{"id":29937,"date":"2021-03-30T20:31:01","date_gmt":"2021-03-31T01:31:01","guid":{"rendered":"https:\/\/www.filecloud.com\/blog\/?p=29937"},"modified":"2022-09-11T02:42:13","modified_gmt":"2022-09-11T07:42:13","slug":"information-security-an-overview-of-general-concepts","status":"publish","type":"post","link":"https:\/\/www.filecloud.com\/blog\/information-security-an-overview-of-general-concepts\/","title":{"rendered":"Information Security \u2013 An Overview of General Concepts"},"content":{"rendered":"<p class=\"p3\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-30625 size-full\" src=\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2021\/03\/FileCloud-Security-thumb-14.png\" alt=\"\" width=\"1920\" height=\"1081\"><\/p>\n<blockquote>\n<p class=\"p3\">Information Security \u2013 The protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability.<\/p>\n<\/blockquote>\n<p>\u2013 Definition of Information Security from the glossary of the <a href=\"https:\/\/csrc.nist.gov\/glossary\/term\/information_security\">U. S. Computer Security Resource Center<\/a><\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_63 counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title \" >Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.filecloud.com\/blog\/information-security-an-overview-of-general-concepts\/#Why_we_need_to_protect_information\" title=\"Why we need to protect information\">Why we need to protect information<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.filecloud.com\/blog\/information-security-an-overview-of-general-concepts\/#Balanced_security\" title=\"Balanced security\">Balanced security<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.filecloud.com\/blog\/information-security-an-overview-of-general-concepts\/#Security_Concepts\" title=\"Security Concepts\">Security Concepts<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"p3\"><span class=\"ez-toc-section\" id=\"Why_we_need_to_protect_information\"><\/span>Why we need to protect information<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p class=\"p3\">Information and information systems help us to store and process information and distribute the right type of information to the right type of user at the right time. This sort of protection helps protect information from unauthorized access, distribution, and modification. Thus, it is evident that information is an asset and needs to be protected from internal and external resources.<\/p>\n<h3 class=\"p3\">CIA triangle<\/h3>\n<p class=\"p3\">The CIA triad is a commonly used model for the requirements of information security.<span class=\"Apple-converted-space\">\u00a0 <\/span>CIA stands for <b>c<\/b>onfidentiality, <b>i<\/b>ntegrity, and <b>a<\/b>vailability. These principles help in protecting information in a secured manner, and thereby safeguard the critical assets of an organization by protecting against disclosure to unauthorized users (confidentiality), improper modification (integrity) and non-access when access is required (availability).<img decoding=\"async\" loading=\"lazy\" class=\"alignright wp-image-30000\" style=\"max-width: 200px; float: right;\" src=\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2021\/03\/clipboard-2021-03-31-105428.png\" alt=\"\" width=\"300\" height=\"299\"><\/p>\n<p>Here, we\u2019ll look at each of these concepts in more detail.<\/p>\n<h4 class=\"p3\">Confidentiality<\/h4>\n<p class=\"p3\">Confidentiality helps to ascertain whether information is to be kept secret or private by employing mechanisms, such as encryption, which will render the data useless if accessed in an unauthorized manner. The necessary level of secrecy is enforced, and unauthorized disclosure is prevented.<\/p>\n<h4 class=\"p3\">Integrity<\/h4>\n<p class=\"p3\">Integrity deals with the provision of accuracy and reliability of the information and systems. Information should be prevented from modification in an unauthorized manner by providing the necessary safety measures for timely detection of unauthorized changes.<\/p>\n<h4 class=\"p3\">Availability<\/h4>\n<p class=\"p3\">Availability ensures that information is available when it is needed. Reliable and timely access to data and resources is provided to authorized individuals. This can be accomplished by implementing tools ranging from battery backup at a data center to a content distribution network in the cloud.<\/p>\n<h2 class=\"p3\"><span class=\"ez-toc-section\" id=\"Balanced_security\"><\/span>Balanced security<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p class=\"p3\">It is impossible to obtain perfect information security. Information security is a process, not a goal. It is possible to make a system available to anyone, anywhere, anytime through any means. However, such unrestricted access posses a danger to the security of the information.