{"id":31193,"date":"2021-06-29T18:59:39","date_gmt":"2021-06-29T18:59:39","guid":{"rendered":"https:\/\/www.dvirc.org\/insights\/commonly-misused-terms-in-cybersecurity\/"},"modified":"2023-03-08T14:01:29","modified_gmt":"2023-03-08T14:01:29","slug":"commonly-misused-terms-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.dvirc.org\/insights\/commonly-misused-terms-in-cybersecurity\/","title":{"rendered":"Commonly Misused Terms in Cybersecurity"},"content":{"rendered":"

Written By: Celia Paulsen<\/strong><\/p>\n

Words are hard. English is hard. How we manage to communicate anything is nigh a miracle.<\/p>\n

Sometimes I wish I was Oscar Wilde or Mark Twain or any of the other great authors who seem to be able to effortlessly describe a character or a scenario so that the reader can envision perfectly what they mean.<\/p>\n

\u201cIn height, he was rather over six feet, and so excessively lean that he seemed to be considerably taller\u2026.\u201d\u00a0(A Study in Scarlet, Sir Arthur Conan Doyle)<\/em><\/p><\/blockquote>\n

Instead, I fear that I am more like Shakespeare who invented words, and twisted others to fit his insane meter, so that average people like me struggle to understand the intended meanings (incidentally, I love Shakespeare).<\/p>\n

\u201cHis heart fracted and corroborate.\u201d\u00a0(Henry V, Act 2, Scene 1)<\/em><\/p>\n

\u201cYou have congreeted\u201d\u00a0(Henry V, Act 5, Scene 2)<\/em><\/p><\/blockquote>\n

Unfortunately, my chosen field seems filled with fellow Shakespeareans \u2013 people who use words by throwing alphabet soup at a wall and reading the results like one might read tea leaves, only with less accuracy.<\/p>\n

What Does that Really Mean?<\/h2>\n

When I created the cybersecurity term database, which is the backbone of the\u00a0NIST Cybersecurity Glossary<\/a>, I was amazed at how much confusion there was about even ubiquitous terms like \u201crisk\u201d and \u201csecurity.\u201d There still is no real consensus of what the word \u201ccybersecurity\u201d means!<\/p>\n

So, I\u2019ve compiled a list of some commonly misused terms in the field of cybersecurity (these are unofficial descriptions that are meant to be informative):<\/p>\n

Data vs. Information vs. Knowledge<\/em><\/strong><\/p>\n

Data<\/em>\u00a0is usually considered the bits and bytes that information is composed of.\u00a0Information<\/em>\u00a0turns multiple bits and bytes into something useful. For example, a temperature sensor may read \u201c102,\u201d but\u00a0information<\/em>\u00a0tells us that it\u2019s 102 degrees Fahrenheit on a temperature sensor that was in a human\u2019s mouth.\u00a0Knowledge<\/em>\u00a0is what allows\u00a0information<\/em>\u00a0to turn into action. It says that 102 degrees Fahrenheit for a human being is much too hot. The lines between\u00a0data<\/em>,\u00a0information<\/em>\u00a0and\u00a0knowledge<\/em> are blurry, but there are some who argue those specific cybersecurity term fiercely.<\/p>\n

Threat vs. Risk<\/em><\/strong><\/p>\n

A\u00a0threat<\/em>\u00a0is either used to mean something bad that could happen or an entity that may cause something bad to happen (also called a \u201cthreat actor\u201d).\u00a0Risk<\/em>\u00a0includes the probability that the bad thing could happen and the potential result(s). People often (incorrectly) use these words interchangeably.<\/p>\n

Risk Management<\/em><\/strong><\/p>\n

The process of responding to the potential that something bad might happen. There are generally four options: accept the risk, transfer it, avoid it or mitigate it. Depending on who you talk to, there are at least\u00a0eight options<\/a>, but these are the traditional four. When a cybersecurity person talks risk management, they may be referring to the process laid out in the\u00a0Risk Management Framework<\/a>.<\/p>\n

