{"id":7684,"date":"2018-12-13T01:13:36","date_gmt":"2018-12-13T01:13:36","guid":{"rendered":"http:\/\/blog.nsfocusglobal.com\/?p=769"},"modified":"2018-12-13T01:13:36","modified_gmt":"2018-12-13T01:13:36","slug":"missing-leg-integrity-cia-triad","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/missing-leg-integrity-cia-triad\/","title":{"rendered":"The missing leg \u2013 integrity in the CIA triad"},"content":{"rendered":"<p>Linkedin<\/p>\n<h2><a href=\"https:\/\/www.linkedin.com\/in\/evanderburg\">Eric Vanderburg<\/a><\/h2>\n<p>Information security is often described using the\u00a0<a href=\"http:\/\/whatis.techtarget.com\/definition\/Confidentiality-integrity-and-availability-CIA\">CIA Triad<\/a>. The CIA stands for Confidentiality, Integrity, and Availability and these are the three elements of data that\u00a0<a href=\"http:\/\/lt.dell.com\/lt\/lt.aspx?CID=286149&amp;LID=5490761&amp;DGC=SM&amp;DGSeg=GEN&amp;RED=301&amp;DURL=http:\/\/www.dell.com\/learn\/us\/en\/555\/by-service-type-information-security\">information security<\/a>\u00a0tries to protect. If we look at the CIA triad from the attacker\u2019s viewpoint, they would seek to compromise confidentiality by stealing data, integrity by manipulating data and availability by deleting data or taking down the systems that host the data.<\/p>\n<p style=\"font-style: inherit;\">By and far, most attacks have been focused on disrupting confidentiality or availability so defense mechanisms and training has also been focused there. The number of data breaches has skyrocketed and there is a flourishing market for stolen data including personal health information, credit card numbers, social security numbers, advertising lists, and proprietary technology. We also see many attacks on availability through\u00a0<a href=\"http:\/\/lt.dell.com\/lt\/lt.aspx?CID=286149&amp;LID=5490761&amp;DGC=SM&amp;DGSeg=GEN&amp;RED=301&amp;DURL=http:\/\/www.secureworks.com\/assets\/pdf-store\/articles\/Understanding_and_Combating_DDoS_Attacks.pdf\">Denial of Service<\/a>.<\/p>\n<p style=\"font-style: inherit;\">Integrity attacks are much less commonplace, but they still represent a threat. Organizations must protect more than just confidentiality to be secure (see\u00a0<a href=\"http:\/\/lt.dell.com\/lt\/lt.aspx?CID=286149&amp;LID=5490761&amp;DGC=SM&amp;DGSeg=GEN&amp;RED=301&amp;DURL=https:\/\/powermore.dell.com\/technology\/common-cybersecurity-myths-debunked\/\">Overly and Howell\u2019s Myth #3<\/a>).<\/p>\n<p style=\"font-style: inherit;\">So what does an attack on integrity look like? Let\u2019s look at three examples<\/p>\n<p style=\"font-style: inherit;\"><strong>1) Enticing an opponent to make a bad decision<\/strong><\/p>\n<p style=\"font-style: inherit;\">There is a software development saying that goes, \u201cGarbage in, garbage out,\u201d meaning if you let junk data into your program, it will produce junk for output. Similarly, junk data used in decision making will result in bad decisions. Integrity attacks of this sort aim to sabotage competitors or opponents by poisoning information stores that their competitors use to make critical decisions.<\/p>\n<p style=\"font-style: inherit;\"><strong>2) Exploiting temporary data inconsistencies<\/strong><\/p>\n<p style=\"font-style: inherit;\">Attackers modify the time on a Network Time Protocol server so that door access control systems think it is the middle of the day instead of the middle of the night. Consequently, the doors unlock or require only a pin instead of multi-factor authentication.<\/p>\n<p style=\"font-style: inherit;\">In another example, thieves momentarily inflate the balance of accounts before performing a wire transfer or stock ticker symbols are changed in a trading company database resulting in many incorrect stock transactions and inflated or deflated stock valuation by the market.<\/p>\n<p style=\"font-style: inherit;\"><strong>3) Online Vandalism<\/strong><\/p>\n<p style=\"font-style: inherit;\">Hacktivists or cyber activists often employ online vandalism to spread their message and others vandalize sites for fun or to hurt brand image. For example, the\u00a0<a href=\"http:\/\/www.ic3.gov\/media\/2015\/150407-1.aspx\">FBI issued a warning<\/a>\u00a0in April that ISIL was mass-defacing WordPress websites using known vulnerabilities.<\/p>\n<p style=\"font-style: inherit;\">The good news is that many of the technical controls organizations already have in place to protect the confidentiality and availability of data can also be used to protect its integrity since attackers must exploit similar vulnerabilities or access the same systems on which they perform other attacks. However, procedures and training may need to be updated so that employees are aware of such threats and how to recognize them. Furthermore, the data that goes into critical decisions should be validated through alternate sources. Consider the following:<\/p>\n<ul>\n<li style=\"font-style: inherit; font-weight: inherit;\">Require\u00a0<a href=\"http:\/\/lt.dell.com\/lt\/lt.aspx?CID=286149&amp;LID=5490761&amp;DGC=SM&amp;DGSeg=GEN&amp;RED=301&amp;DURL=http:\/\/www.secureworks.com\/consulting\/technical-testing-assessments\/application-security-testing\/\">application security assessments<\/a>\u00a0to address integrity as well as confidentiality and availability.<\/li>\n<li style=\"font-style: inherit; font-weight: inherit;\">Conduct a risk analysis of the loss of data integrity for key information systems and use these risk calculations to ensure that controls adequately address risk levels.<\/li>\n<li style=\"font-style: inherit; font-weight: inherit;\">Update security awareness training to include sections on data integrity, validation and incident reporting.<\/li>\n<li style=\"font-style: inherit; font-weight: inherit;\">Ensure that security policies and procedures address integrity as well as confidentiality and availability.<\/li>\n<\/ul>\n<p style=\"font-style: inherit;\"><em>This post was written as part of the Dell Insight Partners program, which provides news and analysis about the evolving world of tech. To learn more about tech news and analysis visit\u00a0<\/em><a href=\"http:\/\/techpageone.dell.com\/\"><em>Future Ready<\/em><\/a><em>.\u00a0<\/em><a href=\"http:\/\/www.dell.com\/\"><em>Dell<\/em><\/a><em>\u00a0sponsored this article, but the opinions are my own and don\u2019t necessarily represent Dell\u2019s positions or strategies.