{"id":3581,"date":"2025-11-26T06:22:32","date_gmt":"2025-11-26T06:22:32","guid":{"rendered":"http:\/\/69269ca8fd8a399dacc316f4"},"modified":"2025-11-26T06:22:32","modified_gmt":"2025-11-26T06:22:32","slug":"what-if-cyber-risk-scoring-go-rogue-exploring-weapons-of-math-destruction","status":"publish","type":"post","link":"https:\/\/worldinformatixbeta.supagrow.in\/wp\/2025\/11\/26\/what-if-cyber-risk-scoring-go-rogue-exploring-weapons-of-math-destruction\/","title":{"rendered":"What if Cyber Risk Scoring Go Rogue: Exploring Weapons of Math Destruction"},"content":{"rendered":"<div class=\"reader-article-content reader-article-content--content-blocks\" dir=\"ltr\">\n<div class=\"reader-content-blocks-container\" tabindex=\"0\" data-artdeco-is-focused=\"true\">\n<div class=\"reader-article-content reader-article-content--content-blocks\" dir=\"ltr\">\n<div class=\"reader-content-blocks-container\" tabindex=\"0\" data-artdeco-is-focused=\"true\">\n<div class=\"reader-article-content reader-article-content--content-blocks\" dir=\"ltr\">\n<div class=\"reader-content-blocks-container\" tabindex=\"0\" data-artdeco-is-focused=\"true\">\n<div class=\"reader-article-content reader-article-content--legacy-html\" dir=\"ltr\">\n<h2 id=\"ember249\" class=\"ember-view reader-text-block__heading-2\">Introduction<\/h2>\n<p id=\"ember250\" class=\"ember-view reader-text-block__paragraph\">In this blog, we will explore different <strong>Cyber Risk Scoring (CRS) algorithms. <\/strong>Also understand real-world examples of WMDs, their societal impact, and how these lessons apply to <strong>Cyber Risk Scoring (CRS)<\/strong>\u2014a burgeoning field in cybersecurity. We will delve into the mechanics of CRS models, their benefits, and the risks of deploying them without sufficient oversight.<\/p>\n<p class=\"ember-view reader-text-block__paragraph\">In a world increasingly driven by data, mathematical models and algorithms play a pivotal role in decision-making. However, when these models are poorly designed or misused, they can become what Cathy O\u2019Neil termed <strong>\u201c<\/strong><a class=\"UCscCatRDSWOVGPsBHtBFxutMeBcJczyetPkw \" href=\"https:\/\/en.wikipedia.org\/wiki\/Weapons_of_Math_Destruction\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\"><strong>Weapons of Math Destruction<\/strong><\/a><strong>\u201d (WMDs)<\/strong>\u2014tools that cause more harm than good. WMDs are characterized by their opacity, scale, and potential for harm, making them dangerous when left unchecked.<\/p>\n<hr class=\"reader-divider-block__horizontal-rule\">\n<h2 id=\"ember252\" class=\"ember-view reader-text-block__heading-2\">Cyber Risk Scoring Algorithms<\/h2>\n<p id=\"ember253\" class=\"ember-view reader-text-block__paragraph\">Cyber risk scoring algorithms are frameworks or models used to assess and quantify the risk associated with cyber threats and vulnerabilities. These scores help organizations prioritize risk mitigation efforts and allocate resources effectively. These algorithms range from simple mathematical formulas to sophisticated, multi-factor models that provide deeper insights. Cyber risk scoring is integral to cybersecurity frameworks and risk management strategies, helping stakeholders make informed decisions.<\/p>\n<hr class=\"reader-divider-block__horizontal-rule\">\n<h3 id=\"ember254\" class=\"ember-view reader-text-block__heading-3\">1. Simple Cyber Risk Scoring Algorithms<\/h3>\n<p id=\"ember255\" class=\"ember-view reader-text-block__paragraph\"><strong>a. Risk = Probability x Impact<\/strong><\/p>\n<ul>\n<li>This is a fundamental and widely used formula to calculate risk.<\/li>\n<li><strong>Description<\/strong>: <em>Probability<\/em> refers to the likelihood of a cyber event occurring. <em>Impact<\/em> refers to the severity of consequences if the event happens. The product of these two factors gives a basic risk score.