{"id":19098,"date":"2022-02-04T17:11:50","date_gmt":"2022-02-04T17:11:50","guid":{"rendered":"https:\/\/www.africa-press.net\/tchad\/politique\/voici-les-recommandations-formulees-pour-le-renforcement-de-la-cybersecurite-au-tchad"},"modified":"2022-02-04T17:41:29","modified_gmt":"2022-02-04T17:41:29","slug":"voici-les-recommandations-formulees-pour-le-renforcement-de-la-cybersecurite-au-tchad","status":"publish","type":"post","link":"https:\/\/www.africa-press.net\/tchad\/politique\/voici-les-recommandations-formulees-pour-le-renforcement-de-la-cybersecurite-au-tchad","title":{"rendered":"Voici les recommandations formul\u00e9es pour le renforcement de la cybers\u00e9curit\u00e9 au Tchad"},"content":{"rendered":"<p><span style=\"color: #ff6600\"><strong>Africa-Press &#8211; Tchad. <\/strong><\/span><b>Les rideaux se sont referm\u00e9s le 3 f\u00e9vrier 2022, sur l\u2019atelier d\u2019\u00e9valuation de la maturit\u00e9 en cybers\u00e9curit\u00e9 du Tchad. A l\u2019issue des travaux, les participants ont pr\u00e9sent\u00e9 quelques recommandations.<\/b><\/p>\n<p><b>Les rideaux se sont referm\u00e9s le 3 f\u00e9vrier 2022, sur l\u2019atelier d\u2019\u00e9valuation de la maturit\u00e9 en cybers\u00e9curit\u00e9 du Tchad. A l\u2019issue des travaux, les participants ont pr\u00e9sent\u00e9 quelques recommandations.<\/b><\/p>\n<p>La ville de N\u2019Djamena a abrit\u00e9 pendant trois jours, des assisses sur les forces et faiblesses de la capacit\u00e9 nationale en mati\u00e8re de cybers\u00e9curit\u00e9. Les participants ont suivi diff\u00e9rentes pr\u00e9sentations relatives \u00e0 la politique et strat\u00e9gie de cybers\u00e9curit\u00e9 ; la culture et soci\u00e9t\u00e9 de cybers\u00e9curit\u00e9 ; le d\u00e9veloppement des connaissances et des capacit\u00e9s en mati\u00e8re de cybers\u00e9curit\u00e9 ; les cadres juridiques et r\u00e8glementaires ainsi que les normes et technologies et th\u00e9matiques.<\/p>\n<p><b>Les recommandations formul\u00e9es \u00e0 l\u2019intention du gouvernement<\/b><\/p>\n<p>1 \u00c9laborer dans les meilleurs d\u00e9lais la Strat\u00e9gie Nationale de Cybers\u00e9curit\u00e9 avec la participation active de l\u2019ensemble de l\u2019\u00e9cosyst\u00e8me de cybers\u00e9curit\u00e9 ;<\/p>\n<p>2 Identifier tous les services critiques dans tous les secteurs et les doter d\u2019outils performants en mati\u00e8re de cybers\u00e9curit\u00e9 ;<\/p>\n<p>3 Renforcer les capacit\u00e9s des cadres de toutes les institutions critiques \u00e0 l\u2019effet de les rendre aptes \u00e0 impl\u00e9menter dans leurs domaines respectifs la d\u00e9clinaison sectorielle de la Strat\u00e9gie Nationale de Cybers\u00e9curit\u00e9 ;<\/p>\n<p>4 Organiser encore davantage d\u2019ateliers de ce genre pour familiariser les acteurs de tous les secteurs \u00e0 la probl\u00e9matique de la cybers\u00e9curit\u00e9, renforcer la collaboration entre les diff\u00e9rents acteurs et am\u00e9liorer la culture de cybers\u00e9curit\u00e9 dans notre pays ;<\/p>\n<p>5 Renfoncer la coop\u00e9ration avec toutes les institutions internationales sp\u00e9cialis\u00e9es en cybers\u00e9curit\u00e9 en vue de s\u00e9curiser notre cyberspace ;<\/p>\n<p>6 Acc\u00e9l\u00e9rer la mise en place du Date Center National en vue de mutualiser les donn\u00e9es jusque-l\u00e0 \u00e9parpill\u00e9es dans les diff\u00e9rentes institutions nationales ;<\/p>\n<p>7 Veiller \u00e0 la ratification de la Convention de Budapest et \u00e0 la vulgarisation des diff\u00e9rents textes en mati\u00e8re de cybers\u00e9curit\u00e9 ;<\/p>\n<p>8 Veiller \u00e0 la protection des enfants en ligne en mettant des restrictions d\u2019acc\u00e8s et les syst\u00e8mes de contr\u00f4le parental ;<\/p>\n<p>9 Veiller \u00e0 l\u2019int\u00e9gration de la dimension de cybers\u00e9curit\u00e9 dans tous les projets informatiques des institutions publiques et priv\u00e9es.