{"id":52,"date":"2019-11-05T00:07:32","date_gmt":"2019-11-05T00:07:32","guid":{"rendered":"http:\/\/34.227.63.65\/?p=52"},"modified":"2019-11-05T00:07:32","modified_gmt":"2019-11-05T00:07:32","slug":"procesos-para-la-seguridad-de-la-informacion","status":"publish","type":"post","link":"http:\/\/34.227.63.65\/en\/informatic-security\/processes-for-information-security\/","title":{"rendered":"Processes for information security"},"content":{"rendered":"<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Well, the security and privacy of information systems has become extremely important when it comes to work or even personal information, as we all use systems to store our confidential information that we don't want anyone to see. <\/span><span style=\"vertical-align: inherit;\">That is why there are such tools as cryptography, physical security, cybersecurity and logical security.<\/span><\/span><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">What is exposed in a computer component are:<\/span><\/span><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">- the hardware<\/span><\/span><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">- The software<\/span><\/span><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">- O DATA<\/span><\/span><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Data being the most important, if the hardware is damaged we replace the damaged part, if the software is damaged we only reinstall, but when we talk about data it is almost unrecoverable, almost because in computing a data is never deleted, it is modified and when it already has several modifications it is very difficult to recover.<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">PERSONNEL TRAINING AND SENSITIZATION PROCEDURE:<\/span><\/span><\/strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> Indicates the methodology used by the entity to train and sensitize personnel on information security issues, taking into account the different roles and directives, the periodicity of the training and sensitization capabilities, etc.<\/span><\/span><\/p>\n<p><strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">PROCEDURE FOR THE HIRING AND DISMISSAL OF PERSONNEL:<\/span><\/span><\/strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> This procedure indicates the way in which the entity safely manages the entry and exit, including issues such as background checks, signing of confidentiality agreements, receipt of deliveries required to generate peace of mind, among other characteristics. <\/span><span style=\"vertical-align: inherit;\">This procedure goes hand in hand with the human resources management area or recruitment can be generated with their collaboration.<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">PROCEDURE FOR SECURE ACCESS TO INFORMATION SYSTEMS:<\/span><\/span><\/strong><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">\u00a0In this procedure, the entity must indicate how to manage access to its information systems in a secure manner, using preventive methods against brute force attacks, validating complete data for system access, using methods to encrypt access information through the network, among others.<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">USER AND PASSWORD MANAGEMENT PROCEDURE: <\/span><\/span><\/strong><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">In this procedure, the entity will require how to perform the creation of users and the assignment of passwords (which must have an acceptable level of security, based on a policy of secure passwords previously defined), prohibiting its subsequent reuse, possibly to users to change it often, had a record of them. <\/span><span style=\"vertical-align: inherit;\">This procedure should apply to all information systems, and should also take into account the role that each user requires in the necessary systems to provide the necessary access.<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">CRYPTOGRAPHIC CONTROLS PROCEDURE: <\/span><\/span><\/strong><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">This procedure shall specify how cryptography will be used within the organization's information systems to ensure their integrity, availability and confidentiality. <\/span><span style=\"vertical-align: inherit;\">You must specify the complexity of cryptographic controls to employees, specifying the criticality of the information that will circulate through the network or will be selected hosted on a particular system. <\/span><span style=\"vertical-align: inherit;\">For example using wep networks is an obsolete technology that should not be used anymore, because it has keys from 64 to 128 bits that means 2 raised to 128 bits is a huge amount. <\/span><span style=\"vertical-align: inherit;\">Ideally, use wpa2 which fixes all the vulnerabilities of wpa and has a 256-bit key. <\/span><span style=\"vertical-align: inherit;\">Or, for example, if there is a web page in the company, it must have a SSL certificate (Transport Layer Security).