{"id":31601,"date":"2016-10-06T11:20:03","date_gmt":"2016-10-06T11:20:03","guid":{"rendered":"https:\/\/partners.sngular.com\/atlassian\/?p=31601"},"modified":"2026-02-12T12:44:05","modified_gmt":"2026-02-12T11:44:05","slug":"que-es-un-vector-ataque-ciberseguridad","status":"publish","type":"post","link":"https:\/\/partners.sngular.com\/atlassian\/que-es-un-vector-ataque-ciberseguridad\/","title":{"rendered":"\u00bfQu\u00e9 es un vector de ataque en ciberseguridad?"},"content":{"rendered":"\n<div class=\"bloque-blog-head\">\n    <div class=\"bloque-blog-head-background\" style=\"background-image: url(https:\/\/partners.sngular.com\/atlassian\/wp-content\/uploads\/2021\/03\/vectores_ataque_portada.jpg);\">\n        <div class=\"bloque-blog-titulo\">\n            <h1 class=\"\" style=\"text-align: center\">\u00bfQu\u00e9 es un vector de ataque en ciberseguridad?<\/h1>\n        <\/div>\n    <\/div>\n    <div class=\"bloque-blog-info\">\n    <\/div>\n<\/div>\n\n<div class=\"style_parrafo_normal_bb text-justify text-medium line-height-28 xs-line-height-26\">\n<p>Partiendo de la base de que un <strong>vector de ataque<\/strong> no es m\u00e1s que la <strong>ruta o camino que utiliza un atacante<\/strong> para tener acceso al activo objetivo de ataque, es decir, los pasos que el atacante sigue para materializar la amenaza, se intuye que cada atacante sigue su propia \u00a8estrategia\u00a8 para poder consumar su objetivo, sin embargo, podemos reconocer algunas <strong>actividades de car\u00e1cter general<\/strong> que los mismos <strong>pueden estar llevando a cabo<\/strong>.<\/p>\n<p>De manera general un vector de ataque estar\u00eda <strong>conformado por las siguientes actividades<\/strong>:<\/p>\n<ul>\n<li>Realizar un reconocimiento del punto objetivo de ataque, utilizando sniffing, ejecutando malware o ingenier\u00eda social, por ejemplo.<\/li>\n<li>Crear herramientas de ataque necesarias para llevar el mismo.<\/li>\n<li>Desplegar o instalar las capacidades maliciosas en el activo seleccionado, que son necesarias para llevar a cabo el ataque.<\/li>\n<li>Explotar la amenaza sobre las vulnerabilidades y comprometer la informaci\u00f3n del atacado.<\/li>\n<li>Consumar el ataque, a bien de interferir con las actividades de la organizaci\u00f3n o activo, que ha sido el punto objetivo del ataque.<\/li>\n<li>Recolectar informaci\u00f3n, para provocar un impacto adverso y obtener acceso no autorizado a sistemas o informaci\u00f3n sensible; crear, corromper o eliminar datos cr\u00edticos.<\/li>\n<li>Mantener la presencia del atacante para continuar seguir atacando.<\/li>\n<li>Mutiplicar los ataques.<\/li>\n<\/ul>\n<p>Es importante reconocer que un vector de ataque podr\u00eda estar conformado por\u00a0<strong>m\u00e1s de una amenaza<\/strong>, y que algunos pasos de ese vector de ataque podr\u00edan incluso <strong>no ser maliciosos<\/strong> del todo, como por ejemplo en la obtenci\u00f3n de informaci\u00f3n a trav\u00e9s de la ingenier\u00eda social, donde el atacante se aprovecha de la ingenuidad de la persona.