<\/p>\n<p><strong>Pour plus d&rsquo;informations et d&rsquo;analyses sur la <a href=\"https:\/\/www.africa-press.net\/tchad\">Tchad<\/a>, suivez <a href=\"https:\/\/www.africa-press.net\/\">Africa-Press<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Africa-Press &#8211; Tchad. Les rideaux se sont referm\u00e9s le 3 f\u00e9vrier 2022, sur l\u2019atelier d\u2019\u00e9valuation de la maturit\u00e9 en cybers\u00e9curit\u00e9 du Tchad. A l\u2019issue des travaux, les participants ont pr\u00e9sent\u00e9 quelques recommandations. Les rideaux se sont referm\u00e9s le 3 f\u00e9vrier 2022, sur l\u2019atelier d\u2019\u00e9valuation de la maturit\u00e9 en cybers\u00e9curit\u00e9 du Tchad. A l\u2019issue des travaux, [&hellip;]<\/p>\n","protected":false},"author":82,"featured_media":19097,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11,2,10],"tags":[37,292,3242,1101,29],"class_list":["post-19098","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-homepage-french","category-politique","category-toutes-les-actualites","tag-africa-press","tag-africa-press-tchad","tag-maturite-en-cybersecurite","tag-recommandations","tag-tchad"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.1 (Yoast SEO v27.0) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Voici les recommandations formul\u00e9es pour le renforcement de la cybers\u00e9curit\u00e9 au Tchad - tchad<\/title>\n<meta name=\"description\" content=\"Les rideaux se sont referm\u00e9s le 3 f\u00e9vrier 2022, sur l\u2019atelier d\u2019\u00e9valuation de la maturit\u00e9 en cybers\u00e9curit\u00e9 du Tchad. ...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.africa-press.net\/tchad\/politique\/voici-les-recommandations-formulees-pour-le-renforcement-de-la-cybersecurite-au-tchad\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Voici les recommandations formul\u00e9es pour le renforcement de la cybers\u00e9curit\u00e9 au Tchad\" \/>\n<meta property=\"og:description\" content=\"Les rideaux se sont referm\u00e9s le 3 f\u00e9vrier 2022, sur l\u2019atelier d\u2019\u00e9valuation de la maturit\u00e9 en cybers\u00e9curit\u00e9 du Tchad. ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.africa-press.net\/tchad\/politique\/voici-les-recommandations-formulees-pour-le-renforcement-de-la-cybersecurite-au-tchad\" \/>\n<meta property=\"og:site_name\" content=\"tchad\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-04T17:11:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-02-04T17:41:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/static.africa-press.net\/tchad\/sites\/41\/2022\/02\/img-61fd65236d93a.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"780\" \/>\n\t<meta property=\"og:image:height\" content=\"440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"cfeditorfr\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"cfeditorfr\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.africa-press.net\/tchad\/politique\/voici-les-recommandations-formulees-pour-le-renforcement-de-la-cybersecurite-au-tchad#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.africa-press.net\/tchad\/politique\/voici-les-recommandations-formulees-pour-le-renforcement-de-la-cybersecurite-au-tchad\"},\"author\":{\"name\":\"cfeditorfr\",\"@id\":\"https:\/\/www.africa-press.net\/tchad\/#\/schema\/person\/2b1cf3cd81a31e3cd26889ca66d677f1\"},\"headline\":\"Voici les recommandations formul\u00e9es pour le renforcement de la cybers\u00e9curit\u00e9 au