{"id":1448,"date":"2020-05-09T17:31:40","date_gmt":"2020-05-09T12:01:40","guid":{"rendered":"https:\/\/binaryterms.com\/?p=1448"},"modified":"2021-01-18T11:30:25","modified_gmt":"2021-01-18T06:00:25","slug":"fundamental-security-design-principles","status":"publish","type":"post","link":"https:\/\/binaryterms.com\/fundamental-security-design-principles.html","title":{"rendered":"Fundamental Security Design Principles"},"content":{"rendered":"<p>The security design principles are considered while designing any security mechanism for a system. These principles are review to develop a secure system which prevents the security flaws and also prevents unwanted access to the system.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1454\" src=\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/Security-Design-Principles.jpg\" alt=\"Security Design Principles\" width=\"325\" height=\"121\" srcset=\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/Security-Design-Principles.jpg 325w, https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/Security-Design-Principles-300x112.jpg 300w\" sizes=\"auto, (max-width: 325px) 100vw, 325px\" \/><\/p>\n<p>Below is the list of fundamental security design principles provided by the National Centres of Academic Excellence in Information Assurance\/Cyber Defence, along with the U.S. National Security Agency and the U.S. Department of Homeland Security.<\/p>\n<h2>Fundamental Security Design Principles<\/h2>\n<ol>\n<li><a href=\"#EconomyofMechanism\">Economy of Mechanism<\/a><\/li>\n<li><a href=\"#Fail-safeDefaults\">Fail-safe Defaults<\/a><\/li>\n<li><a href=\"#CompleteMediation\">Complete Mediation<\/a><\/li>\n<li><a href=\"#OpenDesign\">Open Design<\/a><\/li>\n<li><a href=\"#SeparationofPrivilege\">Separation of Privilege<\/a><\/li>\n<li><a href=\"#LeastPrivilege\">Least Privilege<\/a><\/li>\n<li><a href=\"#LeastCommonMechanism\">Least Common Mechanism<\/a><\/li>\n<li><a href=\"#PsychologicalAcceptability\">Psychological Acceptability<\/a><\/li>\n<li><a href=\"#Isolation\">Isolation<\/a><\/li>\n<li><a href=\"#Encapsulation\">Encapsulation<\/a><\/li>\n<li><a href=\"#Modularity\">Modularity<\/a><\/li>\n<li><a href=\"#Layering\">Layering<\/a><\/li>\n<li><a href=\"#LeastAstonishment\">Least Astonishment<\/a><\/li>\n<\/ol>\n<h3><a name=\"EconomyofMechanism\"><\/a><br \/>\n1. Economy of Mechanism<\/h3>\n<p>This fundamental security principle defines that the security measures implemented in the software and the hardware must be simple and small. This would ease the testers to test the security measures thoroughly.<\/p>\n<p>If the designed security mechanism is complex then it is likely that the tester would get a chance to exploit the weakness in the design.<\/p>\n<p>So more the design is simple less are the opportunities for the tester to discover the flaws and more the complex is the design more are the chances to exploit flaws in the design.<\/p>\n<p>When the security design is simple, it easy to update or modify the design. But when it comes to practice, we cannot consider the economy of a mechanism as the best security design principle. Because there is a continuous demand for adding the security features in both hardware, as well as software.<\/p>\n<p>Adding security features constantly makes the security design complex. What we can do to obey this principle while designing security mechanism is to eliminate the less important complex feature.<br \/>\n<a name=\"Fail-safeDefaults\"><\/a><\/p>\n<h3>2. Fail-safe Defaults<\/h3>\n<p>This principle says that if any user wants access to any mechanism then whether the access is permitted or denied should be based on authorization rather than elimination.<\/p>\n<p>By default, all the mechanism should have a lack of access and the function of a security mechanism is to identify the condition where the access to the security mechanism should be permitted. This means by default access to all mechanism should be denied, unless any privilege attribute is provided.<\/p>\n<p>This principle denies unauthorized access. If there occurs any mistake while designing the security mechanism which grants access based on permission or authorization. That mechanism fails by simply denying access, which is the safest condition.<\/p>\n<p>If there occurs any mistake while designing the security mechanism which grants access based on exclusion. That mechanism fails by simply granting access which can not be considered as the safest situation.<\/p>\n<p><a name=\"CompleteMediation\"><\/a><\/p>\n<h3>3. Complete Mediation<\/h3>\n<p>Some systems are designed to operate continuously such systems remember access decision. So, there must be an access control mechanism which would check every access occurring on the system.