{"id":21578,"date":"2024-06-12T15:59:49","date_gmt":"2024-06-12T19:59:49","guid":{"rendered":"https:\/\/www.virtualmaritime.academy\/responding-to-security-incidents-best-practices\/"},"modified":"2024-06-13T12:51:42","modified_gmt":"2024-06-13T16:51:42","slug":"responding-to-security-incidents-best-practices","status":"publish","type":"post","link":"https:\/\/www.virtualmaritime.academy\/fr\/responding-to-security-incidents-best-practices\/","title":{"rendered":"Responding to Security Incidents: Best Practices"},"content":{"rendered":"<p>In today&#8217;s highly interconnected world, organizations face an ever-increasing number of security threats. From cyberattacks to data breaches, the need for an effective response to security incidents has never been more critical. Immediate and appropriate actions can significantly mitigate the damage and ensure the resilience of an organization. This article outlines best practices for responding to security incidents, providing a framework for preparedness, detection, and recovery.<\/p>\n<h3>Preparation: Building a Strong Foundation<\/h3>\n<p>Effective incident response begins long before an incident occurs. A proactive approach involves setting up a solid foundation of policies, teams, and tools to handle potential threats.<\/p>\n<ul>\n<li><strong>Incident Response Plan (IRP):<\/strong> Develop a comprehensive IRP that details the steps to take during a security incident. This plan should be regularly updated and tested through simulations and drills.<\/li>\n<li><strong>Incident Response Team (IRT):<\/strong> Establish a dedicated team of professionals with diverse skills, including IT, legal, and communications. Ensure they are trained and ready to act swiftly.<\/li>\n<li><strong>Cyber Insurance:<\/strong> Consider investing in cyber insurance to cover potential financial losses and legal fees associated with security incidents.<\/li>\n<\/ul>\n<h3>Detection: Identifying Security Incidents<\/h3>\n<p>The early detection of a security incident is crucial for minimizing damage. The quicker an incident is identified, the faster an organization can respond and contain it.<\/p>\n<ul>\n<li><strong>Advanced Monitoring Tools:<\/strong> Utilize sophisticated tools and technologies to continuously monitor network traffic, user behavior, and system logs.<\/li>\n<li><strong>Threat Intelligence:<\/strong> Incorporate threat intelligence feeds to stay updated on the latest vulnerabilities and attack vectors.<\/li>\n<li><strong>User Education:<\/strong> Train employees to recognize potential security threats such as phishing emails and report them promptly.<\/li>\n<\/ul>\n<h3>Containment and Eradication<\/h3>\n<p>Once a security incident is detected, the next step is to contain the damage and eradicate the threat. This involves isolating affected systems and removing malicious elements.<\/p>\n<ul>\n<li><strong>Immediate Containment:<\/strong> Quickly isolate infected systems to prevent the spread of the attack. This might involve disconnecting devices from the network or disabling accounts.<\/li>\n<li><strong>Root Cause Analysis:<\/strong> Conduct a thorough analysis to determine the source and method of the attack. This helps in removing all traces of the threat and preventing future occurrences.<\/li>\n<li><strong>Patching and Updates:<\/strong> Apply necessary patches and updates to all systems to close vulnerabilities exploited by the attacker.<\/li>\n<\/ul>\n<h3>Recovery: Restoring Normal Operations<\/h3>\n<p>After containment and eradication, the focus shifts to recovery. The goal here is to restore normal operations as quickly and safely as possible.<\/p>\n<ul>\n<li><strong>System Restoration:<\/strong> Restore systems from clean backups, ensuring that all data is intact and no malicious code remains.<\/li>\n<li><strong>Infrastructure Assessment:<\/strong> Perform a full assessment of the infrastructure to identify any lingering vulnerabilities or areas needing improvement.<\/li>\n<li><strong>Communication:<\/strong> Keep all stakeholders, including customers and partners, informed about the incident and steps taken to resolve it.<\/li>\n<\/ul>\n<h3>Post-Incident Review and Continuous Improvement<\/h3>\n<p>An essential part of incident response is learning from the experience. Conducting a post-incident review helps identify strengths and weaknesses in the response strategy and promotes continuous improvement.<\/p>\n<ul>\n<li><strong>Lessons Learned:<\/strong> Document everything about the incident, from detection to recovery. Identify what worked well and what could be improved.