{"id":31025,"date":"2023-04-11T09:32:39","date_gmt":"2023-04-11T14:32:39","guid":{"rendered":"https:\/\/colombiainteligente.org\/?p=31025"},"modified":"2023-04-11T09:34:16","modified_gmt":"2023-04-11T14:34:16","slug":"the-national-cyber-force-responsible-cyber-power-in-practice","status":"publish","type":"post","link":"https:\/\/colombiainteligente.org\/es_co\/tendencias\/the-national-cyber-force-responsible-cyber-power-in-practice\/","title":{"rendered":"The National Cyber Force: Responsible Cyber Power in Practice"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"31025\" class=\"elementor elementor-31025\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-87c6aa2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"87c6aa2\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-558bb819\" data-id=\"558bb819\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3067325c elementor-widget elementor-widget-text-editor\" data-id=\"3067325c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.14.0 - 26-06-2023 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p><span data-contrast=\"auto\">El ciberespacio y la tecnolog\u00eda digital son una parte fundamental de la vida cotidiana. Son fundamentales para comunicarse entre las personas, comprender lo que ocurre en el mundo, hacer negocios y disfrutar del tiempo libre. Tambi\u00e9n son fundamentales para el funcionamiento de los gobiernos y las fuerzas armadas de todo el mundo.\u00a0<\/span><span data-contrast=\"auto\">Una consecuencia inevitable de esta revoluci\u00f3n digital es que el ciberespacio es un entorno importante en el que se juegan cada vez m\u00e1s los problemas de seguridad mundial. En la era digital actual, la capacidad del Reino Unido para operar con seguridad y eficacia en el ciberespacio se ha convertido en algo necesario para alcanzar los objetivos nacionales. Al mismo tiempo, los adversarios del Reino Unido, incluidas las amenazas estatales y los agentes no estatales, utilizan cada vez m\u00e1s el ciberespacio y la tecnolog\u00eda digital para hacer da\u00f1o. El Gobierno cree que el Reino Unido no puede dejar que el ciberespacio sea un espacio incontestado en el que los adversarios operen con impunidad. E<\/span><span data-contrast=\"auto\">l Gobierno brit\u00e1nico estableci\u00f3 la intenci\u00f3n de tener la capacidad de emprender acciones cibern\u00e9ticas disruptivas que exploten la propia dependencia de un adversario de la tecnolog\u00eda digital. Tambi\u00e9n se comprometi\u00f3 a dar forma a nuevas normas para que las\u00a0ciberherramientas\u00a0ofensivas se desarrollen y utilicen de forma responsable, de acuerdo con el derecho internacional y teniendo debidamente en cuenta normas voluntarias y no vinculantes.\u00a0<\/span><span data-contrast=\"auto\">El siguiente informe destaca la importancia de la cooperaci\u00f3n internacional en la promoci\u00f3n de un uso responsable del poder cibern\u00e9tico y se mencionan algunas iniciativas internacionales relevantes en este \u00e1mbito. Tambi\u00e9n se aborda la necesidad de construir una cultura de responsabilidad en torno al uso del poder cibern\u00e9tico.\u00a0<\/span><span data-contrast=\"auto\">En conclusi\u00f3n, el informe subraya la importancia de un enfoque responsable para el uso del poder cibern\u00e9tico y proporciona una gu\u00eda para los estados sobre c\u00f3mo abordar los desaf\u00edos que plantea el ciberespacio. Se destacan la necesidad de claridad de los objetivos, la proporcionalidad en la respuesta a las amenazas cibern\u00e9ticas, la cooperaci\u00f3n internacional y la construcci\u00f3n de una cultura de responsabilidad.<\/span>\u00a0<\/p><p>\u00a0<span data-contrast=\"auto\">El\u00a0informe\u00a0consta\u00a0de 7\u00a0secciones,\u00a0en\u00a0resumen, la\u00a0secci\u00f3n\u00a01\u00a0<\/span><span data-contrast=\"auto\">discute\u00a0la\u00a0importancia\u00a0de\u00a0tener\u00a0objetivos\u00a0claros al\u00a0utilizar\u00a0el\u00a0poder\u00a0cibern\u00e9tico\u00a0y se\u00a0proporcionan\u00a0algunos\u00a0ejemplos. La\u00a0secci\u00f3n\u00a02\u00a0<\/span><span data-contrast=\"auto\">explica\u00a0c\u00f3mo\u00a0aplicar\u00a0el\u00a0principio de\u00a0proporcionalidad\u00a0en\u00a0la\u00a0respuesta\u00a0a las\u00a0amenazas\u00a0cibern\u00e9ticas. La\u00a0secci\u00f3n\u00a03\u00a0<\/span><span data-contrast=\"auto\">discute\u00a0la\u00a0naturaleza\u00a0del\u00a0ciberespacio\u00a0como\u00a0un\u00a0\u00e1mbito\u00a0donde\u00a0los\u00a0estados\u00a0pueden\u00a0competir\u00a0y\u00a0cooperar. La\u00a0secci\u00f3n\u00a04\u00a0<\/span><span