<\/p>\n<p>This principle says that the system should not trust the access decisions it recovers from the system cache. This particular security design principle says that there must be a mechanism in the system that checks each access through the access control mechanism.<\/p>\n<p>However, this is an exhaustive approach and is rarely considered while designing a security mechanism.<\/p>\n<p><a name=\"OpenDesign\"><\/a><\/p>\n<h3>4. Open Design<\/h3>\n<p>This security principle suggests that the security mechanism design should be open to the public. Like in the cryptographic algorithm, the encryption key is kept secret while the encryption algorithm is opened for a public investigation.<\/p>\n<p>This principle is followed by the NIST (National Institute of Standards and Technology) to standardize the algorithms because it helps in worldwide adoption of NIST approved algorithms.<\/p>\n<p><a name=\"SeparationofPrivilege\"><\/a><\/p>\n<h3>5. Separation of Privilege<\/h3>\n<p>This security principle states that whenever a user tries to gain access to a system, the access should not be granted based on a single attribute or condition.<\/p>\n<p>Instead, there must be multiple situations or conditions or attribute which should be verified to grant access to the system. We also term this as a multifactor user authentication as this principle says that multiple techniques must be implemented to authenticate a user.<\/p>\n<p>For example, while conducting online money transfer we require user-id, password, transaction password along with OTP.<\/p>\n<p><a name=\"LeastPrivilege\"><\/a><\/p>\n<h3>6. Least Privilege<\/h3>\n<p>The least privilege security design principle states that each user should be able to access the system with the least privilege. Only those limited privileges should be assigned to the user which are essential to perform the desired task.<\/p>\n<p>An example of considering and implementing this principle is <strong>role-based access control<\/strong>. The role-based designed security mechanism should discover and describe various roles of the users or processes.<\/p>\n<p>Now, the least set of privileges should be assigned to each role which is essential to perform its functions. So, the access control mechanism enables each role only those privileges for which it is authorized. The least set of privileges assigned to each role describes the resources available each role can access.<\/p>\n<p>In this way, unauthentic roles are unable to access the protected resources. Like, the users accessing database has privilege only to retrieve the data they are not authorized to modify the data.<\/p>\n<p><a name=\"LeastCommonMechanism\"><\/a><\/p>\n<h3>7. Least Common Mechanism<\/h3>\n<p>Following the least common mechanism, a security design principle there should be minimum common functions to share between the different user. This principle reduces the count of communication paths and therefore further reduces the hardware and software implementation.<\/p>\n<p>Ultimately this principle reduces the threat of unwanted access to the system as it becomes easy to verify if there are some unwanted access to the shared function.<\/p>\n<p><a name=\"PsychologicalAcceptability\"><\/a><\/p>\n<h3>8. Psychological Acceptability<\/h3>\n<p>This security design principle says that the security mechanisms design to protect the system should not interfere with the working of the user every now and then.<\/p>\n<p>As this would irritate the user ad user may disable this security mechanism on the system. Therefore, it is suggested that the security mechanism should introduce minimum hurdles to the user of the system.<\/p>\n<p>The security mechanism should not be designed such that it becomes difficult for the user to access the resources in the system.<\/p>\n<p><a name=\"Isolation\"><\/a><\/p>\n<h3>9. Isolation<\/h3>\n<p>This security design principle is considered in three circumstances. The first condition, the system that has critical data, processes or resources must be isolated such that it restricts public access. It can be done in two ways.<\/p>\n<p>The system with critical resources can be isolated in two ways physical and logical isolation. The physical isolation is one where the system with critical information is isolated from the system with public access information.<\/p>\n<p>In logical isolation, the security services layers are established between the public system and the critical systems.