{"id":14106,"date":"2024-05-31T17:20:48","date_gmt":"2024-05-31T17:20:48","guid":{"rendered":"https:\/\/www.telda.it\/it\/?p=14106"},"modified":"2024-05-31T17:21:54","modified_gmt":"2024-05-31T17:21:54","slug":"installing-an-intrusion-detection-system-ids","status":"publish","type":"post","link":"https:\/\/www.telda.it\/it\/installing-an-intrusion-detection-system-ids\/","title":{"rendered":"Installing an Intrusion Detection System IDS"},"content":{"rendered":"\n<p>In this article we want to address the importance of installing an Intrusion Detection System IDS, within corporate networks, to do this I start from a fundamental premise:<\/p>\n\n\n\n<p>the European Regulation 679\/16 better known as GDPR is considered by many an obstacle, a burden for the company and individuals often considering it only as another bureaucracy. This is definitely a wrong approach because in today\u2019s society the personal data takes on an increasing importance demonstrated by the fact that companies that do business with data are among the most important in the world (Google, Facebook ..)This must make us understand the value of the data at the moment, in this perspective, treating the data carefully and giving it the importance it deserves becomes an opportunity for the company, an obligation, not only legal, but necessary for the development of competitiveness. Mainly for this reason I want to deepen the importance of installing an Intrusion Detection System IDS within the corporate network, a useful tool to preserve the integrity and confidentiality of data.<\/p>\n\n\n\n<p>Of course, this does not concern natural persons who with data do not do business, but they are the direct stakeholders, with the new Regulation natural persons have more control over their data, they can decide which treatments to consent, verify by means of clear information how their data are processed, if transferred, for how long they are stored, know what data the company stores, ask for their cancellation, the update etc. This new Regulation has made users very aware of the importance of their personal data and the security with which their data is processed is becoming or will become a fundamental parameter of choosing one supplier over another.<\/p>\n\n\n\n<p>Concluded this small premise we proceed with the importance of installing an intrusion detection System IDS<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1012\" height=\"698\" src=\"https:\/\/www.telda.it\/it\/wp-content\/uploads\/2021\/12\/intrusion-detection-system.png\" alt=\"intrusion-detection-system\" class=\"wp-image-13945\" srcset=\"https:\/\/www.telda.it\/it\/wp-content\/uploads\/2021\/12\/intrusion-detection-system.png 1012w, https:\/\/www.telda.it\/it\/wp-content\/uploads\/2021\/12\/intrusion-detection-system-980x676.png 980w, https:\/\/www.telda.it\/it\/wp-content\/uploads\/2021\/12\/intrusion-detection-system-480x331.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1012px, 100vw\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">What is an Instrusion Detection System IDS<\/h2>\n\n\n\n<p>An intrusion detection system (IDS) is a security software or hardware device used to monitor, detect, and protect networks or systems from malicious activity; it immediately alerts security personnel interested in detecting intrusions. IDS are extremely useful as they monitor network inbound and outbound traffic and continuously monitor for suspicious activity to detect a network or system security breach. In particular, they monitor traffic by comparing signatures that match known intrusion patterns and generate an alarm when a match is detected.<\/p>\n\n\n\n<p>IDS can be classified into active and passive IDS depending on their functionality. A passive IDS generally only detects intrusions, while an active IDS not only detects network intrusions, but also prevents them from becoming an IPS Intrusion Prevention System.<\/p>\n\n\n\n<p>An Intrusion Detection System IDS is not a substitute for Firewall and Antivirus, these are systems with different functionalities and the installation of one does not exclude the other, indeed it would be good to configure correctly and keep everything updated, That said an IDS detects events that escape Firewall and Antivirus.