{"id":1008,"date":"2025-08-19T06:49:23","date_gmt":"2025-08-19T06:49:23","guid":{"rendered":"https:\/\/icssindia.in\/blog\/?page_id=1008"},"modified":"2025-08-19T06:51:52","modified_gmt":"2025-08-19T06:51:52","slug":"understanding-digital-forensics-the-science-of-cyber-investigation","status":"publish","type":"page","link":"https:\/\/icssindia.in\/blog\/understanding-digital-forensics-the-science-of-cyber-investigation\/","title":{"rendered":"Understanding Digital Forensics: The Science of Cyber Investigation"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/icssindia.in\/blog\/wp-content\/uploads\/2025\/08\/Digital-Forensic-1024x512.png\" alt=\"Digital forensics investigator analyzing multiple computer screens displaying code, data recovery processes, and cyber investigation tools, illustrating the high-tech process of uncovering digital evidence to solve cybercrimes\" class=\"wp-image-1009\" srcset=\"https:\/\/icssindia.in\/blog\/wp-content\/uploads\/2025\/08\/Digital-Forensic-1024x512.png 1024w, https:\/\/icssindia.in\/blog\/wp-content\/uploads\/2025\/08\/Digital-Forensic-300x150.png 300w, https:\/\/icssindia.in\/blog\/wp-content\/uploads\/2025\/08\/Digital-Forensic-768x384.png 768w, https:\/\/icssindia.in\/blog\/wp-content\/uploads\/2025\/08\/Digital-Forensic-1536x768.png 1536w, https:\/\/icssindia.in\/blog\/wp-content\/uploads\/2025\/08\/Digital-Forensic-2048x1024.png 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h1 class=\"wp-block-heading\" id=\"understanding-digital-forensics-the-science-of-cyb\">Understanding Digital Forensics: The Science of Cyber Investigation<\/h1>\n\n\n\n<p>In today\u2019s hyper-connected world, crimes and disputes no longer happen just in physical spaces\u2014they increasingly occur in digital realms. From cyberattacks, data breaches, and online fraud to insider threats and intellectual property theft, digital evidence plays a crucial role in solving modern cases. This is where <strong>digital forensics<\/strong> steps in, serving as the investigative backbone of cybersecurity and law enforcement efforts.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"what-is-digital-forensics\">What is Digital Forensics?<\/h2>\n\n\n\n<p>Digital forensics is the process of identifying, collecting, analyzing, and presenting digital data in a legally sound manner. Think of it as detective work\u2014but for computers, smartphones, networks, and other electronic devices. Using scientific methods and specialized tools, digital forensic experts uncover hidden clues left behind by cybercriminals or accidental data losses.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"why-is-digital-forensics-important\">Why is Digital Forensics Important?<\/h2>\n\n\n\n<p>Unlike traditional forensics, which deals with physical evidence like fingerprints or DNA, digital forensics deals with intangible data that can be easily altered or destroyed. Despite these challenges, the discipline is essential because:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>It helps <strong>solve cybercrimes<\/strong> by tracking attackers and revealing their methods.<\/li>\n\n\n\n<li>It supports <strong>legal cases<\/strong> by providing admissible evidence in court.<\/li>\n\n\n\n<li>It aids businesses in <strong>investigating data breaches<\/strong> and mitigating damage.<\/li>\n\n\n\n<li>It recovers <strong>accidentally deleted files<\/strong> or lost data.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"key-steps-in-digital-forensics\">Key Steps in Digital Forensics<\/h2>\n\n\n\n<p>Digital forensic investigations typically follow a structured approach:<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">1. Identification<\/h2>\n\n\n\n<p>Investigators identify potential sources of digital evidence\u2014computers, smartphones, servers, USB drives, cloud accounts, etc. They determine what data might be relevant and where it likely resides.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">2. Acquisition<\/h2>\n\n\n\n<p>This is the process of creating exact bit-by-bit copies (forensic images) of the original media without modifying or damaging the data. This ensures the integrity and authenticity of the evidence.