<\/li>\n<li><strong>Policy Update:<\/strong> Update security policies and incident response plans based on insights gathered during the post-incident review.<\/li>\n<li><strong>Employee Training:<\/strong> Continuously educate employees on the latest threats and update training programs to include lessons learned from the incident.<\/li>\n<\/ul>\n<p>In conclusion, responding to security incidents effectively requires meticulous preparation, rapid detection, immediate containment, strategic recovery, and a commitment to continuous improvement. By adopting these best practices, organizations can significantly enhance their resilience against security threats and minimize the potential impact of incidents.<\/p>\n<p><a href='https:\/\/www.virtualmaritime.academy\/fr\/vma-courses\/'>Discover More About Our Courses Here!<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>In today&#8217;s highly interconnected world, organizations face an ever-increasing number of security threats. From cyberattacks to data breaches, the need [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":21577,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[455],"tags":[391],"class_list":["post-21578","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-martime-news","tag-maritimetraining-onlinelearning-virtualmaritimeacademy-maritimeindustry-seafarersprofessionaldevelopment"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Responding to Security Incidents: Best Practices - Virtual Maritime Academy<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.virtualmaritime.academy\/fr\/responding-to-security-incidents-best-practices\/\" \/>\n<meta property=\"og:locale\" content=\"fr_CA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Responding to Security Incidents: Best Practices - Virtual Maritime Academy\" \/>\n<meta property=\"og:description\" content=\"In today&#8217;s highly interconnected world, organizations face an ever-increasing number of security threats. From cyberattacks to data breaches, the need [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.virtualmaritime.academy\/fr\/responding-to-security-incidents-best-practices\/\" \/>\n<meta property=\"og:site_name\" content=\"Virtual Maritime Academy\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/VirtualMaritimeAcademy\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-12T19:59:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-13T16:51:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.virtualmaritime.academy\/wp-content\/uploads\/2024\/06\/Responding-to-Security-Incidents-Best-Practices.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"576\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Virtual Maritime Academy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Virtual Maritime Academy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimation du temps de lecture\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.virtualmaritime.academy\\\/responding-to-security-incidents-best-practices\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.virtualmaritime.academy\\\/responding-to-security-incidents-best-practices\\\/\"},\"author\":{\"name\":\"Virtual Maritime Academy\",\"@id\":\"https:\\\/\\\/www.virtualmaritime.academy\\\/#\\\/schema\\\/person\\\/11ec5d893e915a2d1824dd5236818240\"},\"headline\":\"Responding to Security Incidents: Best Practices\",\"datePublished\":\"2024-06-12T19:59:49+00:00\",\"dateModified\":\"2024-06-13T16:51:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.virtualmaritime.academy\\\/responding-to-security-incidents-best-practices\\\/\"},\"wordCount\":584,\"image\":{\"@id\":\"https:\\\/\\\/www.virtualmaritime.academy\\\/responding-to-security-incidents-best-practices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.virtualmaritime.academy\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/Responding-to-Security-Incidents-Best-Practices.png\",\"keywords\":[\"#maritimetraining #onlinelearning #virtualmaritimeacademy #maritimeindustry #seafarersprofessionaldevelopment\"],\"articleSection\":[\"News\"],\"inLanguage\":\"fr-CA\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.virtualmaritime.academy\\\/responding-to-security-incidents-best-practices\\\/\",\"url\":\"https:\\\/\\\/www.virtualmaritime.academy\\\/responding-to-security-incidents-best-practices\\\/\",\"name\":\"Responding to Security Incidents: Best Practices - Virtual Maritime