{"id":18820,"date":"2024-06-10T09:26:32","date_gmt":"2024-06-10T09:26:32","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/06\/27\/passwords-passphrases-and-pins-are-examples-of-which-security-term\/---ea3bb4fd-6949-4d18-b4dd-72b7ec1b6034"},"modified":"2024-10-04T07:23:46","modified_gmt":"2024-10-04T07:23:46","slug":"passwords-passphrases-and-pins-are-examples-of-which-security-term","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/passwords-passphrases-and-pins-are-examples-of-which-security-term\/","title":{"rendered":"Passwords Passphrases And Pins Are Examples Of Which Security Term"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>Ensuring the security of your passwords is crucial for safeguarding your online activities and personal information. Examples of mechanisms for access control such as passwords, passphrases, and pins play a key role in securing user data. When asked, &#8220;Which security term do passwords, passphrases, and pins illustrate?&#8221; the correct response is &#8220;authentication.&#8221; Authentication employs one or more verification methods, like knowledge-based factors (for example, a password) or possession factors (such as a security token or ID card), to affirm someone&#8217;s identity. This piece aims to explore various authentication methods that are deployed to secure user data, delving into how they function to safeguard passwords, passphrases, and pins.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/passwords-passphrases-and-pins-are-examples-of-which-security-term\/#1_What_Are_Passwords_Passphrases_and_Pins\" >1. What Are Passwords, Passphrases, and Pins?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/passwords-passphrases-and-pins-are-examples-of-which-security-term\/#2_A_Brief_Introduction_to_Security_Terms\" >2. A Brief Introduction to Security Terms<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/passwords-passphrases-and-pins-are-examples-of-which-security-term\/#3_Exploring_Passwords_Passphrases_and_Pins\" >3. Exploring Passwords, Passphrases and Pins<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/passwords-passphrases-and-pins-are-examples-of-which-security-term\/#4_Understanding_the_Benefits_of_Passwords_Passphrases_and_Pins\" >4. Understanding the Benefits of Passwords, Passphrases, and Pins<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/passwords-passphrases-and-pins-are-examples-of-which-security-term\/#Authentication_Methods_Comparison\" >Authentication Methods Comparison<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/passwords-passphrases-and-pins-are-examples-of-which-security-term\/#Q_A\" >Q&amp;A<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/passwords-passphrases-and-pins-are-examples-of-which-security-term\/#Q_What_is_a_security_term_that_passwords_passphrases_and_pins_are_examples_of\" >Q: What is a security term that passwords, passphrases, and pins are examples of?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/logmeonce.com\/resources\/passwords-passphrases-and-pins-are-examples-of-which-security-term\/#Q_What_are_some_best_practices_for_creating_strong_passwords_to_protect_against_cyber_attacks\" >Q: What are some best practices for creating strong passwords to protect against cyber attacks?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/logmeonce.com\/resources\/passwords-passphrases-and-pins-are-examples-of-which-security-term\/#Q_How_can_two-factor_authentication_help_enhance_security_for_online_accounts\" >Q: How can two-factor authentication help enhance security for online accounts?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/logmeonce.com\/resources\/passwords-passphrases-and-pins-are-examples-of-which-security-term\/#Q_What_are_some_common_methods_cyber_criminals_use_to_crack_passwords\" >Q: What are some common methods cyber criminals use to crack passwords?<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/logmeonce.com\/resources\/passwords-passphrases-and-pins-are-examples-of-which-security-term\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-what-are-passwords-passphrases-and-pins\"><span class=\"ez-toc-section\" id=\"1_What_Are_Passwords_Passphrases_and_Pins\"><\/span>1. What Are Passwords, Passphrases, and Pins?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>In today\u2019s digital world, passwords, passphrases, and pins are required for secure access to various digital accounts.<\/b> A password is a secret code made up of a combination of letters, numbers, and\/or symbols used to verify identity and gain access to an account. Passphrases are longer, more secure versions of passwords, typically consisting of multiple words that can be easily remembered. Pins (Personal Identification Numbers) are unique, numerical digits used for authentication and access to sensitive information.<\/p>\n<p><b>Passwords, passphrases, and pins vary in terms of complexity and security.