
 

{"id":645,"date":"2022-06-16T11:29:06","date_gmt":"2022-06-16T11:29:06","guid":{"rendered":"https:\/\/pinetech.in\/blog\/?p=645"},"modified":"2022-07-05T13:17:39","modified_gmt":"2022-07-05T13:17:39","slug":"role-of-ethical-hacking-in-cyber-security","status":"publish","type":"post","link":"https:\/\/pinetech.in\/blog\/role-of-ethical-hacking-in-cyber-security\/","title":{"rendered":"Role of Ethical Hacking in Cyber Security"},"content":{"rendered":"<div class=\"webtraffic-intro\">In today\u2019s times we humans are highly tech savvy with the extensive use of the internet so the demand for Software Development Companies are rising. There is a great challenge in protecting all our digital data. Cyber-attacks can be of different forms. To avoid these attacks cyber security is implemented. Cyber security can be defined as the practice of protecting networks, programs, computer systems and their components from unauthorized digital attacks. These illegal attacks are often referred to as hacking.<br \/>\nHacking means exploiting weakness in a computer network to gain an unauthorized entry to information. This is a person who tries to hack into a computer. It is a mistaken belief that hacking is always wrong. There are hackers who work with different motives.<\/div>\n<h5>Types of hackers<\/h5>\n<ul class=\"blog-points-Numeric\">\n<li><strong>1<\/strong><br \/>\n<h6>Black Hat hackers<\/h6>\n<p>Black Hat hackers are people who illegally hack into a system for monetary gain.<\/li>\n<li><strong>2<\/strong><br \/>\n<h6>White hat hackers<\/h6>\n<p>White hat hackers are mainly security researchers and penetration testers. White hat hackers often define the system\u2019s vulnerabilities by hacking into it with permission, to defend the organization. This is perfectly legal and ethical. White hat hackers are also known as ethical hackers.<\/li>\n<li><strong>3<\/strong><br \/>\n<h6>Gray hat hackers<\/h6>\n<p>As the name suggests the color gray is a combination of both white and black these hackers find vulnerabilities in the system and inform it to the owner of the system, which is a good act. They still do this without having the owner\u2019s permission. Sometimes, these hackers also ask for money in return for the discovered vulnerabilities.<\/li>\n<\/ul>\n<h5>What Is Ethical Hacking?<\/h5>\n<p>Ethical Hacking is a legal way of hacking. Software Development Companies hire computer geeks to test system security, find vulnerabilities, and provide analysis on how to improve the firewall. It also supports the government agencies to find and locate potential threats to national security.<\/p>\n<p>People who have approval to hack computer systems are known as \u2018ethical hackers.\u2019 These hackers are authorized to hack according to the clients\u2019 instructions. Once the vulnerabilities are found, the hackers present a \u2018maturity scorecard,\u2019 which cites the level of risk, the amount of loopholes in the security, and suggests improvements if needed.<\/p>\n<h5>Types of Ethical Hacking<\/h5>\n<ul class=\"blog-points-Numeric\">\n<li><strong>1<\/strong><br \/>\n<h6>Network Hacking<\/h6>\n<p>Network hacking conveys the use of tools like Ping, Telnet, Netstat, Tracert, NS lookup, and more to hack a network system with criminal intention.<\/li>\n<li><strong>2<\/strong><br \/>\n<h6>Website Hacking<\/h6>\n<p>Hackers attain unlawful control over the web server and its related software, containing databases and other interfaces with website hacking.<\/li>\n<li><strong>3<\/strong><br \/>\n<h6>Computer Hacking<\/h6>\n<p>Computer hacking is basically unauthorized entry into a computer system after stealing User IDs and passwords.<\/li>\n<li><strong>4<\/strong><br \/>\n<h6>Password Hacking<\/h6>\n<p>Hackers utilize unlawful means to get passwords stored or transmitted by a system.<\/li>\n<li><strong>5<\/strong><br \/>\n<h6>Email Hacking<\/h6>\n<p>Email Hacking is getting unauthorized control of an email account and utilizing it to send out spam emails, third-party threats, and other unlawful, harmful stuff.<\/li>\n<\/ul>\n<h5>Cyber Security with White Hat Hackers<\/h5>\n<p>An ethical hacker goes through the server and network security of the company and identifies the vulnerabilities through which a black-hat hacker can attack. He is also allowed to penetrate into the target network.<\/p>\n<p>The white-hat or ethical hacker plays a crucial role in network and data security and discovers the weak spots and can inform about the specific vulnerabilities so that the authorities can further move on to the same lime.