<\/li>\n<li><strong>Example<\/strong>: If the probability of a ransomware attack is 70% (0.7) and its impact is critical, rated as 100, then the risk score is: <strong>Risk Score = 0.7 x 100 = 70<\/strong><\/li>\n<li><strong>OWASP Risk Rating Methodology <\/strong>uses this simpler approach. OWASP provides structured categories to estimate scores (e.g., High = 9\u201310, Medium = 5\u20138, Low = 1\u20134).<\/li>\n<\/ul>\n<p id=\"ember257\" class=\"ember-view reader-text-block__paragraph\"><strong>Pros<\/strong>: Simple, intuitive, and easy to use. <strong>Cons<\/strong>: May oversimplify risk and lacks granularity.<\/p>\n<hr class=\"reader-divider-block__horizontal-rule\">\n<h3 id=\"ember258\" class=\"ember-view reader-text-block__heading-3\">2. Complex Cyber Risk Scoring Algorithms<\/h3>\n<p id=\"ember259\" class=\"ember-view reader-text-block__paragraph\"><strong>a. CVSS (Common Vulnerability Scoring System)<\/strong><\/p>\n<ul>\n<li><strong>Purpose<\/strong>: A standardized framework for rating the severity of software vulnerabilities.<\/li>\n<li><strong>Components<\/strong>: <strong>Base Score<\/strong>: Intrinsic properties of a vulnerability (e.g., attack vector, attack complexity, confidentiality impact).<strong>Temporal Score<\/strong>: Changing factors like exploit maturity and patch availability. <strong>Environmental Score<\/strong>: Customizable based on the organization\u2019s environment.<\/li>\n<li><strong>Scoring Range<\/strong>: 0 to 10 (Low, Medium, High, Critical).<\/li>\n<\/ul>\n<p id=\"ember261\" class=\"ember-view reader-text-block__paragraph\"><strong>Example<\/strong>:<\/p>\n<ul>\n<li>A vulnerability that is exploitable over the network with high impact on confidentiality and integrity may score <strong>8.5 (High)<\/strong>.<\/li>\n<li>This is simplified version of CVSS. More can be read <a class=\"UCscCatRDSWOVGPsBHtBFxutMeBcJczyetPkw \" href=\"https:\/\/www.first.org\/cvss\/v4-0\/\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">here<\/a><\/li>\n<li>It is important to note that <a class=\"UCscCatRDSWOVGPsBHtBFxutMeBcJczyetPkw \" href=\"https:\/\/nvd.nist.gov\/vuln-metrics\/cvss\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">CVSS is not a measure of risk<\/a>.<\/li>\n<\/ul>\n<p id=\"ember263\" class=\"ember-view reader-text-block__paragraph\"><strong>b. OpenSSF Scorecards<\/strong><\/p>\n<ul>\n<li><strong>Purpose<\/strong>: Evaluates open-source project security.<\/li>\n<li><strong>Criteria<\/strong>: Use of security best practices (e.g., dependency updates, static code analysis).Scores are produced based on a combination of heuristics and automated checks. Scoring output helps identify risks in open-source projects.<\/li>\n<\/ul>\n<p id=\"ember265\" class=\"ember-view reader-text-block__paragraph\"><strong>c. SVCC (Severity, Vulnerability, Countermeasure, Criticality) Model<\/strong><\/p>\n<ul>\n<li><strong>Purpose<\/strong>: A structured approach to assess and prioritize risks by evaluating assets, vulnerabilities, and mitigating measures.<\/li>\n<li><strong>Components<\/strong>: <strong>Severity<\/strong>: The impact of the risk if exploited. <strong>Vulnerability<\/strong>: The extent to which the asset is exposed to threats. <strong>Countermeasure<\/strong>: Effectiveness of existing security controls in mitigating the threat. <strong>Criticality<\/strong>: Importance of the asset to the organization\u2019s operations.<\/li>\n<li><strong>Formula<\/strong>: Risk Score = <em>Severity<\/em> x <em>Vulnerability<\/em> \/ <em>Countermeasure<\/em> x <em>Criticality<\/em><\/li>\n<li><strong>Example<\/strong>: If a critical server (high criticality) has a vulnerability with severity 8, mitigated by a countermeasure effectiveness of 2, the risk score could be: <strong>Risk Score = (8 x 0.9) \/ 2 x 10 = 36<\/strong><\/li>\n<\/ul>\n<p id=\"ember267\" class=\"ember-view reader-text-block__paragraph\"><strong>Pros<\/strong>: Comprehensive and adaptable to different organizational needs.<\/p>\n<p id=\"ember268\" class=\"ember-view reader-text-block__paragraph\"><strong>Cons<\/strong>: Requires detailed input and accurate data for meaningful results.