{"id":7418,"date":"2023-09-08T18:57:00","date_gmt":"2023-09-08T23:57:00","guid":{"rendered":"https:\/\/www.icesi.edu.co\/editorial\/?p=7418"},"modified":"2025-02-07T09:26:39","modified_gmt":"2025-02-07T14:26:39","slug":"ciberseguridad-datos-caos","status":"publish","type":"post","link":"https:\/\/www.icesi.edu.co\/editorial\/ciberseguridad-datos-caos\/","title":{"rendered":"Ciberseguridad: los datos, las semillas del caos"},"content":{"rendered":"<div class=\"ead-preview\"><div class=\"ead-document\" style=\"position: relative;\"><div class=\"ead-iframe-wrapper\"><iframe src=\"\/\/docs.google.com\/viewer?url=https%3A%2F%2Frepository.icesi.edu.co%2Fbiblioteca_digital%2Fbitstream%2F10906%2F106425%2F1%2Fnavarro_ciberseguridad_datos_2023.pdf&amp;embedded=true&amp;hl=en\" title=\"Embedded Document\" class=\"ead-iframe\" style=\"width: 0px;height: 0px;border: none;visibility: hidden;\"><\/iframe><\/div>\t\t\t<div class=\"ead-document-loading\" style=\"width:100%;height:100%;position:absolute;left:0;top:0;z-index:10;\">\n\t\t\t\t<div class=\"ead-loading-wrap\">\n\t\t\t\t\t<div class=\"ead-loading-main\">\n\t\t\t\t\t\t<div class=\"ead-loading\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.icesi.edu.co\/editorial\/wp-content\/plugins\/embed-any-document\/images\/loading.svg\" width=\"55\" height=\"55\" alt=\"Loader\">\n\t\t\t\t\t\t\t<span>Loading...<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"ead-loading-foot\">\n\t\t\t\t\t\t<div class=\"ead-loading-foot-title\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.icesi.edu.co\/editorial\/wp-content\/plugins\/embed-any-document\/images\/EAD-logo.svg\" alt=\"EAD Logo\" width=\"36\" height=\"23\"\/>\n\t\t\t\t\t\t\t<span>Taking too long?<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<p>\n\t\t\t\t\t\t\t<div class=\"ead-document-btn ead-reload-btn\" role=\"button\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.icesi.edu.co\/editorial\/wp-content\/plugins\/embed-any-document\/images\/reload.svg\" alt=\"Reload\" width=\"12\" height=\"12\"\/> Reload document\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<span>|<\/span>\n\t\t\t\t\t\t\t<a href=\"https:\/\/repository.icesi.edu.co\/biblioteca_digital\/bitstream\/10906\/106425\/1\/navarro_ciberseguridad_datos_2023.pdf\" class=\"ead-document-btn\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.icesi.edu.co\/editorial\/wp-content\/plugins\/embed-any-document\/images\/open.svg\" alt=\"Open\" width=\"12\" height=\"12\"\/> Open in new tab\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div><p class=\"embed_download\"><a href=\"https:\/\/repository.icesi.edu.co\/biblioteca_digital\/bitstream\/10906\/106425\/1\/navarro_ciberseguridad_datos_2023.pdf\" download target=\"_blank\" rel=\"noopener\">Download\/Descargar <\/a><\/p><\/div>\n<strong>T\u00edtulo completo:<\/strong> Ciberseguridad: los datos, las semillas del caos.<br \/>\n<strong>Coordinadores:<\/strong> Christian Camilo Urcuqui y Andr\u00e9s Navarro Cadavid.<br \/>\n<strong>Autores:<\/strong> Luisa Fernanda Quintero Fern\u00e1ndez, Juli\u00e1n Andr\u00e9s Rivera Carrillo, Juan Fernando Angulo Salvador, Danna Garc\u00eda Trujillo, Miguel Andr\u00e9s Sarasti Taguado, Alejandro Arce Rend\u00f3n, Alexander Samac\u00e1 Burbano, Diego Andr\u00e9s Torres Primero, Christian Camilo Urcuqui y Andr\u00e9s Navarro Cadavid.<br \/>\n<strong>Editoriales:<\/strong> Editorial Universidad Icesi.<br \/>\n<strong>Producci\u00f3n editorial:<\/strong> Claros Editores SAS.