{"id":1394,"date":"2025-01-02T17:27:21","date_gmt":"2025-01-02T11:57:21","guid":{"rendered":"https:\/\/www.techandtrain.com\/blog\/?p=1394"},"modified":"2025-10-22T14:50:33","modified_gmt":"2025-10-22T09:20:33","slug":"information-technology-security-ecosystem-part-1","status":"publish","type":"post","link":"https:\/\/www.techandtrain.com\/blog\/2025\/01\/information-technology-security-ecosystem-part-1\/","title":{"rendered":"Information Technology Security Ecosystem &#8211; Part 1"},"content":{"rendered":"\n<p id=\"ember3532\">While having a discussion, I thought of writing a blog covering all important layers of Information Technology Security ecosystem with some relevant links &#8211; so here it goes.<\/p>\n\n\n\n<p id=\"ember3533\"><strong>Here are some important layers for the same:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Physical security<\/li>\n\n\n\n<li>Hardware security<\/li>\n\n\n\n<li>Network security<\/li>\n\n\n\n<li>Endpoint security<\/li>\n\n\n\n<li>Application security<\/li>\n\n\n\n<li>Data security<\/li>\n\n\n\n<li>Identity and access management security<\/li>\n\n\n\n<li>Cloud \/ infrastructure security<\/li>\n\n\n\n<li>Operational security<\/li>\n\n\n\n<li>Governance, risk and compliance<\/li>\n\n\n\n<li>Human security<\/li>\n\n\n\n<li>Emerging technology security like AIML, Quantum computing, Blockchain, IoT, etc.<\/li>\n<\/ul>\n\n\n\n<p id=\"ember3536\"><strong>Some links from Wikipedia and internet for the above as reference:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Outline_of_computer_security\">Outline of computer security &#8211; Wikipedia<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Hardware_security\">Hardware security &#8211; Wikipedia<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Network_security\">Network security &#8211; Wikipedia<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/gofortress.com\/blog\/osi-model-7-layers-of-security\/\">The OSI Model: 7 Layers of Security &#8211; Fortress Consulting Group<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Cybersecurity_information_technology_list#End-point_protection\">Cybersecurity information technology list &#8211; Wikipedia<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Application_security\">Application security &#8211; Wikipedia<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Data_security\">Data security &#8211; Wikipedia<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Identity_and_access_management\">Identity and access management &#8211; Wikipedia<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Operations_security\">Operations security &#8211; Wikipedia<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Information_security_management\">Information security management &#8211; Wikipedia<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Human_factors_in_security\">Human factors in security &#8211; Wikipedia<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Cybersecurity_engineering\">Cybersecurity engineering &#8211; Wikipedia<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/List_of_security_assessment_tools\">List of security assessment tools &#8211; Wikipedia<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Comparison_of_antivirus_software\">Comparison of antivirus software &#8211; Wikipedia<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Category%3APentesting_software_toolkits\">Category:Pentesting software toolkits &#8211; Wikipedia<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Category%3AComputer_security_software\">Category:Computer security software &#8211; Wikipedia<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Category%3AFree_security_software\">Category:Free security software &#8211; Wikipedia<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Category%3ASecurity_software_comparisons\">Category:Security software comparisons &#8211; Wikipedia<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/OWASP\">OWASP &#8211; Wikipedia<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.cncf.io\/\">Cloud Native Computing Foundation<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/List_of_tools_for_static_code_analysis\">List of tools for static code analysis &#8211; Wikipedia<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Static_application_security_testing\">Static application security testing &#8211; Wikipedia<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/SONAR_%28Symantec%29\">SONAR (Symantec) &#8211; Wikipedia<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Dynamic_application_security_testing\">Dynamic application security testing &#8211; Wikipedia<\/a><\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Email me: <a href=\"mailto:Neil@HarwaniSytems.in\">Neil@HarwaniSytems.in<\/a><\/li>\n\n\n\n<li>Website: <a href=\"http:\/\/www.harwanisystems.in\/\">www.HarwaniSystems.in<\/a><\/li>\n\n\n\n<li>Blog: <a