{"id":5915,"date":"2022-08-20T15:00:21","date_gmt":"2022-08-20T13:00:21","guid":{"rendered":"https:\/\/www.numeryx.fr\/introduction-to-cybersecurity-concepts\/"},"modified":"2024-09-12T10:27:14","modified_gmt":"2024-09-12T08:27:14","slug":"introduction-to-cybersecurity-concepts","status":"publish","type":"post","link":"https:\/\/www.numeryx.fr\/en\/latest-news\/our-blog\/introduction-to-cybersecurity-concepts\/","title":{"rendered":"Introduction to cybersecurity concepts"},"content":{"rendered":"\n<p>The term <strong>cybersecurity <\/strong> refers to all the practices and tools that can be used to protect people and the tangible and intangible IT assets of states and organizations.\nGiven the financial stakes involved in the vulnerability of Information Systems (IS), every organization must ensure the security of its IS. <\/p>\n\n<h2 class=\"wp-block-heading\">What is an information system?<\/h2>\n\n<p>An organization&#8217;s information system is the set of assets used to collect, classify, store, manage and distribute information within an organization.\nWhatever the type of data, any information system must respect 3 essential principles: <\/p>\n\n<ul class=\"wp-block-list\">\n<li>Confidentiality: Data confidentiality is the protection of communications or stored data against interception and reading by unauthorized persons.<\/li>\n\n\n\n<li>Integrity: Data integrity refers to the state of the data, which must not be corrupted or destroyed, either intentionally or accidentally, during processing, storage or transmission.<\/li>\n\n\n\n<li>Availability: This is the ability to make information accessible to authorized persons.\nInfrastructure is used to store this data.\nBut how?  <\/li>\n<\/ul>\n\n<h2 class=\"wp-block-heading\">Infrastructure and easy living<\/h2>\n\n<p>For a long time, our working environment consisted of a hardware infrastructure with on-site servers, which hosted the company&#8217;s data locally.\nToday, in response to the need for mobility and accessibility to information, our work environments are becoming increasingly dematerialized.\nCompanies are increasingly turning to solutions stored in the cloud: this is what we call virtualization.  <\/p>\n\n<p>Virtualization means putting your machines, network and\/or software in a virtual environment: the cloud.\nThe server is now remote.\nIt can be accessed online via a secure Internet connection.  <\/p>\n\n<p>Three technical arrangements are available to meet different needs:<\/p>\n\n<ul class=\"wp-block-list\">\n<li>IaaS (Infrastructure as a Service): enabling outsourcing of IT hardware infrastructure.\nCompanies can now delegate the installation of file servers, networks and data storage to a service provider on a subscription basis.\nThis avoids the unnecessary costs of purchasing and maintaining equipment.  <\/li>\n\n\n\n<li>PaaS (platform as a service): PaaS involves outsourcing not only hardware infrastructure, but also middleware applications such as operating systems, databases and web servers.<\/li>\n\n\n\n<li>SaaS (software as a service): this arrangement enables companies to use several applications accessible online.\nTools offered by Google (Google Apps) and Microsoft (Office 365) in particular accelerate the integration of collaborative working.\nCRM (Salesforce), ERP (Infor, NetSuite, Workday&#8230;) and HR (SuccessFactors, Talensoft, Cornerstone) solutions are also available in SaaS mode.  <\/li>\n<\/ul>\n\n<h2 class=\"wp-block-heading\">What about safety?<\/h2>\n\n<p>The number of companies adopting IaaS, PaaS or SaaS appliances to manage their data is increasing year on year.\nThis rapid growth shows that companies are increasingly willing to put their trust in these solutions.\nThese same companies persist in expressing a degree of mistrust, given the current context and the various incidents reported to the media by some major companies, as was the case, for example, with the security flaw written into Google+&#8217;s development code discovered in March 2018.\nThis flaw would have enabled hackers to access nearly 500,000 Google+ accounts in two weeks.