Cybersecurity<\/em><\/strong><\/p>\n

Basically, the protection of computer systems (including networks, the internet and anything \u201csmart\u201d). However, it has been used as an umbrella term that also encompasses information assurance, data protection and privacy. This term will likely keep changing until somebody can adequately explain what \u201ccyber\u201d is.<\/p>\n

Information Assurance (or Security)<\/em><\/strong><\/p>\n

The protection of any facts, news, knowledge, or sometimes data, in any form \u2013 paper, electronic, stone tablet, signals, memorized, etc. Often confused with and put under the cybersecurity umbrella.<\/p>\n

Standard<\/em><\/strong><\/p>\n

Many people misname NIST special publications as standards, but it\u2019s a bit more complicated than that. NIST does develop formal standards \u2013 Federal Information Processing Standards (FIPS), such as\u00a0FIPS 200<\/a>\u00a0and\u00a0FIPS 140-3<\/a>, for example. NIST also participates in the development of industry and international standards. The word\u00a0standard<\/em>\u00a0can also be used to mean a level of quality or an accepted norm. In this last case, NIST publications are often used as a\u00a0standard<\/em>. It\u2019s a subtle difference, but an important one. Still, in general, it is best to refrain from calling NIST special publications (SPs), internal\/interagency reports (IRs), white papers, or anything other than a FIPS a\u00a0standard<\/em>\u00a0and instead use the terms \u201cpublication,\u201d \u201cdocument\u201d or \u201cguidance.\u201d<\/p>\n

Requirements vs. Controls<\/em><\/strong><\/p>\n

Both of these terms can be used to identify specific activities, processes, practices or capabilities an organization may have or do to manage their cybersecurity risk.\u00a0Controls<\/em>\u00a0may or may not be mandatory, whereas\u00a0requirements<\/em>\u00a0generally are. It\u2019s always best to check what term a document uses. For example, many people refer to NIST SP 800-171\u00a0requirements<\/em>\u00a0as\u00a0controls<\/em>, which is incorrect.<\/p>\n

Audit vs. Assessment<\/em><\/strong><\/p>\n

In cybersecurity, the term\u00a0audit<\/em>\u00a0often has a more formal and negative undertone than in some other disciplines.\u00a0Audits<\/em>\u00a0are done after an incident such as a data breach (generally an internal audit), at the request of a customer (usually an external audit conducted by the customer), or to obtain a certification (a third-party audit).\u00a0Assessments<\/a><\/em>\u00a0are typically, but not always, more like a friendly health check-up. Encompassing any number of activities, assessments can be narrow or broad, with as much rigor as the company being assessed desires, or is appropriate to the situation. One exception to this general rule is in the Cybersecurity Maturity Model Certification (CMMC) program, which uses the word\u00a0assessment<\/em>\u00a0as the formal method by which a company is evaluated.<\/p>\n

Compliance<\/em><\/strong><\/p>\n

Compliance<\/em>\u00a0typically refers to meeting a requirement (internal or external, sometimes regulatory) and often is shown with a certification or attestation of some sort. People often use phrases like \u201cNIST compliant.\u201d This can be misleading as many interpret it to mean NIST is enforcing a requirement or certifying or attesting to the security of a company\u2019s products or processes. What is typically meant by \u201cNIST compliant\u201d is that the company has used the practices and procedures in NIST publications, often to meet some requirement. While this may be viewed as a\u00a0compliance<\/em>\u00a0activity, it is generally best to avoid confusion by instead stating what rule or requirement is the subject of the compliance. For example, one can follow NIST SP 800-171 to be compliant with DFARS. An exception to this is with cryptographic\u00a0algorithms<\/a>\u00a0and\u00a0modules<\/a>, in which case the correct terminology is validated and compliant indicates the overall product has\u00a0not<\/strong>\u00a0been formally evaluated.<\/p>\n

Words in English evolve almost as quickly as memes on the internet \u2013 a million Shakespeareans taking the English language out back to be butchered, manipulated and folded into barely recognizable script. When it comes to a cybersecurity term, it seems this is done with reckless abandon. But understanding some of these key terms and how they are used will help in understanding and communicating your cybersecurity needs.<\/p>\n

