{"id":11787,"date":"2023-10-19T13:38:53","date_gmt":"2023-10-19T13:38:53","guid":{"rendered":"https:\/\/cloudkul.com\/blog\/?p=11787"},"modified":"2024-10-22T05:34:46","modified_gmt":"2024-10-22T05:34:46","slug":"role-of-cryptography-in-information-security","status":"publish","type":"post","link":"https:\/\/cloudkul.com\/blog\/role-of-cryptography-in-information-security\/","title":{"rendered":"Role of Cryptography in Information Security"},"content":{"rendered":"\n<p>Many of us connect in cyberspace without giving security a second thought in today&#8217;s rapidly growing digital communication and electronic data exchange.<\/p>\n\n\n\n<p>On the internet, we share a large amount of our personal information and secrets. Our digital footprint is in cyberspace whether we want it or not.<\/p>\n\n\n\n<p>To be more specific, whatever we send is usually unprotected and vulnerable to cyber criminals. <\/p>\n\n\n\n<p>As a result, current cryptography is in high demand to identify new ways to <a href=\"https:\/\/cloudkul.com\/blog\/data-encryption-at-rest-and-in-transit-protect-your-data\/\">protect sensitive or confidential data.<\/a><\/p>\n\n\n\n<p>Effective data encryption and decryption are the keys to <a href=\"https:\/\/cloudkul.com\/blog\/secure-the-cloud-infrastructure-with-cloud-security\/\">cyberspace security<\/a>. <\/p>\n\n\n\n<p>As a result, we must convert information into an unreadable format, which can be protected and accessible only by those who are permitted.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is Cryptography?<\/h2>\n\n\n\n<p>Cryptography is a tool for safeguarding data sent over the internet. It is the transformation of data into an unreadable format, only the intended recipient will be able to understand and use it.<\/p>\n\n\n\n<p>As a result, cryptography is primarily concerned with securing and protecting data from cyber thieves or anybody other than the intended recipient. <\/p>\n\n\n\n<p>Therefore, Cryptography allows people to communicate safely over the Internet.<\/p>\n\n\n\n<p>As a result, cryptography enables customers to conduct online shopping using public or private media, such as the Internet, while avoiding thieves and password sniffers.<\/p>\n\n\n\n<p>We can achieve it by utilizing the most recent computer science technological improvements. <\/p>\n\n\n\n<p>Cryptography, <strong>usually referred to as cryptology<\/strong>, is a branch of mathematics that deals with the encryption of data.<\/p>\n\n\n\n<p>Encryption and decryption keys are key aspects to start cryptography &#8211; <\/p>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">Encryption<\/mark><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\"> <\/mark><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">&#8211;<\/mark><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\"> <\/mark><\/strong>Encryption is the process of coding and transforming plain text into an unreadable format. <\/p>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">Decryption<\/mark><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\"> <\/mark><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">&#8211;<\/mark><\/strong> Decryption is the process of decoding and converting unreadable material into readable information using a particular digital key.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Elements of Cryptography<\/h2>\n\n\n\n<p>The cryptographic layers are safe because of their core elements &#8211; <\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Cryptographic Key<\/h5>\n\n\n\n<p>To safeguard sensitive information, cryptographic keys will be used in conjunction with cryptographic algorithms. <\/p>\n\n\n\n<p>To be effective, cryptographic keys must have an adequate key length and private keys must be kept secret.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Cryptographic Algorithm<\/h5>\n\n\n\n<p>These algorithms are the mathematical prerequisites that ensure the integrity, confidentiality, and validity of sensitive data.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Cryptographic Libraries<\/h5>\n\n\n\n<p>Cryptographic Libraries are libraries that contain implementations of cryptographic algorithms that application developers can utilize to safeguard sensitive data.<\/p>\n\n\n\n<p>To provide the desired security level, cryptographic libraries must be carefully chosen and kept up to date.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Digital Certificates<\/h5>\n\n\n\n<p>Digital certificates are used to establish confidence between digital components that are linked together. <\/p>\n\n\n\n<p>To eliminate security vulnerabilities, digital certificates must be handled effectively to guarantee that compliance algorithms and key lengths are used, as well as being renewed before expiration.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Types of Cryptography<\/h2>\n\n\n\n<p>There are 3 types of Cryptography &#8211;<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">Symmetric Encryption or Secret Key Cryptography<\/mark><\/h5>\n\n\n\n<p>In this method, only one digital key will be used. <a href=\"https:\/\/cloudkul.com\/blog\/understanding-cryptographic-methods-for-data-transfer\/\">Encryption and decryption<\/a> are done with the same digital key.