{"id":2991,"date":"2024-07-01T16:52:28","date_gmt":"2024-07-01T14:52:28","guid":{"rendered":"https:\/\/dedacloud.dedadigital.dev\/assessing\/vulnerability-assessment\/"},"modified":"2024-07-01T16:52:28","modified_gmt":"2024-07-01T14:52:28","slug":"vulnerability-assessment","status":"publish","type":"page","link":"https:\/\/dedacloud.dedadigital.dev\/en\/services\/cybersecurity\/assessing\/vulnerability-assessment\/","title":{"rendered":"Vulnerability Assessment"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<p>A systematic and timely examination of an information system, aimed at identifying and classifying the known vulnerabilities of the same present in the perimeter of analysis and thus to know which elements to be the target of attacks and\/or intrusion attempts.<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":2987,"menu_order":0,"comment_status":"open","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-2991","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/dedacloud.dedadigital.dev\/en\/wp-json\/wp\/v2\/pages\/2991","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dedacloud.dedadigital.dev\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/dedacloud.dedadigital.dev\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/dedacloud.dedadigital.dev\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/dedacloud.dedadigital.dev\/en\/wp-json\/wp\/v2\/comments?post=2991"}],"version-history":[{"count":0,"href":"https:\/\/dedacloud.dedadigital.dev\/en\/wp-json\/wp\/v2\/pages\/2991\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/dedacloud.dedadigital.dev\/en\/wp-json\/wp\/v2\/pages\/2987"}],"wp:attachment":[{"href":"https:\/\/dedacloud.dedadigital.dev\/en\/wp-json\/wp\/v2\/media?parent=2991"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}