{"id":7405,"date":"2023-03-10T00:26:07","date_gmt":"2023-03-10T00:26:07","guid":{"rendered":"https:\/\/www.cyberdegrees.org\/?p=7405"},"modified":"2023-04-12T17:04:18","modified_gmt":"2023-04-12T17:04:18","slug":"cybersecurity-and-the-transportation-sector","status":"publish","type":"post","link":"https:\/\/www.cyberdegrees.org\/resources\/cybersecurity-transportation-sector\/","title":{"rendered":"Cybersecurity and the Transportation Sector"},"content":{"rendered":"<p>Cybersecurity protects our nation's transportation infrastructure and the industries it supports. As the transportation world becomes more sophisticated, the security measures used to protect it must also evolve.<\/p>\r\n<p>Cybersecurity professionals play an important role in keeping transportation systems safe. Security managers, penetration testers, incident responders, and vulnerability assessors all help prevent future cyberattacks.<\/p>\r\n<p>Discover common cyberthreats to transportation, current vulnerabilities, emerging opportunities, and the transportation industries that are most connected to security.<\/p>\r\n\r\n\r\n<h2>Where Transportation and Cyberthreats Collide<\/h2>\r\n<p>The transportation sector remains particularly vulnerable to <a href=\"https:\/\/www.cyberdegrees.org\/resources\/most-common-cyber-attacks\/\">cybersecurity threats<\/a> due to its dependence on technology. Traffic lights, toll booths, air traffic control towers, and vehicle-to-vehicle communication devices depend on technology to operate safely and effectively.<\/p>\r\n<p>Transportation can also be lucrative for hackers. It holds massive amounts of valuable products, including merchandise and commodities. In addition, infrastructure supports large numbers of people. A successful attack on a pipeline, a port, or an air freight carrier can disrupt supply chains and threaten human lives.<\/p>\r\n<p>Hackers recognize transportation's value as a target and continue to escalate their attacks. In 2022, for example, the Port of Los Angeles deflected 40 million attacks per month, and the number ramped up after conflict erupted in Ukraine.<\/p>\r\n<p>In response to these vulnerabilities, the federal government has passed the <a href=\"https:\/\/www.congress.gov\/bill\/117th-congress\/house-bill\/3684\/text\" target=\"_blank\" rel=\"noopener\">Infrastructure Investment and Jobs Act<\/a>, which included $2 billion for the Department of Transportation (DOT) to expand its cybersecurity initiatives. State, local, and private agencies can address current vulnerabilities and prepare to meet emerging opportunities.<\/p>\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"vulnerabilites-and-opportunities\" id=\"vulnerabilites-and-opportunities\"><\/a>\n\n \r\n<h3>Current Vulnerabilities<\/h3>\r\n  <section class=\"checklist-v2\">\n    \n        <ul class=\"space-y-6\">\n    \n    \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#1222B6\" size=\"medium\" icon=\"plus\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"plus\" data-color=\"#1222B6\">\r\n<span class=\"text-base\"><strong>Ransomware:<\/strong> Hackers use ransomware to lock down a company's network until they receive a ransom payment. <a href=\"https:\/\/www.ibm.com\/reports\/threat-intelligence\/\" target=\"_blank\" rel=\"noopener\">Research from IBM<\/a> indicates that one in every four cyberattacks is a ransomware attack. Most of these attacks succeeded through phishing or vulnerability. Professionals can help stop these attacks by educating front-line employees.<\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#1222B6\" size=\"medium\" icon=\"plus\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"plus\" data-color=\"#1222B6\">\r\n<span class=\"text-base\"><strong>Aging Infrastructure:<\/strong> Transportation companies with aging technological infrastructure face a higher risk of attack. Vendors rarely support outdated systems, leaving companies without up-to-date software packages or antivirus patches.