<\/p>\n\n\n\n<p>When the original data sender encrypts the data into an unreadable format, he uses the same key, and the recipient uses the same key to decrypt the data into a readable format.<\/p>\n\n\n\n<p>This is a straightforward <a href=\"https:\/\/cloudkul.com\/blog\/understanding-cryptographic-methods-for-data-transfer\/\">method of cryptography<\/a> with one major flaw. The sharing of a single key could lead to misuse.<\/p>\n\n\n\n<p>The Data Encryption Standard(DES)&nbsp;is the most popular example of a symmetric\u2013key system.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/cloudkul.com\/blog\/wp-content\/uploads\/2024\/04\/symmetric-cryptography.png\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"440\" src=\"https:\/\/cloudkul.com\/blog\/wp-content\/uploads\/2024\/04\/symmetric-cryptography.png\" alt=\"Encryption\" class=\"wp-image-17700\"\/><\/a><\/figure>\n\n\n\n<h5 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">Asymmetric Encryption or Public-key Cryptography<\/mark><\/h5>\n\n\n\n<p>Each communication party has a set of keys in this type of encryption. One key is private, while the other is open to the public. They all have access to the same public key.<\/p>\n\n\n\n<p>When delivering information, the sender encrypts it with the public key. When the recipient receives the encrypted data, he uses his secret key to decrypt it into a readable format.<\/p>\n\n\n\n<p>The most extensively used type of public-key encryption is RSA.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/cloudkul.com\/blog\/wp-content\/uploads\/2024\/04\/asymmetric-cryptography.png\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"440\" src=\"https:\/\/cloudkul.com\/blog\/wp-content\/uploads\/2024\/04\/asymmetric-cryptography.png\" alt=\"Asymmetric\" class=\"wp-image-17698\"\/><\/a><\/figure>\n\n\n\n<h5 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">Hash Function<\/mark><\/h5>\n\n\n\n<p>It uses a set length hash value encrypted into plain text, this method of encryption does not require any digital keys. <\/p>\n\n\n\n<p>The hash key&#8217;s function is to ensure that the original data is not tampered with. <\/p>\n\n\n\n<p>It facilitates communication through the use of algorithms. The hash key creates a digital fingerprint of the file, ensuring it is neither corrupted nor compromised with a virus. <\/p>\n\n\n\n<p>This encryption is one-way. Computer administrators can also use the hash key to encrypt passwords.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/cloudkul.com\/blog\/wp-content\/uploads\/2024\/04\/hash-function.png\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"440\" src=\"https:\/\/cloudkul.com\/blog\/wp-content\/uploads\/2024\/04\/hash-function.png\" alt=\"Hash\" class=\"wp-image-17699\"\/><\/a><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Role of Cryptography<\/h2>\n\n\n\n<p>Cryptography achieves confidentiality, integrity, authentication, and non-repudiation, among several other information security goals &#8211; <\/p>\n\n\n\n<h6 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">It protects the confidentiality of the information<\/mark><\/h6>\n\n\n\n<p><a href=\"https:\/\/cloudkul.com\/blog\/what-is-cia\/\">Confidentiality<\/a> means that only those with the appropriate permissions can access the data sent and that this data is safeguarded from unauthorized access at all stages of its lifecycle.<\/p>\n\n\n\n<p>The only way to keep data secure while it&#8217;s being kept and delivered is to encrypt it. <\/p>\n\n\n\n<p>Without the correct decryption keys, even if the transferor storage medium is hacked, the encrypted data is largely useless to unauthorized parties.<\/p>\n\n\n\n<h6 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">It ensures the Data Integrity<\/mark><\/h6>\n\n\n\n<p>The accuracy of information management and associated information is what <a href=\"https:\/\/cloudkul.com\/blog\/what-is-cia\/\">integrity means<\/a> in the security context.<\/p>\n\n\n\n<p>When a system is referred to as &#8216;<strong><em>integrated<\/em><\/strong>,&#8217; it means that data is delivered and processed in a controlled manner. Even after it has been processed, the data remains the same.<\/p>\n\n\n\n<p>To maintain data integrity, encryption employs hash function algorithms and message digests.<\/p>\n\n\n\n<h6 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">It assures the Authenticity of the sender or receiver<\/mark><\/h6>\n\n\n\n<p>Identifying the source of information is a key principle of cryptography. It is simple to communicate securely once the source of information is recognized.<\/p>\n\n\n\n<p>Authentication is only possible if the sender provides a unique key exchange that can be used to <a href=\"https:\/\/cloudkul.com\/blog\/what-is-cia\/\">authenticate his or her identity<\/a>.<\/p>\n\n\n\n<p>A login and password are generally used, although additional techniques such as a smart card, retina scan, voice recognition, or fingerprint scan can also be used.