{"id":1206,"date":"2023-07-07T14:23:05","date_gmt":"2023-07-07T18:23:05","guid":{"rendered":"https:\/\/challenge.carleton.ca\/?p=1206"},"modified":"2023-11-24T09:49:02","modified_gmt":"2023-11-24T14:49:02","slug":"deterrence-theory-cybersecurity-updates","status":"publish","type":"post","link":"https:\/\/challenge.carleton.ca\/deterrence-theory-cybersecurity-updates\/","title":{"rendered":"Applying Traditional War Theory to Cybersecurity"},"content":{"rendered":"
\n
\n
<\/div>\n<\/div>\n
\n
\n
Cybersecurity is one of the biggest threats affecting the global economy. Identified by the World Economic Forum as one of the top ten global risks both currently and in the future, it is estimated to cost an annual $10.5 trillion<\/a> by 2025.With the rising risk and cost of protecting personal data, governments, policy makers and researchers are pooling their resources to build a more robust cybersecurity strategy.<\/div>\n
\n
\n
\n

Alex Wilner<\/a>, a researcher at Carleton University’s Norman Paterson School of International Affairs<\/a> and director of the Infrastructure Protection and International Security program<\/a>, is part of this collaborative effort. Wilner is a leading expert in deterrence theory \u2013 a traditional wartime theory that refers to the practice of how to deter attacks \u2013 and is expanding its scholarship to apply to cyberspace.<\/p>\n

\"A
Carleton University researcher Alex Wilner<\/figcaption><\/figure>\n

“Deterrence is about keeping you safe from attack by convincing an adversary not to attack you in the first place,” Wilner says.<\/p><\/blockquote>\n

“We’re looking at how to do that in the complicated and vast world of cyberspace.”<\/p>\n

Cybersecurity & Cyber Deterrence<\/h2>\n

Deterrence theory is technically very simple \u2013 a defender needs to convince an aggressor that either the costs of attacking are too high, or the benefits of doing so are too low. This concept dates back to the Cold War when the United States and the Soviet Union deterred invasions through threats of nuclear retaliation.<\/p>\n

Since then and with the growth of the internet, security threats have expanded to cyberspace. In response, Wilner is modernizing traditional deterrence theory to make it applicable to cyber threats. With his team of 10 Carleton graduate students, Wilner has compiled data on the types of cyber incidents that are happening in Canada and abroad to better understand who is conducting these attacks and how to deter them.<\/p>\n

“When you download and use a new app, engage with digital commerce, or register for certain provincial or federal services, your information is at risk of capture,” Wilner explains.<\/p><\/blockquote>\n

The cyber attacks Canadians face vary from malware, which leads to unauthorized access and theft of sensitive data; spyware, which collects and sends information to a third party; phishing, which gain access to personal or business information through fraudulent emails; and ransomware, which locks users from accessing their data, forcing them to pay a ransom to regain control.<\/p>\n

\"A
Tippapatt \/ iStock<\/figcaption><\/figure>\n

“The vast majority of cyber attacks are not stemming from a central government or military trying to penetrate your computer, and steal data for intelligence purposes,” says Wilner. “Rather, it’s a criminal syndicate stealing your data in order to sell it.”<\/p>\n

Influencing Cyber Policy<\/h2>\n

With a better understanding of emerging cybersecurity threats, Wilner is working with the Department of National Defence, Global Affairs Canada, and others, to develop Canada’s cyber deterrence posture<\/a>. The posture will define unacceptable behaviour in cyberspace and outline what retaliation can be taken as a result of engaging in that behaviour.<\/p>\n

“We’ve done this in the physical world. We know that certain behaviours \u2013 like using chemical weapons, political assassinations, and torture \u2013 cross a red line. But where is that line drawn for cybersecurity?” Wilner asks.<\/p><\/blockquote>\n

