{"id":1758,"date":"2023-08-01T18:05:52","date_gmt":"2023-08-01T16:05:52","guid":{"rendered":"https:\/\/www.savelan.fi\/?p=1758"},"modified":"2025-12-05T16:26:13","modified_gmt":"2025-12-05T14:26:13","slug":"mita-means-the-availability-of-information-security","status":"publish","type":"post","link":"https:\/\/www.savelan.fi\/en\/mita-means-the-availability-of-information-security\/","title":{"rendered":"What does the availability of information security mean?"},"content":{"rendered":"<h4 class=\"wp-block-heading\"><a href=\"https:\/\/www.savelan.fi\/en\/mita-is-an-information-security-guide-to-information-secure-business\/\" title=\"What is information security? A guide to secure business!\"><span style=\"text-decoration: underline;\">With data security<\/span><\/a> plays a significant role in the company&#039;s daily operations, and one of its key dimensions is usability, i.e. availability. When we talk about the availability of information security, we refer to the production&#039;s ability to use information systems and their information content as needed without interruptions. <\/h4>\n\n\n\n<p>T\u00e4ss\u00e4 artikkelissa selitet\u00e4\u00e4n tietoturvan k\u00e4ytett\u00e4vyyden merkitys ja annetaan ohjeita siit\u00e4, kuinka periaatetta tulisi noudattaa tuotantoyrityksen OT-verkossa (operational technology network).<\/p>\n\n\n<style>.kb-table-of-content-nav.kb-table-of-content-id1874_4241f1-9f .kb-table-of-content-wrap{padding-top:var(--global-kb-spacing-sm, 1.5rem);padding-right:var(--global-kb-spacing-sm, 1.5rem);padding-bottom:var(--global-kb-spacing-sm, 1.5rem);padding-left:var(--global-kb-spacing-sm, 1.5rem);background-color:var(--global-palette8, #F7FAFC);}.kb-table-of-content-nav.kb-table-of-content-id1874_4241f1-9f .kb-table-of-contents-title-wrap{padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.kb-table-of-content-nav.kb-table-of-content-id1874_4241f1-9f .kb-table-of-contents-title-wrap{color:var(--global-palette2, #2B6CB0);}.kb-table-of-content-nav.kb-table-of-content-id1874_4241f1-9f .kb-table-of-contents-title{color:var(--global-palette2, #2B6CB0);font-weight:regular;font-style:normal;}.kb-table-of-content-nav.kb-table-of-content-id1874_4241f1-9f .kb-table-of-content-wrap .kb-table-of-content-list{font-weight:regular;font-style:normal;margin-top:var(--global-kb-spacing-sm, 1.5rem);margin-right:0px;margin-bottom:0px;margin-left:0px;}.kb-table-of-content-nav.kb-table-of-content-id1874_4241f1-9f .kb-toggle-icon-style-basiccircle .kb-table-of-contents-icon-trigger:after, .kb-table-of-content-nav.kb-table-of-content-id1874_4241f1-9f .kb-toggle-icon-style-basiccircle .kb-table-of-contents-icon-trigger:before, .kb-table-of-content-nav.kb-table-of-content-id1874_4241f1-9f .kb-toggle-icon-style-arrowcircle .kb-table-of-contents-icon-trigger:after, .kb-table-of-content-nav.kb-table-of-content-id1874_4241f1-9f .kb-toggle-icon-style-arrowcircle .kb-table-of-contents-icon-trigger:before, .kb-table-of-content-nav.kb-table-of-content-id1874_4241f1-9f .kb-toggle-icon-style-xclosecircle .kb-table-of-contents-icon-trigger:after, .kb-table-of-content-nav.kb-table-of-content-id1874_4241f1-9f .kb-toggle-icon-style-xclosecircle .kb-table-of-contents-icon-trigger:before{background-color:var(--global-palette8, #F7FAFC);}<\/style>\n\n\n<h2 class=\"wp-block-heading\"><strong>Tietoturvan k\u00e4ytett\u00e4vyyden m\u00e4\u00e4ritelm\u00e4<\/strong><\/h2>\n\n\n\n<p>The basic idea of data security usability is to ensure that users of information systems have continuous and reliable access to information. Usability is one of the three basic principles of information security, collectively called the CIA model (<a href=\"https:\/\/www.savelan.fi\/en\/what-confidentiality-of-information-security-means\/\" title=\"What does information security confidentiality mean?