{"id":2871,"date":"2013-04-17T13:18:22","date_gmt":"2013-04-17T13:18:22","guid":{"rendered":"http:\/\/prensa.lacnic.net\/news\/?p=2871"},"modified":"2018-11-09T13:25:51","modified_gmt":"2018-11-09T13:25:51","slug":"superar-a-desconfianca-para-enfrentar-incidentes-informaticos","status":"publish","type":"post","link":"https:\/\/blog.lacnic.net\/pt-br\/superar-a-desconfianca-para-enfrentar-incidentes-informaticos\/","title":{"rendered":"\u201cSuperar a desconfian\u00e7a para enfrentar incidentes inform\u00e1ticos\u201d"},"content":{"rendered":"<p><strong>Especialista da OEA<\/strong><\/p>\n<p>Um dos principais desafios para enfrentar os incidentes em seguran\u00e7a inform\u00e1tica na regi\u00e3o \u00e9 superar a desconfian\u00e7a e compartilhar informa\u00e7\u00f5es com as equipes nacionais e internacionais de resposta, garantiu a Lacnic News Belisario Contreras, gerente de programa do Comit\u00ea Interamericano contra o Terrorismo (CICTE) da Organiza\u00e7\u00e3o dos Estados Americanos (OEA).<\/p>\n<p>Para o especialista da OEA, as institui\u00e7\u00f5es que sofrem incidentes inform\u00e1ticos \u201cn\u00e3o compartilham as informa\u00e7\u00f5es\u201d com as equipes de resposta por \u201cdesconfian\u00e7a\u201d ou \u201cdesconhecimento\u201d, e isso impede punir e perseguir os respons\u00e1veis \u200b\u200bpor esses ataques.<\/p>\n<p>Contreras considera essencial criar consci\u00eancia sobre as principais amea\u00e7as que s\u00e3o vivenciadas em cada pa\u00eds para desenvolver estrat\u00e9gias de resposta comuns na regi\u00e3o. \u201cMuitas vezes, por eventuais danos \u00e0 sua imagem, outras por medo de compartilhar informa\u00e7\u00f5es confidenciais ou diretamente por ignor\u00e2ncia, mas o fato \u00e9 que as institui\u00e7\u00f5es t\u00eam dificuldade de notificar os incidentes em seguran\u00e7a inform\u00e1tica\u201d, afirmou Contreras.<\/p>\n<p>O gerente de programa do CICTE reconheceu que todos os dias aumentam os ataques inform\u00e1ticos na regi\u00e3o, e que s\u00e3o cada vez mais sofisticados. A falta de informa\u00e7\u00e3o n\u00e3o permite quantificar as perdas econ\u00f4micas que esses incidentes inform\u00e1ticos provocam no continente.<\/p>\n<p>A sofistica\u00e7\u00e3o dos ataques levaram alguns Estados a criar, al\u00e9m de Centros de Resposta Nacionais a Incidentes de Seguran\u00e7a Inform\u00e1tica (CERT), seus pr\u00f3prios comandos virtuais para perseguir os respons\u00e1veis \u200b\u200bdos ataques. Tal \u00e9 o caso da Col\u00f4mbia, que tem equipes a n\u00edvel estatal, policial e militar, disse Contreras.<\/p>\n<p>Nas Am\u00e9ricas existem j\u00e1 18 CERTs nacionais. O especialista da OEA afirmou que os governos da regi\u00e3o, est\u00e3o colocando a ciberseguran\u00e7a como uma prioridade porque est\u00e3o percebendo que os incidentes inform\u00e1ticos s\u00e3o uma verdadeira amea\u00e7a para a estabilidade da Internet. Nesse sentido, disse que desde a OEA trabalham com os ministros da Justi\u00e7a da regi\u00e3o para modificar as leis dos pa\u00edses. \u201cTemos um grupo especializado em crimes cibern\u00e9ticos que recomenda aos pa\u00edses mudar as suas leis para poder lidar com os incidentes inform\u00e1ticos\u201d, apontou Contreras.<\/p>\n<p>O especialista admitiu que a Internet tem um impacto cada vez maior na vida das pessoas e que \u00e9 necess\u00e1rio adaptar a legisla\u00e7\u00e3o sem cercear liberdades. Segundo o funcion\u00e1rio da OEA &#8220;\u00e9 um grande mito&#8221; de que &#8220;maior seguran\u00e7a&#8221; na internet vai &#8220;cercear&#8221; a liberdade.<\/p>\n<p>\u201cA seguran\u00e7a n\u00e3o deve ir contra os direitos fundamentais dos seres humanos. Aumentar a seguran\u00e7a na Internet n\u00e3o significa que haja policiais na rede tentando impedir a publica\u00e7\u00e3o disso ou aquilo. A ideia \u00e9 adaptar as leis para permitir um bom uso da Internet. Os Estados devem fornecer prote\u00e7\u00e3o a seus cidad\u00e3os\u201d, apontou Contreras.