“If we can create a better understanding of how we will respond to various forms of cyber aggression, then we can diminish even the most severe types of cyber attack.”<\/p>\n

\"Group
Evgeniy Shkolenko \/ iStock<\/figcaption><\/figure>\n

Part of the solution may entail building a version of an extended deterrence relationship between the Canadian government and everyone else. Governments and militaries have the ability to retaliate to cyber aggression using both cyber and physical means. But no provincial or municipal government, private or non-profit actor, or individual can do the same. It’s not lawful, nor do they have the means. In extended deterrence, the central government deters malicious activity on behalf of others.<\/p>\n

Looking Ahead: Artificial Intelligence<\/h2>\n

With the recent rise in the use of artificial intelligence (AI), the Carleton researcher is looking at ways in which AI may facilitate deterrence by speeding up how we collect, assess and act on intelligence.<\/p>\n

“What is concerning many experts in the field is the pairing of AI with weapons and robotics, effectively providing faster-than-life responses to traditional aggression. If that future emerges, it won’t only influence the ethics of warfare, but will fundamentally alter how we think about and apply deterrence to international affairs,” Wilner warns.<\/p><\/blockquote>\n

Wilner first became interested in deterrence theory after al-Qaeda’s 9\/11 attack and went on to emerge as a leading figure in the field of terrorism deterrence. Now he is hoping his timely work on cyber deterrence will help address cybersecurity issues that plague Canadians every day.<\/p>\n

\"An
Evgeniy Alyoshin \/ iStock<\/figcaption><\/figure>\n

“Right now, online attackers feel untouchable. We need them to know that if they come for us, whether it be our infrastructure, our businesses, or our people \u2013 that we have the means, the right, and the will to retaliate as required.”<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"