\">Confidentiality<\/a> , <a href=\"https:\/\/www.savelan.fi\/en\/what-data-integrity-means\/\" title=\"What does data integrity mean?\">Integrity<\/a>, Availability). In terms of usability, we focus especially on the operation of systems and the availability of data warehouses.<\/p>\n\n\n\n<p>K\u00e4ytett\u00e4vyyden kannalta merkitt\u00e4vi\u00e4 uhkia ovat esimerkiksi laitteiston viat, ohjelmistovirheet, tietoliikennekatkot sek\u00e4 tarkoitukselliset hy\u00f6kk\u00e4ykset, kuten palvelunestohy\u00f6kk\u00e4ykset (DDoS). N\u00e4iden uhkien hallintaan tarvitaan kattavaa ja jatkuvaa riskienhallintaa.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Miten k\u00e4ytett\u00e4vyysperiaatetta voidaan noudattaa tuotantoyrityksen OT-verkossa?<\/strong><\/h2>\n\n\n\n<p>Tuotantoverkkojen k\u00e4ytett\u00e4vyyden t\u00e4ytyy olla niin l\u00e4hell\u00e4 100 prosenttia kuin vain mahdollista, sill\u00e4 ne valvovat tai suorittavat fyysisi\u00e4 prosesseja, jolloin katko verkon k\u00e4ytett\u00e4vyydess\u00e4 voi johtaa vakaviin tuotantoh\u00e4iri\u00f6ihin tai jopa turvallisuusriskeihin.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Preparedness and continuity management<\/strong><\/h3>\n\n\n\n<p>T\u00e4rkein ensiaskel on varautuminen mahdollisiin h\u00e4iri\u00f6ihin. Jatkuvuudenhallinnan tulisi olla keski\u00f6ss\u00e4 kaikessa tietoturvaty\u00f6ss\u00e4. Niin luonnonmullistuksille, teknisille vioille kuin kyberhy\u00f6kk\u00e4yksillekin tulisi olla valmiina suunnitelma. T\u00e4h\u00e4n sis\u00e4ltyv\u00e4t yksityiskohtaiset toimenpiteet kriittisten j\u00e4rjestelmien palauttamisesta vian tai hy\u00f6kk\u00e4yksen j\u00e4lkeen. My\u00f6s varmuuskopioinnin tulisi olla osa normaalia toimintaa. T\u00e4m\u00e4 ei koske ainoastaan kriittisi\u00e4 j\u00e4rjestelmi\u00e4, vaan my\u00f6s v\u00e4hemm\u00e4n kriittisi\u00e4, sill\u00e4 datan palauttaminen voi olla elint\u00e4rke\u00e4\u00e4 j\u00e4rjestelmien toiminnan palauttamisessa. Muiden j\u00e4rjestelmien, kuten varaj\u00e4rjestelmien ja peilauspalvelimien, k\u00e4ytt\u00f6 auttaa osaltaan varmistamaan jatkuvan p\u00e4\u00e4syn palveluihin my\u00f6s kriittisiss\u00e4 tilanteissa.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Capacity management<\/strong><\/h3>\n\n\n\n<p>OT-verkon on pystytt\u00e4v\u00e4 k\u00e4sittelem\u00e4\u00e4n sen l\u00e4pi kulkevan datan m\u00e4\u00e4r\u00e4. J\u00e4rjestelm\u00e4 tulee suunnitella ja rakentaa siten, ett\u00e4 se kykenee k\u00e4sittelem\u00e4\u00e4n normaalin ty\u00f6kuorman lis\u00e4ksi my\u00f6s odottamattomat kuormapiikit. T\u00e4t\u00e4 varten on tarpeen tehd\u00e4 s\u00e4\u00e4nn\u00f6llisi\u00e4 suorituskykytestej\u00e4, jotta voidaan varmistua j\u00e4rjestelm\u00e4n kyvyst\u00e4 vastata kasvavaan datan m\u00e4\u00e4r\u00e4\u00e4n. T\u00e4m\u00e4n lis\u00e4ksi j\u00e4rjestelm\u00e4n tulee olla suunniteltu skaalautuvaksi. Sen tulee siis kyet\u00e4 mukautumaan kasvavaan kuormitukseen tarvittaessa resurssien laajentamisen my\u00f6t\u00e4.