href=\"http:\/\/www.techandtrain.com\/blog\">www.TechAndTrain.com\/blog<\/a><\/li>\n\n\n\n<li>LinkedIn: <a href=\"https:\/\/www.linkedin.com\/in\/neil27\/\">Neil Harwani | LinkedIn<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>While having a discussion, I thought of writing a blog covering all important layers of Information Technology Security ecosystem with [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1395,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[40,2,39],"tags":[425,423,424],"class_list":["post-1394","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","category-security","category-software-security","tag-information-technology-security","tag-it-security","tag-security-ecosystem"],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/01\/Security.jpg?fit=1280%2C596&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7do02-mu","jetpack-related-posts":[{"id":950,"url":"https:\/\/www.techandtrain.com\/blog\/2022\/08\/cyber-security-keywords-concepts-part-1\/","url_meta":{"origin":1394,"position":0},"title":"Cyber Security Keywords &#038; Concepts &#8211; Part 1","author":"Neil Harwani","date":"August 28, 2022","format":false,"excerpt":"Here is a list of keywords & concepts in Cyber Security that technology professionals should be aware of. This is part 1 of the series. CSPXSSISO 27001OWASPEncoding \/ decodingEncryption and it's typesCSRFCORSHashingAuthenticationAuthorizationIAMSSOSAMLOAuthTokensHTTPS \/ SSLDOS \/ DDOSBackdoorMalwareSecure codingThreats, Vulnerabilities, Controls & MitigationVAPTSocial EngineeringSpoofingProxy serversPhishingSQL injectionBuffer overflowViruses, Worms, Keyloggers, SpywaresIdentity theftRootKitsZero DayVPN\u2026","rel":"","context":"In &quot;Cyber Security&quot;","block_context":{"text":"Cyber Security","link":"https:\/\/www.techandtrain.com\/blog\/category\/cyber-security\/"},"img":{"alt_text":"Credit: www.Pixabay.com","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2022\/08\/CyberSecurity.jpg?fit=1200%2C675&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2022\/08\/CyberSecurity.jpg?fit=1200%2C675&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2022\/08\/CyberSecurity.jpg?fit=1200%2C675&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2022\/08\/CyberSecurity.jpg?fit=1200%2C675&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2022\/08\/CyberSecurity.jpg?fit=1200%2C675&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":740,"url":"https:\/\/www.techandtrain.com\/blog\/2021\/08\/devops-in-networked-technology-infused-world\/","url_meta":{"origin":1394,"position":1},"title":"DevOps in Networked &#038; Technology infused world","author":"Neil Harwani","date":"August 8, 2021","format":false,"excerpt":"My original article below, co-authored with Prof. Nityesh Bhatt. An abridged & modified version of this was published in a leading magazine. Advice to youngsters, be your own publishing house \u2013 you have Amazon, LinkedIn, your own blog & website, multiple other good platforms, peer reviewed open access & top\u2026","rel":"","context":"In &quot;DevOps&quot;","block_context":{"text":"DevOps","link":"https:\/\/www.techandtrain.com\/blog\/category\/devops\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2021\/08\/DevOps.jpg?fit=1036%2C595&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2021\/08\/DevOps.jpg?fit=1036%2C595&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2021\/08\/DevOps.jpg?fit=1036%2C595&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2021\/08\/DevOps.jpg?fit=1036%2C595&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":1432,"url":"https:\/\/www.techandtrain.com\/blog\/2025\/03\/cybersecurity-and-cyber-forensic-tools-part-1-collated-from-internet-ai\/","url_meta":{"origin":1394,"position":2},"title":"Cybersecurity and Cyber Forensics tools &#8211; Part 1 (Collated from internet &amp; AI)","author":"Neil Harwani","date":"March 7, 2025","format":false,"excerpt":"Here is an exhaustive list of cybersecurity and cyber forensic tools, categorized based on their functionalities: 1. Network Security & Monitoring Tools Wireshark \u2013 Network packet analyzer Snort \u2013 Open-source network intrusion detection system (NIDS) Suricata \u2013 High-performance IDS, IPS, and network security monitoring (NSM) Zeek (formerly Bro) \u2013 Network\u2026","rel":"","context":"In &quot;Cyber Forensics&quot;","block_context":{"text":"Cyber Forensics","link":"https:\/\/www.techandtrain.com\/blog\/category\/cyber-forensics\/"},"img":{"alt_text":"Image Credit: www.Pixabay.com","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/03\/CyberSecurityAndForensics.jpg?fit=1200%2C713&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/03\/CyberSecurityAndForensics.jpg?fit=1200%2C713&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/03\/CyberSecurityAndForensics.jpg?fit=1200%2C713&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/03\/CyberSecurityAndForensics.jpg?fit=1200%2C713&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/03\/CyberSecurityAndForensics.jpg?fit=1200%2C713&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1380,"url":"https:\/\/www.techandtrain.com\/blog\/2024\/11\/web-portal-commerce-cyber-forensics\/","url_meta":{"origin":1394,"position":3},"title":"Web