<\/p>\n\n\n\n<p><strong>Main functions of IDS:<\/strong><\/p>\n\n\n\n<p>An IDS collects and analyzes information from within a computer or network to identify possible breaches of the security policy, including unauthorized access and misuse.<\/p>\n\n\n\n<p>An IDS is also called &#8220;packet sniffer&#8221;, because it intercepts packets that travel through various media and communication protocols.<\/p>\n\n\n\n<p>Packets are analyzed after being captured.<\/p>\n\n\n\n<p>An IDS evaluates traffic for suspected intrusions and generates an alarm to detect such intrusions.<\/p>\n\n\n\n<p>IDS can be Network Based, so NIDS or Host Based then HIDS and generally almost all offer:<\/p>\n\n\n\n<p>Monitoring and storage of logs<\/p>\n\n\n\n<p>Rootkit detection<\/p>\n\n\n\n<p>File integrity checking<\/p>\n\n\n\n<p>Windows registry integrity checking<\/p>\n\n\n\n<p>Active response (active response transforming into IPS)<\/p>\n\n\n\n<p>offering the following reports:<\/p>\n\n\n\n<p>detection of common web attacks<\/p>\n\n\n\n<p>XSS (Cross Site Scripting) attempts<\/p>\n\n\n\n<p>SQL Injection Tentative Detection<\/p>\n\n\n\n<p>failed login attempts (Windows, MySQL, PostgreSQL, sonicwall, Remote Access, SSH \u2026)<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"block-b8e55eb8-6d9c-4a36-85a9-d64433e4ab09\">Installazione di un Intrusion Detection Systems IDS<\/h2>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"block-9cd0b0fd-d155-4c03-bd76-5b746ba82866\">Dove risiede IDS nella rete<\/h4>\n\n\n\n<p id=\"block-ff7dfce4-7f94-4694-ac3a-9ae514692b43\">Prima di implementare l&#8217;IDS, \u00e8 essenziale analizzare la topologia della rete, capire come fluisce il traffico da e verso le risorse che un utente malintenzionato pu\u00f2 utilizzare per accedere alla rete e identificare i componenti critici che saranno possibili bersagli di vari attacchi contro il network. Dopo aver determinato la posizione dell&#8217;IDS nella rete, l&#8217;IDS deve essere configurato per massimizzare il suo effetto di protezione della rete.<\/p>\n\n\n\n<figure class=\"wp-block-image\" id=\"block-179b6e24-2b24-43f9-8732-d6cc9b88b965\"><img decoding=\"async\" src=\"https:\/\/www.domenicolongobardi.it\/it\/wp-content\/uploads\/2021\/06\/installazione-di-un-intrusion-detection-system-1-1024x359.png\" alt=\"Installazione di un Intrusion Detection System IDS\"\/><\/figure>\n\n\n\n<p><strong>How an IDS works\u00a0<\/strong><\/p>\n\n\n\n<p>The main purpose of the IDS is to provide real-time monitoring and detection of intrusions. In addition, reactive IDS (and IPS) can intercept, respond and\/or prevent intrusions. An IDS works as follows:<\/p>\n\n\n\n<p>IDS have sensors to detect malicious signatures in data packets, and some advanced IDS include behavioral activity detection to detect malicious traffic behavior. Even if package signatures don\u2019t match the signatures in the IDS signature database, the task detection system can warn administrators about possible attacks.<\/p>\n\n\n\n<p>If the signature matches, the IDS performs predefined actions such as terminating the connection, blocking the IP address, deleting the packet, and\/or issuing an alarm to inform the administrator.<\/p>\n\n\n\n<p>When the signature matches, the anomaly detection will be skipped; otherwise, the sensor may analyze traffic patterns to detect an anomaly.<\/p>\n\n\n\n<p>When the package passes all the tests, the IDS will forward it to the network.