Cybersecurity is one of the biggest threats affecting the global economy. Identified by the World Economic Forum as one of the top ten global risks both currently and in the future, it is estimated to cost an annual $10.5 trillion by 2025.With the rising risk and cost of protecting personal data, governments, policy makers and […]<\/p>\n","protected":false},"author":10,"featured_media":1211,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[4],"tags":[],"yoast_head":"\nResearcher Updates Deterrence Theory to Prevent Cyber Attacks<\/title>\n<meta name=\"description\" content=\"Deterrence theory is technically very simple \u2013 a defender needs to convince an aggressor that either the costs of attacking are too high, or\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/challenge.carleton.ca\/deterrence-theory-cybersecurity-updates\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Researcher Updates Deterrence Theory to Prevent Cyber Attacks\" \/>\n<meta property=\"og:description\" content=\"Deterrence theory is technically very simple \u2013 a defender needs to convince an aggressor that either the costs of attacking are too high, or\" \/>\n<meta property=\"og:url\" content=\"https:\/\/challenge.carleton.ca\/deterrence-theory-cybersecurity-updates\/\" \/>\n<meta property=\"og:site_name\" content=\"Challenge What's Possible\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/carletonuniversity\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-07T18:23:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-24T14:49:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/challenge.carleton.ca\/wp-content\/uploads\/2023\/07\/cybersecurity-deterrence-theory-1200x700-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"700\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jena Lynde-Smith\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Carleton_U\" \/>\n<meta name=\"twitter:site\" content=\"@Carleton_U\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jena Lynde-Smith\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/challenge.carleton.ca\/deterrence-theory-cybersecurity-updates\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/challenge.carleton.ca\/deterrence-theory-cybersecurity-updates\/\"},\"author\":{\"name\":\"Jena Lynde-Smith\",\"@id\":\"https:\/\/challenge.carleton.ca\/#\/schema\/person\/c70b41979f1fa7a5963f7354976ae7be\"},\"headline\":\"Applying Traditional War Theory to Cybersecurity\",\"datePublished\":\"2023-07-07T18:23:05+00:00\",\"dateModified\":\"2023-11-24T14:49:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/challenge.carleton.ca\/deterrence-theory-cybersecurity-updates\/\"},\"wordCount\":834,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/challenge.carleton.ca\/#organization\"},\"image\":{\"@id\":\"https:\/\/challenge.carleton.ca\/deterrence-theory-cybersecurity-updates\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/challenge.carleton.ca\/wp-content\/uploads\/2023\/07\/cybersecurity-deterrence-theory-1200x700-1.jpg\",\"articleSection\":[\"Technology for Good\"],\"inLanguage\":\"en-CA\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/challenge.carleton.ca\/deterrence-theory-cybersecurity-updates\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/challenge.carleton.ca\/deterrence-theory-cybersecurity-updates\/\",\"url\":\"https:\/\/challenge.carleton.ca\/deterrence-theory-cybersecurity-updates\/\",\"name\":\"Researcher Updates Deterrence Theory to Prevent Cyber Attacks\",\"isPartOf\":{\"@id\":\"https:\/\/challenge.carleton.ca\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/challenge.carleton.ca\/deterrence-theory-cybersecurity-updates\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/challenge.carleton.ca\/deterrence-theory-cybersecurity-updates\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/challenge.carleton.ca\/wp-content\/uploads\/2023\/07\/cybersecurity-deterrence-theory-1200x700-1.jpg\",\"datePublished\":\"2023-07-07T18:23:05+00:00\",\"dateModified\":\"2023-11-24T14:49:02+00:00\",\"description\":\"Deterrence theory is technically very simple \u2013 a defender needs to convince an aggressor that either the costs of attacking are too high, or\",\"breadcrumb\":{\"@id\":\"https:\/\/challenge.carleton.ca\/deterrence-theory-cybersecurity-updates\/#breadcrumb\"},\"inLanguage\":\"en-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/challenge.carleton.ca\/deterrence-theory-cybersecurity-updates\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\/\/challenge.carleton.ca\/deterrence-theory-cybersecurity-updates\/#primaryimage\",\"url\":\"https:\/\/challenge.carleton.ca\/wp-content\/uploads\/2023\/07\/cybersecurity-deterrence-theory-1200x700-1.jpg\",\"contentUrl\":\"https:\/\/challenge.carleton.ca\/wp-content\/uploads\/2023\/07\/cybersecurity-deterrence-theory-1200x700-1.jpg\",\"width\":1200,\"height\":700,\"caption\":\"Guillaume \/ iStock\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/challenge.carleton.ca\/deterrence-theory-cybersecurity-updates\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/challenge.carleton.ca\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Applying Traditional War Theory to Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/challenge.carleton.ca\/#website\",\"url\":\"https:\/\/challenge.carleton.ca\/\",\"name\":\"Challenge What's Possible\",\"description\":\"True Leaders Challenge What's Possible\",\"publisher\":{\"@id\":\"https:\/\/challenge.carleton.ca\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/challenge.carleton.ca\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-CA\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/challenge.carleton.ca\/#organization\",\"name\":\"Carleton University\",\"url\":\"https:\/\/challenge.carleton.ca\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\/\/challenge.carleton.ca\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/challenge.carleton.ca\/wp-content\/uploads\/2022\/02\/fav-icon.png\",\"contentUrl\":\"https:\/\/challenge.carleton.ca\/wp-content\/uploads\/2022\/02\/fav-icon.png\",\"width\":512,\"height\":512,\"caption\":\"Carleton University\"},\"image\":{\"@id\":\"https:\/\/challenge.carleton.ca\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/carletonuniversity\",\"https:\/\/x.com\/Carleton_U\",\"https:\/\/www.instagram.com\/carleton_u\/\",\"https:\/\/www.linkedin.com\/school\/carleton-university\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/challenge.carleton.ca\/#\/schema\/person\/c70b41979f1fa7a5963f7354976ae7be\",\"name\":\"Jena Lynde-Smith\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\/\/challenge.carleton.ca\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f9cde7737954aa46e0050945d883d5b4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f9cde7737954aa46e0050945d883d5b4?s=96&d=mm&r=g\",\"caption\":\"Jena Lynde-Smith\"},\"url\":\"https:\/\/challenge.carleton.ca\/author\/jena\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Researcher Updates Deterrence Theory to Prevent Cyber Attacks","description":"Deterrence theory is technically very simple \u2013 a defender needs to convince an aggressor that either the costs of attacking are too high, or","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/challenge.carleton.ca\/deterrence-theory-cybersecurity-updates\/","og_locale":"en_US","og_type":"article","og_title":"Researcher Updates Deterrence Theory to Prevent Cyber Attacks","og_description":"Deterrence theory is technically very simple \u2013 a defender needs to convince an aggressor that either the costs of attacking are too high, or","og_url":"https:\/\/challenge.carleton.ca\/deterrence-theory-cybersecurity-updates\/","og_site_name":"Challenge What's Possible","article_publisher":"https:\/\/www.facebook.com\/carletonuniversity","article_published_time":"2023-07-07T18:23:05+00:00","article_modified_time":"2023-11-24T14:49:02+00:00","og_image":[{"width":1200,"height":700,"url":"https:\/\/challenge.carleton.ca\/wp-content\/uploads\/2023\/07\/cybersecurity-deterrence-theory-1200x700-1.jpg","type":"image\/jpeg"}],"author":"Jena Lynde-Smith","twitter_card":"summary_large_image","twitter_creator":"@Carleton_U","twitter_site":"@Carleton_U","twitter_misc":{"Written by":"Jena Lynde-Smith","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/challenge.carleton.ca\/deterrence-theory-cybersecurity-updates\/#article","isPartOf":{"@id":"https:\/\/challenge.carleton.ca\/deterrence-theory-cybersecurity-updates\/"},"author":{"name":"Jena Lynde-Smith","@id":"https:\/\/challenge.carleton.ca\/#\/schema\/person\/c70b41979f1fa7a5963f7354976ae7be"},"headline":"Applying Traditional War Theory to Cybersecurity","datePublished":"2023-07-07T18:23:05+00:00","dateModified":"2023-11-24T14:49:02+00:00","mainEntityOfPage":{"@id":"https:\/\/challenge.carleton.ca\/deterrence-theory-cybersecurity-updates\/"},"wordCount":834,"commentCount":0,"publisher":{"@id":"https:\/\/challenge.carleton.ca\/#organization"},"image":{"@id":"https:\/\/challenge.carleton.ca\/deterrence-theory-cybersecurity-updates\/#primaryimage"},"thumbnailUrl":"https:\/\/challenge.carleton.ca\/wp-content\/uploads\/2023\/07\/cybersecurity-deterrence-theory-1200x700-1.jpg","articleSection":["Technology for