{"id":16476,"date":"2021-08-24T10:54:00","date_gmt":"2021-08-24T06:54:00","guid":{"rendered":"https:\/\/bigdata-ir.com\/?p=15443"},"modified":"2021-08-31T10:30:45","modified_gmt":"2021-08-31T06:00:45","slug":"%d9%85%d9%88%d8%b3%d8%b3%d9%87-%d8%a7%d8%b3%d8%aa%d8%a7%d9%86%d8%af%d8%a7%d8%b1%d8%afnist-%d9%85%d8%a4%d8%b3%d8%b3%d9%87-%d9%85%d9%84%db%8c-%d9%81%d9%86%d8%a7%d9%88%d8%b1%db%8c-%d9%88-%d8%a7%d8%b3","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/%d9%85%d9%88%d8%b3%d8%b3%d9%87-%d8%a7%d8%b3%d8%aa%d8%a7%d9%86%d8%af%d8%a7%d8%b1%d8%afnist-%d9%85%d8%a4%d8%b3%d8%b3%d9%87-%d9%85%d9%84%db%8c-%d9%81%d9%86%d8%a7%d9%88%d8%b1%db%8c-%d9%88-%d8%a7%d8%b3\/","title":{"rendered":"\u0645\u0648\u0633\u0633\u0647 \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062fNIST &#8211; \u0645\u0624\u0633\u0633\u0647 \u0645\u0644\u06cc \u0641\u0646\u0627\u0648\u0631\u06cc \u0648 \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f\u0647\u0627"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-15445\" src=\"https:\/\/afaghhosting.net\/blog\/wp-content\/uploads\/2021\/08\/d8a2d8b4d986d8a7db8cdb8c-d8a8d8a7-d985d988d8b3d8b3d987-d8a7d8b3d8aad8a7d986d8afd8a7d8b1d8afnist-db8cd8a7-d985d8a4d8b3d8b3d987-d985d984.jpg\" alt=\"NIST\" width=\"620\" height=\"277\" data-lazy-srcset=\"https:\/\/afaghhosting.net\/blog\/wp-content\/uploads\/2021\/08\/d8a2d8b4d986d8a7db8cdb8c-d8a8d8a7-d985d988d8b3d8b3d987-d8a7d8b3d8aad8a7d986d8afd8a7d8b1d8afnist-db8cd8a7-d985d8a4d8b3d8b3d987-d985d984.jpg 300w, https:\/\/afaghhosting.net\/blog\/wp-content\/uploads\/2021\/08\/d8a2d8b4d986d8a7db8cdb8c-d8a8d8a7-d985d988d8b3d8b3d987-d8a7d8b3d8aad8a7d986d8afd8a7d8b1d8afnist-db8cd8a7-d985d8a4d8b3d8b3d987-d985d984-1.jpg 637w\" data-lazy-sizes=\"(max-width: 620px) 100vw, 620px\" title=\"\"><\/p>\n<p>\u0645\u0648\u0633\u0633\u0647 \u0645\u0644\u06cc \u0641\u0646\u0627\u0648\u0631\u06cc \u0648 \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f\u0647\u0627(NIST)\u060c \u062a\u0627\u0633\u06cc\u0633 \u06f1\u06f9\u06f0\u06f1\u060c \u0646\u0627\u0645 \u06cc\u06a9 \u0645\u0648\u0633\u0633\u0647 \u062f\u0648\u0644\u062a\u06cc \u0639\u0644\u0645\u06cc \u062f\u0631 \u0622\u0645\u0631\u06cc\u06a9\u0627 \u0627\u0633\u062a. \u0627\u06cc\u0646 \u0645\u0648\u0633\u0633\u0647 \u0632\u06cc\u0631 \u0646\u0638\u0631 \u0648\u0632\u0627\u0631\u062a \u0628\u0627\u0632\u0631\u06af\u0627\u0646\u06cc \u0627\u06cc\u0627\u0644\u0627\u062a \u0645\u062a\u062d\u062f\u0647 \u0622\u0645\u0631\u06cc\u06a9\u0627 \u0641\u0639\u0627\u0644\u06cc\u062a \u0645\u06cc\u200c\u06a9\u0646\u062f\u060c \u0648 \u0647\u062f\u0641 \u0627\u0632 \u0622\u0646 \u062a\u0634\u0648\u06cc\u0642 \u0646\u0648\u0622\u0648\u0631\u06cc \u0648 \u0631\u0642\u0627\u0628\u062a \u0635\u0646\u0639\u062a\u06cc \u062a\u0648\u0633\u0637 \u067e\u06cc\u0634\u0628\u0631\u062f \u0639\u0644\u0648\u0645 \u0633\u0646\u062c\u0634\u06cc \u0648 \u0641\u0646\u0627\u0648\u0631\u06cc \u062f\u0631 \u0622\u0645\u0631\u06cc\u06a9\u0627 \u0628\u06af\u0648\u0646\u0647\u200c\u0627\u06cc\u06a9\u0647 \u0627\u0645\u0646\u06cc\u062a \u0627\u0642\u062a\u0635\u0627\u062f\u06cc \u0631\u0627 \u0627\u0631\u062a\u0642\u0627 \u0628\u062e\u0634\u06cc\u062f\u0647\u060c \u0648 \u0633\u0637\u062d \u06a9\u06cc\u0641\u06cc\u062a \u0632\u0646\u062f\u06af\u06cc \u0631\u0627 \u0627\u0641\u0632\u0627\u06cc\u0634 \u062f\u0647\u062f.