

{"id":2623,"date":"2026-03-06T12:54:45","date_gmt":"2026-03-06T07:24:45","guid":{"rendered":"https:\/\/vajiramandravi.com\/upsc-exam\/?p=2623"},"modified":"2026-03-11T17:18:36","modified_gmt":"2026-03-11T11:48:36","slug":"cyber-security","status":"publish","type":"post","link":"https:\/\/vajiramandravi.com\/upsc-exam\/cyber-security\/","title":{"rendered":"Cybersecurity, Meaning, Types, Importance, Initiatives"},"content":{"rendered":"<p>Cybersecurity refers to technologies, processes, and rules created to protect computer systems, servers, networks, programs, devices, and data from cyber-attacks. It aims to protect against the\u00a0<strong>unauthorised access<\/strong>\u00a0to data and\u00a0<strong>misuse<\/strong>\u00a0of technologies. India\u2019s growing reliance on digital technologies, increasing use of the internet, lack of awareness, and vulnerability of the Critical Information Infrastructure have made it a target of a wide range of cyber threats. According to a\u00a0<strong>CERT-In report<\/strong>, over\u00a0<strong>3.94 lakh<\/strong>\u00a0cyber security incidents were reported in 2020 in India, an increase of\u00a0<strong>63%\u00a0<\/strong>from the previous year. These incidents included phishing attacks, website intrusions, malware attacks, and ransomware attacks.<\/p>\r\n<h2>Types of Cyber Threats<\/h2>\r\n<p>Based on the type of perpetrators and their motive, cyber threats can be arranged into four types.<\/p>\r\n<ul>\r\n\t<li><strong>Cybercrime:<\/strong>\u00a0These are\u00a0<strong>criminal activities<\/strong>\u00a0carried out through a computer network, wherein a computer\/device\/server might be the target or used in carrying out criminal activities.\r\n\r\n<ul>\r\n\t<li>The main motive of cyber criminals is\u00a0<strong>financial gain<\/strong>\u00a0or to cause disruption.<\/li>\r\n<\/ul>\r\n<\/li>\r\n\t<li><strong>Cyber-Espionage:<\/strong>\u00a0The act of using a computer network to gain\u00a0<strong>unlawful access<\/strong>\u00a0to\u00a0<strong>confidential information<\/strong>\u00a0from other computers\/servers is called cyber espionage. It is executed to extract classified information from government organisations.\r\n\r\n<ul>\r\n\t<li>Cyber-espionage is cyber-enabled illegal abstraction of data, intellectual properties (IPs), and trade secrets worth billions of dollars.<\/li>\r\n\t<li>In March 2021 cyber intelligence firm Cyfirma reported that the\u00a0<strong>Chinese hacking group APT 10<\/strong>, also known as Stone Panda, had targeted the Bharat Biotech and the Serum Institute of India (SII), whose coronavirus shots were being used in the country's immunisation campaign.<\/li>\r\n<\/ul>\r\n<\/li>\r\n\t<li><strong>Cyberwarfare:<\/strong>\u00a0Cyberwarfare refers to using cyberspace to carry out acts of warfare against other countries. It includes attacks like\u00a0<strong>distributed denial of services<\/strong>,\u00a0<strong>defacing of websites<\/strong>, and so on.\r\n\r\n<ul>\r\n\t<li>Now cyberspace is considered the\u00a0<strong>fifth dimension of warfare<\/strong>, after land, ocean, air, and space. More than\u00a0<strong>140 countries<\/strong>\u00a0have developed or are in the process of developing their patenting and proficiency in cyberwarfare.<\/li>\r\n\t<li>For example, NATO has designated cyberspace as an \u2018operational domain\u2019, like air, land, and sea. The US has a separate\u00a0<strong>Cyber Command<\/strong>.<\/li>\r\n<\/ul>\r\n<\/li>\r\n\t<li><strong>Cyberterrorism:<\/strong>\u00a0It involves an attack over a computer network to secure the political objectives of terrorists to cause fear among the masses and target the government\/s.\r\n\r\n<ul>\r\n\t<li>Usually cyberterrorism aims to invade cybernetworks responsible for the maintenance of national security and destroy information of strategic importance.<\/li>\r\n\t<li>Methods used are usually the destruction of cybernetwork, denial of service attacks, and data exfiltration.