{"id":38789,"date":"2024-07-16T05:50:52","date_gmt":"2024-07-16T10:50:52","guid":{"rendered":"https:\/\/iticollege.edu\/?p=38789"},"modified":"2024-07-16T05:50:52","modified_gmt":"2024-07-16T10:50:52","slug":"cryptography-secure-communication","status":"publish","type":"post","link":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/cryptography-secure-communication\/","title":{"rendered":"Cryptography: The Art And Science Of Secure Communication"},"content":{"rendered":"<p>Just as the military has used encryption to prevent the enemy from understanding their messages, information technology pros use cryptography to secure communications today.<\/p>\n<p>Today\u2019s enemies are hackers and cybercriminals who wreak havoc on organizations by stealing vital data or disrupting their computer systems and networks. The answer to overcoming this growing dilemma is using strong cryptography to create more security.<\/p>\n<h2><strong>What Is Cryptography<\/strong><\/h2>\n<p>Cryptography is the art and science of achieving security by encoding communications to make them non-readable. It saves billions of dollars each year and much frustration by slowing or stopping cybercriminals from doing their work. It is the basis of online security, privacy, and identity for personal and organizational use.<\/p>\n<p>Keeping sensitive information secure is only achieved by well-executed applications of cryptography. We rely on electronic technology to create, store, and transfer data that must be protected, and we owe much of this security to cryptography.<\/p>\n<p>Algorithms are used at the core of cryptography to encrypt or hide data. The readable information is transformed into an unreadable or encrypted form. When the hidden message is returned to its original form it is called decryption. Training to work with cryptography is available at many two-year colleges by obtaining an associate degree. <a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/contact-us\/\" target=\"_blank\" rel=\"noopener\"><strong>Contact ITI Technical College today for more information<\/strong><\/a>.<\/p>\n<h2><strong>The Benefits Of Cryptography <\/strong><\/h2>\n<p><a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2024\/07\/Decryption-2.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignright size-full wp-image-38837\" src=\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2024\/07\/Decryption-2.jpg\" alt=\"Study Cryptography\" width=\"300\" height=\"200\" \/><\/a>Cryptography provides a strong set of methods to ensure that cybercriminals\u2019 illegal activities are thwarted while ensuring that legal users gain access to information. It provides us with more confidence and security in our personal and work transactions. Its benefits include:<\/p>\n<ul>\n<li><strong>Authentication<\/strong> is achieved with MAC and digital signature to protect against spoofing and forgeries.<\/li>\n<li><strong>Confidentiality<\/strong> protects information and communication from unauthorized access to information and revelation.<\/li>\n<li><strong>Data Integrity<\/strong> is achieved with hash functions to assure users about the data integrity.<\/li>\n<li><strong>Non-repudiation<\/strong> is provided by using digital signatures to guard against the dispute that can arise due to a denial of a passing message from the sender.<\/li>\n<\/ul>\n<p>As cybercriminals step up their games, cryptography must become more sophisticated with advanced techniques to secure data.<\/p>\n<table style=\"width: 101.84%; height: 56px;\" width=\"638\">\n<tbody>\n<tr>\n<td width=\"638\"><strong><em>\u201cInformation technology uses cryptography to secure communications today.\u201d<\/em><\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2><strong>Everyday Applications<\/strong><\/h2>\n<p>Cryptography is used in multiple applications in devices and computer system communication we all use. These encrypting methods protect our identities and data on these devices:<\/p>\n<ul>\n<li>Computers<\/li>\n<li>Electronic Door Locks<\/li>\n<li>Mobile Phones<\/li>\n<li>Online Services<\/li>\n<li>Personal Communications<\/li>\n<li>Smartcard Authorizations<\/li>\n<li>Vehicle Information Systems<\/li>\n<\/ul>\n<p><a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2024\/07\/Information-Technology-3-2.jpg\"><img decoding=\"async\" class=\"alignleft size-full wp-image-38838\" src=\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2024\/07\/Information-Technology-3-2.jpg\" alt=\"Study Cryptography\" width=\"300\" height=\"199\" \/><\/a>As an example, Safari is using an encrypted connection to <strong><a href=\"http:\/\/www.google.fi\" target=\"_blank\" rel=\"noopener\">www.google.fi<\/a><\/strong>. Encryption with a digital certificate keeps our information private as it is sent to or from the https website www.google.fi. Other applications we use include digital signatures, electronic money, time stamping, cloud computing cryptography, and secure web transactions.<\/p>\n<p>As we explore more everyday applications we discover encryptions can secure emails, store passwords, encrypt WhatsApp, store data, and keep data private in general. As technology advances, cryptography will expand to dozens of more applications that will make life more secure for all of us.<\/p>\n<h2><strong>More On Algorithms And Cryptography<\/strong><\/h2>\n<p>Algorithms appear in different forms to complete special functions. A one-direction algorithm works in only one way which means a message can be encrypted but not reversed or decrypted. Bi-directional or symmetric algorithms are used for both encryption and decryption.