data-contrast=\"auto\">aborda\u00a0la\u00a0cuesti\u00f3n\u00a0de la\u00a0atribuci\u00f3n\u00a0de\u00a0los\u00a0ataques\u00a0cibern\u00e9ticos\u00a0y se\u00a0discuten\u00a0las\u00a0limitaciones\u00a0de la\u00a0atribuci\u00f3n\u00a0t\u00e9cnica. La\u00a0secci\u00f3n\u00a05\u00a0<\/span><span data-contrast=\"auto\">destaca\u00a0la\u00a0importancia\u00a0de\u00a0compartir\u00a0informaci\u00f3n\u00a0sobre\u00a0amenazas\u00a0cibern\u00e9ticas\u00a0entre\u00a0los\u00a0estados\u00a0y se\u00a0mencionan\u00a0algunas\u00a0iniciativas\u00a0internacionales\u00a0relevantes. La\u00a0secci\u00f3n\u00a06\u00a0<\/span><span data-contrast=\"auto\">aborda\u00a0la\u00a0necesidad\u00a0de\u00a0construir\u00a0una\u00a0cultura\u00a0de\u00a0responsabilidad\u00a0en\u00a0torno\u00a0al\u00a0uso\u00a0del\u00a0poder\u00a0cibern\u00e9tico\u00a0y se\u00a0proporcionan\u00a0algunas\u00a0recomendaciones.\u00a0Finalmente\u00a0la\u00a0secci\u00f3n\u00a07\u00a0<\/span><span data-contrast=\"auto\">presenta\u00a0una\u00a0s\u00edntesis\u00a0de\u00a0los\u00a0principales\u00a0puntos del\u00a0informe\u00a0y se\u00a0destaca\u00a0la\u00a0importancia\u00a0de un\u00a0enfoque\u00a0responsable\u00a0para\u00a0el\u00a0poder\u00a0cibern\u00e9tico.<\/span>\u00a0<\/p><p>Para leer m\u00e1s ingrese a:<\/p><p><a href=\"https:\/\/www.gov.uk\/government\/publications\/responsible-cyber-power-in-practice\"><span data-contrast=\"auto\">https:\/\/www.gov.uk\/government\/publications\/responsible-cyber-power-in-practice<\/span><\/a><span data-contrast=\"auto\">\u00a0<\/span>\u00a0<\/p><p><a href=\"https:\/\/assets.publishing.service.gov.uk\/government\/uploads\/system\/uploads\/attachment_data\/file\/1148278\/Responsible_Cyber_Power_in_Practice.pdf\"><span data-contrast=\"auto\">https:\/\/assets.publishing.service.gov.uk\/government\/uploads\/system\/uploads\/attachment_data\/file\/1148278\/Responsible_Cyber_Power_in_Practice.pdf<\/span><\/a><span data-contrast=\"auto\">\u00a0<\/span>\u00a0<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t<div style=\"text-align:center\" class=\"yasr-auto-insert-visitor\"><\/div>","protected":false},"excerpt":{"rendered":"<p>El informe discute c\u00f3mo los estados pueden ejercer un poder cibern\u00e9tico responsable y c\u00f3mo pueden hacer frente a los desaf\u00edos que surgen de la creciente dependencia de la tecnolog\u00eda digital. Se se\u00f1ala que el ciberespacio es un \u00e1mbito donde los estados pueden competir y cooperar, y que es importante que los estados adopten un enfoque responsable para el uso del poder cibern\u00e9tico. El informe destaca varios aspectos clave para el uso responsable del poder cibern\u00e9tico, como la claridad de los objetivos y el uso de la proporcionalidad en la respuesta a amenazas cibern\u00e9ticas. Tambi\u00e9n se discuten las cuestiones de atribuci\u00f3n y la necesidad de compartir informaci\u00f3n sobre amenazas cibern\u00e9ticas entre los estados. <\/p>","protected":false},"author":23,"featured_media":31026,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"yasr_overall_rating":0,"yasr_post_is_review":"","yasr_auto_insert_disabled":"","yasr_review_type":"","footnotes":""},"categories":[55,53],"tags":[],"class_list":["post-31025","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digitalizacion","category-tendencias"],"yasr_visitor_votes":{"number_of_votes":0,"sum_votes":0,"stars_attributes":{"read_only":false,"span_bottom":false}},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The National Cyber Force: Responsible Cyber Power in Practice - Colombia Inteligente<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/colombiainteligente.org\/es_co\/tendencias\/the-national-cyber-force-responsible-cyber-power-in-practice\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The National Cyber Force: Responsible Cyber Power in Practice - Colombia Inteligente\" \/>\n<meta property=\"og:description\" content=\"El informe discute c\u00f3mo los estados pueden ejercer un poder cibern\u00e9tico responsable y c\u00f3mo pueden hacer frente a los desaf\u00edos que surgen de la creciente dependencia de la tecnolog\u00eda digital. Se se\u00f1ala que el ciberespacio es un \u00e1mbito donde los estados pueden competir y cooperar, y que es importante que los estados adopten un enfoque responsable para el uso del poder cibern\u00e9tico. El informe destaca varios aspectos clave para el uso responsable del poder cibern\u00e9tico, como la claridad de los objetivos y el uso de la proporcionalidad en la respuesta a amenazas cibern\u00e9ticas. Tambi\u00e9n se discuten las cuestiones de atribuci\u00f3n y la necesidad de compartir informaci\u00f3n sobre amenazas cibern\u00e9ticas entre los estados.