<\/li>\r\n\t<li>It is capable of causing loss of life, creating international economic chaos, and affecting environmental casualties by hacking into various critical infrastructures.<\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\n<h3>Methods Used for Cyberattacks<\/h3>\r\n<p>The following are some common methods used to threaten the cybersecurity of a nation.<\/p>\r\n<ul>\r\n\t<li><strong>Malware:\u00a0<\/strong>It is malicious software that a cybercriminal\/hacker creates to disrupt\/damage computer\/s or derive financial benefits. It is often spread by way of an unsolicited email attachment or download link. The types of malware are as follows:\r\n\r\n<ul>\r\n\t<li><strong>Virus<\/strong>: It is a self-replicating program that attaches to a clean file and spreads in a computer system infecting other files.<\/li>\r\n\t<li><strong>Trojans<\/strong>: It disguises as legitimate software. Users are tricked into uploading Trojans onto their devices where they cause damage or collect data.\r\n\r\n<ul>\r\n\t<li>For example,\u00a0<strong>Emotet\u00a0<\/strong>wasa sophisticated trojan that was used to steal data and load other malware.<\/li>\r\n<\/ul>\r\n<\/li>\r\n\t<li><strong>Spyware<\/strong>: It is a program that secretly records what a user does, and then this information is misused.<\/li>\r\n\t<li><strong>Ransomware<\/strong>: It locks down a user\u2019s files\/data, the user can not access them unless a ransom is paid. Example -\u00a0<strong>Wannacry\u00a0<\/strong>and\u00a0<strong>Petya<\/strong>.<\/li>\r\n\t<li><strong>Adware<\/strong>: It is advertising software that can be used to spread malware.<\/li>\r\n\t<li><strong>Botnets<\/strong>: It is a network of infected computers that is used by cybercriminals to perform tasks online.<\/li>\r\n<\/ul>\r\n<\/li>\r\n\t<li><strong>SQL injection:\u00a0<\/strong>It is a type of cyber-attack used to steal data from a database.\r\n\r\n<ul>\r\n\t<li>Vulnerabilities in data-driven applications are exploited to insert malicious code into a database.<\/li>\r\n<\/ul>\r\n<\/li>\r\n\t<li><strong>Phishing<\/strong>: Phishing is when attackers send spam emails or text messages that contain links to malicious websites.\r\n\r\n<ul>\r\n\t<li>The websites may contain malware (for example,\u00a0<strong>Dridex malware)\u00a0<\/strong>which can sabotage systems and organisations.<\/li>\r\n<\/ul>\r\n<\/li>\r\n\t<li><strong>Man-in-the-middle attack:\u00a0<\/strong>In this, a cybercriminal intercepts communication between two individuals in order to steal data.\r\n\r\n<ul>\r\n\t<li><strong>For example<\/strong>, on an unsecured WiFi network, data that is being passed from the victim\u2019s device can be intercepted.<\/li>\r\n<\/ul>\r\n<\/li>\r\n\t<li><strong>Denial-of-service attack<\/strong>: It prevents a computer system from fulfilling legitimate requests by overwhelming the networks and servers with excessive traffic.\r\n\r\n<ul>\r\n\t<li>In\u00a0<strong>April 2023<\/strong>, a coordinated DDoS cyberattack was launched in India against six major airports and healthcare institutions by a hacker group named\u00a0<strong>Anonymous Sudan.<\/strong><\/li>\r\n<\/ul>\r\n<\/li>\r\n\t<li><strong>Romance scams:<\/strong>\u00a0Cybercriminals use dating sites, chat rooms, and apps, duping victims into compromising personal data.<\/li>\r\n\t<li><strong>Cyber Threat evolution:<\/strong>\u00a0Types of cyber threats have grown sophisticated with time as shown in the diagram below.<\/li>\r\n<\/ul>\r\n<h2>Need for Cyber Security in India<\/h2>\r\n<p>Amongst contemporary security vulnerabilities,\u00a0<strong>cyber threats<\/strong>\u00a0to the economy, security, public service delivery, critical infrastructure, etc. have emerged as critical to India. Cyber threat is a huge challenge that is capable of disturbing and destroying the economic and social order. The following are the major reasons why cyber security is needed:<\/p>\r\n<ul>\r\n\t<li><strong>Nature of Cyberthreat:<\/strong>\u00a0These are hard to detect and\u00a0<strong>difficult to investigate<\/strong>\u00a0because of their\u00a0<strong>anonymity<\/strong>. Besides being\u00a0<strong>inexpensive\u00a0<\/strong>and\u00a0<strong>easy\u00a0<\/strong>to commit, they are hard to prove with certitude.