{"id":25,"date":"2021-12-22T10:54:35","date_gmt":"2021-12-22T15:54:35","guid":{"rendered":"https:\/\/opentextbc.ca\/comptech\/chapter\/malware-viruses\/"},"modified":"2022-10-05T13:50:06","modified_gmt":"2022-10-05T17:50:06","slug":"malware-viruses","status":"publish","type":"chapter","link":"https:\/\/opentextbc.ca\/comptech\/chapter\/malware-viruses\/","title":{"raw":"Malware and Viruses","rendered":"Malware and Viruses"},"content":{"raw":"<h1>Risks<\/h1>\nThe terms \u201cmalware\u201d and \u201cvirus\u201d are often used interchangeably; however, there is a subtle distinction. Malware is a generic term for any type of malicious software, whereas a virus is a specific type of malware that replicates and can be passed from computer to computer (analogous to how a flu virus would be transmitted from person to person). When microcomputers were first introduced, it was primarily viruses that were the cause of concern, so people installed \u201canti-virus\u201d software. The threats today come from a broader spectrum referred to as malware, but it is not uncommon to hear people use the word \u201cvirus\u201d when more correctly what they are referring to is \u201cmalware.\u201d\n\n[caption id=\"attachment_24\" align=\"aligncenter\" width=\"600\"]<img class=\"wp-image-23\" src=\"https:\/\/opentextbc.ca\/technicalwritingh5p\/wp-content\/uploads\/sites\/415\/2021\/12\/image7.jpg\" alt=\"A word cloud with &quot;Malware&quot; appearing very large in the middle. Other words include damage, computer, code, hostile, and steal.\" width=\"600\" height=\"302\"> Figure 2.1 Beware Malware.[\/caption]\n\nWhen software is written for computing devices (computers, tablets, phones, etc.), programmers need to be able to write \u201cperfect\u201d code so that no malicious use of the software occurs (be it program, app or operating system). Even with testing for quality assurance, software only approaches \u201cnear perfect\u201d, leaving room for a programmer with malicious intent to exploit some unintended opening. The malicious software is referred to as \u201cmalware\u201d.\n\nTypes of malware cover a broad spectrum:\n<ul>\n \t<li><strong>Adware:<\/strong> Aggressive advertising that appears on your computer screen constantly.<\/li>\n \t<li><strong>Spyware:<\/strong> Gathers your personal information (without your knowledge) with the intent of identity theft, impersonation or fraud.<\/li>\n \t<li><strong>Scareware:<\/strong> Typical scareware would be a message such as \u201cDanger, your computer is infected, click here to fix the problem\u201d when in fact your computer is not infected, and by clicking on the link to supposedly fix your computer, you actually end up downloading and installing malware on your computer instead.<\/li>\n \t<li><strong>Ransomware:<\/strong> The encrypting of your data (files, pictures, music, etc.) so you can\u2019t access it anymore unless you pay a ransom to un-encrypt it. Ransomware has been used to target individuals (with ransoms of a few hundred dollars), as well as large corporate entities (with ransoms in the millions of dollars). In 2021, Colonial Pipeline (which delivers 100 million gallons of fuel a day) temporarily closed its operations when ransomware was found on its computer systems. The shutdown affected the supply of gasoline in large parts of the US East Coast. The company made a ransom payment to hackers in excess of $4 million in order to restore pipeline operations. In an interesting twist, the FBI hacked the hackers \u201cdigital wallet\u201d and recovered a large portion of the ransom.<\/li>\n \t<li><strong>Virus:<\/strong> Designed to damage the operation of your device by deleting, corrupting or slowing your device\u2019s operation. Viruses require a computer user to do something to help them spread (e.g. download and run a file, run a macro, etc).<\/li>\n \t<li><strong>Worm:<\/strong> A type of malicious software similar to a virus, but with an important distinction, worms spread through computer networks without the assistance of a computer user.<\/li>\n \t<li><strong>Trojan:<\/strong> Like the name implies, software that purports to do something useful, but also contains malware. For example, \u201cSee this Hollywood star caught in a compromising video, click here to download software to view the video\u201d. If you click on the link, you will view a video, but end up installing some malicious software at the same time.