<\/p>\n\n\n\n<figure class=\"wp-block-image\" id=\"block-3fee9dcf-03ab-4a85-90e3-5458ec27630b\"><img decoding=\"async\" src=\"https:\/\/www.domenicolongobardi.it\/it\/wp-content\/uploads\/2021\/06\/ids-1024x652.png\" alt=\"funzionamento IDS\"\/><\/figure>\n\n\n\n<p>Other information: <a href=\"https:\/\/it.wikipedia.org\/wiki\/Intrusion_detection_system\">https:\/\/it.wikipedia.org\/wiki\/Intrusion_detection_system<\/a><\/p>\n\n\n\n<p>If you need support for installing an Intrusion Detection System please <a href=\"https:\/\/www.telda.it\/it\/contact-us-2\/\">contact us<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this article we want to address the importance of installing an Intrusion Detection System IDS, within corporate networks, to do this I start from a fundamental premise: the European Regulation 679\/16 better known as GDPR is considered by many an obstacle, a burden for the company and individuals often considering it only as another [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":13945,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[104,125,113],"tags":[128,131,134],"class_list":["post-14106","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-en","category-news-en","category-web-en","tag-hids-en","tag-ids-en","tag-intrusion-detection-system-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Installing an Intrusion Detection System IDS - Telda - Telecom &amp; Data Protection<\/title>\n<meta name=\"description\" content=\"Installing an Intrusion Detection System IDS\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.telda.it\/it\/installing-an-intrusion-detection-system-ids\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Installing an Intrusion Detection System IDS - Telda - Telecom &amp; Data Protection\" \/>\n<meta property=\"og:description\" content=\"Installing an Intrusion Detection System IDS\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.telda.it\/it\/installing-an-intrusion-detection-system-ids\/\" \/>\n<meta property=\"og:site_name\" content=\"Telda - Telecom &amp; Data Protection\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-31T17:20:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-31T17:21:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.telda.it\/it\/wp-content\/uploads\/2021\/12\/intrusion-detection-system.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1012\" \/>\n\t<meta property=\"og:image:height\" content=\"698\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Telda\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Telda\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.telda.it\/it\/installing-an-intrusion-detection-system-ids\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.telda.it\/it\/installing-an-intrusion-detection-system-ids\/\"},\"author\":{\"name\":\"Telda\",\"@id\":\"https:\/\/www.telda.it\/it\/#\/schema\/person\/6884e058b7fae329a31c491f0e974fd7\"},\"headline\":\"Installing an Intrusion Detection System IDS\",\"datePublished\":\"2024-05-31T17:20:48+00:00\",\"dateModified\":\"2024-05-31T17:21:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.telda.it\/it\/installing-an-intrusion-detection-system-ids\/\"},\"wordCount\":870,\"publisher\":{\"@id\":\"https:\/\/www.telda.it\/it\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.telda.it\/it\/installing-an-intrusion-detection-system-ids\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.telda.it\/it\/wp-content\/uploads\/2021\/12\/intrusion-detection-system.png\",\"keywords\":[\"hids\",\"ids\",\"intrusion detection system\"],\"articleSection\":[\"Cyber Security\",\"News\",\"web\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.telda.it\/it\/installing-an-intrusion-detection-system-ids\/\",\"url\":\"https:\/\/www.telda.it\/it\/installing-an-intrusion-detection-system-ids\/\",\"name\":\"Installing an Intrusion Detection System IDS - Telda - Telecom &amp; Data Protection\",\"isPartOf\":{\"@id\":\"https:\/\/www.telda.it\/it\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.telda.it\/it\/installing-an-intrusion-detection-system-ids\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.telda.it\/it\/installing-an-intrusion-detection-system-ids\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.telda.it\/it\/wp-content\/uploads\/2021\/12\/intrusion-detection-system.png\",\"datePublished\":\"2024-05-31T17:20:48+00:00\",\"dateModified\":\"2024-05-31T17:21:54+00:00\",\"description\":\"Installing an Intrusion Detection System