<\/p>\n<div class=\"p\">\n            <strong>TecnoFor<\/strong> - 6 de October de 2016\n            \/ Comparte:<style>\r\n.tnf_share#tnfShare68371 {\r\n    display: inline-block;\r\n    padding: 0 0.5rem;\r\n    font-size: 18px;\r\n}\r\n#tnfShare68371 .tnf_share_net {\r\n    display: inline-block;\r\n    padding: 0 0.5rem;\r\n    position: relative;\r\n}\r\n#tnfShare68371 img {\r\n    width: 18px;\r\n    height: 18px;\r\n}\r\n#tnfShare68371 .tnf_share_net i {\r\n    vertical-align: middle;\r\n}\r\n#tnfShare68371 .special-copy-icon {\r\n    font-size: 16px;\r\n}\r\n#tnfShare68371 .tnf_share_net a, .as-linkable {\r\n    color: #6f6f6f !important;\r\n    cursor: pointer;\r\n}\r\n.tnf_share_net a:hover, .as-linkable:hover {\r\n    color: #465ea2 !important;\r\n}\r\n#tnfShare68371 .tnf_share_copy_info {\r\n    font-size: 12px !important;\r\n    background-color: #202a4488;\r\n    color: #fff;\r\n    padding: 0.5rem 1rem;\r\n    position: absolute;\r\n    width: max-content;\r\n    left: 0;\r\n    bottom: 42px;\r\n    border-radius: 2px;\r\n}\r\n<\/style>\r\n<div class=\"tnf_share\" id=\"tnfShare68371\"><div class=\"tnf_share_net linkedin-in\" id=\"linkedinin_tnfShare68371\" title=\"Compartir en LinkedIn\">\r\n    <a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fpartners.sngular.com%2Fatlassian%2Fwp-json%2Fwp%2Fv2%2Fposts%2F31601\" target=\"_blank\" rel=\"noopener noreferrer\"><i class=\"fab fa-linkedin-in\"><\/i><\/a>\r\n<\/div><div class=\"tnf_share_net twitter\" id=\"twitter_tnfShare68371\" title=\"Compartir en Twitter\">\r\n    <a href=\"https:\/\/twitter.com\/intent\/tweet?text=%C2%BFQu%C3%A9%20es%20un%20vector%20de%20ataque%20en%20ciberseguridad%3F&amp;url=https%3A%2F%2Fpartners.sngular.com%2Fatlassian%2Fwp-json%2Fwp%2Fv2%2Fposts%2F31601&amp;related=Tecnofor%3ATecnofor\" target=\"_blank\" rel=\"noopener noreferrer\"><i class=\"fab fa-twitter\"><\/i><\/a>\r\n<\/div><div class=\"tnf_share_net whatsapp\" id=\"whatsapp_tnfShare68371\" title=\"Compartir en WhatsApp\">\r\n    <a href=\" https:\/\/wa.me\/?text=%C2%BFQu%C3%A9+es+un+vector+de+ataque+en+ciberseguridad%3F%0A%0Ahttps%3A%2F%2Fpartners.sngular.com%2Fatlassian%2Fwp-json%2Fwp%2Fv2%2Fposts%2F31601\" target=\"_blank\" rel=\"noopener noreferrer\"><i class=\"fab fa-whatsapp\"><\/i><\/a>\r\n<\/div><div class=\"tnf_share_net copy\" id=\"copy_tnfShare68371\" title=\"Copiar al portapapeles\">\r\n    <i class=\"fa fa-copy as-linkable special-copy-icon\"><\/i>\r\n    <div class=\"tnf_share_copy_info hide\" id=\"infocopy_tnfShare68371\"><\/div>\r\n<\/div>\r\n<script type=\"text\/javascript\">\r\n    jQuery(function() {\r\n        jQuery(\"#copy_tnfShare68371\").on('click', function(e) {\r\n            e.preventDefault();\r\n            navigator.clipboard.writeText( \"https:\\\/\\\/partners.sngular.com\\\/atlassian\\\/wp-json\\\/wp\\\/v2\\\/posts\\\/31601\" ).then(() => {\r\n                jQuery(\"#infocopy_tnfShare68371\").html('<i class=\"fas fa-check\"><\/i> Se ha copiado al portapapeles').removeClass('hide');\r\n                window.setTimeout(() => { jQuery(\"#infocopy_tnfShare68371\").addClass('hide'); }, 3000);\r\n            }, () => {\r\n                jQuery(\"#infocopy_tnfShare68371\").html('<i class=\"fas fa-times\"><\/i> Algo ha fallado y no se pudo copiar').removeClass('hide');\r\n                window.setTimeout(() => { jQuery(\"#infocopy_tnfShare68371\").addClass('hide'); }, 3000)\r\n            });\r\n        })\r\n    });\r\n<\/script><\/div>\n        <\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Partiendo de la base de que un vector de ataque no es m\u00e1s que la ruta o camino que utiliza un atacante para tener acceso al activo objetivo de ataque, es decir, los pasos que el atacante sigue para materializar la amenaza, se intuye que cada atacante sigue su propia \u00a8estrategia\u00a8 para poder consumar su