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Especialista da OEA Um dos principais desafios para enfrentar os incidentes em seguran\u00e7a inform\u00e1tica na regi\u00e3o \u00e9 superar a desconfian\u00e7a e compartilhar informa\u00e7\u00f5es com as equipes nacionais e internacionais de resposta, garantiu a Lacnic News Belisario Contreras, gerente de programa do Comit\u00ea Interamericano contra o Terrorismo (CICTE) da Organiza\u00e7\u00e3o dos Estados Americanos (OEA). Para o [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":11183,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[510],"tags":[1272],"archivo":[641,1346],"taxonomy-authors":[],"tipo_autor":[],"class_list":["post-2871","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-seguranca-cibernetica","tag-ciberseguranca","archivo-edicao-abril-2013","archivo-edicoes-anteriores"],"acf":{"author":"","related_notes":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC Blog | \u201cSuperar a desconfian\u00e7a para enfrentar incidentes inform\u00e1ticos\u201d<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.lacnic.net\/pt-br\/superar-a-desconfianca-para-enfrentar-incidentes-informaticos\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC Blog | \u201cSuperar a desconfian\u00e7a para enfrentar incidentes inform\u00e1ticos\u201d\" \/>\n<meta property=\"og:description\" content=\"Especialista da OEA Um dos principais desafios para enfrentar os incidentes em seguran\u00e7a inform\u00e1tica na regi\u00e3o \u00e9 superar a desconfian\u00e7a e compartilhar informa\u00e7\u00f5es com as equipes nacionais e internacionais de resposta, garantiu a Lacnic News Belisario Contreras, gerente de programa do Comit\u00ea Interamericano contra o Terrorismo (CICTE) da Organiza\u00e7\u00e3o dos Estados Americanos (OEA). Para o [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.lacnic.net\/pt-br\/superar-a-desconfianca-para-enfrentar-incidentes-informaticos\/\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/lacnic\" \/>\n<meta property=\"article:published_time\" content=\"2013-04-17T13:18:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-11-09T13:25:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2013\/04\/maxresdefault.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"383\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"LACNIC\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.lacnic.net\/pt-br\/superar-a-desconfianca-para-enfrentar-incidentes-informaticos\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/pt-br\/superar-a-desconfianca-para-enfrentar-incidentes-informaticos\/\"},\"author\":{\"name\":\"LACNIC\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/30da2f68d9b9f0123d5192afb790dea9\"},\"headline\":\"\u201cSuperar a desconfian\u00e7a para enfrentar incidentes inform\u00e1ticos\u201d\",\"datePublished\":\"2013-04-17T13:18:22+00:00\",\"dateModified\":\"2018-11-09T13:25:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/pt-br\/superar-a-desconfianca-para-enfrentar-incidentes-informaticos\/\"},\"wordCount\":486,\"commentCount\":7,\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/pt-br\/superar-a-desconfianca-para-enfrentar-incidentes-informaticos\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2013\/04\/maxresdefault.jpg\",\"keywords\":[\"Ciberseguran\u00e7a\"],\"articleSection\":[\"Seguran\u00e7a cibern\u00e9tica\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.lacnic.net\/pt-br\/superar-a-desconfianca-para-enfrentar-incidentes-informaticos\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.lacnic.net\/pt-br\/superar-a-desconfianca-para-enfrentar-incidentes-informaticos\/\",\"url\":\"https:\/\/blog.lacnic.net\/pt-br\/superar-a-desconfianca-para-enfrentar-incidentes-informaticos\/\",\"name\":\"LACNIC Blog | \u201cSuperar a desconfian\u00e7a para enfrentar incidentes inform\u00e1ticos\u201d\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/pt-br\/superar-a-desconfianca-para-enfrentar-incidentes-informaticos\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/pt-br\/superar-a-desconfianca-para-enfrentar-incidentes-informaticos\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2013\/04\/maxresdefault.jpg\",\"datePublished\":\"2013-04-17T13:18:22+00:00\",\"dateModified\":\"2018-11-09T13:25:51+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.lacnic.net\/pt-br\/superar-a-desconfianca-para-enfrentar-incidentes-informaticos\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.lacnic.net\/pt-br\/superar-a-desconfianca-para-enfrentar-incidentes-informaticos\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/blog.lacnic.net\/pt-br\/superar-a-desconfianca-para-enfrentar-incidentes-informaticos\/#primaryimage\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2013\/04\/maxresdefault.jpg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2013\/04\/maxresdefault.jpg\",\"width\":680,\"height\":383},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.lacnic.net\/pt-br\/superar-a-desconfianca-para-enfrentar-incidentes-informaticos\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.lacnic.net\/pt-br\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u201cSuperar a desconfian\u00e7a para enfrentar incidentes inform\u00e1ticos\u201d\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.lacnic.net\/#website\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"name\":\"LACNIC Blog\",\"description\":\"LACNIC Internet Community Newsletter\",\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.lacnic.