IDS\",\"breadcrumb\":{\"@id\":\"https:\/\/www.telda.it\/it\/installing-an-intrusion-detection-system-ids\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.telda.it\/it\/installing-an-intrusion-detection-system-ids\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.telda.it\/it\/installing-an-intrusion-detection-system-ids\/#primaryimage\",\"url\":\"https:\/\/www.telda.it\/it\/wp-content\/uploads\/2021\/12\/intrusion-detection-system.png\",\"contentUrl\":\"https:\/\/www.telda.it\/it\/wp-content\/uploads\/2021\/12\/intrusion-detection-system.png\",\"width\":1012,\"height\":698,\"caption\":\"intrusion-detection-system\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.telda.it\/it\/installing-an-intrusion-detection-system-ids\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.telda.it\/it\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Installing an Intrusion Detection System IDS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.telda.it\/it\/#website\",\"url\":\"https:\/\/www.telda.it\/it\/\",\"name\":\"Telda - Telecom & Data Protection\",\"description\":\"IT Company\",\"publisher\":{\"@id\":\"https:\/\/www.telda.it\/it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.telda.it\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.telda.it\/it\/#organization\",\"name\":\"TELDA\",\"url\":\"https:\/\/www.telda.it\/it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.telda.it\/it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.telda.it\/it\/wp-content\/uploads\/2019\/03\/logoTeldaT114.png\",\"contentUrl\":\"https:\/\/www.telda.it\/it\/wp-content\/uploads\/2019\/03\/logoTeldaT114.png\",\"width\":114,\"height\":114,\"caption\":\"TELDA\"},\"image\":{\"@id\":\"https:\/\/www.telda.it\/it\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.instagram.com\/telda_it\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.telda.it\/it\/#\/schema\/person\/6884e058b7fae329a31c491f0e974fd7\",\"name\":\"Telda\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.telda.it\/it\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fcaa43a021d5e43c8b9a22c0ef52002618e3e687731b6ba96a8c47e88e256f95?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fcaa43a021d5e43c8b9a22c0ef52002618e3e687731b6ba96a8c47e88e256f95?s=96&d=mm&r=g\",\"caption\":\"Telda\"},\"url\":\"https:\/\/www.telda.it\/it\/author\/webedesign\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Installing an Intrusion Detection System IDS - Telda - Telecom &amp; Data Protection","description":"Installing an Intrusion Detection System IDS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.telda.it\/it\/installing-an-intrusion-detection-system-ids\/","og_locale":"it_IT","og_type":"article","og_title":"Installing an Intrusion Detection System IDS - Telda - Telecom &amp; Data Protection","og_description":"Installing an Intrusion Detection System IDS","og_url":"https:\/\/www.telda.it\/it\/installing-an-intrusion-detection-system-ids\/","og_site_name":"Telda - Telecom &amp; Data Protection","article_published_time":"2024-05-31T17:20:48+00:00","article_modified_time":"2024-05-31T17:21:54+00:00","og_image":[{"width":1012,"height":698,"url":"https:\/\/www.telda.it\/it\/wp-content\/uploads\/2021\/12\/intrusion-detection-system.png","type":"image\/png"}],"author":"Telda","twitter_card":"summary_large_image","twitter_misc":{"Scritto da":"Telda","Tempo di lettura stimato":"6 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.telda.it\/it\/installing-an-intrusion-detection-system-ids\/#article","isPartOf":{"@id":"https:\/\/www.telda.it\/it\/installing-an-intrusion-detection-system-ids\/"},"author":{"name":"Telda","@id":"https:\/\/www.telda.it\/it\/#\/schema\/person\/6884e058b7fae329a31c491f0e974fd7"},"headline":"Installing an Intrusion Detection System IDS","datePublished":"2024-05-31T17:20:48+00:00","dateModified":"2024-05-31T17:21:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.telda.it\/it\/installing-an-intrusion-detection-system-ids\/"},"wordCount":870,"publisher":{"@id":"https:\/\/www.telda.it\/it\/#organization"},"image":{"@id":"https:\/\/www.telda.it\/it\/installing-an-intrusion-detection-system-ids\/#primaryimage"},"thumbnailUrl":"https:\/\/www.telda.it\/it\/wp-content\/uploads\/2021\/12\/intrusion-detection-system.png","keywords":["hids","ids","intrusion detection system"],"articleSection":["Cyber