31307 63ba5e","blankfill":"url(https://jifo.co/i/templates/29/chart-background.png)"},"waterfall":{"colors":"6596b7 5ebab2 e84f2c"},"common":{"backgroundStyle":{"stroke-opacity":0,"stroke-width":0},"_gridOptions":{"marginLineStyle":{"stroke-width":0,"stroke":"transparent"},"fontStyle":{"font-family":"PT Sans","font-size":11,"text-anchor":"start","fill":"#7d7d7d","cursor":"default"},"lineStyle":{"stroke-width":1,"stroke":"#7d7d7d","fill":"none","stroke-dasharray":"."}},"legendOptions":{"font-size":16,"font-family":"PT Sans Narrow","font-weight":300},"tooltipOptions":{"nameFontStyle":{"font-family":"PT Sans Narrow","text-anchor":"start","font-weight":700,"font-size":16,"fill":"#ffffff"},"valueFontStyle":{"font-family":"PT Sans Narrow","text-anchor":"start","font-size":16,"fill":"#fff"},"containerStyle":{"stroke":"#464646","fill":"#464646"}}}},"version":1,"archived":true,"tabs":false,"zeroPaddingEmbed":true,"created_at":"2016-04-22T04:54:07.000Z","updated_at":"2016-12-28T10:33:53.000Z"},"embed":"<script id=\"infogram_0_Cyberwarfare-6888\" title=\"\" src=\"//e.infogr.am/js/dist/embed.js?Ig4\" type=\"text/javascript\"></script><div style=\"padding:8px 0;font-family:Arial!important;font-size:13px!important;line-height:15px!important;text-align:center;border-top:1px solid #dadada;margin:0 30px\"><a href=\"https://infogr.am/Cyberwarfare-6888\" style=\"color:#989898!important;text-decoration:none!important;\" target=\"_blank\" rel=\"nofollow\">Cyberwarfare</a><br><a href=\"https://infogr.am\" style=\"color:#989898!important;text-decoration:none!important;\" target=\"_blank\" rel=\"nofollow\">Create your own infographics</a></div>","embedIframe":"<iframe src=\"//e.infogr.am/Cyberwarfare-6888?src=embed\" title=\"\" width=\"700\" height=\"\" scrolling=\"no\" frameborder=\"0\" style=\"border:none;\"></iframe><div style=\"padding:8px 0;font-family:Arial!important;font-size:13px!important;line-height:15px!important;text-align:center;border-top:1px solid #dadada;margin:0 30px\"><a href=\"https://infogr.am/Cyberwarfare-6888\" style=\"color:#989898!important;text-decoration:none!important;\" target=\"_blank\" rel=\"nofollow\">Cyberwarfare</a><br><a href=\"https://infogr.am\" style=\"color:#989898!important;text-decoration:none!important;\" target=\"_blank\" rel=\"nofollow\">Create your own infographics</a></div>","embedWordpress":"[infogram id=\"Cyberwarfare-6888\" prefix=\"k73\" format=\"interactive\" title=\"\"]","embedWordpressImage":"[infogram id=\"Cyberwarfare-6888\" prefix=\"iqP\" format=\"image\" title=\"\"]","embedAsync":"<div class=\"infogram-embed\" data-id=\"Cyberwarfare-6888\" data-type=\"interactive\" data-title=\"\"></div><script>!function(e,t,n,s){var i=\"InfogramEmbeds\",o=e.getElementsByTagName(t),d=o[0],a=/^http:/.test(e.location)?\"http:\":\"https:\";if(/^\\/{2}/.test(s)&&(s=a+s),window[i]&&window[i].initialized)window[i].process&&window[i].process();else if(!e.getElementById(n)){var r=e.createElement(t);r.async=1,r.id=n,r.src=s,d.parentNode.insertBefore(r,d)}}(document,\"script\",\"infogram-async\",\"//e.infogr.am/js/dist/embed-loader-min.js\");</script><div style=\"padding:8px 0;font-family:Arial!important;font-size:13px!important;line-height:15px!important;text-align:center;border-top:1px solid #dadada;margin:0 30px\"><a href=\"https://infogr.am/Cyberwarfare-6888\" style=\"color:#989898!important;text-decoration:none!important;\" target=\"_blank\" rel=\"nofollow\">Cyberwarfare</a><br><a href=\"https://infogr.am\" style=\"color:#989898!important;text-decoration:none!important;\" target=\"_blank\" rel=\"nofollow\">Create your own infographics</a></div>","embedImageAsync":"<div class=\"infogram-embed\" data-id=\"Cyberwarfare-6888\" data-type=\"image\" data-title=\"\"></div><script>!function(e,t,n,s){var i=\"InfogramEmbeds\",o=e.getElementsByTagName(t),d=o[0],a=/^http:/.test(e.location)?\"http:\":\"https:\";if(/^\\/{2}/.test(s)&&(s=a+s),window[i]&&window[i].initialized)window[i].process&&window[i].process();else if(!e.getElementById(n)){var r=e.createElement(t);r.async=1,r.id=n,r.src=s,d.parentNode.insertBefore(r,d)}}(document,\"script\",\"infogram-async\",\"//e.infogr.am/js/dist/embed-loader-min.js\");</script><div style=\"padding:8px 0;font-family:Arial!important;font-size:13px!important;line-height:15px!important;text-align:center;border-top:1px solid #dadada;margin:0 30px\"><a href=\"https://infogr.am/Cyberwarfare-6888\" style=\"color:#989898!important;text-decoration:none!important;\" target=\"_blank\" rel=\"nofollow\">Cyberwarfare</a><br><a href=\"https://infogr.am\" style=\"color:#989898!important;text-decoration:none!important;\" target=\"_blank\" rel=\"nofollow\">Create your own infographics</a></div>"}