{"version":"1.0","provider_name":"Real Estate Sector Latest News, Updates &amp; Insights - PropertyPistol Blog","provider_url":"https:\/\/www.propertypistol.com\/blog","author_name":"PropertyPistol Insight Team","author_url":"https:\/\/www.propertypistol.com\/blog\/author\/swatantra\/","title":"What is critical information infrastructure? - Real Estate Sector Latest News, Updates &amp; Insights - PropertyPistol Blog","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"kA9jXSo9Xb\"><a href=\"https:\/\/www.propertypistol.com\/blog\/what-is-critical-information-infrastructure\/\">What is critical information infrastructure?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.propertypistol.com\/blog\/what-is-critical-information-infrastructure\/embed\/#?secret=kA9jXSo9Xb\" width=\"600\" height=\"338\" title=\"&#8220;What is critical information infrastructure?&#8221; &#8212; Real Estate Sector Latest News, Updates &amp; Insights - PropertyPistol Blog\" data-secret=\"kA9jXSo9Xb\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.propertypistol.com\/blog\/wp-content\/uploads\/2022\/06\/110c.png","thumbnail_width":1325,"thumbnail_height":350,"description":"The Information Technology Act of 2000 defines CIC specifically. It defines CIC as a laptop resource whose incapacity or destruction has a crippling effect on national security, economics, public fitness, or safety. Its primary goal is to protect virtual assets. Under the Act, the government has the authority to designate any data, database, IT community, [&hellip;]"}