{"id":45193,"date":"2022-03-17T17:49:35","date_gmt":"2022-03-17T06:49:35","guid":{"rendered":"https:\/\/www.institutedata.com\/blog\/how-important-is-cyber-security-in-international-relations\/"},"modified":"2022-03-17T17:49:35","modified_gmt":"2022-03-17T06:49:35","slug":"how-important-is-cyber-security-in-international-relations","status":"publish","type":"post","link":"https:\/\/www.institutedata.com\/us\/blog\/how-important-is-cyber-security-in-international-relations\/","title":{"rendered":"How Important is Cyber Security in International Relations?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Cyber security<\/span><span style=\"font-weight: 400;\"> is a paramount concern for <\/span><span style=\"font-weight: 400;\">world leaders<\/span><span style=\"font-weight: 400;\"> because it has the potential to threaten the economy, the <\/span><span style=\"font-weight: 400;\">government<\/span><span style=\"font-weight: 400;\"> and an individual\u2019s safety and well-being. In the <\/span><a href=\"https:\/\/www.homeaffairs.gov.au\/reports-and-pubs\/files\/cyber-security-strategy-2020-discussion-paper.pdf\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Australian Cyber Security Strategy 2020 paper<\/span><\/a><span style=\"font-weight: 400;\">, Peter Dutton (Minister of Home Affairs) states that the <\/span><span style=\"font-weight: 400;\">government<\/span><span style=\"font-weight: 400;\"> is committed to working closely with the industry to <\/span><span style=\"font-weight: 400;\">prevent<\/span><span style=\"font-weight: 400;\"> and respond to <\/span><span style=\"font-weight: 400;\">cyber attacks<\/span><span style=\"font-weight: 400;\">. The relationship between <\/span><span style=\"font-weight: 400;\">cyber security<\/span><span style=\"font-weight: 400;\"> and <\/span><span style=\"font-weight: 400;\">politics<\/span><span style=\"font-weight: 400;\"> is becoming more interlinked with an increase in <\/span><span style=\"font-weight: 400;\">cyber attacks<\/span><span style=\"font-weight: 400;\"> and <\/span><span style=\"font-weight: 400;\">threats<\/span><span style=\"font-weight: 400;\"> on a global level.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cyber security<\/span><span style=\"font-weight: 400;\"> is clearly an international priority that needs to be addressed in every <\/span><span style=\"font-weight: 400;\">government<\/span><span style=\"font-weight: 400;\">\u2019s policy. Professionals working within the <\/span><span style=\"font-weight: 400;\">international relations<\/span><span style=\"font-weight: 400;\"> and <\/span><span style=\"font-weight: 400;\">politics<\/span><span style=\"font-weight: 400;\"> domain would benefit from <\/span><span style=\"font-weight: 400;\">cyber security<\/span><span style=\"font-weight: 400;\"> knowledge because it will help them better overcome the rise of <\/span><span style=\"font-weight: 400;\">cybercrime<\/span><span style=\"font-weight: 400;\"> and strengthen Australia\u2019s <\/span><span style=\"font-weight: 400;\">defence<\/span><span style=\"font-weight: 400;\"> strategy.\u00a0\u00a0<\/span><\/p>\n<h2><strong>The role of cyber security in international relations<\/strong><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-44680 size-full\" src=\"https:\/\/www.institutedata.com\/wp-content\/uploads\/2022\/03\/cyber-security-in-international-relations-1.png\" alt=\"cyber security in international relations \" width=\"1200\" height=\"900\" srcset=\"https:\/\/www.institutedata.com\/wp-content\/uploads\/2022\/03\/cyber-security-in-international-relations-1.png 1200w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2022\/03\/cyber-security-in-international-relations-1-300x225.png 300w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2022\/03\/cyber-security-in-international-relations-1-1024x768.png 1024w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2022\/03\/cyber-security-in-international-relations-1-768x576.png 768w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2022\/03\/cyber-security-in-international-relations-1-380x285.png 380w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2022\/03\/cyber-security-in-international-relations-1-20x15.png 20w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2022\/03\/cyber-security-in-international-relations-1-190x143.png 190w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2022\/03\/cyber-security-in-international-relations-1-760x570.png 760w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2022\/03\/cyber-security-in-international-relations-1-1140x855.png 