{"id":26333,"date":"2024-02-08T13:01:00","date_gmt":"2024-02-08T13:01:00","guid":{"rendered":"https:\/\/edukemy.com\/blog\/?p=26333"},"modified":"2024-02-08T13:01:05","modified_gmt":"2024-02-08T13:01:05","slug":"considering-the-threats-cyberspace-poses-for-the-country-india-needs-a-digital-armed-forces-to-prevent-crimes-critically-evaluate-the-national-cyber-security-policy-2013-outlining","status":"publish","type":"post","link":"https:\/\/edukemy.com\/blog\/considering-the-threats-cyberspace-poses-for-the-country-india-needs-a-digital-armed-forces-to-prevent-crimes-critically-evaluate-the-national-cyber-security-policy-2013-outlining\/","title":{"rendered":"Considering the threats cyberspace poses for the country, India needs a \u201cDigital Armed Forces\u201d to prevent crimes. Critically evaluate the National Cyber Security Policy, 2013 outlining the challenges perceived in its effective implementation. (250 Words 15 Marks)"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/edukemy.com\/upsc\/upsc-gs-advance-and-mentorship-program-ampcsat?utm_source=Blog&amp;utm_medium=Link&amp;utm_campaign=GS+Advanced\" target=\"_blank\" rel=\"noreferrer noopener\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1280\" height=\"300\" src=\"https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/07\/Attempt-our-Daily-Weekly-Current-Affairs-Quiz-now-8.png\" alt=\"\" class=\"wp-image-43397\" srcset=\"https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/07\/Attempt-our-Daily-Weekly-Current-Affairs-Quiz-now-8.png 1280w, https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/07\/Attempt-our-Daily-Weekly-Current-Affairs-Quiz-now-8-1170x274.png 1170w, https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/07\/Attempt-our-Daily-Weekly-Current-Affairs-Quiz-now-8-585x137.png 585w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/a><\/figure><\/div>\n\n\n<p>In an era where cyberspace has become increasingly pervasive, India finds itself confronted with a myriad of threats ranging from cyber espionage to malicious hacking attempts, necessitating the establishment of a robust defense mechanism. The concept of a &#8220;Digital Armed Forces&#8221; has emerged as a viable solution to combat these evolving cyber threats and safeguard the nation&#8217;s interests. However, the effectiveness of such a defense strategy is contingent upon the comprehensive implementation of cyber security policies. The National Cyber Security Policy of 2013 was a significant step towards addressing these concerns, aiming to protect the nation&#8217;s critical information infrastructure and enhance its cyber resilience. Nevertheless, the policy faces numerous challenges in its execution, hampering its efficacy. One of the primary hurdles lies in the complex and rapidly evolving nature of cyber threats, which often outpace the policy&#8217;s adaptation and response capabilities. Additionally, the lack of adequate resources, including skilled personnel and advanced technological infrastructure, poses a significant impediment to the policy&#8217;s successful implementation. Moreover, the fragmented nature of cyber governance in India, characterized by overlapping jurisdictions and a lack of coordination among various stakeholders, further exacerbates the challenges in effectively executing the policy. Furthermore, the absence of stringent enforcement mechanisms and accountability measures undermines the deterrence value of the policy, allowing cyber criminals to operate with impunity. Therefore, while the National Cyber Security Policy of 2013 represents a crucial milestone in India&#8217;s cyber defense strategy, addressing the aforementioned challenges is imperative to ensure its effectiveness in safeguarding the nation&#8217;s digital sovereignty.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><strong>Tag: Basics of cybersecurity.\u00a0<\/strong>\u00a0\u00a0<\/p><\/blockquote>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_73 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<label for=\"ez-toc-cssicon-toggle-item-69eadfeee185a\" class=\"ez-toc-cssicon-toggle-label\"><p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-cssicon\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-69eadfeee185a\"  \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/edukemy.com\/blog\/considering-the-threats-cyberspace-poses-for-the-country-india-needs-a-digital-armed-forces-to-prevent-crimes-critically-evaluate-the-national-cyber-security-policy-2013-outlining\/#Decoding_the_Question\" title=\"Decoding the Question:&nbsp;&nbsp;&nbsp;&nbsp;\">Decoding the