<\/p>\n\n\n\n<h6 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">Non-Repudiation<\/mark><\/h6>\n\n\n\n<p>This approach ensures that the sender of the information cannot claim that it was never sent. This method employs digital signatures to prevent the sender from denying the data&#8217;s origin.<\/p>\n\n\n\n<h6 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\">It also ensures the Availability of Data<\/mark><\/h6>\n\n\n\n<p>Cryptography also contributes to data availability by ensuring that only individuals with the proper rights can access networks and retrieve data in a reliable and timely manner.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>So, Cryptography is a dynamic and necessary part of digital commerce.<\/p>\n\n\n\n<p>It is being used by businesses of all sizes and across industries to secure personal information, customer data, trade secrets, employee files, credit card numbers, and other sensitive data.<\/p>\n\n\n\n<p>Encryption protects your company&#8217;s data and information from potential risks, ensuring that even if an intruder obtained access to your sensitive data, they&#8217;d be unlikely to be able to read any of it.<\/p>\n\n\n\n<p>However, If you are looking for a security audit service, check out the <a href=\"https:\/\/store.webkul.com\/Ecommerce-Security-Audit-Basic-Plan.html\">Webkul basic security module<\/a>. <\/p>\n\n\n\n<p> Check out this <a href=\"https:\/\/store.webkul.com\/magento2-security-extension.html\">Magento 2-based eCommerce store security extension<\/a> which can also be customized.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Need Support?<\/h2>\n\n\n\n<p>Thank You for reading this Blog!<\/p>\n\n\n\n<p>For further more interesting blogs, keep in touch with us. If you need any kind of support, simply raise a ticket at&nbsp;<strong><a href=\"https:\/\/webkul.uvdesk.com\/en\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/webkul.uvdesk.com\/en\/<\/a>.<\/strong><\/p>\n\n\n\n<p>You may also visit our <a href=\"https:\/\/webkul.com\/odoo-development\/\">Odoo development services<\/a> and quality\u00a0<strong><a href=\"https:\/\/store.webkul.com\/index.php\/Odoo.html\">Odoo Extensions<\/a><\/strong>.<\/p>\n\n\n\n<p><strong>For further help or queries, please&nbsp;<a href=\"https:\/\/cloudkul.com\/contact\/\">contact<\/a>&nbsp;us or raise a&nbsp;<a href=\"https:\/\/webkul.uvdesk.com\/en\/customer\/create-ticket\/\">ticket<\/a>.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Many of us connect in cyberspace without giving security a second thought in today&#8217;s rapidly <a class=\"text-primary\" title=\"read more\" href=\"https:\/\/cloudkul.com\/blog\/role-of-cryptography-in-information-security\/\">[&#8230;]<\/a><\/p>\n","protected":false},"author":29,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[341,340,88],"tags":[592,589,551,320,772,773,770,593],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Role of Cryptography in Information Security - Cloudkul<\/title>\n<meta name=\"description\" content=\"Cryptography is a tool for safeguarding data sent over the internet, into an unreadable format that can only be understood by the intended recipient.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cloudkul.com\/blog\/role-of-cryptography-in-information-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Role of Cryptography in Information Security - Cloudkul\" \/>\n<meta property=\"og:description\" content=\"Cryptography is a tool for safeguarding data sent over the internet, into an unreadable format that can only be understood by the intended recipient.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cloudkul.com\/blog\/role-of-cryptography-in-information-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Cloudkul\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-19T13:38:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-22T05:34:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cloudkul.com\/blog\/wp-content\/uploads\/2024\/04\/symmetric-cryptography.png\" \/>\n<meta name=\"author\" content=\"Tanya Garg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/CloudWebkul\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cloudkul.com\/blog\/role-of-cryptography-in-information-security\/\",\"url\":\"https:\/\/cloudkul.com\/blog\/role-of-cryptography-in-information-security\/\",\"name\":\"Role of Cryptography in Information Security - Cloudkul\",\"isPartOf\":{\"@id\":\"https:\/\/cloudkul.com\/blog\/#website\"},\"datePublished\":\"2023-10-19T13:38:53+00:00\",\"dateModified\":\"2024-10-22T05:34:46+00:00\",\"author\":{\"@id\":\"https:\/\/cloudkul.com\/blog\/#\/schema\/person\/65b93d1aa584abd012eb60a25839b984\"},\"description\":\"Cryptography is a tool for safeguarding data sent over the internet, into an unreadable format that can only be understood by the intended recipient.\",\"breadcrumb\":{\"@id\":\"https:\/\/cloudkul.com\/blog\/role-of-cryptography-in-information-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cloudkul.com\/blog\/role-of-cryptography-in-information-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cloudkul.com\/blog\/role-of-cryptography-in-information-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cloudkul.