<\/li>\n \t<li><strong>Remote Control:<\/strong> Background control of your computer (without your knowledge) to perform malicious activity.<\/li>\n \t<li><strong>Keyloggers:<\/strong> Software that records the keys you press, typically used to capture the addresses of web sites you visit, and your username and password. Be cautious of computers in public places (e.g. libraries, coffee shops, etc.) that might be infected, just browse the Internet, and don\u2019t visit any websites that you would need to type in your username and password.<\/li>\n<\/ul>\n<h1>Malware Symptoms<\/h1>\nWith appropriate anti-malware software (also called antivirus) installed on your computer, and thinking critically about any messages you receive about installing software on your device, you should be able to avoid malware infections. If your computer exhibits any of the following symptoms, you may wish to perform a scan to check for malware on your system:\n<ul>\n \t<li>Slower than usual computer or web browser speeds<\/li>\n \t<li>Programs freezing or crashing<\/li>\n \t<li>Excessive background activity<\/li>\n \t<li>Emails your friends receive, apparently from you, but you didn\u2019t send<\/li>\n<\/ul>\nIf you have anti-malware (antivirus) software installed on your device, you can run this program (app), and look for a choice that will allow it to \u201cScan.\u201d\n\nIf you don\u2019t have antivirus software installed, there are a number of websites you can go to that will perform a free scan of your device. Search for \u201cfree online antivirus\u201d, and look at the search results (rather than the \u201cAds)\u201d. TrendMicro and AVG are well known for their free online antivirus tools.\n<h1>Malware Prevention<\/h1>\n<h2>Thinking Critically<\/h2>\n[caption id=\"attachment_24\" align=\"aligncenter\" width=\"300\"]<img class=\"wp-image-24\" src=\"https:\/\/opentextbc.ca\/technicalwritingh5p\/wp-content\/uploads\/sites\/415\/2022\/10\/image8.png\" alt=\"A notice that reads: &quot;STOP. Your PC is infected. Update your antivirus free.&quot; Underneath, a button is labelled &quot;Scan now.&quot;\" width=\"300\" height=\"300\"> Figure 2.2 Malware pretending to be antivirus software.[\/caption]\n\nIf your device displays a message urging you to take some action, think critically whether this message seems legitimate. For example:\n\nYou see a message claiming that your computer has a malware infection, and you need to do something to fix it. Did the message appear when you weren\u2019t doing anything on your computer (so perhaps it\u2019s a legitimate background process of your anti-malware program), or were you browsing the web and this message appeared (so perhaps it\u2019s a malicious web site displaying a fake message trying to imitate a legitimate message from your anti-malware software).\n\nIf a website wants you to download and install software to view a video, you would ask yourself, <em>Since I am able to view other videos on my device without downloading software, why would I need to do anything special to view this particular video?<\/em> Is it really a different video format, or perhaps something malicious is in the download?\n\nAnything that asks you to \u201cdownload\u201d or \u201cmake changes to your computer.\u201d If this is coming at an unexpected time (i.e., you were doing something else on your device), exercise caution.\n\nAnother example is unsolicited phone calls claiming that your computer is infected and you need to follow the caller\u2019s instructions on how to fix it. In actuality, your computer is fine, and if you follow the caller\u2019s instructions, you will end up downloading and installing malware.\n<h2>High Risk Activities<\/h2>\nCertain activities can put your device at higher risk of contracting malware, or exposing personal information. Two of the largest risks come from:\n\nWi-Fi hotspots with no password. A Wi-Fi hotspot is a public location (e.g., a coffee shop or restaurant) where the business allows customers to connect wirelessly to the Internet. When connecting to a Wi-Fi hotspot that doesn\u2019t have a password, communication between your device and the hotspot is \u201cin clear,\u201d i.e. what you type could be seen by someone else also connected to the hotspot (if they are using special software for this purpose). If you are using a Wi-Fi connection that doesn\u2019t require you to type a password when you first join the hotspot, restrict your activity to browsing the web, and don\u2019t enter any personally identifiable information or usernames and passwords. You can tell if your hotspot is broadcasting in clear (i.e. no encryption) by looking at the Wi-Fi setting on your device, and for hotspots with no passwords you should see an open padlock beside the hotspot name.