{"id":3436,"date":"2019-09-16T17:24:45","date_gmt":"2019-09-16T10:24:45","guid":{"rendered":"https:\/\/www.packetlove.com\/th\/?p=3436"},"modified":"2019-10-15T23:15:54","modified_gmt":"2019-10-15T16:15:54","slug":"what-is-critical-infrastructures-ci-and-cii","status":"publish","type":"post","link":"https:\/\/www.packetlove.com\/th\/en\/2019\/09\/16\/what-is-critical-infrastructures-ci-and-cii\/","title":{"rendered":"Critical Infrastructures (CI) \u0e41\u0e25\u0e30 Critical Information Infrastructures (CII) \u0e04\u0e37\u0e2d\u0e2d\u0e30\u0e44\u0e23 \u0e2a\u0e33\u0e04\u0e31\u0e0d\u0e2d\u0e22\u0e48\u0e32\u0e07\u0e44\u0e23 \u0e21\u0e35\u0e1c\u0e25\u0e2d\u0e30\u0e44\u0e23\u0e01\u0e31\u0e1a\u0e40\u0e23\u0e32"},"content":{"rendered":"<p><\/p>\n<h2>Critical Infrastructures (CI) \u0e41\u0e25\u0e30 Critical Information Infrastructures (CII) \u0e04\u0e37\u0e2d\u0e2d\u0e30\u0e44\u0e23 \u0e2a\u0e33\u0e04\u0e31\u0e0d\u0e2d\u0e22\u0e48\u0e32\u0e07\u0e44\u0e23 \u0e21\u0e35\u0e1c\u0e25\u0e2d\u0e30\u0e44\u0e23\u0e01\u0e31\u0e1a\u0e40\u0e23\u0e32<\/h2>\n<p>Critical Infrastructures (CI) \u0e04\u0e37\u0e2d\u0e2d\u0e30\u0e44\u0e23<br \/>\n\u0e04\u0e37\u0e2d\u201c\u0e42\u0e04\u0e23\u0e07\u0e2a\u0e23\u0e49\u0e32\u0e07\u0e1e\u0e37\u0e49\u0e19\u0e10\u0e32\u0e19\u0e2a\u0e33\u0e04\u0e31\u0e0d\u0e02\u0e2d\u0e07\u0e1b\u0e23\u0e30\u0e40\u0e17\u0e28\u201d (Critical Infrastructure)<br \/>\n\u0e0b\u0e36\u0e48\u0e07\u0e1a\u0e23\u0e23\u0e14\u0e32\u0e2b\u0e19\u0e48\u0e27\u0e22\u0e07\u0e32\u0e19\u0e2b\u0e23\u0e37\u0e2d\u0e2d\u0e07\u0e04\u0e4c\u0e01\u0e23 \u0e2b\u0e23\u0e37\u0e2d\u0e2a\u0e48\u0e27\u0e19\u0e07\u0e32\u0e19\u0e2b\u0e19\u0e36\u0e48\u0e07\u0e2a\u0e48\u0e27\u0e19\u0e07\u0e32\u0e19\u0e43\u0e14\u0e02\u0e2d\u0e07\u0e2b\u0e19\u0e48\u0e27\u0e22\u0e07\u0e32\u0e19\u0e2b\u0e23\u0e37\u0e2d\u0e2d\u0e07\u0e04\u0e4c\u0e01\u0e23<br \/>\n\u0e0b\u0e36\u0e48\u0e07\u0e18\u0e38\u0e23\u0e01\u0e23\u0e23\u0e21\u0e17\u0e32\u0e07\u0e2d\u0e34\u0e40\u0e25\u0e47\u0e01\u0e17\u0e23\u0e2d\u0e19\u0e34\u0e01\u0e2a\u0e4c\u0e02\u0e2d\u0e07\u0e2b\u0e19\u0e48\u0e27\u0e22\u0e07\u0e32\u0e19 \u0e2b\u0e23\u0e37\u0e2d\u0e2d\u0e07\u0e04\u0e4c\u0e01\u0e23 \u0e2b\u0e23\u0e37\u0e2d\u0e2a\u0e48\u0e27\u0e19\u0e07\u0e32\u0e19\u0e02\u0e2d\u0e07\u0e2b\u0e19\u0e48\u0e27\u0e22\u0e07\u0e32\u0e19 \u0e2b\u0e23\u0e37\u0e2d\u0e2d\u0e07\u0e04\u0e4c\u0e01\u0e23\u0e19\u0e31\u0e49\u0e19<br \/>\n\u0e21\u0e35\u0e1c\u0e25\u0e40\u0e01\u0e35\u0e48\u0e22\u0e27\u0e40\u0e19\u0e37\u0e48\u0e2d\u0e07\u0e2a\u0e33\u0e04\u0e31\u0e0d\u0e15\u0e48\u0e2d\u0e04\u0e27\u0e32\u0e21\u0e21\u0e31\u0e48\u0e19\u0e04\u0e07\u0e2b\u0e23\u0e37\u0e2d\u0e04\u0e27\u0e32\u0e21\u0e2a\u0e07\u0e1a\u0e40\u0e23\u0e35\u0e22\u0e1a\u0e23\u0e49\u0e2d\u0e22 \u0e02\u0e2d\u0e07\u0e1b\u0e23\u0e30\u0e40\u0e17\u0e28 \u0e2b\u0e23\u0e37\u0e2d\u0e15\u0e48\u0e2d\u0e2a\u0e32\u0e18\u0e32\u0e23\u0e13\u0e0a\u0e19<\/p>\n<p>Critical Information Infrastructure (CII) \u0e04\u0e37\u0e2d\u0e2d\u0e30\u0e44\u0e23<br \/>\n\u0e04\u0e37\u0e2d \u0e42\u0e04\u0e23\u0e07\u0e2a\u0e23\u0e49\u0e32\u0e07\u0e1e\u0e37\u0e49\u0e19\u0e10\u0e32\u0e19\u0e2a \u0e32\u0e04\u0e31\u0e0d\u0e17\u0e32\u0e07\u0e2a\u0e32\u0e23\u0e2a\u0e19\u0e40\u0e17\u0e28 (Critical Information Infrastructure) \u0e0b\u0e36\u0e48\u0e07\u0e40\u0e1b\u0e47\u0e19\u0e23\u0e30\u0e1a\u0e1a\u0e2a\u0e32\u0e23\u0e2a\u0e19\u0e40\u0e17\u0e28\u0e17\u0e35\u0e48\u0e2b\u0e19\u0e48\u0e27\u0e22\u0e07\u0e32\u0e19\u0e0b\u0e36\u0e48\u0e07\u0e40\u0e1b\u0e47\u0e19<br \/>\n\u0e42\u0e04\u0e23\u0e07\u0e2a\u0e23\u0e49\u0e32\u0e07\u0e1e\u0e37\u0e49\u0e19\u0e10\u0e32\u0e19\u0e2a\u0e33\u0e04\u0e31\u0e0d\u0e02\u0e2d\u0e07\u0e1b\u0e23\u0e30\u0e40\u0e17\u0e28 \u0e43\u0e0a\u0e49\u0e43\u0e19\u0e01\u0e32\u0e23\u0e14\u0e33\u0e40\u0e19\u0e34\u0e19\u0e07\u0e32\u0e19\u0e41\u0e25\u0e30\u0e43\u0e2b\u0e49\u0e1a\u0e23\u0e34\u0e01\u0e32\u0e23 \u0e2b\u0e32\u0e01\u0e23\u0e30\u0e1a\u0e1a\u0e16\u0e39\u0e01\u0e23\u0e1a\u0e01\u0e27\u0e19\u0e08\u0e30\u0e17\u0e33\u0e43\u0e2b\u0e49\u0e44\u0e21\u0e48\u0e2a\u0e32\u0e21\u0e32\u0e23\u0e16 \u0e14\u0e33\u0e40\u0e19\u0e34\u0e19\u0e07\u0e32\u0e19\u0e2b\u0e23\u0e37\u0e2d\u0e43\u0e2b\u0e49\u0e1a\u0e23\u0e34\u0e01\u0e32\u0e23\u0e44\u0e14\u0e49<\/p>\n<p><strong>\u0e2a\u0e16\u0e32\u0e19\u0e01\u0e32\u0e23\u0e13\u0e4c\u0e20\u0e31\u0e22\u0e04\u0e38\u0e01\u0e04\u0e32\u0e21\u0e44\u0e0b\u0e40\u0e1a\u0e2d\u0e23\u0e4c\u0e43\u0e19\u0e15\u0e48\u0e32\u0e07\u0e1b\u0e23\u0e30\u0e40\u0e17\u0e28<\/strong><br \/>\n<img loading=\"lazy\" class=\"alignnone wp-image-3441 size-large\" src=\"https:\/\/www.packetlove.com\/th\/wp-content\/uploads\/2019\/09\/stuxnet-1024x565.png\" alt=\"\" width=\"640\" height=\"353\" srcset=\"https:\/\/www.packetlove.com\/th\/wp-content\/uploads\/2019\/09\/stuxnet-1024x565.png 1024w, https:\/\/www.packetlove.com\/th\/wp-content\/uploads\/2019\/09\/stuxnet-300x165.png 300w, https:\/\/www.packetlove.com\/th\/wp-content\/uploads\/2019\/09\/stuxnet-768x423.png 768w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/p>\n<p><strong>\u0e2a\u0e16\u0e32\u0e19\u0e01\u0e32\u0e23\u0e13\u0e4c\u0e20\u0e31\u0e22\u0e04\u0e38\u0e01\u0e04\u0e32\u0e21\u0e44\u0e0b\u0e40\u0e1a\u0e2d\u0e23\u0e4c\u0e43\u0e19\u0e1b\u0e23\u0e30\u0e40\u0e17\u0e28\u0e44\u0e17\u0e22\u00a0<\/strong><br \/>\n<img loading=\"lazy\" class=\"alignnone wp-image-3440 size-large\" src=\"https:\/\/www.packetlove.com\/th\/wp-content\/uploads\/2019\/09\/cyber_crimical_th-1024x649.png\" alt=\"\" width=\"640\" height=\"406\" srcset=\"https:\/\/www.packetlove.com\/th\/wp-content\/uploads\/2019\/09\/cyber_crimical_th-1024x649.png 1024w, https:\/\/www.packetlove.com\/th\/wp-content\/uploads\/2019\/09\/cyber_crimical_th-300x190.png 300w, https:\/\/www.packetlove.com\/th\/wp-content\/uploads\/2019\/09\/cyber_crimical_th-768x486.png 768w, https:\/\/www.packetlove.com\/th\/wp-content\/uploads\/2019\/09\/cyber_crimical_th.png 2027w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/p>\n<p><strong>\u0e04\u0e27\u0e32\u0e21\u0e08\u0e33\u0e40\u0e1b\u0e47\u0e19\u0e43\u0e19\u0e01\u0e32\u0e23\u0e1b\u0e23\u0e30\u0e40\u0e21\u0e34\u0e19\u0e27\u0e34\u0e18\u0e35\u0e01\u0e32\u0e23\u0e1b\u0e23\u0e30\u0e40\u0e21\u0e34\u0e19\u0e1c\u0e25\u0e01\u0e23\u0e30\u0e17\u0e1a Minimize Risk \u0e40\u0e1e\u0e37\u0e48\u0e2d take action\u00a0<\/strong><br \/>\n<img loading=\"lazy\" class=\"alignnone wp-image-3437 size-large\" src=\"https:\/\/www.packetlove.com\/th\/wp-content\/uploads\/2019\/09\/minumum_risk_penalty-1024x552.png\" alt=\"\" width=\"640\" height=\"345\" srcset=\"https:\/\/www.packetlove.com\/th\/wp-content\/uploads\/2019\/09\/minumum_risk_penalty-1024x552.png 1024w, https:\/\/www.packetlove.com\/th\/wp-content\/uploads\/2019\/09\/minumum_risk_penalty-300x162.png 300w, https:\/\/www.packetlove.com\/th\/wp-content\/uploads\/2019\/09\/minumum_risk_penalty-768x414.png 768w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/p>\n<p><strong>\u0e01\u0e32\u0e23\u0e08\u0e31\u0e14\u0e01\u0e25\u0e38\u0e48\u0e21\u0e42\u0e04\u0e23\u0e07\u0e2a\u0e23\u0e49\u0e32\u0e07\u0e1e\u0e37\u0e49\u0e19\u0e17\u0e35\u0e48\u0e2a\u0e33\u0e04\u0e31\u0e0d\u0e17\u0e32\u0e07\u0e2a\u0e32\u0e23\u0e2a\u0e19\u0e40\u0e17\u0e28\u0e02\u0e2d\u0e07\u0e1b\u0e23\u0e30\u0e40\u0e17\u0e28\u0e44\u0e17\u0e22<\/strong><br \/>\n<img loading=\"lazy\" class=\"alignnone wp-image-3438 size-large\" src=\"https:\/\/www.packetlove.com\/th\/wp-content\/uploads\/2019\/09\/group_in_ci-1024x552.png\" alt=\"\" width=\"640\" height=\"345\" srcset=\"https:\/\/www.packetlove.com\/th\/wp-content\/uploads\/2019\/09\/group_in_ci-1024x552.png 1024w, https:\/\/www.packetlove.com\/th\/wp-content\/uploads\/2019\/09\/group_in_ci-300x162.png 300w, https:\/\/www.packetlove.com\/th\/wp-content\/uploads\/2019\/09\/group_in_ci-768x414.png 768w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/p>\n<p><strong>\u0e21\u0e32\u0e15\u0e23\u0e10\u0e32\u0e19\u0e41\u0e25\u0e30\u0e21\u0e32\u0e15\u0e23\u0e01\u0e32\u0e23\u0e17\u0e35\u0e48\u0e1e\u0e36\u0e07\u0e19\u0e33\u0e44\u0e1b\u0e43\u0e0a\u0e49\u0e40\u0e1b\u0e47\u0e19\u0e01\u0e23\u0e2d\u0e1a\u0e43\u0e19\u0e01\u0e32\u0e23\u0e17\u0e33\u0e07\u0e32\u0e19\u0e40\u0e1e\u0e37\u0e48\u0e2d\u0e25\u0e14\u0e04\u0e27\u0e32\u0e21\u0e40\u0e2a\u0e35\u0e48\u0e22\u0e07<\/strong><br \/>\n<img loading=\"lazy\" class=\"alignnone wp-image-3439 size-large\" src=\"https:\/\/www.packetlove.com\/th\/wp-content\/uploads\/2019\/09\/cybersecurity_framework-1024x541.png\" alt=\"\" width=\"640\" height=\"338\" srcset=\"https:\/\/www.packetlove.com\/th\/wp-content\/uploads\/2019\/09\/cybersecurity_framework-1024x541.png 1024w, https:\/\/www.packetlove.com\/th\/wp-content\/uploads\/2019\/09\/cybersecurity_framework-300x158.png 300w, https:\/\/www.packetlove.com\/th\/wp-content\/uploads\/2019\/09\/cybersecurity_framework-768x406.png 768w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/p>\n<p>\u0e02\u0e2d\u0e1a\u0e04\u0e38\u0e13\u0e02\u0e49\u0e2d\u0e21\u0e39\u0e25\u0e08\u0e32\u0e01\u0e17\u0e32\u0e07 ETDA \u0e41\u0e25\u0e30 \u0e01\u0e23\u0e30\u0e17\u0e23\u0e27\u0e07\u0e14\u0e34\u0e08\u0e34\u0e17\u0e31\u0e25\u0e40\u0e1e\u0e37\u0e48\u0e2d\u0e40\u0e28\u0e23\u0e29\u0e10\u0e01\u0e34\u0e08\u0e41\u0e25\u0e30\u0e2a\u0e31\u0e07\u0e04\u0e21<\/p>","protected":false},"excerpt":{"rendered":"<p>Critical Infrastructures (CI) \u0e41\u0e25\u0e30 Critical Information Infrastructures (CII) \u0e04\u0e37\u0e2d\u0e2d\u0e30\u0e44\u0e23 \u0e2a\u0e33\u0e04\u0e31\u0e0d\u0e2d\u0e22\u0e48\u0e32\u0e07\u0e44\u0e23 \u0e21\u0e35\u0e1c\u0e25\u0e2d\u0e30\u0e44\u0e23\u0e01\u0e31\u0e1a\u0e40\u0e23\u0e32 Critical Infrastructures (CI) \u0e04\u0e37\u0e2d\u0e2d\u0e30\u0e44\u0e23 \u0e04\u0e37\u0e2d\u201c\u0e42\u0e04\u0e23\u0e07\u0e2a\u0e23\u0e49\u0e32\u0e07\u0e1e\u0e37\u0e49\u0e19\u0e10\u0e32\u0e19\u0e2a\u0e33\u0e04\u0e31\u0e0d\u0e02\u0e2d\u0e07\u0e1b\u0e23\u0e30\u0e40\u0e17\u0e28\u201d (Critical Infrastructure) \u0e0b\u0e36\u0e48\u0e07\u0e1a\u0e23\u0e23\u0e14\u0e32\u0e2b\u0e19\u0e48\u0e27\u0e22\u0e07\u0e32\u0e19\u0e2b\u0e23\u0e37\u0e2d\u0e2d\u0e07\u0e04\u0e4c\u0e01\u0e23 \u0e2b\u0e23\u0e37\u0e2d\u0e2a\u0e48\u0e27\u0e19\u0e07\u0e32\u0e19\u0e2b\u0e19\u0e36\u0e48\u0e07\u0e2a\u0e48\u0e27\u0e19\u0e07\u0e32\u0e19\u0e43\u0e14\u0e02\u0e2d\u0e07\u0e2b\u0e19\u0e48\u0e27\u0e22\u0e07\u0e32\u0e19\u0e2b\u0e23\u0e37\u0e2d\u0e2d\u0e07\u0e04\u0e4c\u0e01\u0e23 \u0e0b\u0e36\u0e48\u0e07\u0e18\u0e38\u0e23\u0e01\u0e23\u0e23\u0e21\u0e17\u0e32\u0e07\u0e2d\u0e34\u0e40\u0e25\u0e47\u0e01\u0e17\u0e23\u0e2d\u0e19\u0e34\u0e01\u0e2a\u0e4c\u0e02\u0e2d\u0e07\u0e2b\u0e19\u0e48\u0e27\u0e22\u0e07\u0e32\u0e19 \u0e2b\u0e23\u0e37\u0e2d\u0e2d\u0e07\u0e04\u0e4c\u0e01\u0e23 \u0e2b\u0e23\u0e37\u0e2d\u0e2a\u0e48\u0e27\u0e19\u0e07\u0e32\u0e19\u0e02\u0e2d\u0e07\u0e2b\u0e19\u0e48\u0e27\u0e22\u0e07\u0e32\u0e19 \u0e2b\u0e23\u0e37\u0e2d\u0e2d\u0e07\u0e04\u0e4c\u0e01\u0e23\u0e19\u0e31\u0e49\u0e19 \u0e21\u0e35\u0e1c\u0e25\u0e40\u0e01\u0e35\u0e48\u0e22\u0e27\u0e40\u0e19\u0e37\u0e48\u0e2d\u0e07\u0e2a\u0e33\u0e04\u0e31\u0e0d\u0e15\u0e48\u0e2d\u0e04\u0e27\u0e32\u0e21\u0e21\u0e31\u0e48\u0e19\u0e04\u0e07\u0e2b\u0e23\u0e37\u0e2d\u0e04\u0e27\u0e32\u0e21\u0e2a\u0e07\u0e1a\u0e40\u0e23\u0e35\u0e22\u0e1a\u0e23\u0e49\u0e2d\u0e22 \u0e02\u0e2d\u0e07\u0e1b\u0e23\u0e30\u0e40\u0e17\u0e28 \u0e2b\u0e23\u0e37\u0e2d\u0e15\u0e48\u0e2d\u0e2a\u0e32\u0e18\u0e32\u0e23\u0e13\u0e0a\u0e19 Critical Information Infrastructure (CII) \u0e04\u0e37\u0e2d\u0e2d\u0e30\u0e44\u0e23 \u0e04\u0e37\u0e2d \u0e42\u0e04\u0e23\u0e07\u0e2a\u0e23\u0e49\u0e32\u0e07\u0e1e\u0e37\u0e49\u0e19\u0e10\u0e32\u0e19\u0e2a \u0e32\u0e04\u0e31\u0e0d\u0e17\u0e32\u0e07\u0e2a\u0e32\u0e23\u0e2a\u0e19\u0e40\u0e17\u0e28 (Critical Information Infrastructure) \u0e0b\u0e36\u0e48\u0e07\u0e40\u0e1b\u0e47\u0e19\u0e23\u0e30\u0e1a\u0e1a\u0e2a\u0e32\u0e23\u0e2a\u0e19\u0e40\u0e17\u0e28\u0e17\u0e35\u0e48\u0e2b\u0e19\u0e48\u0e27\u0e22\u0e07\u0e32\u0e19\u0e0b\u0e36\u0e48\u0e07\u0e40\u0e1b\u0e47\u0e19 \u0e42\u0e04\u0e23\u0e07\u0e2a\u0e23\u0e49\u0e32\u0e07\u0e1e\u0e37\u0e49\u0e19\u0e10\u0e32\u0e19\u0e2a\u0e33\u0e04\u0e31\u0e0d\u0e02\u0e2d\u0e07\u0e1b\u0e23\u0e30\u0e40\u0e17\u0e28 \u0e43\u0e0a\u0e49\u0e43\u0e19\u0e01\u0e32\u0e23\u0e14\u0e33\u0e40\u0e19\u0e34\u0e19\u0e07\u0e32\u0e19\u0e41\u0e25\u0e30\u0e43\u0e2b\u0e49\u0e1a\u0e23\u0e34\u0e01\u0e32\u0e23 \u0e2b\u0e32\u0e01\u0e23\u0e30\u0e1a\u0e1a\u0e16\u0e39\u0e01\u0e23\u0e1a\u0e01\u0e27\u0e19\u0e08\u0e30\u0e17\u0e33\u0e43\u0e2b\u0e49\u0e44\u0e21\u0e48\u0e2a\u0e32\u0e21\u0e32\u0e23\u0e16 \u0e14\u0e33\u0e40\u0e19\u0e34\u0e19\u0e07\u0e32\u0e19\u0e2b\u0e23\u0e37\u0e2d\u0e43\u0e2b\u0e49\u0e1a\u0e23\u0e34\u0e01\u0e32\u0e23\u0e44\u0e14\u0e49 \u0e2a\u0e16\u0e32\u0e19\u0e01\u0e32\u0e23\u0e13\u0e4c\u0e20\u0e31\u0e22\u0e04\u0e38\u0e01\u0e04\u0e32\u0e21\u0e44\u0e0b\u0e40\u0e1a\u0e2d\u0e23\u0e4c\u0e43\u0e19\u0e15\u0e48\u0e32\u0e07\u0e1b\u0e23\u0e30\u0e40\u0e17\u0e28 \u0e2a\u0e16\u0e32\u0e19\u0e01\u0e32\u0e23\u0e13\u0e4c\u0e20\u0e31\u0e22\u0e04\u0e38\u0e01\u0e04\u0e32\u0e21\u0e44\u0e0b\u0e40\u0e1a\u0e2d\u0e23\u0e4c\u0e43\u0e19\u0e1b\u0e23\u0e30\u0e40\u0e17\u0e28\u0e44\u0e17\u0e22\u00a0 \u0e04\u0e27\u0e32\u0e21\u0e08\u0e33\u0e40\u0e1b\u0e47\u0e19\u0e43\u0e19\u0e01\u0e32\u0e23\u0e1b\u0e23\u0e30\u0e40\u0e21\u0e34\u0e19\u0e27\u0e34\u0e18\u0e35\u0e01\u0e32\u0e23\u0e1b\u0e23\u0e30\u0e40\u0e21\u0e34\u0e19\u0e1c\u0e25\u0e01\u0e23\u0e30\u0e17\u0e1a Minimize Risk \u0e40\u0e1e\u0e37\u0e48\u0e2d take action\u00a0 \u0e01\u0e32\u0e23\u0e08\u0e31\u0e14\u0e01\u0e25\u0e38\u0e48\u0e21\u0e42\u0e04\u0e23\u0e07\u0e2a\u0e23\u0e49\u0e32\u0e07\u0e1e\u0e37\u0e49\u0e19\u0e17\u0e35\u0e48\u0e2a\u0e33\u0e04\u0e31\u0e0d\u0e17\u0e32\u0e07\u0e2a\u0e32\u0e23\u0e2a\u0e19\u0e40\u0e17\u0e28\u0e02\u0e2d\u0e07\u0e1b\u0e23\u0e30\u0e40\u0e17\u0e28\u0e44\u0e17\u0e22 \u0e21\u0e32\u0e15\u0e23\u0e10\u0e32\u0e19\u0e41\u0e25\u0e30\u0e21\u0e32\u0e15\u0e23\u0e01\u0e32\u0e23\u0e17\u0e35\u0e48\u0e1e\u0e36\u0e07\u0e19\u0e33\u0e44\u0e1b\u0e43\u0e0a\u0e49\u0e40\u0e1b\u0e47\u0e19\u0e01\u0e23\u0e2d\u0e1a\u0e43\u0e19\u0e01\u0e32\u0e23\u0e17\u0e33\u0e07\u0e32\u0e19\u0e40\u0e1e\u0e37\u0e48\u0e2d\u0e25\u0e14\u0e04\u0e27\u0e32\u0e21\u0e40\u0e2a\u0e35\u0e48\u0e22\u0e07 \u0e02\u0e2d\u0e1a\u0e04\u0e38\u0e13\u0e02\u0e49\u0e2d\u0e21\u0e39\u0e25\u0e08\u0e32\u0e01\u0e17\u0e32\u0e07 ETDA [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3442,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0},"categories":[638,132,205,6,113],"tags":[643,642,644,645,646,641,649,640,639,647,648],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v18.