{"id":14029,"date":"2025-04-21T16:22:57","date_gmt":"2025-04-21T14:22:57","guid":{"rendered":"https:\/\/oti.unp.edu.pe\/?p=14029"},"modified":"2025-04-21T16:26:34","modified_gmt":"2025-04-21T14:26:34","slug":"ciber-ataques-evolucionan-con-tecnologia","status":"publish","type":"post","link":"https:\/\/oti.unp.edu.pe\/?p=14029","title":{"rendered":"Ciber ataques evolucionan con tecnolog\u00eda"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"14029\" class=\"elementor elementor-14029\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-83dff2b e-con-full e-flex e-con e-parent\" data-id=\"83dff2b\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;}\" data-core-v316-plus=\"true\">\n\t\t\t\t<div class=\"elementor-element elementor-element-710c83b elementor-widget elementor-widget-text-editor\" data-id=\"710c83b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.16.0 - 17-10-2023 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p><em><strong>Referencia: <a href=\"https:\/\/elperuano.pe\/noticia\/268788-ciber-ataques-evolucionan-con-tecnologia\" target=\"_blank\" rel=\"noopener\">El peruano<\/a><\/strong><\/em><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d68bf5a elementor-widget elementor-widget-text-editor\" data-id=\"d68bf5a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"itemIntroText\"><p>De acuerdo con un reciente estudio de Radware, los ciberataques a sectores p\u00fablicos y privados se perfeccionan con IA.<\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7345950 elementor-widget elementor-widget-image\" data-id=\"7345950\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.16.0 - 17-10-2023 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" width=\"600\" height=\"400\" src=\"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/04\/000335520M.jpg\" class=\"attachment-large size-large wp-image-14031\" alt=\"\" srcset=\"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/04\/000335520M.jpg 600w, https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/04\/000335520M-300x200.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e469050 elementor-widget elementor-widget-text-editor\" data-id=\"e469050\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"itemIntroText\"><p>Seg\u00fan el informe 2025 Global Threat Analysis Report de Radware, el n\u00famero de ciberataques ha aumentado significativamente, as\u00ed como tambi\u00e9n su sofisticaci\u00f3n, debido al uso de inteligencia artificial. Ahora, las redes organizadas emplean algoritmos avanzados para identificar y explotar vulnerabilidades con alta precisi\u00f3n.<\/p><p>El estudio revela que los ataques DDoS (Denegaci\u00f3n de Servicio Distribuido) se incrementaron en un 550% en 2024 respecto al a\u00f1o anterior, ocasionando p\u00e9rdidas a las empresas entre 500,000 y 2 millones de d\u00f3lares. Adem\u00e1s, entre los sectores m\u00e1s afectados por estos ataques est\u00e1n el de las telecomunicaciones, que enfrent\u00f3 el 43% del volumen global de DDoS en la red. Lo sigue el sector financiero, con el 30%, mientras que el sector tecnol\u00f3gico absorbi\u00f3 el 11% de este tipo de ataques a nivel mundial. El comercio electr\u00f3nico, transportes y los servicios gubernamentales tambi\u00e9n observaron aumentos notables.<\/p><p>\u201cLos sectores de alto valor, como la banca, el gobierno, la salud, el transporte y otras infraestructuras cr\u00edticas, atraen a actores maliciosos debido a la informaci\u00f3n sensible y lucrativa que almacenan, el impacto medi\u00e1tico y operativo que generan las brechas de seguridad, y la ventaja t\u00e1ctica que pueden ofrecer en conflictos h\u00edbridos\u201d, afirm\u00f3 Pascal Geenens, director de Inteligencia de Amenazas de Radware, en una entrevista para el diario El Peruano.<\/p><p>Tendencias<\/p><p>Otros delitos que han ido evolucionando son el phishing y el deepfake. El primero de ellos son estafas por correo electr\u00f3nico para que el usuario entregue informaci\u00f3n personal. Con la ayuda de agentes de IA, los atacantes pueden automatizar por completo las campa\u00f1as de phishing, desde la recopilaci\u00f3n de inteligencia de fuentes abiertas hasta la creaci\u00f3n de correos electr\u00f3nicos persuasivos y su entrega directa a las v\u00edctimas.