objetivo, sin embargo, podemos reconocer algunas actividades de car\u00e1cter general que los mismos pueden estar llevando a cabo. De manera general un vector de ataque estar\u00eda conformado por las siguientes actividades: Realizar un reconocimiento del punto objetivo de ataque, utilizando sniffing, ejecutando malware o ingenier\u00eda social, por ejemplo. Crear herramientas de ataque necesarias para llevar el mismo. Desplegar o instalar las capacidades maliciosas en el activo seleccionado, que son necesarias para llevar a cabo el ataque. Explotar la amenaza sobre las vulnerabilidades y comprometer la informaci\u00f3n del atacado. Consumar el ataque, a bien de interferir con las actividades de la organizaci\u00f3n o activo, que ha sido el punto objetivo del ataque. Recolectar informaci\u00f3n, para provocar un impacto adverso y obtener acceso no autorizado a sistemas o informaci\u00f3n sensible; crear, corromper o eliminar datos cr\u00edticos. Mantener la presencia del atacante para continuar seguir atacando. Mutiplicar los&#8230;<\/p>\n","protected":false},"author":1,"featured_media":31603,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"image","meta":{"inline_featured_image":false,"footnotes":""},"categories":[261],"tags":[],"class_list":["post-31601","post","type-post","status-publish","format-image","has-post-thumbnail","hentry","category-blog-rovo-e-inteligencia-artificial","post_format-post-format-image"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u00bfQu\u00e9 es un vector de ataque en ciberseguridad? - Atlassian Sngular<\/title>\n<meta name=\"description\" content=\"En esta entrada hablamos de todo lo b\u00e1sico que necesitas conocer sobre las distintas formas de iniciarse un ciberataque\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/partners.sngular.com\/atlassian\/que-es-un-vector-ataque-ciberseguridad\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u00bfQu\u00e9 es un vector de ataque en ciberseguridad? - Atlassian Sngular\" \/>\n<meta property=\"og:description\" content=\"En esta entrada hablamos de todo lo b\u00e1sico que necesitas conocer sobre las distintas formas de iniciarse un ciberataque\" \/>\n<meta property=\"og:url\" content=\"https:\/\/partners.sngular.com\/atlassian\/que-es-un-vector-ataque-ciberseguridad\/\" \/>\n<meta property=\"og:site_name\" content=\"Atlassian Sngular\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-06T11:20:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-12T11:44:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/partners.sngular.com\/atlassian\/wp-content\/uploads\/2021\/03\/vectores_ataque_portada.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TecnoFor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/partners.sngular.com\/atlassian\/que-es-un-vector-ataque-ciberseguridad\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/partners.sngular.com\/atlassian\/que-es-un-vector-ataque-ciberseguridad\/\"},\"author\":{\"name\":\"TecnoFor\",\"@id\":\"https:\/\/partners.sngular.com\/atlassian\/#\/schema\/person\/340a49bf42a921b69453aee44818c1de\"},\"headline\":\"\u00bfQu\u00e9 es un vector de ataque en ciberseguridad?