{"id":1188,"date":"2022-09-07T10:00:00","date_gmt":"2022-09-07T15:00:00","guid":{"rendered":"https:\/\/blogs.uninter.edu.mx\/DTIP\/?p=1188"},"modified":"2022-08-15T17:59:21","modified_gmt":"2022-08-15T22:59:21","slug":"seguridad-en-la-nube-mitos-y-realidades","status":"publish","type":"post","link":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2022\/09\/07\/seguridad-en-la-nube-mitos-y-realidades\/","title":{"rendered":"Seguridad en la nube, mitos y realidades"},"content":{"rendered":"\n<p class=\"has-text-align-justify\">Las&nbsp;<strong>tecnolog\u00edas en la nube ofrecen<\/strong>&nbsp;a las organizaciones en cada sector&nbsp;<strong>ventajas<\/strong>&nbsp;en cuanto a costo y eficiencia, pero a\u00fan persisten varios mitos acerca de la seguridad de los datos. La necesidad de reducir costes y&nbsp;<strong>aprovechar las nuevas caracter\u00edsticas y capacidades<\/strong>&nbsp;son fuertes impulsores para la migraci\u00f3n de soluciones locales a la nube.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2022\/08\/image-43.png\" alt=\"seguridad\" class=\"wp-image-1190\" width=\"366\" height=\"252\"\/><\/figure><\/div>\n\n\n<h2 class=\"wp-block-heading\">Mito 1: La nube no es segura<\/h2>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\" style=\"grid-template-columns:39% auto\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"853\" src=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2022\/08\/image-45.png\" alt=\"seguridad\" class=\"wp-image-1192 size-full\"\/><\/figure><div class=\"wp-block-media-text__content\">\n<p class=\"has-text-align-justify\">Cuando se utiliza de manera adecuada,&nbsp;<strong>la nube es tan segura como un centro de datos<\/strong>&nbsp;t\u00edpico.<br>La nube en s\u00ed no es intr\u00ednsecamente insegura. Cuando se descubren evidencias de seguridad, en la mayor\u00eda de los casos, son debidas a una configuraci\u00f3n de nube incorrecta o c\u00f3digo de cliente vulnerable, pero no a fallos de seguridad en la propia nube, en el software o la infraestructura del proveedor.<\/p>\n<\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Mito 2: Mi organizaci\u00f3n no usa la nube<\/h2>\n\n\n\n<div class=\"wp-block-media-text alignwide has-media-on-the-right is-stacked-on-mobile\" style=\"grid-template-columns:auto 44%\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"768\" src=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2022\/08\/image-50.png\" alt=\"seguridad\" class=\"wp-image-1197 size-full\"\/><\/figure><div class=\"wp-block-media-text__content\">\n<p class=\"has-text-align-justify\">El t\u00e9rmino &#8220;cloud&#8221; incluye la categor\u00eda de software como servicio (SaaS) y&nbsp;<strong>pr\u00e1cticamente todas las organizaciones utilizan alg\u00fan tipo de servicio web<\/strong>, ya sea en el sector de recursos humanos, banca, eCommerce, marketing, alojamiento web o cualquiera de las dem\u00e1s actividades que se realizan en los negocios actuales. Incluso si la pol\u00edtica organizativa no permite expl\u00edcitamente servicios on cloud o no hay evidencia manifiesta de uso de estos servicios, su negocio a\u00fan puede depender de la nube.<\/p>\n<\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Mito 3: El proveedor de la nube me mantendr\u00e1 seguro<\/h2>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\" style=\"grid-template-columns:30% auto\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1920\" src=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2022\/08\/image-52.png\" alt=\"seguridad\" class=\"wp-image-1199 size-full\"\/><\/figure><div class=\"wp-block-media-text__content\">\n<p class=\"has-text-align-justify\">Bajo el modelo de responsabilidad compartida,&nbsp;<strong>el usuario de la nube es el responsable final de proteger sus datos<\/strong>. El proveedor de la nube constata que las instalaciones del centro de datos son seguras, pero su organizaci\u00f3n tiene la responsabilidad de salvaguardar sus datos espec\u00edficos.<\/p>\n\n\n\n<p class=\"has-text-align-justify\"><br>Modelo de responsabilidad compartida:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Cliente<\/strong>: es el responsable de la seguridad de los datos &#8220;EN&#8221; la nube.