1140w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2022\/03\/cyber-security-in-international-relations-1-600x450.png 600w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Cyber security<\/span><span style=\"font-weight: 400;\"> plays a crucial role in <\/span><span style=\"font-weight: 400;\">international relations<\/span><span style=\"font-weight: 400;\"> and it will remain a significant element in <\/span><span style=\"font-weight: 400;\">government<\/span> <span style=\"font-weight: 400;\">policy<\/span><span style=\"font-weight: 400;\">. As many companies and organisations take their business online to boost the economy, their network is at risk to cyber criminals looking to infiltrate the system for their own benefit. <\/span><span style=\"font-weight: 400;\">Cyber attacks<\/span><span style=\"font-weight: 400;\"> are more advanced threatening individuals, businesses and <\/span><span style=\"font-weight: 400;\">government<\/span><span style=\"font-weight: 400;\">s. Due to the vast impact <\/span><span style=\"font-weight: 400;\">cybercrime<\/span><span style=\"font-weight: 400;\"> has across all networks and systems, naturally, <\/span><span style=\"font-weight: 400;\">world leaders<\/span><span style=\"font-weight: 400;\"> are obliged to <\/span><span style=\"font-weight: 400;\">combat<\/span><span style=\"font-weight: 400;\"> this issue.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cyber security<\/span><span style=\"font-weight: 400;\"> plays an integral role in every <\/span><span style=\"font-weight: 400;\">government<\/span><span style=\"font-weight: 400;\">\u2019s <\/span><span style=\"font-weight: 400;\">defence<\/span> <span style=\"font-weight: 400;\">policy<\/span><span style=\"font-weight: 400;\"> with <\/span><span style=\"font-weight: 400;\">policy<\/span><span style=\"font-weight: 400;\"> advisors in talks regarding the implication of technology on <\/span><span style=\"font-weight: 400;\">international security<\/span><span style=\"font-weight: 400;\">. Every business needs to have <\/span><span style=\"font-weight: 400;\">cyber security countermeasures<\/span><span style=\"font-weight: 400;\"> in place with a well-structured <\/span><span style=\"font-weight: 400;\">cyber security<\/span> <span style=\"font-weight: 400;\">policy<\/span><span style=\"font-weight: 400;\"> and best practices guide for employers to adhere to. As the world continues to depend on online services to get through their everyday lives, businesses are held accountable for protecting their customers. This has a significant impact on <\/span><span style=\"font-weight: 400;\">international relations<\/span><span style=\"font-weight: 400;\"> with businesses, <\/span><span style=\"font-weight: 400;\">government<\/span><span style=\"font-weight: 400;\">s and organisations compelled to work together to prevent <\/span><span style=\"font-weight: 400;\">cybercrime<\/span><span style=\"font-weight: 400;\"> leading to the rise of international cooperation.\u00a0<\/span><\/p>\n<h2><strong>The rise of global cyberterrorism and its cyber security countermeasures<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">World leaders<\/span><span style=\"font-weight: 400;\"> are concerned about the growing cases of <\/span><span style=\"font-weight: 400;\">cybercrime<\/span><span style=\"font-weight: 400;\"> and devising strategies to combat the <\/span><span style=\"font-weight: 400;\">rise of<\/span> <span style=\"font-weight: 400;\">global cyberterrorism<\/span><span style=\"font-weight: 400;\">. <\/span><span style=\"font-weight: 400;\">Global cyberterrorism<\/span><span style=\"font-weight: 400;\"> presents serious consequences for businesses such as the loss of intellectual property, business disruption and the potential to destabilise the economy. With the proliferation of dark web access, terrorism has become more decentralised, hence more problematic to police.