\nAnd examples abound&#8230;    <\/p>\n\n<h2 class=\"wp-block-heading\">Piracy, but why?<\/h2>\n\n<p>A hacker is anyone who takes advantage of an IS vulnerability to gain access to private data.\nIt&#8217;s worth noting that there are three types of hacker: Black Hats, Grey Hats and White Hats.\nI&#8217;ll elaborate on the criteria that distinguish each of these three types of hacker in a second article, but what&#8217;s important here is to focus on the motivations of malicious hackers.<br\/>In general, hackers steal your private data for the following four reasons:  <\/p>\n\n<ul class=\"wp-block-list\">\n<li><strong>Your data is worth its weight in gold<\/strong>: Your credit card number, your date of birth, your favorite books or your most recent foreign destinations are all information that a hacker can convert into cash.<\/li>\n\n\n\n<li><strong>Industrial espionage<\/strong>: Stealing information about a competitor&#8217;s products and services gives you an edge in the marketplace.<\/li>\n\n\n\n<li><strong>Revenge<\/strong>: Some hackers have political or social motivations.\nThese activist hackers seek to draw public attention to a problem, either by making public unflattering information about their target, or by dismantling all or part of their target&#8217;s IS. <\/li>\n\n\n\n<li><strong>Digital warfare<\/strong>: Entire nations engage in state-sponsored hacking to obtain commercial or national intelligence in order to destabilize their adversaries&#8217; infrastructure, or even to sow discord and confusion in the target country.<\/li>\n<\/ul>\n\n<h2 class=\"wp-block-heading\">You could be the vector of a cyber attack without even knowing it!<\/h2>\n\n<p>In most cases, the human being is the weak link in the IS.\nA lack of vigilance on the part of the victim, or a moment&#8217;s inattention to a piece of computer equipment, are the factors that hackers rely on to create a flaw in the system. <\/p>\n\n<p>Here are a few examples:<\/p>\n\n<ul class=\"wp-block-list\">\n<li>Human error<\/li>\n<\/ul>\n\n<p>A very harmless act can have very serious consequences: leaving a session open, opening an e-mail from an unknown source, clicking on an unsecured link are all ways of inviting a hacker to access your data.\nNever forget that a hacker is basically a manipulator!\nHackers are very imaginative when it comes to finding ways to contact you, and this is how they will mislead you.  <\/p>\n\n<ul class=\"wp-block-list\">\n<li>The use of gadgets<\/li>\n<\/ul>\n\n<ol class=\"wp-block-list\">\n<li><strong>The MalDuino<\/strong>: is an Arduino-powered USB peripheral with keyboard injection capabilities.\nOnce plugged in, MalDuino acts like a keyboard, typing commands at superhuman speeds.\nA few minutes in front of your machine is all the hacker needs to download all your data.  <br\/><\/li>\n\n\n\n<li><strong>WiFi keylogger<\/strong>: Yes, size does matter!\nBecause with dimensions of 10 mm x 10 mm x 15 mm, it&#8217;s the smallest USB hardware keylogger ever available on the market, and is capable of remote data download: e-mail reports, FTP backups and live webcasting to the access point and WiFi.\nin client and time-stamping modes.\nImagine if someone managed to insert this little gadget into your desktop computer, for example?   <br\/><\/li>\n\n\n\n<li><strong>WiFi PINEAPPLE<\/strong>: is a powerful wireless network auditing tool, leveraging powerful hardware and an intuitive web interface to fit your pentest workflow.\nLaunching highly accurate attacks is extremely simple with this small device.\nThe management of the current workflow and the accuracy of the information obtained are truly exceptional for such a small device.\nSimply place this small device close to your machine to gain access.   <\/li>\n<\/ol>\n\n<p>Users are exposed to many dangers when they are connected to the Internet: IS control or data distortion, identity theft, IS blocking or crypto mining&#8230; the only solution is prevention.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The term cybersecurity refers to all the practices and tools that can be used to protect people and the tangible and intangible IT assets of states and organizations.