{"id":246,"date":"2015-02-13T05:51:33","date_gmt":"2015-02-13T05:51:33","guid":{"rendered":"http:\/\/tif.uin-suska.ac.id\/?p=246"},"modified":"2015-02-13T05:52:35","modified_gmt":"2015-02-13T05:52:35","slug":"internet-banking-security-basic","status":"publish","type":"post","link":"https:\/\/tif.uin-suska.ac.id\/en\/internet-banking-security-basic\/","title":{"rendered":"Internet Banking Security (Basic)"},"content":{"rendered":"<div id=\"attachment_250\" style=\"width: 310px\" class=\"wp-caption alignleft\"><a href=\"http:\/\/tif.uin-suska.ac.id\/wp-content\/uploads\/2015\/02\/phishing-email.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-250\" class=\"size-medium wp-image-250\" src=\"http:\/\/tif.uin-suska.ac.id\/wp-content\/uploads\/2015\/02\/phishing-email-300x199.jpg\" alt=\"Phishing Email\" width=\"300\" height=\"199\" srcset=\"https:\/\/tif.uin-suska.ac.id\/wp-content\/uploads\/2015\/02\/phishing-email-300x199.jpg 300w, https:\/\/tif.uin-suska.ac.id\/wp-content\/uploads\/2015\/02\/phishing-email.jpg 939w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-250\" class=\"wp-caption-text\">Phishing Email<\/p><\/div>\n<p style=\"text-align: justify;\">Computer network security as part of a system that very important to maintain the validity and integrity of the data and to ensure the availability of services. One of important aspect is internet banking. Online electronic banking or internet banking systems give everybody the opportunity for easy access to their banking activities. These banking activities may include: retrieving an account balance, money transfers between a user\u2019s accounts, from a user\u2019s account to someone else\u2019s account, retrieving an account history. <em>(Claessens, Joris)<\/em><\/p>\n<p style=\"text-align: justify;\">Every bank in the world has a different mechanism to provide internet banking services. On this web, we will discuss the mechanisms in general, the existing threats and solutions\u00a0 may be will discuss later. The most recent banking security threats are listed below:<!--more--><\/p>\n<ul style=\"text-align: justify;\">\n<li>Phishing<\/li>\n<\/ul>\n<p style=\"text-align: justify; padding-left: 30px;\">Phishing is a scam where fraudsters \u2018fish\u2019 for personal details by using hoax emails claiming to be from financial institutions. This method continues to be favored by online thieves. (<em>src:bankmuscat.com<\/em>). Hoax emails claiming to be from banks are often generated overseas, and are sent in bulk asking recipient to provide sensitive information such as their username, password, Customer Registration Number or Debit Cards \/ Credit Cards numbers and PINs by providing a link leading to a fake website, enabling thieves to gather the details for later fraudulent use.<\/p>\n<div id=\"attachment_249\" style=\"width: 310px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/tif.uin-suska.ac.id\/wp-content\/uploads\/2015\/02\/An-example-of-a-phishing-email.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-249\" class=\"size-medium wp-image-249\" src=\"http:\/\/tif.uin-suska.ac.id\/wp-content\/uploads\/2015\/02\/An-example-of-a-phishing-email-300x194.jpg\" alt=\"An Example of Phishing Email\" width=\"300\" height=\"194\" srcset=\"https:\/\/tif.uin-suska.ac.id\/wp-content\/uploads\/2015\/02\/An-example-of-a-phishing-email-300x194.jpg 300w, https:\/\/tif.uin-suska.ac.id\/wp-content\/uploads\/2015\/02\/An-example-of-a-phishing-email.jpg 618w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-249\" class=\"wp-caption-text\">An Example of Phishing Email<\/p><\/div>\n<ul style=\"text-align: justify;\">\n<li>Spyware and Adware<\/li>\n<\/ul>\n<p><!--more--><\/p>\n<p><!--more--><\/p>\n<p style=\"padding-left: 30px; text-align: justify;\">Spyware is a type of software that secretively collects user information while on the Internet. Adware is a type of spyware used by marketers to track Internet user\u2019s habits and interests for the purpose of customizing future advertising material. The information\u00a0 used to customize future advertisements directed to the user, or can be sold to a third party for the same purpose.<\/p>\n<ul style=\"text-align: justify;\">\n<li>Viruses<\/li>\n<\/ul>\n<p style=\"text-align: justify; padding-left: 30px;\">A computer virus is software that affixes itself to another program like a spreadsheet or word document. While active, the virus attempts to reproduce and attach itself to other programs. This can tie up resources such as disk space and memory, causing problems on any home computer. An email virus is the latest type of computer virus that is transported through email messages and usually replicates by automatically distributing itself out to all contacts on the victims email address book.