<\/p>\n<p>&nbsp;<\/p>\n<p><noscript><img decoding=\"async\" loading=\"lazy\" class=\" wp-image-15445\" src=\"https:\/\/afaghhosting.net\/blog\/wp-content\/uploads\/2021\/08\/d8a2d8b4d986d8a7db8cdb8c-d8a8d8a7-d985d988d8b3d8b3d987-d8a7d8b3d8aad8a7d986d8afd8a7d8b1d8afnist-db8cd8a7-d985d8a4d8b3d8b3d987-d985d984.jpg\" alt=\"NIST\" width=\"620\" height=\"277\" srcset=\"https:\/\/afaghhosting.net\/blog\/wp-content\/uploads\/2021\/08\/d8a2d8b4d986d8a7db8cdb8c-d8a8d8a7-d985d988d8b3d8b3d987-d8a7d8b3d8aad8a7d986d8afd8a7d8b1d8afnist-db8cd8a7-d985d8a4d8b3d8b3d987-d985d984.jpg 300w, https:\/\/afaghhosting.net\/blog\/wp-content\/uploads\/2021\/08\/d8a2d8b4d986d8a7db8cdb8c-d8a8d8a7-d985d988d8b3d8b3d987-d8a7d8b3d8aad8a7d986d8afd8a7d8b1d8afnist-db8cd8a7-d985d8a4d8b3d8b3d987-d985d984-1.jpg 637w\" sizes=\"auto, (max-width: 620px) 100vw, 620px\" title=\"\"><\/noscript><\/p>\n<div id=\"toc_container\" class=\"toc_wrap_right toc_light_blue have_bullets\">\n<p class=\"toc_title\">\u0639\u0646\u0627\u0648\u064a\u0646 \u0645\u0637\u0627\u0644\u0628: &#8216;<\/p>\n<\/div>\n<h2><span id=\"-NIST\"><strong>\u0645\u0639\u0631\u0641\u06cc \u0645\u0648\u0633\u0633\u0647 NIST<\/strong><\/span><\/h2>\n<p>\u0645\u0648\u0633\u0633\u0647 \u0645\u0644\u06cc \u0641\u0646\u0627\u0648\u0631\u06cc \u0648 \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f\u0647\u0627 (National Institute of Standards and Technology) \u0645\u0634\u0647\u0648\u0631 \u0628\u0647 NIST\u060c \u0646\u0627\u0645 \u06cc\u06a9 \u0645\u0648\u0633\u0633\u0647 \u062f\u0648\u0644\u062a\u06cc \u0639\u0644\u0645\u06cc \u062f\u0631 \u0622\u0645\u0631\u06cc\u06a9\u0627\u0633\u062a. \u0627\u06cc\u0646 \u0645\u0648\u0633\u0633\u0647 \u0632\u06cc\u0631 \u0646\u0638\u0631 \u0648\u0632\u0627\u0631\u062a \u0628\u0627\u0632\u0631\u06af\u0627\u0646\u06cc \u0627\u06cc\u0627\u0644\u0627\u062a \u0645\u062a\u062d\u062f\u0647 \u0622\u0645\u0631\u06cc\u06a9\u0627 \u0641\u0639\u0627\u0644\u06cc\u062a \u0645\u06cc\u200c\u06a9\u0646\u062f. \u0647\u062f\u0641 \u0627\u0632 \u0622\u0646 \u062a\u0634\u0648\u06cc\u0642 \u0646\u0648\u0622\u0648\u0631\u06cc \u0648 \u0631\u0642\u0627\u0628\u062a \u0635\u0646\u0639\u062a\u06cc \u062a\u0648\u0633\u0637 \u067e\u06cc\u0634\u0628\u0631\u062f \u0639\u0644\u0648\u0645 \u0633\u0646\u062c\u0634\u06cc \u0648 \u0641\u0646\u0627\u0648\u0631\u06cc \u0627\u0633\u062a\u060c \u0628\u0647 \u06af\u0648\u0646\u0647\u200c\u0627\u06cc \u06a9\u0647 \u0627\u0645\u0646\u06cc\u062a \u0627\u0642\u062a\u0635\u0627\u062f\u06cc \u0631\u0627 \u0627\u0631\u062a\u0642\u0627 \u0628\u062e\u0634\u06cc\u062f\u0647\u060c \u0648 \u0633\u0637\u062d \u06a9\u06cc\u0641\u06cc\u062a \u0632\u0646\u062f\u06af\u06cc \u0631\u0627 \u0627\u0641\u0632\u0627\u06cc\u0634 \u062f\u0647\u062f. \u062f\u0631 \u062d\u0642\u06cc\u0642\u062a \u0627\u06cc\u0646 \u0645\u0648\u0633\u0633\u0647 \u0628\u0627 \u062a\u062f\u0648\u06cc\u0646 \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f\u200c\u0647\u0627 \u0628\u0627\u0639\u062b \u0628\u0647\u0628\u0648\u062f \u062e\u062f\u0645\u0627\u062a \u0648 \u0627\u0631\u062a\u0642\u0627\u0621 \u06a9\u06cc\u0641\u06cc \u0633\u0631\u0648\u06cc\u0633\u200c\u0647\u0627 \u0645\u06cc\u200c\u0634\u0648\u062f \u0648 \u0631\u0642\u0627\u0628\u062a \u0635\u0646\u0639\u062a\u06cc \u062a\u0646\u0647\u0627 \u062f\u0631 \u0633\u0627\u06cc\u0647 \u0648\u062c\u0648\u062f \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f\u0647\u0627 \u0648 \u0645\u0639\u06cc\u0627\u0631\u0647\u0627\u06cc \u0627\u0646\u062f\u0627\u0632\u0647 \u06af\u06cc\u0631\u06cc \u0627\u0645\u06a9\u0627\u0646\u200c\u067e\u0630\u06cc\u0631 \u0627\u0633\u062a .