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Critical Infrastructures (CI) \u0e41\u0e25\u0e30 Critical Information Infrastructures (CII) \u0e04\u0e37\u0e2d\u0e2d\u0e30\u0e44\u0e23 \u0e2a\u0e33\u0e04\u0e31\u0e0d\u0e2d\u0e22\u0e48\u0e32\u0e07\u0e44\u0e23 \u0e21\u0e35\u0e1c\u0e25\u0e2d\u0e30\u0e44\u0e23\u0e01\u0e31\u0e1a\u0e40\u0e23\u0e32 - Packetlove.com: IT Service and Consulting | \u0e1a\u0e23\u0e34\u0e29\u0e31\u0e17\u0e41\u0e1e\u0e47\u0e04\u0e40\u0e01\u0e15\u0e40\u0e25\u0e34\u0e1f \u0e44\u0e2d\u0e17\u0e35 \u0e40\u0e0b\u0e2d\u0e23\u0e4c\u0e27\u0e34\u0e2a \u0e41\u0e2d\u0e19\u0e14\u0e4c \u0e04\u0e2d\u0e19\u0e0b\u0e31\u0e25\u0e15\u0e34\u0e49\u0e07 what-is-critical-infrastructures-ci-and-cii<\/title>\n<meta name=\"description\" content=\"what-is-critical-infrastructures-ci-and-cii\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.packetlove.com\/th\/ja\/2019\/09\/16\/what-is-critical-infrastructures-ci-and-cii\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Critical Infrastructures (CI) \u0e41\u0e25\u0e30 Critical Information Infrastructures (CII) \u0e04\u0e37\u0e2d\u0e2d\u0e30\u0e44\u0e23 \u0e2a\u0e33\u0e04\u0e31\u0e0d\u0e2d\u0e22\u0e48\u0e32\u0e07\u0e44\u0e23 \u0e21\u0e35\u0e1c\u0e25\u0e2d\u0e30\u0e44\u0e23\u0e01\u0e31\u0e1a\u0e40\u0e23\u0e32 - Packetlove.com: IT Service and Consulting | \u0e1a\u0e23\u0e34\u0e29\u0e31\u0e17\u0e41\u0e1e\u0e47\u0e04\u0e40\u0e01\u0e15\u0e40\u0e25\u0e34\u0e1f \u0e44\u0e2d\u0e17\u0e35 \u0e40\u0e0b\u0e2d\u0e23\u0e4c\u0e27\u0e34\u0e2a \u0e41\u0e2d\u0e19\u0e14\u0e4c \u0e04\u0e2d\u0e19\u0e0b\u0e31\u0e25\u0e15\u0e34\u0e49\u0e07 what-is-critical-infrastructures-ci-and-cii\" \/>\n<meta property=\"og:description\" content=\"what-is-critical-infrastructures-ci-and-cii\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.packetlove.com\/th\/ja\/2019\/09\/16\/what-is-critical-infrastructures-ci-and-cii\/\" \/>\n<meta property=\"og:site_name\" content=\"Packetlove.com: IT Service and Consulting | \u0e1a\u0e23\u0e34\u0e29\u0e31\u0e17\u0e41\u0e1e\u0e47\u0e04\u0e40\u0e01\u0e15\u0e40\u0e25\u0e34\u0e1f \u0e44\u0e2d\u0e17\u0e35 \u0e40\u0e0b\u0e2d\u0e23\u0e4c\u0e27\u0e34\u0e2a \u0e41\u0e2d\u0e19\u0e14\u0e4c \u0e04\u0e2d\u0e19\u0e0b\u0e31\u0e25\u0e15\u0e34\u0e49\u0e07\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-16T10:24:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-10-15T16:15:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.packetlove.com\/th\/wp-content\/uploads\/2019\/09\/cybersec.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"641\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.packetlove.com\/th\/#website\",\"url\":\"https:\/\/www.packetlove.com\/th\/\",\"name\":\"Packetlove.com: IT Service and Consulting | \u0e1a\u0e23\u0e34\u0e29\u0e31\u0e17\u0e41\u0e1e\u0e47\u0e04\u0e40\u0e01\u0e15\u0e40\u0e25\u0e34\u0e1f \u0e44\u0e2d\u0e17\u0e35 \u0e40\u0e0b\u0e2d\u0e23\u0e4c\u0e27\u0e34\u0e2a \u0e41\u0e2d\u0e19\u0e14\u0e4c \u0e04\u0e2d\u0e19\u0e0b\u0e31\u0e25\u0e15\u0e34\u0e49\u0e07\",\"description\":\"Packetlove.com : Stable Web hosting service support FFMPEG and IT Service and Consulting.