<\/b> Passwords should be as unique and complex as possible and ideally include capital letters, numbers, and special characters. Longer passphrases that are made up of four or more words are more secure than traditional passwords while being easier to remember. Pins are the most secure option when used in combination with other forms of authentication, such as a password. It\u2019s important to have different pins for different accounts and never to write them down.<\/p>\n<h2 id=\"2-a-brief-introduction-to-security-terms\"><span class=\"ez-toc-section\" id=\"2_A_Brief_Introduction_to_Security_Terms\"><\/span>2. A Brief Introduction to Security Terms<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>As technology advances, so does the related terminology that goes with it. Security terms, specifically, can be baffling to the novice and experienced user alike.<\/p>\n<p>For the budding security expert, there are key terms they should know.<\/p>\n<ul>\n<li><b>Unauthorized access<\/b>: This is the term used to describe when someone gains access to data or classified information without the proper permission.<\/li>\n<li><b>Authentication<\/b>: As a security measure, authentication is the process of verifying a user\u2019s identity. This includes username\/password combinations as well as biometric scanning.<\/li>\n<li><b>Firewall<\/b>: A specialized program that creates a barrier between two or more networks. It inspects incoming and outgoing data for any unauthorized file transfers.<\/li>\n<li><b>Encryption<\/b>: A security technique used to encode data so that it can only be accessed by individuals with the encryption key.<\/li>\n<li><b>Vulnerability<\/b>: This refers to a potential weakness in the security system, which can be exploited by hackers to gain access to a system.<\/li>\n<\/ul>\n<p>These terms form the foundation of security, and learning to understand them is essential for maintaining a secure online presence.<\/p>\n<h2 id=\"3-exploring-passwords-passphrases-and-pins\"><span class=\"ez-toc-section\" id=\"3_Exploring_Passwords_Passphrases_and_Pins\"><\/span>3. Exploring Passwords, Passphrases and Pins<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Gone are the days when passwords were just a few digits. Now it\u2019s <strong>important to ensure that your online security is up-to-date<\/strong> with the right type of passwords and phrases. Here are three of the most common and secure methods:<\/p>\n<ul>\n<li>Passwords: These are typically short strings of letters and numbers. Since they\u2019re shorter, passwords are easier to remember and type but can be less secure.<\/li>\n<li>Passphrases: These are like sentences and tend to be much longer and more complex. Passphrases are harder to remember, but more secure.<\/li>\n<li>Pins: Even simpler than passwords, PINs are typically just four numbers. People often use PINs to emphasize more on convenience rather than security.<\/li>\n<\/ul>\n<p>No matter which security method you choose, it\u2019ll be important to not use the same password or phrase for multiple accounts. It\u2019s also a good idea to <strong>change your passwords or phrases once in a while<\/strong>, usually once every few months. Doing that adds an extra level of security to your online activity.<\/p>\n<h2 id=\"4-understanding-the-benefits-of-passwords-passphrases-and-pins\"><span class=\"ez-toc-section\" id=\"4_Understanding_the_Benefits_of_Passwords_Passphrases_and_Pins\"><\/span>4. Understanding the Benefits of Passwords, Passphrases, and Pins<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>Using Passwords to Keep Your Information Secure <\/b><br \/>Passwords are one of the most common methods used to keep your data and accounts secure. They are the first and most important line of defense for protecting your information. Passwords are usually composed of letters, numbers, and\/or symbols, and should be unique for each account you create. A secure password should also be difficult for other people to guess and change regularly.<\/p>\n<p><b>The Benefits of Using Passphrases and PINs<\/b><br \/>If you\u2019re looking for an even more secure option for protecting your data, then passphrases and PINs are excellent alternatives. A passphrase is a string of words, numbers, symbols, and punctuation that can be easier to remember and harder to guess than a traditional password. A PIN is a <a title=\"Passwords Passphrases And Pins Are Examples Of Which Security Term\" href=\"https:\/\/logmeonce.com\/resources\/passwords-passphrases-and-pins-are-examples-of-which-security-term\/\" data-abc=\"true\">4-digit personal identification number<\/a> that provides another layer of security when accessing an account or device. Here are some advantages that they provide:<\/p>\n<ul>\n<li>Passphrases and PINs are typically more secure than traditional passwords.<\/li>\n<li>They are much harder to guess and are unique to the user.<\/li>\n<li>They can be changed regularly, ensuring greater security for your data.<\/li>\n<li>They are quick and easy to enter, making it more convenient for users.