Question:&nbsp;&nbsp;&nbsp;&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/edukemy.com\/blog\/considering-the-threats-cyberspace-poses-for-the-country-india-needs-a-digital-armed-forces-to-prevent-crimes-critically-evaluate-the-national-cyber-security-policy-2013-outlining\/#Answer\" title=\"Answer:&nbsp;&nbsp;&nbsp;&nbsp;\">Answer:&nbsp;&nbsp;&nbsp;&nbsp;<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/edukemy.com\/blog\/considering-the-threats-cyberspace-poses-for-the-country-india-needs-a-digital-armed-forces-to-prevent-crimes-critically-evaluate-the-national-cyber-security-policy-2013-outlining\/#National_Cyber_Security_Policy_In_2013_with_the_following_objective\" title=\"National Cyber Security Policy In 2013 with the following objective:&nbsp;&nbsp;&nbsp;\">National Cyber Security Policy In 2013 with the following objective:&nbsp;&nbsp;&nbsp;<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/edukemy.com\/blog\/considering-the-threats-cyberspace-poses-for-the-country-india-needs-a-digital-armed-forces-to-prevent-crimes-critically-evaluate-the-national-cyber-security-policy-2013-outlining\/#In_case_you_still_have_your_doubts_contact_us_on_9811333901\" title=\"In case you still have your doubts, contact us on 9811333901.&nbsp;\">In case you still have your doubts, contact us on 9811333901.&nbsp;<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/edukemy.com\/blog\/considering-the-threats-cyberspace-poses-for-the-country-india-needs-a-digital-armed-forces-to-prevent-crimes-critically-evaluate-the-national-cyber-security-policy-2013-outlining\/#Visit_our_YouTube_Channel_%E2%80%93_here\" title=\"Visit our YouTube Channel &#8211;&nbsp;here\">Visit our YouTube Channel &#8211;&nbsp;here<\/a><\/li><\/ul><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Decoding_the_Question\"><\/span><strong>Decoding the Question:&nbsp;&nbsp;<\/strong>&nbsp;&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>In Introduction, start your answer by writing data regarding India\u2019s cybersecurity vulnerability.&nbsp;<\/strong>&nbsp;&nbsp;<\/li><li><strong>In Body,&nbsp;<\/strong>&nbsp;&nbsp;<\/li><li><strong>write in brief about cyber threats and the need for \u201cDigital Armed Forces\u201d to prevent cybercrimes.&nbsp;&nbsp;<\/strong>&nbsp;&nbsp;<\/li><li><strong>In the second part of the answer, write about the strengths and weaknesses of National Cyber Security Policy 2013.&nbsp;<\/strong>&nbsp;&nbsp;<\/li><li><strong>In conclusion, write suggestions to improve the overall cybersecurity framework in the country.&nbsp;&nbsp;<\/strong>&nbsp;&nbsp;<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Answer\"><\/span><strong>Answer:&nbsp;&nbsp;<\/strong>&nbsp;&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Information technology (IT) has exposed the user to a huge data bank of information regarding everything and anything. However, it has also added a new dimension to crime and has left the sensitive and often secret information at risk of exposure. According to <strong>\u2018Internet Security Threat Report\u2019<\/strong> India emerged as the third most vulnerable country in terms of the risk of cyber threats such as malware, spam, and ransomware. In 2017, moving up one place over the previous year, according to a report by security solutions provider Symantec.&nbsp; As per the report,<strong> India continues to be second most<\/strong> impacted by spam and bots, third most impacted by network attacks and fourth most impacted by ransomware.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/edukemy.com\/upsc\/upsc-essay?utm_source=Blog&amp;utm_medium=Banner&amp;utm_campaign=Essay\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" width=\"1280\" height=\"300\" data-src=\"https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/06\/10.png\" alt=\"\" class=\"wp-image-42412 lazyload\" data-srcset=\"https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/06\/10.png 1280w, https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/06\/10-1170x274.png 1170w, https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/06\/10-585x137.png 585w\" data-sizes=\"(max-width: 1280px) 100vw, 1280px\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" style=\"--smush-placeholder-width: 1280px; --smush-placeholder-aspect-ratio: 1280\/300;\" \/><\/a><figcaption><a href=\"https:\/\/edukemy.com\/upsc\/upsc-essay?utm_source=Blog&amp;utm_medium=Link&amp;utm_campaign=Essay\">UPSC Essay Course<\/a><\/figcaption><\/figure>\n\n\n\n<p><strong>The new age of warfare is taking place in cyber and digital space which showcased the need for \u201cDigital Armed Forces\u201d to prevent cyber warfare and cyber crimes:<\/strong>&nbsp;&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Saving Critical Infrastructure:<\/strong> Power &amp; Energy, Banking, Financial Services &amp; Insurance, Telecom, Transport, Government Strategic &amp; Public Enterprises,\u00a0 these are very critical from the national security and economic point of view. Any cyber-attack on these critical infrastructures will be a serious blow to the national economy. For example, last year Chinese cyber-attacks caused a blackout in Mumbai.