<\/p>\n<p id=\"ember269\" class=\"ember-view reader-text-block__paragraph\">d. <strong>Risk Rating Services<\/strong><\/p>\n<p id=\"ember270\" class=\"ember-view reader-text-block__paragraph\">Organizations often rely on specialized <strong>third-party risk rating services<\/strong> to assess the cyber risk posture of their vendors, partners, and supply chain. These services use external-facing data and proprietary algorithms to generate risk scores without requiring internal access to third-party systems. Popular Services Include<strong>:<\/strong><strong>BitSight, SecurityScorecard, RiskRecon <\/strong>and others<\/p>\n<hr class=\"reader-divider-block__horizontal-rule\">\n<h3 id=\"ember271\" class=\"ember-view reader-text-block__heading-3\">3. Cyber Risk Quantification (CRQ) Algorithms (Dollar Value Assignment)<\/h3>\n<p id=\"ember272\" class=\"ember-view reader-text-block__paragraph\">In addition to providing risk scores, some advanced algorithms quantify risks in financial terms to help businesses understand the monetary impact of cyber threats. This approach transforms abstract risks into actionable business insights. Read further through a scientific <a class=\"UCscCatRDSWOVGPsBHtBFxutMeBcJczyetPkw \" href=\"https:\/\/www.linkedin.com\/pulse\/cyber-risk-quantification-crq-baloney-sashank-dara-ph-d-ybhmc\/?trackingId=oZxlHG8C3H1r2%2FUblgcxzQ%3D%3D\" target=\"_self\" data-test-app-aware-link=\"\" rel=\"noopener\">lens.<\/a><\/p>\n<p id=\"ember273\" class=\"ember-view reader-text-block__paragraph\"><strong>a. FAIR (Factor Analysis of Information Risk)<\/strong><\/p>\n<ul>\n<li>A quantitative risk assessment model that calculates the financial impact of cyber risks.<\/li>\n<li><strong>Core Components<\/strong>: <em>Loss Event Frequency<\/em>: Probability of a risk occurring. <em>Loss Magnitude<\/em>: Estimated financial loss if the risk materializes.<\/li>\n<li><strong>Output<\/strong>: Provides risk in terms of dollars, helping align cyber risk with business objectives.<\/li>\n<\/ul>\n<p id=\"ember275\" class=\"ember-view reader-text-block__paragraph\"><strong>b. Cyber Insurance Models<\/strong><\/p>\n<ul>\n<li>Insurance companies use complex algorithms that consider factors like: Industry-specific risks. Organizational cyber hygiene. Historical attack trends.<\/li>\n<li>The result is an estimated financial liability, which determines premium costs.<\/li>\n<\/ul>\n<hr class=\"reader-divider-block__horizontal-rule\">\n<h2 id=\"ember277\" class=\"ember-view reader-text-block__heading-2\">What if Risk Scoring goes wrong ?<\/h2>\n<p id=\"ember278\" class=\"ember-view reader-text-block__paragraph\">While cyber risk scoring methodologies help prioritize and manage risks, what if the scoring model itself is flawed or inappropriate for your organization?<\/p>\n<p id=\"ember279\" class=\"ember-view reader-text-block__paragraph\">A simplistic model might underestimate critical threats, leaving key vulnerabilities unaddressed, while an overly complex one could produce misleading results due to inaccurate data inputs or assumptions.<\/p>\n<p id=\"ember280\" class=\"ember-view reader-text-block__paragraph\">Imagine assigning a low risk score to a vulnerability because of outdated countermeasure data, only to face a costly breach. Relying on the wrong scoring methodology could create a false sense of security, misallocate resources, and ultimately expose the organization to unforeseen cyber incidents. Are you confident your risk scoring method truly reflects your risk reality?<\/p>\n<p id=\"ember281\" class=\"ember-view reader-text-block__paragraph\">If risk scoring methodologies are applied incorrectly or built on flawed assumptions, they can transform into <strong>\u201cweapons of math destruction\u201d<\/strong>\u2014systems that create more harm than good.