{"id":31070,"date":"2024-11-21T09:40:49","date_gmt":"2024-11-21T08:40:49","guid":{"rendered":"https:\/\/www.fbk.eu\/initiatives\/cybersecurity-new-page\/"},"modified":"2025-01-21T10:36:04","modified_gmt":"2025-01-21T09:36:04","slug":"cybersecurity-new-page","status":"publish","type":"page","link":"https:\/\/www.fbk.eu\/en\/initiatives\/cybersecurity-new-page\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"31070\" class=\"elementor elementor-31070 elementor-31069\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-14610ee5 e-flex e-con-boxed e-con e-parent\" data-id=\"14610ee5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-68e94aef elementor-widget elementor-widget-text-editor\" data-id=\"68e94aef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-title-wrapper\">\u00a0<\/div><div class=\"inner-content-wrapper\"><div class=\"inner-content\"><div class=\"page-detail contains-rich-text\"><div class=\"elementor elementor-26202\" data-elementor-type=\"wp-page\" data-elementor-id=\"26202\" data-elementor-post-type=\"page\"><section class=\"elementor-section elementor-top-section elementor-element elementor-element-3db39f72 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3db39f72\" data-element_type=\"section\"><div class=\"elementor-container elementor-column-gap-default\"><div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-32d1d8cb\" data-id=\"32d1d8cb\" data-element_type=\"column\"><div class=\"elementor-widget-wrap elementor-element-populated\"><div class=\"elementor-element elementor-element-31f0ceed elementor-widget elementor-widget-text-editor\" data-id=\"31f0ceed\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><p>Digital identity and security of cloud-edge native services are the two main research topics in the field of Cyber Security at FBK.\u00a0 The development of automated methods and tools for risk and trust management for the largest number of organizations, especially those with limited security expertise, such as SMEs, are the research focus. Therefore, it becomes critical to design, develop and implement digital identity infrastructures in a way that ensures security, privacy and trust.<\/p><hr \/><h2>Challenges and strengths<\/h2><p>There are two major challenges, among the many posed by the secure development of digital identity infrastructure, that emerge as particularly important:<\/p><ul><li>Given the push for digitization of many processes in the public administration (especially health care) and individuals (such as banking) speeded up dramatically by the COVID-19 pandemic, identification processes have also been digitized and performed remotely and no longer in-person (e.g., it is possible to create a checking account without physically going to a bank branch). This transformation has led to the introduction of <strong>new attacks on remote identification processes<\/strong> that can lead to identity theft with potentially catastrophic consequences for the user who is the victim (e.g., economic in the case of access to financial services). For example, many of these processes use video fragments to compare the face of the person requesting digital identity creation with the image associated with the presented identity document: modern image manipulation techniques including video (e.g., those techniques that go by the name of deep fakes) manage to virtually paste the face of the victim whose identity document has been stolen in a dynamic manner in such a way that it is difficult for image control algorithms or a human operator to find such manipulations. The Center is developing <strong>techniques for detecting these types of threats and others that may jeopardize the identification process<\/strong>, providing a comprehensive classification of threats and related mitigations, while also developing automated techniques for risk assessment to help those developing these processes define the configuration of mitigations that offers the desired level of security.<\/li><li>In the short, medium and long term, it will be necessary to <strong>integrate the infrastructure for digital identity management<\/strong> with the growing and increasingly articulate and complex ecosystem of services and applications offered by the national and European public administration<strong>\u00a0<\/strong> in order to take full advantage of the benefits offered by the digitization of processes.<br \/>The Center has established a strategic partnership with <strong>PagoPA<\/strong> to initiate a series of collaborations at both the technical and training levels to securely and reliably manage this transition using a <strong>risk management<\/strong>approach, a design with in mind the importance of a\u00a0 \u02bb\u02bbfrictionless \u02bc\u02bc user experience and increased user awareness of the benefits and limitations of the tool.