<\/p>\n<p>The need for Ethical Hackers came into necessity when networks and servers of organizations and government bodies were violated thoroughly. Given below are some of the reasons that describe the need to hire an ethical hacker<\/p>\n<ul class=\"blog-points\">\n<li>To develop solutions that would protect the data and network from malicious attacks<\/li>\n<li>To understand which of the security measures are useful and which ones need upgradation, and which are not capable enough to withstand an attack.<\/li>\n<li>To make decisions about how and where to improve data security.<\/li>\n<li>To make security awareness at all levels in a company.<\/li>\n<li>To increase data and network security standards and make them impossible to breach.<\/li>\n<\/ul>\n<h5>Requirement and Advantages of Ethical Hacking:<\/h5>\n<p>Ethical hacking goes together with \u2018Penetration Testing\u2019 and most often are the same ideas. However, ethical hacking covers a great deal more than just penetration testing.<\/p>\n<p>An organization recruits an ethical hacker to penetrate the online defenses of a computer network and identify the vulnerabilities it may present to an attacker and develop solutions to avoid data breaches the security of the organization\u2019s data. Ethical Hacking avoids data breaches and safeguards businesses from cyber terrorists.<\/p>\n<h5>Here are a few benefits of ethical hacking for businesses<\/h5>\n<ul class=\"blog-points\">\n<li>Testing Security Measures<\/li>\n<li>Identifying Vulnerable Areas<\/li>\n<li>Determining the Techniques and Approach of Hacker<\/li>\n<li>Finding and preparing for a cyber-attack<\/li>\n<li>Security Awareness to a data or network breach<\/li>\n<\/ul>\n<h5>Wrapping up<\/h5>\n<p>As the complexity of security threats have increased, the need for ethical hackers and their importance around the world is multiplying rapidly. Utilizing a driven approach and outlook towards security can help organizations protect their reputation effectively.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In today\u2019s times we humans are highly tech savvy with the extensive use of the internet so the demand for Software Development Companies are rising. There is a great challenge in protecting all our digital data. Cyber-attacks can be of different forms. To avoid these attacks cyber security is implemented. Cyber security can be defined [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":694,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[25],"class_list":["post-645","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-ethical-hacking-in-cyber-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Role of Ethical Hacking in Cyber Security - Pinetech<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pinetech.in\/blog\/role-of-ethical-hacking-in-cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Role of Ethical Hacking in Cyber Security - Pinetech\" \/>\n<meta property=\"og:description\" content=\"In today\u2019s times we humans are highly tech savvy with the extensive use of the internet so the demand for Software Development Companies are rising. There is a great challenge in protecting all our digital data. Cyber-attacks can be of different forms. To avoid these attacks cyber security is implemented. Cyber security can be defined [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pinetech.in\/blog\/role-of-ethical-hacking-in-cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Pinetech\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-16T11:29:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-05T13:17:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pinetech.in\/blog\/wp-content\/uploads\/2022\/06\/ethical_hack.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1369\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"pinetech\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"pinetech\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/pinetech.in\/blog\/role-of-ethical-hacking-in-cyber-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/pinetech.in\/blog\/role-of-ethical-hacking-in-cyber-security\/\"},\"author\":{\"name\":\"pinetech\",\"@id\":\"https:\/\/pinetech.in\/blog\/#\/schema\/person\/4fa443202c22d5bbd9c9dda3b3da93fc\"},\"headline\":\"Role of Ethical Hacking in Cyber Security\",\"datePublished\":\"2022-06-16T11:29:06+00:00\",\"dateModified\":\"2022-07-05T13:17:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/pinetech.in\/blog\/role-of-ethical-hacking-in-cyber-security\/\"},\"wordCount\":817,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/pinetech.in\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/pinetech.in\/blog\/role-of-ethical-hacking-in-cyber-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/pinetech.in\/blog\/wp-content\/uploads\/2022\/06\/ethical_hack.jpg\",\"keywords\":[\"Ethical