<br \/>\nGiven the financial stakes involved in the vulnerability of Information Systems (IS), every organization must ensure the security of its IS. <\/p>\n","protected":false},"author":1,"featured_media":5273,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[174],"tags":[176],"class_list":["post-5915","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-our-blog","tag-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Introduction to cybersecurity concepts - Numeryx<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.numeryx.fr\/en\/latest-news\/our-blog\/introduction-to-cybersecurity-concepts\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Introduction to cybersecurity concepts - Numeryx\" \/>\n<meta property=\"og:description\" content=\"The term cybersecurity refers to all the practices and tools that can be used to protect people and the tangible and intangible IT assets of states and organizations. Given the financial stakes involved in the vulnerability of Information Systems (IS), every organization must ensure the security of its IS.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.numeryx.fr\/en\/latest-news\/our-blog\/introduction-to-cybersecurity-concepts\/\" \/>\n<meta property=\"og:site_name\" content=\"Numeryx\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/numeryx\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-20T13:00:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-12T08:27:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.numeryx.fr\/file\/2024\/01\/Analyst-blue-team-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"751\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Numeryx\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@numeryx\" \/>\n<meta name=\"twitter:site\" content=\"@numeryx\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\/\/www.numeryx.fr\/en\/latest-news\/our-blog\/introduction-to-cybersecurity-concepts\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.numeryx.fr\/en\/latest-news\/our-blog\/introduction-to-cybersecurity-concepts\/\"},\"author\":{\"name\":\"Numeryx\",\"@id\":\"https:\/\/www.numeryx.fr\/en\/#\/schema\/person\/96e2acddab450f59f4f2d8472eb9aa01\"},\"headline\":\"Introduction to cybersecurity concepts\",\"datePublished\":\"2022-08-20T13:00:21+00:00\",\"dateModified\":\"2024-09-12T08:27:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.numeryx.fr\/en\/latest-news\/our-blog\/introduction-to-cybersecurity-concepts\/\"},\"wordCount\":1014,\"publisher\":{\"@id\":\"https:\/\/www.numeryx.fr\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.numeryx.fr\/en\/latest-news\/our-blog\/introduction-to-cybersecurity-concepts\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.numeryx.fr\/file\/2024\/01\/Analyst-blue-team-1.jpg\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.numeryx.fr\/en\/latest-news\/our-blog\/introduction-to-cybersecurity-concepts\/\",\"url\":\"https:\/\/www.numeryx.fr\/en\/latest-news\/our-blog\/introduction-to-cybersecurity-concepts\/\",\"name\":\"Introduction to cybersecurity concepts - Numeryx\",\"isPartOf\":{\"@id\":\"https:\/\/www.numeryx.fr\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.numeryx.fr\/en\/latest-news\/our-blog\/introduction-to-cybersecurity-concepts\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.numeryx.fr\/en\/latest-news\/our-blog\/introduction-to-cybersecurity-concepts\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.numeryx.fr\/file\/2024\/01\/Analyst-blue-team-1.jpg\",\"datePublished\":\"2022-08-20T13:00:21+00:00\",\"dateModified\":\"2024-09-12T08:27:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.numeryx.fr\/en\/latest-news\/our-blog\/introduction-to-cybersecurity-concepts\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.numeryx.fr\/en\/latest-news\/our-blog\/introduction-to-cybersecurity-concepts\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.numeryx.fr\/en\/latest-news\/our-blog\/introduction-to-cybersecurity-concepts\/#primaryimage\",\"url\":\"https:\/\/www.numeryx.fr\/file\/2024\/01\/Analyst-blue-team-1.jpg\",\"contentUrl\":\"https:\/\/www.numeryx.fr\/file\/2024\/01\/Analyst-blue-team-1.jpg\",\"width\":1000,\"height\":751},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.numeryx.fr\/en\/latest-news\/our-blog\/introduction-to-cybersecurity-concepts\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.numeryx.fr\/en\/home\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Introduction