<\/p>\n<p id=\"ember282\" class=\"ember-view reader-text-block__paragraph\">A faulty scoring model can systematically underestimate critical risks, misguide decision-makers, and divert resources away from real threats. Worse, these models, cloaked in the appearance of objectivity and precision, can lead to dangerous complacency or blind trust in flawed results. Instead of protecting the organization, they become tools that amplify vulnerabilities, leaving you exposed to devastating cyber incidents.<\/p>\n<p id=\"ember283\" class=\"ember-view reader-text-block__paragraph\">Are you certain your scoring approach isn\u2019t doing more damage than defense? But before that let us examine the hazards of Weapons of Math Destruction(WMD) models<\/p>\n<hr class=\"reader-divider-block__horizontal-rule\">\n<h2 id=\"ember284\" class=\"ember-view reader-text-block__heading-2\">Real-World Examples of Weapons of Math Destruction<\/h2>\n<h3 id=\"ember285\" class=\"ember-view reader-text-block__heading-3\">1. Credit Scoring Models<\/h3>\n<p id=\"ember286\" class=\"ember-view reader-text-block__paragraph\"><strong>The Problem:<\/strong>Credit scoring models are often opaque and rely on questionable correlations rather than causations. For example, certain algorithms penalize individuals for living in neighborhoods with lower average incomes, regardless of their personal creditworthiness.<\/p>\n<p id=\"ember287\" class=\"ember-view reader-text-block__paragraph\"><strong>The Impact:<\/strong> Millions of people are denied loans or charged exorbitant interest rates based on biased or incomplete data. These decisions can perpetuate economic inequality and limit social mobility.<\/p>\n<h3 id=\"ember288\" class=\"ember-view reader-text-block__heading-3\">2. Predictive Policing Algorithms<\/h3>\n<p id=\"ember289\" class=\"ember-view reader-text-block__paragraph\"><strong>The Problem:<\/strong>Predictive policing models use historical crime data to forecast future crime hotspots. However, these models often reflect systemic biases, over-policing minority communities while underestimating crime elsewhere.<\/p>\n<p id=\"ember290\" class=\"ember-view reader-text-block__paragraph\"><strong>The Impact:<\/strong> This approach reinforces a cycle of discrimination and mistrust, with communities unfairly targeted based on biased data rather than actual criminal activity.<\/p>\n<h3 id=\"ember291\" class=\"ember-view reader-text-block__heading-3\">3. Hiring Algorithms<\/h3>\n<p id=\"ember292\" class=\"ember-view reader-text-block__paragraph\"><strong>The Problem:<\/strong>Many companies use AI-driven tools to screen resumes and rank candidates. These tools have been found to penalize applicants who attended certain universities, used specific keywords, or belonged to underrepresented demographics.<\/p>\n<p id=\"ember293\" class=\"ember-view reader-text-block__paragraph\"><strong>The Impact:<\/strong> Qualified candidates are unfairly rejected, and workplace diversity suffers due to biased algorithms.<\/p>\n<h3 id=\"ember294\" class=\"ember-view reader-text-block__heading-3\">4. Healthcare Risk Models<\/h3>\n<p id=\"ember295\" class=\"ember-view reader-text-block__paragraph\"><strong>The Problem:<\/strong>Algorithms in healthcare often prioritize cost over patient outcomes. For instance, a widely used healthcare algorithm in the U.S. systematically recommended less care for Black patients because it equated healthcare spending with health needs\u2014a flawed assumption.<\/p>\n<p id=\"ember296\" class=\"ember-view reader-text-block__paragraph\"><strong>The Impact:<\/strong> Disparities in healthcare access and treatment outcomes were exacerbated, affecting the well-being of marginalized groups.<\/p>\n<p id=\"ember297\" class=\"ember-view reader-text-block__paragraph\">These examples illustrate how flawed algorithms can harm individuals and society, even when designed with good intentions.