 <\/p>\n

Original Source: https:\/\/www.nist.gov\/blogs\/manufacturing-innovation-blog\/commonly-misused-terms-cybersecurity<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"Written By: Celia Paulsen Words are hard. English is hard. How we manage to communicate anything is nigh a miracle. Sometimes I wish I was Oscar Wilde or Mark Twain or any of the other great authors who seem to be able to effortlessly describe a character or a scenario so that the reader can […]","protected":false},"author":8,"featured_media":31194,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"acf":[],"yoast_head":"\nCommonly Misused Terms in Cybersecurity – DVIRC<\/title>\n<meta name=\"description\" content=\"Written By: Celia Paulsen Words are hard. English is hard. How we manage to communicate anything is nigh a miracle. Sometimes I wish I was Oscar Wilde or\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dvirc.org\/insights\/commonly-misused-terms-in-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Commonly Misused Terms in Cybersecurity – DVIRC\" \/>\n<meta property=\"og:description\" content=\"Written By: Celia Paulsen Words are hard. English is hard. How we manage to communicate anything is nigh a miracle. Sometimes I wish I was Oscar Wilde or\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dvirc.org\/insights\/commonly-misused-terms-in-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"DVIRC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/dvirc.sepa\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-29T18:59:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-08T14:01:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dvirc.org\/wp-content\/uploads\/2023\/03\/dvirc-cyber-terms-blog.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"850\" \/>\n\t<meta property=\"og:image:height\" content=\"530\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"sagan@brandllama.com\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@DVIRC_PA\" \/>\n<meta name=\"twitter:site\" content=\"@DVIRC_PA\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"sagan@brandllama.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.dvirc.org\/insights\/commonly-misused-terms-in-cybersecurity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.dvirc.org\/insights\/commonly-misused-terms-in-cybersecurity\/\"},\"author\":{\"name\":\"sagan@brandllama.com\",\"@id\":\"https:\/\/www.dvirc.org\/#\/schema\/person\/d3b9f6e4cb1d87a9e011f4bb4b4f31d1\"},\"headline\":\"Commonly Misused Terms in Cybersecurity\",\"datePublished\":\"2021-06-29T18:59:39+00:00\",\"dateModified\":\"2023-03-08T14:01:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.dvirc.org\/insights\/commonly-misused-terms-in-cybersecurity\/\"},\"wordCount\":1098,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.dvirc.org\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.dvirc.org\/insights\/commonly-misused-terms-in-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.dvirc.org\/wp-content\/uploads\/2023\/03\/dvirc-cyber-terms-blog.jpg\",\"inLanguage\":\"en\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.dvirc.org\/insights\/commonly-misused-terms-in-cybersecurity\/\",\"url\":\"https:\/\/www.dvirc.org\/insights\/commonly-misused-terms-in-cybersecurity\/\",\"name\":\"Commonly Misused Terms in Cybersecurity – DVIRC\",\"isPartOf\":{\"@id\":\"https:\/\/www.dvirc.org\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.dvirc.org\/insights\/commonly-misused-terms-in-cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.dvirc.org\/insights\/commonly-misused-terms-in-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.dvirc.org\/wp-content\/uploads\/2023\/03\/dvirc-cyber-terms-blog.jpg\",\"datePublished\":\"2021-06-29T18:59:39+00:00\",\"dateModified\":\"2023-03-08T14:01:29+00:00\",\"description\":\"Written By: Celia Paulsen Words are hard. English is hard. How we manage to communicate anything is nigh a miracle. Sometimes I wish I was Oscar Wilde or\",\"breadcrumb\":{\"@id\":\"https:\/\/www.dvirc.org\/insights\/commonly-misused-terms-in-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.dvirc.org\/insights\/commonly-misused-terms-in-cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/www.dvirc.org\/insights\/commonly-misused-terms-in-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/www.dvirc.org\/wp-content\/uploads\/2023\/03\/dvirc-cyber-terms-blog.jpg\",\"contentUrl\":\"https:\/\/www.dvirc.org\/wp-content\/uploads\/2023\/03\/dvirc-cyber-terms-blog.jpg\",\"width\":850,\"height\":530},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.dvirc.org\/insights\/commonly-misused-terms-in-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.dvirc.