Tchad\",\"datePublished\":\"2022-02-04T17:11:50+00:00\",\"dateModified\":\"2022-02-04T17:41:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.africa-press.net\/tchad\/politique\/voici-les-recommandations-formulees-pour-le-renforcement-de-la-cybersecurite-au-tchad\"},\"wordCount\":425,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.africa-press.net\/tchad\/politique\/voici-les-recommandations-formulees-pour-le-renforcement-de-la-cybersecurite-au-tchad#primaryimage\"},\"thumbnailUrl\":\"https:\/\/static.africa-press.net\/tchad\/sites\/41\/2022\/02\/img-61fd65236d93a.jpg\",\"keywords\":[\"Africa Press\",\"Africa Press-Tchad\",\"maturit\u00e9 en cybers\u00e9curit\u00e9\",\"Recommandations\",\"Tchad\"],\"articleSection\":[\"homepage-french\",\"Politique\",\"Toutes les actualit\u00e9s\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.africa-press.net\/tchad\/politique\/voici-les-recommandations-formulees-pour-le-renforcement-de-la-cybersecurite-au-tchad#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.africa-press.net\/tchad\/politique\/voici-les-recommandations-formulees-pour-le-renforcement-de-la-cybersecurite-au-tchad\",\"url\":\"https:\/\/www.africa-press.net\/tchad\/politique\/voici-les-recommandations-formulees-pour-le-renforcement-de-la-cybersecurite-au-tchad\",\"name\":\"Voici les recommandations formul\u00e9es pour le renforcement de la cybers\u00e9curit\u00e9 au Tchad - tchad\",\"isPartOf\":{\"@id\":\"https:\/\/www.africa-press.net\/tchad\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.africa-press.net\/tchad\/politique\/voici-les-recommandations-formulees-pour-le-renforcement-de-la-cybersecurite-au-tchad#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.africa-press.net\/tchad\/politique\/voici-les-recommandations-formulees-pour-le-renforcement-de-la-cybersecurite-au-tchad#primaryimage\"},\"thumbnailUrl\":\"https:\/\/static.africa-press.net\/tchad\/sites\/41\/2022\/02\/img-61fd65236d93a.jpg\",\"datePublished\":\"2022-02-04T17:11:50+00:00\",\"dateModified\":\"2022-02-04T17:41:29+00:00\",\"author\":{\"@id\":\"https:\/\/www.africa-press.net\/tchad\/#\/schema\/person\/2b1cf3cd81a31e3cd26889ca66d677f1\"},\"description\":\"Les rideaux se sont referm\u00e9s le 3 f\u00e9vrier 2022, sur l\u2019atelier d\u2019\u00e9valuation de la maturit\u00e9 en cybers\u00e9curit\u00e9 du Tchad. ...\",\"breadcrumb\":{\"@id\":\"https:\/\/www.africa-press.net\/tchad\/politique\/voici-les-recommandations-formulees-pour-le-renforcement-de-la-cybersecurite-au-tchad#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.africa-press.net\/tchad\/politique\/voici-les-recommandations-formulees-pour-le-renforcement-de-la-cybersecurite-au-tchad\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.africa-press.net\/tchad\/politique\/voici-les-recommandations-formulees-pour-le-renforcement-de-la-cybersecurite-au-tchad#primaryimage\",\"url\":\"https:\/\/static.africa-press.net\/tchad\/sites\/41\/2022\/02\/img-61fd65236d93a.jpg\",\"contentUrl\":\"https:\/\/static.africa-press.net\/tchad\/sites\/41\/2022\/02\/img-61fd65236d93a.jpg\",\"width\":780,\"height\":440,\"caption\":\"Voici les recommandations formul\u00e9es pour le renforcement de la cybers\u00e9curit\u00e9 au Tchad\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.africa-press.net\/tchad\/politique\/voici-les-recommandations-formulees-pour-le-renforcement-de-la-cybersecurite-au-tchad#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.africa-press.net\/tchad\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Voici les recommandations formul\u00e9es pour le renforcement de la cybers\u00e9curit\u00e9 au