{"id":385,"date":"2025-11-02T19:17:29","date_gmt":"2025-11-02T18:17:29","guid":{"rendered":"https:\/\/lockpassgen.com\/blog\/le-lexique-essentiel-pour-comprendre-la-securite-informatique\/"},"modified":"2025-11-02T19:17:29","modified_gmt":"2025-11-02T18:17:29","slug":"le-lexique-essentiel-pour-comprendre-la-securite-informatique","status":"publish","type":"post","link":"https:\/\/lockpassgen.com\/blog\/le-lexique-essentiel-pour-comprendre-la-securite-informatique\/","title":{"rendered":"Le lexique essentiel pour comprendre la s\u00e9curit\u00e9 informatique"},"content":{"rendered":"\n<p><strong>Le lexique essentiel pour comprendre la s\u00e9curit\u00e9 informatique<\/strong><\/p>\n<p><\/p>\n<p>La s\u00e9curit\u00e9 informatique est un domaine en constante \u00e9volution, avec de nouveaux menaces et de nouvelles technologies \u00e9mergent chaque jour. Pour comprendre les enjeux et les solutions de s\u00e9curit\u00e9 informatique, il est essentiel de ma\u00eetriser un certain vocabulaire technique. Dans cet article, nous allons vous pr\u00e9senter les termes cl\u00e9s pour comprendre la s\u00e9curit\u00e9 informatique.<\/p>\n<p><\/p>\n<p><strong>1. Les bases de la s\u00e9curit\u00e9 informatique<\/strong><\/p>\n<p><\/p>\n<ul><\/p>\n<li><strong>S\u00e9curit\u00e9 informatique<\/strong> : ensemble des mesures destin\u00e9es \u00e0 prot\u00e9ger les syst\u00e8mes d&rsquo;information, les donn\u00e9es et les r\u00e9seaux contre les acc\u00e8s non autoris\u00e9s, les pertes, les vols ou les alt\u00e9rations.<\/li>\n<p><\/p>\n<li><strong>Donn\u00e9e sensible<\/strong> : information confidentielle qui n\u00e9cessite une protection particuli\u00e8re, telle que les donn\u00e9es personnelles, les informations financi\u00e8res ou les secrets commerciaux.<\/li>\n<p><\/p>\n<li><strong>Risque<\/strong> : situation ou \u00e9v\u00e9nement qui pourrait avoir un impact n\u00e9gatif sur la s\u00e9curit\u00e9 des syst\u00e8mes d&rsquo;information ou des donn\u00e9es.<\/li>\n<p>\n<\/ul>\n<p><\/p>\n<p><strong>2. Les menaces<\/strong><\/p>\n<p><\/p>\n<ul><\/p>\n<li><strong>Virus<\/strong> : programme malveillant qui se propage en infectant d&rsquo;autres fichiers ou syst\u00e8mes.<\/li>\n<p><\/p>\n<li><strong>Ver<\/strong> : programme malveillant qui se propage en se reproduisant lui-m\u00eame, sans n\u00e9cessiter d&rsquo;interaction humaine.<\/li>\n<p><\/p>\n<li><strong>Cheval de Troie<\/strong> : programme malveillant qui se dissimule sous une apparence innocente pour tromper les utilisateurs et acc\u00e9der \u00e0 des syst\u00e8mes ou des donn\u00e9es sensibles.<\/li>\n<p><\/p>\n<li><strong>Phishing<\/strong> : technique d&rsquo;attaque qui consiste \u00e0 envoyer des messages frauduleux pour obtenir des informations confidentielles, telles que des mots de passe ou des coordonn\u00e9es bancaires.<\/li>\n<p><\/p>\n<li><strong>Ransomware<\/strong> : logiciel malveillant qui chifre les donn\u00e9es de la victime et exige une ran\u00e7on pour les d\u00e9chiffrer.<\/li>\n<p>\n<\/ul>\n<p><\/p>\n<p><strong>3. Les solutions de s\u00e9curit\u00e9<\/strong><\/p>\n<p><\/p>\n<ul><\/p>\n<li><strong>Firewall<\/strong> : syst\u00e8me de protection qui contr\u00f4le le trafic r\u00e9seau et bloque les acc\u00e8s non autoris\u00e9s.<\/li>\n<p><\/p>\n<li><strong>Antivirus<\/strong> : logiciel qui d\u00e9tecte et \u00e9limine les programmes malveillants.<\/li>\n<p><\/p>\n<li><strong>Chiffrement<\/strong> : technique qui transforme les donn\u00e9es en un code ind\u00e9chiffrable pour les prot\u00e9ger contre les acc\u00e8s non autoris\u00e9s.<\/li>\n<p><\/p>\n<li><strong>Authentification<\/strong> : processus qui permet de v\u00e9rifier l&rsquo;identit\u00e9 d&rsquo;un utilisateur ou d&rsquo;un syst\u00e8me avant de lui accorder l&rsquo;acc\u00e8s \u00e0 des ressources sensibles.<\/li>\n<p><\/p>\n<li><strong>Mise \u00e0 jour<\/strong> : processus de correction des vuln\u00e9rabilit\u00e9s et des failles de s\u00e9curit\u00e9 dans les logiciels et les syst\u00e8mes d&rsquo;exploitation.