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Commonly Misused Terms in Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.dvirc.org\/#website\",\"url\":\"https:\/\/www.dvirc.org\/\",\"name\":\"DVIRC\",\"description\":\"Just another WordPress site\",\"publisher\":{\"@id\":\"https:\/\/www.dvirc.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.dvirc.org\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.dvirc.org\/#organization\",\"name\":\"DVIRC\",\"url\":\"https:\/\/www.dvirc.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/www.dvirc.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.dvirc.org\/wp-content\/uploads\/DVIRC_BlueAndBlack_2016-scaled.jpg\",\"contentUrl\":\"https:\/\/www.dvirc.org\/wp-content\/uploads\/DVIRC_BlueAndBlack_2016-scaled.jpg\",\"width\":2560,\"height\":1671,\"caption\":\"DVIRC\"},\"image\":{\"@id\":\"https:\/\/www.dvirc.org\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/dvirc.sepa\/\",\"https:\/\/twitter.com\/DVIRC_PA\",\"https:\/\/www.linkedin.com\/company\/dvirc\",\"https:\/\/www.youtube.com\/channel\/UChq_rqm2Lh3jDEg8m5ZRdrg\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.dvirc.org\/#\/schema\/person\/d3b9f6e4cb1d87a9e011f4bb4b4f31d1\",\"name\":\"sagan@brandllama.com\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/www.dvirc.org\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e0e1424cb9eeb7111a1146aa293c9ca6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e0e1424cb9eeb7111a1146aa293c9ca6?s=96&d=mm&r=g\",\"caption\":\"sagan@brandllama.com\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Commonly Misused Terms in Cybersecurity – DVIRC","description":"Written By: Celia Paulsen Words are hard. English is hard. How we manage to communicate anything is nigh a miracle. Sometimes I wish I was Oscar Wilde or","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dvirc.org\/insights\/commonly-misused-terms-in-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Commonly Misused Terms in Cybersecurity – DVIRC","og_description":"Written By: Celia Paulsen Words are hard. English is hard. How we manage to communicate anything is nigh a miracle. Sometimes I wish I was Oscar Wilde or","og_url":"https:\/\/www.dvirc.org\/insights\/commonly-misused-terms-in-cybersecurity\/","og_site_name":"DVIRC","article_publisher":"https:\/\/www.facebook.com\/dvirc.sepa\/","article_published_time":"2021-06-29T18:59:39+00:00","article_modified_time":"2023-03-08T14:01:29+00:00","og_image":[{"width":850,"height":530,"url":"https:\/\/www.dvirc.org\/wp-content\/uploads\/2023\/03\/dvirc-cyber-terms-blog.jpg","type":"image\/jpeg"}],"author":"sagan@brandllama.com","twitter_card":"summary_large_image","twitter_creator":"@DVIRC_PA","twitter_site":"@DVIRC_PA","twitter_misc":{"Written by":"sagan@brandllama.com","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dvirc.org\/insights\/commonly-misused-terms-in-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/www.dvirc.org\/insights\/commonly-misused-terms-in-cybersecurity\/"},"author":{"name":"sagan@brandllama.com","@id":"https:\/\/www.dvirc.org\/#\/schema\/person\/d3b9f6e4cb1d87a9e011f4bb4b4f31d1"},"headline":"Commonly Misused Terms in Cybersecurity","datePublished":"2021-06-29T18:59:39+00:00","dateModified":"2023-03-08T14:01:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dvirc.org\/insights\/commonly-misused-terms-in-cybersecurity\/"},"wordCount":1098,"commentCount":0,"publisher":{"@id":"https:\/\/www.dvirc.org\/#organization"},"image":{"@id":"https:\/\/www.dvirc.org\/insights\/commonly-misused-terms-in-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dvirc.org\/wp-content\/uploads\/2023\/03\/dvirc-cyber-terms-blog.jpg","inLanguage":"en"},{"@type":"WebPage","@id":"https:\/\/www.dvirc.org\/insights\/commonly-misused-terms-in-cybersecurity\/","url":"https:\/\/www.dvirc.org\/insights\/commonly-misused-terms-in-cybersecurity\/","name":"Commonly Misused Terms in Cybersecurity – DVIRC","isPartOf":{"@id":"https:\/\/www.dvirc.