<\/li><li><strong>Proveedor<\/strong>: es el responsable de la seguridad &#8220;DE&#8221; la nube.<\/li><\/ul>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-media-text alignwide has-media-on-the-right is-stacked-on-mobile\" style=\"grid-template-columns:auto 31%\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"620\" height=\"620\" src=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2022\/08\/image-55.png\" alt=\"seguridad\" class=\"wp-image-1202 size-full\"\/><\/figure><div class=\"wp-block-media-text__content\">\n<p class=\"has-text-align-justify\"><strong>La nube no es una \u00fanica computadora<\/strong>. En la nube, es posible que una solicitud inform\u00e1tica se distribuya a cientos o miles de computadoras. Hay servicios de almacenamiento on cloud, contenedores y otros servicios no tradicionales a considerar adem\u00e1s de las m\u00e1quinas virtuales.<\/p>\n<\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Mito 5: Los adversarios avanzados no atacan la nube<\/h2>\n\n\n\n<p class=\"has-text-align-justify\">Los atacantes persiguen los datos.&nbsp;<strong>A medida que los datos ingresan a la nube, tambi\u00e9n lo har\u00e1n los atacantes<\/strong>.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2022\/08\/image-57.png\" alt=\"seguridad\" class=\"wp-image-1205\" width=\"267\" height=\"267\"\/><\/figure><\/div>\n\n\n<p class=\"has-text-align-justify\">La mitigaci\u00f3n de amenazas en la nube requiere dos aspectos fundamentales:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Telemetr\u00eda de datos<\/strong>&nbsp;sobre los que aplicar operaciones de seguridad.<\/li><li><strong>Modelos de amenazas<\/strong>&nbsp;que determinen qu\u00e9 herramientas, t\u00e1cticas y procedimientos de los adversarios deben ser abordados y mitigados.<\/li><\/ul>\n\n\n\n<p class=\"has-text-align-justify\">Y a su vez se pueden dividir en cuatro categor\u00edas de capacidades:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Inteligencia<\/strong>: aplicaci\u00f3n de indicadores de inteligencia de amenazas.<\/li><li><strong>Reglas<\/strong>: aplicaci\u00f3n de patrones de amenaza conocidos.<\/li><li><strong>Anal\u00edtica<\/strong>: organizaci\u00f3n de la telemetr\u00eda para mostrar anomal\u00edas.<\/li><li><strong>Hunting<\/strong>: b\u00fasquedas basadas en hip\u00f3tesis.<\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft size-full is-resized\"><a href=\"https:\/\/uninter.edu.mx\/\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2022\/04\/logouninter-1.png\" alt=\"\" class=\"wp-image-744\" width=\"122\" height=\"131\"\/><\/a><figcaption>    <strong>UNINTER<\/strong><\/figcaption><\/figure><\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-full is-resized\"><a href=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2022\/04\/LogoDTIP-2.png\" alt=\"\" class=\"wp-image-743\" width=\"127\" height=\"128\"\/><\/a><figcaption>        <mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-black-color\"><strong>DTIP<\/strong><\/mark><\/figcaption><\/figure><\/div>","protected":false},"excerpt":{"rendered":"<p>Las&nbsp;tecnolog\u00edas en la nube ofrecen&nbsp;a las organizaciones en cada sector&nbsp;ventajas&nbsp;en cuanto a costo y eficiencia, pero a\u00fan persisten varios mitos acerca de la seguridad de los datos. La necesidad de reducir costes y&nbsp;aprovechar las nuevas caracter\u00edsticas y capacidades&nbsp;son fuertes impulsores para la migraci\u00f3n de soluciones locales a la nube. Mito 1: La nube no es&hellip;<\/p>\n","protected":false},"author":2,"featured_media":1226,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[126,1],"tags":[32,76,36],"class_list":["post-1188","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-programacion","category-sin-categoria","tag-ciberseguridad","tag-programacion","tag-seguridad"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>Seguridad en la nube, mitos y realidades - DTIP<\/title>\r\n<meta name=\"description\" content=\"Las\u00a0tecnolog\u00edas de seguridad en la nube ofrecen\u00a0a las organizaciones en cada sector\u00a0ventajas\u00a0en cuanto a costo y eficiencia, pero a\u00fan...