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/colombiainteligente.org\/es_co\/tendencias\/the-national-cyber-force-responsible-cyber-power-in-practice\/\" \/>\n<meta property=\"og:site_name\" content=\"Colombia Inteligente\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-11T14:32:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-11T14:34:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/colombiainteligente.org\/wp-content\/uploads\/2023\/04\/The-National-Cyber-Force.png\" \/>\n\t<meta property=\"og:image:width\" content=\"377\" \/>\n\t<meta property=\"og:image:height\" content=\"525\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"DIFUSI\u00d3N COLOMBIA INTELIGENTE\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@colombiaintelig\" \/>\n<meta name=\"twitter:site\" content=\"@colombiaintelig\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"DIFUSI\u00d3N COLOMBIA INTELIGENTE\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo estimado de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/the-national-cyber-force-responsible-cyber-power-in-practice\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/the-national-cyber-force-responsible-cyber-power-in-practice\\\/\"},\"author\":{\"name\":\"DIFUSI\u00d3N COLOMBIA INTELIGENTE\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#\\\/schema\\\/person\\\/e207145d548b75a6d339ff1d4d3b0432\"},\"headline\":\"The National Cyber Force: Responsible Cyber Power in Practice\",\"datePublished\":\"2023-04-11T14:32:39+00:00\",\"dateModified\":\"2023-04-11T14:34:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/the-national-cyber-force-responsible-cyber-power-in-practice\\\/\"},\"wordCount\":574,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/the-national-cyber-force-responsible-cyber-power-in-practice\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/colombiainteligente.org\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/The-National-Cyber-Force.png\",\"articleSection\":[\"Digitalizaci\u00f3n\",\"Tendencias\"],\"inLanguage\":\"es-CO\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/the-national-cyber-force-responsible-cyber-power-in-practice\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/the-national-cyber-force-responsible-cyber-power-in-practice\\\/\",\"url\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/the-national-cyber-force-responsible-cyber-power-in-practice\\\/\",\"name\":\"The National Cyber Force: Responsible Cyber Power in Practice - Colombia Inteligente\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/the-national-cyber-force-responsible-cyber-power-in-practice\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/the-national-cyber-force-responsible-cyber-power-in-practice\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/colombiainteligente.org\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/The-National-Cyber-Force.png\",\"datePublished\":\"2023-04-11T14:32:39+00:00\",\"dateModified\":\"2023-04-11T14:34:16+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/the-national-cyber-force-responsible-cyber-power-in-practice\\\/#breadcrumb\"},\"inLanguage\":\"es-CO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/the-national-cyber-force-responsible-cyber-power-in-practice\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es-CO\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/the-national-cyber-force-responsible-cyber-power-in-practice\\\/#primaryimage\",\"url\":\"https:\\\/\\\/colombiainteligente.org\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/The-National-Cyber-Force.png\",\"contentUrl\":\"https:\\\/\\\/colombiainteligente.org\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/The-National-Cyber-Force.png\",\"width\":377,\"height\":525,\"caption\":\"The-National-Cyber-Force.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/the-national-cyber-force-responsible-cyber-power-in-practice\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/colombiainteligente.