<\/p>\n<h2><span id=\"-NIST-2\"><strong>\u0645\u0639\u0631\u0641\u06cc \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f\u0647\u0627\u06cc \u0645\u0648\u0633\u0633\u0647 NIST<\/strong><\/span><\/h2>\n<p>\u0645\u0648\u0633\u0633\u0647 NIST \u0645\u062c\u0645\u0648\u0639\u0647 \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f\u0647\u0627\u06cc\u06cc \u062f\u0631 \u062d\u0648\u0632\u0647 \u0627\u0645\u0646\u06cc\u062a \u062f\u0631 \u0641\u0646\u0627\u0648\u0631\u06cc \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u0648 \u0627\u0631\u062a\u0628\u0627\u0637\u0627\u062a \u0627\u0631\u0627\u0626\u0647 \u0646\u0645\u0648\u062f\u0647 \u0627\u0633\u062a. \u0627\u06cc\u0646 \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f\u0647\u0627 \u0628\u0647 \u0639\u0646\u0648\u0627\u0646 \u0645\u0631\u062c\u0639 \u0628\u0631\u0627\u06cc \u06a9\u0646\u062a\u0631\u0644\u200c\u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc\u060c \u0627\u0631\u0632\u06cc\u0627\u0628\u06cc \u0645\u062e\u0627\u0637\u0631\u0627\u062a \u0648 \u062a\u062d\u0644\u06cc\u0644 \u0631\u06cc\u0633\u06a9\u060c \u0645\u0648\u0631\u062f \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0642\u0631\u0627\u0631 \u0645\u06cc\u200c\u06af\u06cc\u0631\u062f.<\/p>\n<p>\u0627\u0632 \u062f\u06cc\u06af\u0631 \u0645\u0648\u0627\u0631\u062f \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u06cc\u0646 \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f\u0647\u0627 \u0645\u06cc \u062a\u0648\u0627\u0646 \u0628\u0647 \u0645\u062f\u06cc\u0631\u06cc\u062a \u062f\u0631 \u0637\u0631\u0627\u062d\u06cc\u060c \u0631\u0627\u0647\u200c\u0627\u0646\u062f\u0627\u0632\u06cc \u0648 \u0646\u06af\u0647\u062f\u0627\u0631\u06cc \u062f\u0631 \u062d\u0648\u0632\u0647 \u0641\u0646\u0627\u0648\u0631\u06cc \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u0648 \u0627\u0631\u062a\u0628\u0627\u0637\u0627\u062a \u0627\u0634\u0627\u0631\u0647 \u0646\u0645\u0648\u062f. \u0627\u06cc\u0646 \u0633\u0631\u06cc \u0627\u0632 \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f\u0647\u0627\u060c \u062a\u0642\u0631\u06cc\u0628\u0627 \u0645\u0634\u0627\u0628\u0647 \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u0647\u0627\u06cc \u0633\u0631\u06cc ISO 27001 \u0645\u06cc \u0628\u0627\u0634\u062f. \u0627\u0644\u0628\u062a\u0647 \u0645\u0648\u0633\u0633\u0647 NIST \u0641\u0642\u0637 \u0628\u0647 \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f \u0633\u0627\u0632\u06cc \u0631\u0648\u0627\u0644\u200c\u0647\u0627\u06cc \u0645\u062f\u06cc\u0631\u06cc\u062a\u06cc \u0628\u0633\u0646\u062f\u0647 \u0646\u06a9\u0631\u062f\u0647 \u0627\u0633\u062a \u0648 \u0628\u0631\u0627\u06cc \u062a\u0645\u0627\u0645 \u0632\u06cc\u0631 \u0645\u062c\u0645\u0648\u0639\u0647\u200c\u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a \u062f\u0631 \u062d\u0648\u0632\u0647 \u0641\u0646\u0627\u0648\u0631\u06cc \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u0648 \u0627\u0631\u062a\u0628\u0627\u0637\u0627\u062a\u060c \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f\u0647\u0627\u06cc \u0648\u06cc\u0698\u0647 \u0627\u06cc \u062a\u062f\u0648\u06cc\u0646 \u0646\u0645\u0648\u062f\u0647 \u0627\u0633\u062a\u060c \u062a\u0627 \u062f\u0631 \u0645\u0631\u0627\u062d\u0644 \u0645\u062e\u062a\u0644\u0641 \u0645\u0648\u0631\u062f \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0642\u0631\u0627\u0631 \u06af\u06cc\u0631\u062f:<\/p>\n<ol type=\"1\">\n<li>\u062a\u062f\u0648\u06cc\u0646 \u0627\u0633\u0627\u0633\u0646\u0627\u0645\u0647\u200c\u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc<\/li>\n<li>\u0622\u0645\u0648\u0632\u0634 \u0648 \u0627\u0637\u0644\u0627\u0639\u200c\u0631\u0633\u0627\u0646\u06cc<\/li>\n<li>\u0646\u0638\u0627\u0631\u062a \u0648 \u0645\u0648\u0627\u062c\u0647\u0647 \u0628\u0627 \u062a\u0647\u062f\u06cc\u062f \u0648 \u067e\u0627\u0633\u062e\u06af\u0648\u06cc\u06cc \u0628\u0647 \u062d\u0648\u0627\u062f\u062b<\/li>\n<li>\u0645\u062f\u06cc\u0631\u06cc\u062a \u0628\u062d\u0631\u0627\u0646<\/li>\n<li>\u0645\u062f\u06cc\u0631\u06cc\u062a \u0631\u06cc\u0633\u06a9<\/li>\n<li>\u0627\u0631\u0632\u06cc\u0627\u0628\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u0648 \u0645\u0645\u06cc\u0632\u06cc<\/li>\n<\/ol>\n<h3><span id=\"i\"><strong>\u0627\u06cc\u0646 \u0633\u0631\u06cc \u0627\u0632 \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f\u0647\u0627 \u0628\u0647 \u0628\u062e\u0634\u200c\u0647\u0627\u06cc \u0632\u06cc\u0631 \u062a\u0642\u0633\u06cc\u0645 \u0645\u06cc \u0634\u0648\u0646\u062f :<\/strong><\/span><\/h3>\n<ol type=\"1\">\n<li>Audit &amp; Accountability &amp; Authentication<\/li>\n<li>Awareness &amp; Training<\/li>\n<li>Biometrics<\/li>\n<li>Certification &amp; Accreditation (C&amp;A)<\/li>\n<li>Communications &amp; Wireless<\/li>\n<li>Contingency Planning<\/li>\n<li>Cryptography<\/li>\n<li>Digital Signatures<\/li>\n<li>Forensics<\/li>\n<li>General IT Security<\/li>\n<li>Historical Archives<\/li>\n<li>Incident Response<\/li>\n<li>Maintenance<\/li>\n<li>Personal Identity Verification (PIV)<\/li>\n<li>PKI<\/li>\n<li>Planning<\/li>\n<li>Research<\/li>\n<li>Risk Assessment<\/li>\n<li>Services &amp; Acquisitions<\/li>\n<li>Smart Cards<\/li>\n<li>Viruses &amp; Malware<\/li>\n<\/ol>\n<div class=\"wp-block-spacer\" aria-hidden=\"true\">\n<h2><span id=\"-NIST-3\"><b>\u062f\u0633\u062a\u0647 \u0628\u0646\u062f\u06cc \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f\u0647\u0627\u06cc NIST<\/b><\/span><\/h2>\n<p>NIST \u062f\u0627\u0631\u0627\u06cc \u0633\u0647 \u062f\u0633\u062a\u0647 \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f \u062f\u0631 \u062d\u0648\u0632\u0647 \u0627\u0645\u0646\u06cc\u062a \u06a9\u0627\u0645\u067e\u06cc\u0648\u062a\u0631, \u0627\u06cc\u0646\u062a\u0631\u0646\u062a , \u0648 \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u0645\u06cc \u0628\u0627\u0634\u062f \u06a9\u0647 \u0628\u0647 \u0635\u0648\u0631\u062a \u0631\u0627\u0647\u0646\u0645\u0627 \u0648 \u062a\u0648\u0635\u06cc\u0647 \u0647\u0627\u00a0 \u0627\u0631\u0627\u0626\u0647 \u0645\u06cc \u0634\u0648\u062f.<\/p>\n<p><strong>SP800 ( Computer Security, 1990)<\/strong><\/p>\n<p>\u0634\u0627\u0645\u0644 \u062a\u0648\u0635\u06cc\u0647 \u0647\u0627\u00a0 \u0648 \u0631\u0627\u0647\u0646\u0645\u0627 \u0647\u0627 \u0648 \u0645\u0648\u0627\u0631\u062f \u0645\u0631\u062c\u0639 \u062f\u0631 \u0632\u0645\u06cc\u0646\u0647 \u0627\u0645\u0646\u06cc\u062a \u06a9\u0627\u0645\u067e\u06cc\u0648\u062a\u0631 , \u0634\u0628\u06a9\u0647 \u0648 \u0627\u06cc\u0646\u062a\u0631\u0646\u062a \u0645\u06cc \u0628\u0627\u0634\u062f.<\/p>\n<p><strong>SP1800 (NIST Cyber Security Practice guide, 2015)<\/strong><\/p>\n<p>\u0627\u06cc\u0646 \u062f\u0633\u062a\u0647 \u0627\u0632 \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f \u0647\u0627 \u062c\u0647\u062a \u062a\u06a9\u0645\u06cc\u0644 \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f sp800 \u0645\u0646\u062a\u0634\u0631 \u0634\u062f\u0646\u062f. \u0648 \u0647\u062f\u0641 \u0627\u0632 \u0622\u0646\u0647\u0627 \u0628\u0647 \u0637\u0648\u0631 \u062e\u0627\u0635 \u0686\u0627\u0644\u0634 \u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u0641\u0636\u0627\u06cc \u0645\u062c\u0627\u0632\u06cc \u062f\u0631 \u0628\u062e\u0634\u00a0 \u0639\u0645\u0648\u0645\u06cc \u0648 \u062e\u0635\u0648\u0635\u06cc \u0645\u06cc \u0628\u0627\u0634\u062f.<\/p>\n<p><strong>\u00a0<\/strong><strong>SP500 (Computer System Technology, 1997)<\/strong><\/p>\n<p>\u0627\u06cc\u0646 \u062f\u0633\u062a\u0647 \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f \u0647\u0627 \u0628\u0647 \u0635\u0648\u0631\u062a \u06af\u0633\u062a\u0631\u062f\u0647 \u062a\u0648\u0633\u0637 \u0622\u0632\u0645\u0627\u06cc\u0634\u06af\u0627\u0647 \u0641\u0646\u0627\u0648\u0631\u06cc \u0627\u0637\u0644\u0627\u0639\u0627\u062a NIST \u0628\u06a9\u0627\u0631 \u06af\u0631\u0641\u062a\u0647 \u0645\u06cc \u0634\u0648\u062f.