{"id":432706,"date":"2018-04-05T10:51:58","date_gmt":"2018-04-05T10:51:58","guid":{"rendered":"https:\/\/essaypaper.org\/provide-five-5-guidelines-that-should-be-used-to-reduce-a-networks-attack-surface-for-industrial-control-systems\/"},"modified":"2018-10-24T09:19:53","modified_gmt":"2018-10-24T09:19:53","slug":"provide-five-5-guidelines-that-should-be-used-to-reduce-a-networks-attack-surface-for-industrial-control-systems","status":"publish","type":"post","link":"https:\/\/www.benedictsol.com\/blogs\/provide-five-5-guidelines-that-should-be-used-to-reduce-a-networks-attack-surface-for-industrial-control-systems\/","title":{"rendered":"Provide five (5) guidelines that should be used to reduce a network\u2019s attack surface for industrial control systems."},"content":{"rendered":"<div>\n<!-- head --><br \/>\n<head><br \/>\n<!-- meta --><br \/>\n<meta charset=\"UTF-8\"\/><br \/>\n<meta name=\"viewport\" content=\"width=device-width, initial-scale=1, maximum-scale=1\"\/>\n<link rel=\"shortcut icon\" href=\"https:\/\/brainytermpapers.com\/wp-content\/uploads\/2017\/11\/favicon.png\"\/>\n<!-- wp_head() --><br \/>\n<title>Provide five (5) guidelines that should be used to reduce a network\u2019s attack surface for industrial control systems. &#8211; Academic Writing<\/title><br \/>\n<!-- script | dynamic --><br \/>\n<!-- This site is optimized with the Yoast SEO plugin v7.0.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<link rel=\"canonical\" href=\"https:\/\/brainytermpapers.com\/provide-five-5-guidelines-that-should-be-used-to-reduce-a-networks-attack-surface-for-industrial-control-systems\/\"\/>\n<meta property=\"og:locale\" content=\"en_US\"\/><br \/>\n<meta property=\"og:type\" content=\"article\"\/><br \/>\n<meta property=\"og:title\" content=\"Provide five (5) guidelines that should be used to reduce a network\u2019s attack surface for industrial control systems. - Academic Writing\"\/><br \/>\n<meta property=\"og:description\" content=\"In June 2010, Stuxnet, a complex and highly sophisticated computer worm was discovered by Kaspersky Lab. Stuxnet targeted Siemens industrial Supervisory Control and Data Acquisition (SCADA) [\u2026]\"\/><br \/>\n<meta property=\"og:url\" content=\"https:\/\/brainytermpapers.com\/provide-five-5-guidelines-that-should-be-used-to-reduce-a-networks-attack-surface-for-industrial-control-systems\/\"\/><br \/>\n<meta property=\"og:site_name\" content=\"Academic Writing\"\/><br \/>\n<meta property=\"article:section\" content=\"Brainy Term Papers\"\/><br \/>\n<meta property=\"article:published_time\" content=\"2018-04-05T10:18:17+00:00\"\/><br \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\"\/><br \/>\n<meta name=\"twitter:description\" content=\"In June 2010, Stuxnet, a complex and highly sophisticated computer worm was discovered by Kaspersky Lab. Stuxnet targeted Siemens industrial Supervisory Control and Data Acquisition (SCADA) [\u2026]\"\/><br \/>\n<meta name=\"twitter:title\" content=\"Provide five (5) guidelines that should be used to reduce a network\u2019s attack surface for industrial control systems. - Academic Writing\"\/><br \/>\n<!