<\/p>\n<p class=\"p3\">On the other hand, a completely secure information system would not allow anyone to access information. To achieve balance, operate an information system that satisfies the user and the security professional \u2013 the security level must allow reasonable access, yet protect against threats.<\/p>\n<h2 class=\"p3\"><span class=\"ez-toc-section\" id=\"Security_Concepts\"><\/span>Security Concepts<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p class=\"p3\"><strong>Vulnerabilities, Threats, and Risks. <\/strong>Security is often discussed in terms of vulnerabilities, threats, and risks.<\/p>\n<h4 class=\"p3\">Vulnerability<\/h4>\n<p class=\"p3\">A vulnerability is a security weakness, such as an unpatched application or operating system, an unrestricted wireless access point, an open port on a firewall, lax physical security that allows anyone to enter a server room, or unenforced password management on servers and workstations.<\/p>\n<h4 class=\"p3\">Threat<\/h4>\n<p class=\"p3\">A threat<span class=\"Apple-converted-space\">\u00a0 <\/span>occurs when someone identifies a specific vulnerability and uses it against a company or individual, thereby taking advantage of the vulnerability. A <b>threat agent<\/b> could be an intruder accessing the network through a port on the firewall, a process accessing data in a way that violates the security policy, or an employee circumventing controls in order to copy files to a medium that could expose confidential information.<\/p>\n<h4 class=\"p3\">Risk<\/h4>\n<p class=\"p3\">A risk is the likelihood of a threat agent exploiting a vulnerability and the corresponding business impact.<\/p>\n<p class=\"p3\">If a firewall has several ports open, there is a higher risk that an intruder will use one to access the network in an unauthorized method.<\/p>\n<p class=\"p3\">If users are not educated on processes and procedures, there is a risk that an employee will make an unintentional mistake that may destroy data.<\/p>\n<p class=\"p3\">If an Intrusion Detection System (IDS) is not implemented on a network, there is a higher risk an attack will go unnoticed until its too late.<\/p>\n<h4 class=\"p3\">Exposure<\/h4>\n<p class=\"p3\">Exposure is an instance of data being exposed. If users\u2019 passwords are exposed they may be accessed and used in an unauthorized manner.<\/p>\n<h4 class=\"p3\">Countermeasure<\/h4>\n<p class=\"p3\">Countermeasures are put into place to mitigate potential risks. A countermeasure may be a software configuration, a hardware device, or a procedure that eliminates a vulnerability or that reduces the chances a threat agent will be able to exploit a vulnerability. Examples of countermeasures are strong password management, firewalls, security guards, access control mechanisms, encryption and security awareness training.<\/p>\n<h4 class=\"p3\">Security Governance<\/h4>\n<p class=\"p3\">Information security governance is the collection of practices related to supporting, defining, and directing the security efforts of an organization. Security governance is closely related to and often intertwined with enterprise and IT governance.<\/p>\n<p>\u00a0<\/p>\n<p><strong>This article was written by Catherin S.\u00a0<\/strong><\/p>\n<h3 class=\"p3\">References<\/h3>\n<p class=\"p7\">https:\/\/csrc.nist.gov\/glossary\/term\/information_security<\/p>\n<p class=\"p3\">Devopedia. 2020. \u201cInformation Security Principles.\u201d Version 4, July 21. Accessed 2021-03-28. https:\/\/devopedia.org\/information-security-principles<\/p>\n<p class=\"p7\">Maymi, F., &amp; Harris, S. (2018). <i>CISSP All-In-One Exam Guide, Eighth Edition<\/i>. McGraw-Hill Education.<\/p>\n<p class=\"p7\">Vi Minh Toi. (2016, September 10). Security Risk Management, Tough Path to Success. Retrieved from https:\/\/www.slideshare.net\/sbc-vn\/vi-minh-toi-security-risk-management-tough-path-to-success<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Information Security \u2013 The protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability. \u2013 Definition of Information Security from the glossary of the U. S. Computer Security Resource Center Why we need to protect information Information and information systems help us [&hellip;]<\/p>\n","protected":false},"author":20,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[72],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v20.13) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Information Security \u2013 An Overview of General Concepts - FileCloud blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.filecloud.com\/blog\/information-security-an-overview-of-general-concepts\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information Security \u2013 An