Academy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.virtualmaritime.academy\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.virtualmaritime.academy\\\/responding-to-security-incidents-best-practices\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.virtualmaritime.academy\\\/responding-to-security-incidents-best-practices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.virtualmaritime.academy\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/Responding-to-Security-Incidents-Best-Practices.png\",\"datePublished\":\"2024-06-12T19:59:49+00:00\",\"dateModified\":\"2024-06-13T16:51:42+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.virtualmaritime.academy\\\/#\\\/schema\\\/person\\\/11ec5d893e915a2d1824dd5236818240\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.virtualmaritime.academy\\\/responding-to-security-incidents-best-practices\\\/#breadcrumb\"},\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.virtualmaritime.academy\\\/responding-to-security-incidents-best-practices\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/www.virtualmaritime.academy\\\/responding-to-security-incidents-best-practices\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.virtualmaritime.academy\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/Responding-to-Security-Incidents-Best-Practices.png\",\"contentUrl\":\"https:\\\/\\\/www.virtualmaritime.academy\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/Responding-to-Security-Incidents-Best-Practices.png\",\"width\":1024,\"height\":576,\"caption\":\"Create an illustration depicting a team of diverse cybersecurity professionals in a high-tech command center, analyzing data on large screens. The screens should show graphs, alerts, and breach notifi\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.virtualmaritime.academy\\\/responding-to-security-incidents-best-practices\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.virtualmaritime.academy\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Responding to Security Incidents: Best Practices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.virtualmaritime.academy\\\/#website\",\"url\":\"https:\\\/\\\/www.virtualmaritime.academy\\\/\",\"name\":\"Virtual Maritime Academy\",\"description\":\"\",\"inLanguage\":\"fr-CA\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.virtualmaritime.academy\\\/#\\\/schema\\\/person\\\/11ec5d893e915a2d1824dd5236818240\",\"name\":\"Virtual Maritime Academy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/www.virtualmaritime.academy\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/Logo-VMA-1-scaled-100x100.jpg\",\"url\":\"https:\\\/\\\/www.virtualmaritime.academy\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/Logo-VMA-1-scaled-100x100.jpg\",\"contentUrl\":\"https:\\\/\\\/www.virtualmaritime.academy\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/Logo-VMA-1-scaled-100x100.jpg\",\"caption\":\"Virtual Maritime Academy\"},\"sameAs\":[\"http:\\\/\\\/emanhu\"],\"url\":\"https:\\\/\\\/www.virtualmaritime.academy\\\/fr\\\/author\\\/virtual-maritime-academy\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Responding to Security Incidents: Best Practices - Virtual Maritime Academy","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.virtualmaritime.academy\/fr\/responding-to-security-incidents-best-practices\/","og_locale":"fr_CA","og_type":"article","og_title":"Responding to Security Incidents: Best Practices - Virtual Maritime Academy","og_description":"In today&#8217;s highly interconnected world, organizations face an ever-increasing number of security threats. From cyberattacks to data breaches, the need [&hellip;]","og_url":"https:\/\/www.virtualmaritime.academy\/fr\/responding-to-security-incidents-best-practices\/","og_site_name":"Virtual Maritime Academy","article_publisher":"https:\/\/www.facebook.com\/VirtualMaritimeAcademy\/","article_published_time":"2024-06-12T19:59:49+00:00","article_modified_time":"2024-06-13T16:51:42+00:00","og_image":[{"width":1024,"height":576,"url":"https:\/\/www.virtualmaritime.academy\/wp-content\/uploads\/2024\/06\/Responding-to-Security-Incidents-Best-Practices.png","type":"image\/png"}],"author":"Virtual Maritime Academy","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Virtual Maritime Academy","Estimation du temps de lecture":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.virtualmaritime.academy\/responding-to-security-incidents-best-practices\/#article","isPartOf":{"@id":"https:\/\/www.virtualmaritime.academy\/responding-to-security-incidents-best-practices\/"},"author":{"name":"Virtual Maritime Academy","@id":"https:\/\/www.virtualmaritime.academy\/#\/schema\/person\/11ec5d893e915a2d1824dd5236818240"},"headline":"Responding to Security Incidents: Best