portal &amp; commerce cyber forensics","author":"Neil Harwani","date":"November 24, 2024","format":false,"excerpt":"For this discussion, we will refer the top open-source products like Liferay, Drupal, WordPress, etc. and one proprietary portal like SharePoint which has good documentation. Home - Liferay WordPress.com: Build a Site, Sell Your Stuff, Start a Blog & More Drupal - Open Source CMS | Drupal.org Microsoft SharePoint Online\u2026","rel":"","context":"In &quot;Cyber Forensics&quot;","block_context":{"text":"Cyber Forensics","link":"https:\/\/www.techandtrain.com\/blog\/category\/cyber-forensics\/"},"img":{"alt_text":"Credits: www.Pixabay.com","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/11\/interface.png?fit=1200%2C801&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/11\/interface.png?fit=1200%2C801&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/11\/interface.png?fit=1200%2C801&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/11\/interface.png?fit=1200%2C801&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/11\/interface.png?fit=1200%2C801&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1049,"url":"https:\/\/www.techandtrain.com\/blog\/2023\/03\/security-best-practice-patterns-architecture-links-from-aws-gcp-azure-part-1\/","url_meta":{"origin":1394,"position":4},"title":"Security best practice, patterns &amp; architecture links from AWS, GCP &amp; Azure &#8211; Part 1","author":"Neil Harwani","date":"March 19, 2023","format":false,"excerpt":"Herewith I am providing a curated list of links for security best practices, patterns & architecture for AWS, GCP & Azure - Part 1. AWS: Security - AWS Well-Architected Framework (amazon.com) AWS Security Reference Architecture (AWS SRA) - AWS Prescriptive Guidance (amazon.com) AWS Security Documentation (amazon.com) Security, identity, compliance -\u2026","rel":"","context":"In &quot;Architecture&quot;","block_context":{"text":"Architecture","link":"https:\/\/www.techandtrain.com\/blog\/category\/architecture\/"},"img":{"alt_text":"Credit: www.Pixabay.com","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2023\/03\/Cloud.png?fit=1200%2C828&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2023\/03\/Cloud.png?fit=1200%2C828&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2023\/03\/Cloud.png?fit=1200%2C828&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2023\/03\/Cloud.png?fit=1200%2C828&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2023\/03\/Cloud.png?fit=1200%2C828&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1151,"url":"https:\/\/www.techandtrain.com\/blog\/2023\/10\/security-cookie-links-www-liferay-com-part-1\/","url_meta":{"origin":1394,"position":5},"title":"Security &amp; Cookie links @ www.Liferay.com &#8211; Part 1","author":"Neil Harwani","date":"October 20, 2023","format":false,"excerpt":"List of Liferay security & cookie related links which includes Cookies, XSS, CSRF, OWASP, CORS, SSO, IAM, Service Action Policies and more: Known vulnerabilities:\u00a0Known Vulnerabilities - Liferay Security statement:\u00a0Security Statement | Liferay LXC Cloud security:\u00a0DXP Cloud Security | Liferay Securing Liferay page:\u00a0Securing Liferay - Liferay Learn Help center DXP 7.0:\u00a0Liferay\u2026","rel":"","context":"In &quot;Liferay&quot;","block_context":{"text":"Liferay","link":"https:\/\/www.techandtrain.com\/blog\/category\/liferay\/"},"img":{"alt_text":"Credits: www.Pixabay.com","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2023\/10\/Safe.jpg?fit=1200%2C1043&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2023\/10\/Safe.jpg?fit=1200%2C1043&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2023\/10\/Safe.jpg?fit=1200%2C1043&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2023\/10\/Safe.jpg?fit=1200%2C1043&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2023\/10\/Safe.jpg?fit=1200%2C1043&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts\/1394","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/comments?post=1394"}],"version-history":[{"count":1,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts\/1394\/revisions"}],"predecessor-version":[{"id":1396,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts\/1394\/revisions\/1396"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/media\/1395"}],"wp:attachment":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/media?parent=1394"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/categories?post=1394"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/tags?post=1394"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}