<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">PHYSICAL ACCESS CONTROL PROCEDURE: <\/span><\/span><\/strong><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">This procedure should describe how to execute the different steps to identify the secure access control to the facilities for authorized personnel. <\/span><span style=\"vertical-align: inherit;\">This procedure may include date and time of entry records, book tracking or registration platform. <\/span><span style=\"vertical-align: inherit;\">The request for permission to access restricted areas, who grants and what must be done to gain access to the areas, etc., must be considered.<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">ASSET PROTECTION PROCEDURE:<\/span><\/span><\/strong><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">\u00a0This procedure should contain the steps with the equipment that is protected by the entity. <\/span><span style=\"vertical-align: inherit;\">It is recommended that this procedure specifies how the location of equipment that processes confidential information is determined, how the facilities are secured, the controls that are specified to minimize risks of natural disasters, physical threats, damage, dust, water, interference, electrical discharges, etc.<\/span><\/span><\/p>\n<p><strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">EQUIPMENT MAINTENANCE PROCEDURE: <\/span><\/span><\/strong><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">This procedure should specify how preventive or corrective maintenance is performed within the entity, indicating the intervals at which these requirements are determined, based on suggestions from suppliers or if there is insurance tied to the equipment and the maintenance is required. <\/span><span style=\"vertical-align: inherit;\">The way in which the maintenance will be carried out and the personnel that will perform it must be specified, facing the appropriate record.<\/span><\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Bueno, la seguridad y la privacidad de los sistemas de informaci\u00f3n, se ha vuelto extremadamente importante cuando hablamos de lo laboral o incluso de lo personal ya que todos usamos sistemas para guardar nuestra informaci\u00f3n confidencial, que queremos que nadie quiera ver. Por eso existen estas herramientas como la criptograf\u00eda, seguridad f\u00edsica, ciberseguridad y seguridad [&hellip;]<\/p>","protected":false},"author":2,"featured_media":53,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-52","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-seguridad-informatica"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Procesos para la seguridad de la informaci\u00f3n - FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/34.227.63.65\/en\/informatic-security\/processes-for-information-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Procesos para la seguridad de la informaci\u00f3n - FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda\" \/>\n<meta property=\"og:description\" content=\"Bueno, la seguridad y la privacidad de los sistemas de informaci\u00f3n, se ha vuelto extremadamente importante cuando hablamos de lo laboral o incluso de lo personal ya que todos usamos sistemas para guardar nuestra informaci\u00f3n confidencial, que queremos que nadie quiera ver. Por eso existen estas herramientas como la criptograf\u00eda, seguridad f\u00edsica, ciberseguridad y seguridad [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"http:\/\/34.227.63.65\/en\/informatic-security\/processes-for-information-security\/\" \/>\n<meta property=\"og:site_name\" content=\"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-05T00:07:32+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/34.227.63.65\/wp-content\/uploads\/2019\/11\/Seguridad-de-la-informacion.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"576\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"filetechn\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"filetechn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"http:\/\/34.227.63.65\/en\/informatic-security\/processes-for-information-security\/#article\",\"isPartOf\":{\"@id\":\"http:\/\/34.227.63.65\/en\/informatic-security\/processes-for-information-security\/\"},\"author\":{\"name\":\"filetechn\",\"@id\":\"http:\/\/34.227.63.65\/#\/schema\/person\/0bd69a1cc53562d2a69b03fac859a55b\"},\"headline\":\"Procesos para la seguridad de la informaci\u00f3n\",\"datePublished\":\"2019-11-05T00:07:32+00:00\",\"dateModified\":\"2019-11-05T00:07:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"http:\/\/34.227.63.65\/en\/informatic-security\/processes-for-information-security\/\"},\"wordCount\":829,\"commentCount\":0,\"publisher\":{\"@id\":\"http:\/\/34.227.63.65\/#organization\"},\"image\":{\"@id\":\"http:\/\/34.227.63.65\/en\/informatic-security\/processes-for-information-security\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/34.227.63.65\/wp-content\/uploads\/2019\/11\/Seguridad-de-la-informacion.jpg\",\"articleSection\":[\"Seguridad