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dvirc.org\/insights\/commonly-misused-terms-in-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.dvirc.org\/insights\/commonly-misused-terms-in-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dvirc.org\/wp-content\/uploads\/2023\/03\/dvirc-cyber-terms-blog.jpg","datePublished":"2021-06-29T18:59:39+00:00","dateModified":"2023-03-08T14:01:29+00:00","description":"Written By: Celia Paulsen Words are hard. English is hard. How we manage to communicate anything is nigh a miracle. Sometimes I wish I was Oscar Wilde or","breadcrumb":{"@id":"https:\/\/www.dvirc.org\/insights\/commonly-misused-terms-in-cybersecurity\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dvirc.org\/insights\/commonly-misused-terms-in-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/www.dvirc.org\/insights\/commonly-misused-terms-in-cybersecurity\/#primaryimage","url":"https:\/\/www.dvirc.org\/wp-content\/uploads\/2023\/03\/dvirc-cyber-terms-blog.jpg","contentUrl":"https:\/\/www.dvirc.org\/wp-content\/uploads\/2023\/03\/dvirc-cyber-terms-blog.jpg","width":850,"height":530},{"@type":"BreadcrumbList","@id":"https:\/\/www.dvirc.org\/insights\/commonly-misused-terms-in-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dvirc.org\/"},{"@type":"ListItem","position":2,"name":"Commonly Misused Terms in Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.dvirc.org\/#website","url":"https:\/\/www.dvirc.org\/","name":"DVIRC","description":"Just another WordPress site","publisher":{"@id":"https:\/\/www.dvirc.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dvirc.org\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en"},{"@type":"Organization","@id":"https:\/\/www.dvirc.org\/#organization","name":"DVIRC","url":"https:\/\/www.dvirc.org\/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/www.dvirc.org\/#\/schema\/logo\/image\/","url":"https:\/\/www.dvirc.org\/wp-content\/uploads\/DVIRC_BlueAndBlack_2016-scaled.jpg","contentUrl":"https:\/\/www.dvirc.org\/wp-content\/uploads\/DVIRC_BlueAndBlack_2016-scaled.jpg","width":2560,"height":1671,"caption":"DVIRC"},"image":{"@id":"https:\/\/www.dvirc.org\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/dvirc.sepa\/","https:\/\/twitter.com\/DVIRC_PA","https:\/\/www.linkedin.com\/company\/dvirc","https:\/\/www.youtube.com\/channel\/UChq_rqm2Lh3jDEg8m5ZRdrg"]},{"@type":"Person","@id":"https:\/\/www.dvirc.org\/#\/schema\/person\/d3b9f6e4cb1d87a9e011f4bb4b4f31d1","name":"sagan@brandllama.com","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/www.dvirc.org\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e0e1424cb9eeb7111a1146aa293c9ca6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e0e1424cb9eeb7111a1146aa293c9ca6?s=96&d=mm&r=g","caption":"sagan@brandllama.com"}}]}},"_links":{"self":[{"href":"https:\/\/www.dvirc.org\/wp-json\/wp\/v2\/posts\/31193"}],"collection":[{"href":"https:\/\/www.dvirc.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dvirc.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dvirc.org\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dvirc.org\/wp-json\/wp\/v2\/comments?post=31193"}],"version-history":[{"count":0,"href":"https:\/\/www.dvirc.org\/wp-json\/wp\/v2\/posts\/31193\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dvirc.org\/wp-json\/wp\/v2\/media\/31194"}],"wp:attachment":[{"href":"https:\/\/www.dvirc.org\/wp-json\/wp\/v2\/media?parent=31193"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dvirc.org\/wp-json\/wp\/v2\/categories?post=31193"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}