{"id":23716,"date":"2024-01-27T08:41:29","date_gmt":"2024-01-27T08:41:29","guid":{"rendered":"https:\/\/edukemy.com\/blog\/?p=23716"},"modified":"2024-01-27T08:41:32","modified_gmt":"2024-01-27T08:41:32","slug":"discuss-the-potential-threats-of-cyber-attacks-and-the-security-framework-to-prevent-them-150-words-10-marks","status":"publish","type":"post","link":"https:\/\/edukemy.com\/blog\/discuss-the-potential-threats-of-cyber-attacks-and-the-security-framework-to-prevent-them-150-words-10-marks\/","title":{"rendered":"Discuss the potential threats of Cyber-attacks and the security framework to prevent them. (150 Words, 10 Marks)"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/edukemy.com\/upsc\/upsc-gs-advance-and-mentorship-program-ampcsat?utm_source=Blog&amp;utm_medium=Link&amp;utm_campaign=GS+Advanced\" target=\"_blank\" rel=\"noreferrer noopener\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1280\" height=\"300\" src=\"https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/07\/Attempt-our-Daily-Weekly-Current-Affairs-Quiz-now-8.png\" alt=\"\" class=\"wp-image-43397\" srcset=\"https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/07\/Attempt-our-Daily-Weekly-Current-Affairs-Quiz-now-8.png 1280w, https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/07\/Attempt-our-Daily-Weekly-Current-Affairs-Quiz-now-8-1170x274.png 1170w, https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/07\/Attempt-our-Daily-Weekly-Current-Affairs-Quiz-now-8-585x137.png 585w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/a><\/figure><\/div>\n\n\n<p>In an era dominated by digital connectivity and technological advancement, the specter of cyber-attacks looms ominously, posing substantial threats to individuals, organizations, and nations alike. Cybersecurity has become a paramount concern as malevolent actors continually devise sophisticated techniques to exploit vulnerabilities in the digital realm. The potential threats encompass a wide array of malicious activities, ranging from data breaches and identity theft to ransomware attacks and state-sponsored cyber espionage. To counteract these evolving threats, a robust security framework is imperative. Such a framework must employ a multifaceted approach, integrating cutting-edge technologies, stringent policies, and proactive strategies. This involves continuous monitoring, encryption protocols, user authentication mechanisms, and timely updates to software and systems. Moreover, fostering cybersecurity awareness and cultivating a culture of vigilance are pivotal in fortifying the collective defense against cyber threats. The evolving nature of cyber-attacks necessitates an adaptive and comprehensive security framework that not only reacts to current threats but also anticipates and mitigates emerging risks.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><strong>Tag: <\/strong>Challenges to internal security through a communication network, the role of media and social networking sites in internal security challenges, basics of cyber security.\u00a0\u00a0\u00a0<\/p><\/blockquote>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_73 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<label for=\"ez-toc-cssicon-toggle-item-69d5b307af3f4\" class=\"ez-toc-cssicon-toggle-label\"><p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-cssicon\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-69d5b307af3f4\"  \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/edukemy.com\/blog\/discuss-the-potential-threats-of-cyber-attacks-and-the-security-framework-to-prevent-them-150-words-10-marks\/#Decoding_the_Question\" title=\"Decoding the Question:&nbsp;&nbsp;&nbsp;&nbsp;\">Decoding the Question:&nbsp;&nbsp;&nbsp;&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/edukemy.com\/blog\/discuss-the-potential-threats-of-cyber-attacks-and-the-security-framework-to-prevent-them-150-words-10-marks\/#Answer\" title=\"Answer:&nbsp;&nbsp;&nbsp;\">Answer:&nbsp;&nbsp;&nbsp;<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/edukemy.com\/blog\/discuss-the-potential-threats-of-cyber-attacks-and-the-security-framework-to-prevent-them-150-words-10-marks\/#Potential_Threats_of_Cyber-attack\" title=\"Potential Threats of Cyber-attack:&nbsp;&nbsp;&nbsp;\">Potential Threats of Cyber-attack:&nbsp;&nbsp;&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/edukemy.com\/blog\/discuss-the-potential-threats-of-cyber-attacks-and-the-security-framework-to-prevent-them-150-words-10-marks\/#Initiatives_are_being_taken_by_the_government_to_enhance_cyber-security_in_India\" title=\"Initiatives