inform\u00e1tica\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"http:\/\/34.227.63.65\/en\/informatic-security\/processes-for-information-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"http:\/\/34.227.63.65\/en\/informatic-security\/processes-for-information-security\/\",\"url\":\"http:\/\/34.227.63.65\/en\/informatic-security\/processes-for-information-security\/\",\"name\":\"Procesos para la seguridad de la informaci\u00f3n - FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda\",\"isPartOf\":{\"@id\":\"http:\/\/34.227.63.65\/#website\"},\"primaryImageOfPage\":{\"@id\":\"http:\/\/34.227.63.65\/en\/informatic-security\/processes-for-information-security\/#primaryimage\"},\"image\":{\"@id\":\"http:\/\/34.227.63.65\/en\/informatic-security\/processes-for-information-security\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/34.227.63.65\/wp-content\/uploads\/2019\/11\/Seguridad-de-la-informacion.jpg\",\"datePublished\":\"2019-11-05T00:07:32+00:00\",\"dateModified\":\"2019-11-05T00:07:32+00:00\",\"breadcrumb\":{\"@id\":\"http:\/\/34.227.63.65\/en\/informatic-security\/processes-for-information-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/34.227.63.65\/en\/informatic-security\/processes-for-information-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/34.227.63.65\/en\/informatic-security\/processes-for-information-security\/#primaryimage\",\"url\":\"http:\/\/34.227.63.65\/wp-content\/uploads\/2019\/11\/Seguridad-de-la-informacion.jpg\",\"contentUrl\":\"http:\/\/34.227.63.65\/wp-content\/uploads\/2019\/11\/Seguridad-de-la-informacion.jpg\",\"width\":960,\"height\":576},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/34.227.63.65\/en\/informatic-security\/processes-for-information-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"http:\/\/34.227.63.65\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Procesos para la seguridad de la informaci\u00f3n\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\/\/34.227.63.65\/#website\",\"url\":\"http:\/\/34.227.63.65\/\",\"name\":\"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda\",\"description\":\"Emprendimiento Digital, Tutoriales, Tecnolog\u00eda, Hosting, Wordpress\",\"publisher\":{\"@id\":\"http:\/\/34.227.63.65\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\/\/34.227.63.65\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"http:\/\/34.227.63.65\/#organization\",\"name\":\"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda\",\"url\":\"http:\/\/34.227.63.65\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/34.227.63.65\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.filetechn.com\/wp-content\/uploads\/2024\/09\/cropped-cropped-logo-circle.png\",\"contentUrl\":\"https:\/\/www.filetechn.com\/wp-content\/uploads\/2024\/09\/cropped-cropped-logo-circle.png\",\"width\":512,\"height\":512,\"caption\":\"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda\"},\"image\":{\"@id\":\"http:\/\/34.227.63.65\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"http:\/\/34.227.63.65\/#\/schema\/person\/0bd69a1cc53562d2a69b03fac859a55b\",\"name\":\"filetechn\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/34.227.63.65\/#\/schema\/person\/image\/\",\"url\":\"http:\/\/2.gravatar.com\/avatar\/ba7172296fdc6c99a739fb82b6c8fd88?s=96&d=mm&r=g\",\"contentUrl\":\"http:\/\/2.gravatar.com\/avatar\/ba7172296fdc6c99a739fb82b6c8fd88?s=96&d=mm&r=g\",\"caption\":\"filetechn\"},\"url\":\"http:\/\/34.227.63.65\/en\/author\/filetechn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Procesos para la seguridad de la informaci\u00f3n - FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/34.227.63.65\/en\/informatic-security\/processes-for-information-security\/","og_locale":"en_US","og_type":"article","og_title":"Procesos para la seguridad de la informaci\u00f3n - FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda","og_description":"Bueno, la seguridad y la privacidad de los sistemas de informaci\u00f3n, se ha vuelto extremadamente importante cuando hablamos de lo laboral o incluso de lo personal ya que todos usamos sistemas para guardar nuestra informaci\u00f3n confidencial, que queremos que nadie quiera ver. Por eso existen estas herramientas como la criptograf\u00eda, seguridad f\u00edsica, ciberseguridad y seguridad [&hellip;]","og_url":"http:\/\/34.227.63.65\/en\/informatic-security\/processes-for-information-security\/","og_site_name":"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda","article_published_time":"2019-11-05T00:07:32+00:00","og_image":[{"width":960,"height":576,"url":"http:\/\/34.227.63.65\/wp-content\/uploads\/2019\/11\/Seguridad-de-la-informacion.jpg","type":"image\/jpeg"}],"author":"filetechn","twitter_card":"summary_large_image","twitter_misc":{"Written