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.packetlove.com\/th\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.packetlove.com\/th\/ja\/2019\/09\/16\/what-is-critical-infrastructures-ci-and-cii\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.packetlove.com\/th\/wp-content\/uploads\/2019\/09\/cybersec.jpg\",\"contentUrl\":\"https:\/\/www.packetlove.com\/th\/wp-content\/uploads\/2019\/09\/cybersec.jpg\",\"width\":960,\"height\":641},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.packetlove.com\/th\/ja\/2019\/09\/16\/what-is-critical-infrastructures-ci-and-cii\/#webpage\",\"url\":\"https:\/\/www.packetlove.com\/th\/ja\/2019\/09\/16\/what-is-critical-infrastructures-ci-and-cii\/\",\"name\":\"Critical Infrastructures (CI) \u0e41\u0e25\u0e30 Critical Information Infrastructures (CII) \u0e04\u0e37\u0e2d\u0e2d\u0e30\u0e44\u0e23 \u0e2a\u0e33\u0e04\u0e31\u0e0d\u0e2d\u0e22\u0e48\u0e32\u0e07\u0e44\u0e23 \u0e21\u0e35\u0e1c\u0e25\u0e2d\u0e30\u0e44\u0e23\u0e01\u0e31\u0e1a\u0e40\u0e23\u0e32 - Packetlove.com: IT Service and Consulting | \u0e1a\u0e23\u0e34\u0e29\u0e31\u0e17\u0e41\u0e1e\u0e47\u0e04\u0e40\u0e01\u0e15\u0e40\u0e25\u0e34\u0e1f \u0e44\u0e2d\u0e17\u0e35 \u0e40\u0e0b\u0e2d\u0e23\u0e4c\u0e27\u0e34\u0e2a \u0e41\u0e2d\u0e19\u0e14\u0e4c \u0e04\u0e2d\u0e19\u0e0b\u0e31\u0e25\u0e15\u0e34\u0e49\u0e07 what-is-critical-infrastructures-ci-and-cii\",\"isPartOf\":{\"@id\":\"https:\/\/www.packetlove.com\/th\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.packetlove.com\/th\/ja\/2019\/09\/16\/what-is-critical-infrastructures-ci-and-cii\/#primaryimage\"},\"datePublished\":\"2019-09-16T10:24:45+00:00\",\"dateModified\":\"2019-10-15T16:15:54+00:00\",\"author\":{\"@id\":\"https:\/\/www.packetlove.com\/th\/#\/schema\/person\/072d3cf8f43362ff8a9971a0bce62586\"},\"description\":\"what-is-critical-infrastructures-ci-and-cii\",\"breadcrumb\":{\"@id\":\"https:\/\/www.packetlove.com\/th\/ja\/2019\/09\/16\/what-is-critical-infrastructures-ci-and-cii\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.packetlove.com\/th\/ja\/2019\/09\/16\/what-is-critical-infrastructures-ci-and-cii\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.packetlove.com\/th\/ja\/2019\/09\/16\/what-is-critical-infrastructures-ci-and-cii\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.packetlove.com\/th\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Critical Infrastructures (CI) \u0e41\u0e25\u0e30 Critical Information Infrastructures (CII) \u0e04\u0e37\u0e2d\u0e2d\u0e30\u0e44\u0e23 \u0e2a\u0e33\u0e04\u0e31\u0e0d\u0e2d\u0e22\u0e48\u0e32\u0e07\u0e44\u0e23 \u0e21\u0e35\u0e1c\u0e25\u0e2d\u0e30\u0e44\u0e23\u0e01\u0e31\u0e1a\u0e40\u0e23\u0e32\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.packetlove.com\/th\/#\/schema\/person\/072d3cf8f43362ff8a9971a0bce62586\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.packetlove.com\/th\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f2ad715d2de19ea4597e163988d63bd6?s=96&d=monsterid&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f2ad715d2de19ea4597e163988d63bd6?s=96&d=monsterid&r=g\",\"caption\":\"admin\"},\"description\":\"Working IT Solution and consulting , A lot of Travel , Learning mind follow Buddhism and dharma.