{"id":19870,"date":"2021-08-12T09:00:00","date_gmt":"2021-08-12T08:00:00","guid":{"rendered":"https:\/\/www.engineernewsnetwork.com\/blog\/?p=19870"},"modified":"2021-08-16T07:43:23","modified_gmt":"2021-08-16T06:43:23","slug":"the-six-major-type-of-cyber-security-incidents","status":"publish","type":"post","link":"https:\/\/www.engineernewsnetwork.com\/blog\/the-six-major-type-of-cyber-security-incidents\/","title":{"rendered":"The six major \u2018type\u2019 of cyber security incidents"},"content":{"rendered":"\n<p>As the sophistication and severity of cyber-attacks\/breaches continue to intensify, cybersecurity has now rightfully become a major issue at the forefront of the public eye.\u00a0<\/p>\n\n\n\n<p>Interested in cyber security, <strong><a href=\"https:\/\/www.rebootonline.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Reboot Online Marketing<\/a><\/strong> analysed the latest data from the <strong><a href=\"https:\/\/ico.org.uk\/\" target=\"_blank\" rel=\"noreferrer noopener\">Information Commissioner&#8217;s Office (ICO)<\/a><\/strong> to establish which type of major cyber security incidents were reported to them the most from April 2020 to March 2021 (2020\/21).&nbsp;<\/p>\n\n\n\n<p>The six major \u2018type\u2019 of cybersecurity incidents included: phishing, unauthorised access, ransomware, malware, hardware\/software misconfiguration and brute force.&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><a href=\"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2021\/08\/Untitled1.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"564\" height=\"283\" src=\"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2021\/08\/Untitled1.jpg\" alt=\"\" class=\"wp-image-19872\" srcset=\"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2021\/08\/Untitled1.jpg 564w, https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2021\/08\/Untitled1-300x151.jpg 300w\" sizes=\"auto, (max-width: 564px) 100vw, 564px\" \/><\/a><\/figure><\/div>\n\n\n\n<p><strong>Analysis of the results from the research<\/strong>Reboot Online Marketing found that the ICO received 907 reports of phishing between April 2020 to March 2021 \u2013 the equivalent of two phishing incidents a day! Compared to April 2019 to March 2020, it represents 21% drop in year-on-year phishing incidents.&nbsp;<\/p>\n\n\n\n<p>In second place there were 562 cases of unauthorised access brought to light to the ICO from April 2020 to March 2021. Despite this, it was a 6% fall from April 2019 \u2013 March 2020, where there were 597 incidences of unauthorised access.&nbsp;<\/p>\n\n\n\n<p>Ransomware was the cybersecurity incident which experienced the biggest year-on-year increase at 215%. In 2020\/21 there were a total of 504 cases reported to the ICO in contrast to the 160 the year before (2019\/20).&nbsp;<\/p>\n\n\n\n<p>Malware (127) and hardware\/software misconfiguration (87) are among the other major cyber security incident types that were made aware to the ICO over 80 individual times each during 2020\/21, respectively ranking fourth and fifth.&nbsp;<\/p>\n\n\n\n<p>At the other end in sixth place is brute force, as the ICO were alerted of 62 occurrences of the cryptography-centric attack in 2020\/21. Alarmingly, it symbolises a 77% increase in brute force attacks when shadowed against 2019\/20, when 35 incidents were recorded by the ICO.&nbsp;<\/p>\n\n\n\n<p>Overall, when combining the figures together for the six categories, there were a grand total of 2,249 major cybersecurity incidents reported to the ICO in 2020\/21. &nbsp;<\/p>\n\n\n\n<p><strong>Major cybersecurity incident types explained<\/strong><\/p>\n\n\n\n<p><strong>What is phishing?&nbsp;<\/strong>Phishing is a cybercrime where deceptive emails and\/or websites are used by opportunistic cyber criminals to trick targets into handing over their personal data\/information such as banking details.<\/p>\n\n\n\n<p><strong>What is unauthorised access?<\/strong> Unauthorised access is when a cybercriminal gains unauthorised access to a computer network, server, program, website, or system using someone else\u2019s account\/login credentials.&nbsp;<\/p>\n\n\n\n<p><strong>What is malware?<\/strong> Malware is any software designed by a cybercriminal to intentionally cause damage to a computer network, server, program, website, or system. The malicious software can perform a wide variety of functions such as stealing, encrypting, or deleting sensitive data as well as monitoring a target\u2019s computer activity.&nbsp;<\/p>\n\n\n\n<p><strong>What is ransomware?&nbsp;<\/strong>A form of malware, a ransomware attack by a cybercriminal encrypts a victim\u2019s files. To restore access to the data, the victim must meet the payment demands of the cybercriminal, hence being held to ransom. &nbsp;<\/p>\n\n\n\n<p><strong>What is hardware\/software misconfiguration?&nbsp;<\/strong>Hardware\/software misconfiguration is a failure to adequately implement all the security controls of a piece of hardware or software. Alternatively, implementing the security controls, but doing so with errors. In either scenario, potentially leaving sensitive data at the risk of being exploited by cybercriminals.<\/p>\n\n\n\n<p><strong>What is brute force?&nbsp;<\/strong><\/p>\n\n\n\n<p>A brute force attack is when a cybercriminal uses a trial-and-error process to guess login information. An attacker tries as many passwords or passphrases as possible in the hope they will eventually identify the correct one.&nbsp;<\/p>\n\n\n\n<p><strong>Methodology for the research<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong><a href=\"https:\/\/www.rebootonline.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Reboot Online Marketing<\/a> <\/strong>analysed data from the <strong><a href=\"https:\/\/ico.org.uk\/\" target=\"_blank\" rel=\"noreferrer noopener\">Information Commissioner&#8217;s Office (ICO)<\/a> <\/strong>to identify how many times six different major cybersecurity incidents had been reported to the ICO from April 2020 to March 2021 (2020\/21).