by":"filetechn","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"http:\/\/34.227.63.65\/en\/informatic-security\/processes-for-information-security\/#article","isPartOf":{"@id":"http:\/\/34.227.63.65\/en\/informatic-security\/processes-for-information-security\/"},"author":{"name":"filetechn","@id":"http:\/\/34.227.63.65\/#\/schema\/person\/0bd69a1cc53562d2a69b03fac859a55b"},"headline":"Procesos para la seguridad de la informaci\u00f3n","datePublished":"2019-11-05T00:07:32+00:00","dateModified":"2019-11-05T00:07:32+00:00","mainEntityOfPage":{"@id":"http:\/\/34.227.63.65\/en\/informatic-security\/processes-for-information-security\/"},"wordCount":829,"commentCount":0,"publisher":{"@id":"http:\/\/34.227.63.65\/#organization"},"image":{"@id":"http:\/\/34.227.63.65\/en\/informatic-security\/processes-for-information-security\/#primaryimage"},"thumbnailUrl":"http:\/\/34.227.63.65\/wp-content\/uploads\/2019\/11\/Seguridad-de-la-informacion.jpg","articleSection":["Seguridad inform\u00e1tica"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["http:\/\/34.227.63.65\/en\/informatic-security\/processes-for-information-security\/#respond"]}]},{"@type":"WebPage","@id":"http:\/\/34.227.63.65\/en\/informatic-security\/processes-for-information-security\/","url":"http:\/\/34.227.63.65\/en\/informatic-security\/processes-for-information-security\/","name":"Procesos para la seguridad de la informaci\u00f3n - FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda","isPartOf":{"@id":"http:\/\/34.227.63.65\/#website"},"primaryImageOfPage":{"@id":"http:\/\/34.227.63.65\/en\/informatic-security\/processes-for-information-security\/#primaryimage"},"image":{"@id":"http:\/\/34.227.63.65\/en\/informatic-security\/processes-for-information-security\/#primaryimage"},"thumbnailUrl":"http:\/\/34.227.63.65\/wp-content\/uploads\/2019\/11\/Seguridad-de-la-informacion.jpg","datePublished":"2019-11-05T00:07:32+00:00","dateModified":"2019-11-05T00:07:32+00:00","breadcrumb":{"@id":"http:\/\/34.227.63.65\/en\/informatic-security\/processes-for-information-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["http:\/\/34.227.63.65\/en\/informatic-security\/processes-for-information-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/34.227.63.65\/en\/informatic-security\/processes-for-information-security\/#primaryimage","url":"http:\/\/34.227.63.65\/wp-content\/uploads\/2019\/11\/Seguridad-de-la-informacion.jpg","contentUrl":"http:\/\/34.227.63.65\/wp-content\/uploads\/2019\/11\/Seguridad-de-la-informacion.jpg","width":960,"height":576},{"@type":"BreadcrumbList","@id":"http:\/\/34.227.63.65\/en\/informatic-security\/processes-for-information-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"http:\/\/34.227.63.65\/"},{"@type":"ListItem","position":2,"name":"Procesos para la seguridad de la informaci\u00f3n"}]},{"@type":"WebSite","@id":"http:\/\/34.227.63.65\/#website","url":"http:\/\/34.227.63.65\/","name":"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda","description":"Emprendimiento Digital, Tutoriales, Tecnolog\u00eda, Hosting, Wordpress","publisher":{"@id":"http:\/\/34.227.63.65\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/34.227.63.65\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"http:\/\/34.227.63.65\/#organization","name":"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda","url":"http:\/\/34.227.63.65\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/34.227.63.65\/#\/schema\/logo\/image\/","url":"https:\/\/www.filetechn.com\/wp-content\/uploads\/2024\/09\/cropped-cropped-logo-circle.png","contentUrl":"https:\/\/www.filetechn.com\/wp-content\/uploads\/2024\/09\/cropped-cropped-logo-circle.png","width":512,"height":512,"caption":"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda"},"image":{"@id":"http:\/\/34.227.63.65\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"http:\/\/34.227.63.65\/#\/schema\/person\/0bd69a1cc53562d2a69b03fac859a55b","name":"filetechn","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/34.227.63.65\/#\/schema\/person\/image\/","url":"http:\/\/2.gravatar.com\/avatar\/ba7172296fdc6c99a739fb82b6c8fd88?s=96&d=mm&r=g","contentUrl":"http:\/\/2.gravatar.com\/avatar\/ba7172296fdc6c99a739fb82b6c8fd88?s=96&d=mm&r=g","caption":"filetechn"},"url":"http:\/\/34.227.63.65\/en\/author\/filetechn\/"}]}},"_links":{"self":[{"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/posts\/52"}],"collection":[{"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/comments?post=52"}],"version-history":[{"count":0,"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/posts\/52\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/media\/53"}],"wp:attachment":[{"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/media?parent=52"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/categories?post=52"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/tags?post=52"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}