{"id":188,"date":"2023-06-11T20:54:57","date_gmt":"2023-06-11T20:54:57","guid":{"rendered":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/?page_id=188"},"modified":"2023-06-11T20:54:57","modified_gmt":"2023-06-11T20:54:57","slug":"network-hardening-measures","status":"publish","type":"page","link":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/network-hardening-measures\/","title":{"rendered":"Network Hardening Measures"},"content":{"rendered":"<div class=\"responsive-tabs\">\n<h2 class=\"tabtitle\">Testing<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Penetration Testing<\/h3>\n<div id=\"attachment_883\" style=\"width: 235px\" class=\"wp-caption alignright\"><a href=\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2018\/01\/white-hat-hacker.png\"><img aria-describedby=\"caption-attachment-883\" decoding=\"async\" loading=\"lazy\" class=\"wp-image-883 size-full\" src=\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2018\/01\/white-hat-hacker.png\" alt=\"\" width=\"225\" height=\"225\" \/><\/a><p id=\"caption-attachment-883\" class=\"wp-caption-text\">Companies are increasingly paying white-hat hackers to try to break into their networks.<\/p><\/div>\n<p>Often the best way to find out if your system is secure and to expose any system vulnerabilities, is to employ a <strong>white hat hacker<\/strong> to try and break into the system.<\/p>\n<p>They deploy a number of different tools and techniques to try and access the system. Once a vulnerability has been exposed the system can be patched to fix the problem or the appropriate policy be put in place.<\/p>\n<p>Some companies offer hack bounties to hackers. If you can hack their system and prove it you are rewarded with a <strong>hack bounty<\/strong>, which can often be tens of thousands of pounds.<\/p>\n<p><a href=\"https:\/\/hackerone.com\/security\">Hack Bounty Website<\/a><\/p>\n<p>&nbsp;<\/p>\n\n<\/div><h2 class=\"tabtitle\">Forensics<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Network Forensics<\/h3>\n<div id=\"attachment_884\" style=\"width: 277px\" class=\"wp-caption alignright\"><a href=\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2018\/01\/network-foresics-oct-gcse-agqa.jpg\"><img aria-describedby=\"caption-attachment-884\" decoding=\"async\" loading=\"lazy\" class=\"wp-image-884 size-full\" src=\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2018\/01\/network-foresics-oct-gcse-agqa.jpg\" alt=\"\" width=\"267\" height=\"189\" \/><\/a><p id=\"caption-attachment-884\" class=\"wp-caption-text\">If an organisation&#8217;s network has been hacked, it is important to learn how and where the breach occurred so that systems can be hardened<\/p><\/div>\n<p>If an attacker is successful in accessing a network or computer, Network Forensics can be used to find out:<\/p>\n<ul>\n<li>Who the attacker is (through their IP address or other information)<\/li>\n<li>How they gained access to the system, so the vulnerability can be fixed<\/li>\n<li>What information they accessed<\/li>\n<li>What their motivates were.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>This can be achieved by looking at access logs, using specialist forensic technologies.<\/p>\n<p>&nbsp;<\/p>\n\n<\/div><h2 class=\"tabtitle\">Policies<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Network Policies<\/h3>\n<p>Secure network policies can be highly effective in reducing successful attacks and mitigating the effects of a successful attack.<\/p>\n<p>Good network policies include:<\/p>\n<ul>\n<li>Forcing users to change their passwords on a regular basis<\/li>\n<li>Forcing users to pick a strong password<\/li>\n<li>Restricting user access only to the files \/ folders they need access to (see User Access Levels)<\/li>\n<li>Regularly monitoring access to check for suspicious activity<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n\n<\/div><h2 class=\"tabtitle\">Antimalware<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Anti-malware Software<\/h3>\n<div id=\"attachment_890\" style=\"width: 310px\" class=\"wp-caption alignright\"><a href=\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2018\/01\/malware.jpg\"><img aria-describedby=\"caption-attachment-890\" decoding=\"async\" loading=\"lazy\" class=\"wp-image-890 size-medium\" src=\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2018\/01\/malware-300x185.jpg\" alt=\"\" width=\"300\" height=\"185\" \/><\/a><p id=\"caption-attachment-890\" class=\"wp-caption-text\">Malware comes in many forms and forms a whole spectrum of threats<\/p><\/div>\n<p>Malware is software that contains features or extra software that either compromises a system or in some way impairs the user&#8217;s experience.