\n\nBrowsing porn websites. Malicious programmers trying to infect computing devices want to infect as many devices as possible, and as porn is a common search on the web, creating an infected porn website has been one of the more common ways of distributing malware.\n<h2>Anti-Malware (Antivirus) Software<\/h2>\nToday, the terms anti-malware and antivirus are often used interchangeably and generally refer to the same thing; although anti-malware is a more technically correct description of the function of the software, the term antivirus is still widely used by many security software vendors as it is a more familiar term for many people.\n\nAnti-malware (antivirus) software is designed to detect, prevent and remove malicious software from computing devices. You can conduct a web search for \u201canti-malware reviews\u201d to see current recommendations for free and paid software for your device(s).\n\nThe current Windows operating system includes the Microsoft Defender program (previously called Windows Defender). The Mac operating system doesn\u2019t currently have an Apple developed antivirus or anti-malware program. Virus and malware programmers have focused more on Windows PCs (simply because there are more of them than Mac computers), but it is a myth that Macs don\u2019t get viruses\/malware infections, there are just fewer malware programs written for Macs, so in that sense there is less chance of infection, but the chance does exist.\n\nWhich anti-malware\/antivirus program you use is likely not as important as whether you have an anti-malware\/antivirus program installed and running on your computer.\n\nYour anti-malware\/antivirus program typically is set up to automatically download a list of known malware to search for. As new malware is being created all the time, it\u2019s important that your antivirus always has the latest list of malware to scan for.\n\nIt\u2019s also important that you regularly scan your device for malware. Often, antivirus programs are set up to run in the early morning hours when the device is not being used.\n<h3>Media Attributions<\/h3>\n<ul>\n \t<li>\"<a class=\"internal\" href=\"https:\/\/flic.kr\/p\/2gKPAgm\">Malware<\/a>\" by <a href=\"https:\/\/www.flickr.com\/photos\/182229932@N07\/\">EpicTop10.com<\/a> is licensed under a <a class=\"internal\" href=\"https:\/\/creativecommons.org\/licenses\/by\/2.0\/\">CC BY 2.0 licence<\/a>.<\/li>\n \t<li>\"<a class=\"internal\" href=\"https:\/\/commons.wikimedia.org\/wiki\/File:Malvertising.svg\">Malvertising<\/a>\" by <a title=\"User:Syced\" href=\"https:\/\/commons.wikimedia.org\/wiki\/User:Syced\">Syced<\/a> is made available under the <a class=\"internal\" href=\"https:\/\/creativecommons.org\/publicdomain\/zero\/1.0\/deed.en\">CC0 1.0 Universal Public Domain Dedication<\/a>.<\/li>\n<\/ul>","rendered":"<h1>Risks<\/h1>\n<p>The terms \u201cmalware\u201d and \u201cvirus\u201d are often used interchangeably; however, there is a subtle distinction. Malware is a generic term for any type of malicious software, whereas a virus is a specific type of malware that replicates and can be passed from computer to computer (analogous to how a flu virus would be transmitted from person to person). When microcomputers were first introduced, it was primarily viruses that were the cause of concern, so people installed \u201canti-virus\u201d software. The threats today come from a broader spectrum referred to as malware, but it is not uncommon to hear people use the word \u201cvirus\u201d when more correctly what they are referring to is \u201cmalware.\u201d<\/p>\n<figure id=\"attachment_24\" aria-describedby=\"caption-attachment-24\" style=\"width: 600px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-23\" src=\"https:\/\/opentextbc.ca\/technicalwritingh5p\/wp-content\/uploads\/sites\/415\/2021\/12\/image7.jpg\" alt=\"A word cloud with &quot;Malware&quot; appearing very large in the middle. Other words include damage, computer, code, hostile, and steal.