<\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#1222B6\" size=\"medium\" icon=\"plus\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"plus\" data-color=\"#1222B6\">\r\n<span class=\"text-base\"><strong>Insufficient Security Assessment: <\/strong>In a security assessment, professionals for weaknesses and vulnerabilities. When transportation companies fail to perform adequate security assessments, they do not know where their cyberdefenses can be breached and cannot address those fractures in their systems.<\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#1222B6\" size=\"medium\" icon=\"plus\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"plus\" data-color=\"#1222B6\">\r\n<span class=\"text-base\"><strong>Vehicle Links to IT Networks:<\/strong> Algorithms that connect cars to Wi-Fi allow the vehicles to communicate with other automobiles, traffic lights, and lane markings. This kind of smart road infrastructure and vehicle-to-vehicle communication provide drivers with safety assistance features. But they also offer hackers other opportunities to weaponize cars or steal data.<\/span><\/section><\/div>\n  <\/li>\n          \n        <\/ul>\n      <\/section>\n\n\n\r\n\r\n\r\n<h3>Emerging Opportunities<\/h3>\r\n  <section class=\"checklist-v2\">\n    \n        <ul class=\"space-y-6\">\n    \n    \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#12C7C4\" size=\"medium\" icon=\"plus\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"plus\" data-color=\"#12C7C4\">\r\n<span class=\"text-base\"><strong>New Research:<\/strong> DOT supports research combining cybersecurity and transportation. Researchers are specifically looking for data-derived best practices and policies to recommend across the sector.<\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#12C7C4\" size=\"medium\" icon=\"plus\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"plus\" data-color=\"#12C7C4\">\r\n<span class=\"text-base\"><strong>Federal Funding:<\/strong> As part of the recent infrastructure law, state and local governments can now access federal funds for cybersecurity infrastructure development <a href=\"https:\/\/www.cyberdegrees.org\/resources\/best-industries-cybersecurity\/\">across industries and sectors<\/a>. The Transit Security Grant program, administered by the Department of Homeland Security, provides millions of dollars to help transit agencies protect transportation infrastructure.<\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#12C7C4\" size=\"medium\" icon=\"plus\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"plus\" data-color=\"#12C7C4\">\r\n<span class=\"text-base\"><strong>Increased Regulations:<\/strong> In 2021, the federal government issued new regulations requiring detailed planning and assessment. The same policy also increased staffing numbers to meet cybersecurity needs in transportation.<\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#12C7C4\" size=\"medium\" icon=\"plus\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"plus\" data-color=\"#12C7C4\">\r\n<span class=\"text-base\">&gt;<strong>Intelligent Automation: <\/strong>Sometimes called cognitive automation, this approach to <a href=\"https:\/\/www.cyberdegrees.org\/resources\/hot-technologies-cyber-security\/\">secure technology<\/a> blends artificial intelligence with business process management and robotic process automation. While intelligent automation can help support or replace drivers, it also presents hackers with fresh entry points to vehicles. Cybersecurity experts who can help secure intelligent automation may put their skills to work in transportation security.<\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#12C7C4\" size=\"medium\" icon=\"plus\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"plus\" data-color=\"#12C7C4\">\r\n<span class=\"text-base\"><strong>Security by Design:<\/strong> This security-first approach to software engineering eliminates software vulnerabilities at the foundational level.<\/span><\/section><\/div>\n  <\/li>\n          \n        <\/ul>\n      <\/section>\n\n\n\r\n\r\n<!