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In order to <\/span><span style=\"font-weight: 400;\">combat<\/span><span style=\"font-weight: 400;\"> and <\/span><span style=\"font-weight: 400;\">prevent<\/span><span style=\"font-weight: 400;\"> such a prevalent risk, the Australian <\/span><span style=\"font-weight: 400;\">government<\/span><span style=\"font-weight: 400;\"> is encouraging education providers to include more <\/span><span style=\"font-weight: 400;\">cyber security<\/span><span style=\"font-weight: 400;\"> courses in order to equip more people with <\/span><span style=\"font-weight: 400;\">cyber security countermeasures<\/span><span style=\"font-weight: 400;\">. <\/span><span style=\"font-weight: 400;\">Cyber security countermeasures<\/span><span style=\"font-weight: 400;\"> include designing a secure system that <\/span><span style=\"font-weight: 400;\">prevent<\/span><span style=\"font-weight: 400;\">s <\/span><span style=\"font-weight: 400;\">cyber attacks<\/span><span style=\"font-weight: 400;\"> because the system is impenetrable and solid. Similar strategies used in <\/span><span style=\"font-weight: 400;\">international relations<\/span><span style=\"font-weight: 400;\"> apply in <\/span><span style=\"font-weight: 400;\">cyber security countermeasures<\/span><span style=\"font-weight: 400;\"> such as deterrence as a means of intimidation.\u00a0<\/span><\/p>\n<h2><strong>How to upskill to cyber security with a non-technical background<\/strong><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-44729 size-full\" src=\"https:\/\/www.institutedata.com\/wp-content\/uploads\/2022\/03\/upskilling-to-cyber-security-2.png\" alt=\"discussing how important is cyber security in international relations with professional upskilling\" width=\"1200\" height=\"900\" srcset=\"https:\/\/www.institutedata.com\/wp-content\/uploads\/2022\/03\/upskilling-to-cyber-security-2.png 1200w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2022\/03\/upskilling-to-cyber-security-2-300x225.png 300w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2022\/03\/upskilling-to-cyber-security-2-1024x768.png 1024w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2022\/03\/upskilling-to-cyber-security-2-768x576.png 768w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2022\/03\/upskilling-to-cyber-security-2-380x285.png 380w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2022\/03\/upskilling-to-cyber-security-2-20x15.png 20w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2022\/03\/upskilling-to-cyber-security-2-190x143.png 190w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2022\/03\/upskilling-to-cyber-security-2-760x570.png 760w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2022\/03\/upskilling-to-cyber-security-2-1140x855.png 1140w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2022\/03\/upskilling-to-cyber-security-2-600x450.png 600w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">The beauty of humanities and liberal arts degrees is the focus on having an analytical mindset and sharp critical thinking skills. <\/span><span style=\"font-weight: 400;\">Cyber security<\/span><span style=\"font-weight: 400;\"> is all about problem-solving, thinking a step ahead of the attacker and an ethical desire to protect our society from <\/span><span style=\"font-weight: 400;\">cybercrime<\/span><span style=\"font-weight: 400;\">. <\/span><span style=\"font-weight: 400;\">Cyber security<\/span><span style=\"font-weight: 400;\"> suits people who are passionate about deconstructing ideas in order to construct a <\/span><span style=\"font-weight: 400;\">policy<\/span><span style=\"font-weight: 400;\"> report that adheres to compliance. Subject matter experts that have worked at think tanks would be a perfect match for a <\/span><span style=\"font-weight: 400;\">cyber security<\/span><span style=\"font-weight: 400;\"> role.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The best method to <\/span><span style=\"font-weight: 400;\">gain cyber security skills<\/span><span style=\"font-weight: 400;\"> is to upskill to a practical skills training program with an industry-focused curriculum. This method will ensure that you are complimenting your existing skillset with in-demand capabilities and accelerating your career in a resourceful manner. The <\/span><a href=\"https:\/\/www.institutedata.com\/nz\/courses\/cyber-security-programme\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Institute of Data&#8217;s cyber security program<\/span><\/a><span style=\"font-weight: 400;\"> is a timely option to <\/span><span style=\"font-weight: 400;\">gain cyber security skills<\/span><span style=\"font-weight: 400;\"> that will supplement your <\/span><span style=\"font-weight: 400;\">non-technical background<\/span><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<h2><strong>The career paths for professionals with a mixed skillset of cyber security and politics\u00a0\u00a0<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">A <\/span><span style=\"font-weight: 400;\">mixed skillset<\/span><span style=\"font-weight: 400;\"> of <\/span><span style=\"font-weight: 400;\">cyber security<\/span><span style=\"font-weight: 400;\"> and humanities is in demand because you have a combination of highly sought after technical skills as well as an <\/span><span style=\"font-weight: 400;\">international relations<\/span><span style=\"font-weight: 400;\"> perspective. Below are two sectors you can find a variety of roles with the aforementioned mixed skillset.