{"id":9895,"date":"2021-12-14T19:48:10","date_gmt":"2021-12-14T17:48:10","guid":{"rendered":"http:\/\/journals.khnu.km.ua\/vestnik\/?p=9895"},"modified":"2022-03-15T10:42:54","modified_gmt":"2022-03-15T08:42:54","slug":"metody-zahystu-informaczijnyh-resursiv-v-telekomunikaczijnyh-systemah","status":"publish","type":"post","link":"https:\/\/journals.khnu.km.ua\/vestnik\/?p=9895","title":{"rendered":"\u041c\u0435\u0442\u043e\u0434\u0438 \u0437\u0430\u0445\u0438\u0441\u0442\u0443 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0438\u0445 \u0440\u0435\u0441\u0443\u0440\u0441\u0456\u0432 \u0432 \u0442\u0435\u043b\u0435\u043a\u043e\u043c\u0443\u043d\u0456\u043a\u0430\u0446\u0456\u0439\u043d\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445"},"content":{"rendered":"<p><!--more--><\/p>\n<p style=\"text-align: center;\">\u041c\u0415\u0422\u041e\u0414\u0418 \u0417\u0410\u0425\u0418\u0421\u0422\u0423 \u0406\u041d\u0424\u041e\u0420\u041c\u0410\u0426\u0406\u0419\u041d\u0418\u0425 \u0420\u0415\u0421\u0423\u0420\u0421\u0406\u0412 \u0412 \u0422\u0415\u041b\u0415\u041a\u041e\u041c\u0423\u041d\u0406\u041a\u0410\u0426\u0406\u0419\u041d\u0418\u0425 \u0421\u0418\u0421\u0422\u0415\u041c\u0410\u0425<\/p>\n<p style=\"text-align: center;\">METHODS OF PROTECTION OF INFORMATION RESOURCES IN TELECOMMUNICATION SYSTEMS<\/p>\n<p><strong>\u0421\u0442\u043e\u0440\u0456\u043d\u043a\u0438: 2<\/strong><strong>7-31<\/strong><strong>. \u041d\u043e\u043c\u0435\u0440: \u21165, 2021 (301)<\/strong> <a href=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/12\/301-text_2021_5_t-27-31.pdf\"> <img loading=\"lazy\" class=\"size-full wp-image-69 alignnone\" src=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/01\/pdf.png\" alt=\"\" width=\"76\" height=\"32\" \/><\/a><br \/>\n<strong>\u00a0<\/strong><strong>\u0410\u0432\u0442\u043e\u0440\u0438:<\/strong><br \/>\n\u041e\u0413\u041d\u0404\u0412\u0418\u0419 \u041e.\u0412.<br \/>\n\u0425\u043c\u0435\u043b\u044c\u043d\u0438\u0446\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442<br \/>\nORCID ID: 0000-0001-6462-3483<br \/>\ne-mail: aognev@i.ua<br \/>\n\u0425\u041c\u0415\u041b\u042c\u041d\u0418\u0426\u042c\u041a\u0418\u0419 \u042e.\u0412.<br \/>\n\u0425\u043c\u0435\u043b\u044c\u043d\u0438\u0446\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442<br \/>\nORCID &#8211; 0000-0002-4005-5669<br \/>\ne-mail: getman-58@ukr.net<br \/>\nOHNIEVYI OLEKSANDR V.<br \/>\nKhmelnytskyi National University<br \/>\nKHMELNYTSKY YURIY V.<br \/>\nKhmelnytskyi National University<br \/>\n<strong>DOI:<\/strong> <a href=\"https:\/\/www.doi.org\/10.31891\/2307-5732-2021-301-5-27-31\">https:\/\/www.doi.org\/10.31891\/2307-5732-2021-301-5-27-31<\/a><br \/>\n<strong>\u0420\u0435\u0446\u0435\u043d\u0437\u0456\u044f\/Peer review <\/strong>: 06.09.2021\u0440.<br \/>\n<strong>\u041d\u0430\u0434\u0440\u0443\u043a\u043e\u0432\u0430\u043d\u0430\/Printed :<\/strong> 10.10.2021 \u0440.<br \/>\n<strong>\u0410\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u043c\u043e\u0432\u043e\u044e \u043e\u0440\u0438\u0433\u0456\u043d\u0430\u043b\u0443<\/strong><br \/>\n\u0421\u0442\u0430\u0442\u0442\u044f \u043f\u0440\u0438\u0441\u0432\u044f\u0447\u0435\u043d\u0430 \u0434\u043e\u0441\u043b\u0456\u0434\u0436\u0435\u043d\u043d\u044e \u0442\u0435\u043e\u0440\u0435\u0442\u0438\u043a\u043e-\u043c\u0435\u0442\u043e\u0434\u043e\u043b\u043e\u0433\u0456\u0447\u043d\u0438\u0445 \u0437\u0430\u0441\u0430\u0434 \u0442\u0430 \u043f\u0440\u0430\u043a\u0442\u0438\u0447\u043d\u0438\u0445 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0456\u0439 \u0437\u0430\u0441\u0442\u043e\u0441\u0443\u0432\u0430\u043d\u043d\u044f \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0456\u0457 \u0437\u0430\u0445\u0438\u0441\u0442\u0443 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0438\u0445 \u0440\u0435\u0441\u0443\u0440\u0441\u0456\u0432 \u0434\u043b\u044f \u0435\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u043e\u0433\u043e \u0444\u0443\u043d\u043a\u0446\u0456\u043e\u043d\u0443\u0432\u0430\u043d\u043d\u044f \u0441\u0438\u0441\u0442\u0435\u043c \u0432\u0456\u0434\u0435\u043e\u0437\u0432\u2019\u044f\u0437\u043a\u0443. \u0417 \u0440\u043e\u0437\u0432\u0438\u0442\u043a\u043e\u043c \u043c\u0456\u0436\u043d\u0430\u0440\u043e\u0434\u043d\u0438\u0445 \u0432\u0456\u0434\u043d\u043e\u0441\u0438\u043d \u0432 \u0441\u0443\u0441\u043f\u0456\u043b\u044c\u0441\u0442\u0432\u0456, \u0432\u043f\u0440\u043e\u0432\u0430\u0434\u0436\u0435\u043d\u043d\u044f\u043c \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0438\u0445 \u0442\u0430 \u0442\u0435\u043b\u0435\u043a\u043e\u043c\u0443\u043d\u0456\u043a\u0430\u0446\u0456\u0439\u043d\u0438\u0445 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0456\u0439, \u0432 \u0423\u043a\u0440\u0430\u0457\u043d\u0456 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u0440\u043e\u0437\u0432\u0438\u0432\u0430\u0454\u0442\u044c\u0441\u044f \u0442\u0430 \u0432\u043f\u0440\u043e\u0432\u0430\u0434\u0436\u0443\u0454\u0442\u044c\u0441\u044f \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0456\u044f \u0432\u0456\u0434\u0435\u043e\u043a\u043e\u043d\u0444\u0435\u0440\u0435\u043d\u0446\u0437\u0432&#8217;\u044f\u0437\u043a\u0443, \u0441\u0442\u0432\u043e\u0440\u044e\u044e\u0442\u044c\u0441\u044f \u0442\u0430 \u0440\u0435\u0430\u043b\u0456\u0437\u0443\u044e\u0442\u044c\u0441\u044f \u0432\u0456\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u0456 \u0437\u0430\u0445\u043e\u0434\u0438, \u0432\u0435\u0431\u0456\u043d\u0430\u0440\u0438, \u0432\u0456\u0434\u0435\u043e\u043a\u043e\u043d\u0444\u0435\u0440\u0435\u043d\u0446\u0456\u0457 \u0442\u0430 \u043e\u043d\u043b\u0430\u0439\u043d-\u0442\u0440\u0430\u043d\u0441\u043b\u044f\u0446\u0456\u0457. \u0414\u043b\u044f \u0441\u0438\u0441\u0442\u0435\u043c \u0432\u0456\u0434\u0435\u043e\u043a\u043e\u043d\u0444\u0435\u0440\u0435\u043d\u0446\u0456\u0439 \u0430\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u0456 \u0437\u0430\u0433\u0440\u043e\u0437\u0438 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u043e\u0457 \u0431\u0435\u0437\u043f\u0435\u043a\u0438, \u044f\u043a\u0456 \u043f\u0440\u0438\u0442\u0430\u043c\u0430\u043d\u043d\u0456 \u0431\u0443\u0434\u044c-\u044f\u043a\u0456\u0439 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u043e-\u0442\u0435\u043b\u0435\u043a\u043e\u043c\u0443\u043d\u0456\u043a\u0430\u0446\u0456\u0439\u043d\u0456\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u0456. \u041e\u0434\u043d\u0456\u0454\u044e \u0437 \u043e\u0441\u043d\u043e\u0432\u043d\u0438\u0445 \u043f\u0440\u043e\u0431\u043b\u0435\u043c \u043e\u0440\u0433\u0430\u043d\u0456\u0437\u0430\u0446\u0456\u0457 \u043d\u0430\u0434\u0456\u0439\u043d\u043e\u0457 \u0441\u0438\u0441\u0442\u0435\u043c\u0438 \u0432\u0456\u0434\u0435\u043e\u043a\u043e\u043d\u0444\u0435\u0440\u0435\u043d\u0446\u0437\u0432\u2019\u044f\u0437\u043a\u0443\u00a0 \u0454 \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f \u043e\u043f\u0442\u0438\u043c\u0430\u043b\u044c\u043d\u043e\u0457 \u0448\u0432\u0438\u0434\u043a\u043e\u0441\u0442\u0456 \u043f\u0435\u0440\u0435\u0434\u0430\u0447\u0456 \u0434\u0430\u043d\u0438\u0445 \u043f\u0440\u0438 \u043c\u0430\u043a\u0441\u0438\u043c\u0430\u043b\u044c\u043d\u0456\u0439 \u0448\u0432\u0438\u0434\u043a\u043e\u0441\u0442\u0456 \u043e\u0431\u0440\u043e\u0431\u043a\u0438 \u0430\u0443\u0434\u0456\u043e- \u0442\u0430 \u0432\u0456\u0434\u0435\u043e\u043f\u043e\u0442\u043e\u043a\u0443. \u0420\u043e\u0437\u0433\u043b\u044f\u043d\u0443\u0442\u043e \u043e\u0441\u043d\u043e\u0432\u043d\u0456 \u0432\u0438\u0434\u0438 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457 \u0442\u0430 \u0432\u0438\u0437\u043d\u0430\u0447\u0435\u043d\u043e \u043d\u0430\u043f\u0440\u044f\u043c\u043a\u0438 \u043f\u0456\u0434\u0442\u0440\u0438\u043c\u0430\u043d\u043d\u044f \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u043e\u0457 \u0431\u0435\u0437\u043f\u0435\u043a\u0438 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u043e-\u0442\u0435\u043b\u0435\u043a\u043e\u043c\u0443\u043d\u0456\u043a\u0430\u0446\u0456\u0439\u043d\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u0432\u0456\u0434\u043f\u043e\u0432\u0456\u0434\u043d\u043e \u0434\u043e \u0437\u0430\u043a\u043e\u043d\u043e\u0434\u0430\u0432\u0441\u0442\u0432\u0430 \u0423\u043a\u0440\u0430\u0457\u043d\u0438. \u0414\u043b\u044f \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f \u043d\u0430\u0434\u0456\u0439\u043d\u043e\u0441\u0442\u0456 \u0441\u0438\u0441\u0442\u0435\u043c\u0438 \u0432\u0456\u0434\u0435\u043e\u043a\u043e\u043d\u0444\u0435\u0440\u0435\u043d\u0446\u0456\u0439 \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u043e\u0432\u0443\u0454\u0442\u044c\u0441\u044f \u0437\u0430\u0445\u0438\u0441\u0442 \u0432\u0456\u0434\u043a\u0440\u0438\u0442\u043e\u0457 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457 \u0432\u0456\u0434 \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0456\u043e\u043d\u043e\u0432\u0430\u043d\u0438\u0445 \u0434\u0456\u0439, \u0449\u043e \u043f\u0440\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u044c \u0434\u043e \u0457\u0457 \u0432\u0438\u043f\u0430\u0434\u043a\u043e\u0432\u043e\u0457 \u0430\u0431\u043e \u0443\u043c\u0438\u0441\u043d\u043e\u0457 \u043c\u043e\u0434\u0438\u0444\u0456\u043a\u0430\u0446\u0456\u0457 \u0447\u0438 \u0437\u043d\u0438\u0449\u0435\u043d\u043d\u044f, \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0456\u044f \u043a\u043e\u0440\u0438\u0441\u0442\u0443\u0432\u0430\u0447\u0456\u0432. \u0417\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f \u0437\u0430\u0445\u0438\u0441\u0442\u0443 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0438\u0445 \u0440\u0435\u0441\u0443\u0440\u0441\u0456\u0432 \u0437\u0434\u0456\u0439\u0441\u043d\u044e\u0454\u0442\u044c\u0441\u044f \u0448\u043b\u044f\u0445\u043e\u043c \u0437\u0430\u0441\u0442\u043e\u0441\u0443\u0432\u0430\u043d\u043d\u044f \u0437\u0430\u0441\u043e\u0431\u0456\u0432 \u0456 \u043c\u0435\u0442\u043e\u0434\u0456\u0432 \u0442\u0435\u0445\u043d\u0456\u0447\u043d\u043e\u0433\u043e \u0437\u0430\u0445\u0438\u0441\u0442\u0443, \u0432\u043f\u0440\u043e\u0432\u0430\u0434\u0436\u0435\u043d\u043d\u044f \u043e\u0440\u0433\u0430\u043d\u0456\u0437\u0430\u0446\u0456\u0439\u043d\u0438\u0445 \u0442\u0430 \u0442\u0435\u0445\u043d\u0456\u0447\u043d\u0438\u0445 \u0437\u0430\u0445\u043e\u0434\u0456\u0432 \u043a\u043e\u043c\u043f\u043b\u0435\u043a\u0441\u043d\u043e\u0457 \u0441\u0438\u0441\u0442\u0435\u043c\u0438 \u0437\u0430\u0445\u0438\u0441\u0442\u0443 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457. \u0414\u043e\u0441\u043b\u0456\u0434\u0436\u0435\u043d\u043d\u044f \u0446\u0438\u0445 \u043c\u0435\u0442\u043e\u0434\u0456\u0432\u00a0 \u043d\u0430\u0434\u0430\u044e\u0442\u044c \u043c\u043e\u0436\u043b\u0438\u0432\u0456\u0441\u0442\u044c \u0440\u043e\u0437\u043f\u043e\u0434\u0456\u043b\u0438\u0442\u0438 \u043d\u0430\u0432\u0430\u043d\u0442\u0430\u0436\u0435\u043d\u043d\u044f \u043d\u0430 \u0432\u0441\u0456 \u0435\u043b\u0435\u043c\u0435\u043d\u0442\u0438 \u0441\u0438\u0441\u0442\u0435\u043c\u0438 \u043f\u0440\u043e\u043f\u043e\u0440\u0446\u0456\u0439\u043d\u043e \u0457\u0445 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c \u0456 \u0445\u0430\u0440\u0430\u043a\u0442\u0435\u0440\u0438\u0441\u0442\u0438\u043a\u0430\u043c.<br \/>\n<strong>\u041a\u043b\u044e\u0447\u043e\u0432\u0456 \u0441\u043b\u043e\u0432\u0430:<\/strong> \u0432\u0456\u0434\u0435\u043e\u0437\u0432\u2019\u044f\u0437\u043e\u043a, \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0430 \u0431\u0435\u0437\u043f\u0435\u043a\u0430, \u0437\u0430\u0445\u0438\u0441\u0442, \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0456 \u0440\u0435\u0441\u0443\u0440\u0441\u0438, \u0456\u0434\u0435\u043d\u0442\u0438\u0444\u0456\u043a\u0430\u0446\u0456\u044f, \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0456\u0457,\u00a0 \u043a\u043e\u043d\u0444\u0456\u0434\u0435\u043d\u0446\u0456\u0439\u043d\u0456\u0441\u0442\u044c, \u0446\u0456\u043b\u0456\u0441\u043d\u0456\u0441\u0442\u044c.<\/p>\n<p style=\"text-align: center;\"><strong>\u00a0<\/strong><strong>\u0420\u043e\u0437\u0448\u0438\u0440\u0435\u043d\u0430 \u0430\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u0430\u043d\u0433\u043b\u0456\u0439\u0441\u044c\u043a\u043e\u044e \u043c\u043e\u0432\u043e\u044e<\/strong><\/p>\n<p>The article is devoted to the study of theoretical and methodological principles and practical recommendations for the use of information resource protection technology for the effective functioning of video communication systems. With the development of international relations in society, the introduction of information and telecommunication technologies, Ukraine is actively developing and implementing video conferencing technology, creating and implementing virtual events, webinars, video conferencing and online broadcasts. The use of such systems allows you to get a variety of information, use textual and visual graphics, and so on. For video conferencing systems are relevant threats to information security, which are inherent in any information and telecommunications system. One of the main problems of organizing a reliable video conferencing system is to ensure the optimal data rate at the maximum speed of audio and video processing. The main types of information are considered and the directions of maintaining information security of information and telecommunication systems in accordance with the legislation of Ukraine are determined. The main types of information security are related to the protection of confidentiality, integrity and accessibility and to the confirmation of authorship. To ensure the reliability of the video conferencing system, the protection of open information from unauthorized actions is