\",\"datePublished\":\"2016-10-06T11:20:03+00:00\",\"dateModified\":\"2026-02-12T11:44:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/partners.sngular.com\/atlassian\/que-es-un-vector-ataque-ciberseguridad\/\"},\"wordCount\":290,\"publisher\":{\"@id\":\"https:\/\/partners.sngular.com\/atlassian\/#organization\"},\"image\":{\"@id\":\"https:\/\/partners.sngular.com\/atlassian\/que-es-un-vector-ataque-ciberseguridad\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/partners.sngular.com\/atlassian\/wp-content\/uploads\/2021\/03\/vectores_ataque_portada.jpg\",\"articleSection\":[\"Rovo &amp; IA\"],\"inLanguage\":\"es-ES\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/partners.sngular.com\/atlassian\/que-es-un-vector-ataque-ciberseguridad\/\",\"url\":\"https:\/\/partners.sngular.com\/atlassian\/que-es-un-vector-ataque-ciberseguridad\/\",\"name\":\"\u00bfQu\u00e9 es un vector de ataque en ciberseguridad? - Atlassian Sngular\",\"isPartOf\":{\"@id\":\"https:\/\/partners.sngular.com\/atlassian\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/partners.sngular.com\/atlassian\/que-es-un-vector-ataque-ciberseguridad\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/partners.sngular.com\/atlassian\/que-es-un-vector-ataque-ciberseguridad\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/partners.sngular.com\/atlassian\/wp-content\/uploads\/2021\/03\/vectores_ataque_portada.jpg\",\"datePublished\":\"2016-10-06T11:20:03+00:00\",\"dateModified\":\"2026-02-12T11:44:05+00:00\",\"description\":\"En esta entrada hablamos de todo lo b\u00e1sico que necesitas conocer sobre las distintas formas de iniciarse un ciberataque\",\"breadcrumb\":{\"@id\":\"https:\/\/partners.sngular.com\/atlassian\/que-es-un-vector-ataque-ciberseguridad\/#breadcrumb\"},\"inLanguage\":\"es-ES\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/partners.sngular.com\/atlassian\/que-es-un-vector-ataque-ciberseguridad\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/partners.sngular.com\/atlassian\/que-es-un-vector-ataque-ciberseguridad\/#primaryimage\",\"url\":\"https:\/\/partners.sngular.com\/atlassian\/wp-content\/uploads\/2021\/03\/vectores_ataque_portada.jpg\",\"contentUrl\":\"https:\/\/partners.sngular.com\/atlassian\/wp-content\/uploads\/2021\/03\/vectores_ataque_portada.jpg\",\"width\":400,\"height\":300,\"caption\":\"vectores_ataque_portada\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/partners.sngular.com\/atlassian\/que-es-un-vector-ataque-ciberseguridad\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/partners.sngular.com\/atlassian\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u00bfQu\u00e9 es un vector de ataque en ciberseguridad?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/partners.sngular.com\/atlassian\/#website\",\"url\":\"https:\/\/partners.sngular.com\/atlassian\/\",\"name\":\"Atlassian Sngular\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/partners.sngular.com\/atlassian\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/partners.sngular.com\/atlassian\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es-ES\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/partners.sngular.com\/atlassian\/#organization\",\"name\":\"TecnoFor\",\"url\":\"https:\/\/partners.sngular.com\/atlassian\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/partners.sngular.com\/atlassian\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/partners.sngular.com\/atlassian\/wp-content\/uploads\/2022\/03\/Logo-Tecnofor-2022-grande-color-transparente-16-9.png\",\"contentUrl\":\"https:\/\/partners.sngular.com\/atlassian\/wp-content\/uploads\/2022\/03\/Logo-Tecnofor-2022-grande-color-transparente-16-9.png\",\"width\":1123,\"height\":632,\"caption\":\"TecnoFor\"},\"image\":{\"@id\":\"https:\/\/partners.sngular.com\/atlassian\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/partners.sngular.com\/atlassian\/#\/schema\/person\/340a49bf42a921b69453aee44818c1de\",\"name\":\"TecnoFor\",\"sameAs\":[\"https:\/\/partners.sngular.com\/atlassian\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u00bfQu\u00e9 