<br \/>\n<strong>A\u00f1o de edici\u00f3n:<\/strong> 2023 | <strong>ISBN:<\/strong> 978-628-7630-15-4.<br \/>\n<span id=\"post-ratings-7418\" class=\"post-ratings\" data-nonce=\"55a6c53f16\"><img decoding=\"async\" id=\"rating_7418_1\" src=\"https:\/\/www.icesi.edu.co\/editorial\/wp-content\/plugins\/wp-postratings\/images\/stars_crystal\/rating_on.gif\" alt=\"1 estrella\" title=\"1 estrella\" onmouseover=\"current_rating(7418, 1, '1 estrella');\" onmouseout=\"ratings_off(4.9, 5, 0);\" onclick=\"rate_post();\" onkeypress=\"rate_post();\" style=\"cursor: pointer; border: 0px;\" \/><img decoding=\"async\" id=\"rating_7418_2\" src=\"https:\/\/www.icesi.edu.co\/editorial\/wp-content\/plugins\/wp-postratings\/images\/stars_crystal\/rating_on.gif\" alt=\"2 estrellas\" title=\"2 estrellas\" onmouseover=\"current_rating(7418, 2, '2 estrellas');\" onmouseout=\"ratings_off(4.9, 5, 0);\" onclick=\"rate_post();\" onkeypress=\"rate_post();\" style=\"cursor: pointer; border: 0px;\" \/><img decoding=\"async\" id=\"rating_7418_3\" src=\"https:\/\/www.icesi.edu.co\/editorial\/wp-content\/plugins\/wp-postratings\/images\/stars_crystal\/rating_on.gif\" alt=\"3 estrellas\" title=\"3 estrellas\" onmouseover=\"current_rating(7418, 3, '3 estrellas');\" onmouseout=\"ratings_off(4.9, 5, 0);\" onclick=\"rate_post();\" onkeypress=\"rate_post();\" style=\"cursor: pointer; border: 0px;\" \/><img decoding=\"async\" id=\"rating_7418_4\" src=\"https:\/\/www.icesi.edu.co\/editorial\/wp-content\/plugins\/wp-postratings\/images\/stars_crystal\/rating_on.gif\" alt=\"4 estrellas\" title=\"4 estrellas\" onmouseover=\"current_rating(7418, 4, '4 estrellas');\" onmouseout=\"ratings_off(4.9, 5, 0);\" onclick=\"rate_post();\" onkeypress=\"rate_post();\" style=\"cursor: pointer; border: 0px;\" \/><img decoding=\"async\" id=\"rating_7418_5\" src=\"https:\/\/www.icesi.edu.co\/editorial\/wp-content\/plugins\/wp-postratings\/images\/stars_crystal\/rating_half.gif\" alt=\"5 estrellas\" title=\"5 estrellas\" onmouseover=\"current_rating(7418, 5, '5 estrellas');\" onmouseout=\"ratings_off(4.9, 5, 0);\" onclick=\"rate_post();\" onkeypress=\"rate_post();\" style=\"cursor: pointer; border: 0px;\" \/> (<strong>17<\/strong> votos, promedio: <strong>4,94<\/strong> sobre 5)<br \/><span class=\"post-ratings-text\" id=\"ratings_7418_text\"><\/span><\/span><span id=\"post-ratings-7418-loading\" class=\"post-ratings-loading\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.icesi.edu.co\/editorial\/wp-content\/plugins\/wp-postratings\/images\/loading.gif\" width=\"16\" height=\"16\" class=\"post-ratings-image\" \/>Loading...<\/span>\n<table style=\"border: none;\">\n<tbody style=\"border: none;\">\n<tr valign=\"top\">\n<td valign=\"top\" style=\"border: none; vertical-align: top; height: 50%; width: 125px;\"><script type=\"text\/javascript\" src=\"\/\/cdn.plu.mx\/widget-popup.js\"><\/script><a href=\"https:\/\/plu.mx\/plum\/a\/?doi=10.18046\/EUI\/ee.10.2023\" data-popup=\"right\" data-size=\"large\" class=\"plumx-plum-print-popup\" data-site=\"plum\" data-hide-when-empty=\"true\" data-lang=\"es\" target=\"_blank\" rel=\"noopener\">Ciberseguridad: los datos, las semillas del caos<\/a>\n<\/td>\n<td style=\"border: none; vertical-align: top; height: 50%; width: 125px;\"><script type=\"text\/javascript\" src=\"https:\/\/d1bxh8uas1mnw7.cloudfront.net\/assets\/embed.js\"><\/script><\/p>\n<div class=\"altmetric-embed\" data-badge-type=\"donut\" data-altmetric-id=\"154929663\"><\/div>\n<\/td>\n<td