<\/li>\r\n\t<li><strong>Evolving nature:<\/strong>\u00a0Cyber criminals are embracing increasingly\u00a0<strong>innovative\u00a0<\/strong>and highly\u00a0<strong>inventive\u00a0<\/strong>techniques.\r\n\r\n<ul>\r\n\t<li><strong>Ransomware as a Service:\u00a0<\/strong>Recent instances of\u00a0<strong>Ransomware attacks where RaaS\u00a0<\/strong>was used.<\/li>\r\n\t<li><strong>Cybercrime-as-a-service:\u00a0<\/strong>This new model emerged in 2023. E.g.\u00a0<strong>LockBit<\/strong>,\u00a0<strong>Akira<\/strong>,\u00a0<strong>Luna Moth<\/strong><\/li>\r\n\t<li><strong>Misuse of AI:<\/strong>\u00a0In 2023\u00a0<strong>WormGPT<\/strong>, a blackhat version of ChatGPT was found to be used to generate malicious content, including phishing emails, malware code, fake news, and social media posts.<\/li>\r\n<\/ul>\r\n<\/li>\r\n\t<li><strong>High level of Vulnerability:\u00a0<\/strong>The Critical Information Infrastructure (CII) and other state computer resources are not fully protected and have become easy targets.\r\n\r\n<ul>\r\n\t<li><strong>Example:\u00a0<\/strong>The\u00a0<strong>AIIMS ransomware\u00a0<\/strong>attack of\u00a0<strong>2022\u00a0<\/strong>affected a large number of patients' data.<\/li>\r\n<\/ul>\r\n<\/li>\r\n\t<li><strong>Used by terror organisations:<\/strong>\u00a0Cyber terrorists can use the same techniques as traditional cyberattacks, such as\u00a0<strong>DDoS\u00a0<\/strong>attacks,\u00a0<strong>malware<\/strong>,\u00a0<strong>social engineering<\/strong>, and\u00a0<strong>phishing<\/strong>.<\/li>\r\n\t<li><strong>The impetus to digitisation: The government has been promoting internet-based services making them more vulnerable to cybercrimes.\u00a0<\/strong>\r\n<ul>\r\n\t<li>Online payments via\u00a0<strong>BHIM\u00a0<\/strong><strong>UPI<\/strong>\u00a0are prone to fraud, surveillance, profiling, violation of privacy, etc.<\/li>\r\n<\/ul>\r\n<\/li>\r\n\t<li><strong>Interface with Public Services<\/strong>: Attacks in cyberspace may result in the disruption of critical public services like railways, defense systems, communication systems, banking, and others.\r\n\r\n<ul>\r\n\t<li>The\u00a0<strong>2020 Mumbai power outage<\/strong>\u00a0was allegedly due to a\u00a0<strong>Chinese cyber-attack<\/strong>\u00a0carried out through malware.<\/li>\r\n<\/ul>\r\n<\/li>\r\n\t<li><strong>Cyber warfare against India:<\/strong>\u00a0State-sponsored cyberattacks against India went up by\u00a0<strong>278%<\/strong>\u00a0between 2021 and 2023, with the service sector, including IT and BPO, facing the highest share of attacks, according to the<strong>\u00a02023 India Threat Landscape Report<\/strong>\u00a0by\u00a0<strong>Cyfirma<\/strong>.<\/li>\r\n\t<li><strong>Rising cybercrime in India:<\/strong>\u00a0As per the\u00a0<strong>NCRB report<\/strong>\u00a0the number of Cybercrime incidents in India was as follows:<\/li>\r\n<\/ul>\r\n<figure>\r\n<table>\r\n<tbody>\r\n<tr>\r\n<td class=\"tb-color\"><strong>Year<\/strong><\/td>\r\n<td class=\"tb-color\"><strong>2020<\/strong><\/td>\r\n<td class=\"tb-color\"><strong>2021<\/strong><\/td>\r\n<td class=\"tb-color\"><strong>2022<\/strong><\/td>\r\n<\/tr>\r\n<tr>\r\n<td><strong>Number of Cybercrime incidents<\/strong><\/td>\r\n<td>50035<\/td>\r\n<td>52974<\/td>\r\n<td>65893<\/td>\r\n<\/tr>\r\n<tr>\r\n<td><strong>Percentage rise over the previous year<\/strong><\/td>\r\n<td><strong>11.8%<\/strong><\/td>\r\n<td><strong>5.9%<\/strong><\/td>\r\n<td><strong>24.2%<\/strong><\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<\/figure>\r\n<ul>\r\n\t<li><strong>Major types of cybercrime in India:<\/strong>\u00a0During 2021,\u00a0<strong>37.6%<\/strong>\u00a0of the cases were reported under\u00a0<strong>Computer-related offenses<\/strong>\u00a0followed by\u00a0<strong>fraud\u00a0<\/strong>at<strong>\u00a026.4%<\/strong>\u00a0and Publication\/ transmission of obscene \/\u00a0<strong>sexually explicit acts in electronic form<\/strong>\u00a0in\u00a0<strong>12.5%\u00a0<\/strong>of cases.