\" width=\"600\" height=\"302\" srcset=\"https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2021\/12\/image7.jpg 1024w, https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2021\/12\/image7-300x151.jpg 300w, https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2021\/12\/image7-768x386.jpg 768w, https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2021\/12\/image7-65x33.jpg 65w, https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2021\/12\/image7-225x113.jpg 225w, https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2021\/12\/image7-350x176.jpg 350w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><figcaption id=\"caption-attachment-24\" class=\"wp-caption-text\">Figure 2.1 Beware Malware.<\/figcaption><\/figure>\n<p>When software is written for computing devices (computers, tablets, phones, etc.), programmers need to be able to write \u201cperfect\u201d code so that no malicious use of the software occurs (be it program, app or operating system). Even with testing for quality assurance, software only approaches \u201cnear perfect\u201d, leaving room for a programmer with malicious intent to exploit some unintended opening. The malicious software is referred to as \u201cmalware\u201d.<\/p>\n<p>Types of malware cover a broad spectrum:<\/p>\n<ul>\n<li><strong>Adware:<\/strong> Aggressive advertising that appears on your computer screen constantly.<\/li>\n<li><strong>Spyware:<\/strong> Gathers your personal information (without your knowledge) with the intent of identity theft, impersonation or fraud.<\/li>\n<li><strong>Scareware:<\/strong> Typical scareware would be a message such as \u201cDanger, your computer is infected, click here to fix the problem\u201d when in fact your computer is not infected, and by clicking on the link to supposedly fix your computer, you actually end up downloading and installing malware on your computer instead.<\/li>\n<li><strong>Ransomware:<\/strong> The encrypting of your data (files, pictures, music, etc.) so you can\u2019t access it anymore unless you pay a ransom to un-encrypt it. Ransomware has been used to target individuals (with ransoms of a few hundred dollars), as well as large corporate entities (with ransoms in the millions of dollars). In 2021, Colonial Pipeline (which delivers 100 million gallons of fuel a day) temporarily closed its operations when ransomware was found on its computer systems. The shutdown affected the supply of gasoline in large parts of the US East Coast. The company made a ransom payment to hackers in excess of $4 million in order to restore pipeline operations. In an interesting twist, the FBI hacked the hackers \u201cdigital wallet\u201d and recovered a large portion of the ransom.<\/li>\n<li><strong>Virus:<\/strong> Designed to damage the operation of your device by deleting, corrupting or slowing your device\u2019s operation. Viruses require a computer user to do something to help them spread (e.g. download and run a file, run a macro, etc).<\/li>\n<li><strong>Worm:<\/strong> A type of malicious software similar to a virus, but with an important distinction, worms spread through computer networks without the assistance of a computer user.<\/li>\n<li><strong>Trojan:<\/strong> Like the name implies, software that purports to do something useful, but also contains malware. For example, \u201cSee this Hollywood star caught in a compromising video, click here to download software to view the video\u201d. If you click on the link, you will view a video, but end up installing some malicious software at the same time.<\/li>\n<li><strong>Remote Control:<\/strong> Background control of your computer (without your knowledge) to perform malicious activity.<\/li>\n<li><strong>Keyloggers:<\/strong> Software that records the keys you press, typically used to capture the addresses of web sites you visit, and your username and password. Be cautious of computers in public places (e.g. libraries, coffee shops, etc.) that might be infected, just browse the Internet, and don\u2019t visit any websites that you would need to type in your username and password.<\/li>\n<\/ul>\n<h1>Malware Symptoms<\/h1>\n<p>With appropriate anti-malware software (also called antivirus) installed on your computer, and thinking critically about any messages you receive about installing software on your device, you should be able to avoid malware infections. If your computer exhibits any of the following symptoms, you may wish to perform a scan to check for malware on your system:<\/p>\n<ul>\n<li>Slower than usual computer or web browser speeds<\/li>\n<li>Programs freezing or crashing<\/li>\n<li>Excessive background activity<\/li>\n<li>Emails your friends receive, apparently from you, but you didn\u2019t send<\/li>\n<\/ul>\n<p>If you have anti-malware (antivirus) software installed on your device, you can run this program (app), and look for a choice that will allow it to \u201cScan.