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">3. Preservation<\/h2>\n\n\n\n<p>Strict protocols maintain the chain of custody. This documents who accessed the data, when, and what actions were taken to avoid tampering or contamination.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">4. Analysis<\/h2>\n\n\n\n<p>Using powerful forensic software tools (e.g., EnCase, FTK, Autopsy), experts analyze the data for deleted files, file timestamps, log entries, metadata, malware behavior, and hidden artifacts. This phase uncovers what happened and how it occurred.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">5. Reporting<\/h2>\n\n\n\n<p>Detailed, clear reports are compiled explaining the findings, methods used, and conclusions. These reports are crucial for law enforcement, legal proceedings, or corporate action.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"tools-and-techniques\">Tools and Techniques<\/h2>\n\n\n\n<p>Some of the common techniques and tools in digital forensics include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>File Carving:<\/strong> Recovering deleted files without relying on file system records.<\/li>\n\n\n\n<li><strong>Metadata Analysis:<\/strong> Extracting data about data, such as creation\/modification times, authorship, and device info.<\/li>\n\n\n\n<li><strong>Network Forensics:<\/strong> Monitoring and analyzing network traffic to trace intrusions and data exfiltration.<\/li>\n\n\n\n<li><strong>Malware Analysis:<\/strong> Studying malicious code to understand its origin, effects, and spread.<\/li>\n\n\n\n<li><strong>Registry Analysis:<\/strong> Inspecting Windows registry to uncover user activities or system changes.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"digital-forensics-in-different-contexts\">Digital Forensics in Different Contexts<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Law Enforcement:<\/strong> Digital forensics helps solve crimes, providing concrete evidence against suspects.<\/li>\n\n\n\n<li><strong>Corporate Security:<\/strong> Companies use it to investigate insider threats, data breaches, and policy violations.<\/li>\n\n\n\n<li><strong>Incident Response:<\/strong> Specialized teams rapidly analyze digital evidence to contain and remediate cyber incidents.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"protecting-your-digital-world\">Protecting Your Digital World<\/h2>\n\n\n\n<p>While professionals handle forensic investigations after incidents occur, everyone can take steps to protect their digital footprint:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Regularly back up important data.<\/li>\n\n\n\n<li>Use strong, unique passwords.<\/li>\n\n\n\n<li>Keep your software updated.<\/li>\n\n\n\n<li>Be vigilant of phishing attempts and suspicious links.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>Digital forensics is a vital field that combines technology, investigative know-how, and legal rigor to uncover the truth in the digital age. As cyber threats evolve, the role of digital forensic experts only becomes more critical in securing our systems, data, and trust.<\/p>\n\n\n\n<p>If you want to learn more about digital security, cybercrime prevention, or career paths in digital forensics, stay tuned to our blog for expert insights and practical tips.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p>If you found this helpful, subscribe for the latest updates on cybersecurity and digital investigations!<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p>This blog introduces your website visitors to digital forensics in an informative and engaging way, combining technical facts with practical relevance. Let me know if you&#8217;d like a more detailed version or a beginner-friendly write-up!