style=\"border: none; vertical-align: middle;\"><span class=\"__dimensions_badge_embed__\" data-doi=\"10.18046\/EUI\/ee.10.2023\" data-hide-zero-citations=\"true\" data-legend=\"hover-right\" data-style=\"small_circle\"><\/span><script async=\"\" src=\"https:\/\/badge.dimensions.ai\/badge.js\" charset=\"utf-8\"><\/script><\/td>\n<\/tr>\n<\/table>\n<div class=\"osc-res-tab tabbable   osc-tabs-left\"><div style=\"clear:both;width: 100%;\"><ul class=\"nav osc-res-nav nav-pills osc-tabs-left-ul\" id=\"oscitas-restabs-1-ciberseguridad-datos-caos-11824\"><li class=\"active\"><a href=\"#ert_pane1-0\" data-toggle=\"tab\">Descripci\u00f3n<\/a><\/li><li class=\"\"><a href=\"#ert_pane1-1\" data-toggle=\"tab\">Contenido<\/a><\/li><li class=\"\"><a href=\"#ert_pane1-2\" data-toggle=\"tab\">Autor(es)<\/a><\/li><li class=\"\"><a href=\"#ert_pane1-3\" data-toggle=\"tab\">Catalogaci\u00f3n<\/a><\/li><\/ul><\/div><div style=\"clear:both;width: 100%;\"><ul class=\"tab-content\" id=\"oscitas-restabcontent-1-ciberseguridad-datos-caos-11824\"><li class=\"tab-pane active\" id=\"ert_pane1-0\"><p style=\"text-align: justify;\">Este libro reporta los resultados de cinco proyecos que le dan continuidad a este proceso de investigaci\u00f3n, los cuales se enmarcan en una reflexi\u00f3n fundamental: los datos, esos insumos que son cada d\u00eda m\u00e1s \u00fatiles, m\u00e1s esenciales, entra\u00f1an el riesgo de crear el caos; evitarlo es funci\u00f3n de la ciberseguridad, por eso su desarroollo debe ser constante, no solo debe incorporar las nuevas tecnolog\u00edas, sino intentar predecir c\u00f3mo ellas podr\u00edan ser aprovechadas por los cibercriminales.<\/p>\n<p style=\"text-align: justify;\"><strong>C\u00f3mo citar (APA):<\/strong> Urcuqui, C.C. y Navarro Cadavid, A. (coords.) (2023). <i>Ciberseguridad: los datos, las semillas del caos<\/i>. Cali: Editorial Universidad Icesi. DOI: <a href=\"https:\/\/doi.org\/10.18046\/EUI\/ee.10.2023\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/doi.org\/10.18046\/EUI\/ee.10.2023<\/a><\/p><\/li><li class=\"tab-pane \" id=\"ert_pane1-1\"><strong>Tabla de contenido:<\/strong><\/p>\n<p>Presentaci\u00f3n<br \/>\n<i>Christian Camilo Urcuqui<\/i><\/p>\n<p><strong>1 \/ Los datos, las semillas del caos<\/strong><br \/>\n<i>Christian Camilo Urcuqui<\/i><\/p>\n<p><strong>2 \/ Marco conceptual<\/strong><br \/>\n<i>Christian Camilo Urcuqui<\/i><\/p>\n<p><strong>3 \/ Sistemas \u00e1giles y cognitivos para mejorar las buenas pr\u00e1cticas en ciberseguridad para el front-end<\/strong><br \/>\n<i>Luisa Fernanda Quintero, Juli\u00e1n Andr\u00e9s Rivera y Christian Camilo Urcuqui<\/i><\/p>\n<p><strong>4 \/ Sistemas \u00e1giles y cognitivos para mejorar las buenas pr\u00e1cticas en ciberseguridad para el front-end<\/strong><br \/>\n<i>Juan Fernando Angulo Salvador, Danna Sof\u00eda Garc\u00eda Trujillo,<br \/>\nMiguel Andr\u00e9s Sarasti Taguado y Christian Camilo Urcuqui<\/i><\/p>\n<p><strong>5 \/ Adversarial machine learning con enfoque de black-box para mejorar la robustez en modelos de machine learning<\/strong><br \/>\n<i>Alejandro Arce Rend\u00f3n, Alexander Samac\u00e1 Burbano y Christian Camilo Urcuqui<\/i><\/p>\n<p><strong>6 \/ Sistema de detecci\u00f3n de fraude para la pasarela de pagos TuCompra S.A.S con inteligencia artificial<\/strong><br \/>\n<i>Diego Andr\u00e9s Torres Primero y Christian Camilo Urcuqui<\/i><\/p>\n<p>\u00cdndice de