&nbsp;<\/li><li>To achieve this, Reboot Online Marketing established phishing, unauthorised access, ransomware, malware, hardware\/software misconfiguration and brute force as the six major cybersecurity incident types.&nbsp;<\/li><li>Reboot Online Marketing then calculated how many cases for each of the six major cyber incident types were reported to the ICO in four different quarters (Q1 \u2013 Apr to Jun 2020, Q2 \u2013 Jul to Sep 2020, Q3 \u2013 Oct to Dec 2020, Q4 \u2013 Jan to Mar 2021).&nbsp;<\/li><li>Once the figures for each of the six major cybersecurity incident types were established for each of the four quarters, the individual figures for the four quarters were added together to establish a collective total figure for a 12-month period.&nbsp;<\/li><li>The figures were then ranked from highest to lowest based on the number of cases reported to the ICO for each major cybersecurity incident type.&nbsp;<\/li><li>Stage three was repeated but this time in the context of 2019\/20 data (Q1 \u2013 Apr to Jun 2019, Q2 \u2013 Jul to Sep 2019, Q3 \u2013 Oct to Dec 2019, Q4 \u2013 Jan to Mar 2020).<\/li><li>The 2020\/21 case figures for each of the six major cybersecurity incident types were compared against the 2019\/20 case figures to see if there was a year-on-year increase or decrease (represented as percentages) in case numbers for each of them.&nbsp;<\/li><li>The ICO is a non-departmental public body that reports directly to the Parliament of the United Kingdom (UK) and was set up \u201cto uphold information rights in the public interest, promoting openness by public bodies and data privacy for individuals\u201d.&nbsp;<\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>As the sophistication and severity of cyber-attacks\/breaches continue to intensify, cybersecurity has now rightfully become a major issue at the forefront of the public eye.\u00a0 Interested in cyber security, Reboot Online Marketing analysed the latest data from the Information Commissioner&#8217;s Office (ICO) to establish which type of major cyber security incidents were reported to them &hellip;<\/p>\n","protected":false},"author":1,"featured_media":19872,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[199],"tags":[5305,9495,9496,9494],"class_list":["post-19870","post","type-post","status-publish","format-standard","has-post-thumbnail","","category-news-views-and-opinion","tag-cybersecurity","tag-ico","tag-information-commissioners-office","tag-reboot-online-marketing"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The six major \u2018type\u2019 of cyber security incidents - Engineer News Network<\/title>\n<meta name=\"description\" content=\"The six major \u2018type\u2019 of cybersecurity incidents included: phishing, unauthorised access, ransomware, malware, hardware\/software misconfiguration and brute force.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.engineernewsnetwork.com\/blog\/the-six-major-type-of-cyber-security-incidents\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The six major \u2018type\u2019 of cyber security incidents - Engineer News Network\" \/>\n<meta property=\"og:description\" content=\"The six major \u2018type\u2019 of cybersecurity incidents included: phishing, unauthorised access, ransomware, malware, hardware\/software misconfiguration and brute force.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.engineernewsnetwork.com\/blog\/the-six-major-type-of-cyber-security-incidents\/\" \/>\n<meta property=\"og:site_name\" content=\"Engineer News Network\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-12T08:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-16T06:43:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2021\/08\/Untitled1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"564\" \/>\n\t<meta property=\"og:image:height\" content=\"283\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/the-six-major-type-of-cyber-security-incidents\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/the-six-major-type-of-cyber-security-incidents\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#\\\/schema\\\/person\\\/4477342aea8e299c6a21761e513ea8e1\"},\"headline\":\"The six major \u2018type\u2019 of cyber security incidents\",\"datePublished\":\"2021-08-12T08:00:00+00:00\",\"dateModified\":\"2021-08-16T06:43:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/the-six-major-type-of-cyber-security-incidents\\\/\"},\"wordCount\":834,\"image\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/the-six-major-type-of-cyber-security-incidents\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Untitled1.jpg\",\"keywords\":[\"cybersecurity\",\"ICO\",\"Information Commissioner&#039;s Office\",\"Reboot Online Marketing\"],\"articleSection\":[\"News, Views and Opinion\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/the-six-major-type-of-cyber-security-incidents\\\/\",\"url\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/the-six-major-type-of-cyber-security-incidents\\\/\",\"name\":\"The six major \u2018type\u2019 of cyber security incidents - Engineer News Network\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/the-six-major-type-of-cyber-security-incidents\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/the-six-major-type-of-cyber-security-incidents\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Untitled1.jpg\",\"datePublished\":\"2021-08-12T08:00:00+00:00\",\"dateModified\":\"2021-08-16T06:43:23+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#\\\/schema\\\/person\\\/4477342aea8e299c6a21761e513ea8e1\"},\"description\":\"The six major \u2018type\u2019 of cybersecurity incidents included: phishing, unauthorised access, ransomware, malware, hardware\\\/software misconfiguration and brute force.