<\/li>\n<\/ul>\n<p>Using passwords, passphrases, and pins are all effective methods for keeping your information secure. Along with other security measures, they can help to protect your data from unauthorized access and hackers.<\/p>\n<p>Passwords are a crucial aspect of ensuring the security of sensitive information, whether it be personal or professional. It is important to create complex passwords that are difficult for hackers to guess, as weak and common passwords are easily susceptible to Dictionary attacks and brute force attacks. Password managers are recommended to help generate and store strong passwords securely. Implementing two-factor authentication adds an additional layer of security by requiring two authentication factors, such as a password and a smart card or mobile device. It is also important to use a mix of uppercase and lowercase letters, as well as special characters, to further enhance the strength of passwords. Security breaches can occur when passwords are cracked through methods like brute-force attacks or phishing attacks, emphasizing the need for robust authentication protocols and encryption algorithms. Source: National Institute of Standards and Technology (NIST) Special Publication 800-63B.<\/p>\n<p>Weak and simple passwords pose significant security risks when it comes to protecting hardware devices and network resources. Credit cards, debit cards, and authentication secrets are often the target of password cracking attempts and man-in-the-middle attacks on private and internal networks. Using hashing functions and cryptographic hash functions can help to secure passwords and authentication secrets when transmitted in unencrypted form. Challenge-response protocols and multifactor authentication can provide added protection against common mistakes and replay attacks. Biometric systems and graphical passwords offer alternative methods of authentication beyond static passwords and password encryption. Implementing audit trails and logical access control can help to meet regulatory requirements such as the PCI DSS Requirements set forth by PCI SSC Participating Payment Brands. Third-party service providers can also play a role in ensuring protection against malicious code and denial of service attacks on multi-tenant networks.\u00a0<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Authentication_Methods_Comparison\"><\/span>Authentication Methods Comparison<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<th>Authentication Method<\/th>\n<th>Description<\/th>\n<th>Security Level<\/th>\n<\/tr>\n<tr>\n<td>Passwords<\/td>\n<td>A combination of letters, numbers, and symbols used for account access.<\/td>\n<td>Medium<\/td>\n<\/tr>\n<tr>\n<td>Passphrases<\/td>\n<td>Longer and more complex than passwords, made up of multiple words.<\/td>\n<td>High<\/td>\n<\/tr>\n<tr>\n<td>PINs<\/td>\n<td>Personal Identification Numbers, typically 4 digits used for authentication.<\/td>\n<td>Low<\/td>\n<\/tr>\n<tr>\n<td>Biometric Scanning<\/td>\n<td>Using physical characteristics like fingerprints for authentication.<\/td>\n<td>High<\/td>\n<\/tr>\n<tr>\n<td>Two-Factor Authentication<\/td>\n<td>Requires two verification methods like password and smart card.<\/td>\n<td>High<\/td>\n<\/tr>\n<tr>\n<td>Hashing Functions<\/td>\n<td>Encrypting passwords for secure transmission.<\/td>\n<td>High<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"qa\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"Q_What_is_a_security_term_that_passwords_passphrases_and_pins_are_examples_of\"><\/span>Q: What is a security term that passwords, passphrases, and pins are examples of?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><br \/>A: The security term is \u201cAuthentication\u201d. Authentication is used to identify that someone is allowed to access a certain system, website, or account. Passwords, passphrases, and pins are some of the most common ways people authenticate themselves.<\/p>\n<p>\u00a0<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Q_What_are_some_best_practices_for_creating_strong_passwords_to_protect_against_cyber_attacks\"><\/span>Q: What are some best practices for creating strong passwords to protect against cyber attacks?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><br \/>A: When creating passwords, it is important to use complex passwords that include a mix of lowercase and uppercase letters, numbers, and special characters. Avoid using common passwords or easily guessable information such as names of children or simple phrases. Using a password manager can help generate and store strong passwords securely.<\/p>\n<p>\u00a0<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Q_How_can_two-factor_authentication_help_enhance_security_for_online_accounts\"><\/span>Q: How can two-factor authentication help enhance security for online accounts?