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Protection from attacks<\/strong><\/h3>\n\n\n\n<p>OT-verkot ovat houkutteleva kohde kyberhy\u00f6kk\u00e4yksille, sill\u00e4 niiden kautta on mahdollista saada merkitt\u00e4vien tuotantoprosessien hallinta. Yrityksen on siksi toteutettava asianmukaiset suojatoimenpiteet.<\/p>\n\n\n\n<p><strong>These may include: <\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>firewall or for example <a href=\"https:\/\/www.savelan.fi\/en\/services\/firewall-service\/\" data-type=\"page\" data-id=\"3085\"><strong>use of the maintained firewall service<\/strong><\/a><\/li>\n\n\n\n<li>intrusion detection systems (IDS)<\/li>\n\n\n\n<li>regular information security audits that reveal potential vulnerabilities before they have time to cause problems.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>OT-verkko kattaa tietyill\u00e4 yrityksill\u00e4 hyvin laajan maantieteellisen alueen. T\u00e4ll\u00f6in suojauksen suunnitteluun t\u00e4ytyy kiinnitt\u00e4\u00e4 erityist\u00e4 huomiota. Fyysisen suojauksen lis\u00e4ksi korostuu erityisesti tilojen et\u00e4valvonta. Valvonnan avulla voidaan saada luvattomat vierailijat kiinni jo ennenkuin he aiheuttavat lis\u00e4haittoja.<\/p>\n\n\n<style>.kb-row-layout-id2830_4b2466-68 > .kt-row-column-wrap{align-content:center;}:where(.kb-row-layout-id2830_4b2466-68 > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:center;}.kb-row-layout-id2830_4b2466-68 > .kt-row-column-wrap{column-gap:var(--global-kb-gap-lg, 4rem);row-gap:var(--global-kb-gap-md, 2rem);padding-top:40px;padding-bottom:40px;min-height:450px;grid-template-columns:repeat(2, minmax(0, 1fr));}.kb-row-layout-id2830_4b2466-68{background-image:url('https:\/\/www.savelan.fi\/wp-content\/uploads\/2023\/09\/Tuotantoverkko-ja-OT-verkko-asiantuntija-Save-LAN-Lauri-Jurvanen-1.jpg');background-size:cover;background-position:24% 49%;background-attachment:scroll;background-repeat:no-repeat;}.kb-row-layout-id2830_4b2466-68 > .kt-row-layout-overlay{opacity:1;background:linear-gradient(238deg,var(--global-palette1,#1f8efa) 48%,rgba(6,147,227,0) 48%);mix-blend-mode:normal;}@media all and (max-width: 1024px){.kb-row-layout-id2830_4b2466-68 > .kt-row-column-wrap{grid-template-columns:repeat(2, minmax(0, 1fr));}}@media all and (max-width: 767px){.kb-row-layout-id2830_4b2466-68 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}.kb-row-layout-id2830_4b2466-68 > .kt-row-column-wrap > .wp-block-kadence-column:nth-child(1 of *:not(style)){order:2;}.kb-row-layout-id2830_4b2466-68 > .kt-row-column-wrap > .wp-block-kadence-column:nth-child(2 of *:not(style)){order:1;}.kb-row-layout-id2830_4b2466-68 > .kt-row-column-wrap > .wp-block-kadence-column:nth-child(3 of *:not(style)){order:12;}.kb-row-layout-id2830_4b2466-68 > .kt-row-column-wrap > .wp-block-kadence-column:nth-child(4 of *:not(style)){order:11;}.kb-row-layout-id2830_4b2466-68 > .kt-row-column-wrap > .wp-block-kadence-column:nth-child(5 of *:not(style)){order:22;}.kb-row-layout-id2830_4b2466-68 > .kt-row-column-wrap > .wp-block-kadence-column:nth-child(6 of *:not(style)){order:21;}.kb-row-layout-id2830_4b2466-68 > .kt-row-column-wrap > .wp-block-kadence-column:nth-child(7 of *:not(style)){order:32;}.kb-row-layout-id2830_4b2466-68 > .kt-row-column-wrap > .wp-block-kadence-column:nth-child(8 of *:not(style)){order:31;}.kb-row-layout-id2830_4b2466-68 > .kt-row-layout-overlay{opacity:1;background:linear-gradient(180deg,rgba(6,147,227,0) 57%,var(--global-palette1,#1f8efa) 67%);mix-blend-mode:normal;}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id2830_4b2466-68 alignnone kt-row-has-bg wp-block-kadence-rowlayout\"><div class=\"kt-row-layout-overlay kt-row-overlay-gradient\"><\/div><div class=\"kt-row-column-wrap kt-has-2-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-middle\">\n<style>.kadence-column2830_6884f8-35 > .kt-inside-inner-col,.kadence-column2830_6884f8-35 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column2830_6884f8-35 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column2830_6884f8-35 > .kt-inside-inner-col{flex-direction:column;}.kadence-column2830_6884f8-35 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column2830_6884f8-35 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column2830_6884f8-35{position:relative;}@media all and (max-width: 1024px){.kadence-column2830_6884f8-35 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column2830_6884f8-35 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column2830_6884f8-35 inner-column-2\"><div class=\"kt-inside-inner-col\"><\/div><\/div>\n\n\n<style>.kadence-column2830_a526f2-94 > .kt-inside-inner-col,.kadence-column2830_a526f2-94 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column2830_a526f2-94 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column2830_a526f2-94 > .kt-inside-inner-col{flex-direction:column;}.kadence-column2830_a526f2-94 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column2830_a526f2-94 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column2830_a526f2-94{position:relative;}@media all and (max-width: 1024px){.kadence-column2830_a526f2-94 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column2830_a526f2-94 > .kt-inside-inner-col{padding-top:0px;padding-right:0px;padding-left:0px;flex-direction:column;justify-content:center;}.kadence-column2830_a526f2-94, .kt-inside-inner-col > .kadence-column2830_a526f2-94:not(.specificity){margin-right:0px;margin-bottom:-449px;margin-left:0px;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column2830_a526f2-94 kb-section-dir-vertical kb-section-sm-dir-vertical\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-advancedheading.kt-adv-heading2830_69ae75-97, .wp-block-kadence-advancedheading.kt-adv-heading2830_69ae75-97[data-kb-block=\"kb-adv-heading2830_69ae75-97\"]{padding-top:var(--global-kb-spacing-xl, 4rem);padding-right:var(--global-kb-spacing-xl, 4rem);padding-bottom:var(--global-kb-spacing-xl, 4rem);padding-left:var(--global-kb-spacing-xl, 4rem);text-align:center;font-size:16px;font-style:normal;text-transform:uppercase;}.wp-block-kadence-advancedheading.kt-adv-heading2830_69ae75-97 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading2830_69ae75-97[data-kb-block=\"kb-adv-heading2830_69ae75-97\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading2830_69ae75-97 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading2830_69ae75-97[data-kb-block=\"kb-adv-heading2830_69ae75-97\"] img.kb-inline-image{width:150px;vertical-align:baseline;}@media