<\/li>\n<p>\n<\/ul>\n<p><\/p>\n<p><strong>4. Les protocoles et les normes<\/strong><\/p>\n<p><\/p>\n<ul><\/p>\n<li><strong>HTTPS<\/strong> : protocole de communication s\u00e9curis\u00e9 qui utilise le chiffrement pour prot\u00e9ger les donn\u00e9es en transit.<\/li>\n<p><\/p>\n<li><strong>SSL\/TLS<\/strong> : protocole de chiffrement qui s\u00e9curise les communications entre les navigateurs et les serveurs.<\/li>\n<p><\/p>\n<li><strong>ISO 27001<\/strong> : norme internationale de s\u00e9curit\u00e9 des syst\u00e8mes d&rsquo;information qui d\u00e9finit les exigences pour la mise en \u0153uvre d&rsquo;un syst\u00e8me de gestion de la s\u00e9curit\u00e9 des informations.<\/li>\n<p>\n<\/ul>\n<p><\/p>\n<p><strong>Conclusion<\/strong><\/p>\n<p><\/p>\n<p>La s\u00e9curit\u00e9 informatique est un domaine complexe qui n\u00e9cessite une compr\u00e9hension approfondie des menaces, des solutions et des protocoles de s\u00e9curit\u00e9. En ma\u00eetrisant les termes cl\u00e9s pr\u00e9sent\u00e9s dans cet article, vous serez mieux \u00e9quip\u00e9 pour comprendre les enjeux de la s\u00e9curit\u00e9 informatique et prendre des d\u00e9cisions \u00e9clair\u00e9es pour prot\u00e9ger vos syst\u00e8mes, vos donn\u00e9es et vos utilisateurs. Il est important de rester vigilant et de suivre les derni\u00e8res tendances et les meilleures pratiques en mati\u00e8re de s\u00e9curit\u00e9 informatique pour garantir la s\u00e9curit\u00e9 et la confidentialit\u00e9 de vos informations.<\/p>\n<a href=\"https:\/\/fourcalculator.com\">Calculatrice multifonction<\/a><br\/>\r\n<a href=\"https:\/\/compresserimage.com\">Compressez vos images gratuitement<\/a><br\/>\r\n<a href=\"https:\/\/qrcodeready.com\">G\u00e9n\u00e9rez un code QR gratuitement<\/a><br\/>\r\n<a href=\"https:\/\/appointworks.com\">Cr\u00e9ez votre lien de r\u00e9servation public, g\u00e9rez les disponibilit\u00e9s, le personnel et les rendez-vous.<\/a><br\/>\r\n<a href=\"https:\/\/cheapesimcard.com\/\">Reste connect\u00e9 partout avec la bonne eSIM, au bon prix.<\/a>\r\n\n","protected":false},"excerpt":{"rendered":"<p>Le lexique essentiel pour comprendre la s\u00e9curit\u00e9 informatique La s\u00e9curit\u00e9 informatique est un domaine en constante \u00e9volution, avec de nouveaux menaces et de nouvelles technologies \u00e9mergent chaque jour. Pour comprendre les enjeux et les solutions&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[1],"tags":[351],"class_list":["post-385","post","type-post","status-publish","format-standard","hentry","category-articles","tag-le-lexique-essentiel-pour-comprendre-la-securite-informatique"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Le lexique essentiel pour comprendre la s\u00e9curit\u00e9 informatique - LockPassGen<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/lockpassgen.com\/blog\/le-lexique-essentiel-pour-comprendre-la-securite-informatique\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Le lexique essentiel pour comprendre la s\u00e9curit\u00e9 informatique - LockPassGen\" \/>\n<meta property=\"og:description\" content=\"Le lexique essentiel pour comprendre la s\u00e9curit\u00e9 informatique La s\u00e9curit\u00e9 informatique est un domaine en constante \u00e9volution, avec de nouveaux menaces et de nouvelles technologies \u00e9mergent chaque jour. Pour comprendre les enjeux et les solutions...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/lockpassgen.com\/blog\/le-lexique-essentiel-pour-comprendre-la-securite-informatique\/\" \/>\n<meta property=\"og:site_name\" content=\"LockPassGen\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-02T18:17:29+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/lockpassgen.com\\\/blog\\\/le-lexique-essentiel-pour-comprendre-la-securite-informatique\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/lockpassgen.com\\\/blog\\\/le-lexique-essentiel-pour-comprendre-la-securite-informatique\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/lockpassgen.com\\\/blog\\\/#\\\/schema\\\/person\\\/8ce1dda17eed3b91ca904806c7fafe26\"},\"headline\":\"Le lexique essentiel pour comprendre la s\u00e9curit\u00e9 