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><br \/>A: Two-factor authentication adds an additional layer of security by requiring users to provide two different authentication factors to access their accounts. This can include something you know (such as a password) and something you have (such as a physical device or mobile phone). This helps protect against unauthorized access even if passwords are compromised.<\/p>\n<p>\u00a0<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Q_What_are_some_common_methods_cyber_criminals_use_to_crack_passwords\"><\/span>Q: What are some common methods cyber criminals use to crack passwords?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><br \/>A: Cyber criminals use various techniques such as brute force attacks, dictionary attacks, and phishing attacks to crack passwords. Brute force attacks involve trying all possible combinations of characters until the correct password is found, while dictionary attacks use common words or phrases. Phishing attacks trick users into revealing their passwords through fraudulent emails or websites.<\/p>\n<p>\u00a0<\/p>\n<h2 id=\"outro\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>To summarize, passwords, passphrases, and pins are all examples of authentication security terms. If you\u2019re looking for a secure and reliable way to protect your sensitive data, then it might be wise to <a href=\"https:\/\/logmeonce.com\" data-abc=\"true\">consider creating a FREE LogMeOnce account<\/a>. LogMeOnce provides advanced authentication features \u2014 such as unique passwords, multi-factor authentication, and one-time passwords \u2014 to ensure a secure and private account. With LogMeOnce\u2019s trusted and secure services, you don\u2019t have to worry anymore about the integrity of your passwords, passphrases, and pins. Strengthen your authentication security and get a FREE account today!<\/p>\n<div class=\"flex max-w-full flex-col flex-grow\">\n<div class=\"min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"e0d10818-cd68-4408-9111-2adaf222157c\">\n<div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\">\n<div class=\"markdown prose w-full break-words dark:prose-invert light\">\n<p>Reference: <a href=\"https:\/\/logmeonce.com\/resources\/passwords-passphrases-and-pins-are-examples-of-which-security-term\/\" target=\"_new\" rel=\"noopener\" data-abc=\"true\">Passwords, Passphrases, and PINs are Examples of Which Security Term<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"mb-2 flex gap-3 empty:hidden -ml-2\">\n<div class=\"items-center justify-start rounded-xl p-1 flex\">\n<div class=\"flex items-center\"><button class=\"rounded-lg text-token-text-secondary hover:bg-token-main-surface-secondary\" aria-label=\"Read aloud\" data-testid=\"voice-play-turn-action-button\"><\/button><button class=\"rounded-lg text-token-text-secondary hover:bg-token-main-surface-secondary\" aria-label=\"Copy\" data-testid=\"copy-turn-action-button\"><\/button>\n<div class=\"flex\">\u00a0<\/div>\n<div class=\"flex items-center pb-0\">\u00a0<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n<figure class=\"wp-block-embed is-type-rich is-provider-spotify wp-block-embed-spotify wp-embed-aspect-21-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe title=\"Spotify Embed: Passwords Passphrases And Pins Are Examples Of Which Security Term\" style=\"border-radius: 12px\" width=\"100%\" height=\"152\" frameborder=\"0\" allowfullscreen allow=\"autoplay; clipboard-write; encrypted-media; fullscreen; picture-in-picture\" loading=\"lazy\" src=\"https:\/\/open.spotify.com\/embed\/episode\/3xMmHXzYkno8CpwSX0PNtY?utm_source=oembed\"><\/iframe>\n<\/div><\/figure>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Ensuring the security of your passwords is crucial for safeguarding your online activities and personal information. Examples of mechanisms for access control such as passwords, passphrases, and pins play a key role in securing user data. When asked, &#8220;Which security term do passwords, passphrases, and pins illustrate?&#8221; the correct response is &#8220;authentication.&#8221; Authentication employs one [&hellip;]<\/p>\n","protected":false},"author":20,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[89],"tags":[6118,10973,996,7780,781,10974],"class_list":["post-18820","post","type-post","status-publish","format-standard","hentry","category-password-manager","tag-example","tag-passphrases","tag-passwords","tag-pins","tag-security","tag-term"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/18820","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=18820"}],"version-history":[{"count":2,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/18820\/revisions"}],"predecessor-version":[{"id":229302,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/18820\/revisions\/229302"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=18820"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=18820"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=18820"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}