Hacking in Cyber Security\"],\"articleSection\":[\"Cyber security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/pinetech.in\/blog\/role-of-ethical-hacking-in-cyber-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/pinetech.in\/blog\/role-of-ethical-hacking-in-cyber-security\/\",\"url\":\"https:\/\/pinetech.in\/blog\/role-of-ethical-hacking-in-cyber-security\/\",\"name\":\"Role of Ethical Hacking in Cyber Security - Pinetech\",\"isPartOf\":{\"@id\":\"https:\/\/pinetech.in\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/pinetech.in\/blog\/role-of-ethical-hacking-in-cyber-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/pinetech.in\/blog\/role-of-ethical-hacking-in-cyber-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/pinetech.in\/blog\/wp-content\/uploads\/2022\/06\/ethical_hack.jpg\",\"datePublished\":\"2022-06-16T11:29:06+00:00\",\"dateModified\":\"2022-07-05T13:17:39+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/pinetech.in\/blog\/role-of-ethical-hacking-in-cyber-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/pinetech.in\/blog\/role-of-ethical-hacking-in-cyber-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/pinetech.in\/blog\/role-of-ethical-hacking-in-cyber-security\/#primaryimage\",\"url\":\"https:\/\/pinetech.in\/blog\/wp-content\/uploads\/2022\/06\/ethical_hack.jpg\",\"contentUrl\":\"https:\/\/pinetech.in\/blog\/wp-content\/uploads\/2022\/06\/ethical_hack.jpg\",\"width\":1369,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/pinetech.in\/blog\/role-of-ethical-hacking-in-cyber-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/pinetech.in\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Role of Ethical Hacking in Cyber Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/pinetech.in\/blog\/#website\",\"url\":\"https:\/\/pinetech.in\/blog\/\",\"name\":\"Pinetech\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/pinetech.in\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/pinetech.in\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/pinetech.in\/blog\/#organization\",\"name\":\"Pinetech\",\"url\":\"https:\/\/pinetech.in\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/pinetech.in\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/pinetech.in\/blog\/wp-content\/uploads\/2022\/06\/logo-2.png\",\"contentUrl\":\"https:\/\/pinetech.in\/blog\/wp-content\/uploads\/2022\/06\/logo-2.png\",\"width\":180,\"height\":44,\"caption\":\"Pinetech\"},\"image\":{\"@id\":\"https:\/\/pinetech.in\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/pinetech.in\/blog\/#\/schema\/person\/4fa443202c22d5bbd9c9dda3b3da93fc\",\"name\":\"pinetech\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/pinetech.in\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/63d19600b04f7e0dc7da36999b7eb7c9fe45932662dcd1e94e422c9550e038bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/63d19600b04f7e0dc7da36999b7eb7c9fe45932662dcd1e94e422c9550e038bc?s=96&d=mm&r=g\",\"caption\":\"pinetech\"},\"url\":\"https:\/\/pinetech.in\/blog\/author\/pinetech\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Role of Ethical Hacking in Cyber Security - Pinetech","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pinetech.in\/blog\/role-of-ethical-hacking-in-cyber-security\/","og_locale":"en_US","og_type":"article","og_title":"Role of Ethical Hacking in Cyber Security - Pinetech","og_description":"In today\u2019s times we humans are highly tech savvy with the extensive use of the internet so the demand for Software Development Companies are rising. There is a great challenge in protecting all our digital data. Cyber-attacks can be of different forms. To avoid these attacks cyber security is implemented. Cyber security can be defined [&hellip;]","og_url":"https:\/\/pinetech.in\/blog\/role-of-ethical-hacking-in-cyber-security\/","og_site_name":"Pinetech","article_published_time":"2022-06-16T11:29:06+00:00","article_modified_time":"2022-07-05T13:17:39+00:00","og_image":[{"width":1369,"height":500,"url":"https:\/\/pinetech.in\/blog\/wp-content\/uploads\/2022\/06\/ethical_hack.jpg","type":"image\/jpeg"}],"author":"pinetech","twitter_card":"summary_large_image","twitter_misc":{"Written by":"pinetech","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/pinetech.in\/blog\/role-of-ethical-hacking-in-cyber-security\/#article","isPartOf":{"@id":"https:\/\/pinetech.in\/blog\/role-of-ethical-hacking-in-cyber-security\/"},"author":{"name":"pinetech","@id":"https:\/\/pinetech.in\/blog\/#\/schema\/person\/4fa443202c22d5bbd9c9dda3b3da93fc"},"headline":"Role