<\/p><p>Adem\u00e1s, los ciberdelincuentes que operan bots de OTP (contrase\u00f1as de un solo uso) est\u00e1n utilizando IA generativa para optimizar y ampliar sus ataques. Estos bots enga\u00f1an a las v\u00edctimas para que revelen c\u00f3digos de autenticaci\u00f3n de un solo uso mediante la generaci\u00f3n de mensajes de vishing (phishing por voz) realistas e iniciando llamadas telef\u00f3nicas despu\u00e9s de obtener credenciales de inicio de sesi\u00f3n robadas.<\/p><p>En el caso de los deepfake, los cibercriminales utilizan IA para generar videos altamente persuasivos. Este nivel de realismo dificulta gravemente la capacidad de una organizaci\u00f3n para distinguir las comunicaciones aut\u00e9nticas de las fraudulentas. Como advirti\u00f3 el Foro Econ\u00f3mico Mundial, la prevalencia de la ingenier\u00eda social impulsada por IA exige una capacitaci\u00f3n robusta en concienciaci\u00f3n y defensas en m\u00faltiples capas.<\/p><p>El especialista advierte de un crecimiento alarmante de vulneraci\u00f3n en APIs(Interfaz de Programaci\u00f3n de Aplicaciones), sistemas que permiten la comunicaci\u00f3n entre diferentes aplicaciones. Las denominadas \u201cAPIs Zombie\u201d o \u201cAPIs Shadow\u201d son el resultado de una mala documentaci\u00f3n o falta de actualizaci\u00f3n y que siguen funcionando sin que la persona se d\u00e9 cuenta. Esto crea puntos ciegos que los ciberdelincuentes aprovechan para obtener acceso a informaci\u00f3n sensible sin ser detectados durante largos per\u00edodos.<\/p><p>Datos<\/p><p>Actividad con bots maliciosos en transacciones aument\u00f3 35%en 2024.<\/p><p>El a\u00f1o pasado, el aumento de ataques a aplicaciones web yAPI continu\u00f3, aumentando un 41%.<\/p><p>Herramientas como WormGPT y FraudGPT pueden ser utilizadaspara mejorar malware o automatizar campa\u00f1as de phishing.<\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Referencia: El peruano De acuerdo con un reciente estudio de<\/p>\n","protected":false},"author":1,"featured_media":14031,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[47,58],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ciber ataques evolucionan con tecnolog\u00eda - Oficina de Tecnolog\u00eda de Informaci\u00f3n<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/oti.unp.edu.pe\/?p=14029\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ciber ataques evolucionan con tecnolog\u00eda - Oficina de Tecnolog\u00eda de Informaci\u00f3n\" \/>\n<meta property=\"og:description\" content=\"Referencia: El peruano De acuerdo con un reciente estudio de\" \/>\n<meta property=\"og:url\" content=\"https:\/\/oti.unp.edu.pe\/?p=14029\" \/>\n<meta property=\"og:site_name\" content=\"Oficina de Tecnolog\u00eda de Informaci\u00f3n\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-21T14:22:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-21T14:26:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/04\/000335520M.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"desarrollo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"desarrollo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/oti.unp.edu.pe\/?p=14029#article\",\"isPartOf\":{\"@id\":\"https:\/\/oti.unp.edu.pe\/?p=14029\"},\"author\":{\"name\":\"desarrollo\",\"@id\":\"https:\/\/oti.unp.edu.pe\/#\/schema\/person\/cd1a72f9fc6e687ed893287bdf45a99c\"},\"headline\":\"Ciber ataques evolucionan con tecnolog\u00eda\",\"datePublished\":\"2025-04-21T14:22:57+00:00\",\"dateModified\":\"2025-04-21T14:26:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/oti.unp.edu.pe\/?p=14029\"},\"wordCount\":586,\"publisher\":{\"@id\":\"https:\/\/oti.unp.edu.pe\/#organization\"},\"image\":{\"@id\":\"https:\/\/oti.unp.edu.pe\/?p=14029#primaryimage\"},\"thumbnailUrl\":\"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/04\/000335520M.jpg\",\"articleSection\":[\"Inteligencia Artificial\",\"Seguridad Inform\u00e1tica\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/oti.unp.edu.pe\/?p=14029\",\"url\":\"https:\/\/oti.unp.edu.pe\/?p=14029\",\"name\":\"Ciber ataques evolucionan con tecnolog\u00eda - Oficina de Tecnolog\u00eda de