\u00a0\u00a0\u00a0\u00a0<\/li><li><strong>Protecting Individual Data: <\/strong>In the Digital world, people spend a significant amount of time on the internet which leads to an increase in the digital footprints of citizens. Increasing digital financial transactions made cybercriminals take out sensitive information and make financial frauds. For example, last year\u2019s SBI\u2019s debit card information was compromised. \u00a0<\/li><li><strong>National Security: <\/strong>Cyber-attacks are new weapons to carry attacks and make significant damage without involving in a real conflict. As per the Government report during and after the Galwan valley incident China has carried thousands of cyber-attacks.\u00a0\u00a0\u00a0<\/li><li><strong>Hostile Neighbours: <\/strong>Hostile neighbors, China and Pakistan, are now coming together to carry out cyberattacks against India. Virtual partnership for causing damage to the national economy, compromising military communications, and vital security installations are the main targets of both nations.\u00a0\u00a0\u00a0<\/li><li><strong>Cyber Frauds: <\/strong>Cybercriminals steal personal information and later ask for a ransom to give up sensitive information. Cybercrimes such as pornography, blackmailing, defaming one\u2019s image, etc. are taking place which needs to be handled very effectively and create deterrence among cybercriminals.\u00a0\u00a0\u00a0<\/li><li><strong>Spreading Misinformation: <\/strong>Spreading misinformation in the digital era is becoming rampant. For example, during the Delhi riots, the CAA protest, violence in universities, etc. are spread by WhatsApp, Facebook, and various other social media sites.\u00a0\u00a0\u00a0<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"National_Cyber_Security_Policy_In_2013_with_the_following_objective\"><\/span><strong>National Cyber Security Policy In 2013 with the following objective:<\/strong>&nbsp;&nbsp;&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>To create a secure cyber ecosystem in the country, generate adequate trust &amp; confidence in IT systems and transactions in cyberspace, and thereby enhance adoption of IT in all sectors of the economy.&nbsp;&nbsp;&nbsp;<\/li><li>To create an assurance framework for the design of security policies and for promotion and enabling actions for compliance to global security standards and best practices by way of conformity assessment (product, process, technology &amp; people).&nbsp;&nbsp;&nbsp;<\/li><li>To strengthen the Regulatory framework for ensuring a Secure Cyberspace ecosystem.&nbsp;&nbsp;&nbsp;<\/li><li>To enhance and create National and Sectoral level 24 x 7 mechanisms for obtaining strategic information regarding threats to ICT infrastructure, creating scenarios for response, resolution, and crisis management through effective predictive, preventive, protective, response, and recovery actions.&nbsp;&nbsp;&nbsp;<\/li><li>To enhance the protection and resilience of the Nation\u2019s critical information infrastructure by operating a 24&#215;7 National Critical Information Infrastructure Protection Centre (NCIIPC) and mandating security practices related to the design, acquisition, development, use, and operation of information resources.&nbsp;&nbsp;&nbsp;<\/li><li>To create a workforce of 500,000 professionals skilled in cybersecurity in the next 5 years through capacity building, skill development, and training.&nbsp;&nbsp;&nbsp;<\/li><li>To develop effective public-private partnerships and collaborative engagements through technical and operational cooperation and contribution for enhancing the security of cyberspace.&nbsp;&nbsp;&nbsp;<\/li><li>To enhance global cooperation by promoting shared understanding and leveraging relationships for furthering the cause of security of cyberspace.&nbsp;&nbsp;&nbsp;<\/li><\/ul>\n\n\n\n<p><strong>However, all these objectives are not immediately feasible and have also left certain gaps in the overall envisaged framework, such as:<\/strong>&nbsp;&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>&nbsp;No clear regulatory framework is suggested and at present all the cyber departments under police and armed forces are working independently and often with parallel authority. Ideally a nodal body must be formed under NSA.