{"id":16127,"date":"2020-10-15T08:13:26","date_gmt":"2020-10-15T06:13:26","guid":{"rendered":"https:\/\/www.tecsens.com\/social-engineering-der-grosse-feind\/"},"modified":"2021-04-20T09:40:22","modified_gmt":"2021-04-20T07:40:22","slug":"social-engineering-der-grosse-feind","status":"publish","type":"post","link":"https:\/\/www.tecsens.com\/de\/social-engineering-der-grosse-feind\/","title":{"rendered":"Social Engineering der gro\u00dfe Feind"},"content":{"rendered":"\n<p>Es neigt dazu zu denken, dass die gef\u00e4hrlichsten Situationen und die Organisationen anf\u00e4lliger machen, sind Cyberangriffe von Viren, Malware, Phising usw. Aus diesem Grund suchen sie <a href=\"https:\/\/www.tecsens.com\/servicios-internet-empresas\/seguridad-informatica\/\" target=\"_blank\" rel=\"noreferrer noopener\">nach Tools zum Bereitstellen<\/a> und Sch\u00fctzen Ihrer Informationen wie Firewall, Antivirus usw. Und manchmal vergessen wir oder wissen gar nicht, dass<strong> Social Engineering der gro\u00dfe Feind ist.<\/strong> Und manchmal der gro\u00dfe Fremde.<\/p>\n\n<h2 class=\"wp-block-heading\"><strong>Aber was ist Social Engineering?<\/strong><\/h2>\n\n<p>Es ist eine <strong>weit verbreitete<\/strong> Technik<strong> unter Cyberkriminellen,<\/strong> die<strong> darauf abzielt,<\/strong> die Menschen einer Organisation zu \u00fcberzeugen und zu manipulieren, so dass sie Ihnen vertrauliche Informationen zur Verf\u00fcgung stellen oder eine bestimmte <strong>Aktion ergreifen.<\/strong> Eine M\u00f6glichkeit, die Arbeiter der Organisation zu t\u00e4uschen und nicht das System selbst.<\/p>\n\n<p>Einer der wichtigsten Gr\u00fcnde, <strong>porqu\u00e9 la<\/strong> warum <strong>Social Engineering der gro\u00dfe Feind ist,<\/strong>liegt im Menschen, da es das schw\u00e4chste St\u00fcck dieser Kette ist. Das macht den Mitarbeiter am ehesten angegriffen und gef\u00e4hrdet die Organisation.<\/p>\n\n<h4 class=\"wp-block-heading\">Zu den <strong>Hauptzielen<\/strong> dieser Praxis geh\u00f6ren:<\/h4>\n\n<ul class=\"wp-block-list\"><li>Abrufen von Informationen<\/li><li>Zugriff auf ein System<\/li><li>Stehlen eines Verm\u00f6genswerts<\/li><\/ul>\n<p>Und wenn wir auch ber\u00fccksichtigen, dass es kein System gibt, das nicht von einem Menschen abh\u00e4ngt, dann macht das <strong>Social<\/strong> Engineering universell und unabh\u00e4ngig von den implementierten Sicherheitsl\u00f6sungen.  <\/p>\n\n<p>Dank des Vertrauens, das den Nutzern in der Regel die Mittel zur Verf\u00fcgung stellt, mit denen sie solche Anfragen erhalten oder die Person, die sie stellt, machen sie das Opfer die Anfragen, ohne dar\u00fcber nachzudenken.  <\/p>\n\n<p>Wir alle glauben, dass wir in der Lage w\u00e4ren, zu reagieren und Praktiken dieser Art zu erkennen, das gro\u00dfe Problem ist, dass die von Cyberkriminellen angewandten Methoden sehr aufwendig und glaubw\u00fcrdig sind. Nachrichten von gesperrten Bankkonten, die \u00dcberpr\u00fcfungen erfordern, geh\u00f6ren zu den h\u00e4ufigsten.<\/p>\n\n<h2 class=\"wp-block-heading\"><strong>Welche Broadcast-Kan\u00e4le verwenden Sie normalerweise?<\/strong><\/h2>\n\n<ul class=\"wp-block-list\"><li>E-Mail<\/li><li>Telefonieren<\/li><li>Messaging-Apps<\/li><li>Soziale Medien<\/li><li><em>Dumpster Tauchen oder Trashing:<\/em> Suche nach Telefonb\u00fcchern, Speicherger\u00e4ten, Arbeitszeitpl\u00e4nen usw.<\/li><\/ul>\n<p>Jetzt k\u00f6nnen wir klarer sehen als die  <strong>Cybersicherheit <\/strong>h\u00e4ngt nicht nur von einer Reihe von Tools und L\u00f6sungen ab, die in den Informationssystemen von Organisationen implementiert werden,  <a href=\"https:\/\/www.incibe.es\/sala-prensa\/notas-prensa\/estafas-mediante-ingenieria-social-riesgo-las-empresas\" target=\"_blank\" rel=\"noreferrer noopener\">Ausbildungs-<\/a> und Unternehmenskultur, in der jeder wissen und wissen muss, dass wir jederzeit verwundbar sein k\u00f6nnen.