--\r\n[columns columns=\"3\"]\r\n[sonic-interlink title=\"Explore more cybersecurity careers\" link=\"https:\/\/www.cyberdegrees.org\/jobs-overview\/\"]\r\n[sonic-interlink title=\"Find cybersecurity jobs for military and veterans\" link=\"https:\/\/www.cyberdegrees.org\/resources\/careers-for-vets\/\"]\r\n[sonic-interlink title=\"Learn about cybersecurity in the government sector\" link=\"https:\/\/www.cyberdegrees.org\/resources\/government-cyber-security-careers\/\"]\r\n[\/columns]\r\n\r\n<p><strong>PUBLISHING: INTERLINK BUTTONS IN COLUMNS\/PUBLISHER'S CHOICE<\/strong><\/p>\r\n<p><a href=\"https:\/\/www.cyberdegrees.org\/resources\/cybersecurity-energy-sector\/\">Learn how cybersecurity protects the energy sector<\/a><strong>(NOT YET LIVE)<\/strong><\/p>\r\n<p><a href=\"https:\/\/www.cyberdegrees.org\/resources\/cybersecurity-healthcare\/\">How is cybersecurity used in healthcare?<\/a><strong>(NOT YET LIVE)<\/strong><\/p>\r\n<p><a href=\"https:\/\/www.cyberdegrees.org\/resources\/cybersecurity-financial-services\/\">Discover how financial services use cybersecurity<\/a><strong>(NOT YET LIVE)<\/strong><\/p>\r\n-->\r\n\r\n<section class=\"-mx-4 md:-mx-1\/2vw py-12 md:py-16 mt-12 md:my-16 relative md:left-1\/2 md:right-1\/2 md:w-screen bg-gray-50\">\n    <div class=\"container content\">\n        \r\n<sonic-editorial-listings degree=\"\" category=\"\" subject=\"\" limit=\"3\"><\/sonic-editorial-listings>\r\n\n    <\/div>\n<\/section>\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"transportation-industries\" id=\"transportation-industries\"><\/a>\n\n \r\n<h2>Which Transportation Industries Use Cybersecurity?<\/h2>\r\n<div class=\"bg-accent-light rounded-lg border-thin py-1 px-6 mb-6\">\r\n    <h3 class=\"text-accent-800\"><strong>Air<\/strong><\/h3>\r\n    \r\n    <p>Following the 9\/11 attacks, aviation has increased security efforts. However, criminals can now attempt to penetrate digital access to planes beyond physical means alone.<\/p>\r\n    <p>After hackers attempted to disrupt operations at several key airports in 2022, the Federal Aviation Administration increased its cybersecurity efforts. <a href=\"https:\/\/www.cyberdegrees.org\/jobs\/security-engineer\/\">Cybersecurity engineers<\/a> and aircraft systems analysts assess threats and partner across agencies to implement effective security solutions.<\/p>\r\n                \r\n    <hr>\r\n    <h3 class=\"text-accent-800\"><strong>Rail<\/strong><\/h3>\r\n    \r\n    <p>By federal law, trains operate using Positive Train Control (PTC), which helps prevent collisions and accidents due to human error.<\/p>\r\n    <p>While PTC controls select vulnerabilities, hackers could exploit the system, leaving food or farm produce to spoil and potentially injuring hundreds of passengers on a single train. <a href=\"https:\/\/www.cyberdegrees.org\/jobs\/vulnerability-assessor\/\">Vulnerability assessors<\/a> and <a href=\"https:\/\/www.cyberdegrees.org\/jobs\/incident-responder\/\">incident responders<\/a> can help protect railways' operational technology.<\/p>\r\n                    \r\n    <hr>\r\n    <h3 class=\"text-accent-800\"><strong>Marine<\/strong><\/h3>\r\n    \r\n    <p>Ships transport billions of dollars of freight on inland waterways, the Great Lakes, and the oceans. Cyberincidents at ports and in ship-to-port communication can severely disrupt supply chains and passenger transportation.<\/p>\r\n    <p>In 2020, for example, cyberattacks on maritime transportation systems increased by 400%. <a href=\"https:\/\/www.cyberdegrees.org\/jobs\/security-specialist\/\">Network security specialists<\/a> can help create firewalls and manage software updates to help prevent these attacks from succeeding.<\/p>\r\n                        \r\n    <hr>\r\n    <h3 class=\"text-accent-800\"><strong>Trucking<\/strong><\/h3>\r\n    \r\n    <p>Trucks move about 72.2% of freight in the U.S. Malevolent hackers who gain access to trucks could use them as weapons, steal their contents, or access private information.<\/p>\r\n    <p>These criminals can attack devices inside trucks, at stopping points, at the home office, or through drivers' web applications. Most vulnerabilities are human, not technological, in origin. <a href=\"https:\/\/www.cyberdegrees.org\/jobs\/security-manager\/\">Security managers<\/a> can help educate and manage employee behavior, greatly reducing risk.<\/p>\r\n                            \r\n    <hr>\r\n    <h3 class=\"text-accent-800\"><strong>Warehousing<\/strong><\/h3>\r\n    \r\n    <p>Commercial warehouse facilities contain approximately 1.9 billion square feet of space across the United States. Warehousing works closely with transportation by storing merchandise between shipments.