\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2022\/09\/07\/seguridad-en-la-nube-mitos-y-realidades\/\" \/>\r\n<meta property=\"og:locale\" content=\"es_MX\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Seguridad en la nube, mitos y realidades - DTIP\" \/>\r\n<meta property=\"og:description\" content=\"Las\u00a0tecnolog\u00edas de seguridad en la nube ofrecen\u00a0a las organizaciones en cada sector\u00a0ventajas\u00a0en cuanto a costo y eficiencia, pero a\u00fan...\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2022\/09\/07\/seguridad-en-la-nube-mitos-y-realidades\/\" \/>\r\n<meta property=\"og:site_name\" content=\"DTIP\" \/>\r\n<meta property=\"article:published_time\" content=\"2022-09-07T15:00:00+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2022\/08\/PAleNubeF.jpg\" \/>\r\n\t<meta property=\"og:image:width\" content=\"1201\" \/>\r\n\t<meta property=\"og:image:height\" content=\"620\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\r\n<meta name=\"author\" content=\"Alejandro Navarro\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alejandro Navarro\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2022\/09\/07\/seguridad-en-la-nube-mitos-y-realidades\/\",\"url\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2022\/09\/07\/seguridad-en-la-nube-mitos-y-realidades\/\",\"name\":\"Seguridad en la nube, mitos y realidades - DTIP\",\"isPartOf\":{\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2022\/09\/07\/seguridad-en-la-nube-mitos-y-realidades\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2022\/09\/07\/seguridad-en-la-nube-mitos-y-realidades\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2022\/08\/PAleNube.jpg\",\"datePublished\":\"2022-09-07T15:00:00+00:00\",\"author\":{\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/#\/schema\/person\/4fb1c915f41fffa4fde5651cfab88e3a\"},\"description\":\"Las\u00a0tecnolog\u00edas de seguridad en la nube ofrecen\u00a0a las organizaciones en cada sector\u00a0ventajas\u00a0en cuanto a costo y eficiencia, pero a\u00fan...\",\"breadcrumb\":{\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2022\/09\/07\/seguridad-en-la-nube-mitos-y-realidades\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2022\/09\/07\/seguridad-en-la-nube-mitos-y-realidades\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2022\/09\/07\/seguridad-en-la-nube-mitos-y-realidades\/#primaryimage\",\"url\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2022\/08\/PAleNube.jpg\",\"contentUrl\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2022\/08\/PAleNube.jpg\",\"width\":460,\"height\":260},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2022\/09\/07\/seguridad-en-la-nube-mitos-y-realidades\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Seguridad en la nube, mitos y realidades\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/#website\",\"url\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/\",\"name\":\"DTIP\",\"description\":\"Direcci\u00f3n de Tecnolog\u00edas y Publicidad\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/#\/schema\/person\/4fb1c915f41fffa4fde5651cfab88e3a\",\"name\":\"Alejandro Navarro\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/bf2c65c0900ca2ec69daf572d5da8dc41dece9a6a90e483f9b8464cb37c15c6c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/bf2c65c0900ca2ec69daf572d5da8dc41dece9a6a90e483f9b8464cb37c15c6c?s=96&d=mm&r=g\",\"caption\":\"Alejandro Navarro\"},\"url\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/author\/anavarro\/\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Seguridad en la nube, mitos y realidades - DTIP","description":"Las\u00a0tecnolog\u00edas de seguridad en la nube ofrecen\u00a0a las organizaciones en cada sector\u00a0ventajas\u00a0en cuanto a costo y eficiencia, pero a\u00fan...