to cybersecurity concepts\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.numeryx.fr\/en\/#website\",\"url\":\"https:\/\/www.numeryx.fr\/en\/\",\"name\":\"Numeryx\",\"description\":\"Conseil en IT &amp; \u00e9dition logiciel technologique\",\"publisher\":{\"@id\":\"https:\/\/www.numeryx.fr\/en\/#organization\"},\"alternateName\":\"Numeryx\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.numeryx.fr\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.numeryx.fr\/en\/#organization\",\"name\":\"Numeryx\",\"url\":\"https:\/\/www.numeryx.fr\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.numeryx.fr\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.numeryx.fr\/file\/2024\/03\/conseil-et-integration.jpg\",\"contentUrl\":\"https:\/\/www.numeryx.fr\/file\/2024\/03\/conseil-et-integration.jpg\",\"width\":1920,\"height\":500,\"caption\":\"Numeryx\"},\"image\":{\"@id\":\"https:\/\/www.numeryx.fr\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/numeryx\/\",\"https:\/\/x.com\/numeryx\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.numeryx.fr\/en\/#\/schema\/person\/96e2acddab450f59f4f2d8472eb9aa01\",\"name\":\"Numeryx\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.numeryx.fr\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cf46b78a82359587b1938f08718fda58d6c5fd1bbbe2dc6cef76512c4ff25baf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cf46b78a82359587b1938f08718fda58d6c5fd1bbbe2dc6cef76512c4ff25baf?s=96&d=mm&r=g\",\"caption\":\"Numeryx\"},\"sameAs\":[\"https:\/\/www.numeryx.fr\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Introduction to cybersecurity concepts - Numeryx","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.numeryx.fr\/en\/latest-news\/our-blog\/introduction-to-cybersecurity-concepts\/","og_locale":"en_US","og_type":"article","og_title":"Introduction to cybersecurity concepts - Numeryx","og_description":"The term cybersecurity refers to all the practices and tools that can be used to protect people and the tangible and intangible IT assets of states and organizations. Given the financial stakes involved in the vulnerability of Information Systems (IS), every organization must ensure the security of its IS.","og_url":"https:\/\/www.numeryx.fr\/en\/latest-news\/our-blog\/introduction-to-cybersecurity-concepts\/","og_site_name":"Numeryx","article_publisher":"https:\/\/www.facebook.com\/numeryx\/","article_published_time":"2022-08-20T13:00:21+00:00","article_modified_time":"2024-09-12T08:27:14+00:00","og_image":[{"width":1000,"height":751,"url":"https:\/\/www.numeryx.fr\/file\/2024\/01\/Analyst-blue-team-1.jpg","type":"image\/jpeg"}],"author":"Numeryx","twitter_card":"summary_large_image","twitter_creator":"@numeryx","twitter_site":"@numeryx","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/www.numeryx.fr\/en\/latest-news\/our-blog\/introduction-to-cybersecurity-concepts\/#article","isPartOf":{"@id":"https:\/\/www.numeryx.fr\/en\/latest-news\/our-blog\/introduction-to-cybersecurity-concepts\/"},"author":{"name":"Numeryx","@id":"https:\/\/www.numeryx.fr\/en\/#\/schema\/person\/96e2acddab450f59f4f2d8472eb9aa01"},"headline":"Introduction to cybersecurity concepts","datePublished":"2022-08-20T13:00:21+00:00","dateModified":"2024-09-12T08:27:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.numeryx.fr\/en\/latest-news\/our-blog\/introduction-to-cybersecurity-concepts\/"},"wordCount":1014,"publisher":{"@id":"https:\/\/www.numeryx.fr\/en\/#organization"},"image":{"@id":"https:\/\/www.numeryx.fr\/en\/latest-news\/our-blog\/introduction-to-cybersecurity-concepts\/#primaryimage"},"thumbnailUrl":"https:\/\/www.numeryx.fr\/file\/2024\/01\/Analyst-blue-team-1.jpg","keywords":["Cybersecurity"],"articleSection":["Blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.numeryx.fr\/en\/latest-news\/our-blog\/introduction-to-cybersecurity-concepts\/","url":"https:\/\/www.numeryx.fr\/en\/latest-news\/our-blog\/introduction-to-cybersecurity-concepts\/","name":"Introduction