Informaci\u00f3n\",\"isPartOf\":{\"@id\":\"https:\/\/oti.unp.edu.pe\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/oti.unp.edu.pe\/?p=14029#primaryimage\"},\"image\":{\"@id\":\"https:\/\/oti.unp.edu.pe\/?p=14029#primaryimage\"},\"thumbnailUrl\":\"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/04\/000335520M.jpg\",\"datePublished\":\"2025-04-21T14:22:57+00:00\",\"dateModified\":\"2025-04-21T14:26:34+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/oti.unp.edu.pe\/?p=14029#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/oti.unp.edu.pe\/?p=14029\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/oti.unp.edu.pe\/?p=14029#primaryimage\",\"url\":\"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/04\/000335520M.jpg\",\"contentUrl\":\"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/04\/000335520M.jpg\",\"width\":600,\"height\":400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/oti.unp.edu.pe\/?p=14029#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/oti.unp.edu.pe\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ciber ataques evolucionan con tecnolog\u00eda\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/oti.unp.edu.pe\/#website\",\"url\":\"https:\/\/oti.unp.edu.pe\/\",\"name\":\"Oficina de Tecnolog\u00eda de Informaci\u00f3n\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/oti.unp.edu.pe\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/oti.unp.edu.pe\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/oti.unp.edu.pe\/#organization\",\"name\":\"Oficina de Tecnolog\u00eda de Informaci\u00f3n\",\"url\":\"https:\/\/oti.unp.edu.pe\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/oti.unp.edu.pe\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/Google_org-Accelerator_-Generative-AI-abre-convocatoria-global-para-proyectos-de-IA-generativa-Exitosa-Noticias.jpg\",\"contentUrl\":\"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/Google_org-Accelerator_-Generative-AI-abre-convocatoria-global-para-proyectos-de-IA-generativa-Exitosa-Noticias.jpg\",\"width\":736,\"height\":385,\"caption\":\"Oficina de Tecnolog\u00eda de Informaci\u00f3n\"},\"image\":{\"@id\":\"https:\/\/oti.unp.edu.pe\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/oti.unp.edu.pe\/#\/schema\/person\/cd1a72f9fc6e687ed893287bdf45a99c\",\"name\":\"desarrollo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/oti.unp.edu.pe\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b427551bf20fc881b31393ff4e3d669c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b427551bf20fc881b31393ff4e3d669c?s=96&d=mm&r=g\",\"caption\":\"desarrollo\"},\"sameAs\":[\"https:\/\/oti.unp.edu.pe\/webotiunp\"],\"url\":\"https:\/\/oti.unp.edu.pe\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ciber ataques evolucionan con tecnolog\u00eda - Oficina de Tecnolog\u00eda de Informaci\u00f3n","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/oti.unp.edu.pe\/?p=14029","og_locale":"es_ES","og_type":"article","og_title":"Ciber ataques evolucionan con tecnolog\u00eda - Oficina de Tecnolog\u00eda de Informaci\u00f3n","og_description":"Referencia: El peruano De acuerdo con un reciente estudio de","og_url":"https:\/\/oti.unp.edu.pe\/?p=14029","og_site_name":"Oficina de Tecnolog\u00eda de Informaci\u00f3n","article_published_time":"2025-04-21T14:22:57+00:00","article_modified_time":"2025-04-21T14:26:34+00:00","og_image":[{"width":600,"height":400,"url":"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/04\/000335520M.jpg","type":"image\/jpeg"}],"author":"desarrollo","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"desarrollo","Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/oti.unp.edu.pe\/?p=14029#article","isPartOf":{"@id":"https:\/\/oti.unp.edu.pe\/?p=14029"},"author":{"name":"desarrollo","@id":"https:\/\/oti.unp.edu.pe\/#\/schema\/person\/cd1a72f9fc6e687ed893287bdf45a99c"},"headline":"Ciber ataques evolucionan con tecnolog\u00eda","datePublished":"2025-04-21T14:22:57+00:00","dateModified":"2025-04-21T14:26:34+00:00","mainEntityOfPage":{"@id":"https:\/\/oti.unp.edu.pe\/?p=14029"},"wordCount":586,"publisher":{"@id":"https:\/\/oti.unp.edu.pe\/#organization"},"image":{"@id":"https:\/\/oti.unp.edu.pe\/?p=14029#primaryimage"},"thumbnailUrl":"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/04\/000335520M.jpg","articleSection":["Inteligencia