<\/p>\n<ul style=\"text-align: justify;\">\n<li style=\"text-align: justify;\">\u00a0Trojans<\/li>\n<\/ul>\n<p style=\"text-align: justify; padding-left: 30px;\">A Trojan is a destructive program that poses as a harmless application. Unlike viruses, trojans do no replicate themselves and do not need a host program to attach to. Some Trojans will claim to rid the computer of viruses or other harmful applications, but instead introduce viruses and leave it vulnerable to attacks by hackers and intruders.<\/p>\n<ul style=\"text-align: justify;\">\n<li>Key loggers<\/li>\n<\/ul>\n<p style=\"text-align: justify; padding-left: 30px;\">If fraudster installs a software called &#8220;keylogger&#8221; on the computer or the device on which the customer is accessing Online Banking, the software copies to a file , every keystroke typed on that pc. This sensitive information gets captured that the fraudster can later use for fraudulent purposes and illegitimate access to your account.<\/p>\n<ul style=\"text-align: justify;\">\n<li>Internet Banking Fraud<\/li>\n<\/ul>\n<p style=\"text-align: justify; padding-left: 30px;\">Most online banking fraud schemes involve two steps. First, the criminal obtains the customer&#8217;s account access data, i.e. logon name and password. Second, the criminal uses this information to transfer money to other accounts and withdrawals the funds. For the first step, criminals have different schemes in the past. (<em>src:webmasterview.com<\/em>)<\/p>\n<ul style=\"text-align: justify;\">\n<li>Server Security Threats<\/li>\n<\/ul>\n<p style=\"text-align: justify; padding-left: 30px;\">It is easy to get a server. Anyone can setup a machine in his basement and start publishing websites like Brute Force Attack, Open Relay, Botnet, DoS, Cross-site Scripting, SQL Injection, Malware, Unpatched Software, and Careless Users.<\/p>\n<p style=\"text-align: justify;\">===<\/p>\n<pre>Rahmad Kurniawan, S.T., M.I.T.<\/pre>\n<pre>Informatics Engineering Dept, Universitas Islam Negeri Sultan Syarif Kasim Riau.<\/pre>","protected":false},"excerpt":{"rendered":"<p>Computer network security as part of a system that very important to maintain the validity and integrity of the data and to ensure the availability of services. One of important [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"footnotes":""},"categories":[1,3],"tags":[],"class_list":["post-246","post","type-post","status-publish","format-standard","hentry","category-berita","category-info-mahasiswa"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Internet Banking Security (Basic) - Teknik Informatika<\/title>\n<meta name=\"description\" content=\"Computer network security as part of a system that very important to maintain the validity and integrity of the data and to ensure the availability of\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/tif.uin-suska.ac.id\/en\/internet-banking-security-basic\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Internet Banking Security (Basic) - Teknik Informatika\" \/>\n<meta property=\"og:description\" content=\"Computer network security as part of a system that very important to maintain the validity and integrity of the data and to ensure the availability of\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tif.uin-suska.ac.id\/en\/internet-banking-security-basic\/\" \/>\n<meta property=\"og:site_name\" content=\"Teknik Informatika\" \/>\n<meta property=\"article:published_time\" content=\"2015-02-13T05:51:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-02-13T05:52:35+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/tif.uin-suska.ac.id\/wp-content\/uploads\/2015\/02\/phishing-email-300x199.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/tif.uin-suska.ac.id\\\/internet-banking-security-basic\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/tif.uin-suska.ac.id\\\/internet-banking-security-basic\\\/\"},\"author\":{\"name\":\"\",\"@id\":\"https:\\\/\\\/tif.uin-suska.ac.id\\\/#\\\/schema\\\/person\\\/b1f458d48887ebc56a1621737160dd49\"},\"headline\":\"Internet Banking Security (Basic)\",\"datePublished\":\"2015-02-13T05:51:33+00:00\",\"dateModified\":\"2015-02-13T05:52:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/tif.uin-suska.ac.id\\\/internet-banking-security-basic\\\/\"},\"wordCount\":599,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/tif.uin-suska.ac.id\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/tif.uin-suska.ac.id\\\/internet-banking-security-basic\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/tif.uin-suska.ac.id\\\/wp-content\\\/uploads\\\/2015\\\/02\\\/phishing-email-300x199.jpg\",\"articleSection\":[\"Berita\",\"Info