-- \/ Yoast SEO plugin. -->\n<link rel=\"dns-prefetch\" href=\"\/\/s0.wp.com\"\/>\n<link rel=\"dns-prefetch\" href=\"\/\/secure.gravatar.com\"\/>\n<link rel=\"dns-prefetch\" href=\"\/\/fonts.googleapis.com\"\/>\n<link rel=\"dns-prefetch\" href=\"\/\/s.w.org\"\/>\n<link rel=\"alternate\" type=\"application\/rss+xml\" title=\"Academic Writing \u00bb Feed\" href=\"https:\/\/brainytermpapers.com\/feed\/\"\/>\n<link rel=\"alternate\" type=\"application\/rss+xml\" title=\"Academic Writing \u00bb Comments Feed\" href=\"https:\/\/brainytermpapers.com\/comments\/feed\/\"\/>\n<link rel=\"alternate\" type=\"application\/rss+xml\" title=\"Academic Writing \u00bb Provide five (5) guidelines that should be used to reduce a network\u2019s attack surface for industrial control systems. Comments Feed\" href=\"https:\/\/brainytermpapers.com\/provide-five-5-guidelines-that-should-be-used-to-reduce-a-networks-attack-surface-for-industrial-control-systems\/feed\/\"\/>\n<!-- This site uses the Google Analytics by MonsterInsights plugin v7.0.4 - Using Analytics tracking - https:\/\/www.monsterinsights.com\/ -->&#13;<br \/>\n&#13;<br \/>\n<!-- \/ Google Analytics by MonsterInsights -->&#13;\n<link rel=\"stylesheet\" id=\"jquery.bxslider-css\" href=\"\/\/brainytermpapers.com\/wp-content\/plugins\/testimonials-widget\/includes\/libraries\/bxslider-4\/dist\/jquery.bxslider.css?ver=4.9.4\" type=\"text\/css\" media=\"all\"\/>\n<link rel=\"stylesheet\" id=\"Axl_Testimonials_Widget-css\" href=\"\/\/brainytermpapers.com\/wp-content\/plugins\/testimonials-widget\/assets\/css\/testimonials-widget.css?ver=4.9.4\" type=\"text\/css\" media=\"all\"\/>\n<link rel=\"stylesheet\" id=\"bee-custom-style-css\" href=\"https:\/\/brainytermpapers.com\/wp-content\/plugins\/bee-layer-slider\/includes\/includes\/bee_custom_css.css?ver=4.9.4\" type=\"text\/css\" media=\"all\"\/>\n<link rel=\"stylesheet\" id=\"bee-slider-css\" href=\"https:\/\/brainytermpapers.com\/wp-content\/plugins\/bee-layer-slider\/public\/css\/bee-slider-public.css?ver=1.0.0\" type=\"text\/css\" media=\"all\"\/>\n<link rel=\"stylesheet\" id=\"contact-form-7-css\" href=\"https:\/\/brainytermpapers.com\/wp-content\/plugins\/contact-form-7\/includes\/css\/styles.css?ver=5.0.1\" type=\"text\/css\" media=\"all\"\/>\n<link rel=\"stylesheet\" id=\"wpsm_counter-font-awesome-front-css\" href=\"https:\/\/brainytermpapers.com\/wp-content\/plugins\/counter-number-showcase\/assets\/css\/font-awesome\/css\/font-awesome.min.css?ver=4.9.4\" type=\"text\/css\" media=\"all\"\/>\n<link rel=\"stylesheet\" id=\"wpsm_counter_bootstrap-front-css\" href=\"https:\/\/brainytermpapers.com\/wp-content\/plugins\/counter-number-showcase\/assets\/css\/bootstrap-front.css?ver=4.9.4\" type=\"text\/css\" media=\"all\"\/>\n<link rel=\"stylesheet\" id=\"wpsm_counter_column-css\" href=\"https:\/\/brainytermpapers.com\/wp-content\/plugins\/counter-number-showcase\/assets\/css\/counter-column.css?ver=4.9.4\" type=\"text\/css\" media=\"all\"\/>\n<link rel=\"stylesheet\" id=\"rs-plugin-settings-css\" href=\"https:\/\/brainytermpapers.com\/wp-content\/plugins\/revslider\/public\/assets\/css\/settings.css?ver=5.4.6.3.1\" type=\"text\/css\" media=\"all\"\/>\n<link rel=\"stylesheet\" id=\"flxmap-css\" href=\"https:\/\/brainytermpapers.com\/wp-content\/plugins\/wp-flexible-map\/css\/styles.css?ver=1.13.0\" type=\"text\/css\" media=\"all\"\/>\n<link