Artificial","Seguridad Inform\u00e1tica"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/oti.unp.edu.pe\/?p=14029","url":"https:\/\/oti.unp.edu.pe\/?p=14029","name":"Ciber ataques evolucionan con tecnolog\u00eda - Oficina de Tecnolog\u00eda de Informaci\u00f3n","isPartOf":{"@id":"https:\/\/oti.unp.edu.pe\/#website"},"primaryImageOfPage":{"@id":"https:\/\/oti.unp.edu.pe\/?p=14029#primaryimage"},"image":{"@id":"https:\/\/oti.unp.edu.pe\/?p=14029#primaryimage"},"thumbnailUrl":"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/04\/000335520M.jpg","datePublished":"2025-04-21T14:22:57+00:00","dateModified":"2025-04-21T14:26:34+00:00","breadcrumb":{"@id":"https:\/\/oti.unp.edu.pe\/?p=14029#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/oti.unp.edu.pe\/?p=14029"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/oti.unp.edu.pe\/?p=14029#primaryimage","url":"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/04\/000335520M.jpg","contentUrl":"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/04\/000335520M.jpg","width":600,"height":400},{"@type":"BreadcrumbList","@id":"https:\/\/oti.unp.edu.pe\/?p=14029#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/oti.unp.edu.pe\/"},{"@type":"ListItem","position":2,"name":"Ciber ataques evolucionan con tecnolog\u00eda"}]},{"@type":"WebSite","@id":"https:\/\/oti.unp.edu.pe\/#website","url":"https:\/\/oti.unp.edu.pe\/","name":"Oficina de Tecnolog\u00eda de Informaci\u00f3n","description":"","publisher":{"@id":"https:\/\/oti.unp.edu.pe\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/oti.unp.edu.pe\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/oti.unp.edu.pe\/#organization","name":"Oficina de Tecnolog\u00eda de Informaci\u00f3n","url":"https:\/\/oti.unp.edu.pe\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/oti.unp.edu.pe\/#\/schema\/logo\/image\/","url":"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/Google_org-Accelerator_-Generative-AI-abre-convocatoria-global-para-proyectos-de-IA-generativa-Exitosa-Noticias.jpg","contentUrl":"https:\/\/oti.unp.edu.pe\/wp-content\/uploads\/2025\/01\/Google_org-Accelerator_-Generative-AI-abre-convocatoria-global-para-proyectos-de-IA-generativa-Exitosa-Noticias.jpg","width":736,"height":385,"caption":"Oficina de Tecnolog\u00eda de Informaci\u00f3n"},"image":{"@id":"https:\/\/oti.unp.edu.pe\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/oti.unp.edu.pe\/#\/schema\/person\/cd1a72f9fc6e687ed893287bdf45a99c","name":"desarrollo","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/oti.unp.edu.pe\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b427551bf20fc881b31393ff4e3d669c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b427551bf20fc881b31393ff4e3d669c?s=96&d=mm&r=g","caption":"desarrollo"},"sameAs":["https:\/\/oti.unp.edu.pe\/webotiunp"],"url":"https:\/\/oti.unp.edu.pe\/?author=1"}]}},"_links":{"self":[{"href":"https:\/\/oti.unp.edu.pe\/index.php?rest_route=\/wp\/v2\/posts\/14029"}],"collection":[{"href":"https:\/\/oti.unp.edu.pe\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/oti.unp.edu.pe\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/oti.unp.edu.pe\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/oti.unp.edu.pe\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14029"}],"version-history":[{"count":4,"href":"https:\/\/oti.unp.edu.pe\/index.php?rest_route=\/wp\/v2\/posts\/14029\/revisions"}],"predecessor-version":[{"id":14034,"href":"https:\/\/oti.unp.edu.pe\/index.php?rest_route=\/wp\/v2\/posts\/14029\/revisions\/14034"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/oti.unp.edu.pe\/index.php?rest_route=\/wp\/v2\/media\/14031"}],"wp:attachment":[{"href":"https:\/\/oti.unp.edu.pe\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14029"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/oti.unp.edu.pe\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=14029"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/oti.unp.edu.pe\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=14029"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}