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/the-six-major-type-of-cyber-security-incidents\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/the-six-major-type-of-cyber-security-incidents\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/the-six-major-type-of-cyber-security-incidents\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Untitled1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Untitled1.jpg\",\"width\":564,\"height\":283},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/the-six-major-type-of-cyber-security-incidents\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The six major \u2018type\u2019 of cyber security incidents\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/\",\"name\":\"Engineer News Network\",\"description\":\"The ultimate online news and information resource for today's engineer\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#\\\/schema\\\/person\\\/4477342aea8e299c6a21761e513ea8e1\",\"name\":\"admin\",\"url\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The six major \u2018type\u2019 of cyber security incidents - Engineer News Network","description":"The six major \u2018type\u2019 of cybersecurity incidents included: phishing, unauthorised access, ransomware, malware, hardware\/software misconfiguration and brute force.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.engineernewsnetwork.com\/blog\/the-six-major-type-of-cyber-security-incidents\/","og_locale":"en_GB","og_type":"article","og_title":"The six major \u2018type\u2019 of cyber security incidents - Engineer News Network","og_description":"The six major \u2018type\u2019 of cybersecurity incidents included: phishing, unauthorised access, ransomware, malware, hardware\/software misconfiguration and brute force.","og_url":"https:\/\/www.engineernewsnetwork.com\/blog\/the-six-major-type-of-cyber-security-incidents\/","og_site_name":"Engineer News Network","article_published_time":"2021-08-12T08:00:00+00:00","article_modified_time":"2021-08-16T06:43:23+00:00","og_image":[{"width":564,"height":283,"url":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2021\/08\/Untitled1.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/the-six-major-type-of-cyber-security-incidents\/#article","isPartOf":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/the-six-major-type-of-cyber-security-incidents\/"},"author":{"name":"admin","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#\/schema\/person\/4477342aea8e299c6a21761e513ea8e1"},"headline":"The six major \u2018type\u2019 of cyber security incidents","datePublished":"2021-08-12T08:00:00+00:00","dateModified":"2021-08-16T06:43:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/the-six-major-type-of-cyber-security-incidents\/"},"wordCount":834,"image":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/the-six-major-type-of-cyber-security-incidents\/#primaryimage"},"thumbnailUrl":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2021\/08\/Untitled1.jpg","keywords":["cybersecurity","ICO","Information Commissioner&#039;s Office","Reboot Online Marketing"],"articleSection":["News, Views and Opinion"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/the-six-major-type-of-cyber-security-incidents\/","url":"https:\/\/www.engineernewsnetwork.com\/blog\/the-six-major-type-of-cyber-security-incidents\/","name":"The six major \u2018type\u2019 of cyber security incidents - Engineer News Network","isPartOf":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/the-six-major-type-of-cyber-security-incidents\/#primaryimage"},"image":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/the-six-major-type-of-cyber-security-incidents\/#primaryimage"},"thumbnailUrl":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2021\/08\/Untitled1.jpg","datePublished":"2021-08-12T08:00:00+00:00","dateModified":"2021-08-16T06:43:23+00:00","author":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#\/schema\/person\/4477342aea8e299c6a21761e513ea8e1"},"description":"The six major \u2018type\u2019 of cybersecurity incidents included: phishing, unauthorised access, ransomware, malware, hardware\/software misconfiguration and brute force.","breadcrumb":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/the-six-major-type-of-cyber-security-incidents\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.engineernewsnetwork.com\/blog\/the-six-major-type-of-cyber-security-incidents\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/the-six-major-type-of-cyber-security-incidents\/#primaryimage","url":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2021\/08\/Untitled1.jpg","contentUrl":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2021\/08\/Untitled1.jpg","width":564,"height":283},{"@type":"BreadcrumbList","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/the-six-major-type-of-cyber-security-incidents\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.engineernewsnetwork.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The six major \u2018type\u2019 of cyber security incidents"}]},{"@type":"WebSite","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#website","url":"https:\/\/www.engineernewsnetwork.com\/blog\/","name":"Engineer News Network","description":"The ultimate online news and information resource for today's engineer","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.engineernewsnetwork.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#\/schema\/person\/4477342aea8e299c6a21761e513ea8e1","name":"admin","url":"https:\/\/www.engineernewsnetwork.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts\/19870","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/comments?post=19870"}],"version-history":[{"count":2,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts\/19870\/revisions"}],"predecessor-version":[{"id":19883,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts\/19870\/revisions\/19883"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/media\/19872"}],"wp:attachment":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/media?parent=19870"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/categories?post=19870"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/tags?post=19870"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}