<\/p>\n<p>\u062f\u0633\u062a\u0647 \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f SP800 \u062f\u0631 \u062a\u0645\u0627\u0645\u06cc \u0632\u0645\u06cc\u0646\u0647 \u0647\u0627\u06cc \u062d\u0648\u0632\u0647 \u0641\u0646\u0627\u0648\u0631\u06cc \u062f\u0627\u0631\u0627\u06cc \u0631\u0627\u0647\u0646\u0645\u0627 \u0647\u0627\u06cc \u0628\u0633\u06cc\u0627\u0631 \u06a9\u0627\u0631\u0628\u0631\u062f\u06cc \u0645\u06cc \u0628\u0627\u0634\u062f \u06a9\u0647 \u062f\u0631 \u0627\u06cc\u0646 \u0637\u0631\u062d \u0645\u062a\u0646\u0627\u0633\u0628 \u0628\u0627 \u062a\u062c\u0631\u0628\u0647 \u0686\u0646\u062f\u06cc\u0646 \u0633\u0627\u0644\u0647 \u062f\u0631 \u0632\u0645\u06cc\u0646\u0647 \u0627\u0645\u0646\u06cc\u062a \u0634\u0628\u06a9\u0647 \u0628\u0631\u062e\u06cc \u0627\u0632 \u0645\u0648\u0627\u0631\u062f \u067e\u0631 \u06a9\u0627\u0631\u0628\u0631\u062f \u0628\u0647\u00a0 \u0627\u062e\u062a\u0635\u0627\u0631 \u062a\u0648\u0636\u06cc\u062d\u00a0 \u062f\u0627\u062f\u0647 \u0634\u062f\u0647 \u0648 \u062f\u0631 \u0631\u0627\u0647\u06a9\u0627\u0631 \u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u0627\u0631\u0627\u0626\u0647 \u0634\u062f\u0647 \u0627\u0632 \u0622\u0646\u0647\u0627 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u06cc \u0634\u0648\u062f.<\/p>\n<p><strong>SP 800-94 (Guide to Intrusion Detection and Prevention Systems (IDPS), 2012)<\/strong><\/p>\n<p>\u0627\u06cc\u0646 \u0646\u0634\u0631\u06cc\u0647 \u0628\u0627 \u062a\u0648\u0635\u06cc\u0641 \u0645\u0634\u062e\u0635\u0627\u062a \u06cc\u06a9 \u0633\u06cc\u0633\u062a\u0645 \u062a\u0634\u062e\u06cc\u0635 \u0646\u0641\u0648\u0630, \u0631\u0627\u0647\u06a9\u0627\u0631\u0647\u0627\u06cc\u06cc \u062f\u0631 \u0645\u0648\u0631\u062f\u00a0 \u0645\u0639\u0645\u0627\u0631\u06cc \u0628\u06a9\u0627\u0631\u06af\u06cc\u0631\u06cc , \u0646\u062d\u0648\u0647 \u067e\u06cc\u06a9\u0631 \u0628\u0646\u062f\u06cc , \u0646\u0638\u0627\u0631\u062a \u0628\u0631 \u0633\u06cc\u0633\u062a\u0645 \u0648 \u0646\u06af\u0647\u062f\u0627\u0631\u06cc \u0627\u0632 \u0622\u0646 \u0627\u0631\u0627\u0626\u0647 \u0645\u06cc \u06a9\u0646\u062f.<\/p>\n<p><strong>SP 800-92 (Guide to Computer Security Log Management, 2006)<\/strong><\/p>\n<p>\u0647\u062f\u0641 \u0627\u06cc\u0646 \u0646\u0634\u0631\u06cc\u0647 \u0627\u0631\u0627\u0626\u0647 \u0631\u0627\u0647\u06a9\u0627\u0631 \u0647\u0627\u06cc\u06cc \u062f\u0631 \u0646\u062d\u0648\u0647 \u0631\u0648\u0627\u0644 \u0641\u0631\u0622\u06cc\u0646\u062f \u062a\u0648\u0644\u06cc\u062f, \u0627\u0646\u062a\u0642\u0627\u0644 , \u0630\u062e\u06cc\u0631\u0647 \u0633\u0627\u0632\u06cc, \u062a\u062d\u0644\u06cc\u0644 \u0648 \u0645\u0631\u062a\u0628 \u0633\u0627\u0632\u06cc \u06af\u0632\u0627\u0631\u0634\u0627\u062a \u0627\u0645\u0646\u06cc\u062a\u06cc \u0645\u06cc \u0628\u0627\u0634\u062f.<\/p>\n<p><strong>SP 800-77 (Guide to IPsec VPNs, 2005)<\/strong><\/p>\n<p>\u0627\u06cc\u0646 \u0631\u0627\u0647\u0646\u0645\u0627 \u0628\u0647 \u0628\u0631\u0631\u0633\u06cc \u0648 \u062a\u062d\u0644\u06cc\u0644 \u06a9\u0646\u062a\u0631\u0644 \u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u0645\u06cc \u067e\u0631\u062f\u0627\u0632\u062f \u06a9\u0647 \u0647\u062f\u0641\u0634\u0627\u0646 \u062d\u0641\u0638 \u0627\u0645\u0646\u06cc\u062a \u062c\u0631\u06cc\u0627\u0646 \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u0631\u0648\u06cc \u0628\u0633\u062a\u0631 TCP\/IP \u0645\u06cc \u0628\u0627\u0634\u062f.