<\/p>\r\n    <p>These warehouses contain rich stores of physical goods and data &mdash; ideal targets for cybercriminals. <a href=\"https:\/\/www.cyberdegrees.org\/jobs\/penetration-tester\/\">Penetration testers<\/a> and <a href=\"https:\/\/www.cyberdegrees.org\/careers\/vulnerability-assessor\/day-in-the-life\">vulnerability assessors<\/a> can review and assess warehouse security for potential weaknesses.<\/p>\r\n                                \r\n\r\n<\/div>\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"resources\" id=\"resources\"><\/a>\n\n \r\n<div class=\"grid md:grid-cols-2 lg:grid-cols-2 gap-5 my-8\"> \n  \r\n<p><sonic-icon icon='plus' type='solid' size='small' color='#12C7C4'><\/sonic-icon> <a href=\"https:\/\/www.cyberdegrees.org\/jobs\/\">Learn more about working in cybersecurity<\/a><\/p>\r\n<p><sonic-icon icon='plus' type='solid' size='small' color='#12C7C4'><\/sonic-icon> <a href=\"https:\/\/www.cyberdegrees.org\/resources\/government-cyber-security-careers\/\">Explore government cybersecurity jobs<\/a><\/p>\r\n<p><sonic-icon icon='plus' type='solid' size='small' color='#12C7C4'><\/sonic-icon> <a href=\"https:\/\/www.cyberdegrees.org\/resources\/careers-for-vets\/\">Find cybersecurity careers for veterans<\/a><\/p>\r\n<p><sonic-icon icon='plus' type='solid' size='small' color='#12C7C4'><\/sonic-icon> <a href=\"https:\/\/www.cyberdegrees.org\/resources\/transitioning-from-general-it\/\">Transition from general IT to cybersecurity<\/a><\/p>\r\n\n<\/div>\n\r\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"increasing-security\" id=\"increasing-security\"><\/a>\n\n \r\n<h2>Increasing Cybersecurity in Transportation Industries<\/h2>\r\n<p>Transportation hubs concentrate people and merchandise, making highways profitable targets for criminals. In particular, the growing interface between the digital world and physical infrastructure is creating new and lucrative opportunities for hackers.<\/p>\r\n<p>Consequently, the <a href=\"https:\/\/www.cyberdegrees.org\/resources\/government-cyber-security-careers\/\">federal government<\/a> and private enterprise recognize the critical need for advanced protection in the transportation sector. Their recent investments in cybersecurity in transportation present new opportunities. Funding supports research, technology improvements, and enough staffing to keep transportation secure.<\/p>\r\n<p>New cybersecurity experts can find secure, <a href=\"https:\/\/www.cyberdegrees.org\/jobs\/\">high-paying jobs<\/a> helping transportation companies maintain security and freedom.<\/p>\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"faq\" id=\"faq\"><\/a>\n\n \r\n<h2>FAQ About Cybersecurity and Transportation<\/h2>\r\n<div class=\"ml-1\">\r\n    <ul class=\"border-secondary-light border-dotted rounded-lg py-1\">\r\n        <li>\r\n            <div class=\"bg-secondary-dark shadow-lg w-9 h-8 flex absolute justify-center rounded-full ml-1 mr-9 \">\r\n                <sonic-icon color=\"#ffffff\" icon=\"question-mark-circle\" class=\"items-center pt-5\"><\/sonic-icon>\r\n            <\/div>\r\n            <div class=\"mr-10 ml-10\">\r\n            <h3><mark style=\"background-color: #e7f0fc\">How critical is cybersecurity to the transportation sector?<\/mark><\/h3>\r\n            <p>As the digital and physical environments of transportation infrastructure become more interconnected, instability can lead to urgent national security threats. Cybersecurity threats can disrupt air, trucking, shipping, and rail freight companies, putting a <a href=\"https:\/\/rosap.ntl.bts.gov\/view\/dot\/65841\" target=\"_blank\" rel=\"noopener\">sector that accounted for 8.4%<\/a> of the 2021 U.S. gross domestic product at risk.<\/p>\r\n        <\/div>\r\n        <\/li>\r\n    <\/ul>\r\n<\/div>\r\n<div class=\"ml-1\">\r\n    <ul class=\"border-secondary-light border-dotted rounded-lg py-1\">\r\n        <li>\r\n            <div class=\"bg-secondary-dark shadow-lg w-9 h-8 flex absolute justify-center rounded-full ml-1 mr-9 \">\r\n                <sonic-icon color=\"#ffffff\" icon=\"question-mark-circle\" class=\"items-center pt-5\"><\/sonic-icon>\r\n            <\/div>\r\n            <div class=\"mr-10 ml-10\">\r\n            <h3><mark style=\"background-color: #e7f0fc\">Which transportation industries need cybersecurity the most?