Mahasiswa\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/tif.uin-suska.ac.id\\\/internet-banking-security-basic\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/tif.uin-suska.ac.id\\\/internet-banking-security-basic\\\/\",\"url\":\"https:\\\/\\\/tif.uin-suska.ac.id\\\/internet-banking-security-basic\\\/\",\"name\":\"Internet Banking Security (Basic) - Teknik Informatika\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/tif.uin-suska.ac.id\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/tif.uin-suska.ac.id\\\/internet-banking-security-basic\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/tif.uin-suska.ac.id\\\/internet-banking-security-basic\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/tif.uin-suska.ac.id\\\/wp-content\\\/uploads\\\/2015\\\/02\\\/phishing-email-300x199.jpg\",\"datePublished\":\"2015-02-13T05:51:33+00:00\",\"dateModified\":\"2015-02-13T05:52:35+00:00\",\"description\":\"Computer network security as part of a system that very important to maintain the validity and integrity of the data and to ensure the availability of\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/tif.uin-suska.ac.id\\\/internet-banking-security-basic\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/tif.uin-suska.ac.id\\\/internet-banking-security-basic\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/tif.uin-suska.ac.id\\\/internet-banking-security-basic\\\/#primaryimage\",\"url\":\"http:\\\/\\\/tif.uin-suska.ac.id\\\/wp-content\\\/uploads\\\/2015\\\/02\\\/phishing-email-300x199.jpg\",\"contentUrl\":\"http:\\\/\\\/tif.uin-suska.ac.id\\\/wp-content\\\/uploads\\\/2015\\\/02\\\/phishing-email-300x199.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/tif.uin-suska.ac.id\\\/internet-banking-security-basic\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/tif.uin-suska.ac.id\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Banking Security (Basic)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/tif.uin-suska.ac.id\\\/#website\",\"url\":\"https:\\\/\\\/tif.uin-suska.ac.id\\\/\",\"name\":\"Teknik Informatika\",\"description\":\"FST UIN Suska Riau\",\"publisher\":{\"@id\":\"https:\\\/\\\/tif.uin-suska.ac.id\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/tif.uin-suska.ac.id\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/tif.uin-suska.ac.id\\\/#organization\",\"name\":\"UIN SUSKA RIAU\",\"url\":\"https:\\\/\\\/tif.uin-suska.ac.id\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/tif.uin-suska.ac.id\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/tif.uin-suska.ac.id\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/logo-uin.png?fit=2949%2C3294&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/tif.uin-suska.ac.id\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/logo-uin.png?fit=2949%2C3294&ssl=1\",\"width\":2949,\"height\":3294,\"caption\":\"UIN SUSKA RIAU\"},\"image\":{\"@id\":\"https:\\\/\\\/tif.uin-suska.ac.id\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/tif.uin-suska.ac.id\\\/#\\\/schema\\\/person\\\/b1f458d48887ebc56a1621737160dd49\",\"name\":\"\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fb13a3cdf3b3f29b4cc3b278ac7865c41058e0ebd12114effec59a30efaf552e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fb13a3cdf3b3f29b4cc3b278ac7865c41058e0ebd12114effec59a30efaf552e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fb13a3cdf3b3f29b4cc3b278ac7865c41058e0ebd12114effec59a30efaf552e?s=96&d=mm&r=g\"},\"sameAs\":[\"https:\\\/\\\/tif.uin-suska.ac.id\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Internet Banking Security (Basic) - Teknik Informatika","description":"Computer network security as part of a system that very important to maintain the validity and integrity of the data and to ensure the availability of","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/tif.uin-suska.ac.id\/en\/internet-banking-security-basic\/","og_locale":"en_US","og_type":"article","og_title":"Internet Banking Security (Basic) - Teknik Informatika","og_description":"Computer network security as part of a system that very important to maintain the validity and integrity of the data and to ensure the availability of","og_url":"https:\/\/tif.uin-suska.ac.id\/en\/internet-banking-security-basic\/","og_site_name":"Teknik Informatika","article_published_time":"2015-02-13T05:51:33+00:00","article_modified_time":"2015-02-13T05:52:35+00:00","og_image":[{"url":"http:\/\/tif.uin-suska.ac.id\/wp-content\/uploads\/2015\/02\/phishing-email-300x199.