<\/p>\n<p><strong>SP 800-153 (Guidelines for Securing Wireless Local Area Networks (WLANs),2012)<\/strong><\/p>\n<p>\u0627\u06cc\u0646 \u0631\u0627\u0647\u0646\u0645\u0627 \u0646\u06cc\u0627\u0632\u0645\u0646\u062f\u06cc \u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u0631\u0648\u06cc \u0634\u0628\u06a9\u0647 \u0628\u06cc \u0633\u06cc\u0645 \u0631\u0627 \u0647\u0645 \u062f\u0631 \u0633\u0637\u062d \u06a9\u0627\u0631\u0628\u0631 \u0648 \u0647\u0645 \u0646\u0642\u0637\u0647 \u062f\u0633\u062a\u0631\u0633\u06cc \u0628\u0631\u0631\u0633\u06cc \u06a9\u0631\u062f\u0647 \u0648 \u062a\u0648\u0635\u06cc\u0647 \u0647\u0627\u06cc\u06cc \u062c\u0647\u062a \u0627\u0631\u062a\u0642\u0627 \u0633\u0637\u062d \u0627\u0645\u0646\u06cc\u062a \u0628\u0633\u062a\u0631 \u0628\u06cc \u0633\u06cc\u0645 \u0628\u0647 \u0633\u0627\u0632\u0645\u0627\u0646 \u0627\u0631\u0627\u0626\u0647 \u0645\u06cc \u0646\u0645\u0627\u06cc\u062f.<\/p>\n<p><strong>SP 800-36(Guide to Selecting Information Technology Security Products,2003)<\/strong><\/p>\n<p>\u0627\u06cc\u0646 \u0631\u0627\u0647\u0646\u0645\u0627 \u0628\u0647 \u06cc\u06a9 \u0633\u0627\u0632\u0645\u0627\u0646 \u062c\u0647\u062a \u0627\u0646\u062a\u062e\u0627\u0628 \u0645\u0646\u0627\u0633\u0628 \u062a\u0631\u06cc\u0646 \u0645\u062d\u0635\u0648\u0644 \u0627\u0645\u0646\u06cc\u062a\u06cc \u0645\u0648\u0631\u062f \u0646\u06cc\u0627\u0632 \u06a9\u0645\u06a9 \u0645\u06cc \u06a9\u0646\u062f.\u0644\u0627\u0632\u0645 \u0628\u0647 \u0630\u06a9\u0631 \u0627\u0633\u062a \u0627\u06cc\u0646 \u0631\u0627\u0647\u0646\u0645\u0627 \u0648\u0627\u0628\u0633\u062a\u0647 \u0628\u0647 \u0631\u0627\u0647\u0646\u0645\u0627 \u0647\u0627\u06cc 800-30,800-77,800-23,800-53,800-64,800-27 \u0645\u06cc \u0628\u0627\u0634\u062f.<\/p>\n<p><strong>SP 800-35(Guide to Information Technology Security Services,2003)<\/strong><\/p>\n<p>\u0627\u06cc\u0646 \u0631\u0627\u0647\u0646\u0645\u0627 \u0628\u0627 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u062a\u0648\u0636\u06cc\u062d \u0648 \u062a\u0634\u0631\u06cc\u062d \u0641\u0627\u0632 \u0647\u0627\u06cc \u0645\u062e\u062a\u0644\u0641 \u0686\u0631\u062e\u0647 \u0639\u0645\u0631 \u0633\u0631\u0648\u06cc\u0633 \u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc , \u0633\u0627\u0632\u0645\u0627\u0646 \u0631\u0627 \u062c\u0647\u062a \u0627\u0646\u062a\u062e\u0627\u0628 , \u067e\u06cc\u0627\u062f\u0647 \u0633\u0627\u0632\u06cc \u0648 \u0645\u062f\u06cc\u0631\u06cc\u062a \u06cc\u06a9 \u0633\u0631\u0648\u06cc\u0633 \u0627\u0645\u0646\u06cc\u062a\u06cc \u0622\u06af\u0627\u0647 \u0645\u06cc \u0633\u0627\u0632\u062f.<\/p>\n<p><strong>SP 800-41 (Guidelines on Firewalls and Firewall Policy,<\/strong>\u00a0<strong>2009)<\/strong><\/p>\n<p>\u0627\u06cc\u0646 \u0631\u0627\u0647\u0646\u0645\u0627 \u0628\u0647 \u062a\u0648\u0635\u06cc\u0641 \u062a\u06a9\u0646\u0648\u0644\u0648\u0698\u06cc \u062f\u06cc\u0648\u0627\u0631 \u0622\u062a\u0634 \u067e\u0631\u062f\u0627\u062e\u062a\u0647 \u0648 \u0642\u0627\u0628\u0644\u06cc\u062a \u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u0622\u0646 \u0648 \u0645\u0632\u0627\u06cc\u0627 \u0648 \u0645\u0639\u0627\u06cc\u0628 \u0628\u06a9\u0627\u0631\u06af\u06cc\u0631\u06cc \u0627\u0632 \u0622\u0646 \u0631\u0627 \u062a\u0634\u0631\u06cc\u062d \u0645\u06cc\u06a9\u0646\u062f \u0648 \u0646\u06cc\u0632 \u0631\u0627\u0647\u06a9\u0627\u0631 \u0647\u0627\u06cc\u06cc \u062c\u0647\u062a \u0628\u0647\u062a\u0631\u06cc\u0646 \u067e\u06cc\u06a9\u0631\u0628\u0646\u062f\u06cc \u0648 \u0645\u0639\u0645\u0627\u0631\u06cc \u0628\u06a9\u0627\u0631\u06af\u06cc\u0631\u06cc \u062f\u0631 \u0627\u062e\u062a\u06cc\u0627\u0631 \u0633\u0627\u0632\u0645\u0627\u0646 \u0642\u0631\u0627\u0631 \u0645\u06cc \u062f\u0647\u062f.<\/p>\n<\/div>\n<p>\u062f\u0631 \u062d\u0642\u06cc\u0642\u062a \u062f\u0633\u062a\u0647 \u0628\u0646\u062f\u06cc \u0627\u0645\u0646\u06cc\u062a \u062f\u0631 \u062d\u0648\u0632\u0647 \u0641\u0646\u0627\u0648\u0631\u06cc \u0627\u0637\u0644\u0627\u0639\u0627\u062a\u060c \u062a\u0648\u0633\u0637 \u0627\u06cc\u0646 \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f\u0647\u0627 \u062a\u0642\u0633\u06cc\u0645 \u06af\u0631\u062f\u06cc\u062f\u0647 \u0627\u0633\u062a \u0648 \u0647\u0631 \u0633\u0646\u062f \u0628\u0647 \u0635\u0648\u0631\u062a \u062e\u0627\u0635 (Special Publications) \u0628\u0647 \u062a\u062f\u0648\u06cc\u0646 \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f\u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u0645\u0634\u062e\u0635\u06cc(SP) \u0645\u06cc\u200c\u067e\u0631\u062f\u0627\u0632\u062f.