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Understanding Digital Forensics: The Science of Cyber Investigation In today\u2019s hyper-connected world, crimes and disputes no longer happen just in [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1009,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-1008","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Understanding Digital Forensics: The Science of Cyber Investigation - Blog.ICSS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/icssindia.in\/blog\/understanding-digital-forensics-the-science-of-cyber-investigation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understanding Digital Forensics: The Science of Cyber Investigation - Blog.ICSS\" \/>\n<meta property=\"og:description\" content=\"Understanding Digital Forensics: The Science of Cyber Investigation In today\u2019s hyper-connected world, crimes and disputes no longer happen just in [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/icssindia.in\/blog\/understanding-digital-forensics-the-science-of-cyber-investigation\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog.ICSS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/icssindiaa\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-19T06:51:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/icssindia.in\/blog\/wp-content\/uploads\/2025\/08\/Digital-Forensic-scaled.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@icssindiaa\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/icssindia.in\/blog\/understanding-digital-forensics-the-science-of-cyber-investigation\/\",\"url\":\"https:\/\/icssindia.in\/blog\/understanding-digital-forensics-the-science-of-cyber-investigation\/\",\"name\":\"Understanding Digital Forensics: The Science of Cyber Investigation - Blog.ICSS\",\"isPartOf\":{\"@id\":\"https:\/\/icssindia.in\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/icssindia.in\/blog\/understanding-digital-forensics-the-science-of-cyber-investigation\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/icssindia.in\/blog\/understanding-digital-forensics-the-science-of-cyber-investigation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/icssindia.in\/blog\/wp-content\/uploads\/2025\/08\/Digital-Forensic-scaled.png\",\"datePublished\":\"2025-08-19T06:49:23+00:00\",\"dateModified\":\"2025-08-19T06:51:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/icssindia.in\/blog\/understanding-digital-forensics-the-science-of-cyber-investigation\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/icssindia.in\/blog\/understanding-digital-forensics-the-science-of-cyber-investigation\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/icssindia.in\/blog\/understanding-digital-forensics-the-science-of-cyber-investigation\/#primaryimage\",\"url\":\"https:\/\/icssindia.in\/blog\/wp-content\/uploads\/2025\/08\/Digital-Forensic-scaled.png\",\"contentUrl\":\"https:\/\/icssindia.in\/blog\/wp-content\/uploads\/2025\/08\/Digital-Forensic-scaled.png\",\"width\":2560,\"height\":1280},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/icssindia.in\/blog\/understanding-digital-forensics-the-science-of-cyber-investigation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/icssindia.in\/blog\/home\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Understanding Digital Forensics: The Science of Cyber Investigation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/icssindia.in\/blog\/#website\",\"url\":\"https:\/\/icssindia.in\/blog\/\",\"name\":\"Blog.ICSS\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/icssindia.in\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/icssindia.in\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/icssindia.in\/blog\/#organization\",\"name\":\"Blog.ICSS\",\"url\":\"https:\/\/icssindia.in\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/icssindia.in\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/icssindia.in\/blog\/wp-content\/uploads\/2023\/02\/cropped-Logo-ICSS-remove-bg-1.png\",\"contentUrl\":\"https:\/\/icssindia.in\/blog\/wp-content\/uploads\/2023\/02\/cropped-Logo-ICSS-remove-bg-1.png\",\"width\":707,\"height\":353,\"caption\":\"Blog.ICSS\"},\"image\":{\"@id\":\"https:\/\/icssindia.in\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/icssindiaa\/\",\"https:\/\/x.com\/icssindiaa\",\"https:\/\/www.instagram.com\/icssindia.in\/\",\"https:\/\/www.linkedin.com\/school\/icssindia\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Understanding Digital Forensics: The Science of Cyber Investigation - Blog.ICSS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/icssindia.in\/blog\/understanding-digital-forensics-the-science-of-cyber-investigation\/","og_locale":"en_US","og_type":"article","og_title":"Understanding Digital Forensics: The Science of Cyber Investigation - Blog.ICSS","og_description":"Understanding Digital Forensics: The Science of Cyber Investigation In today\u2019s hyper-connected world, crimes and disputes no longer happen just in [&hellip;]","og_url":"https:\/\/icssindia.in\/blog\/understanding-digital-forensics-the-science-of-cyber-investigation\/","og_site_name":"Blog.ICSS","article_publisher":"https:\/\/www.facebook.com\/icssindiaa\/","article_modified_time":"2025-08-19T06:51:52+00:00","og_image":[{"width":2560,"height":1280,"url":"https:\/\/icssindia.in\/blog\/wp-content\/uploads\/2025\/08\/Digital-Forensic-scaled.