<\/p>\n<p>Examples include:<\/p>\n<ul>\n<li>Installing browser add-ons that redirect web traffic via adverts.<\/li>\n<li>Installing extra software that turns your computer into a bit-coin miner, costly you money in electricity<\/li>\n<li>Installing software that allows governments or organisations to spy on you, tracking you browsing habits.<\/li>\n<\/ul>\n<p>Anti-malware detects, disables or removes harmful software.<\/p>\n<p>&nbsp;<\/p>\n\n<\/div><h2 class=\"tabtitle\">Firewalls<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Firewalls<\/h3>\n<p>Any computer or device connected to the internet is vulnerable to unauthorised access. In order to reduce the number of attacks a firewall is used to detect incoming and outgoing traffic and destroy suspicious packets that don&#8217;t meet the firewall&#8217;s rules.<\/p>\n<p>These rules often:<\/p>\n<ul>\n<li>Block traffic from known bad IP addresses (or block and entire range of addresses that originate from certain areas)<\/li>\n<li>Block access to certain ports.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n\n<\/div><h2 class=\"tabtitle\">UAL<\/h2>\n<div class=\"tabcontent\">\n\n<h3>User Access Levels<\/h3>\n<p>An effective way of preventing and containing threats to networks is through the use of User Access Levels.<\/p>\n<p>Each user is given access rights(permissions) to the areas of the network.<\/p>\n<p>Each right is limited to:<\/p>\n<ul>\n<li>read (view files)<\/li>\n<li>write(edit files)<\/li>\n<li>full control(delete\/add files)<\/li>\n<\/ul>\n<p>This means that if an account is compromised, only certain areas and resources are exposed.<\/p>\n<p>&nbsp;<\/p>\n\n<\/div><h2 class=\"tabtitle\">Passwords<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Passwords<\/h3>\n<p>Enforcing strong passwords using network policies are an effective way of reducing the possibility of successful network attacks.<\/p>\n<p><strong>Strong passwords<\/strong><\/p>\n<ul>\n<li>Mixture of lower and upper case letters.<\/li>\n<li>Include a number<\/li>\n<li>Include the use of characters e.g\u00a0 &#8220;\u00a3$%^&amp;<\/li>\n<li>Make sure that standard words are not used on their own. (dog)<\/li>\n<li>Make sure the password is long enough to prevent a brute force attack.<\/li>\n<li>Change passwords regularly<\/li>\n<li>Use different passwords for different accounts<\/li>\n<li>Don&#8217;t use easy to guess passwords (password123)<\/li>\n<\/ul>\n<p>Limited Login attempts<\/p>\n<ul>\n<li>Users are limited to a certain number of login attempts, after which their access is suspended for a period of time<\/li>\n<li>Especially useful against brute force attacks<\/li>\n<\/ul>\n<p>Biometric Password<\/p>\n\n<\/div><h2 class=\"tabtitle\">Proxy<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Proxy Servers<\/h3>\n<p>A piece of network hardware that hides a devices real location and IP Address.<\/p>\n<p>When communicating across the network data is first send via the proxy server where the sender&#8217;s IP address is replaced by the proxy server&#8217;s IP address before being send onto the destination server. This allows a certain amount of anonymity and security.<\/p>\n\n<\/div><h2 class=\"tabtitle\">Encryption<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Encryption<\/h3>\n<div id=\"attachment_888\" style=\"width: 235px\" class=\"wp-caption alignright\"><a href=\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2018\/01\/encryption.png\"><img aria-describedby=\"caption-attachment-888\" decoding=\"async\" loading=\"lazy\" class=\"wp-image-888 size-full\" src=\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2018\/01\/encryption.png\" alt=\"\" width=\"225\" height=\"225\" \/><\/a><p id=\"caption-attachment-888\" class=\"wp-caption-text\">Encryption is constantly being upgraded in a cat and mouse game<\/p><\/div>\n<p>Data encryption is useful for limiting the possibility of data being assessed when being <strong>stored<\/strong> or<strong> transmitted.<\/strong><\/p>\n<ul>\n<li>A strong encryption method should be used when transmitting (WP2 for Wifi).<\/li>\n<li>Hard drives used to store data should be fully encrypted.<\/li>\n<li>Messaging services should use end to end encryption.