{"id":1570,"date":"2020-04-24T21:34:54","date_gmt":"2020-04-25T00:34:54","guid":{"rendered":"https:\/\/cemcc.ufro.cl\/beta\/?page_id=1570"},"modified":"2024-10-17T22:40:56","modified_gmt":"2024-10-18T01:40:56","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/cemcc.ufro.cl\/index.php\/lineas-de-investigacion\/cybersecurity\/","title":{"rendered":"cybersecurity"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"1570\" class=\"elementor elementor-1570\" data-elementor-settings=\"[]\">\n\t\t\t\t\t\t<div class=\"elementor-inner\">\n\t\t\t\t\t\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4e18fde elementor-section-full_width elementor-section-stretched elementor-reverse-tablet elementor-reverse-mobile elementor-section-height-default elementor-section-height-default\" data-id=\"4e18fde\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a3fb090\" data-id=\"a3fb090\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-f1ed034 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"f1ed034\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-629a9c0\" data-id=\"629a9c0\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2183a78 elementor-widget elementor-widget-heading\" data-id=\"2183a78\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">ciberseguridad<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-64462ca\" data-id=\"64462ca\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-63ba16a elementor-widget elementor-widget-text-editor\" data-id=\"63ba16a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>Dr. Julio L\u00f3pez Fenner<\/p><p><span style=\"font-size: 1rem;\">julio.lopez@ufrontera.cl<\/span><\/p><p><span style=\"font-size: 1rem;\">+56 45 2325926<br \/><\/span><\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1385471 elementor-section-full_width elementor-reverse-tablet elementor-reverse-mobile elementor-section-stretched elementor-section-height-default elementor-section-height-default\" data-id=\"1385471\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-d22fe31\" data-id=\"d22fe31\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7a910ab elementor-widget elementor-widget-image\" data-id=\"7a910ab\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-image\">\n\t\t\t\t\t\t\t\t\t\t\t\t<img width=\"300\" height=\"300\" src=\"https:\/\/cemcc.ufro.cl\/wp-content\/uploads\/2020\/04\/iconos300x300px_Mesa-de-trabajo-1-copia-2-300x300.png\" class=\"attachment-medium size-medium\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/cemcc.ufro.cl\/wp-content\/uploads\/2020\/04\/iconos300x300px_Mesa-de-trabajo-1-copia-2-300x300.png 300w, https:\/\/cemcc.ufro.cl\/wp-content\/uploads\/2020\/04\/iconos300x300px_Mesa-de-trabajo-1-copia-2-150x150.png 150w, https:\/\/cemcc.ufro.cl\/wp-content\/uploads\/2020\/04\/iconos300x300px_Mesa-de-trabajo-1-copia-2-600x599.png 600w, https:\/\/cemcc.ufro.cl\/wp-content\/uploads\/2020\/04\/iconos300x300px_Mesa-de-trabajo-1-copia-2-100x100.png 100w, https:\/\/cemcc.ufro.cl\/wp-content\/uploads\/2020\/04\/iconos300x300px_Mesa-de-trabajo-1-copia-2.png 626w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-5d61912\" data-id=\"5d61912\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-46577ba elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"46577ba\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-e44d67c\" data-id=\"e44d67c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-37aa5b2 elementor-widget elementor-widget-heading\" data-id=\"37aa5b2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Colaboradores<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3d5c71d\" data-id=\"3d5c71d\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c5eaf39 elementor-widget elementor-widget-text-editor\" data-id=\"c5eaf39\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<ol><li>Dr. Julio L\u00f3pez Fenner:\u00a0 Criptograf\u00eda, Multiparty Computation y Modelaci\u00f3n Matem\u00e1tica<\/li><li>\u00a0Dr. Carlos Cares: Modelos de anticipaci\u00f3n, Ingenier\u00eda de software para seguridad, Cyberdefensa proactiva.<\/li><li>Ing. Paulo Colom\u00e9s: Redes y Proof of Concept para seguridad en Infraestructuras inform\u00e1ticas<\/li><li>Dra. Ania Cravero: BigData y CyberSec.<\/li><li>Ing. Mauricio Di\u00e9guez: Gesti\u00f3n de CyberSec y Normas<\/li><li>Dr. Samuel Sep\u00falveda: Ingenier\u00eda de requerimientos para CyberSec<\/li><li>Dra. Hellen Pachecho Castillo: Derecho Inform\u00e1tico<\/li><li>Ing. Raphael Verdugo Pincheira : Unix SysAdmin\/Blue Team\u00a0<\/li><\/ol>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-dcd8110 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"dcd8110\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-4fa1a1f\" data-id=\"4fa1a1f\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-58ffb39 elementor-widget elementor-widget-heading\" data-id=\"58ffb39\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Objetivos<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-beefc35\" data-id=\"beefc35\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-79f8d33 elementor-widget elementor-widget-text-editor\" data-id=\"79f8d33\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<p>El CyberSecurity Workgroup es una iniciativa acad\u00e9mica cient\u00edfica multidisciplinaria adscrita como l\u00ednea de investigaci\u00f3n \/desarrollo del Centro de Modelaci\u00f3n y Computaci\u00f3n Cient\u00edfica, CMCC, convocada para abordar los desaf\u00edos presentes y futuros en CIBERSEGURIDAD que imponen los de desarrollos modernos en infraestructura computacional y de comunicaciones. Sus integrantes provienen de distintas \u00e1reas de la Academia y mundo empresarial, entre las que se cuentan:\u00a0 Modelaci\u00f3n Matem\u00e1tica, Inform\u00e1tica, Ciencia de Datos, Ciencia jur\u00eddica y se re\u00fanen entorno a algunos ejes tem\u00e1ticos principales: Criptosistemas y Multiparty Computation, Seguridad de sistemas Ciberf\u00edsicos, Desarrollo de Software Ciberseguro, BigData, Derecho inform\u00e1tico, en vinculaci\u00f3n con instituciones Acad\u00e9micas Nacionales e Internacionales y Empresas.