\u201d<\/p>\n<p>If you don\u2019t have antivirus software installed, there are a number of websites you can go to that will perform a free scan of your device. Search for \u201cfree online antivirus\u201d, and look at the search results (rather than the \u201cAds)\u201d. TrendMicro and AVG are well known for their free online antivirus tools.<\/p>\n<h1>Malware Prevention<\/h1>\n<h2>Thinking Critically<\/h2>\n<figure id=\"attachment_24\" aria-describedby=\"caption-attachment-24\" style=\"width: 300px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-24\" src=\"https:\/\/opentextbc.ca\/technicalwritingh5p\/wp-content\/uploads\/sites\/415\/2022\/10\/image8.png\" alt=\"A notice that reads: &quot;STOP. Your PC is infected. Update your antivirus free.&quot; Underneath, a button is labelled &quot;Scan now.&quot;\" width=\"300\" height=\"300\" srcset=\"https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2022\/10\/image8.png 531w, https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2022\/10\/image8-300x300.png 300w, https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2022\/10\/image8-150x150.png 150w, https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2022\/10\/image8-65x65.png 65w, https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2022\/10\/image8-225x225.png 225w, https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2022\/10\/image8-350x350.png 350w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><figcaption id=\"caption-attachment-24\" class=\"wp-caption-text\">Figure 2.2 Malware pretending to be antivirus software.<\/figcaption><\/figure>\n<p>If your device displays a message urging you to take some action, think critically whether this message seems legitimate. For example:<\/p>\n<p>You see a message claiming that your computer has a malware infection, and you need to do something to fix it. Did the message appear when you weren\u2019t doing anything on your computer (so perhaps it\u2019s a legitimate background process of your anti-malware program), or were you browsing the web and this message appeared (so perhaps it\u2019s a malicious web site displaying a fake message trying to imitate a legitimate message from your anti-malware software).<\/p>\n<p>If a website wants you to download and install software to view a video, you would ask yourself, <em>Since I am able to view other videos on my device without downloading software, why would I need to do anything special to view this particular video?<\/em> Is it really a different video format, or perhaps something malicious is in the download?<\/p>\n<p>Anything that asks you to \u201cdownload\u201d or \u201cmake changes to your computer.\u201d If this is coming at an unexpected time (i.e., you were doing something else on your device), exercise caution.<\/p>\n<p>Another example is unsolicited phone calls claiming that your computer is infected and you need to follow the caller\u2019s instructions on how to fix it. In actuality, your computer is fine, and if you follow the caller\u2019s instructions, you will end up downloading and installing malware.<\/p>\n<h2>High Risk Activities<\/h2>\n<p>Certain activities can put your device at higher risk of contracting malware, or exposing personal information. Two of the largest risks come from:<\/p>\n<p>Wi-Fi hotspots with no password. A Wi-Fi hotspot is a public location (e.g., a coffee shop or restaurant) where the business allows customers to connect wirelessly to the Internet. When connecting to a Wi-Fi hotspot that doesn\u2019t have a password, communication between your device and the hotspot is \u201cin clear,\u201d i.e. what you type could be seen by someone else also connected to the hotspot (if they are using special software for this purpose). If you are using a Wi-Fi connection that doesn\u2019t require you to type a password when you first join the hotspot, restrict your activity to browsing the web, and don\u2019t enter any personally identifiable information or usernames and passwords. You can tell if your hotspot is broadcasting in clear (i.e. no encryption) by looking at the Wi-Fi setting on your device, and for hotspots with no passwords you should see an open padlock beside the hotspot name.