<\/li>\n<li>Data should only be entered in to sites that use HTTPS \/ SSL encryption<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n\n<\/div><h2 class=\"tabtitle\">Resources<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Resources<\/h3>\n<p><a href=\"https:\/\/docs.google.com\/spreadsheets\/d\/1vV10utVh53WhQyzaR_JDCzOX5J9G3AAB8ZW3hMlhgZc\/edit?usp=sharing\">Network Hardening Vocabulary<\/a><\/p>\n<p><a href=\"https:\/\/drive.google.com\/open?id=1c7CTpJcteXFGMrsc0GQZuRKB6OgJplFA\">Network Threats and Hardening Crossword<\/a><\/p>\n<p><a href=\"https:\/\/create.kahoot.it\/k\/65c2c2ee-c23c-48ef-af2f-e1b35f4c6684\">Network Threats and Hardening Kahoot.it<\/a><\/p>\n<p><a href=\"https:\/\/drive.google.com\/open?id=1DapepDXXp7cP7PIY2j01OHJaSBnHLK_S\">Network Threats and Hardening Flashcards<\/a><\/p>\n<p>(Make sure when you print you choose &#8216;print on both sides&#8217;\u00a0 &#8216;flip on the long edge&#8217;)<\/p>\n<p><strong>Past Paper Questions<\/strong><\/p>\n<p><a href=\"https:\/\/pastpapers.papacambridge.com\/viewer\/caie\/cambridge-upper-secondary-igcse-computer-science-0478-2016-jun-0478-s16-qp-11-pdf\">0478\/11 Paper 1 Theory May\/June 2016\u00a0\u00a0<\/a>Qn 8<\/p>\n<p><a href=\"https:\/\/pastpapers.papacambridge.com\/viewer\/caie\/cambridge-upper-secondary-igcse-computer-science-0478-2016-nov-0478-w16-qp-11-pdf\">0478\/11 &#8211; Paper 1 Theory October\/November 2016 4c<\/a><\/p>\n<p><a href=\"https:\/\/pastpapers.papacambridge.com\/viewer\/caie\/cambridge-upper-secondary-igcse-computer-science-0478-2017-jun-0478-s17-qp-12-pdf\">0478\/12- Paper 1 Theory May\/June 2017 Qn78b<\/a><\/p>\n<p><a href=\"https:\/\/pastpapers.papacambridge.com\/viewer\/caie\/cambridge-upper-secondary-igcse-computer-science-0478-2017-mar-0478-m17-qp-12-pdf\">0478\/12 &#8211; Paper 1 Theory February\/March 2017<\/a>\u00a0Qn4 &#8211; caesar shift example<\/p>\n<p><a href=\"https:\/\/pastpapers.papacambridge.com\/viewer\/caie\/cambridge-upper-secondary-igcse-computer-science-0478-2017-mar-0478-m17-qp-12-pdf\">0478\/12 &#8211; Paper 1 Theory February\/March 2017<\/a>\u00a0Qn9 &#8211; biometric password<\/p>\n<p><a href=\"https:\/\/pastpapers.papacambridge.com\/viewer\/caie\/cambridge-upper-secondary-igcse-computer-science-0478-2017-nov-0478-w17-qp-11-pdf\">0478\/11 &#8211; Paper 1 Theory October\/November 2017 qn7<\/a>\u00a0&#8211; firewalls<\/p>\n<p><a href=\"https:\/\/pastpapers.papacambridge.com\/viewer\/caie\/cambridge-upper-secondary-igcse-computer-science-0478-2017-nov-0478-w17-qp-11-pdf\">0478\/11 &#8211; Paper 1 Theory October\/November 2017 qn8b<\/a>\/c &#8211; SSL<\/p>\n<p><a href=\"https:\/\/pastpapers.papacambridge.com\/viewer\/caie\/cambridge-upper-secondary-igcse-computer-science-0478-2018-march-0478-m18-qp-12-pdf\">0478\/12 Paper 1 Theory February\/March 2018 Qn2 (Antivirus)<\/a><\/p>\n<p><a href=\"https:\/\/pastpapers.papacambridge.com\/viewer\/caie\/cambridge-upper-secondary-igcse-computer-science-0478-2018-may-june-0478-s18-qp-11-pdf\">0478\/11 &#8211; Paper 1 Theory May\/June 2018\u00a0 Qn9 (Biometrics)<\/a><\/p>\n<p><a href=\"https:\/\/pastpapers.papacambridge.com\/viewer\/caie\/cambridge-upper-secondary-igcse-computer-science-0478-2018-may-june-0478-s18-qp-11-pdf\">0478\/11 &#8211; Paper 1 Theory May\/June 2018\u00a0 Qn1<\/a>0d Proxy server<\/p>\n<p><a href=\"https:\/\/pastpapers.papacambridge.com\/viewer\/caie\/cambridge-upper-secondary-igcse-computer-science-0478-2019-may-june-0478-s19-qp-11-pdf\">0478\/11 &#8211; Paper 1 Theory May\/June 2019 qn6<\/a><\/p>\n<p>&nbsp;<\/p>\n<p><strong>News Articles<\/strong><\/p>\n<p><a href=\"https:\/\/www.washingtonpost.com\/technology\/2021\/04\/24\/pentagon-internet-address-mystery\/\">https:\/\/www.washingtonpost.com\/technology\/2021\/04\/24\/pentagon-internet-address-mystery\/<\/a><\/p>\n<p>&nbsp;<\/p>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Penetration Testing Often the best way to find out if your system is secure and to expose any system vulnerabilities, is to employ a white hat hacker to try and break into the system. They deploy a number of different tools and techniques to try and access the system. Once a vulnerability has been exposed&hellip;&nbsp;<a href=\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/network-hardening-measures\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Network Hardening Measures<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"off","neve_meta_content_width":100,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Network Hardening Measures - Edexcel iGCSE Computer Science<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/network-hardening-measures\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Network Hardening Measures - Edexcel iGCSE Computer Science\" \/>\n<meta property=\"og:description\" content=\"Penetration Testing Often the best way to find out if your system is secure and to expose any system vulnerabilities, is to employ a white hat hacker to try and break into the system. They deploy a number of different tools and techniques to try and access the system. Once a vulnerability has been exposed&hellip;&nbsp;Read More &raquo;Network Hardening Measures\" \/>\n<meta property=\"og:url\" content=\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/network-hardening-measures\/\" \/>\n<meta property=\"og:site_name\" content=\"Edexcel iGCSE Computer Science\" \/>\n<meta property=\"og:image\" content=\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2018\/01\/white-hat-hacker.