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Es neigt dazu zu denken, dass die gef\u00e4hrlichsten Situationen und die Organisationen anf\u00e4lliger machen, sind Cyberangriffe von Viren, Malware, Phising usw. Aus diesem Grund suchen sie nach Tools zum Bereitstellen und Sch\u00fctzen Ihrer Informationen wie Firewall, Antivirus usw. Und manchmal vergessen wir oder wissen gar nicht, dass Social Engineering der gro\u00dfe Feind ist. Und manchmal [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":16128,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[522,523],"tags":[394,383],"class_list":["post-16127","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-beratung","category-it-sicherheit","tag-cybersecurity-de","tag-sicherheit"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Social Engineering der gro\u00dfe Feind %sep%Tecsens - Tecsens -<\/title>\n<meta name=\"description\" content=\"Wir wissen, dass f\u00fcr Organisationen der gro\u00dfe Feind Social Engineering ist, aber wissen wir wirklich, was es ist?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tecsens.com\/de\/social-engineering-der-grosse-feind\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Social Engineering der gro\u00dfe Feind %sep%Tecsens - Tecsens -\" \/>\n<meta property=\"og:description\" content=\"Wir wissen, dass f\u00fcr Organisationen der gro\u00dfe Feind Social Engineering ist, aber wissen wir wirklich, was es ist?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tecsens.com\/de\/social-engineering-der-grosse-feind\/\" \/>\n<meta property=\"og:site_name\" content=\"Tecsens\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-15T06:13:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-20T07:40:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2020\/10\/Ingenieria-social-03.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1521\" \/>\n\t<meta property=\"og:image:height\" content=\"857\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TECSENS Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Social Engineering der gro\u00dfe Feind\" \/>\n<meta name=\"twitter:description\" content=\"Wir wissen, dass f\u00fcr Organisationen der gro\u00dfe Feind Social Engineering ist, aber wissen wir wirklich, was es ist?\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2020\/10\/Ingenieria-social-03.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"TECSENS Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"2\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.tecsens.com\/de\/social-engineering-der-grosse-feind\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.tecsens.com\/de\/social-engineering-der-grosse-feind\/\"},\"author\":{\"name\":\"TECSENS Marketing\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd\"},\"headline\":\"Social Engineering der gro\u00dfe Feind\",\"datePublished\":\"2020-10-15T06:13:26+00:00\",\"dateModified\":\"2021-04-20T07:40:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.tecsens.com\/de\/social-engineering-der-grosse-feind\/\"},\"wordCount\":371,\"publisher\":{\"@id\":\"https:\/\/www.tecsens.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/de\/social-engineering-der-grosse-feind\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2020\/10\/Ingenieria-social-03.jpg\",\"keywords\":[\"Cybersecurity\",\"Sicherheit\"],\"articleSection\":[\"Beratung\",\"IT-Sicherheit\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tecsens.com\/de\/social-engineering-der-grosse-feind\/\",\"url\":\"https:\/\/www.tecsens.com\/de\/social-engineering-der-grosse-feind\/\",\"name\":\"Social Engineering der gro\u00dfe Feind %sep%Tecsens - Tecsens -\",\"isPartOf\":{\"@id\":\"https:\/\/www.tecsens.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tecsens.com\/de\/social-engineering-der-grosse-feind\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/de\/social-engineering-der-grosse-feind\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2020\/10\/Ingenieria-social-03.jpg\",\"datePublished\":\"2020-10-15T06:13:26+00:00\",\"dateModified\":\"2021-04-20T07:40:22+00:00\",\"description\":\"Wir wissen, dass f\u00fcr Organisationen der gro\u00dfe Feind Social Engineering ist, aber wissen wir wirklich, was es ist?