tablas<br \/>\n\u00cdndice de figuras<br \/>\nAcr\u00f3nimos<br \/><\/li><li class=\"tab-pane \" id=\"ert_pane1-2\"><ul>\n<li style=\"text-align: justify;\"><b>Luisa Fernanda Quintero Fern\u00e1ndez<\/b>, Universidad Icesi (Cali, Colombia)<\/li>\n<li style=\"text-align: justify;\"><b>Juli\u00e1n Andr\u00e9s Rivera Carrillo<\/b>, Universidad Icesi (Cali, Colombia)<\/li>\n<li style=\"text-align: justify;\"><b>Juan Fernando Angulo Salvador<\/b>, Universidad Icesi (Cali, Colombia)<\/li>\n<li style=\"text-align: justify;\"><b>Danna Garc\u00eda Trujillo<\/b>, Universidad Icesi (Cali, Colombia)<\/li>\n<li style=\"text-align: justify;\"><b>Miguel Andr\u00e9s Sarasti Taguado<\/b>, Universidad Icesi (Cali, Colombia)<\/li>\n<li style=\"text-align: justify;\"><b>Alejandro Arce Rend\u00f3n<\/b>, Universidad Icesi (Cali, Colombia)<\/li>\n<li style=\"text-align: justify;\"><b>Alexander Samac\u00e1 Burbano<\/b>, Universidad Icesi (Cali, Colombia)<\/li>\n<li style=\"text-align: justify;\"><b>Diego Andr\u00e9s Torres Primero<\/b>, Universidad Icesi (Cali, Colombia)<\/li>\n<li style=\"text-align: justify;\"><a href=\"https:\/\/orcid.org\/0000-0002-4627-1477\" target=\"_blank\" title=\"ORCID iD\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1012\" src=\"http:\/\/www.icesi.edu.co\/editorial\/wp-content\/uploads\/2020\/06\/ORCIDiD_icon16x16.png\" style=\"margin-right: 6px;\" alt=\"Icono ORCID\" width=\"16\" height=\"16\"><\/a><b>Christian Camilo Urcuqui<\/b>, Universidad Icesi (Cali, Colombia)<\/li>\n<li style=\"text-align: justify;\"><a href=\"https:\/\/orcid.org\/0000-0002-4154-2119\" target=\"_blank\" title=\"ORCID iD\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1012\" src=\"http:\/\/www.icesi.edu.co\/editorial\/wp-content\/uploads\/2020\/06\/ORCIDiD_icon16x16.png\" style=\"margin-right: 6px;\" alt=\"Icono ORCID\" width=\"16\" height=\"16\"><\/a><b>Andr\u00e9s Navarro Cadavid<\/b>, Universidad Icesi (Cali, Colombia)<\/li>\n<\/ul><\/li><li class=\"tab-pane \" id=\"ert_pane1-3\"><table>\n<tbody>\n<tr class=\"first odd\">\n<th width=\"150\">\n<p style=\"text-align: left;\">T\u00edtulo (ingl\u00e9s):<\/p>\n<\/th>\n<td class=\"data last\">Cybersecurity: data, the seeds of chaos.<\/td>\n<\/tr>\n<tr class=\"even\">\n<th>\n<p style=\"text-align: left;\">DOI\/URL:<\/p>\n<\/th>\n<td class=\"data last\"><a href=\"https:\/\/doi.org\/10.18046\/EUI\/ee.10.2023\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/doi.org\/10.18046\/EUI\/ee.10.2023<\/a><\/td>\n<\/tr>\n<tr class=\"odd\">\n<th>\n<p style=\"text-align: left;\">Editorial(es):<\/p>\n<\/th>\n<td class=\"data last\">Universidad Icesi.<\/td>\n<\/tr>\n<tr class=\"even\">\n<th>\n<p style=\"text-align: left;\">Autor(es):<\/p>\n<\/th>\n<td class=\"data last\">Luisa Fernanda Quintero Fern\u00e1ndez, Juli\u00e1n Andr\u00e9s Rivera Carrillo, Juan Fernando Angulo Salvador, Danna Garc\u00eda Trujillo, Miguel Andr\u00e9s Sarasti Taguado, Alejandro Arce Rend\u00f3n, Alexander Samac\u00e1 Burbano, Diego Andr\u00e9s Torres Primero, Christian Camilo Urcuqui y Andr\u00e9s Navarro Cadavid.<\/td>\n<\/tr>\n<tr class=\"odd\">\n<th>\n<p style=\"text-align: left;\">Palabras clave:<\/p>\n<\/th>\n<td class=\"data last\">Machine learning, Intelligent systems, Cyber security.<\/td>\n<\/tr>\n<tr class=\"even\">\n<th>\n<p style=\"text-align: left;\">ISBN:<\/p>\n<\/th>\n<td class=\"data last\">978-628-7630-15-4.<\/td>\n<\/tr>\n<tr class=\"odd\">\n<th>\n<p style=\"text-align: left;\">Fecha de edici\u00f3n:<\/p>\n<\/th>\n<td class=\"data last\">Septiembre de 2023.