all and (max-width: 767px){.wp-block-kadence-advancedheading.kt-adv-heading2830_69ae75-97, .wp-block-kadence-advancedheading.kt-adv-heading2830_69ae75-97[data-kb-block=\"kb-adv-heading2830_69ae75-97\"]{padding-top:0px;padding-right:5px;padding-left:5px;margin-top:-40px;}}<\/style>\n<h2 class=\"kt-adv-heading2830_69ae75-97 wp-block-kadence-advancedheading has-theme-palette-9-color has-text-color\" data-kb-block=\"kb-adv-heading2830_69ae75-97\"><span style=\"text-decoration: underline;\"><em><a href=\"https:\/\/www.savelan.fi\/en\/contact-us\/\" title=\"Give us a call\">Give us a call<\/a><\/em><\/span>, then let&#039;s fix things in the production network<\/h2>\n<\/div><\/div>\n\n<\/div><\/div>\n\n\n<h3 class=\"wp-block-heading\"><strong>System update and maintenance<\/strong><\/h3>\n\n\n\n<p>Vanhentunut ohjelmisto voi aiheuttaa vakavia turvallisuusriskej\u00e4 ja h\u00e4irit\u00e4 k\u00e4ytett\u00e4vyytt\u00e4. J\u00e4rjestelm\u00e4n p\u00e4ivitysten tulisi olla s\u00e4\u00e4nn\u00f6llisi\u00e4 ja niit\u00e4 tulisi hallinnoida keskitetysti. My\u00f6s ohjelmistovalmistajien tietoturvaohjeita on seurattava ja noudatettava tarkasti. Yrityksen tulee my\u00f6s ymm\u00e4rt\u00e4\u00e4 ja hallita j\u00e4rjestelm\u00e4ns\u00e4 riippuvuudet ja niiden mahdolliset yhteensopivuusongelmat.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Personnel training<\/strong><\/h3>\n\n\n\n<p>Vaikka teknologia on t\u00e4rke\u00e4ss\u00e4 roolissa tietoturvan yll\u00e4pidossa, loppujen lopuksi ihmiset ovat usein heikoin lenkki tietoturvaketjussa. Henkil\u00f6st\u00f6n s\u00e4\u00e4nn\u00f6llinen koulutus on avainasemassa sen varmistamisessa, ett\u00e4 tietoturvak\u00e4yt\u00e4nn\u00f6t ymm\u00e4rret\u00e4\u00e4n ja niit\u00e4 noudatetaan. Koulutuksen tulisi kattaa perustiedot tietoturvasta, yleiset uhkakuvat, yrityksen tietoturvapolitiikat ja -prosessit sek\u00e4 k\u00e4yt\u00e4nn\u00f6n ohjeet tietoturvalliseen toimintaan. Koulutuksen ja siihen sis\u00e4ltyvien ohjeiden tulisi olla ymm\u00e4rrett\u00e4vi\u00e4 ja selkeit\u00e4, jotta ne sis\u00e4istett\u00e4isiin ja otettaisiin osaksi p\u00e4ivitt\u00e4ist\u00e4 ty\u00f6ntekoa.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Summary<\/h2>\n\n\n\n<p>The availability of data security is not only a technical requirement, but it is necessary in terms of business continuity, legal requirements and maintaining customer trust. This is particularly important in OT networks, as their usability directly affects production processes and the company&#039;s ability to produce products or services. Adhering to the usability principle in information security requires continuous work, but it is necessary to secure the company&#039;s operations.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Frequently asked Questions<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">What is a data security crime?<\/h3>\n\n\n\n<p>Tietoturvarikos on toimintaa, joka rikkoo tietosuojaa tai tietoturvallisuuden periaatteita. T\u00e4m\u00e4 voi tarkoittaa esimerkiksi luvatonta p\u00e4\u00e4sy\u00e4 tietoihin, niiden manipulointia tai tuhoamista. Tietoturvarikos voi tapahtua, kun k\u00e4ytt\u00e4j\u00e4n henkil\u00f6kohtaisia tietoja ker\u00e4t\u00e4\u00e4n, k\u00e4ytet\u00e4\u00e4n tai paljastetaan ilman k\u00e4ytt\u00e4j\u00e4n suostumusta. Muita vastaavia esimerkkej\u00e4 ovat hy\u00f6kk\u00e4ykset yrityksen tietoj\u00e4rjestelmi\u00e4 vastaan haittaohjelmalla, huijaamalla tai kyberhy\u00f6kk\u00e4yksen muodossa. Tietoturvarikokset voivat aiheuttaa merkitt\u00e4v\u00e4\u00e4 haittaa yksityishenkil\u00f6ille ja organisaatioille.