rel=\"stylesheet\" id=\"style-css\" href=\"https:\/\/brainytermpapers.com\/wp-content\/themes\/betheme\/style.css?ver=20.7.6\" type=\"text\/css\" media=\"all\"\/>\n<link rel=\"stylesheet\" id=\"mfn-base-css\" href=\"https:\/\/brainytermpapers.com\/wp-content\/themes\/betheme\/css\/base.css?ver=20.7.6\" type=\"text\/css\" media=\"all\"\/>\n<link rel=\"stylesheet\" id=\"mfn-layout-css\" href=\"https:\/\/brainytermpapers.com\/wp-content\/themes\/betheme\/css\/layout.css?ver=20.7.6\" type=\"text\/css\" media=\"all\"\/>\n<link rel=\"stylesheet\" id=\"mfn-shortcodes-css\" href=\"https:\/\/brainytermpapers.com\/wp-content\/themes\/betheme\/css\/shortcodes.css?ver=20.7.6\" type=\"text\/css\" media=\"all\"\/>\n<link rel=\"stylesheet\" id=\"mfn-animations-css\" href=\"https:\/\/brainytermpapers.com\/wp-content\/themes\/betheme\/assets\/animations\/animations.min.css?ver=20.7.6\" type=\"text\/css\" media=\"all\"\/>\n<link rel=\"stylesheet\" id=\"mfn-jquery-ui-css\" href=\"https:\/\/brainytermpapers.com\/wp-content\/themes\/betheme\/assets\/ui\/jquery.ui.all.css?ver=20.7.6\" type=\"text\/css\" media=\"all\"\/>\n<link rel=\"stylesheet\" id=\"mfn-jplayer-css\" href=\"https:\/\/brainytermpapers.com\/wp-content\/themes\/betheme\/assets\/jplayer\/css\/jplayer.blue.monday.css?ver=20.7.6\" type=\"text\/css\" media=\"all\"\/>\n<link rel=\"stylesheet\" id=\"mfn-responsive-css\" href=\"https:\/\/brainytermpapers.com\/wp-content\/themes\/betheme\/css\/responsive.css?ver=20.7.6\" type=\"text\/css\" media=\"all\"\/>\n<link rel=\"stylesheet\" id=\"Poppins-css\" href=\"https:\/\/fonts.googleapis.com\/css?family=Poppins%3A1%2C300%2C400%2C400italic%2C500%2C600%2C700%2C700italic&amp;ver=4.9.4\" type=\"text\/css\" media=\"all\"\/>\n<link rel=\"stylesheet\" id=\"rt_frontend_style-css\" href=\"https:\/\/brainytermpapers.com\/wp-content\/plugins\/automatic-responsive-tables\/css\/style.css?ver=4.9.4\" type=\"text\/css\" media=\"all\"\/>\n<!--[if lt IE 9]>\n<link rel='stylesheet' id='art_ie_stylesheet-css'  href='https:\/\/brainytermpapers.com\/wp-content\/plugins\/automatic-responsive-tables\/css\/style-ie.css?ver=4.9.4' type='text\/css' media='all' \/>\n<![endif]--><br \/>\n<!--[if lte IE 8]>\n<link rel='stylesheet' id='jetpack-carousel-ie8fix-css'  href='https:\/\/brainytermpapers.com\/wp-content\/plugins\/jetpack\/modules\/carousel\/jetpack-carousel-ie8fix.css?ver=20121024' type='text\/css' media='all' \/>\n<![endif]-->\n<link rel=\"stylesheet\" id=\"social-logos-css\" href=\"https:\/\/brainytermpapers.com\/wp-content\/plugins\/jetpack\/_inc\/social-logos\/social-logos.min.css?ver=1\" type=\"text\/css\" media=\"all\"\/>\n<link rel=\"stylesheet\" id=\"jetpack_css-css\" href=\"https:\/\/brainytermpapers.com\/wp-content\/plugins\/jetpack\/css\/jetpack.css?ver=5.9\" type=\"text\/css\" media=\"all\"\/>\n<link rel=\"https:\/\/api.w.org\/\" href=\"https:\/\/brainytermpapers.com\/wp-json\/\"\/>\n<link rel=\"EditURI\" type=\"application\/rsd+xml\" title=\"RSD\" href=\"https:\/\/brainytermpapers.com\/xmlrpc.php?rsd\"\/>\n<link rel=\"wlwmanifest\" type=\"application\/wlwmanifest+xml\" href=\"https:\/\/brainytermpapers.com\/wp-includes\/wlwmanifest.xml\"\/>\n<meta