used, which leads to its accidental or intentional modification or destruction, authorization of users. The tasks of user authorization are management of access rights, collection of statistics and acts as an additional means of ensuring the reliability of the system. Ensuring the protection of information resources is carried out through the use of means and methods of technical protection, implementation of organizational and technical measures of a comprehensive information protection system. Studies of these methods make it possible to distribute the load on all elements of the system in proportion to their resources and characteristics.<br \/>\n<strong>Keywords:<\/strong> video communication, information security, protection, information resources, identification, system, technologies, confidentiality, integrity.<\/p>\n<p style=\"text-align: center;\"><strong>References<\/strong><\/p>\n<ol>\n<li>Barannik V. V. Model zahroz bezpeky videoinformatsiinoho resursu system videokonferentszviazku \/ V. V. Barannik, A. V. Vlasov, R. V. Tarnopolov \/\/ Naukoiemni tekhnolohii. \u2013 2014. \u2013 \u2116 1. \u2013 S. 55\u201360.<\/li>\n<li>Holev D.V. Metodyky otsinky informatsiinoi zakhyshchenosti telekomunikatsii : navch. posib. \/ Holev D.V., Kononovych V.H., KhomychS.V. ; za red. chl.-kor. MAZ V.H. Kononovycha. \u2013 Odesa : ONAZ im.O.S.Popova, 2013. \u2013 218 s.<\/li>\n<li>Osnovy zakhystu informatsii v telekomunikatsiinykh ta kompiuternykh merezhakh \/ [L.L. Honcharova, A.D. Voznenko, O.I. Stasiuk, Yu.O. Koval]. \u2013 Kyiv, 2013. \u2013 435 s.<\/li>\n<li>Zhyvko Z. B. Informatsiini zahrozy: sut i problemy \/ Z.B. Zhyvko, M.O. Zhyvko \/\/ Systemy obrobky informatsii. \u2013 2009. \u2013 \u2116 7(81). \u2013 S. 116\u2013118.<\/li>\n<li>Lebedeva K. E. Metodika povysheniya nadezhnosti sistem videokonferencsvyazi s garantirovannoj dostavkoj soobshenij dlya avtorizovannyh polzovatelej [Elektronnyj resurs] \/ K.E. Lebedeva. \u2013 Rezhim dostupa : https:\/\/docplayer.com\/61503923-Intellektualnye-sistemy-v-informacionnom-protivoborstve.html.<\/li>\n<li>Lisovska Yu. P. Informatsiina bezpeka Ukrainy : navch. posibnyk \/ Yu.P. Lisovska. \u2013 Kyiv : Kondor, 2018. \u2013 172 s.<\/li>\n<li>Pravyla zabezpechennia zakhystu informatsii v informatsiinykh, telekomunikatsiinykh ta informatsiino-telekomunikatsiinykh systemakh [Elektronnyi resurs] : postanova Kabinetu Ministriv Ukrainy vid 29 bereznia 2006 r. N 373. \u2013 Rezhym dostupu : https:\/\/zakon.rada.gov.ua\/laws\/show\/373-2006-%D0%BF.<\/li>\n<li>Franchuk V.M. Zakhyst informatsiinykh resursiv: kryptohrafichni ta stehanohrafichni metody zakhystu danykh : posibnyk dlia vykladachiv, vchyteliv ta studentiv informatychnykh spetsialnostei \/ V.M. Franchuk. \u2013 K. : NPU imeni M.P. Drahomanova, 2012. \u2013 120 s.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[58],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/9895"}],"collection":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=9895"}],"version-history":[{"count":8,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/9895\/revisions"}],"predecessor-version":[{"id":11085,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/9895\/revisions\/11085"}],"wp:attachment":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=9895"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=9895"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=9895"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}