Tchad\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.africa-press.net\/tchad\/#website\",\"url\":\"https:\/\/www.africa-press.net\/tchad\/\",\"name\":\"tchad\",\"description\":\"Just another Africa News Agency Sites site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.africa-press.net\/tchad\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.africa-press.net\/tchad\/#\/schema\/person\/2b1cf3cd81a31e3cd26889ca66d677f1\",\"name\":\"cfeditorfr\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Voici les recommandations formul\u00e9es pour le renforcement de la cybers\u00e9curit\u00e9 au Tchad - tchad","description":"Les rideaux se sont referm\u00e9s le 3 f\u00e9vrier 2022, sur l\u2019atelier d\u2019\u00e9valuation de la maturit\u00e9 en cybers\u00e9curit\u00e9 du Tchad. ...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.africa-press.net\/tchad\/politique\/voici-les-recommandations-formulees-pour-le-renforcement-de-la-cybersecurite-au-tchad","og_locale":"fr_FR","og_type":"article","og_title":"Voici les recommandations formul\u00e9es pour le renforcement de la cybers\u00e9curit\u00e9 au Tchad","og_description":"Les rideaux se sont referm\u00e9s le 3 f\u00e9vrier 2022, sur l\u2019atelier d\u2019\u00e9valuation de la maturit\u00e9 en cybers\u00e9curit\u00e9 du Tchad. ...","og_url":"https:\/\/www.africa-press.net\/tchad\/politique\/voici-les-recommandations-formulees-pour-le-renforcement-de-la-cybersecurite-au-tchad","og_site_name":"tchad","article_published_time":"2022-02-04T17:11:50+00:00","article_modified_time":"2022-02-04T17:41:29+00:00","og_image":[{"width":780,"height":440,"url":"https:\/\/static.africa-press.net\/tchad\/sites\/41\/2022\/02\/img-61fd65236d93a.jpg","type":"image\/jpeg"}],"author":"cfeditorfr","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"cfeditorfr","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.africa-press.net\/tchad\/politique\/voici-les-recommandations-formulees-pour-le-renforcement-de-la-cybersecurite-au-tchad#article","isPartOf":{"@id":"https:\/\/www.africa-press.net\/tchad\/politique\/voici-les-recommandations-formulees-pour-le-renforcement-de-la-cybersecurite-au-tchad"},"author":{"name":"cfeditorfr","@id":"https:\/\/www.africa-press.net\/tchad\/#\/schema\/person\/2b1cf3cd81a31e3cd26889ca66d677f1"},"headline":"Voici les recommandations formul\u00e9es pour le renforcement de la cybers\u00e9curit\u00e9 au Tchad","datePublished":"2022-02-04T17:11:50+00:00","dateModified":"2022-02-04T17:41:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.africa-press.net\/tchad\/politique\/voici-les-recommandations-formulees-pour-le-renforcement-de-la-cybersecurite-au-tchad"},"wordCount":425,"commentCount":0,"image":{"@id":"https:\/\/www.africa-press.net\/tchad\/politique\/voici-les-recommandations-formulees-pour-le-renforcement-de-la-cybersecurite-au-tchad#primaryimage"},"thumbnailUrl":"https:\/\/static.africa-press.net\/tchad\/sites\/41\/2022\/02\/img-61fd65236d93a.jpg","keywords":["Africa Press","Africa Press-Tchad","maturit\u00e9 en cybers\u00e9curit\u00e9","Recommandations","Tchad"],"articleSection":["homepage-french","Politique","Toutes les actualit\u00e9s"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.africa-press.net\/tchad\/politique\/voici-les-recommandations-formulees-pour-le-renforcement-de-la-cybersecurite-au-tchad#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.africa-press.net\/tchad\/politique\/voici-les-recommandations-formulees-pour-le-renforcement-de-la-cybersecurite-au-tchad","url":"https:\/\/www.africa-press.net\/tchad\/politique\/voici-les-recommandations-formulees-pour-le-renforcement-de-la-cybersecurite-au-tchad","name":"Voici les recommandations formul\u00e9es pour le renforcement de la cybers\u00e9curit\u00e9 