<\/li>\r\n<\/ul>\r\n<h2>Initiatives Taken for Cyber Security<\/h2>\r\n<p>To strengthen the mechanism to deal with cyber crimes in a comprehensive and coordinated manner, the Central Government has adopted the following measures:<\/p>\r\n<h3>Legal Measures<\/h3>\r\n<ul>\r\n\t<li><strong>Information Technology Act, 2000:\u00a0<\/strong>The Act deals with the protection of CIIs, declaration of a \u2018protected system\u2019, cyberterrorism, hacking, violation of privacy, fraud, and other cyber crimes.<\/li>\r\n\t<li><strong>Digital Personal Data Protection Act (DPDP), 2023:<\/strong>\u00a0The act aims to balance the rights of individuals with the need to process digital personal data for legal purposes. It applies to the processing of digital personal data within India, as well as the processing of personal data outside India if it is for offering goods or services in India. The act grants individuals rights such as:\r\n\r\n<ul>\r\n\t<li>The right to obtain information about processing<\/li>\r\n\t<li>The right to seek correction and erasure of personal data<\/li>\r\n\t<li>The right to nominate another person to exercise rights in the event of death or incapacity<\/li>\r\n<\/ul>\r\n<\/li>\r\n\t<li><strong>National Digital Communications Policy, 2018:\u00a0<\/strong>The major focus areas of the policy are as follows:\r\n\r\n<ul>\r\n\t<li>To connect, propel, and secure India\u00a0<strong>(Secure digital sovereignty<\/strong>\u00a0of India)<\/li>\r\n\t<li><strong>Universal broadband connectivity\u00a0<\/strong>at 50 Mbps to every citizen<\/li>\r\n\t<li>Provide 1 Gbps internet connectivity to all Gram Panchayats<\/li>\r\n\t<li>Ensure connectivity to all uncovered areas<\/li>\r\n\t<li>Attract investments of USD 100 Billion in the Digital Communications Sector<\/li>\r\n<\/ul>\r\n<\/li>\r\n\t<li><strong>National Cyber Security Policy, 2013<\/strong>: It aims to concretise resilience against cyber threats in all sectors. A crisis management plan has been instituted.<\/li>\r\n<\/ul>\r\n<h3>Institutional Measures<\/h3>\r\n<ul>\r\n\t<li><strong>National Cyber Security Coordinator (NCSC):\u00a0<\/strong>It coordinates with different agencies at the national level for cyber security matters.<\/li>\r\n\t<li><strong>National Critical Information Infrastructure Protection Centre:<\/strong>\u00a0Under Section 70A of the IT Act, it is designated as the National Nodal Agency for CII protection.<\/li>\r\n\t<li><strong>Defence Cyber Agency:<\/strong>\u00a0The union government has established it to deal with matters of cyberwarfare and cybersecurity.<\/li>\r\n\t<li><strong>Indian Computer Emergency Response Team (CERT-In):\u00a0<\/strong>Section 70B of the IT Act provides for the constitution of CERT-In to maintain India\u2019s cybersecurity and counter cybersecurity threats.\r\n\r\n<ul>\r\n\t<li>It issues alerts and advisories about the latest cyber threats as well as coordinated counter-measures.<\/li>\r\n<\/ul>\r\n<\/li>\r\n\t<li><strong>Cyber Swachhta Kendra:<\/strong>\u00a0Botnet Cleaning and Malware Analysis Centre has been launched for the detection of malicious programs and provides free tools to remove them.<\/li>\r\n\t<li><strong>National Cyber Coordination Centre:<\/strong>\u00a0It was set up to generate necessary situational awareness of cyber security threats and enable timely information sharing for proactive, preventive, and protective actions by individual entities.<\/li>\r\n\t<li><strong>Indian Cyber Crime Coordination Centre(I4C):<\/strong>\u00a0The Ministry of Home Affairs has set up the\u00a0<strong>I4C<\/strong>\u00a0to deal with all types of cybercrime in the country, in a coordinated and comprehensive manner. It includes:\r\n\r\n<ul>\r\n\t<li><strong>National Cyber Forensic Laboratory:\u00a0<\/strong>It provides cyber forensic assistance to State\/UT Police.