name=\"generator\" content=\"WordPress 4.9.4\"\/>\n<link rel=\"shortlink\" href=\"https:\/\/wp.me\/p9s6rr-6bF\"\/>\n<link rel=\"alternate\" type=\"application\/json+oembed\" href=\"https:\/\/brainytermpapers.com\/wp-json\/oembed\/1.0\/embed?url=https%3A%2F%2Fbrainytermpapers.com%2Fprovide-five-5-guidelines-that-should-be-used-to-reduce-a-networks-attack-surface-for-industrial-control-systems%2F\"\/>\n<link rel=\"alternate\" type=\"text\/xml+oembed\" href=\"https:\/\/brainytermpapers.com\/wp-json\/oembed\/1.0\/embed?url=https%3A%2F%2Fbrainytermpapers.com%2Fprovide-five-5-guidelines-that-should-be-used-to-reduce-a-networks-attack-surface-for-industrial-control-systems%2F&amp;format=xml\"\/>\n&#13;<br \/>\n&#13;\n<link rel=\"dns-prefetch\" href=\"\/\/v0.wordpress.com\"\/>&#13;\n<link rel=\"dns-prefetch\" href=\"\/\/widgets.wp.com\"\/>&#13;\n<link rel=\"dns-prefetch\" href=\"\/\/s0.wp.com\"\/>&#13;\n<link rel=\"dns-prefetch\" href=\"\/\/0.gravatar.com\"\/>&#13;\n<link rel=\"dns-prefetch\" href=\"\/\/1.gravatar.com\"\/>&#13;\n<link rel=\"dns-prefetch\" href=\"\/\/2.gravatar.com\"\/>&#13;\n<link rel=\"dns-prefetch\" href=\"\/\/i0.wp.com\"\/>&#13;\n<link rel=\"dns-prefetch\" href=\"\/\/i1.wp.com\"\/>&#13;\n<link rel=\"dns-prefetch\" href=\"\/\/i2.wp.com\"\/>&#13;\n<link rel=\"dns-prefetch\" href=\"\/\/jetpack.wordpress.com\"\/>&#13;\n<link rel=\"dns-prefetch\" href=\"\/\/s1.wp.com\"\/>&#13;\n<link rel=\"dns-prefetch\" href=\"\/\/s2.wp.com\"\/>&#13;\n<link rel=\"dns-prefetch\" href=\"\/\/public-api.wordpress.com\"\/>&#13;<br \/>\n<!-- style | background --><br \/>\n<!-- style | dynamic --><br \/>\n<!-- style | custom css | theme options --><br \/>\n<!--[if lt IE 9]>\n<script id=\"mfn-html5\" src=\"https:\/\/html5shiv.googlecode.com\/svn\/trunk\/html5.js\"><\/script>\n<![endif]--><br \/>\n<meta name=\"generator\" content=\"Powered by Slider Revolution 5.4.6.3.1 - responsive, Mobile-Friendly Slider Plugin for WordPress with comfortable drag and drop interface.\"\/>\n<link rel=\"icon\" href=\"https:\/\/i1.wp.com\/brainytermpapers.com\/wp-content\/uploads\/2017\/12\/logo-template.fw_-1.png?fit=32%2C5&amp;ssl=1\" \/>\n<link rel=\"icon\" href=\"https:\/\/i1.wp.com\/brainytermpapers.com\/wp-content\/uploads\/2017\/12\/logo-template.fw_-1.png?fit=192%2C28&amp;ssl=1\" \/>\n<link rel=\"apple-touch-icon-precomposed\" href=\"https:\/\/i1.wp.com\/brainytermpapers.com\/wp-content\/uploads\/2017\/12\/logo-template.fw_-1.png?fit=180%2C27&amp;ssl=1\"\/>\n<meta name=\"msapplication-TileImage\" content=\"https:\/\/i1.wp.com\/brainytermpapers.com\/wp-content\/uploads\/2017\/12\/logo-template.fw_-1.png?fit=270%2C40&amp;ssl=1\"\/><br \/>\n<!-- BEGIN GADWP v5.3.1.1 Universal Analytics - https:\/\/deconf.com\/google-analytics-dashboard-wordpress\/ --><br \/>\n<!-- END GADWP Universal Analytics --><br \/>\n<\/head><br \/>\n<!-- body --><br \/>\n<body class=\"post-template-default single single-post postid-23787 single-format-standard unselectable  with_aside aside_both color-custom style-default button-default layout-full-width hide-love header-classic minimalist-header-no sticky-header sticky-tb-color ab-show subheader-both-center menu-arrow-top mobile-tb-center mobile-side-slide mobile-mini-mr-ll tablet-sticky mobile-header-mini mobile-sticky be-reg-2076\" id=\"wp_automatic_ReadabilityBody\"><br \/>\n\t<!