<\/li><\/ul><hr \/><h2>Technologies<\/h2><p>FBK&#8217;s Cybersecurity research offers solutions to address the challenges posed by the three risks identified above: insecurity, lack of privacy, and distrust, based on a variety of techniques that include:<\/p><ul><li><strong>algorithms for security analysis,<\/strong>\u00a0risk assessment and compliance with standards that allow the stakeholders involved to evaluate risks from different perspectives against different alternative project solutions;<\/li><li><strong>cryptographic techniques for the integrity, authenticity and privacy<\/strong> of data transmitted, stored and processed by the infrastructure that allow the user to share data in a granular manner (selective disclosure);<\/li><li><strong>declarative techniques for automating security and compliance testing<\/strong>\u00a0of the implementation of infrastructures that allow administrators to continuously verify\u00a0<strong>security\u00a0<\/strong>and\u00a0<strong>compliance <\/strong>against possible evolutions of the infrastructure itself and threats.<\/li><\/ul><hr \/><h2>Major projects<\/h2><ul><li><a href=\"https:\/\/www.8ra.com\/\"><b>8RA<\/b><\/a>, the project funded by the European Union as part of the <strong>IPCEI<\/strong> program (Important Project of Common European Interest). The goal is to promote the interoperability and integration of cloud offerings in Europe, increase public and private investments in Edge and Cloud technologies, and facilitate the entry of new companies into the market, thereby fostering the growth of the ecosystem.<br \/>In December 2023, the\u00a0<strong>European Commission<\/strong>\u00a0authorized the implementation of the first IPCEI focused on technologies aimed at building a European value chain for\u00a0<strong>Cloud Infrastructure and Services (CIS)<\/strong>, with state aid amounting to over \u20ac1.2 billion across Europe, approximately\u00a0<strong>\u20ac409 million of which was allocated to Italy<\/strong>. <br \/>Politecnico di Torino, <strong>Fondazione Bruno Kessler<\/strong>, ENEA, together with Engineering, Fincantieri, Reply, TIM and Tiscali will create a shared testing environment aimed at enhancing the outcomes of 8RA.<\/li><li><strong>European Digital Identity Wallet<\/strong>:\u00a0 in June 2023, with the official launch of the <strong>POTENTIAL\u00a0<\/strong><a href=\"https:\/\/www.digital-identity-wallet.eu\/\"><strong>Consortium<\/strong><\/a>, the implementation of one of the \u00a0<strong>e-wallet<\/strong>\u00a0 solutions involving Italy began, with the start of testing of the first use cases during 2024. The <a href=\"https:\/\/magazine.fbk.eu\/it\/news\/e-wallet-parte-dalla-provincia-autonoma-di-trento-la-sperimentazione-italiana-del-portafoglio-digitale-ue\/\">testing that will start in the Autonomous Province of Trento<\/a> will focus on: identification and authentication for the use of digital public services (eGov), digital driver&#8217;s license. and electronic medical prescription (ePrescription). Thanks to PagoPA&#8217;s involvement, IO, the public services app, identified both as a model for the definition of the international wallet standard and for the implementation of the national digital wallet, will serve as the wallet.<\/li><li><strong>Poste Italiane<\/strong>: within a joint laboratory, a testing plan was developed for the protection and monitoring of the SPID infrastructure developed by the Poste Italiane postal services.\u00a0 This activity has been completed for some time and was a key contributor to developing expertise that led to the development of T3 techniques.<\/li><li><strong>Poligrafico e Zecca dello Stato (IPZS)<\/strong>: development of methodologies for the secure design of authentication infrastructures based on the Electronic Identity Card (CIE) 3.0 both nationally with the \u02bbEntra con CIE\u02bc button to access Italian Public Administration services and internationally with an authenticationapplication compliant with the eIDAS regulation to allow Italian citizens to access, with their CIE digitalidentity\u00a0, the Public Administration services of another Member State (T1 techniques) and application of cryptographic techniques for the protection of messages exchanged and stored within the infrastructure (T2 techniques) and for the security and compliance testing of message exchange protocols (T3 techniques).\u00a0\u00a0 This activity began a few years ago and is in full swing and has led to the development of T1 and T2 techniques as well as the refinement of T3 techniques and, recently, the writing of a technical document published by AgID that contains the OpenID Connect technical rule lines for SPID and CIE.<\/li><li>Various Italian and international public and private organizations within the European \u02bbLarge <strong>Scale Pilot EUDI<\/strong>Wallet\u02bc POTENTIAL projects\u00a0(\u00a0 https:\/\/www.digital-identity-wallet.eu\/), NOBID (\u00a0 https:\/\/www.nobidconsortium.com\/) and\u00a0DC4EU\u00a0(\u00a0 https:\/\/www.dc4eu.eu\/) that aim to build the new infrastructure to make the digital identity of the various Member States portable at European level in accordance with the new version of the eIDAS 2.0 regulation (T1, T2 and T3 techniques).