Overview of General Concepts\" \/>\n<meta property=\"og:description\" content=\"Information Security \u2013 The protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability. \u2013 Definition of Information Security from the glossary of the U. S. Computer Security Resource Center Why we need to protect information Information and information systems help us [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.filecloud.com\/blog\/information-security-an-overview-of-general-concepts\/\" \/>\n<meta property=\"og:site_name\" content=\"FileCloud blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/tonidopage\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-31T01:31:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-11T07:42:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2021\/03\/FileCloud-Security-thumb-14.png\" \/>\n<meta name=\"author\" content=\"esther cheng\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@getfilecloud\" \/>\n<meta name=\"twitter:site\" content=\"@getfilecloud\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"esther cheng\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/information-security-an-overview-of-general-concepts\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/information-security-an-overview-of-general-concepts\/\"},\"author\":{\"name\":\"esther cheng\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/16ec1253132b6a54486e23f5b8322d79\"},\"headline\":\"Information Security \u2013 An Overview of General Concepts\",\"datePublished\":\"2021-03-31T01:31:01+00:00\",\"dateModified\":\"2022-09-11T07:42:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/information-security-an-overview-of-general-concepts\/\"},\"wordCount\":813,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.filecloud.com\/blog\/information-security-an-overview-of-general-concepts\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/information-security-an-overview-of-general-concepts\/\",\"url\":\"https:\/\/www.filecloud.com\/blog\/information-security-an-overview-of-general-concepts\/\",\"name\":\"Information Security \u2013 An Overview of General Concepts - FileCloud blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/#website\"},\"datePublished\":\"2021-03-31T01:31:01+00:00\",\"dateModified\":\"2022-09-11T07:42:13+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/information-security-an-overview-of-general-concepts\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.filecloud.com\/blog\/information-security-an-overview-of-general-concepts\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/information-security-an-overview-of-general-concepts\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.filecloud.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Information Security \u2013 An Overview of General Concepts\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#website\",\"url\":\"https:\/\/www.filecloud.com\/blog\/\",\"name\":\"FileCloud blog\",\"description\":\"Topics on Private cloud, On-Premises, Self-Hosted, Enterprise File Sync and Sharing\",\"publisher\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.filecloud.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#organization\",\"name\":\"FileCloud\",\"url\":\"https:\/\/www.filecloud.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2016\/02\/filecloud_logo_comparison.jpg\",\"contentUrl\":\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2016\/02\/filecloud_logo_comparison.jpg\",\"width\":155,\"height\":40,\"caption\":\"FileCloud\"},\"image\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/tonidopage\",\"https:\/\/twitter.com\/getfilecloud\",\"https:\/\/www.linkedin.com\/company\/codelathe\",\"https:\/\/www.pinterest.com\/filecloud\/filecloud\/\",\"https:\/\/www.youtube.com\/channel\/UCbU5gTFdNCPESA5aGipFW6g\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/16ec1253132b6a54486e23f5b8322d79\",\"name\":\"esther cheng\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ea3b9ff8349c4929f9c0a484c3d7a5b9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ea3b9ff8349c4929f9c0a484c3d7a5b9?s=96&d=mm&r=g\",\"caption\":\"esther cheng\"},\"url\":\"https:\/\/www.filecloud.com\/blog\/author\/esther\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Information Security \u2013 An Overview of General Concepts - FileCloud blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.filecloud.com\/blog\/information-security-an-overview-of-general-concepts\/","og_locale":"en_US","og_type":"article","og_title":"Information Security \u2013 An Overview of General Concepts","og_description":"Information Security \u2013 The protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability. \u2013 Definition of Information Security from the glossary of the U. S. Computer Security Resource Center Why we need