<\/p>\n<hr class=\"reader-divider-block__horizontal-rule\">\n<h2 id=\"ember298\" class=\"ember-view reader-text-block__heading-2\">When Cyber Risk Scoring (CRS) Becomes a Weapon of Math Destruction<\/h2>\n<p id=\"ember299\" class=\"ember-view reader-text-block__paragraph\">CRS models, despite their potential to revolutionize cybersecurity, can exhibit the characteristics of WMDs if not carefully managed. Here\u2019s how they can fail across the three aspects of Opacity, Scale, and Harm:<\/p>\n<h3 id=\"ember300\" class=\"ember-view reader-text-block__heading-3\">Opacity: Lack of Transparency in CRS Models<\/h3>\n<h3 id=\"ember301\" class=\"ember-view reader-text-block__heading-3\">Examples of Opacity in CRS:<\/h3>\n<ul>\n<li><strong>Black-Box Algorithms:<\/strong> Proprietary CRS tools often do not disclose their methodologies or assumptions. For instance, a model might assign a high-risk score to cloud adoption without clarifying that it\u2019s based on outdated threat patterns. This lack of clarity prevents stakeholders from questioning or improving the model.<\/li>\n<li><strong>Over-Reliance on Historical Data:<\/strong> CRS models frequently depend on historical breach data, which may not reflect emerging threats like quantum computing risks or AI-driven attacks. If the process of deriving risk scores isn\u2019t transparent, organizations could be blindsided by unforeseen threats.<\/li>\n<li><strong>Hidden Assumptions:<\/strong> A CRS model might assume that threats are evenly distributed across all assets, ignoring the fact that certain assets (e.g., critical databases) are more attractive targets. These assumptions can skew risk prioritization.<\/li>\n<\/ul>\n<hr class=\"reader-divider-block__horizontal-rule\">\n<h3 id=\"ember303\" class=\"ember-view reader-text-block__heading-3\">Scale: Broad Influence of CRS on Organizations and Industries<\/h3>\n<h3 id=\"ember304\" class=\"ember-view reader-text-block__heading-3\">Examples of Scale in CRS:<\/h3>\n<ul>\n<li><strong>Industry-Wide Adoption of Flawed Models:<\/strong> If a widely used CRS model underestimates supply chain risks, it could lead to underinvestment in third-party risk management across entire sectors. A single major breach could then cascade across interconnected organizations, amplifying systemic risks.<\/li>\n<li><strong>Automation Without Oversight:<\/strong> Organizations often automate decision-making based on CRS outputs. For instance, automated budget allocation might focus exclusively on risks with high monetary impacts, neglecting lower-cost but high-likelihood risks that could disrupt critical operations.<\/li>\n<li><strong>Compliance Reporting Errors:<\/strong> Regulatory bodies may require organizations to use CRS tools for compliance reporting. If the model produces inaccurate or biased results, it could mislead regulators and create systemic vulnerabilities in the financial or healthcare industries.<\/li>\n<\/ul>\n<hr class=\"reader-divider-block__horizontal-rule\">\n<h3 id=\"ember306\" class=\"ember-view reader-text-block__heading-3\">Harm: Negative Consequences of Misapplied CRS Models<\/h3>\n<h3 id=\"ember307\" class=\"ember-view reader-text-block__heading-3\">Examples of Harm in CRS:<\/h3>\n<ul>\n<li><strong>Misallocated Resources:<\/strong> A CRS model might recommend heavy investment in ransomware protection while downplaying insider threats due to a lack of sufficient data on insider incidents. This imbalance can leave critical gaps in an organization\u2019s defenses.<\/li>\n<li><strong>False Sense of Security:<\/strong> Over-reliance on CRS outputs can lead to complacency. For instance, if a model inaccurately predicts a low likelihood of phishing attacks, an organization might deprioritize employee training, leaving it vulnerable to simple but effective social engineering tactics.<\/li>\n<li><strong>Reputational and Financial Damage:<\/strong> Consider a CRS model that significantly underestimates the potential cost of a data breach. If a breach occurs, the organization could face severe financial penalties, lawsuits, and reputational damage far exceeding the predicted impact, all because of flawed modeling.