


{"id":699,"date":"2018-04-23T15:33:15","date_gmt":"2018-04-23T13:33:15","guid":{"rendered":"http:\/\/blogs.gm.fh-koeln.de\/ktds\/?page_id=699"},"modified":"2025-09-18T15:06:43","modified_gmt":"2025-09-18T13:06:43","slug":"it-sicherheitsicherheit-privatsphaere-und-vertrauen","status":"publish","type":"page","link":"https:\/\/blogs.gm.fh-koeln.de\/ktds\/de\/lehre\/it-sicherheitsicherheit-privatsphaere-und-vertrauen\/","title":{"rendered":"IT-Sicherheit\/Sicherheit, Privatsph\u00e4re und Vertrauen"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":52,"featured_media":0,"parent":30,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"templates\/course_site.php","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-699","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/blogs.gm.fh-koeln.de\/ktds\/wp-json\/wp\/v2\/pages\/699","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.gm.fh-koeln.de\/ktds\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/blogs.gm.fh-koeln.de\/ktds\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.gm.fh-koeln.de\/ktds\/wp-json\/wp\/v2\/users\/52"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.gm.fh-koeln.de\/ktds\/wp-json\/wp\/v2\/comments?post=699"}],"version-history":[{"count":20,"href":"https:\/\/blogs.gm.fh-koeln.de\/ktds\/wp-json\/wp\/v2\/pages\/699\/revisions"}],"predecessor-version":[{"id":2233,"href":"https:\/\/blogs.gm.fh-koeln.de\/ktds\/wp-json\/wp\/v2\/pages\/699\/revisions\/2233"}],"up":[{"embeddable":true,"href":"https:\/\/blogs.gm.fh-koeln.de\/ktds\/wp-json\/wp\/v2\/pages\/30"}],"wp:attachment":[{"href":"https:\/\/blogs.gm.fh-koeln.de\/ktds\/wp-json\/wp\/v2\/media?parent=699"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}