to protect information Information and information systems help us [&hellip;]","og_url":"https:\/\/www.filecloud.com\/blog\/information-security-an-overview-of-general-concepts\/","og_site_name":"FileCloud blog","article_publisher":"https:\/\/www.facebook.com\/tonidopage","article_published_time":"2021-03-31T01:31:01+00:00","article_modified_time":"2022-09-11T07:42:13+00:00","og_image":[{"url":"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2021\/03\/FileCloud-Security-thumb-14.png"}],"author":"esther cheng","twitter_card":"summary_large_image","twitter_creator":"@getfilecloud","twitter_site":"@getfilecloud","twitter_misc":{"Written by":"esther cheng","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.filecloud.com\/blog\/information-security-an-overview-of-general-concepts\/#article","isPartOf":{"@id":"https:\/\/www.filecloud.com\/blog\/information-security-an-overview-of-general-concepts\/"},"author":{"name":"esther cheng","@id":"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/16ec1253132b6a54486e23f5b8322d79"},"headline":"Information Security \u2013 An Overview of General Concepts","datePublished":"2021-03-31T01:31:01+00:00","dateModified":"2022-09-11T07:42:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.filecloud.com\/blog\/information-security-an-overview-of-general-concepts\/"},"wordCount":813,"commentCount":0,"publisher":{"@id":"https:\/\/www.filecloud.com\/blog\/#organization"},"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.filecloud.com\/blog\/information-security-an-overview-of-general-concepts\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.filecloud.com\/blog\/information-security-an-overview-of-general-concepts\/","url":"https:\/\/www.filecloud.com\/blog\/information-security-an-overview-of-general-concepts\/","name":"Information Security \u2013 An Overview of General Concepts - FileCloud blog","isPartOf":{"@id":"https:\/\/www.filecloud.com\/blog\/#website"},"datePublished":"2021-03-31T01:31:01+00:00","dateModified":"2022-09-11T07:42:13+00:00","breadcrumb":{"@id":"https:\/\/www.filecloud.com\/blog\/information-security-an-overview-of-general-concepts\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.filecloud.com\/blog\/information-security-an-overview-of-general-concepts\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.filecloud.com\/blog\/information-security-an-overview-of-general-concepts\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.filecloud.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Information Security \u2013 An Overview of General Concepts"}]},{"@type":"WebSite","@id":"https:\/\/www.filecloud.com\/blog\/#website","url":"https:\/\/www.filecloud.com\/blog\/","name":"FileCloud blog","description":"Topics on Private cloud, On-Premises, Self-Hosted, Enterprise File Sync and Sharing","publisher":{"@id":"https:\/\/www.filecloud.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.filecloud.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.filecloud.com\/blog\/#organization","name":"FileCloud","url":"https:\/\/www.filecloud.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.filecloud.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2016\/02\/filecloud_logo_comparison.jpg","contentUrl":"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2016\/02\/filecloud_logo_comparison.jpg","width":155,"height":40,"caption":"FileCloud"},"image":{"@id":"https:\/\/www.filecloud.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/tonidopage","https:\/\/twitter.com\/getfilecloud","https:\/\/www.linkedin.com\/company\/codelathe","https:\/\/www.pinterest.com\/filecloud\/filecloud\/","https:\/\/www.youtube.com\/channel\/UCbU5gTFdNCPESA5aGipFW6g"]},{"@type":"Person","@id":"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/16ec1253132b6a54486e23f5b8322d79","name":"esther cheng","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ea3b9ff8349c4929f9c0a484c3d7a5b9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ea3b9ff8349c4929f9c0a484c3d7a5b9?s=96&d=mm&r=g","caption":"esther cheng"},"url":"https:\/\/www.filecloud.com\/blog\/author\/esther\/"}]}},"_links":{"self":[{"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/posts\/29937"}],"collection":[{"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/comments?post=29937"}],"version-history":[{"count":19,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/posts\/29937\/revisions"}],"predecessor-version":[{"id":34405,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/posts\/29937\/revisions\/34405"}],"wp:attachment":[{"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/media?parent=29937"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/categories?post=29937"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/tags?post=29937"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}