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What is information security?<\/h3>\n\n\n\n<p>Tietoturva kattaa toimenpiteet, joilla suojataan tiedot vahingoilta, luvattomalta k\u00e4yt\u00f6lt\u00e4 ja tietovuodoilta. Tietoturvan kolme peruspilaria ovat luottamuksellisuus, eheys ja saatavuus. Luottamuksellisuus tarkoittaa, ett\u00e4 vain valtuutetut henkil\u00f6t p\u00e4\u00e4sev\u00e4t k\u00e4siksi tietoihin. Eheys varmistaa, ett\u00e4 tiedon oikeellisuus s\u00e4ilyy muuttumattomana sen koko elinkaaren ajan. Tietosuojan kannalta on olennaista, ett\u00e4 n\u00e4m\u00e4 periaatteet ymm\u00e4rret\u00e4\u00e4n ja niit\u00e4 noudatetaan kaikessa tietojen k\u00e4sittelyss\u00e4. Jokainen tietoa k\u00e4sittelev\u00e4 osapuoli on vastuussa sen suojaamisesta ja luottamuksellisuuden s\u00e4ilytt\u00e4misest\u00e4.<\/p>","protected":false},"excerpt":{"rendered":"<p>Information security plays a significant role in the company&#039;s daily operations, and one of its key dimensions is usability, i.e. availability....<\/p>","protected":false},"author":11,"featured_media":1760,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[23],"tags":[],"class_list":["post-1758","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tietoturva"],"acf":[],"taxonomy_info":{"category":[{"value":23,"label":"Tietoturva"}]},"featured_image_src_large":["https:\/\/www.savelan.fi\/wp-content\/uploads\/2023\/08\/Mita-tarkoittaa-tietoturvan-kaytettavyys-eli-saatavuus-1024x448.jpg",1024,448,true],"author_info":{"display_name":"Lauri Jurvanen","author_link":"https:\/\/www.savelan.fi\/en\/author\/lauri-jurvanen\/"},"comment_info":0,"category_info":[{"term_id":23,"name":"Tietoturva","slug":"tietoturva","term_group":0,"term_taxonomy_id":23,"taxonomy":"category","description":"","parent":0,"count":9,"filter":"raw","cat_ID":23,"category_count":9,"category_description":"","cat_name":"Tietoturva","category_nicename":"tietoturva","category_parent":0}],"tag_info":false,"_links":{"self":[{"href":"https:\/\/www.savelan.fi\/en\/wp-json\/wp\/v2\/posts\/1758","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.savelan.fi\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.savelan.fi\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.savelan.fi\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.savelan.fi\/en\/wp-json\/wp\/v2\/comments?post=1758"}],"version-history":[{"count":12,"href":"https:\/\/www.savelan.fi\/en\/wp-json\/wp\/v2\/posts\/1758\/revisions"}],"predecessor-version":[{"id":4164,"href":"https:\/\/www.savelan.fi\/en\/wp-json\/wp\/v2\/posts\/1758\/revisions\/4164"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.savelan.fi\/en\/wp-json\/wp\/v2\/media\/1760"}],"wp:attachment":[{"href":"https:\/\/www.savelan.fi\/en\/wp-json\/wp\/v2\/media?parent=1758"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.savelan.fi\/en\/wp-json\/wp\/v2\/categories?post=1758"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.savelan.fi\/en\/wp-json\/wp\/v2\/tags?post=1758"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}