<\/p>\n<p>\u0633\u0648\u0627\u0644\u06cc \u06a9\u0647 \u067e\u06cc\u0634 \u0645\u06cc\u200c\u0622\u06cc\u062f \u0627\u06cc\u0646\u0633\u062a \u06a9\u0647 \u062f\u0644\u06cc\u0644 \u0627\u0635\u0644\u06cc \u062a\u0627\u06a9\u06cc\u062f \u0628\u0631 \u067e\u06cc\u0631\u0648\u06cc \u0627\u0632 \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f\u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u0686\u06cc\u0633\u062a\u061f<\/p>\n<p><strong>\u067e\u0627\u0633\u062e \u0628\u0647 \u0627\u06cc\u0646 \u0633\u0648\u0627\u0644 \u0628\u0627 \u062f\u0642\u062a \u062f\u0631 \u0631\u0633\u0627\u0644\u062a \u0645\u0648\u0633\u0633\u0647 NIST\u060c \u06a9\u0627\u0645\u0644\u0627 \u0645\u0634\u062e\u0635 \u0645\u06cc\u200c\u0628\u0627\u0634\u062f:<\/strong><\/p>\n<h2><span id=\"-NIST-4\"><strong>\u0631\u0633\u0627\u0644\u062a \u0645\u0648\u0633\u0633\u0647 NIST<\/strong><\/span><\/h2>\n<h5><span id=\"i-2\">\u06f1- \u062a\u0631\u0648\u06cc\u062c \u0646\u0648\u0622\u0648\u0631\u06cc \u0648 \u0631\u0642\u0627\u0628\u062a \u0635\u0646\u0639\u062a\u06cc<\/span><\/h5>\n<p>\u0628\u0627 \u0631\u0648\u0627\u062c \u0648 \u0631\u0639\u0627\u06cc\u062a \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f\u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc\u060c \u0627\u0645\u06a9\u0627\u0646 \u0638\u0647\u0648\u0631 \u0646\u0648\u0622\u0648\u0631\u06cc \u062f\u0631 \u0628\u062e\u0634\u200c\u0647\u0627\u06cc \u0645\u062e\u062a\u0644\u0641 \u0635\u0646\u0639\u062a \u0628\u0647 \u0631\u0627\u062d\u062a\u06cc \u0641\u0631\u0627\u0647\u0645 \u062e\u0648\u0627\u0647\u062f \u0622\u0645\u062f. \u0646\u0628\u0648\u062f \u0642\u0627\u0646\u0648\u0646 \u0648 \u0631\u06af\u0648\u0644\u0627\u062a\u0648\u0631\u06cc (\u0642\u0627\u0646\u0648\u0646\u06af\u0630\u0627\u0631\u06cc) \u0648 \u0647\u0645\u06cc\u0646\u0637\u0648\u0631 \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f\u060c \u0642\u0637\u0639\u0627 \u0627\u0632 \u0628\u0631\u0648\u0632 \u062e\u0644\u0627\u0642\u06cc\u062a \u0648 \u0646\u0648\u0622\u0648\u0631\u06cc \u062f\u0631 \u0635\u0646\u0627\u06cc\u0639 \u062c\u0644\u0648\u06af\u06cc\u0631\u06cc \u0645\u06cc\u200c\u06a9\u0646\u062f.<\/p>\n<h5><span id=\"i-3\">\u06f2- \u0627\u0645\u06a9\u0627\u0646 \u0627\u0646\u062f\u0627\u0632\u0647\u200c\u06af\u06cc\u0631\u06cc\u060c \u0645\u0642\u0627\u06cc\u0633\u0647 \u0648 \u0645\u0645\u06cc\u0632\u06cc<\/span><\/h5>\n<p>\u0633\u0627\u062f\u0647 \u0628\u06af\u0648\u06cc\u06cc\u0645\u060c \u062f\u0631\u0635\u0648\u0631\u062a \u0646\u0628\u0648\u062f \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f \u0627\u0645\u0646\u06cc\u062a\u06cc\u060c \u062e\u0637\u200c\u06a9\u0634\u06cc \u0628\u0631\u0627\u06cc \u067e\u0630\u06cc\u0631\u0634 \u0648 \u0633\u0646\u062c\u0634 \u06cc\u06a9 \u0646\u0648\u0622\u0648\u0631\u06cc \u0648\u062c\u0648\u062f \u0646\u062e\u0648\u0627\u0647\u062f \u062f\u0627\u0634\u062a. \u0646\u0645\u0648\u0646\u0647\u200c\u0627\u0634 \u0627\u06cc\u0631\u0627\u0646 \u062e\u0648\u062f\u0645\u0627\u0646 \u06a9\u0647 \u0628\u0647 \u062c\u0627\u06cc \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0627\u06cc\u0646 \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f\u200c\u0647\u0627 \u0647\u0631 \u0631\u0648\u0632 \u06cc\u06a9 \u0645\u062c\u0648\u0632 \u0627\u0632 \u0627\u062f\u0627\u0631\u0647 \u0648 \u0633\u0627\u0632\u0645\u0627\u0646\u06cc \u0633\u0628\u0632 \u0645\u06cc\u200c\u0634\u0648\u062f \u0648 \u062c\u0644\u0648\u06cc \u0628\u0631\u0648\u0632 \u062e\u0644\u0627\u0642\u06cc\u062a \u0631\u0627 \u0645\u06cc\u200c\u06af\u06cc\u0631\u062f.