are being taken by the government to enhance cyber-security in India:&nbsp;&nbsp;\">Initiatives are being taken by the government to enhance cyber-security in India:&nbsp;&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/edukemy.com\/blog\/discuss-the-potential-threats-of-cyber-attacks-and-the-security-framework-to-prevent-them-150-words-10-marks\/#Way_Forward\" title=\"Way Forward:&nbsp;&nbsp;\">Way Forward:&nbsp;&nbsp;<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/edukemy.com\/blog\/discuss-the-potential-threats-of-cyber-attacks-and-the-security-framework-to-prevent-them-150-words-10-marks\/#In_case_you_still_have_your_doubts_contact_us_on_9811333901\" title=\"In case you still have your doubts, contact us on 9811333901.&nbsp;\">In case you still have your doubts, contact us on 9811333901.&nbsp;<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/edukemy.com\/blog\/discuss-the-potential-threats-of-cyber-attacks-and-the-security-framework-to-prevent-them-150-words-10-marks\/#Visit_our_YouTube_Channel_%E2%80%93_here\" title=\"Visit our YouTube Channel &#8211;&nbsp;here\">Visit our YouTube Channel &#8211;&nbsp;here<\/a><\/li><\/ul><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Decoding_the_Question\"><\/span><strong>Decoding the Question:&nbsp;<\/strong>&nbsp;&nbsp;&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>In Intro,\u00a0 try to write data about cyber-attacks with examples.<\/strong>\u00a0\u00a0\u00a0<\/li><li><strong>In Body,<\/strong>\u00a0\u00a0\u00a0<\/li><li><strong>Discuss potential threats of cyber attacks.\u00a0<\/strong>\u00a0\u00a0\u00a0<\/li><li><strong>Security measures to prevent cyber attacks.<\/strong>\u00a0\u00a0\u00a0<\/li><li><strong>Try to conclude with the need to strengthen cyber security measures.<\/strong>\u00a0\u00a0\u00a0<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Answer\"><\/span><strong>Answer:<\/strong>&nbsp;&nbsp;&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>The number of people having access to the internet In India is increasing day by day. Despite the untapped potential, India already is the 2nd largest online market worldwide. Although the advancement of technology and the internet has brought with it all related benefits but has also led to an increase in cybercrime affecting people globally. Crimes like the Pegasus snooping scandal, the Wannacry attack have shown the vulnerability of India to cyber-crime threats.\u00a0\u00a0<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Potential_Threats_of_Cyber-attack\"><\/span><strong>Potential Threats of Cyber-attack:<\/strong>&nbsp;&nbsp;&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Breach of National Security<\/strong>: Cyber attack is a proxy war method, and it can potentially harm national security and do a lot of damage without having the actual war.\u00a0\u00a0\u00a0\u00a0<\/li><li>For example, Cyber-attacks on nuclear power facilities can cause indirect nuclear war. This may lead to serious implications on national wealth and human lives.\u00a0\u00a0\u00a0<\/li><li><strong>Dangerous to Financial Integrity: <\/strong>Cyber attackers are targeting more countries&#8217; financial systems. For example, in 2017 hackers attacked Union Bank of India and they tried to initiate a fund transfer of about 170 million dollars. Rising cyber-attacks on India\u2019s financial institutions have become a potential danger for countries financial integrity.\u00a0\u00a0\u00a0<\/li><li><strong>Intellectual Property Rights Theft: <\/strong>As per NITI Ayog cyber attackers are targeting countries&#8217; intellectual property and by theft of this data they can sell this to multinational companies in exchange for a large sum. This is a potential theft of data related to traditional knowledge of India.\u00a0\u00a0\u00a0<\/li><li><strong>Hacktivism:<\/strong> These are the cyber protests that are socially or politically motivated. It includes mobile devices and applications and their associated Cyber Attacks, which led to riots and the spread of communal tensions. This has been seen in the Delhi riots, the Covid-19 pandemic, etc.\u00a0\u00a0\u00a0<\/li><li><strong>Threat to Critical Infrastructure: <\/strong>China has been attacking critical infrastructure like the electric grid, telecommunications, banking system, sensitive government websites, air traffic control, etc.