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@icssindiaa","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/icssindia.in\/blog\/understanding-digital-forensics-the-science-of-cyber-investigation\/","url":"https:\/\/icssindia.in\/blog\/understanding-digital-forensics-the-science-of-cyber-investigation\/","name":"Understanding Digital Forensics: The Science of Cyber Investigation - Blog.ICSS","isPartOf":{"@id":"https:\/\/icssindia.in\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/icssindia.in\/blog\/understanding-digital-forensics-the-science-of-cyber-investigation\/#primaryimage"},"image":{"@id":"https:\/\/icssindia.in\/blog\/understanding-digital-forensics-the-science-of-cyber-investigation\/#primaryimage"},"thumbnailUrl":"https:\/\/icssindia.in\/blog\/wp-content\/uploads\/2025\/08\/Digital-Forensic-scaled.png","datePublished":"2025-08-19T06:49:23+00:00","dateModified":"2025-08-19T06:51:52+00:00","breadcrumb":{"@id":"https:\/\/icssindia.in\/blog\/understanding-digital-forensics-the-science-of-cyber-investigation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/icssindia.in\/blog\/understanding-digital-forensics-the-science-of-cyber-investigation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/icssindia.in\/blog\/understanding-digital-forensics-the-science-of-cyber-investigation\/#primaryimage","url":"https:\/\/icssindia.in\/blog\/wp-content\/uploads\/2025\/08\/Digital-Forensic-scaled.png","contentUrl":"https:\/\/icssindia.in\/blog\/wp-content\/uploads\/2025\/08\/Digital-Forensic-scaled.png","width":2560,"height":1280},{"@type":"BreadcrumbList","@id":"https:\/\/icssindia.in\/blog\/understanding-digital-forensics-the-science-of-cyber-investigation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/icssindia.in\/blog\/home\/"},{"@type":"ListItem","position":2,"name":"Understanding Digital Forensics: The Science of Cyber Investigation"}]},{"@type":"WebSite","@id":"https:\/\/icssindia.in\/blog\/#website","url":"https:\/\/icssindia.in\/blog\/","name":"Blog.ICSS","description":"","publisher":{"@id":"https:\/\/icssindia.in\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/icssindia.in\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/icssindia.in\/blog\/#organization","name":"Blog.ICSS","url":"https:\/\/icssindia.in\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/icssindia.in\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/icssindia.in\/blog\/wp-content\/uploads\/2023\/02\/cropped-Logo-ICSS-remove-bg-1.png","contentUrl":"https:\/\/icssindia.in\/blog\/wp-content\/uploads\/2023\/02\/cropped-Logo-ICSS-remove-bg-1.png","width":707,"height":353,"caption":"Blog.ICSS"},"image":{"@id":"https:\/\/icssindia.in\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/icssindiaa\/","https:\/\/x.com\/icssindiaa","https:\/\/www.instagram.com\/icssindia.in\/","https:\/\/www.linkedin.com\/school\/icssindia"]}]}},"_links":{"self":[{"href":"https:\/\/icssindia.in\/blog\/wp-json\/wp\/v2\/pages\/1008","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icssindia.in\/blog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/icssindia.in\/blog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/icssindia.in\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/icssindia.in\/blog\/wp-json\/wp\/v2\/comments?post=1008"}],"version-history":[{"count":1,"href":"https:\/\/icssindia.in\/blog\/wp-json\/wp\/v2\/pages\/1008\/revisions"}],"predecessor-version":[{"id":1010,"href":"https:\/\/icssindia.in\/blog\/wp-json\/wp\/v2\/pages\/1008\/revisions\/1010"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/icssindia.in\/blog\/wp-json\/wp\/v2\/media\/1009"}],"wp:attachment":[{"href":"https:\/\/icssindia.in\/blog\/wp-json\/wp\/v2\/media?parent=1008"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}