<\/p>\n<p>The second isolation condition is that the files or data of one user must be kept isolated with the files or data of another user. Nowadays the new operating system has this functionality.<\/p>\n<p>Each user operating the system have an isolated memory space, process space, file space along with the mechanism to prevent unwanted access.<\/p>\n<p>And the third isolation condition is where the security mechanism must be isolated from such that they are prevented from unwanted access.<\/p>\n<p><a name=\"Encapsulation\"><\/a><\/p>\n<h3>10. Encapsulation<\/h3>\n<p>This security design principle is a form of isolation which is designed on the principle of object-oriented principles. Here the processes of the protected system can only access the data object of the system and these processes can only be invoked from a domain entry point.<\/p>\n<p><a name=\"Modularity\"><\/a><\/p>\n<h3>11. Modularity<\/h3>\n<p>This security designing principle says that the security mechanism must be generated as separate and protected modules and the security mechanism must be generated using the modular architecture.<\/p>\n<p>This principle helps in updating the security mechanism independently without modifying the entire system.<\/p>\n<p><a name=\"Layering\"><\/a><\/p>\n<h3>12. Layering<\/h3>\n<p>Multiple security layers must be used in order to protect the opponent from accessing crucial information. Applying multiple security layers provides multiple barriers to the adversary if he tries to access the protected system.<\/p>\n<p><a name=\"LeastAstonishment\"><\/a><\/p>\n<h3>13. Least Astonishment<\/h3>\n<p>This security design principle states that the user interface of the system must not amaze the user while accessing the secure system. He should be able to understand how the security mechanism is essential to protect the system.<\/p>\n<p>So, this is all about the security design principles which should be considered while designing the security mechanism for a system.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The security design principles are considered while designing any security mechanism for a system. These principles are review to develop a secure system which prevents the security flaws and also prevents unwanted access to the system. Below is the list of fundamental security design principles provided by the National Centres of Academic Excellence in Information [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[9],"tags":[],"class_list":{"0":"post-1448","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-security","7":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What Fundamental Security Design Principles? - Binary Terms<\/title>\n<meta name=\"description\" content=\"The security design principles are considered while designing any security mechanism for a system. These principles are review to develop a secure system which prevents the security flaws and also prevents the unwanted access to the system\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/binaryterms.com\/fundamental-security-design-principles.html\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Fundamental Security Design Principles? - Binary Terms\" \/>\n<meta property=\"og:description\" content=\"The security design principles are considered while designing any security mechanism for a system. These principles are review to develop a secure system which prevents the security flaws and also prevents the unwanted access to the system\" \/>\n<meta property=\"og:url\" content=\"https:\/\/binaryterms.com\/fundamental-security-design-principles.html\" \/>\n<meta property=\"og:site_name\" content=\"Binary Terms\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-09T12:01:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-18T06:00:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/Security-Design-Principles.jpg\" \/>\n<meta name=\"author\" content=\"Neha T\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Neha T\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/binaryterms.com\/fundamental-security-design-principles.html#article\",\"isPartOf\":{\"@id\":\"https:\/\/binaryterms.com\/fundamental-security-design-principles.html\"},\"author\":{\"name\":\"Neha T\",\"@id\":\"https:\/\/binaryterms.com\/#\/schema\/person\/e495f1d57f5c0a4c521cc3dba95661fe\"},\"headline\":\"Fundamental Security Design Principles\",\"datePublished\":\"2020-05-09T12:01:40+00:00\",\"dateModified\":\"2021-01-18T06:00:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/binaryterms.com\/fundamental-security-design-principles.html\"},\"wordCount\":1332,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/binaryterms.