<\/mark><\/h3>\r\n            <p>All transportation industries can benefit from enhanced cybersecurity. However, trucking and aviation have historically experienced the sector's largest and most focused digital attacks. Cybersecurity on planes presents a particularly high level of risk in a post-9\/11 security environment.<\/p>\r\n        <\/div>\r\n        <\/li>\r\n    <\/ul>\r\n<\/div>\r\n<div class=\"ml-1\">\r\n    <ul class=\"border-secondary-light border-dotted rounded-lg py-1\">\r\n        <li>\r\n            <div class=\"bg-secondary-dark shadow-lg w-9 h-8 flex absolute justify-center rounded-full ml-1 mr-9 \">\r\n                <sonic-icon color=\"#ffffff\" icon=\"question-mark-circle\" class=\"items-center pt-5\"><\/sonic-icon>\r\n            <\/div>\r\n            <div class=\"mr-10 ml-10\">\r\n            <h3><mark style=\"background-color: #e7f0fc\">What are the biggest security threats facing transportation?<\/mark><\/h3>\r\n            <p>Ideologically driven cybercriminals may attempt to disrupt social and economic life to achieve power for themselves or their group. Money-motivated hackers may use ransomware to disrupt supply chains until victims make payments.<\/p>\r\n        <\/div>\r\n        <\/li>\r\n    <\/ul>\r\n<\/div>\r\n<div class=\"ml-1\">\r\n    <ul class=\"border-secondary-light border-dotted rounded-lg py-1\">\r\n        <li>\r\n            <div class=\"bg-secondary-dark shadow-lg w-9 h-8 flex absolute justify-center rounded-full ml-1 mr-9 \">\r\n                <sonic-icon color=\"#ffffff\" icon=\"question-mark-circle\" class=\"items-center pt-5\"><\/sonic-icon>\r\n            <\/div>\r\n            <div class=\"mr-10 ml-10\">\r\n            <h3><mark style=\"background-color: #e7f0fc\">How do I get into transportation cybersecurity?<\/mark><\/h3>\r\n            <p>Transportation cybersecurity professionals can work for state, local, national, or international employers representing public and private agencies. Positions in the field may require hands-on learning, certification, higher education, and real-world experience, depending on the nature of the job. Some cybersecurity degrees emphasize transportation, which may give graduates a leg up.<\/p>\r\n                <\/div>\r\n        <\/li>\r\n    <\/ul>\r\n<\/div>","protected":false},"excerpt":{"rendered":"Transportation companies focus on physical security, but technological threats call for new security initiatives. Find out about cybersecurity in transportation.","protected":false},"author":41,"featured_media":7407,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"templates\/template-dcs.php","format":"standard","meta":{"_cloudinary_featured_overwrite":false,"footnotes":""},"categories":[1],"states":[],"resources-overview":[33],"degrees":[],"jobs-overview":[],"rankings":[],"class_list":["post-7405","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","resources-overview-all"],"acf":[],"menu_order":0,"_links":{"self":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/7405","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/users\/41"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/comments?post=7405"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/7405\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/media\/7407"}],"wp:attachment":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/media?parent=7405"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/categories?post=7405"},{"taxonomy":"states","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/states?post=7405"},{"taxonomy":"resources-overview","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/resources-overview?post=7405"},{"taxonomy":"degrees","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/degrees?post=7405"},{"taxonomy":"jobs-overview","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/jobs-overview?post=7405"},{"taxonomy":"rankings","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/rankings?post=7405"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}