-- mfn_hook_top --><!-- mfn_hook_top --><br \/>\n\t<!-- #Wrapper --><\/p>\n<div id=\"Wrapper\">\n\t\t<!-- #Header_bg --><br \/>\n\t\t<!-- mfn_hook_content_before --><!-- mfn_hook_content_before --><br \/>\n<!-- #Content --><\/p>\n<div id=\"Content\">\n<div class=\"content_wrapper clearfix\">\n\t\t<!-- .sections_group --><\/p>\n<div class=\"sections_group\">\n<div id=\"post-23787\" class=\"no-img no-title share-simple post-23787 post type-post status-publish format-standard hentry category-brainy-term-papers\">\n\t<span class=\"arrow\"><i class=\"icon-left-open-big\"\/><\/span><\/p>\n<p><h6>Describe the long-term effects of exercise on the cardiovascular and respiratory systems<\/h6>\n<p><span class=\"date\"><i class=\"icon-clock\"\/>April 5, 2018<\/span><\/p>\n<div class=\"post-wrapper-content\">\n<div class=\"section the_content has_content\">\n<div class=\"section_wrapper\">\n<div class=\"the_content_wrapper\">\n<p>In June 2010, Stuxnet, a complex and highly sophisticated computer worm was discovered by Kaspersky Lab. Stuxnet targeted Siemens industrial Supervisory Control and Data Acquisition (SCADA) systems. It was reported that the worm appeared to target Iran\u2019s uranium enrichment infrastructure. Most computer worms and viruses tend to target consumer systems such as desktop computers and laptop computers.<\/p>\n<p>You can learn more about Stuxnet at http:\/\/www.youtube.com\/watch?v=scNkLWV7jSw.<\/p>\n<p>Write a four to five (4-5) page paper in which you:<\/p>\n<h5>Analyze the level of security requirements between industrial systems and consumer devices such as desktop computers. Address if they should be the same or different.<br \/>Analyze the anatomy of Stuxnet and how it was able to damage Iran\u2019s SCADA systems.<br \/>Evaluate the lessons that were learned from Stuxnet about the vulnerability of Iran\u2019s SCADA systems. Suggest how the attacks could have been prevented.<br \/>Provide five (5) guidelines that should be used to reduce a network\u2019s attack surface for industrial control systems.<br \/>Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.<\/h5>\n<p>\u00a0<\/p>\n<h4 style=\"text-align: center;\">&#8220;PLACE THIS ORDER OR A SIMILAR ORDER WITH BRAINY TERM PAPERS AND GET AN AMAZING DISCOUNT&#8221;<\/h4>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"14111\" data-permalink=\"https:\/\/brainytermpapers.com\/?attachment_id=14111\" data-orig-file=\"https:\/\/i2.wp.com\/brainytermpapers.com\/wp-content\/uploads\/2018\/01\/get-your-custom-paper.png?fit=380%2C101&amp;ssl=1\" data-orig-size=\"380,101\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"get-your-custom-paper\" data-image-description=\"\" data-medium-file=\"https:\/\/i2.wp.com\/brainytermpapers.com\/wp-content\/uploads\/2018\/01\/get-your-custom-paper.png?fit=380%2C101&amp;ssl=1\" data-large-file=\"https:\/\/i2.wp.com\/brainytermpapers.com\/wp-content\/uploads\/2018\/01\/get-your-custom-paper.png?fit=380%2C101&amp;ssl=1\" class=\"size-full wp-image-14111 aligncenter\" src=\"https:\/\/i2.wp.com\/brainytermpapers.com\/wp-content\/uploads\/2018\/01\/get-your-custom-paper.png?resize=380%2C101&amp;ssl=1\" alt=\"\" width=\"380\" height=\"101\" data-recalc-dims=\"1\"\/><\/p>\n<div