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tecsens.com\/de\/social-engineering-der-grosse-feind\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tecsens.com\/de\/social-engineering-der-grosse-feind\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.tecsens.com\/de\/social-engineering-der-grosse-feind\/#primaryimage\",\"url\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2020\/10\/Ingenieria-social-03.jpg\",\"contentUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2020\/10\/Ingenieria-social-03.jpg\",\"width\":1521,\"height\":857,\"caption\":\"Social Engineering\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tecsens.com\/de\/social-engineering-der-grosse-feind\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.tecsens.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Social Engineering der gro\u00dfe Feind\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tecsens.com\/#website\",\"url\":\"https:\/\/www.tecsens.com\/\",\"name\":\"TECSENS - Empowering companies\",\"description\":\"Sense &amp; Technology\",\"publisher\":{\"@id\":\"https:\/\/www.tecsens.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tecsens.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.tecsens.com\/#organization\",\"name\":\"TECSENS\",\"url\":\"https:\/\/www.tecsens.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png\",\"contentUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png\",\"width\":411,\"height\":85,\"caption\":\"TECSENS\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/tecsens\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd\",\"name\":\"TECSENS Marketing\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g\",\"caption\":\"TECSENS Marketing\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Social Engineering der gro\u00dfe Feind %sep%Tecsens - Tecsens -","description":"Wir wissen, dass f\u00fcr Organisationen der gro\u00dfe Feind Social Engineering ist, aber wissen wir wirklich, was es ist?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tecsens.com\/de\/social-engineering-der-grosse-feind\/","og_locale":"de_DE","og_type":"article","og_title":"Social Engineering der gro\u00dfe Feind %sep%Tecsens - Tecsens -","og_description":"Wir wissen, dass f\u00fcr Organisationen der gro\u00dfe Feind Social Engineering ist, aber wissen wir wirklich, was es ist?","og_url":"https:\/\/www.tecsens.com\/de\/social-engineering-der-grosse-feind\/","og_site_name":"Tecsens","article_published_time":"2020-10-15T06:13:26+00:00","article_modified_time":"2021-04-20T07:40:22+00:00","og_image":[{"width":1521,"height":857,"url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2020\/10\/Ingenieria-social-03.jpg","type":"image\/jpeg"}],"author":"TECSENS Marketing","twitter_card":"summary_large_image","twitter_title":"Social Engineering der gro\u00dfe Feind","twitter_description":"Wir wissen, dass f\u00fcr Organisationen der gro\u00dfe Feind Social Engineering ist, aber wissen wir wirklich, was es ist?","twitter_image":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2020\/10\/Ingenieria-social-03.jpg","twitter_misc":{"Verfasst von":"TECSENS Marketing","Gesch\u00e4tzte Lesezeit":"2\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.tecsens.com\/de\/social-engineering-der-grosse-feind\/#article","isPartOf":{"@id":"https:\/\/www.tecsens.com\/de\/social-engineering-der-grosse-feind\/"},"author":{"name":"TECSENS Marketing","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd"},"headline":"Social Engineering der gro\u00dfe