<\/li><li>\u00a0<a href=\"https:\/\/serics.eu\/\"><strong>SERICS Foundation<\/strong><\/a>\u00a0\u2013 Security and Rights in CyberSpace. The participation of the\u00a0Center for Cybersecurity\u00a0in the SERICS (Security and Rights in CyberSpace)\u00a0Foundation\u00a0will enable\u00a0FBK\u00a0to take part in some national-level strategic actions and innovative research activities in the field of cybersecurity envisaged by the <strong>National Recovery and Resilience Plan (PNRR)<\/strong> in the context of the Extended Partnerships on Topic area &#8220;<strong>7:<\/strong>\u00a0<strong>Cybersecurity, new technologies and rights protection<\/strong>&#8220;.The activities will be part of the partnership&#8217;s Spoke 4 (Security of Operating Systems and Virtualization)\u00a0and Spoke 5 (Encryption and security of distributed systems).<br \/>In addition to producing innovative scientific results with significant impact both locally and nationally, participation in SERICS will guarantee FBK greater visibility to its work in Cybersecurity and expand its network to develop future collaborations.<\/li><\/ul><div><ul style=\"margin: 0px -12px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; line-height: inherit; font-family: Montserrat, sans-serif; font-size: 16px; list-style-type: none; width: calc(100% + 24px); display: inline-flex; flex-flow: wrap;\"><li style=\"margin-top: 0px; margin-bottom: 0px; font-size: 16px; background: #fafafa; width: 435.05px; min-height: 200px; border: 12px solid #ffffff;\"><div class=\"contents-wrapper\" style=\"font-size: 16px; display: table; height: 260.8px; width: 411.05px;\"><div class=\"contents\" style=\"padding: 16px; font-size: 16px; vertical-align: middle; display: table-cell; text-align: center;\"><p><img decoding=\"async\" style=\"border-width: 0px; border-style: initial; font-size: 16px; max-height: 120px;\" src=\"https:\/\/www.fbk.eu\/wp-content\/uploads\/2020\/12\/Cyber-Security_Silvio-Ranise-150x150.jpg\" \/><\/p><div class=\"title\" style=\"margin-top: 8px; font-weight: bold; font-size: 18px;\">Contatti<\/div><div class=\"subtitle\" style=\"font-size: 16px;\"><span style=\"font-weight: bold; font-size: 16px;\">Silvio Ranise<\/span><\/div><p><a style=\"margin-top: 8px; font-size: 16px; display: block;\" href=\"https:\/\/magazine.fbk.eu\/it\/spotlight\/silvio-ranise\/\" target=\"_blank\" rel=\"noopener\">Scopri di pi\u00f9<\/a><\/p><\/div><\/div><\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\u00a0 Digital identity and security of cloud-edge native services are the two main research topics in the field of Cyber Security at FBK.\u00a0 The development of automated methods and tools for risk and trust management for the largest number of organizations, especially those with limited security expertise, such as SMEs, are the research focus. Therefore, [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":26291,"parent":1641,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-31070","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity - FBK<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.fbk.eu\/en\/initiatives\/cybersecurity-new-page\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.fbk.eu\/en\/initiatives\/cybersecurity-new-page\/\" \/>\n<meta property=\"og:site_name\" content=\"FBK\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-21T09:36:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.fbk.eu\/wp-content\/uploads\/2023\/05\/SecurityAndTrust_Cybersecurity_Bolli_2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1067\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.fbk.eu\/wp-content\/themes\/fbk-foundation\/images\/opengraph-default.png\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.fbk.eu\\\/en\\\/initiatives\\\/cybersecurity-new-page\\\/\",\"url\":\"https:\\\/\\\/www.fbk.eu\\\/en\\\/initiatives\\\/cybersecurity-new-page\\\/\",\"name\":\"Cybersecurity - FBK\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.fbk.eu\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.fbk.eu\\\/en\\\/initiatives\\\/cybersecurity-new-page\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.fbk.eu\\\/en\\\/initiatives\\\/cybersecurity-new-page\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.fbk.eu\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/SecurityAndTrust_Cybersecurity_Bolli_2.jpg\",\"datePublished\":\"2024-11-21T08:40:49+00:00\",\"dateModified\":\"2025-01-21T09:36:04+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.fbk.eu\\\/en\\\/initiatives\\\/cybersecurity-new-page\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.fbk.eu\\\/en\\\/initiatives\\\/cybersecurity-new-page\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.fbk.eu\\\/en\\\/initiatives\\\/cybersecurity-new-page\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.fbk.eu\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/SecurityAndTrust_Cybersecurity_Bolli_2.jpg\",\"contentUrl\":\"https:\\\/\\\/www.fbk.eu\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/SecurityAndTrust_Cybersecurity_Bolli_2.jpg\",\"width\":1600,\"height\":1067,\"caption\":\"Archivio