<\/p>\n<p>Three main categories of algorithms exist where each has its primary function to meet needs:<\/p>\n<ul>\n<li><strong>Public Key<\/strong> cryptography algorithms produce reliable authentication of users and other entities. It is commonly used for strong online authentication.<\/li>\n<li><strong>Data Integrity Protection<\/strong> algorithms provide integrity protection in the form of hashes. Hashes detect modifications in data and are components of any cryptosystem that requires data integrity protection.<\/li>\n<li><strong>Symmetric Cipher<\/strong> algorithms protect data privacy for mobile telephones, most WiFi networks, and virtually every online banking, e-commerce transaction\u2019 and service.<\/li>\n<\/ul>\n<h2><strong>Challenges With Cryptography <\/strong><\/h2>\n<p>Cryptography is essential for protecting today\u2019s enormity of communications, data, and services. Some challenges that affect the effective use of information and must be overcome include:<\/p>\n<p><strong>Implementation Issues \u2013<\/strong> Implementing cryptographic techniques correctly can become an issue. When errors or misconfigurations are made, vulnerabilities can occur.<\/p>\n<p><strong>Supply Chain Issues \u2013<\/strong> Failures in ensuring the security of hardware and software in a supply chain can occur. Hackers can compromise computers, devices, systems, or software before messages reach end-users.<\/p>\n<p><strong>Side-Channel Attacks \u2013<\/strong> Unintended information leakage can be exploited by side-channel attacks. Examples include electromagnetic radiation, power consumption, or timing information. Secure software and hardware designs must be employed to protect from these attacks.<\/p>\n<p>If you are interested in cryptography, why not make a career of it? <a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/our-programs\/information-technology\/\" target=\"_blank\" rel=\"noopener\"><strong>Earn an Associate of Occupational Studies (AOS) Degree in Information Technology<\/strong><\/a> from ITI Technical College in <a href=\"https:\/\/www.brla.gov\/\" target=\"_blank\" rel=\"noopener\"><strong>Baton Rouge<\/strong><\/a> and be on your way to a better future.<\/p>\n<p>For more information about graduation rates, the median debt of students who completed the program, and other important information, please visit our website: <strong><a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/disclosures\/\" target=\"_blank\" rel=\"noopener\">https:\/\/impactwindowswholesaler.com\/iticollege\/disclosures\/<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Just as the military has used encryption to prevent the enemy from understanding their messages, information technology pros use cryptography [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[67],"tags":[],"class_list":["post-38789","post","type-post","status-publish","format-standard","hentry","category-information-technology"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cryptography<\/title>\n<meta name=\"description\" content=\"Discover The Fascinating World Of Cryptography, Where Art Meets Science To Secure Communication. Contact Us Today For More Information!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/cryptography-secure-communication\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cryptography\" \/>\n<meta property=\"og:description\" content=\"Discover The Fascinating World Of Cryptography, Where Art Meets Science To Secure Communication. Contact Us Today For More Information!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/cryptography-secure-communication\/\" \/>\n<meta property=\"og:site_name\" content=\"ITI College\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-16T10:50:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2024\/07\/Decryption-2.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/cryptography-secure-communication\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/cryptography-secure-communication\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112\"},\"headline\":\"Cryptography: The Art And Science Of Secure Communication\",\"datePublished\":\"2024-07-16T10:50:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/cryptography-secure-communication\/\"},\"wordCount\":807,\"image\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/cryptography-secure-communication\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2024\/07\/Decryption-2.jpg\",\"articleSection\":[\"Information Technology\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/cryptography-secure-communication\/\",\"url\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/cryptography-secure-communication\/\",\"name\":\"Cryptography\",\"isPartOf\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/cryptography-secure-communication\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/cryptography-secure-communication\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2024\/07\/Decryption-2.jpg\",\"datePublished\":\"2024-07-16T10:50:52+00:00\",\"author\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112\"},\"description\":\"Discover The Fascinating World Of Cryptography, Where Art Meets Science To Secure Communication. Contact Us Today For More Information!