<\/p>\n<h5><span id=\"i-4\">\u06f3- \u062c\u0644\u0648\u06af\u06cc\u0631\u06cc \u0627\u0632 \u0628\u0631\u062e\u0648\u0631\u062f\u0647\u0627\u06cc \u0633\u0644\u06cc\u0642\u0647\u200c\u0627\u06cc<\/span><\/h5>\n<p>\u06cc\u06a9\u06cc \u0627\u0632 \u0645\u0634\u06a9\u0644\u0627\u062a \u062f\u0631 \u067e\u0630\u06cc\u0631\u0634 \u067e\u062f\u06cc\u062f\u0647\u200c\u0647\u0627\u06cc \u0635\u0646\u0639\u062a\u06cc\u060c \u0628\u0631\u062e\u0648\u0631\u062f\u200c\u0647\u0627\u06cc \u0633\u0644\u06cc\u0642\u0647\u200c\u0627\u06cc \u0645\u0631\u0627\u062c\u0639 \u062a\u0635\u0645\u06cc\u0645\u200c\u06af\u06cc\u0631 \u0627\u0633\u062a \u06a9\u0647 \u0627\u0632 \u0637\u0631\u06cc\u0642 \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f\u200c\u0647\u0627\u06cc \u0645\u0634\u062e\u0635\u060c \u0645\u06cc\u200c\u062a\u0648\u0627\u0646 \u062c\u0644\u0648\u06cc \u0628\u0631\u0648\u0632 \u0627\u06cc\u0646 \u0627\u0645\u0631 \u0631\u0627 \u06af\u0631\u0641\u062a.<\/p>\n<p>\u0645\u062f\u06cc\u0631\u06cc\u062a \u0633\u0631\u0648\u0631\u060c \u067e\u0634\u062a\u06cc\u0628\u0627\u0646\u06cc \u0648 \u06a9\u0627\u0646\u0641\u06cc\u06af \u0633\u0631\u0648\u0631 &#8211; \u0622\u0641\u0627\u0642 \u0647\u0627\u0633\u062a\u06cc\u0646\u06af<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u0645\u0648\u0633\u0633\u0647 \u0645\u0644\u06cc \u0641\u0646\u0627\u0648\u0631\u06cc \u0648 \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f\u0647\u0627(NIST)\u060c \u062a\u0627\u0633\u06cc\u0633 \u06f1\u06f9\u06f0\u06f1\u060c \u0646\u0627\u0645 \u06cc\u06a9 \u0645\u0648\u0633\u0633\u0647 \u062f\u0648\u0644\u062a\u06cc \u0639\u0644\u0645\u06cc \u062f\u0631 \u0622\u0645\u0631\u06cc\u06a9\u0627 \u0627\u0633\u062a. \u0627\u06cc\u0646 \u0645\u0648\u0633\u0633\u0647 \u0632\u06cc\u0631 \u0646\u0638\u0631 \u0648\u0632\u0627\u0631\u062a \u0628\u0627\u0632\u0631\u06af\u0627\u0646\u06cc \u0627\u06cc\u0627\u0644\u0627\u062a \u0645\u062a\u062d\u062f\u0647 \u0622\u0645\u0631\u06cc\u06a9\u0627 \u0641\u0639\u0627\u0644\u06cc\u062a \u0645\u06cc\u200c\u06a9\u0646\u062f\u060c \u0648 \u0647\u062f\u0641 \u0627\u0632 \u0622\u0646 \u062a\u0634\u0648\u06cc\u0642 \u0646\u0648\u0622\u0648\u0631\u06cc \u0648 \u0631\u0642\u0627\u0628\u062a \u0635\u0646\u0639\u062a\u06cc \u062a\u0648\u0633\u0637 \u067e\u06cc\u0634\u0628\u0631\u062f \u0639\u0644\u0648\u0645 \u0633\u0646\u062c\u0634\u06cc \u0648 \u0641\u0646\u0627\u0648\u0631\u06cc \u062f\u0631 \u0622\u0645\u0631\u06cc\u06a9\u0627 \u0628\u06af\u0648\u0646\u0647\u200c\u0627\u06cc\u06a9\u0647 \u0627\u0645\u0646\u06cc\u062a \u0627\u0642\u062a\u0635\u0627\u062f\u06cc \u0631\u0627 \u0627\u0631\u062a\u0642\u0627 \u0628\u062e\u0634\u06cc\u062f\u0647\u060c \u0648 \u0633\u0637\u062d \u06a9\u06cc\u0641\u06cc\u062a \u0632\u0646\u062f\u06af\u06cc \u0631\u0627 \u0627\u0641\u0632\u0627\u06cc\u0634 &hellip;<\/p>\n","protected":false},"author":1,"featured_media":16510,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[35],"tags":[],"class_list":["post-16476","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bigdata"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/16476","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=16476"}],"version-history":[{"count":0,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/16476\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media\/16510"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=16476"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=16476"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=16476"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}