Practices","datePublished":"2024-06-12T19:59:49+00:00","dateModified":"2024-06-13T16:51:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.virtualmaritime.academy\/responding-to-security-incidents-best-practices\/"},"wordCount":584,"image":{"@id":"https:\/\/www.virtualmaritime.academy\/responding-to-security-incidents-best-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.virtualmaritime.academy\/wp-content\/uploads\/2024\/06\/Responding-to-Security-Incidents-Best-Practices.png","keywords":["#maritimetraining #onlinelearning #virtualmaritimeacademy #maritimeindustry #seafarersprofessionaldevelopment"],"articleSection":["News"],"inLanguage":"fr-CA"},{"@type":"WebPage","@id":"https:\/\/www.virtualmaritime.academy\/responding-to-security-incidents-best-practices\/","url":"https:\/\/www.virtualmaritime.academy\/responding-to-security-incidents-best-practices\/","name":"Responding to Security Incidents: Best Practices - Virtual Maritime Academy","isPartOf":{"@id":"https:\/\/www.virtualmaritime.academy\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.virtualmaritime.academy\/responding-to-security-incidents-best-practices\/#primaryimage"},"image":{"@id":"https:\/\/www.virtualmaritime.academy\/responding-to-security-incidents-best-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.virtualmaritime.academy\/wp-content\/uploads\/2024\/06\/Responding-to-Security-Incidents-Best-Practices.png","datePublished":"2024-06-12T19:59:49+00:00","dateModified":"2024-06-13T16:51:42+00:00","author":{"@id":"https:\/\/www.virtualmaritime.academy\/#\/schema\/person\/11ec5d893e915a2d1824dd5236818240"},"breadcrumb":{"@id":"https:\/\/www.virtualmaritime.academy\/responding-to-security-incidents-best-practices\/#breadcrumb"},"inLanguage":"fr-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.virtualmaritime.academy\/responding-to-security-incidents-best-practices\/"]}]},{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.virtualmaritime.academy\/responding-to-security-incidents-best-practices\/#primaryimage","url":"https:\/\/www.virtualmaritime.academy\/wp-content\/uploads\/2024\/06\/Responding-to-Security-Incidents-Best-Practices.png","contentUrl":"https:\/\/www.virtualmaritime.academy\/wp-content\/uploads\/2024\/06\/Responding-to-Security-Incidents-Best-Practices.png","width":1024,"height":576,"caption":"Create an illustration depicting a team of diverse cybersecurity professionals in a high-tech command center, analyzing data on large screens. The screens should show graphs, alerts, and breach notifi"},{"@type":"BreadcrumbList","@id":"https:\/\/www.virtualmaritime.academy\/responding-to-security-incidents-best-practices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.virtualmaritime.academy\/"},{"@type":"ListItem","position":2,"name":"Responding to Security Incidents: Best Practices"}]},{"@type":"WebSite","@id":"https:\/\/www.virtualmaritime.academy\/#website","url":"https:\/\/www.virtualmaritime.academy\/","name":"Acad\u00e9mie Maritime Virtuelle (VMA)","description":"","inLanguage":"fr-CA"},{"@type":"Person","@id":"https:\/\/www.virtualmaritime.academy\/#\/schema\/person\/11ec5d893e915a2d1824dd5236818240","name":"Acad\u00e9mie Maritime Virtuelle (VMA)","image":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.virtualmaritime.academy\/wp-content\/uploads\/2019\/05\/Logo-VMA-1-scaled-100x100.jpg","url":"https:\/\/www.virtualmaritime.academy\/wp-content\/uploads\/2019\/05\/Logo-VMA-1-scaled-100x100.jpg","contentUrl":"https:\/\/www.virtualmaritime.academy\/wp-content\/uploads\/2019\/05\/Logo-VMA-1-scaled-100x100.jpg","caption":"Virtual Maritime Academy"},"sameAs":["http:\/\/emanhu"],"url":"https:\/\/www.virtualmaritime.academy\/fr\/author\/virtual-maritime-academy\/"}]}},"_links":{"self":[{"href":"https:\/\/www.virtualmaritime.academy\/fr\/wp-json\/wp\/v2\/posts\/21578","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.virtualmaritime.academy\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.virtualmaritime.academy\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.virtualmaritime.academy\/fr\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.virtualmaritime.academy\/fr\/wp-json\/wp\/v2\/comments?post=21578"}],"version-history":[{"count":0,"href":"https:\/\/www.virtualmaritime.academy\/fr\/wp-json\/wp\/v2\/posts\/21578\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.virtualmaritime.academy\/fr\/wp-json\/wp\/v2\/media\/21577"}],"wp:attachment":[{"href":"https:\/\/www.virtualmaritime.academy\/fr\/wp-json\/wp\/v2\/media?parent=21578"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.virtualmaritime.academy\/fr\/wp-json\/wp\/v2\/categories?post=21578"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.virtualmaritime.academy\/fr\/wp-json\/wp\/v2\/tags?post=21578"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}