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/tif.uin-suska.ac.id\/internet-banking-security-basic\/#article","isPartOf":{"@id":"https:\/\/tif.uin-suska.ac.id\/internet-banking-security-basic\/"},"author":{"name":"","@id":"https:\/\/tif.uin-suska.ac.id\/#\/schema\/person\/b1f458d48887ebc56a1621737160dd49"},"headline":"Internet Banking Security (Basic)","datePublished":"2015-02-13T05:51:33+00:00","dateModified":"2015-02-13T05:52:35+00:00","mainEntityOfPage":{"@id":"https:\/\/tif.uin-suska.ac.id\/internet-banking-security-basic\/"},"wordCount":599,"commentCount":0,"publisher":{"@id":"https:\/\/tif.uin-suska.ac.id\/#organization"},"image":{"@id":"https:\/\/tif.uin-suska.ac.id\/internet-banking-security-basic\/#primaryimage"},"thumbnailUrl":"http:\/\/tif.uin-suska.ac.id\/wp-content\/uploads\/2015\/02\/phishing-email-300x199.jpg","articleSection":["Berita","Info Mahasiswa"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/tif.uin-suska.ac.id\/internet-banking-security-basic\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/tif.uin-suska.ac.id\/internet-banking-security-basic\/","url":"https:\/\/tif.uin-suska.ac.id\/internet-banking-security-basic\/","name":"Internet Banking Security (Basic) - Teknik Informatika","isPartOf":{"@id":"https:\/\/tif.uin-suska.ac.id\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tif.uin-suska.ac.id\/internet-banking-security-basic\/#primaryimage"},"image":{"@id":"https:\/\/tif.uin-suska.ac.id\/internet-banking-security-basic\/#primaryimage"},"thumbnailUrl":"http:\/\/tif.uin-suska.ac.id\/wp-content\/uploads\/2015\/02\/phishing-email-300x199.jpg","datePublished":"2015-02-13T05:51:33+00:00","dateModified":"2015-02-13T05:52:35+00:00","description":"Computer network security as part of a system that very important to maintain the validity and integrity of the data and to ensure the availability of","breadcrumb":{"@id":"https:\/\/tif.uin-suska.ac.id\/internet-banking-security-basic\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tif.uin-suska.ac.id\/internet-banking-security-basic\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tif.uin-suska.ac.id\/internet-banking-security-basic\/#primaryimage","url":"http:\/\/tif.uin-suska.ac.id\/wp-content\/uploads\/2015\/02\/phishing-email-300x199.jpg","contentUrl":"http:\/\/tif.uin-suska.ac.id\/wp-content\/uploads\/2015\/02\/phishing-email-300x199.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/tif.uin-suska.ac.id\/internet-banking-security-basic\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tif.uin-suska.ac.id\/"},{"@type":"ListItem","position":2,"name":"Internet Banking Security (Basic)"}]},{"@type":"WebSite","@id":"https:\/\/tif.uin-suska.ac.id\/#website","url":"https:\/\/tif.uin-suska.ac.id\/","name":"Informatics Engineering","description":"FST UIN Suska Riau","publisher":{"@id":"https:\/\/tif.uin-suska.ac.id\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tif.uin-suska.ac.id\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/tif.uin-suska.ac.id\/#organization","name":"UIN SUSKA RIAU","url":"https:\/\/tif.uin-suska.ac.id\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tif.uin-suska.ac.id\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/tif.uin-suska.ac.id\/wp-content\/uploads\/2023\/12\/logo-uin.png?fit=2949%2C3294&ssl=1","contentUrl":"https:\/\/i0.wp.com\/tif.uin-suska.ac.id\/wp-content\/uploads\/2023\/12\/logo-uin.png?fit=2949%2C3294&ssl=1","width":2949,"height":3294,"caption":"UIN SUSKA RIAU"},"image":{"@id":"https:\/\/tif.uin-suska.ac.id\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/tif.uin-suska.ac.id\/#\/schema\/person\/b1f458d48887ebc56a1621737160dd49","name":"","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fb13a3cdf3b3f29b4cc3b278ac7865c41058e0ebd12114effec59a30efaf552e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fb13a3cdf3b3f29b4cc3b278ac7865c41058e0ebd12114effec59a30efaf552e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fb13a3cdf3b3f29b4cc3b278ac7865c41058e0ebd12114effec59a30efaf552e?s=96&d=mm&r=g"},"sameAs":["https:\/\/tif.uin-suska.ac.id"]}]}},"_links":{"self":[{"href":"https:\/\/tif.uin-suska.ac.id\/en\/wp-json\/wp\/v2\/posts\/246","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tif.uin-suska.ac.id\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tif.uin-suska.ac.id\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tif.uin-suska.ac.id\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tif.uin-suska.ac.id\/en\/wp-json\/wp\/v2\/comments?post=246"}],"version-history":[{"count":2,"href":"https:\/\/tif.uin-suska.ac.id\/en\/wp-json\/wp\/v2\/posts\/246\/revisions"}],"predecessor-version":[{"id":253,"href":"https:\/\/tif.uin-suska.ac.id\/en\/wp-json\/wp\/v2\/posts\/246\/revisions\/253"}],"wp:attachment":[{"href":"https:\/\/tif.uin-suska.ac.id\/en\/wp-json\/wp\/v2\/media?parent=246"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tif.uin-suska.ac.id\/en\/wp-json\/wp\/v2\/categories?post=246"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tif.uin-suska.ac.id\/en\/wp-json\/wp\/v2\/tags?post=246"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}