Security","News","web"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/www.telda.it\/it\/installing-an-intrusion-detection-system-ids\/","url":"https:\/\/www.telda.it\/it\/installing-an-intrusion-detection-system-ids\/","name":"Installing an Intrusion Detection System IDS - Telda - Telecom &amp; Data Protection","isPartOf":{"@id":"https:\/\/www.telda.it\/it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.telda.it\/it\/installing-an-intrusion-detection-system-ids\/#primaryimage"},"image":{"@id":"https:\/\/www.telda.it\/it\/installing-an-intrusion-detection-system-ids\/#primaryimage"},"thumbnailUrl":"https:\/\/www.telda.it\/it\/wp-content\/uploads\/2021\/12\/intrusion-detection-system.png","datePublished":"2024-05-31T17:20:48+00:00","dateModified":"2024-05-31T17:21:54+00:00","description":"Installing an Intrusion Detection System IDS","breadcrumb":{"@id":"https:\/\/www.telda.it\/it\/installing-an-intrusion-detection-system-ids\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.telda.it\/it\/installing-an-intrusion-detection-system-ids\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.telda.it\/it\/installing-an-intrusion-detection-system-ids\/#primaryimage","url":"https:\/\/www.telda.it\/it\/wp-content\/uploads\/2021\/12\/intrusion-detection-system.png","contentUrl":"https:\/\/www.telda.it\/it\/wp-content\/uploads\/2021\/12\/intrusion-detection-system.png","width":1012,"height":698,"caption":"intrusion-detection-system"},{"@type":"BreadcrumbList","@id":"https:\/\/www.telda.it\/it\/installing-an-intrusion-detection-system-ids\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.telda.it\/it\/"},{"@type":"ListItem","position":2,"name":"Installing an Intrusion Detection System IDS"}]},{"@type":"WebSite","@id":"https:\/\/www.telda.it\/it\/#website","url":"https:\/\/www.telda.it\/it\/","name":"Telda - Telecom & Data Protection","description":"IT Company","publisher":{"@id":"https:\/\/www.telda.it\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.telda.it\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.telda.it\/it\/#organization","name":"TELDA","url":"https:\/\/www.telda.it\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.telda.it\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.telda.it\/it\/wp-content\/uploads\/2019\/03\/logoTeldaT114.png","contentUrl":"https:\/\/www.telda.it\/it\/wp-content\/uploads\/2019\/03\/logoTeldaT114.png","width":114,"height":114,"caption":"TELDA"},"image":{"@id":"https:\/\/www.telda.it\/it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.instagram.com\/telda_it"]},{"@type":"Person","@id":"https:\/\/www.telda.it\/it\/#\/schema\/person\/6884e058b7fae329a31c491f0e974fd7","name":"Telda","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.telda.it\/it\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fcaa43a021d5e43c8b9a22c0ef52002618e3e687731b6ba96a8c47e88e256f95?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fcaa43a021d5e43c8b9a22c0ef52002618e3e687731b6ba96a8c47e88e256f95?s=96&d=mm&r=g","caption":"Telda"},"url":"https:\/\/www.telda.it\/it\/author\/webedesign\/"}]}},"_links":{"self":[{"href":"https:\/\/www.telda.it\/it\/wp-json\/wp\/v2\/posts\/14106","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.telda.it\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.telda.it\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.telda.it\/it\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.telda.it\/it\/wp-json\/wp\/v2\/comments?post=14106"}],"version-history":[{"count":1,"href":"https:\/\/www.telda.it\/it\/wp-json\/wp\/v2\/posts\/14106\/revisions"}],"predecessor-version":[{"id":14108,"href":"https:\/\/www.telda.it\/it\/wp-json\/wp\/v2\/posts\/14106\/revisions\/14108"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.telda.it\/it\/wp-json\/wp\/v2\/media\/13945"}],"wp:attachment":[{"href":"https:\/\/www.telda.it\/it\/wp-json\/wp\/v2\/media?parent=14106"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.telda.it\/it\/wp-json\/wp\/v2\/categories?post=14106"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.telda.it\/it\/wp-json\/wp\/v2\/tags?post=14106"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}