es un vector de ataque en ciberseguridad? - Atlassian Sngular","description":"En esta entrada hablamos de todo lo b\u00e1sico que necesitas conocer sobre las distintas formas de iniciarse un ciberataque","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/partners.sngular.com\/atlassian\/que-es-un-vector-ataque-ciberseguridad\/","og_locale":"es_ES","og_type":"article","og_title":"\u00bfQu\u00e9 es un vector de ataque en ciberseguridad? - Atlassian Sngular","og_description":"En esta entrada hablamos de todo lo b\u00e1sico que necesitas conocer sobre las distintas formas de iniciarse un ciberataque","og_url":"https:\/\/partners.sngular.com\/atlassian\/que-es-un-vector-ataque-ciberseguridad\/","og_site_name":"Atlassian Sngular","article_published_time":"2016-10-06T11:20:03+00:00","article_modified_time":"2026-02-12T11:44:05+00:00","og_image":[{"width":400,"height":300,"url":"https:\/\/partners.sngular.com\/atlassian\/wp-content\/uploads\/2021\/03\/vectores_ataque_portada.jpg","type":"image\/jpeg"}],"author":"TecnoFor","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/partners.sngular.com\/atlassian\/que-es-un-vector-ataque-ciberseguridad\/#article","isPartOf":{"@id":"https:\/\/partners.sngular.com\/atlassian\/que-es-un-vector-ataque-ciberseguridad\/"},"author":{"name":"TecnoFor","@id":"https:\/\/partners.sngular.com\/atlassian\/#\/schema\/person\/340a49bf42a921b69453aee44818c1de"},"headline":"\u00bfQu\u00e9 es un vector de ataque en ciberseguridad?","datePublished":"2016-10-06T11:20:03+00:00","dateModified":"2026-02-12T11:44:05+00:00","mainEntityOfPage":{"@id":"https:\/\/partners.sngular.com\/atlassian\/que-es-un-vector-ataque-ciberseguridad\/"},"wordCount":290,"publisher":{"@id":"https:\/\/partners.sngular.com\/atlassian\/#organization"},"image":{"@id":"https:\/\/partners.sngular.com\/atlassian\/que-es-un-vector-ataque-ciberseguridad\/#primaryimage"},"thumbnailUrl":"https:\/\/partners.sngular.com\/atlassian\/wp-content\/uploads\/2021\/03\/vectores_ataque_portada.jpg","articleSection":["Rovo &amp; IA"],"inLanguage":"es-ES"},{"@type":"WebPage","@id":"https:\/\/partners.sngular.com\/atlassian\/que-es-un-vector-ataque-ciberseguridad\/","url":"https:\/\/partners.sngular.com\/atlassian\/que-es-un-vector-ataque-ciberseguridad\/","name":"\u00bfQu\u00e9 es un vector de ataque en ciberseguridad? - Atlassian Sngular","isPartOf":{"@id":"https:\/\/partners.sngular.com\/atlassian\/#website"},"primaryImageOfPage":{"@id":"https:\/\/partners.sngular.com\/atlassian\/que-es-un-vector-ataque-ciberseguridad\/#primaryimage"},"image":{"@id":"https:\/\/partners.sngular.com\/atlassian\/que-es-un-vector-ataque-ciberseguridad\/#primaryimage"},"thumbnailUrl":"https:\/\/partners.sngular.com\/atlassian\/wp-content\/uploads\/2021\/03\/vectores_ataque_portada.jpg","datePublished":"2016-10-06T11:20:03+00:00","dateModified":"2026-02-12T11:44:05+00:00","description":"En esta entrada hablamos de todo lo b\u00e1sico que necesitas conocer sobre las distintas formas de iniciarse un