<\/li>\r\n\t<li><strong>National Cyber Crime Reporting Portal:<\/strong>\u00a0to report cyber crimes.<\/li>\r\n\t<li><strong>Citizen Financial Cyber Fraud Reporting and Management System:<\/strong>\u00a0for immediate reporting of financial frauds and to stop siphoning off funds by fraudsters.<\/li>\r\n\t<li><strong>Massive Open Online Courses (MOOC) platform<\/strong>: namely the \u2018CyTrain\u2019 portal has been developed for the capacity building of public officials.<\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\n<h3>Other Measures<\/h3>\r\n<ul>\r\n\t<li><strong>Chief Information Security Officers:<\/strong>\u00a0Guidelines have been issued for CISOs for securing applications\/infrastructure and compliance in different organisations.<\/li>\r\n\t<li><strong>Cyber Auditing:<\/strong>\u00a0All the new government websites and applications are audited prior to their hosting and on a regular basis after hosting.<\/li>\r\n\t<li><strong>Cyber Crime Prevention for Women and Children (CCPWC) Scheme:<\/strong>\u00a0The government has released grants to States\/UTs for setting up a Cyber Forensic cum Training Laboratory and organising capacity-building programs on cyber awareness and cyber crime investigation.<\/li>\r\n<\/ul>\r\n<h2>Suggested Measures to Enhance Cyber Security in India<\/h2>\r\n<p>According to the\u00a0<strong>World Economic Forum\u2019s Global Cybersecurity Outlook 2024<\/strong>, there is a widening gap among organisations concerning cyber resilience. To make conditions bad, cyber-skills and talent shortages increase vulnerability to threats. The following are major measures that can be taken in India:<\/p>\r\n<ul>\r\n\t<li><strong>End-user protection:<\/strong>\u00a0It is an individual (the end-user) who accidentally uploads malware or another form of cyber threat. The following measures can be taken:\r\n\r\n<ul>\r\n\t<li>Implement firewall and threat detection software.<\/li>\r\n\t<li>Install security patches and updates.<\/li>\r\n\t<li>Regularly update software.<\/li>\r\n\t<li>Scan files from unknown sources.<\/li>\r\n<\/ul>\r\n<\/li>\r\n\t<li><strong>Cyber Insurance:<\/strong>\u00a0According to\u00a0<strong>IRDAI<\/strong>, cyber insurance is an insurance policy designed to protect the policyholders from cybercrimes. It is a risk management and mitigation strategy that has a corollary benefit of improving the adoption of preventive measures. It can help move from cyber risk mitigation to cyber risk prevention.<\/li>\r\n\t<li><strong>Legislative Reforms:\u00a0<\/strong>India must consider enacting the\u00a0<strong>Indian Cybersecurity Act<\/strong>, dedicated to dealing with present-day cybersecurity challenges such as cyberterrorism and spam, and empowering investigating agencies.<\/li>\r\n\t<li><strong>Administrative Reforms:<\/strong>\r\n<ul>\r\n\t<li><strong>Multiplicity of Organisations<\/strong>: Multiple government organisations handle cybersecurity in India, resulting in\u00a0<strong>overlapping jurisdictions<\/strong>\u00a0and confusion among organisations. The jurisdictional limits must be detailed through legislation to the extent possible.<\/li>\r\n\t<li><strong>Clear jurisdictions:<\/strong>\u00a0There should be a regular review to keep cybersecurity updated as per the continuously evolving cyberspace.\r\n\r\n<ul>\r\n\t<li>The\u00a0<strong>National Cyber Security Coordinator<\/strong>\u00a0must proactively coordinate the activities of the cybersecurity agencies.<\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\n<\/li>\r\n\t<li><strong>Awareness Programmes:\u00a0<\/strong>The government must consider launching a cyber literacy program.<\/li>\r\n\t<li><strong>Indian Cybersecurity Service:\u00a0<\/strong>As recommended by\u00a0<strong>IDSA,<\/strong>\u00a0the government should establish the Indian Cybersecurity Service as an all-India civil service.