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.lacnic.net\/#organization\",\"name\":\"LACNIC Blog\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"caption\":\"LACNIC Blog\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/lacnic\",\"https:\/\/x.com\/lacnic\",\"https:\/\/www.instagram.com\/lacnic\/?hl=es-la\",\"https:\/\/uy.linkedin.com\/company\/lacnic\",\"https:\/\/www.youtube.com\/user\/lacnicstaff\",\"https:\/\/www.lacnic.net\/podcast\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/30da2f68d9b9f0123d5192afb790dea9\",\"name\":\"LACNIC\",\"url\":\"https:\/\/blog.lacnic.net\/pt-br\/author\/staffadmin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC Blog | \u201cSuperar a desconfian\u00e7a para enfrentar incidentes inform\u00e1ticos\u201d","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.lacnic.net\/pt-br\/superar-a-desconfianca-para-enfrentar-incidentes-informaticos\/","og_locale":"pt_BR","og_type":"article","og_title":"LACNIC Blog | \u201cSuperar a desconfian\u00e7a para enfrentar incidentes inform\u00e1ticos\u201d","og_description":"Especialista da OEA Um dos principais desafios para enfrentar os incidentes em seguran\u00e7a inform\u00e1tica na regi\u00e3o \u00e9 superar a desconfian\u00e7a e compartilhar informa\u00e7\u00f5es com as equipes nacionais e internacionais de resposta, garantiu a Lacnic News Belisario Contreras, gerente de programa do Comit\u00ea Interamericano contra o Terrorismo (CICTE) da Organiza\u00e7\u00e3o dos Estados Americanos (OEA). Para o [&hellip;]","og_url":"https:\/\/blog.lacnic.net\/pt-br\/superar-a-desconfianca-para-enfrentar-incidentes-informaticos\/","og_site_name":"LACNIC Blog","article_publisher":"https:\/\/facebook.com\/lacnic","article_published_time":"2013-04-17T13:18:22+00:00","article_modified_time":"2018-11-09T13:25:51+00:00","og_image":[{"width":680,"height":383,"url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2013\/04\/maxresdefault.jpg","type":"image\/jpeg"}],"author":"LACNIC","twitter_card":"summary_large_image","twitter_creator":"@lacnic","twitter_site":"@lacnic","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.lacnic.net\/pt-br\/superar-a-desconfianca-para-enfrentar-incidentes-informaticos\/#article","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/pt-br\/superar-a-desconfianca-para-enfrentar-incidentes-informaticos\/"},"author":{"name":"LACNIC","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/30da2f68d9b9f0123d5192afb790dea9"},"headline":"\u201cSuperar a desconfian\u00e7a para enfrentar incidentes inform\u00e1ticos\u201d","datePublished":"2013-04-17T13:18:22+00:00","dateModified":"2018-11-09T13:25:51+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.lacnic.net\/pt-br\/superar-a-desconfianca-para-enfrentar-incidentes-informaticos\/"},"wordCount":486,"commentCount":7,"publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"image":{"@id":"https:\/\/blog.lacnic.net\/pt-br\/superar-a-desconfianca-para-enfrentar-incidentes-informaticos\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2013\/04\/maxresdefault.jpg","keywords":["Ciberseguran\u00e7a"],"articleSection":["Seguran\u00e7a cibern\u00e9tica"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.lacnic.net\/pt-br\/superar-a-desconfianca-para-enfrentar-incidentes-informaticos\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.lacnic.net\/pt-br\/superar-a-desconfianca-para-enfrentar-incidentes-informaticos\/","url":"https:\/\/blog.lacnic.net\/pt-br\/superar-a-desconfianca-para-enfrentar-incidentes-informaticos\/","name":"LACNIC Blog | \u201cSuperar a desconfian\u00e7a para enfrentar incidentes