FBK\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.fbk.eu\\\/en\\\/initiatives\\\/cybersecurity-new-page\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.fbk.eu\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Initiatives\",\"item\":\"https:\\\/\\\/www.fbk.eu\\\/en\\\/initiatives\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.fbk.eu\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.fbk.eu\\\/en\\\/\",\"name\":\"FBK\",\"description\":\"Fondazione Bruno Kessler\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.fbk.eu\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.fbk.eu\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.fbk.eu\\\/en\\\/#organization\",\"name\":\"FBK\",\"url\":\"https:\\\/\\\/www.fbk.eu\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.fbk.eu\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.fbk.eu\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/FBK_For-A-Human-Centered-AI.png\",\"contentUrl\":\"https:\\\/\\\/www.fbk.eu\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/FBK_For-A-Human-Centered-AI.png\",\"width\":549,\"height\":224,\"caption\":\"FBK\"},\"image\":{\"@id\":\"https:\\\/\\\/www.fbk.eu\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity - FBK","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.fbk.eu\/en\/initiatives\/cybersecurity-new-page\/","og_locale":"en_US","og_type":"article","og_url":"https:\/\/www.fbk.eu\/en\/initiatives\/cybersecurity-new-page\/","og_site_name":"FBK","article_modified_time":"2025-01-21T09:36:04+00:00","og_image":[{"width":1600,"height":1067,"url":"https:\/\/www.fbk.eu\/wp-content\/uploads\/2023\/05\/SecurityAndTrust_Cybersecurity_Bolli_2.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_image":"https:\/\/www.fbk.eu\/wp-content\/themes\/fbk-foundation\/images\/opengraph-default.png","twitter_misc":{"Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.fbk.eu\/en\/initiatives\/cybersecurity-new-page\/","url":"https:\/\/www.fbk.eu\/en\/initiatives\/cybersecurity-new-page\/","name":"Cybersecurity - FBK","isPartOf":{"@id":"https:\/\/www.fbk.eu\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.fbk.eu\/en\/initiatives\/cybersecurity-new-page\/#primaryimage"},"image":{"@id":"https:\/\/www.fbk.eu\/en\/initiatives\/cybersecurity-new-page\/#primaryimage"},"thumbnailUrl":"https:\/\/www.fbk.eu\/wp-content\/uploads\/2023\/05\/SecurityAndTrust_Cybersecurity_Bolli_2.jpg","datePublished":"2024-11-21T08:40:49+00:00","dateModified":"2025-01-21T09:36:04+00:00","breadcrumb":{"@id":"https:\/\/www.fbk.eu\/en\/initiatives\/cybersecurity-new-page\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.fbk.eu\/en\/initiatives\/cybersecurity-new-page\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.fbk.eu\/en\/initiatives\/cybersecurity-new-page\/#primaryimage","url":"https:\/\/www.fbk.eu\/wp-content\/uploads\/2023\/05\/SecurityAndTrust_Cybersecurity_Bolli_2.jpg","contentUrl":"https:\/\/www.fbk.eu\/wp-content\/uploads\/2023\/05\/SecurityAndTrust_Cybersecurity_Bolli_2.jpg","width":1600,"height":1067,"caption":"Archivio FBK"},{"@type":"BreadcrumbList","@id":"https:\/\/www.fbk.eu\/en\/initiatives\/cybersecurity-new-page\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.fbk.eu\/en\/"},{"@type":"ListItem","position":2,"name":"Initiatives","item":"https:\/\/www.fbk.eu\/en\/initiatives\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.fbk.eu\/en\/#website","url":"https:\/\/www.fbk.eu\/en\/","name":"FBK","description":"Fondazione Bruno Kessler","publisher":{"@id":"https:\/\/www.fbk.eu\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.fbk.eu\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.fbk.eu\/en\/#organization","name":"FBK","url":"https:\/\/www.fbk.eu\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.fbk.eu\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.fbk.eu\/wp-content\/uploads\/2022\/02\/FBK_For-A-Human-Centered-AI.png","contentUrl":"https:\/\/www.fbk.eu\/wp-content\/uploads\/2022\/02\/FBK_For-A-Human-Centered-AI.png","width":549,"height":224,"caption":"FBK"},"image":{"@id":"https:\/\/www.fbk.eu\/en\/#\/schema\/logo\/image\/"}}]}},"meta_box":{"_banners":[],"_boxes":[],"_center_url":"","_center_numbers":[],"_center_vision":"","_center_mission":"","_center_director":[],"_center_magazine_url":"","_hubs":[],"_people":[],"_facts":[],"_humanities_and_social_sciences":[],"_companies":[],"_others":[],"_universities":[],"_science_and_technology":[],"_sidebar":""},"_links":{"self":[{"href":"https:\/\/www.fbk.eu\/en\/wp-json\/wp\/v2\/pages\/31070","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.fbk.eu\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.fbk.eu\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.fbk.eu\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fbk.eu\/en\/wp-json\/wp\/v2\/comments?post=31070"}],"version-history":[{"count":0,"href":"https:\/\/www.fbk.eu\/en\/wp-json\/wp\/v2\/pages\/31070\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.fbk.eu\/en\/wp-json\/wp\/v2\/pages\/1641"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fbk.eu\/en\/wp-json\/wp\/v2\/media\/26291"}],"wp:attachment":[{"href":"https:\/\/www.fbk.eu\/en\/wp-json\/wp\/v2\/media?parent=31070"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}