\",\"breadcrumb\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/cryptography-secure-communication\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/cryptography-secure-communication\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/cryptography-secure-communication\/#primaryimage\",\"url\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2024\/07\/Decryption-2.jpg\",\"contentUrl\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2024\/07\/Decryption-2.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/cryptography-secure-communication\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cryptography: The Art And Science Of Secure Communication\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#website\",\"url\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/\",\"name\":\"ITI College\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d4e700a92858d155f0bc45b7354947cc2f9e7789e83b4c758f2b283c08fe7db8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d4e700a92858d155f0bc45b7354947cc2f9e7789e83b4c758f2b283c08fe7db8?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/impactwindowswholesaler.com\/iticollege\"],\"url\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cryptography","description":"Discover The Fascinating World Of Cryptography, Where Art Meets Science To Secure Communication. Contact Us Today For More Information!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/cryptography-secure-communication\/","og_locale":"en_US","og_type":"article","og_title":"Cryptography","og_description":"Discover The Fascinating World Of Cryptography, Where Art Meets Science To Secure Communication. Contact Us Today For More Information!","og_url":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/cryptography-secure-communication\/","og_site_name":"ITI College","article_published_time":"2024-07-16T10:50:52+00:00","og_image":[{"url":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2024\/07\/Decryption-2.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/cryptography-secure-communication\/#article","isPartOf":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/cryptography-secure-communication\/"},"author":{"name":"admin","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112"},"headline":"Cryptography: The Art And Science Of Secure Communication","datePublished":"2024-07-16T10:50:52+00:00","mainEntityOfPage":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/cryptography-secure-communication\/"},"wordCount":807,"image":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/cryptography-secure-communication\/#primaryimage"},"thumbnailUrl":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2024\/07\/Decryption-2.jpg","articleSection":["Information Technology"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/cryptography-secure-communication\/","url":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/cryptography-secure-communication\/","name":"Cryptography","isPartOf":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#website"},"primaryImageOfPage":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/cryptography-secure-communication\/#primaryimage"},"image":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/cryptography-secure-communication\/#primaryimage"},"thumbnailUrl":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2024\/07\/Decryption-2.jpg","datePublished":"2024-07-16T10:50:52+00:00","author":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112"},"description":"Discover The Fascinating World Of Cryptography, Where Art Meets Science To Secure Communication. Contact Us Today For More Information!","breadcrumb":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/cryptography-secure-communication\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/cryptography-secure-communication\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/cryptography-secure-communication\/#primaryimage","url":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2024\/07\/Decryption-2.jpg","contentUrl":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2024\/07\/Decryption-2.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/cryptography-secure-communication\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/impactwindowswholesaler.com\/iticollege\/"},{"@type":"ListItem","position":2,"name":"Cryptography: The Art And Science Of Secure Communication"}]},{"@type":"WebSite","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#website","url":"https:\/\/impactwindowswholesaler.com\/iticollege\/","name":"ITI College","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/impactwindowswholesaler.com\/iticollege\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d4e700a92858d155f0bc45b7354947cc2f9e7789e83b4c758f2b283c08fe7db8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d4e700a92858d155f0bc45b7354947cc2f9e7789e83b4c758f2b283c08fe7db8?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/impactwindowswholesaler.com\/iticollege"],"url":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/posts\/38789","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/comments?post=38789"}],"version-history":[{"count":0,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/posts\/38789\/revisions"}],"wp:attachment":[{"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/media?parent=38789"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/categories?post=38789"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/tags?post=38789"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}