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2022\/09\/07\/seguridad-en-la-nube-mitos-y-realidades\/","og_locale":"es_MX","og_type":"article","og_title":"Seguridad en la nube, mitos y realidades - DTIP","og_description":"Las\u00a0tecnolog\u00edas de seguridad en la nube ofrecen\u00a0a las organizaciones en cada sector\u00a0ventajas\u00a0en cuanto a costo y eficiencia, pero a\u00fan...","og_url":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2022\/09\/07\/seguridad-en-la-nube-mitos-y-realidades\/","og_site_name":"DTIP","article_published_time":"2022-09-07T15:00:00+00:00","og_image":[{"width":1201,"height":620,"url":"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2022\/08\/PAleNubeF.jpg","type":"image\/jpeg"}],"author":"Alejandro Navarro","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Alejandro Navarro","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2022\/09\/07\/seguridad-en-la-nube-mitos-y-realidades\/","url":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2022\/09\/07\/seguridad-en-la-nube-mitos-y-realidades\/","name":"Seguridad en la nube, mitos y realidades - DTIP","isPartOf":{"@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2022\/09\/07\/seguridad-en-la-nube-mitos-y-realidades\/#primaryimage"},"image":{"@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2022\/09\/07\/seguridad-en-la-nube-mitos-y-realidades\/#primaryimage"},"thumbnailUrl":"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2022\/08\/PAleNube.jpg","datePublished":"2022-09-07T15:00:00+00:00","author":{"@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/#\/schema\/person\/4fb1c915f41fffa4fde5651cfab88e3a"},"description":"Las\u00a0tecnolog\u00edas de seguridad en la nube ofrecen\u00a0a las organizaciones en cada sector\u00a0ventajas\u00a0en cuanto a costo y eficiencia, pero a\u00fan...","breadcrumb":{"@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2022\/09\/07\/seguridad-en-la-nube-mitos-y-realidades\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2022\/09\/07\/seguridad-en-la-nube-mitos-y-realidades\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2022\/09\/07\/seguridad-en-la-nube-mitos-y-realidades\/#primaryimage","url":"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2022\/08\/PAleNube.jpg","contentUrl":"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2022\/08\/PAleNube.jpg","width":460,"height":260},{"@type":"BreadcrumbList","@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2022\/09\/07\/seguridad-en-la-nube-mitos-y-realidades\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/blogs.uninter.edu.mx\/DTIP\/"},{"@type":"ListItem","position":2,"name":"Seguridad en la nube, mitos y realidades"}]},{"@type":"WebSite","@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/#website","url":"https:\/\/blogs.uninter.edu.mx\/DTIP\/","name":"DTIP","description":"Direcci\u00f3n de Tecnolog\u00edas y Publicidad","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blogs.uninter.edu.mx\/DTIP\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Person","@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/#\/schema\/person\/4fb1c915f41fffa4fde5651cfab88e3a","name":"Alejandro Navarro","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/bf2c65c0900ca2ec69daf572d5da8dc41dece9a6a90e483f9b8464cb37c15c6c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bf2c65c0900ca2ec69daf572d5da8dc41dece9a6a90e483f9b8464cb37c15c6c?s=96&d=mm&r=g","caption":"Alejandro Navarro"},"url":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/author\/anavarro\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2022\/08\/PAleNube.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/posts\/1188","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/comments?post=1188"}],"version-history":[{"count":3,"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/posts\/1188\/revisions"}],"predecessor-version":[{"id":1207,"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/posts\/1188\/revisions\/1207"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/media\/1226"}],"wp:attachment":[{"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/media?parent=1188"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/categories?post=1188"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/tags?post=1188"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}