&nbsp;&nbsp;<\/li><li>In order to start with this task Computer Emergency Response Team (CERT-In) has been designated to act as a nodal agency for coordination of crisis management efforts, but it comes into picture only for crisis management and not for regular monitoring, making it further confusing.&nbsp;&nbsp;&nbsp;<\/li><li>&nbsp;The provisions to take care of security risks emanating due to use of new technologies, e.g., Cloud Computing, has not been addressed.&nbsp;&nbsp;&nbsp;<\/li><li>Another area which is left untouched by this policy is tackling the risks arising due to increased use of social networking sites by criminals and anti-national elements.&nbsp;&nbsp;<\/li><\/ul>\n\n\n\n<p>The policy should also address the need for an integrated national cybersecurity structure, with enhancing cooperation among various agencies or creating one single body to coordinate and save the country from cyber threats. The key to success of this policy lies in its effective implementation. The much talked about public-private partnership in this policy, if implemented in true spirit, will go a long way in creating solutions to the ever-changing threat landscape.\u00a0\u00a0\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/edukemy.com\/upsc\/upsc-essay?utm_source=Blog&amp;utm_medium=Banner&amp;utm_campaign=Essay\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" data-src=\"https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/06\/UPSC-Essay-Course-1280\u00d7300-1-3.svg\" alt=\"\" class=\"wp-image-42688 lazyload\" width=\"781\" height=\"182\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" style=\"--smush-placeholder-width: 781px; --smush-placeholder-aspect-ratio: 781\/182;\" \/><\/a><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"In_case_you_still_have_your_doubts_contact_us_on_9811333901\"><\/span><strong>In case you still have your doubts, contact us on 9811333901.<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>For UPSC Prelims Resources,&nbsp;<a href=\"https:\/\/edukemy.com\/upsc-cse-prelims-resource-centre\" target=\"_blank\" rel=\"noreferrer noopener\">Click here<\/a><\/p>\n\n\n\n<p>For Daily Updates and Study Material:<\/p>\n\n\n\n<p>Join our Telegram Channel &#8211;&nbsp;<a href=\"https:\/\/t.me\/WithEdukemy4IAS\" target=\"_blank\" rel=\"noreferrer noopener\">Edukemy for IAS<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>1. Learn through Videos &#8211;&nbsp;<a href=\"https:\/\/bit.ly\/3vOD8sU\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a><\/li><li>2. Be Exam Ready by Practicing Daily MCQs &#8211;&nbsp;<a href=\"https:\/\/bit.ly\/3Q9z2nF\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a><\/li><li>3. Daily Newsletter &#8211; Get all your Current Affairs Covered &#8211;&nbsp;<a href=\"https:\/\/bit.ly\/3bE2y5J\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a><\/li><li>4. Mains Answer Writing Practice &#8211;&nbsp;<a href=\"https:\/\/bit.ly\/3mZuVxl\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a><\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Visit_our_YouTube_Channel_%E2%80%93_here\"><\/span>Visit our YouTube Channel &#8211;&nbsp;<a href=\"https:\/\/www.youtube.com\/@ShabbirsEduKemyforIAS\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a><span class=\"ez-toc-section-end\"><\/span><\/h4>\n","protected":false},"excerpt":{"rendered":"<p>Therefore, while the National Cyber Security Policy of 2013 represents a crucial milestone in India&#8217;s cyber defense strategy, addressing the aforementioned challenges is imperative to ensure its effectiveness in safeguarding the nation&#8217;s digital sovereignty.<\/p>\n","protected":false},"author":17,"featured_media":26334,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[1524],"tags":[1810,142,145,140],"class_list":["post-26333","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-upsc-mains-solved-paper-gs-3","tag-national-cyber-security-policy","tag-previous_year_questions","tag-upsc-mains-question-paper","tag-upsc_preparation_strategy"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/posts\/26333","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/comments?post=26333"}],"version-history":[{"count":1,"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/posts\/26333\/revisions"}],"predecessor-version":[{"id":26335,"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/posts\/26333\/revisions\/26335"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/media\/26334"}],"wp:attachment":[{"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/media?parent=26333"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/categories?post=26333"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/tags?post=26333"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}