au Tchad - tchad","isPartOf":{"@id":"https:\/\/www.africa-press.net\/tchad\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.africa-press.net\/tchad\/politique\/voici-les-recommandations-formulees-pour-le-renforcement-de-la-cybersecurite-au-tchad#primaryimage"},"image":{"@id":"https:\/\/www.africa-press.net\/tchad\/politique\/voici-les-recommandations-formulees-pour-le-renforcement-de-la-cybersecurite-au-tchad#primaryimage"},"thumbnailUrl":"https:\/\/static.africa-press.net\/tchad\/sites\/41\/2022\/02\/img-61fd65236d93a.jpg","datePublished":"2022-02-04T17:11:50+00:00","dateModified":"2022-02-04T17:41:29+00:00","author":{"@id":"https:\/\/www.africa-press.net\/tchad\/#\/schema\/person\/2b1cf3cd81a31e3cd26889ca66d677f1"},"description":"Les rideaux se sont referm\u00e9s le 3 f\u00e9vrier 2022, sur l\u2019atelier d\u2019\u00e9valuation de la maturit\u00e9 en cybers\u00e9curit\u00e9 du Tchad. ...","breadcrumb":{"@id":"https:\/\/www.africa-press.net\/tchad\/politique\/voici-les-recommandations-formulees-pour-le-renforcement-de-la-cybersecurite-au-tchad#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.africa-press.net\/tchad\/politique\/voici-les-recommandations-formulees-pour-le-renforcement-de-la-cybersecurite-au-tchad"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.africa-press.net\/tchad\/politique\/voici-les-recommandations-formulees-pour-le-renforcement-de-la-cybersecurite-au-tchad#primaryimage","url":"https:\/\/static.africa-press.net\/tchad\/sites\/41\/2022\/02\/img-61fd65236d93a.jpg","contentUrl":"https:\/\/static.africa-press.net\/tchad\/sites\/41\/2022\/02\/img-61fd65236d93a.jpg","width":780,"height":440,"caption":"Voici les recommandations formul\u00e9es pour le renforcement de la cybers\u00e9curit\u00e9 au Tchad"},{"@type":"BreadcrumbList","@id":"https:\/\/www.africa-press.net\/tchad\/politique\/voici-les-recommandations-formulees-pour-le-renforcement-de-la-cybersecurite-au-tchad#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.africa-press.net\/tchad\/"},{"@type":"ListItem","position":2,"name":"Voici les recommandations formul\u00e9es pour le renforcement de la cybers\u00e9curit\u00e9 au Tchad"}]},{"@type":"WebSite","@id":"https:\/\/www.africa-press.net\/tchad\/#website","url":"https:\/\/www.africa-press.net\/tchad\/","name":"tchad","description":"Just another Africa News Agency Sites site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.africa-press.net\/tchad\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.africa-press.net\/tchad\/#\/schema\/person\/2b1cf3cd81a31e3cd26889ca66d677f1","name":"cfeditorfr"}]}},"_links":{"self":[{"href":"https:\/\/www.africa-press.net\/tchad\/wp-json\/wp\/v2\/posts\/19098","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.africa-press.net\/tchad\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.africa-press.net\/tchad\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.africa-press.net\/tchad\/wp-json\/wp\/v2\/users\/82"}],"replies":[{"embeddable":true,"href":"https:\/\/www.africa-press.net\/tchad\/wp-json\/wp\/v2\/comments?post=19098"}],"version-history":[{"count":0,"href":"https:\/\/www.africa-press.net\/tchad\/wp-json\/wp\/v2\/posts\/19098\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.africa-press.net\/tchad\/wp-json\/wp\/v2\/media\/19097"}],"wp:attachment":[{"href":"https:\/\/www.africa-press.net\/tchad\/wp-json\/wp\/v2\/media?parent=19098"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.africa-press.net\/tchad\/wp-json\/wp\/v2\/categories?post=19098"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.africa-press.net\/tchad\/wp-json\/wp\/v2\/tags?post=19098"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}