ciberataque","breadcrumb":{"@id":"https:\/\/partners.sngular.com\/atlassian\/que-es-un-vector-ataque-ciberseguridad\/#breadcrumb"},"inLanguage":"es-ES","potentialAction":[{"@type":"ReadAction","target":["https:\/\/partners.sngular.com\/atlassian\/que-es-un-vector-ataque-ciberseguridad\/"]}]},{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/partners.sngular.com\/atlassian\/que-es-un-vector-ataque-ciberseguridad\/#primaryimage","url":"https:\/\/partners.sngular.com\/atlassian\/wp-content\/uploads\/2021\/03\/vectores_ataque_portada.jpg","contentUrl":"https:\/\/partners.sngular.com\/atlassian\/wp-content\/uploads\/2021\/03\/vectores_ataque_portada.jpg","width":400,"height":300,"caption":"vectores_ataque_portada"},{"@type":"BreadcrumbList","@id":"https:\/\/partners.sngular.com\/atlassian\/que-es-un-vector-ataque-ciberseguridad\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/partners.sngular.com\/atlassian\/"},{"@type":"ListItem","position":2,"name":"\u00bfQu\u00e9 es un vector de ataque en ciberseguridad?"}]},{"@type":"WebSite","@id":"https:\/\/partners.sngular.com\/atlassian\/#website","url":"https:\/\/partners.sngular.com\/atlassian\/","name":"Atlassian Sngular","description":"","publisher":{"@id":"https:\/\/partners.sngular.com\/atlassian\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/partners.sngular.com\/atlassian\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es-ES"},{"@type":"Organization","@id":"https:\/\/partners.sngular.com\/atlassian\/#organization","name":"TecnoFor","url":"https:\/\/partners.sngular.com\/atlassian\/","logo":{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/partners.sngular.com\/atlassian\/#\/schema\/logo\/image\/","url":"https:\/\/partners.sngular.com\/atlassian\/wp-content\/uploads\/2022\/03\/Logo-Tecnofor-2022-grande-color-transparente-16-9.png","contentUrl":"https:\/\/partners.sngular.com\/atlassian\/wp-content\/uploads\/2022\/03\/Logo-Tecnofor-2022-grande-color-transparente-16-9.png","width":1123,"height":632,"caption":"TecnoFor"},"image":{"@id":"https:\/\/partners.sngular.com\/atlassian\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/partners.sngular.com\/atlassian\/#\/schema\/person\/340a49bf42a921b69453aee44818c1de","name":"TecnoFor","sameAs":["https:\/\/partners.sngular.com\/atlassian"]}]}},"meta_box":[],"_links":{"self":[{"href":"https:\/\/partners.sngular.com\/atlassian\/wp-json\/wp\/v2\/posts\/31601","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/partners.sngular.com\/atlassian\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/partners.sngular.com\/atlassian\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/partners.sngular.com\/atlassian\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/partners.sngular.com\/atlassian\/wp-json\/wp\/v2\/comments?post=31601"}],"version-history":[{"count":3,"href":"https:\/\/partners.sngular.com\/atlassian\/wp-json\/wp\/v2\/posts\/31601\/revisions"}],"predecessor-version":[{"id":40330,"href":"https:\/\/partners.sngular.com\/atlassian\/wp-json\/wp\/v2\/posts\/31601\/revisions\/40330"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/partners.sngular.com\/atlassian\/wp-json\/wp\/v2\/media\/31603"}],"wp:attachment":[{"href":"https:\/\/partners.sngular.com\/atlassian\/wp-json\/wp\/v2\/media?parent=31601"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/partners.sngular.com\/atlassian\/wp-json\/wp\/v2\/categories?post=31601"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/partners.sngular.com\/atlassian\/wp-json\/wp\/v2\/tags?post=31601"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}