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Role of Cryptography in Information Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cloudkul.com\/blog\/#website\",\"url\":\"https:\/\/cloudkul.com\/blog\/\",\"name\":\"Cloudkul\",\"description\":\"Host your eCommerce Store on AWS with Optimized Performance\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cloudkul.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/cloudkul.com\/blog\/#\/schema\/person\/65b93d1aa584abd012eb60a25839b984\",\"name\":\"Tanya Garg\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cloudkul.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ea334eba6adf9dfe79873bc0bee8dad?s=96&d=https%3A%2F%2Fs.gravatar.com%2Favatar%2F6148c37469011bc2f8e491ca8f5de495%3Fs%3D80&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ea334eba6adf9dfe79873bc0bee8dad?s=96&d=https%3A%2F%2Fs.gravatar.com%2Favatar%2F6148c37469011bc2f8e491ca8f5de495%3Fs%3D80&r=g\",\"caption\":\"Tanya Garg\"},\"description\":\"Business Developer Executive at Webkul\",\"sameAs\":[\"https:\/\/cloudkul.com\/\",\"https:\/\/twitter.com\/https:\/\/twitter.com\/CloudWebkul\"],\"url\":\"https:\/\/cloudkul.com\/blog\/author\/tanyagarg-bd037\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Role of Cryptography in Information Security - Cloudkul","description":"Cryptography is a tool for safeguarding data sent over the internet, into an unreadable format that can only be understood by the intended recipient.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cloudkul.com\/blog\/role-of-cryptography-in-information-security\/","og_locale":"en_US","og_type":"article","og_title":"Role of Cryptography in Information Security - Cloudkul","og_description":"Cryptography is a tool for safeguarding data sent over the internet, into an unreadable format that can only be understood by the intended recipient.","og_url":"https:\/\/cloudkul.com\/blog\/role-of-cryptography-in-information-security\/","og_site_name":"Cloudkul","article_published_time":"2023-10-19T13:38:53+00:00","article_modified_time":"2024-10-22T05:34:46+00:00","og_image":[{"url":"https:\/\/cloudkul.com\/blog\/wp-content\/uploads\/2024\/04\/symmetric-cryptography.png"}],"author":"Tanya Garg","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/CloudWebkul","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cloudkul.com\/blog\/role-of-cryptography-in-information-security\/","url":"https:\/\/cloudkul.com\/blog\/role-of-cryptography-in-information-security\/","name":"Role of Cryptography in Information Security - Cloudkul","isPartOf":{"@id":"https:\/\/cloudkul.com\/blog\/#website"},"datePublished":"2023-10-19T13:38:53+00:00","dateModified":"2024-10-22T05:34:46+00:00","author":{"@id":"https:\/\/cloudkul.com\/blog\/#\/schema\/person\/65b93d1aa584abd012eb60a25839b984"},"description":"Cryptography is a tool for safeguarding data sent over the internet, into an unreadable format that can only be understood by the intended recipient.","breadcrumb":{"@id":"https:\/\/cloudkul.com\/blog\/role-of-cryptography-in-information-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cloudkul.com\/blog\/role-of-cryptography-in-information-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cloudkul.com\/blog\/role-of-cryptography-in-information-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cloudkul.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Role of Cryptography in Information Security"}]},{"@type":"WebSite","@id":"https:\/\/cloudkul.com\/blog\/#website","url":"https:\/\/cloudkul.com\/blog\/","name":"Cloudkul","description":"Host your eCommerce Store on AWS with Optimized Performance","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cloudkul.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/cloudkul.com\/blog\/#\/schema\/person\/65b93d1aa584abd012eb60a25839b984","name":"Tanya Garg","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cloudkul.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9ea334eba6adf9dfe79873bc0bee8dad?s=96&d=https%3A%2F%2Fs.gravatar.com%2Favatar%2F6148c37469011bc2f8e491ca8f5de495%3Fs%3D80&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ea334eba6adf9dfe79873bc0bee8dad?s=96&d=https%3A%2F%2Fs.gravatar.com%2Favatar%2F6148c37469011bc2f8e491ca8f5de495%3Fs%3D80&r=g","caption":"Tanya Garg"},"description":"Business Developer Executive at Webkul","sameAs":["https:\/\/cloudkul.com\/","https:\/\/twitter.com\/https:\/\/twitter.com\/CloudWebkul"],"url":"https:\/\/cloudkul.com\/blog\/author\/tanyagarg-bd037\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/posts\/11787"}],"collection":[{"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/users\/29"}],"replies":[{"embeddable":true,"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/comments?post=11787"}],"version-history":[{"count":63,"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/posts\/11787\/revisions"}],"predecessor-version":[{"id":18361,"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/posts\/11787\/revisions\/18361"}],"wp:attachment":[{"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/media?parent=11787"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/categories?post=11787"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/tags?post=11787"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}