inform\u00e1ticos\u201d","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.lacnic.net\/pt-br\/superar-a-desconfianca-para-enfrentar-incidentes-informaticos\/#primaryimage"},"image":{"@id":"https:\/\/blog.lacnic.net\/pt-br\/superar-a-desconfianca-para-enfrentar-incidentes-informaticos\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2013\/04\/maxresdefault.jpg","datePublished":"2013-04-17T13:18:22+00:00","dateModified":"2018-11-09T13:25:51+00:00","breadcrumb":{"@id":"https:\/\/blog.lacnic.net\/pt-br\/superar-a-desconfianca-para-enfrentar-incidentes-informaticos\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.lacnic.net\/pt-br\/superar-a-desconfianca-para-enfrentar-incidentes-informaticos\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/blog.lacnic.net\/pt-br\/superar-a-desconfianca-para-enfrentar-incidentes-informaticos\/#primaryimage","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2013\/04\/maxresdefault.jpg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2013\/04\/maxresdefault.jpg","width":680,"height":383},{"@type":"BreadcrumbList","@id":"https:\/\/blog.lacnic.net\/pt-br\/superar-a-desconfianca-para-enfrentar-incidentes-informaticos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.lacnic.net\/pt-br\/"},{"@type":"ListItem","position":2,"name":"\u201cSuperar a desconfian\u00e7a para enfrentar incidentes inform\u00e1ticos\u201d"}]},{"@type":"WebSite","@id":"https:\/\/blog.lacnic.net\/#website","url":"https:\/\/blog.lacnic.net\/","name":"LACNIC Blog","description":"LACNIC Internet Community Newsletter","publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.lacnic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/blog.lacnic.net\/#organization","name":"LACNIC Blog","url":"https:\/\/blog.lacnic.net\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","caption":"LACNIC Blog"},"image":{"@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/lacnic","https:\/\/x.com\/lacnic","https:\/\/www.instagram.com\/lacnic\/?hl=es-la","https:\/\/uy.linkedin.com\/company\/lacnic","https:\/\/www.youtube.com\/user\/lacnicstaff","https:\/\/www.lacnic.net\/podcast"]},{"@type":"Person","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/30da2f68d9b9f0123d5192afb790dea9","name":"LACNIC","url":"https:\/\/blog.lacnic.net\/pt-br\/author\/staffadmin\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2013\/04\/maxresdefault.jpg","jetpack_sharing_enabled":true,"wpml_current_locale":"pt_BR","wpml_translations":[{"locale":"es_ES","id":2868,"post_title":"\u201cSuperar la desconfianza para  enfrentar incidentes inform\u00e1ticos\u201d","slug":"superar-la-desconfianza-para-enfrentar-incidentes-informaticos-2","href":"https:\/\/blog.lacnic.net\/superar-la-desconfianza-para-enfrentar-incidentes-informaticos-2\/"},{"locale":"en_US","id":2870,"post_title":"\u201cOvercoming Mistrust in Order to Deal with Computer Security Incidents\u201d","slug":"overcoming-mistrust-in-order-to-deal-with-computer-security-incidents","href":"https:\/\/blog.lacnic.net\/en\/overcoming-mistrust-in-order-to-deal-with-computer-security-incidents\/"}],"_links":{"self":[{"href":"https:\/\/blog.lacnic.net\/pt-br\/wp-json\/wp\/v2\/posts\/2871","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.lacnic.net\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lacnic.net\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/pt-br\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/pt-br\/wp-json\/wp\/v2\/comments?post=2871"}],"version-history":[{"count":6,"href":"https:\/\/blog.lacnic.net\/pt-br\/wp-json\/wp\/v2\/posts\/2871\/revisions"}],"predecessor-version":[{"id":11186,"href":"https:\/\/blog.lacnic.net\/pt-br\/wp-json\/wp\/v2\/posts\/2871\/revisions\/11186"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/pt-br\/wp-json\/wp\/v2\/media\/11183"}],"wp:attachment":[{"href":"https:\/\/blog.lacnic.net\/pt-br\/wp-json\/wp\/v2\/media?parent=2871"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lacnic.net\/pt-br\/wp-json\/wp\/v2\/categories?post=2871"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lacnic.net\/pt-br\/wp-json\/wp\/v2\/tags?post=2871"},{"taxonomy":"archivo","embeddable":true,"href":"https:\/\/blog.lacnic.net\/pt-br\/wp-json\/wp\/v2\/archivo?post=2871"},{"taxonomy":"taxonomy-authors","embeddable":true,"href":"https:\/\/blog.lacnic.net\/pt-br\/wp-json\/wp\/v2\/taxonomy-authors?post=2871"},{"taxonomy":"tipo_autor","embeddable":true,"href":"https:\/\/blog.lacnic.net\/pt-br\/wp-json\/wp\/v2\/tipo_autor?post=2871"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}