<\/span><\/p>\n<h3><strong>Governance and policy<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">For those of you that enjoy research and proposing <\/span><span style=\"font-weight: 400;\">policy<\/span><span style=\"font-weight: 400;\"> to <\/span><span style=\"font-weight: 400;\">combat cybercrime<\/span><span style=\"font-weight: 400;\"> with effective <\/span><span style=\"font-weight: 400;\">cyber security countermeasures<\/span><span style=\"font-weight: 400;\">, the governance and <\/span><span style=\"font-weight: 400;\">policy<\/span><span style=\"font-weight: 400;\"> sector is a great sector for you. This field requires a lot of writing so a passion for words is essential. You will be spending a lot of time researching terms and conditions regarding cyber incidents internationally in order to determine the type of <\/span><span style=\"font-weight: 400;\">policy<\/span><span style=\"font-weight: 400;\"> you will write. You will need to have a strategic mindset to ascertain that the <\/span><span style=\"font-weight: 400;\">policy<\/span><span style=\"font-weight: 400;\"> covers the business\u2019 needs.\u00a0<\/span><\/p>\n<h3><strong>Intelligence<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">Those of you that enjoy analysing a lot of information in order to produce a persuasive story will find a rewarding career in <\/span><span style=\"font-weight: 400;\">intelligence<\/span><span style=\"font-weight: 400;\">. Cyber counterterrorism analyst roles fall under this category because the daily tasks merge with <\/span><span style=\"font-weight: 400;\">intelligence<\/span><span style=\"font-weight: 400;\"> as you will find yourself investigating and researching terrorist activities. <\/span><span style=\"font-weight: 400;\">Getting a job<\/span><span style=\"font-weight: 400;\"> in <\/span><span style=\"font-weight: 400;\">intelligence<\/span><span style=\"font-weight: 400;\"> requires an ethical mindset because you are working with confidential and sensitive information in order to strengthen <\/span><span style=\"font-weight: 400;\">international security<\/span><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<h2><strong>What are the salary expectations and future career outlook for a cyber security professional with a humanities background?<\/strong><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-44737 size-full\" src=\"https:\/\/www.institutedata.com\/wp-content\/uploads\/2022\/03\/cyber-security-professional-1.png\" alt=\"cyber security professional\" width=\"1200\" height=\"900\" srcset=\"https:\/\/www.institutedata.com\/wp-content\/uploads\/2022\/03\/cyber-security-professional-1.png 1200w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2022\/03\/cyber-security-professional-1-300x225.png 300w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2022\/03\/cyber-security-professional-1-1024x768.png 1024w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2022\/03\/cyber-security-professional-1-768x576.png 768w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2022\/03\/cyber-security-professional-1-380x285.png 380w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2022\/03\/cyber-security-professional-1-20x15.png 20w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2022\/03\/cyber-security-professional-1-190x143.png 190w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2022\/03\/cyber-security-professional-1-760x570.png 760w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2022\/03\/cyber-security-professional-1-1140x855.png 1140w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2022\/03\/cyber-security-professional-1-600x450.png 600w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">The Australian public service is a rather competitive sector to get into because of its many benefits and higher salary outlook. Here is a list of different government organisations offering governance &amp; <\/span><span style=\"font-weight: 400;\">policy<\/span><span style=\"font-weight: 400;\"> and <\/span><span style=\"font-weight: 400;\">intelligence<\/span><span style=\"font-weight: 400;\"> roles as well as the <\/span><span style=\"font-weight: 400;\">salary expectations.