{"version":"1.0","provider_name":"Testprep Training Tutorials","provider_url":"https:\/\/www.testpreptraining.ai\/tutorial","author_name":"Testprep Training","author_url":"https:\/\/www.testpreptraining.ai\/tutorial\/author\/amithighpixel-in\/","title":"Security Basics - Testprep Training Tutorials","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"kaiQ2uWeFw\"><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/aws-certified-security-specialty\/security-basics\/\">Security Basics<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.testpreptraining.ai\/tutorial\/aws-certified-security-specialty\/security-basics\/embed\/#?secret=kaiQ2uWeFw\" width=\"600\" height=\"338\" title=\"&#8220;Security Basics&#8221; &#8212; Testprep Training Tutorials\" data-secret=\"kaiQ2uWeFw\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.testpreptraining.ai\/tutorial\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"Security is protection or resilience against, probable harm. In context of information technology, information security measures aim achieve anyone of below Protect data confidentiality Preserve data integrity Promote data availability by authorized entity The above listed aims, are summarized or referred as CIA triad or the confidentiality, integrity, availability triad, and forms basis of all...","thumbnail_url":"https:\/\/www.testpreptraining.com\/tutorial\/wp-content\/uploads\/2019\/09\/image-118.png"}