Good"],"inLanguage":"en-CA","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/challenge.carleton.ca\/deterrence-theory-cybersecurity-updates\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/challenge.carleton.ca\/deterrence-theory-cybersecurity-updates\/","url":"https:\/\/challenge.carleton.ca\/deterrence-theory-cybersecurity-updates\/","name":"Researcher Updates Deterrence Theory to Prevent Cyber Attacks","isPartOf":{"@id":"https:\/\/challenge.carleton.ca\/#website"},"primaryImageOfPage":{"@id":"https:\/\/challenge.carleton.ca\/deterrence-theory-cybersecurity-updates\/#primaryimage"},"image":{"@id":"https:\/\/challenge.carleton.ca\/deterrence-theory-cybersecurity-updates\/#primaryimage"},"thumbnailUrl":"https:\/\/challenge.carleton.ca\/wp-content\/uploads\/2023\/07\/cybersecurity-deterrence-theory-1200x700-1.jpg","datePublished":"2023-07-07T18:23:05+00:00","dateModified":"2023-11-24T14:49:02+00:00","description":"Deterrence theory is technically very simple \u2013 a defender needs to convince an aggressor that either the costs of attacking are too high, or","breadcrumb":{"@id":"https:\/\/challenge.carleton.ca\/deterrence-theory-cybersecurity-updates\/#breadcrumb"},"inLanguage":"en-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/challenge.carleton.ca\/deterrence-theory-cybersecurity-updates\/"]}]},{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/challenge.carleton.ca\/deterrence-theory-cybersecurity-updates\/#primaryimage","url":"https:\/\/challenge.carleton.ca\/wp-content\/uploads\/2023\/07\/cybersecurity-deterrence-theory-1200x700-1.jpg","contentUrl":"https:\/\/challenge.carleton.ca\/wp-content\/uploads\/2023\/07\/cybersecurity-deterrence-theory-1200x700-1.jpg","width":1200,"height":700,"caption":"Guillaume \/ iStock"},{"@type":"BreadcrumbList","@id":"https:\/\/challenge.carleton.ca\/deterrence-theory-cybersecurity-updates\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/challenge.carleton.ca\/"},{"@type":"ListItem","position":2,"name":"Applying Traditional War Theory to Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/challenge.carleton.ca\/#website","url":"https:\/\/challenge.carleton.ca\/","name":"Challenge What's Possible","description":"True Leaders Challenge What's Possible","publisher":{"@id":"https:\/\/challenge.carleton.ca\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/challenge.carleton.ca\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-CA"},{"@type":"Organization","@id":"https:\/\/challenge.carleton.ca\/#organization","name":"Carleton University","url":"https:\/\/challenge.carleton.ca\/","logo":{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/challenge.carleton.ca\/#\/schema\/logo\/image\/","url":"https:\/\/challenge.carleton.ca\/wp-content\/uploads\/2022\/02\/fav-icon.png","contentUrl":"https:\/\/challenge.carleton.ca\/wp-content\/uploads\/2022\/02\/fav-icon.png","width":512,"height":512,"caption":"Carleton University"},"image":{"@id":"https:\/\/challenge.carleton.ca\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/carletonuniversity","https:\/\/x.com\/Carleton_U","https:\/\/www.instagram.com\/carleton_u\/","https:\/\/www.linkedin.com\/school\/carleton-university\/"]},{"@type":"Person","@id":"https:\/\/challenge.carleton.ca\/#\/schema\/person\/c70b41979f1fa7a5963f7354976ae7be","name":"Jena Lynde-Smith","image":{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/challenge.carleton.ca\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f9cde7737954aa46e0050945d883d5b4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f9cde7737954aa46e0050945d883d5b4?s=96&d=mm&r=g","caption":"Jena Lynde-Smith"},"url":"https:\/\/challenge.carleton.ca\/author\/jena\/"}]}},"_links":{"self":[{"href":"https:\/\/challenge.carleton.ca\/wp-json\/wp\/v2\/posts\/1206"}],"collection":[{"href":"https:\/\/challenge.carleton.ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/challenge.carleton.ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/challenge.carleton.ca\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/challenge.carleton.ca\/wp-json\/wp\/v2\/comments?post=1206"}],"version-history":[{"count":14,"href":"https:\/\/challenge.carleton.ca\/wp-json\/wp\/v2\/posts\/1206\/revisions"}],"predecessor-version":[{"id":1458,"href":"https:\/\/challenge.carleton.ca\/wp-json\/wp\/v2\/posts\/1206\/revisions\/1458"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/challenge.carleton.ca\/wp-json\/wp\/v2\/media\/1211"}],"wp:attachment":[{"href":"https:\/\/challenge.carleton.ca\/wp-json\/wp\/v2\/media?parent=1206"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/challenge.carleton.ca\/wp-json\/wp\/v2\/categories?post=1206"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/challenge.carleton.ca\/wp-json\/wp\/v2\/tags?post=1206"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}