<\/td>\n<\/tr>\n<tr class=\"even\">\n<th>\n<p style=\"text-align: left;\">No. de p\u00e1ginas:<\/p>\n<\/th>\n<td class=\"data last\">150.<\/td>\n<\/tr>\n<tr class=\"odd\">\n<th>\n<p style=\"text-align: left;\">Idioma(s):<\/p>\n<\/th>\n<td class=\"data last\">Espa\u00f1ol.<\/td>\n<\/tr>\n<tr class=\"even\">\n<th>\n<p style=\"text-align: left;\">Formato(s):<\/p>\n<\/th>\n<td class=\"data last\">Libro electr\u00f3nico.<\/td>\n<\/tr>\n<tr class=\"odd\">\n<th>\n<p style=\"text-align: left;\">Alto x ancho:<\/p>\n<\/th>\n<td class=\"data last\">24 x 19 cm<\/td>\n<\/tr>\n<tr class=\"even\">\n<th>\n<p style=\"text-align: left;\">Colecci\u00f3n:<\/p>\n<\/th>\n<td class=\"data last\">Edici\u00f3n especial.<\/td>\n<\/tr>\n<tr class=\"odd\">\n<th>\n<p style=\"text-align: left;\">Producto:<\/p>\n<\/th>\n<td class=\"data last\">Libro de divulgaci\u00f3n.<\/td>\n<\/tr>\n<tr class=\"even\">\n<th>\n<p style=\"text-align: left;\">Observaciones:<\/p>\n<\/th>\n<td class=\"data last\">Incluye referencias bibliogr\u00e1ficas.<\/td>\n<\/tr>\n<tr class=\"last odd\">\n<th>\n<p style=\"text-align: left;\">Registro DSpace:<\/p>\n<\/th>\n<td class=\"data last\"><a href=\"https:\/\/doi.org\/10.18046\/EUI\/ee.10.2023\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1012\" src=\"http:\/\/www.icesi.edu.co\/editorial\/wp-content\/uploads\/2016\/04\/downloadIcon-e1460499009176.png\" alt=\"Icono de Repositorio - Contenido en la Nube\" width=\"25\" height=\"25\"><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table><\/li><\/ul><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>T\u00edtulo completo: Ciberseguridad: los datos, las semillas del caos. Coordinadores: Christian Camilo Urcuqui y Andr\u00e9s Navarro Cadavid. Autores: Luisa Fernanda Quintero Fern\u00e1ndez, Juli\u00e1n Andr\u00e9s Rivera Carrillo, Juan Fernando Angulo Salvador, Danna Garc\u00eda Trujillo, Miguel Andr\u00e9s Sarasti Taguado, Alejandro Arce Rend\u00f3n, Alexander Samac\u00e1 Burbano, Diego Andr\u00e9s Torres Primero, Christian Camilo Urcuqui y Andr\u00e9s Navarro Cadavid. Editoriales: [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":7421,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[166],"tags":[465,530,532,534,727,737,838,870,871,874,903,906],"class_list":["post-7418","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ediciones-especiales","tag-descarga-gratuita","tag-ciberseguridad","tag-seguridad-informatica","tag-andres-navarro-cadavid","tag-libro-de-divulgacion","tag-machine-learning","tag-838","tag-christian-urcuqui","tag-cibercrimen","tag-filcali-2023","tag-fidca","tag-fidca-2"],"_links":{"self":[{"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/posts\/7418","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/comments?post=7418"}],"version-history":[{"count":7,"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/posts\/7418\/revisions"}],"predecessor-version":[{"id":8315,"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/posts\/7418\/revisions\/8315"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/media\/7421"}],"wp:attachment":[{"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/media?parent=7418"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/categories?post=7418"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.icesi.edu.co\/editorial\/wp-json\/wp\/v2\/tags?post=7418"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}