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/binaryterms.com\/fundamental-security-design-principles.html#primaryimage\"},\"thumbnailUrl\":\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/Security-Design-Principles.jpg\",\"articleSection\":[\"Security\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/binaryterms.com\/fundamental-security-design-principles.html#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/binaryterms.com\/fundamental-security-design-principles.html\",\"url\":\"https:\/\/binaryterms.com\/fundamental-security-design-principles.html\",\"name\":\"What Fundamental Security Design Principles? - Binary Terms\",\"isPartOf\":{\"@id\":\"https:\/\/binaryterms.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/binaryterms.com\/fundamental-security-design-principles.html#primaryimage\"},\"image\":{\"@id\":\"https:\/\/binaryterms.com\/fundamental-security-design-principles.html#primaryimage\"},\"thumbnailUrl\":\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/Security-Design-Principles.jpg\",\"datePublished\":\"2020-05-09T12:01:40+00:00\",\"dateModified\":\"2021-01-18T06:00:25+00:00\",\"description\":\"The security design principles are considered while designing any security mechanism for a system. These principles are review to develop a secure system which prevents the security flaws and also prevents the unwanted access to the system\",\"breadcrumb\":{\"@id\":\"https:\/\/binaryterms.com\/fundamental-security-design-principles.html#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/binaryterms.com\/fundamental-security-design-principles.html\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/binaryterms.com\/fundamental-security-design-principles.html#primaryimage\",\"url\":\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/Security-Design-Principles.jpg\",\"contentUrl\":\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/Security-Design-Principles.jpg\",\"width\":325,\"height\":121,\"caption\":\"Security Design Principles\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/binaryterms.com\/fundamental-security-design-principles.html#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/binaryterms.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Fundamental Security Design Principles\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/binaryterms.com\/#website\",\"url\":\"https:\/\/binaryterms.com\/\",\"name\":\"Binary Terms\",\"description\":\"The Computer Science &amp; IT Guide\",\"publisher\":{\"@id\":\"https:\/\/binaryterms.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/binaryterms.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/binaryterms.com\/#organization\",\"name\":\"Binary Terms\",\"url\":\"https:\/\/binaryterms.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/binaryterms.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/binary-terms-logo1.png\",\"contentUrl\":\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/binary-terms-logo1.png\",\"width\":400,\"height\":63,\"caption\":\"Binary Terms\"},\"image\":{\"@id\":\"https:\/\/binaryterms.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/binaryterms.com\/#\/schema\/person\/e495f1d57f5c0a4c521cc3dba95661fe\",\"name\":\"Neha T\",\"url\":\"https:\/\/binaryterms.com\/author\/author\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Fundamental Security Design Principles? - Binary Terms","description":"The security design principles are considered while designing any security mechanism for a system. These principles are review to develop a secure system which prevents the security flaws and also prevents the unwanted access to the system","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/binaryterms.com\/fundamental-security-design-principles.html","og_locale":"en_GB","og_type":"article","og_title":"What Fundamental Security Design Principles? - Binary Terms","og_description":"The security design principles are considered while designing any security mechanism for a system. These principles are review to develop a secure system which prevents the security flaws and also prevents the unwanted access to the system","og_url":"https:\/\/binaryterms.com\/fundamental-security-design-principles.html","og_site_name":"Binary Terms","article_published_time":"2020-05-09T12:01:40+00:00","article_modified_time":"2021-01-18T06:00:25+00:00","og_image":[{"url":"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/Security-Design-Principles.jpg","type":"","width":"","height":""}],"author":"Neha T","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Neha T","Estimated reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/binaryterms.com\/fundamental-security-design-principles.html#article","isPartOf":{"@id":"https:\/\/binaryterms.com\/fundamental-security-design-principles.html"},"author":{"name":"Neha