<\/li>\n<li><strong>Exclusion of Non-Quantifiable Risks:<\/strong> Certain risks, like the reputational impact of ethical lapses or privacy violations, may not be easily quantifiable. If CRS models fail to account for these, organizations could overlook significant risks with long-term consequences.<\/li>\n<\/ul>\n<hr class=\"reader-divider-block__horizontal-rule\">\n<h2 id=\"ember309\" class=\"ember-view reader-text-block__heading-2\">Ensuring CRS Models Stay Ethical<\/h2>\n<p id=\"ember310\" class=\"ember-view reader-text-block__paragraph\">To prevent CRS models from becoming WMDs, organizations should:<\/p>\n<h3 id=\"ember311\" class=\"ember-view reader-text-block__heading-3\">1. Prioritize Transparency<\/h3>\n<ul>\n<li>Choose CRS tools that disclose methodologies and assumptions.<\/li>\n<li>Encourage stakeholders to challenge and validate the model\u2019s results.<\/li>\n<\/ul>\n<h3 id=\"ember313\" class=\"ember-view reader-text-block__heading-3\">2. Embrace Diversity in Data<\/h3>\n<ul>\n<li>Use data that reflects a wide range of scenarios, avoiding overreliance on historical trends that might exclude emerging risks.<\/li>\n<\/ul>\n<h3 id=\"ember315\" class=\"ember-view reader-text-block__heading-3\">3. Continuously Validate Models<\/h3>\n<ul>\n<li>Regularly test CRS outputs against real-world events to ensure accuracy.<\/li>\n<li>Update models to reflect changes in the threat landscape.<\/li>\n<\/ul>\n<h3 id=\"ember317\" class=\"ember-view reader-text-block__heading-3\">4. Incorporate Human Oversight<\/h3>\n<ul>\n<li>Use CRS models as a complement to, not a replacement for, human judgment.<\/li>\n<li>Engage cross-functional teams to interpret and act on CRS results.<\/li>\n<\/ul>\n<h3 id=\"ember319\" class=\"ember-view reader-text-block__heading-3\">5. Align Metrics with Reality<\/h3>\n<ul>\n<li>Focus on metrics that matter, such as cost of downtime, data breach penalties, and recovery time objectives, rather than abstract scores.<\/li>\n<\/ul>\n<hr class=\"reader-divider-block__horizontal-rule\">\n<h3 id=\"ember321\" class=\"ember-view reader-text-block__heading-3\">Conclusion<\/h3>\n<p id=\"ember322\" class=\"ember-view reader-text-block__paragraph\">Cyber Risk Scoring models offer a promising way to demystify cybersecurity and align it with business priorities. However, without proper design, governance, and oversight, these tools risk becoming the cybersecurity equivalent of Weapons of Math Destruction.<\/p>\n<p id=\"ember323\" class=\"ember-view reader-text-block__paragraph\">By learning from the mistakes of other fields and embedding ethical principles into CRS practices, we can ensure these models serve as a force for good, enabling organizations to navigate the complex digital landscape with confidence and integrity.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Introduction In this blog, we will explore different Cyber Risk Scoring (CRS) algorithms. Also understand real-world examples of WMDs, their societal impact, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/worldinformatixbeta.supagrow.in\/wp\/wp-json\/wp\/v2\/posts\/3581"}],"collection":[{"href":"https:\/\/worldinformatixbeta.supagrow.in\/wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/worldinformatixbeta.supagrow.in\/wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/worldinformatixbeta.supagrow.in\/wp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/worldinformatixbeta.supagrow.in\/wp\/wp-json\/wp\/v2\/comments?post=3581"}],"version-history":[{"count":0,"href":"https:\/\/worldinformatixbeta.supagrow.in\/wp\/wp-json\/wp\/v2\/posts\/3581\/revisions"}],"wp:attachment":[{"href":"https:\/\/worldinformatixbeta.supagrow.in\/wp\/wp-json\/wp\/v2\/media?parent=3581"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/worldinformatixbeta.supagrow.in\/wp\/wp-json\/wp\/v2\/categories?post=3581"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/worldinformatixbeta.supagrow.in\/wp\/wp-json\/wp\/v2\/tags?post=3581"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}