Feind","datePublished":"2020-10-15T06:13:26+00:00","dateModified":"2021-04-20T07:40:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.tecsens.com\/de\/social-engineering-der-grosse-feind\/"},"wordCount":371,"publisher":{"@id":"https:\/\/www.tecsens.com\/#organization"},"image":{"@id":"https:\/\/www.tecsens.com\/de\/social-engineering-der-grosse-feind\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2020\/10\/Ingenieria-social-03.jpg","keywords":["Cybersecurity","Sicherheit"],"articleSection":["Beratung","IT-Sicherheit"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.tecsens.com\/de\/social-engineering-der-grosse-feind\/","url":"https:\/\/www.tecsens.com\/de\/social-engineering-der-grosse-feind\/","name":"Social Engineering der gro\u00dfe Feind %sep%Tecsens - Tecsens -","isPartOf":{"@id":"https:\/\/www.tecsens.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tecsens.com\/de\/social-engineering-der-grosse-feind\/#primaryimage"},"image":{"@id":"https:\/\/www.tecsens.com\/de\/social-engineering-der-grosse-feind\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2020\/10\/Ingenieria-social-03.jpg","datePublished":"2020-10-15T06:13:26+00:00","dateModified":"2021-04-20T07:40:22+00:00","description":"Wir wissen, dass f\u00fcr Organisationen der gro\u00dfe Feind Social Engineering ist, aber wissen wir wirklich, was es ist?","breadcrumb":{"@id":"https:\/\/www.tecsens.com\/de\/social-engineering-der-grosse-feind\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tecsens.com\/de\/social-engineering-der-grosse-feind\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.tecsens.com\/de\/social-engineering-der-grosse-feind\/#primaryimage","url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2020\/10\/Ingenieria-social-03.jpg","contentUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2020\/10\/Ingenieria-social-03.jpg","width":1521,"height":857,"caption":"Social Engineering"},{"@type":"BreadcrumbList","@id":"https:\/\/www.tecsens.com\/de\/social-engineering-der-grosse-feind\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.tecsens.com\/de\/"},{"@type":"ListItem","position":2,"name":"Social Engineering der gro\u00dfe Feind"}]},{"@type":"WebSite","@id":"https:\/\/www.tecsens.com\/#website","url":"https:\/\/www.tecsens.com\/","name":"TECSENS - Empowering companies","description":"Sense &amp; Technology","publisher":{"@id":"https:\/\/www.tecsens.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tecsens.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.tecsens.com\/#organization","name":"TECSENS","url":"https:\/\/www.tecsens.com\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png","contentUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png","width":411,"height":85,"caption":"TECSENS"},"image":{"@id":"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/tecsens\/"]},{"@type":"Person","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd","name":"TECSENS Marketing","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g","caption":"TECSENS Marketing"}}]}},"_links":{"self":[{"href":"https:\/\/www.tecsens.com\/de\/wp-json\/wp\/v2\/posts\/16127","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tecsens.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tecsens.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/de\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/de\/wp-json\/wp\/v2\/comments?post=16127"}],"version-history":[{"count":9,"href":"https:\/\/www.tecsens.com\/de\/wp-json\/wp\/v2\/posts\/16127\/revisions"}],"predecessor-version":[{"id":22780,"href":"https:\/\/www.tecsens.com\/de\/wp-json\/wp\/v2\/posts\/16127\/revisions\/22780"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/de\/wp-json\/wp\/v2\/media\/16128"}],"wp:attachment":[{"href":"https:\/\/www.tecsens.com\/de\/wp-json\/wp\/v2\/media?parent=16127"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tecsens.com\/de\/wp-json\/wp\/v2\/categories?post=16127"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tecsens.com\/de\/wp-json\/wp\/v2\/tags?post=16127"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}