T","@id":"https:\/\/binaryterms.com\/#\/schema\/person\/e495f1d57f5c0a4c521cc3dba95661fe"},"headline":"Fundamental Security Design Principles","datePublished":"2020-05-09T12:01:40+00:00","dateModified":"2021-01-18T06:00:25+00:00","mainEntityOfPage":{"@id":"https:\/\/binaryterms.com\/fundamental-security-design-principles.html"},"wordCount":1332,"commentCount":1,"publisher":{"@id":"https:\/\/binaryterms.com\/#organization"},"image":{"@id":"https:\/\/binaryterms.com\/fundamental-security-design-principles.html#primaryimage"},"thumbnailUrl":"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/Security-Design-Principles.jpg","articleSection":["Security"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/binaryterms.com\/fundamental-security-design-principles.html#respond"]}]},{"@type":"WebPage","@id":"https:\/\/binaryterms.com\/fundamental-security-design-principles.html","url":"https:\/\/binaryterms.com\/fundamental-security-design-principles.html","name":"What Fundamental Security Design Principles? - Binary Terms","isPartOf":{"@id":"https:\/\/binaryterms.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/binaryterms.com\/fundamental-security-design-principles.html#primaryimage"},"image":{"@id":"https:\/\/binaryterms.com\/fundamental-security-design-principles.html#primaryimage"},"thumbnailUrl":"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/Security-Design-Principles.jpg","datePublished":"2020-05-09T12:01:40+00:00","dateModified":"2021-01-18T06:00:25+00:00","description":"The security design principles are considered while designing any security mechanism for a system. These principles are review to develop a secure system which prevents the security flaws and also prevents the unwanted access to the system","breadcrumb":{"@id":"https:\/\/binaryterms.com\/fundamental-security-design-principles.html#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/binaryterms.com\/fundamental-security-design-principles.html"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/binaryterms.com\/fundamental-security-design-principles.html#primaryimage","url":"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/Security-Design-Principles.jpg","contentUrl":"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/Security-Design-Principles.jpg","width":325,"height":121,"caption":"Security Design Principles"},{"@type":"BreadcrumbList","@id":"https:\/\/binaryterms.com\/fundamental-security-design-principles.html#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/binaryterms.com\/"},{"@type":"ListItem","position":2,"name":"Fundamental Security Design Principles"}]},{"@type":"WebSite","@id":"https:\/\/binaryterms.com\/#website","url":"https:\/\/binaryterms.com\/","name":"Binary Terms","description":"The Computer Science &amp; IT Guide","publisher":{"@id":"https:\/\/binaryterms.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/binaryterms.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/binaryterms.com\/#organization","name":"Binary Terms","url":"https:\/\/binaryterms.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/binaryterms.com\/#\/schema\/logo\/image\/","url":"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/binary-terms-logo1.png","contentUrl":"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/binary-terms-logo1.png","width":400,"height":63,"caption":"Binary Terms"},"image":{"@id":"https:\/\/binaryterms.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/binaryterms.com\/#\/schema\/person\/e495f1d57f5c0a4c521cc3dba95661fe","name":"Neha T","url":"https:\/\/binaryterms.com\/author\/author"}]}},"_links":{"self":[{"href":"https:\/\/binaryterms.com\/wp-json\/wp\/v2\/posts\/1448","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/binaryterms.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/binaryterms.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/binaryterms.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/binaryterms.com\/wp-json\/wp\/v2\/comments?post=1448"}],"version-history":[{"count":2,"href":"https:\/\/binaryterms.com\/wp-json\/wp\/v2\/posts\/1448\/revisions"}],"predecessor-version":[{"id":2205,"href":"https:\/\/binaryterms.com\/wp-json\/wp\/v2\/posts\/1448\/revisions\/2205"}],"wp:attachment":[{"href":"https:\/\/binaryterms.com\/wp-json\/wp\/v2\/media?parent=1448"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/binaryterms.com\/wp-json\/wp\/v2\/categories?post=1448"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/binaryterms.com\/wp-json\/wp\/v2\/tags?post=1448"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}