to cybersecurity concepts - Numeryx","isPartOf":{"@id":"https:\/\/www.numeryx.fr\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.numeryx.fr\/en\/latest-news\/our-blog\/introduction-to-cybersecurity-concepts\/#primaryimage"},"image":{"@id":"https:\/\/www.numeryx.fr\/en\/latest-news\/our-blog\/introduction-to-cybersecurity-concepts\/#primaryimage"},"thumbnailUrl":"https:\/\/www.numeryx.fr\/file\/2024\/01\/Analyst-blue-team-1.jpg","datePublished":"2022-08-20T13:00:21+00:00","dateModified":"2024-09-12T08:27:14+00:00","breadcrumb":{"@id":"https:\/\/www.numeryx.fr\/en\/latest-news\/our-blog\/introduction-to-cybersecurity-concepts\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.numeryx.fr\/en\/latest-news\/our-blog\/introduction-to-cybersecurity-concepts\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.numeryx.fr\/en\/latest-news\/our-blog\/introduction-to-cybersecurity-concepts\/#primaryimage","url":"https:\/\/www.numeryx.fr\/file\/2024\/01\/Analyst-blue-team-1.jpg","contentUrl":"https:\/\/www.numeryx.fr\/file\/2024\/01\/Analyst-blue-team-1.jpg","width":1000,"height":751},{"@type":"BreadcrumbList","@id":"https:\/\/www.numeryx.fr\/en\/latest-news\/our-blog\/introduction-to-cybersecurity-concepts\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.numeryx.fr\/en\/home\/"},{"@type":"ListItem","position":2,"name":"Introduction to cybersecurity concepts"}]},{"@type":"WebSite","@id":"https:\/\/www.numeryx.fr\/en\/#website","url":"https:\/\/www.numeryx.fr\/en\/","name":"Numeryx","description":"Conseil en IT &amp; \u00e9dition logiciel technologique","publisher":{"@id":"https:\/\/www.numeryx.fr\/en\/#organization"},"alternateName":"Numeryx","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.numeryx.fr\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.numeryx.fr\/en\/#organization","name":"Numeryx","url":"https:\/\/www.numeryx.fr\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.numeryx.fr\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.numeryx.fr\/file\/2024\/03\/conseil-et-integration.jpg","contentUrl":"https:\/\/www.numeryx.fr\/file\/2024\/03\/conseil-et-integration.jpg","width":1920,"height":500,"caption":"Numeryx"},"image":{"@id":"https:\/\/www.numeryx.fr\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/numeryx\/","https:\/\/x.com\/numeryx"]},{"@type":"Person","@id":"https:\/\/www.numeryx.fr\/en\/#\/schema\/person\/96e2acddab450f59f4f2d8472eb9aa01","name":"Numeryx","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.numeryx.fr\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cf46b78a82359587b1938f08718fda58d6c5fd1bbbe2dc6cef76512c4ff25baf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cf46b78a82359587b1938f08718fda58d6c5fd1bbbe2dc6cef76512c4ff25baf?s=96&d=mm&r=g","caption":"Numeryx"},"sameAs":["https:\/\/www.numeryx.fr"]}]}},"_links":{"self":[{"href":"https:\/\/www.numeryx.fr\/en\/wp-json\/wp\/v2\/posts\/5915","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.numeryx.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.numeryx.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.numeryx.fr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.numeryx.fr\/en\/wp-json\/wp\/v2\/comments?post=5915"}],"version-history":[{"count":1,"href":"https:\/\/www.numeryx.fr\/en\/wp-json\/wp\/v2\/posts\/5915\/revisions"}],"predecessor-version":[{"id":5917,"href":"https:\/\/www.numeryx.fr\/en\/wp-json\/wp\/v2\/posts\/5915\/revisions\/5917"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.numeryx.fr\/en\/wp-json\/wp\/v2\/media\/5273"}],"wp:attachment":[{"href":"https:\/\/www.numeryx.fr\/en\/wp-json\/wp\/v2\/media?parent=5915"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.numeryx.fr\/en\/wp-json\/wp\/v2\/categories?post=5915"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.numeryx.fr\/en\/wp-json\/wp\/v2\/tags?post=5915"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}