<\/p>\n<p>Browsing porn websites. Malicious programmers trying to infect computing devices want to infect as many devices as possible, and as porn is a common search on the web, creating an infected porn website has been one of the more common ways of distributing malware.<\/p>\n<h2>Anti-Malware (Antivirus) Software<\/h2>\n<p>Today, the terms anti-malware and antivirus are often used interchangeably and generally refer to the same thing; although anti-malware is a more technically correct description of the function of the software, the term antivirus is still widely used by many security software vendors as it is a more familiar term for many people.<\/p>\n<p>Anti-malware (antivirus) software is designed to detect, prevent and remove malicious software from computing devices. You can conduct a web search for \u201canti-malware reviews\u201d to see current recommendations for free and paid software for your device(s).<\/p>\n<p>The current Windows operating system includes the Microsoft Defender program (previously called Windows Defender). The Mac operating system doesn\u2019t currently have an Apple developed antivirus or anti-malware program. Virus and malware programmers have focused more on Windows PCs (simply because there are more of them than Mac computers), but it is a myth that Macs don\u2019t get viruses\/malware infections, there are just fewer malware programs written for Macs, so in that sense there is less chance of infection, but the chance does exist.<\/p>\n<p>Which anti-malware\/antivirus program you use is likely not as important as whether you have an anti-malware\/antivirus program installed and running on your computer.<\/p>\n<p>Your anti-malware\/antivirus program typically is set up to automatically download a list of known malware to search for. As new malware is being created all the time, it\u2019s important that your antivirus always has the latest list of malware to scan for.<\/p>\n<p>It\u2019s also important that you regularly scan your device for malware. Often, antivirus programs are set up to run in the early morning hours when the device is not being used.<\/p>\n<h3>Media Attributions<\/h3>\n<ul>\n<li>&#8220;<a class=\"internal\" href=\"https:\/\/flic.kr\/p\/2gKPAgm\">Malware<\/a>&#8221; by <a href=\"https:\/\/www.flickr.com\/photos\/182229932@N07\/\">EpicTop10.com<\/a> is licensed under a <a class=\"internal\" href=\"https:\/\/creativecommons.org\/licenses\/by\/2.0\/\">CC BY 2.0 licence<\/a>.<\/li>\n<li>&#8220;<a class=\"internal\" href=\"https:\/\/commons.wikimedia.org\/wiki\/File:Malvertising.svg\">Malvertising<\/a>&#8221; by <a title=\"User:Syced\" href=\"https:\/\/commons.wikimedia.org\/wiki\/User:Syced\">Syced<\/a> is made available under the <a class=\"internal\" href=\"https:\/\/creativecommons.org\/publicdomain\/zero\/1.0\/deed.en\">CC0 1.0 Universal Public Domain Dedication<\/a>.<\/li>\n<\/ul>\n","protected":false},"author":123,"menu_order":2,"template":"","meta":{"pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"class_list":["post-25","chapter","type-chapter","status-publish","hentry"],"part":18,"_links":{"self":[{"href":"https:\/\/opentextbc.ca\/comptech\/wp-json\/pressbooks\/v2\/chapters\/25","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/opentextbc.ca\/comptech\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/opentextbc.ca\/comptech\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/opentextbc.ca\/comptech\/wp-json\/wp\/v2\/users\/123"}],"version-history":[{"count":1,"href":"https:\/\/opentextbc.ca\/comptech\/wp-json\/pressbooks\/v2\/chapters\/25\/revisions"}],"predecessor-version":[{"id":26,"href":"https:\/\/opentextbc.ca\/comptech\/wp-json\/pressbooks\/v2\/chapters\/25\/revisions\/26"}],"part":[{"href":"https:\/\/opentextbc.ca\/comptech\/wp-json\/pressbooks\/v2\/parts\/18"}],"metadata":[{"href":"https:\/\/opentextbc.ca\/comptech\/wp-json\/pressbooks\/v2\/chapters\/25\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/opentextbc.ca\/comptech\/wp-json\/wp\/v2\/media?parent=25"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/opentextbc.ca\/comptech\/wp-json\/pressbooks\/v2\/chapter-type?post=25"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/opentextbc.ca\/comptech\/wp-json\/wp\/v2\/contributor?post=25"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/opentextbc.ca\/comptech\/wp-json\/wp\/v2\/license?post=25"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}