class=\"sharedaddy sd-block sd-like jetpack-likes-widget-wrapper jetpack-likes-widget-unloaded\" id=\"like-post-wrapper-139684973-23787-5ac5ffd02e070\" data-src=\"https:\/\/widgets.wp.com\/likes\/#blog_id=139684973&amp;post_id=23787&amp;origin=brainytermpapers.com&amp;obj_id=139684973-23787-5ac5ffd02e070\" data-name=\"like-post-frame-139684973-23787-5ac5ffd02e070\">\n<h3 class=\"sd-title\">Like this:<\/h3>\n<p><span class=\"button\"><span>Like<\/span><\/span> <span class=\"loading\">Loading&#8230;<\/span><\/p>\n<p><span class=\"sd-text-color\"\/><a class=\"sd-link-color\"\/><\/div>\n<p><h3 class=\"jp-relatedposts-headline\"><em>Related<\/em><\/h3>\n<\/p>\n<\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n<p>\t\t<!-- .four-columns - sidebar -->\n\t<\/div>\n<\/div>\n<p><!-- mfn_hook_content_after --><!-- mfn_hook_content_after --><br \/>\n<!-- #Footer -->\n<\/div>\n<p><!-- #Wrapper --><br \/>\n<!-- mfn_hook_bottom --><!-- mfn_hook_bottom --><br \/>\n<!-- wp_footer() --><br \/>\n<!--Start of Tawk.to Script (0.3.3)--><br \/>\n<!--End of Tawk.to Script (0.3.3)-->\t<\/p>\n<p><span>error: <\/span>Content is protected !!<\/p>\n<p>&#13;<br \/>\n\t&#13;<br \/>\n\t&#13;<br \/>\n\t<iframe src=\"https:\/\/widgets.wp.com\/likes\/master.html?ver=20171126#ver=20171126\" scrolling=\"no\" id=\"likes-master\" name=\"likes-master\" style=\"display:none;\"><\/iframe><br \/>\n<\/body>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Provide five (5) guidelines that should be used to reduce a network\u2019s attack surface for industrial control systems. &#8211; Academic Writing &#13; &#13; &#13; &#13; &#13; &#13; &#13; &#13; &#13; &#13; &#13; &#13; &#13; &#13; &#13; &#13; &#13; &#13; Describe <a href=\"https:\/\/www.benedictsol.com\/blogs\/provide-five-5-guidelines-that-should-be-used-to-reduce-a-networks-attack-surface-for-industrial-control-systems\/\" class=\"read-more\">Read More &#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[144,16,145,146],"tags":[],"class_list":["post-432706","post","type-post","status-publish","format-standard","hentry","category-academic-papers","category-academic-writing","category-academic-writing-service","category-academy-management-assignment-help"],"_links":{"self":[{"href":"https:\/\/www.benedictsol.com\/blogs\/wp-json\/wp\/v2\/posts\/432706","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.benedictsol.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.benedictsol.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.benedictsol.com\/blogs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.benedictsol.com\/blogs\/wp-json\/wp\/v2\/comments?post=432706"}],"version-history":[{"count":0,"href":"https:\/\/www.benedictsol.com\/blogs\/wp-json\/wp\/v2\/posts\/432706\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.benedictsol.com\/blogs\/wp-json\/wp\/v2\/media?parent=432706"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.benedictsol.com\/blogs\/wp-json\/wp\/v2\/categories?post=432706"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.benedictsol.com\/blogs\/wp-json\/wp\/v2\/tags?post=432706"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}