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Linkedin Eric Vanderburg Information security is often described using the\u00a0CIA Triad. The CIA stands for Confidentiality, Integrity, and Availability and these are the three elements of data that\u00a0information security\u00a0tries to protect. If we look at the CIA triad from the attacker\u2019s viewpoint, they would seek to compromise confidentiality by stealing data, integrity by manipulating data [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":31684,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[20],"tags":[],"class_list":["post-7684","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The missing leg \u2013 integrity in the CIA triad - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The missing leg \u2013 integrity in the CIA triad - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Linkedin Eric Vanderburg Information security is often described using the\u00a0CIA Triad. The CIA stands for Confidentiality, Integrity, and Availability and\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/missing-leg-integrity-cia-triad\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2018-12-13T01:13:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2025\/04\/eqtylab.png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"The missing leg \u2013 integrity in the CIA triad - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Linkedin Eric Vanderburg Information security is often described using the\u00a0CIA Triad. The CIA stands for Confidentiality, Integrity, and Availability and\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2025\/04\/eqtylab.png\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/missing-leg-integrity-cia-triad\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/missing-leg-integrity-cia-triad\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"The missing leg \u2013 integrity in the CIA triad\",\"datePublished\":\"2018-12-13T01:13:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/missing-leg-integrity-cia-triad\\\/\"},\"wordCount\":600,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/missing-leg-integrity-cia-triad\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/eqtylab.png\",\"articleSection\":[\"Uncategorized\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/missing-leg-integrity-cia-triad\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/missing-leg-integrity-cia-triad\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/missing-leg-integrity-cia-triad\\\/\",\"name\":\"The missing leg \u2013 integrity in the CIA triad - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/missing-leg-integrity-cia-triad\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/missing-leg-integrity-cia-triad\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/eqtylab.png\",\"datePublished\":\"2018-12-13T01:13:36+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/missing-leg-integrity-cia-triad\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/missing-leg-integrity-cia-triad\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/missing-leg-integrity-cia-triad\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/eqtylab.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/eqtylab.png\",\"width\":900,\"height\":383,\"caption\":\"Logo featuring RSAC Innovation Sandbox and IoT Lab.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/missing-leg-integrity-cia-triad\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The missing leg \u2013 integrity in the CIA triad\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The missing leg \u2013 integrity in the CIA triad - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"The missing leg \u2013 integrity in the CIA triad - NSFOCUS","og_description":"Linkedin Eric Vanderburg Information security is often described using the\u00a0CIA Triad. The CIA stands for Confidentiality, Integrity, and Availability and","og_url":"https:\/\/nsfocusglobal.com\/missing-leg-integrity-cia-triad\/","og_site_name":"NSFOCUS","article_published_time":"2018-12-13T01:13:36+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2025\/04\/eqtylab.png","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"The missing leg \u2013 integrity in the CIA triad - NSFOCUS","twitter_description":"Linkedin Eric Vanderburg Information security is often described using the\u00a0CIA Triad. The CIA stands for Confidentiality, Integrity, and Availability and","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2025\/04\/eqtylab.png","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/missing-leg-integrity-cia-triad\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/missing-leg-integrity-cia-triad\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"The missing leg \u2013 integrity in the CIA triad","datePublished":"2018-12-13T01:13:36+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/missing-leg-integrity-cia-triad\/"},"wordCount":600,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/missing-leg-integrity-cia-triad\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2025\/04\/eqtylab.png","articleSection":["Uncategorized"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/missing-leg-integrity-cia-triad\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/missing-leg-integrity-cia-triad\/","url":"https:\/\/nsfocusglobal.com\/missing-leg-integrity-cia-triad\/","name":"The missing leg \u2013 integrity in the CIA triad - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/missing-leg-integrity-cia-triad\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/missing-leg-integrity-cia-triad\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2025\/04\/eqtylab.png","datePublished":"2018-12-13T01:13:36+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/missing-leg-integrity-cia-triad\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/missing-leg-integrity-cia-triad\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/missing-leg-integrity-cia-triad\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2025\/04\/eqtylab.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2025\/04\/eqtylab.png","width":900,"height":383,"caption":"Logo featuring RSAC Innovation Sandbox and IoT Lab."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/missing-leg-integrity-cia-triad\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"The missing leg \u2013 integrity in the CIA triad"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/7684","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=7684"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/7684\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/31684"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=7684"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=7684"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=7684"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}