informatique\",\"datePublished\":\"2025-11-02T18:17:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/lockpassgen.com\\\/blog\\\/le-lexique-essentiel-pour-comprendre-la-securite-informatique\\\/\"},\"wordCount\":568,\"publisher\":{\"@id\":\"https:\\\/\\\/lockpassgen.com\\\/blog\\\/#organization\"},\"keywords\":[\"Le lexique essentiel pour comprendre la s\u00e9curit\u00e9 informatique\"],\"articleSection\":[\"Articles\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/lockpassgen.com\\\/blog\\\/le-lexique-essentiel-pour-comprendre-la-securite-informatique\\\/\",\"url\":\"https:\\\/\\\/lockpassgen.com\\\/blog\\\/le-lexique-essentiel-pour-comprendre-la-securite-informatique\\\/\",\"name\":\"Le lexique essentiel pour comprendre la s\u00e9curit\u00e9 informatique - LockPassGen\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/lockpassgen.com\\\/blog\\\/#website\"},\"datePublished\":\"2025-11-02T18:17:29+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/lockpassgen.com\\\/blog\\\/le-lexique-essentiel-pour-comprendre-la-securite-informatique\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/lockpassgen.com\\\/blog\\\/le-lexique-essentiel-pour-comprendre-la-securite-informatique\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/lockpassgen.com\\\/blog\\\/le-lexique-essentiel-pour-comprendre-la-securite-informatique\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/lockpassgen.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Le lexique essentiel pour comprendre la s\u00e9curit\u00e9 informatique\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/lockpassgen.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/lockpassgen.com\\\/blog\\\/\",\"name\":\"QR Code Generator\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/lockpassgen.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/lockpassgen.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/lockpassgen.com\\\/blog\\\/#organization\",\"name\":\"QR Code Ready\",\"url\":\"https:\\\/\\\/lockpassgen.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/lockpassgen.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/shorturl.ma\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/logo-qrcode.png\",\"contentUrl\":\"https:\\\/\\\/shorturl.ma\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/logo-qrcode.png\",\"width\":622,\"height\":173,\"caption\":\"QR Code Ready\"},\"image\":{\"@id\":\"https:\\\/\\\/lockpassgen.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/lockpassgen.com\\\/blog\\\/#\\\/schema\\\/person\\\/8ce1dda17eed3b91ca904806c7fafe26\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e6cde6bf670c88913fd309492d1a2182418cbffa077565aa59f98c5dd4a5ed6c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e6cde6bf670c88913fd309492d1a2182418cbffa077565aa59f98c5dd4a5ed6c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e6cde6bf670c88913fd309492d1a2182418cbffa077565aa59f98c5dd4a5ed6c?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/shorturl.ma\\\/blog\"],\"url\":\"https:\\\/\\\/lockpassgen.com\\\/blog\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Le lexique essentiel pour comprendre la s\u00e9curit\u00e9 informatique - LockPassGen","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/lockpassgen.com\/blog\/le-lexique-essentiel-pour-comprendre-la-securite-informatique\/","og_locale":"fr_FR","og_type":"article","og_title":"Le lexique essentiel pour comprendre la s\u00e9curit\u00e9 informatique - LockPassGen","og_description":"Le lexique essentiel pour comprendre la s\u00e9curit\u00e9 informatique La s\u00e9curit\u00e9 informatique est un domaine en constante \u00e9volution, avec de nouveaux menaces et de nouvelles technologies \u00e9mergent chaque jour. Pour comprendre les enjeux et les