<\/li>\r\n\t<li><strong>Infrastructural Investments and Upgradation:<\/strong>\u00a0In addition to protecting IP, and trade secrets and preserving India\u2019s data sovereignty, it is imperative to secure financial transactions and communications taking place through cyber networks. The following measures can be taken:\r\n\r\n<ul>\r\n\t<li><strong>Sectoral CERTs:\u00a0<\/strong>These must be operationalised in more fields.<\/li>\r\n\t<li><strong>Recovery capability:<\/strong>\u00a0the government must develop disaster recovery capabilities against cyber attacks.<\/li>\r\n\t<li><strong>Cyberspace safety fund:\u00a0<\/strong>to meet all cybersecurity contingencies of India.<\/li>\r\n<\/ul>\r\n<\/li>\r\n\t<li><strong>Strengthening capacity:<\/strong>\r\n<ul>\r\n\t<li><strong>Cyber forensics:<\/strong>\u00a0It is the process of using electronic equipment to gather data as evidence for a crime. There is a lack of proper training, technology upgradation as well as devices with enforcement agencies.<\/li>\r\n\t<li><strong>Increasing capacity of Police:\u00a0<\/strong>Police lack the capabilities to investigate cyber crimes and frauds occurring on a daily basis.\r\n\r\n<ul>\r\n\t<li>According to Delhi Police in 2023-24 almost\u00a0<strong>200 people<\/strong>\u00a0fell prey to cyber frauds every day and the number is rising.<\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\n<h2>Cybersecurity UPSC PYQs<\/h2>\r\n<p><strong>Question 1.<\/strong>\u00a0What are the different elements of cyber security? Keeping in view the challenges in cyber security examine the extent to which India has successfully developed a comprehensive National Cyber Security Strategy.\u00a0<strong>(UPSC Mains 2022)<\/strong><\/p>\r\n<p><strong>Question 2.<\/strong>\u00a0Keeping in view India\u2019s internal security, analyze the impact of cross-border cyber attacks. Also, discuss defensive measures against these sophisticated attacks.\u00a0<strong>(UPSC Mains 2021)<\/strong><\/p>\r\n<p><strong>Question 3.<\/strong>\u00a0Discuss different types of cybercrimes and measures required to be taken to fight the menace.\u00a0<strong>(UPSC Mains 2020)<\/strong><\/p>\r\n<p><strong>Question 4.<\/strong>\u00a0What is the CyberDome Project? Explain how it can be useful in controlling internet crimes in India.\u00a0<strong>(UPSC Mains 2019)<\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>Cyber security refers to technologies, processes, and rules created to protect computer systems, servers, networks, programs, and data from cyber-attacks. It aims to protect against the unauthorised access and misuse of computer systems, networks, programs, and data.<\/p>\n","protected":false},"author":6,"featured_media":14964,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[38],"tags":[66,40],"class_list":{"0":"post-2623","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-upsc-notes","8":"tag-cybersecurity","9":"tag-quest"},"acf":[],"_links":{"self":[{"href":"https:\/\/vajiramandravi.com\/upsc-exam\/wp-json\/wp\/v2\/posts\/2623","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/vajiramandravi.com\/upsc-exam\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/vajiramandravi.com\/upsc-exam\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/vajiramandravi.com\/upsc-exam\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/vajiramandravi.com\/upsc-exam\/wp-json\/wp\/v2\/comments?post=2623"}],"version-history":[{"count":1,"href":"https:\/\/vajiramandravi.com\/upsc-exam\/wp-json\/wp\/v2\/posts\/2623\/revisions"}],"predecessor-version":[{"id":20012,"href":"https:\/\/vajiramandravi.com\/upsc-exam\/wp-json\/wp\/v2\/posts\/2623\/revisions\/20012"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/vajiramandravi.com\/upsc-exam\/wp-json\/wp\/v2\/media\/14964"}],"wp:attachment":[{"href":"https:\/\/vajiramandravi.com\/upsc-exam\/wp-json\/wp\/v2\/media?parent=2623"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/vajiramandravi.com\/upsc-exam\/wp-json\/wp\/v2\/categories?post=2623"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/vajiramandravi.com\/upsc-exam\/wp-json\/wp\/v2\/tags?post=2623"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}