\u00a0\u00a0\u00a0\u00a0<\/li><li>For example, the Mumbai blackout was suspected with China\u2019s hand.\u00a0\u00a0\u00a0<\/li><li><strong>Data theft<\/strong>: Ransomware attacks made to make money by cyber attackers by stealing personal information like banking data, credit card, debit card information etc. This has been seen as an increasing phenomenon and every year thousands of cyber-attacks are carried out.\u00a0\u00a0\u00a0<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/edukemy.com\/upsc\/upsc-essay?utm_source=Blog&amp;utm_medium=Banner&amp;utm_campaign=Essay\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" width=\"1280\" height=\"300\" data-src=\"https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/06\/10.png\" alt=\"\" class=\"wp-image-42412 lazyload\" data-srcset=\"https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/06\/10.png 1280w, https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/06\/10-1170x274.png 1170w, https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/06\/10-585x137.png 585w\" data-sizes=\"(max-width: 1280px) 100vw, 1280px\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" style=\"--smush-placeholder-width: 1280px; --smush-placeholder-aspect-ratio: 1280\/300;\" \/><\/a><figcaption><a href=\"https:\/\/edukemy.com\/upsc\/upsc-essay?utm_source=Blog&amp;utm_medium=Link&amp;utm_campaign=Essay\">UPSC Essay Course<\/a><\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Initiatives_are_being_taken_by_the_government_to_enhance_cyber-security_in_India\"><\/span><strong>Initiatives are being taken by the government to enhance cyber-security in India:<\/strong>&nbsp;&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Information Act, 2000: <\/strong>The Information Act, 2000 (amended in 2008) is the primary law for dealing with cybercrime and digital commerce in India.\u00a0\u00a0<\/li><li><strong>National Cyber Security Policy, 2013: <\/strong>The policy provides the vision and strategic direction to protect the national cyberspace.\u00a0\u00a0<\/li><li><strong>The CERT-In (Cyber Emergency Response Team \u2013 India):<\/strong> CERT-In has been operational since 2004. It is the national nodal agency for responding to computer security incidents as and when they occur.\u00a0\u00a0<\/li><li><strong>Indian Cyber Crime Coordination Centre (I4C): <\/strong>The Union Government has decided to set up 14C. It will be an apex coordination center to deal with cybercrimes.\u00a0\u00a0<\/li><li><strong>Cyber Swachhta Kendra<\/strong>: Launched in early 2017, the Cyber Swachhta Kendra provides a platform for users to analyze and clean their systems of various viruses, bots\/ malware, Trojans, etc.\u00a0\u00a0<\/li><li><strong>Cyber Surakshit Bharat:<\/strong> The Ministry of Electronics and Information Technology, launched the Cyber Surakshit Bharat initiative to spread awareness about cybercrime and build capacity for safety measures for Chief Information Security Officers (CISOs) and frontline IT staff across all government departments.\u00a0\u00a0<\/li><li><strong>The Cyber Warrior Police Force:<\/strong> In 2018, the government announced its plans to introduce CWPF. It is proposed to be raised on lines of the Central Armed Police Force (CAPF).\u00a0\u00a0<\/li><li><strong>Cybercrime Prevention against Women &amp; Children<\/strong> <strong>Scheme<\/strong>: Implemented by the Ministry of Home Affairs, the scheme aims to prevent and reduce cyber crimes against women and children.\u00a0\u00a0<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Way_Forward\"><\/span><strong>Way Forward:<\/strong>&nbsp;&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>Building capabilities: <\/strong>There is an urgent need to build capabilities and capacity for application, equipment, and infrastructure testing.\u00a0\u00a0<\/li><li><strong>Human resource<\/strong>: Immediate attention has to be given to human resource development which would increase the number of experts who can effectively manage the cyber security of the country.\u00a0\u00a0<\/li><li><strong>R&amp;D:<\/strong> Investments should be made in R&amp;D to develop more innovative technologies to address increasing cyber security threats.\u00a0\u00a0<\/li><li><strong>Policy and Governance: <\/strong>It is important to bring a robust policy and effectively implement the same. Further, duties and responsibilities should be defined clearly for smooth functioning and better coordination among departments and stakeholders.