<\/span><\/p>\n<h3><strong>Australian Federal Police<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">The AFP offers a variety of non-policing roles for cyber counterterrorism analysts and <\/span><span style=\"font-weight: 400;\">intelligence<\/span><span style=\"font-weight: 400;\"> analysts. The average salary for <\/span><span style=\"font-weight: 400;\">an intelligence<\/span><span style=\"font-weight: 400;\"> analyst is $99,292 as of 2019.\u00a0<\/span><\/p>\n<h3><strong>Australian Secret Intelligence Service (ASIS) &amp; Australian Security Intelligence Organisation (ASIO)<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">ASIS and ASIO both employ <\/span><span style=\"font-weight: 400;\">intelligence<\/span><span style=\"font-weight: 400;\"> analysts but both departments have different functions. ASIS is focused on foreign <\/span><span style=\"font-weight: 400;\">intelligence<\/span><span style=\"font-weight: 400;\"> that will enhance Australia\u2019s national <\/span><span style=\"font-weight: 400;\">defence<\/span><span style=\"font-weight: 400;\"> and <\/span><span style=\"font-weight: 400;\">international relations<\/span><span style=\"font-weight: 400;\">. ASIO gathers <\/span><span style=\"font-weight: 400;\">intelligence<\/span><span style=\"font-weight: 400;\"> to alert the <\/span><span style=\"font-weight: 400;\">government<\/span><span style=\"font-weight: 400;\"> about any threats to Australia\u2019s security. The <\/span><span style=\"font-weight: 400;\">salary expectations<\/span><span style=\"font-weight: 400;\"> for an entry-level <\/span><span style=\"font-weight: 400;\">intelligence<\/span><span style=\"font-weight: 400;\"> officer role ranges from $80,775 to $111,390 depending on your skillset.\u00a0<\/span><\/p>\n<h3><strong>Department of Foreign Affairs and Trade (DFAT)<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">DFAT looks for outstanding and patriotic professionals that have a <\/span><span style=\"font-weight: 400;\">mixed skillset<\/span><span style=\"font-weight: 400;\">, especially those with the ability to speak Asian and Indo-Pacific languages. Securing a role in DFAT requires an analytical mindset and a passion for problem-solving which coincides with the skills you need to excel in <\/span><span style=\"font-weight: 400;\">cybersecurity<\/span><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<h2>Conclusion<\/h2>\n<p>Contribute to strengthening international security with a mixed skillset of cyber security and international relations. <span style=\"font-weight: 400;\">Getting a job<\/span><span style=\"font-weight: 400;\"> in this field requires the determination to continue learning and upskilling to remain a step ahead of cyber criminals.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you are interested in <\/span><span style=\"font-weight: 400;\">upskilling in<\/span><span style=\"font-weight: 400;\"> cyber security, <\/span><a href=\"https:\/\/www.institutedata.com\/us\/consultation\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">book a consultation<\/span><\/a><span style=\"font-weight: 400;\"> with an Institute of Data consultant today.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber security is a paramount concern for world leaders because it has the potential to threaten the economy, the government and an individual\u2019s safety and well-being. In the Australian Cyber Security Strategy 2020 paper, Peter Dutton (Minister of Home Affairs) states that the government is committed to working closely with the industry to prevent and&hellip;<\/p>\n","protected":false},"author":1,"featured_media":45021,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[588,589],"tags":[785,1323,1324],"class_list":["post-45193","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-us","category-cyber-security-technology-us","tag-cyber-security-us","tag-cyber-security-upskilling-us","tag-international-relations-us"],"_links":{"self":[{"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/posts\/45193","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/comments?post=45193"}],"version-history":[{"count":0,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/posts\/45193\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/media\/45021"}],"wp:attachment":[{"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/media?parent=45193"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/categories?post=45193"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/tags?post=45193"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}