\",\"sameAs\":[\"http:\/\/www.packetlove.com\"],\"url\":\"https:\/\/www.packetlove.com\/th\/en\/author\/adminpkl\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Critical Infrastructures (CI) \u0e41\u0e25\u0e30 Critical Information Infrastructures (CII) \u0e04\u0e37\u0e2d\u0e2d\u0e30\u0e44\u0e23 \u0e2a\u0e33\u0e04\u0e31\u0e0d\u0e2d\u0e22\u0e48\u0e32\u0e07\u0e44\u0e23 \u0e21\u0e35\u0e1c\u0e25\u0e2d\u0e30\u0e44\u0e23\u0e01\u0e31\u0e1a\u0e40\u0e23\u0e32 - Packetlove.com: IT Service and Consulting | \u0e1a\u0e23\u0e34\u0e29\u0e31\u0e17\u0e41\u0e1e\u0e47\u0e04\u0e40\u0e01\u0e15\u0e40\u0e25\u0e34\u0e1f \u0e44\u0e2d\u0e17\u0e35 \u0e40\u0e0b\u0e2d\u0e23\u0e4c\u0e27\u0e34\u0e2a \u0e41\u0e2d\u0e19\u0e14\u0e4c \u0e04\u0e2d\u0e19\u0e0b\u0e31\u0e25\u0e15\u0e34\u0e49\u0e07 what-is-critical-infrastructures-ci-and-cii","description":"what-is-critical-infrastructures-ci-and-cii","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.packetlove.com\/th\/ja\/2019\/09\/16\/what-is-critical-infrastructures-ci-and-cii\/","og_locale":"en_US","og_type":"article","og_title":"Critical Infrastructures (CI) \u0e41\u0e25\u0e30 Critical Information Infrastructures (CII) \u0e04\u0e37\u0e2d\u0e2d\u0e30\u0e44\u0e23 \u0e2a\u0e33\u0e04\u0e31\u0e0d\u0e2d\u0e22\u0e48\u0e32\u0e07\u0e44\u0e23 \u0e21\u0e35\u0e1c\u0e25\u0e2d\u0e30\u0e44\u0e23\u0e01\u0e31\u0e1a\u0e40\u0e23\u0e32 - Packetlove.com: IT Service and Consulting | \u0e1a\u0e23\u0e34\u0e29\u0e31\u0e17\u0e41\u0e1e\u0e47\u0e04\u0e40\u0e01\u0e15\u0e40\u0e25\u0e34\u0e1f \u0e44\u0e2d\u0e17\u0e35 \u0e40\u0e0b\u0e2d\u0e23\u0e4c\u0e27\u0e34\u0e2a \u0e41\u0e2d\u0e19\u0e14\u0e4c \u0e04\u0e2d\u0e19\u0e0b\u0e31\u0e25\u0e15\u0e34\u0e49\u0e07 what-is-critical-infrastructures-ci-and-cii","og_description":"what-is-critical-infrastructures-ci-and-cii","og_url":"https:\/\/www.packetlove.com\/th\/ja\/2019\/09\/16\/what-is-critical-infrastructures-ci-and-cii\/","og_site_name":"Packetlove.com: IT Service and Consulting | \u0e1a\u0e23\u0e34\u0e29\u0e31\u0e17\u0e41\u0e1e\u0e47\u0e04\u0e40\u0e01\u0e15\u0e40\u0e25\u0e34\u0e1f \u0e44\u0e2d\u0e17\u0e35 \u0e40\u0e0b\u0e2d\u0e23\u0e4c\u0e27\u0e34\u0e2a \u0e41\u0e2d\u0e19\u0e14\u0e4c \u0e04\u0e2d\u0e19\u0e0b\u0e31\u0e25\u0e15\u0e34\u0e49\u0e07","article_published_time":"2019-09-16T10:24:45+00:00","article_modified_time":"2019-10-15T16:15:54+00:00","og_image":[{"width":960,"height":641,"url":"https:\/\/www.packetlove.com\/th\/wp-content\/uploads\/2019\/09\/cybersec.jpg","type":"image\/jpeg"}],"twitter_card":"summary","twitter_misc":{"Written by":"admin"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.packetlove.com\/th\/#website","url":"https:\/\/www.packetlove.com\/th\/","name":"Packetlove.com: IT Service and Consulting | \u0e1a\u0e23\u0e34\u0e29\u0e31\u0e17\u0e41\u0e1e\u0e47\u0e04\u0e40\u0e01\u0e15\u0e40\u0e25\u0e34\u0e1f \u0e44\u0e2d\u0e17\u0e35 \u0e40\u0e0b\u0e2d\u0e23\u0e4c\u0e27\u0e34\u0e2a \u0e41\u0e2d\u0e19\u0e14\u0e4c \u0e04\u0e2d\u0e19\u0e0b\u0e31\u0e25\u0e15\u0e34\u0e49\u0e07","description":"Packetlove.com : Stable Web hosting service support FFMPEG and IT Service and Consulting.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.packetlove.com\/th\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.packetlove.com\/th\/ja\/2019\/09\/16\/what-is-critical-infrastructures-ci-and-cii\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.packetlove.com\/th\/wp-content\/uploads\/2019\/09\/cybersec.jpg","contentUrl":"https:\/\/www.packetlove.com\/th\/wp-content\/uploads\/2019\/09\/cybersec.jpg","width":960,"height":641},{"@type":"WebPage","@id":"https:\/\/www.packetlove.com\/th\/ja\/2019\/09\/16\/what-is-critical-infrastructures-ci-and-cii\/#webpage","url":"https:\/\/www.packetlove.com\/th\/ja\/2019\/09\/16\/what-is-critical-infrastructures-ci-and-cii\/","name":"Critical Infrastructures (CI) \u0e41\u0e25\u0e30 Critical Information Infrastructures (CII) \u0e04\u0e37\u0e2d\u0e2d\u0e30\u0e44\u0e23 \u0e2a\u0e33\u0e04\u0e31\u0e0d\u0e2d\u0e22\u0e48\u0e32\u0e07\u0e44\u0e23 \u0e21\u0e35\u0e1c\u0e25\u0e2d\u0e30\u0e44\u0e23\u0e01\u0e31\u0e1a\u0e40\u0e23\u0e32 - Packetlove.com: IT Service and Consulting | \u0e1a\u0e23\u0e34\u0e29\u0e31\u0e17\u0e41\u0e1e\u0e47\u0e04\u0e40\u0e01\u0e15\u0e40\u0e25\u0e34\u0e1f \u0e44\u0e2d\u0e17\u0e35 \u0e40\u0e0b\u0e2d\u0e23\u0e4c\u0e27\u0e34\u0e2a \u0e41\u0e2d\u0e19\u0e14\u0e4c \u0e04\u0e2d\u0e19\u0e0b\u0e31\u0e25\u0e15\u0e34\u0e49\u0e07 what-is-critical-infrastructures-ci-and-cii","isPartOf":{"@id":"https:\/\/www.packetlove.com\/th\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.packetlove.com\/th\/ja\/2019\/09\/16\/what-is-critical-infrastructures-ci-and-cii\/#primaryimage"},"datePublished":"2019-09-16T10:24:45+00:00","dateModified":"2019-10-15T16:15:54+00:00","author":{"@id":"https:\/\/www.packetlove.com\/th\/#\/schema\/person\/072d3cf8f43362ff8a9971a0bce62586"},"description":"what-is-critical-infrastructures-ci-and-cii","breadcrumb":{"@id":"https:\/\/www.packetlove.com\/th\/ja\/2019\/09\/16\/what-is-critical-infrastructures-ci-and-cii\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.packetlove.com\/th\/ja\/2019\/09\/16\/what-is-critical-infrastructures-ci-and-cii\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.packetlove.com\/th\/ja\/2019\/09\/16\/what-is-critical-infrastructures-ci-and-cii\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.packetlove.com\/th\/"},{"@type":"ListItem","position":2,"name":"Critical Infrastructures (CI) \u0e41\u0e25\u0e30 Critical Information Infrastructures (CII) \u0e04\u0e37\u0e2d\u0e2d\u0e30\u0e44\u0e23 \u0e2a\u0e33\u0e04\u0e31\u0e0d\u0e2d\u0e22\u0e48\u0e32\u0e07\u0e44\u0e23 \u0e21\u0e35\u0e1c\u0e25\u0e2d\u0e30\u0e44\u0e23\u0e01\u0e31\u0e1a\u0e40\u0e23\u0e32"}]},{"@type":"Person","@id":"https:\/\/www.packetlove.com\/th\/#\/schema\/person\/072d3cf8f43362ff8a9971a0bce62586","name":"admin","image":{"@type":"ImageObject","@id":"https:\/\/www.packetlove.com\/th\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f2ad715d2de19ea4597e163988d63bd6?s=96&d=monsterid&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f2ad715d2de19ea4597e163988d63bd6?s=96&d=monsterid&r=g","caption":"admin"},"description":"Working IT Solution and consulting , A lot of Travel , Learning mind follow Buddhism and dharma.","sameAs":["http:\/\/www.packetlove.com"],"url":"https:\/\/www.packetlove.com\/th\/en\/author\/adminpkl\/"}]}},"_links":{"self":[{"href":"https:\/\/www.packetlove.com\/th\/en\/wp-json\/wp\/v2\/posts\/3436"}],"collection":[{"href":"https:\/\/www.packetlove.com\/th\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.packetlove.com\/th\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.packetlove.com\/th\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.packetlove.com\/th\/en\/wp-json\/wp\/v2\/comments?post=3436"}],"version-history":[{"count":2,"href":"https:\/\/www.packetlove.com\/th\/en\/wp-json\/wp\/v2\/posts\/3436\/revisions"}],"predecessor-version":[{"id":3444,"href":"https:\/\/www.packetlove.com\/th\/en\/wp-json\/wp\/v2\/posts\/3436\/revisions\/3444"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.packetlove.com\/th\/en\/wp-json\/wp\/v2\/media\/3442"}],"wp:attachment":[{"href":"https:\/\/www.packetlove.com\/th\/en\/wp-json\/wp\/v2\/media?parent=3436"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.packetlove.com\/th\/en\/wp-json\/wp\/v2\/categories?post=3436"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.packetlove.com\/th\/en\/wp-json\/wp\/v2\/tags?post=3436"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}