of Ethical Hacking in Cyber Security","datePublished":"2022-06-16T11:29:06+00:00","dateModified":"2022-07-05T13:17:39+00:00","mainEntityOfPage":{"@id":"https:\/\/pinetech.in\/blog\/role-of-ethical-hacking-in-cyber-security\/"},"wordCount":817,"commentCount":0,"publisher":{"@id":"https:\/\/pinetech.in\/blog\/#organization"},"image":{"@id":"https:\/\/pinetech.in\/blog\/role-of-ethical-hacking-in-cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/pinetech.in\/blog\/wp-content\/uploads\/2022\/06\/ethical_hack.jpg","keywords":["Ethical Hacking in Cyber Security"],"articleSection":["Cyber security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/pinetech.in\/blog\/role-of-ethical-hacking-in-cyber-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/pinetech.in\/blog\/role-of-ethical-hacking-in-cyber-security\/","url":"https:\/\/pinetech.in\/blog\/role-of-ethical-hacking-in-cyber-security\/","name":"Role of Ethical Hacking in Cyber Security - Pinetech","isPartOf":{"@id":"https:\/\/pinetech.in\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pinetech.in\/blog\/role-of-ethical-hacking-in-cyber-security\/#primaryimage"},"image":{"@id":"https:\/\/pinetech.in\/blog\/role-of-ethical-hacking-in-cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/pinetech.in\/blog\/wp-content\/uploads\/2022\/06\/ethical_hack.jpg","datePublished":"2022-06-16T11:29:06+00:00","dateModified":"2022-07-05T13:17:39+00:00","breadcrumb":{"@id":"https:\/\/pinetech.in\/blog\/role-of-ethical-hacking-in-cyber-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pinetech.in\/blog\/role-of-ethical-hacking-in-cyber-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pinetech.in\/blog\/role-of-ethical-hacking-in-cyber-security\/#primaryimage","url":"https:\/\/pinetech.in\/blog\/wp-content\/uploads\/2022\/06\/ethical_hack.jpg","contentUrl":"https:\/\/pinetech.in\/blog\/wp-content\/uploads\/2022\/06\/ethical_hack.jpg","width":1369,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/pinetech.in\/blog\/role-of-ethical-hacking-in-cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/pinetech.in\/blog\/"},{"@type":"ListItem","position":2,"name":"Role of Ethical Hacking in Cyber Security"}]},{"@type":"WebSite","@id":"https:\/\/pinetech.in\/blog\/#website","url":"https:\/\/pinetech.in\/blog\/","name":"Pinetech","description":"","publisher":{"@id":"https:\/\/pinetech.in\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pinetech.in\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/pinetech.in\/blog\/#organization","name":"Pinetech","url":"https:\/\/pinetech.in\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pinetech.in\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/pinetech.in\/blog\/wp-content\/uploads\/2022\/06\/logo-2.png","contentUrl":"https:\/\/pinetech.in\/blog\/wp-content\/uploads\/2022\/06\/logo-2.png","width":180,"height":44,"caption":"Pinetech"},"image":{"@id":"https:\/\/pinetech.in\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/pinetech.in\/blog\/#\/schema\/person\/4fa443202c22d5bbd9c9dda3b3da93fc","name":"pinetech","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pinetech.in\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/63d19600b04f7e0dc7da36999b7eb7c9fe45932662dcd1e94e422c9550e038bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/63d19600b04f7e0dc7da36999b7eb7c9fe45932662dcd1e94e422c9550e038bc?s=96&d=mm&r=g","caption":"pinetech"},"url":"https:\/\/pinetech.in\/blog\/author\/pinetech\/"}]}},"_links":{"self":[{"href":"https:\/\/pinetech.in\/blog\/wp-json\/wp\/v2\/posts\/645","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pinetech.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pinetech.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pinetech.in\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pinetech.in\/blog\/wp-json\/wp\/v2\/comments?post=645"}],"version-history":[{"count":7,"href":"https:\/\/pinetech.in\/blog\/wp-json\/wp\/v2\/posts\/645\/revisions"}],"predecessor-version":[{"id":731,"href":"https:\/\/pinetech.in\/blog\/wp-json\/wp\/v2\/posts\/645\/revisions\/731"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pinetech.in\/blog\/wp-json\/wp\/v2\/media\/694"}],"wp:attachment":[{"href":"https:\/\/pinetech.in\/blog\/wp-json\/wp\/v2\/media?parent=645"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pinetech.in\/blog\/wp-json\/wp\/v2\/categories?post=645"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pinetech.in\/blog\/wp-json\/wp\/v2\/tags?post=645"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}