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/network-hardening-measures\/\",\"url\":\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/network-hardening-measures\/\",\"name\":\"Network Hardening Measures - Edexcel iGCSE Computer Science\",\"isPartOf\":{\"@id\":\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/#website\"},\"datePublished\":\"2023-06-11T20:54:57+00:00\",\"dateModified\":\"2023-06-11T20:54:57+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/network-hardening-measures\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/network-hardening-measures\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/network-hardening-measures\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Network Hardening Measures\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/#website\",\"url\":\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/\",\"name\":\"Edexcel iGCSE Computer Science\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Network Hardening Measures - Edexcel iGCSE Computer Science","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/network-hardening-measures\/","og_locale":"en_GB","og_type":"article","og_title":"Network Hardening Measures - Edexcel iGCSE Computer Science","og_description":"Penetration Testing Often the best way to find out if your system is secure and to expose any system vulnerabilities, is to employ a white hat hacker to try and break into the system. They deploy a number of different tools and techniques to try and access the system. Once a vulnerability has been exposed&hellip;&nbsp;Read More &raquo;Network Hardening Measures","og_url":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/network-hardening-measures\/","og_site_name":"Edexcel iGCSE Computer Science","og_image":[{"url":"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2018\/01\/white-hat-hacker.png"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/network-hardening-measures\/","url":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/network-hardening-measures\/","name":"Network Hardening Measures - Edexcel iGCSE Computer Science","isPartOf":{"@id":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/#website"},"datePublished":"2023-06-11T20:54:57+00:00","dateModified":"2023-06-11T20:54:57+00:00","breadcrumb":{"@id":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/network-hardening-measures\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/network-hardening-measures\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/network-hardening-measures\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/"},{"@type":"ListItem","position":2,"name":"Network Hardening Measures"}]},{"@type":"WebSite","@id":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/#website","url":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/","name":"Edexcel iGCSE Computer Science","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"}]}},"rttpg_featured_image_url":null,"rttpg_author":{"display_name":"learnlearnadmin","author_link":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/author\/learnlearnadmin\/"},"rttpg_comment":0,"rttpg_category":null,"rttpg_excerpt":"Penetration Testing Often the best way to find out if your system is secure and to expose any system vulnerabilities, is to employ a white hat hacker to try and break into the system. They deploy a number of different tools and techniques to try and access the system. Once a vulnerability has been exposed&hellip;&nbsp;Read&hellip;","_links":{"self":[{"href":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wp-json\/wp\/v2\/pages\/188"}],"collection":[{"href":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wp-json\/wp\/v2\/comments?post=188"}],"version-history":[{"count":1,"href":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wp-json\/wp\/v2\/pages\/188\/revisions"}],"predecessor-version":[{"id":189,"href":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wp-json\/wp\/v2\/pages\/188\/revisions\/189"}],"wp:attachment":[{"href":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wp-json\/wp\/v2\/media?parent=188"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}