\u00a0\u00a0<\/li><li><strong>Awareness: <\/strong>A periodic awareness campaign by the government and big private organizations should be conducted to aware people of cyber security threats.\u00a0\u00a0<\/li><li><strong>Strengthening Private Partnership<\/strong>: It is important to strengthen the public-private partnership on cyber security.\u00a0\u00a0<\/li><\/ol>\n\n\n\n<p>Therefore, many measures have been taken to secure countries&#8217; cyberspace but there is a lot that needs to be done. International cooperation, and bilateral cooperation with countries like the USA, Australia, and Japan are needed. Although the government has taken many proactive steps, much needs to be done to enhance the country\u2019s cyber security. It is important to bring a robust policy and effectively implement the same. Cyber security needs constant evolution at institutional, policy level, and government levels.\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/edukemy.com\/upsc\/upsc-essay?utm_source=Blog&amp;utm_medium=Banner&amp;utm_campaign=Essay\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" data-src=\"https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/06\/UPSC-Essay-Course-1280\u00d7300-1-3.svg\" alt=\"\" class=\"wp-image-42688 lazyload\" width=\"781\" height=\"182\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" style=\"--smush-placeholder-width: 781px; --smush-placeholder-aspect-ratio: 781\/182;\" \/><\/a><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"In_case_you_still_have_your_doubts_contact_us_on_9811333901\"><\/span><strong>In case you still have your doubts, contact us on 9811333901.<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>For UPSC Prelims Resources,&nbsp;<a href=\"https:\/\/edukemy.com\/upsc-cse-prelims-resource-centre\" target=\"_blank\" rel=\"noreferrer noopener\">Click here<\/a><\/p>\n\n\n\n<p>For Daily Updates and Study Material:<\/p>\n\n\n\n<p>Join our Telegram Channel &#8211;&nbsp;<a href=\"https:\/\/t.me\/WithEdukemy4IAS\" target=\"_blank\" rel=\"noreferrer noopener\">Edukemy for IAS<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>1. Learn through Videos &#8211;&nbsp;<a href=\"https:\/\/bit.ly\/3vOD8sU\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a><\/li><li>2. Be Exam Ready by Practicing Daily MCQs &#8211;&nbsp;<a href=\"https:\/\/bit.ly\/3Q9z2nF\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a><\/li><li>3. Daily Newsletter &#8211; Get all your Current Affairs Covered &#8211;&nbsp;<a href=\"https:\/\/bit.ly\/3bE2y5J\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a><\/li><li>4. Mains Answer Writing Practice &#8211;&nbsp;<a href=\"https:\/\/bit.ly\/3mZuVxl\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a><\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Visit_our_YouTube_Channel_%E2%80%93_here\"><\/span>Visit our YouTube Channel &#8211;&nbsp;<a href=\"https:\/\/www.youtube.com\/@ShabbirsEduKemyforIAS\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a><span class=\"ez-toc-section-end\"><\/span><\/h4>\n","protected":false},"excerpt":{"rendered":"<p>The evolving nature of cyber-attacks necessitates an adaptive and comprehensive security framework that not only reacts to current threats but also anticipates and mitigates emerging risks.<\/p>\n","protected":false},"author":17,"featured_media":23717,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[1524],"tags":[1532,177,142,232,145,140],"class_list":["post-23716","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-upsc-mains-solved-paper-gs-3","tag-cyber-attacks","tag-general-studies-3","tag-previous_year_questions","tag-upsc","tag-upsc-mains-question-paper","tag-upsc_preparation_strategy"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/posts\/23716","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/comments?post=23716"}],"version-history":[{"count":1,"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/posts\/23716\/revisions"}],"predecessor-version":[{"id":23718,"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/posts\/23716\/revisions\/23718"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/media\/23717"}],"wp:attachment":[{"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/media?parent=23716"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/categories?post=23716"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/tags?post=23716"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}