solutions...","og_url":"https:\/\/lockpassgen.com\/blog\/le-lexique-essentiel-pour-comprendre-la-securite-informatique\/","og_site_name":"LockPassGen","article_published_time":"2025-11-02T18:17:29+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"admin","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/lockpassgen.com\/blog\/le-lexique-essentiel-pour-comprendre-la-securite-informatique\/#article","isPartOf":{"@id":"https:\/\/lockpassgen.com\/blog\/le-lexique-essentiel-pour-comprendre-la-securite-informatique\/"},"author":{"name":"admin","@id":"https:\/\/lockpassgen.com\/blog\/#\/schema\/person\/8ce1dda17eed3b91ca904806c7fafe26"},"headline":"Le lexique essentiel pour comprendre la s\u00e9curit\u00e9 informatique","datePublished":"2025-11-02T18:17:29+00:00","mainEntityOfPage":{"@id":"https:\/\/lockpassgen.com\/blog\/le-lexique-essentiel-pour-comprendre-la-securite-informatique\/"},"wordCount":568,"publisher":{"@id":"https:\/\/lockpassgen.com\/blog\/#organization"},"keywords":["Le lexique essentiel pour comprendre la s\u00e9curit\u00e9 informatique"],"articleSection":["Articles"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/lockpassgen.com\/blog\/le-lexique-essentiel-pour-comprendre-la-securite-informatique\/","url":"https:\/\/lockpassgen.com\/blog\/le-lexique-essentiel-pour-comprendre-la-securite-informatique\/","name":"Le lexique essentiel pour comprendre la s\u00e9curit\u00e9 informatique - LockPassGen","isPartOf":{"@id":"https:\/\/lockpassgen.com\/blog\/#website"},"datePublished":"2025-11-02T18:17:29+00:00","breadcrumb":{"@id":"https:\/\/lockpassgen.com\/blog\/le-lexique-essentiel-pour-comprendre-la-securite-informatique\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/lockpassgen.com\/blog\/le-lexique-essentiel-pour-comprendre-la-securite-informatique\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/lockpassgen.com\/blog\/le-lexique-essentiel-pour-comprendre-la-securite-informatique\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/lockpassgen.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Le lexique essentiel pour comprendre la s\u00e9curit\u00e9 informatique"}]},{"@type":"WebSite","@id":"https:\/\/lockpassgen.com\/blog\/#website","url":"https:\/\/lockpassgen.com\/blog\/","name":"QR Code Generator","description":"","publisher":{"@id":"https:\/\/lockpassgen.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/lockpassgen.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/lockpassgen.com\/blog\/#organization","name":"QR Code Ready","url":"https:\/\/lockpassgen.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/lockpassgen.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/shorturl.ma\/blog\/wp-content\/uploads\/2025\/05\/logo-qrcode.png","contentUrl":"https:\/\/shorturl.ma\/blog\/wp-content\/uploads\/2025\/05\/logo-qrcode.png","width":622,"height":173,"caption":"QR Code Ready"},"image":{"@id":"https:\/\/lockpassgen.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/lockpassgen.com\/blog\/#\/schema\/person\/8ce1dda17eed3b91ca904806c7fafe26","name":"admin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/e6cde6bf670c88913fd309492d1a2182418cbffa077565aa59f98c5dd4a5ed6c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e6cde6bf670c88913fd309492d1a2182418cbffa077565aa59f98c5dd4a5ed6c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e6cde6bf670c88913fd309492d1a2182418cbffa077565aa59f98c5dd4a5ed6c?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/shorturl.ma\/blog"],"url":"https:\/\/lockpassgen.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/lockpassgen.com\/blog\/wp-json\/wp\/v2\/posts\/385","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lockpassgen.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lockpassgen.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lockpassgen.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lockpassgen.com\/blog\/wp-json\/wp\/v2\/comments?post=385"}],"version-history":[{"count":0,"href":"https:\/\/lockpassgen.com\/blog\/wp-json\/wp\/v2\/posts\/385\/revisions"}],"wp:attachment":[{"href":"https:\/\/lockpassgen.com\/blog\/wp-json\/wp\/v2\/media?parent=385"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lockpassgen.com\/blog\/wp-json\/wp\/v2\/categories?post=385"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lockpassgen.com\/blog\/wp-json\/wp\/v2\/tags?post=385"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}