<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-db1c98f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"db1c98f\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-350d4e5\" data-id=\"350d4e5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8514aed elementor-widget elementor-widget-heading\" data-id=\"8514aed\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Trabajo Actual<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-f58b5e8\" data-id=\"f58b5e8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d133414 elementor-widget elementor-widget-text-editor\" data-id=\"d133414\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<ol><li>Criptograf\u00eda y Multy Party Computation<\/li><li>Modelos matem\u00e1ticos para preservaci\u00f3n de la integridad de los datos y garantizar disponibilidad y autentificaci\u00f3n en sistemas computacionales<\/li><li>Ciberdefensa Proactiva<\/li><li>Estrategias y buenas pr\u00e1cticas para la seguridad de instalaciones computacionales y los servicios que ellas proveen.<\/li><li>Optimizaci\u00f3n en CiberSeguridad<\/li><li>Planificaci\u00f3n autom\u00e1tica de medidas de Ciberseguridad<\/li><\/ol>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-d4661f7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d4661f7\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-c719467\" data-id=\"c719467\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-30021c4 elementor-widget elementor-widget-heading\" data-id=\"30021c4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">servicios<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-0a998ff\" data-id=\"0a998ff\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-aa43e12 elementor-widget elementor-widget-text-editor\" data-id=\"aa43e12\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<ol><li><strong>Sector privado:\u00a0\u00a0<\/strong>Evaluaci\u00f3n de Vulnerabilidades seg\u00fan el est\u00e1ndar ISO\/IEC 27000 sobre normas internacionales de seguridad de la informaci\u00f3n<\/li><li><b>Sector p\u00fablico:<\/b>\u00a0 Cumplimiento de Norma del Decreto Supremo 83 (2005) que obliga a unidades del Estado a seguir procedimientos internacionales de Ciberseguridad<\/li><li><strong>Sector p\u00fablico o privado:\u00a0\u00a0<\/strong>\u00a0Consultor\u00eda en Gesti\u00f3n Segura de Sitios Web<\/li><\/ol>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4e520ae elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4e520ae\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-7e8fc59\" data-id=\"7e8fc59\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0220a46 elementor-widget elementor-widget-heading\" data-id=\"0220a46\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">socios estrat\u00e9gicos<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-e054913\" data-id=\"e054913\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e3067c0 elementor-widget elementor-widget-text-editor\" data-id=\"e3067c0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<ol><li>REUNA<\/li>\n<li>NIS-CHILE<\/li><\/ol>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>ciberseguridad Dr. Julio L\u00f3pez Fenner julio.lopez@ufrontera.cl +56 45 2325926 Colaboradores Dr. Julio L\u00f3pez Fenner:\u00a0 Criptograf\u00eda, Multiparty Computation y Modelaci\u00f3n Matem\u00e1tica \u00a0Dr. Carlos Cares: Modelos de anticipaci\u00f3n, Ingenier\u00eda de software para seguridad, Cyberdefensa proactiva. Ing. Paulo Colom\u00e9s: Redes y Proof of Concept para seguridad en Infraestructuras inform\u00e1ticas Dra. Ania Cravero: BigData y CyberSec. Ing. Mauricio Di\u00e9guez: [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":726,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"full-width.php","meta":[],"_links":{"self":[{"href":"https:\/\/cemcc.ufro.cl\/index.php\/wp-json\/wp\/v2\/pages\/1570"}],"collection":[{"href":"https:\/\/cemcc.ufro.cl\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cemcc.ufro.cl\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cemcc.ufro.cl\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cemcc.ufro.cl\/index.php\/wp-json\/wp\/v2\/comments?post=1570"}],"version-history":[{"count":194,"href":"https:\/\/cemcc.ufro.cl\/index.php\/wp-json\/wp\/v2\/pages\/1570\/revisions"}],"predecessor-version":[{"id":3078,"href":"https:\/\/cemcc.ufro.cl\/index.php\/wp-json\/wp\/v2\/pages\/1570\/revisions\/3078"}],"up":[{"embeddable":true,"href":"https:\/\/cemcc.ufro.cl\/index.php\/wp-json\/wp\/v2\/pages\/726"}],"wp:attachment":[{"href":"https:\/\/cemcc.ufro.cl\/index.php\/wp-json\/wp\/v2\/media?parent=1570"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}