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The National Cyber Force: Responsible Cyber Power in Practice\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#website\",\"url\":\"https:\\\/\\\/colombiainteligente.org\\\/\",\"name\":\"Colombia Inteligente\",\"description\":\"Alianza estrat\u00e9gica, conformada por empresas y entidades, para la inserci\u00f3n integral y eficiente de las redes inteligentes a la infraestructura del sector el\u00e9ctrico colombiano\",\"publisher\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/colombiainteligente.org\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es-CO\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#organization\",\"name\":\"Colombia Inteligente\",\"url\":\"https:\\\/\\\/colombiainteligente.org\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-CO\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/colombiainteligente.org\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/Image.png\",\"contentUrl\":\"https:\\\/\\\/colombiainteligente.org\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/Image.png\",\"width\":588,\"height\":274,\"caption\":\"Colombia Inteligente\"},\"image\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/colombiaintelig\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/colombiainteligente\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#\\\/schema\\\/person\\\/e207145d548b75a6d339ff1d4d3b0432\",\"name\":\"DIFUSI\u00d3N COLOMBIA INTELIGENTE\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-CO\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/df2e679ff2abf288cf4bf58830dad897e596908105ec8969f50f748a6d837869?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/df2e679ff2abf288cf4bf58830dad897e596908105ec8969f50f748a6d837869?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/df2e679ff2abf288cf4bf58830dad897e596908105ec8969f50f748a6d837869?s=96&d=mm&r=g\",\"caption\":\"DIFUSI\u00d3N COLOMBIA INTELIGENTE\"},\"url\":\"https:\\\/\\\/colombiainteligente.org\\\/es_co\\\/author\\\/difusioncolombiainteligente-org\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The National Cyber Force: Responsible Cyber Power in Practice - Colombia Inteligente","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/colombiainteligente.org\/es_co\/tendencias\/the-national-cyber-force-responsible-cyber-power-in-practice\/","og_locale":"es_ES","og_type":"article","og_title":"The National Cyber Force: Responsible Cyber Power in Practice - Colombia Inteligente","og_description":"El informe discute c\u00f3mo los estados pueden ejercer un poder cibern\u00e9tico responsable y c\u00f3mo pueden hacer frente a los desaf\u00edos que surgen de la creciente dependencia de la tecnolog\u00eda digital. Se se\u00f1ala que el ciberespacio es un \u00e1mbito donde los estados pueden competir y cooperar, y que es importante que los estados adopten un enfoque responsable para el uso del poder cibern\u00e9tico. El informe destaca varios aspectos clave para el uso responsable del poder cibern\u00e9tico, como la claridad de los objetivos y el uso de la proporcionalidad en la respuesta a amenazas cibern\u00e9ticas. Tambi\u00e9n se discuten las cuestiones de atribuci\u00f3n y la necesidad de compartir informaci\u00f3n sobre amenazas cibern\u00e9ticas entre los estados.","og_url":"https:\/\/colombiainteligente.org\/es_co\/tendencias\/the-national-cyber-force-responsible-cyber-power-in-practice\/","og_site_name":"Colombia Inteligente","article_published_time":"2023-04-11T14:32:39+00:00","article_modified_time":"2023-04-11T14:34:16+00:00","og_image":[{"width":377,"height":525,"url":"https:\/\/colombiainteligente.org\/wp-content\/uploads\/2023\/04\/The-National-Cyber-Force.png","type":"image\/png"}],"author":"DIFUSI\u00d3N COLOMBIA INTELIGENTE","twitter_card":"summary_large_image","twitter_creator":"@colombiaintelig","twitter_site":"@colombiaintelig","twitter_misc":{"Escrito por":"DIFUSI\u00d3N COLOMBIA INTELIGENTE","Tiempo estimado de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/colombiainteligente.org\/tendencias\/the-national-cyber-force-responsible-cyber-power-in-practice\/#article","isPartOf":{"@id":"https:\/\/colombiainteligente.org\/tendencias\/the-national-cyber-force-responsible-cyber-power-in-practice\/"},"author":{"name":"DIFUSI\u00d3N COLOMBIA INTELIGENTE","@id":"https:\/\/colombiainteligente.org\/#\/schema\/person\/e207145d548b75a6d339ff1d4d3b0432"},"headline":"The National Cyber Force: Responsible Cyber Power in Practice","datePublished":"2023-04-11T14:32:39+00:00","dateModified":"2023-04-11T14:34:16+00:00","mainEntityOfPage":{"@id":"https:\/\/colombiainteligente.org\/tendencias\/the-national-cyber-force-responsible-cyber-power-in-practice\/"},"wordCount":574,"commentCount":0,"publisher":{"@id":"https:\/\/colombiainteligente.org\/#organization"},"image":{"@id":"https:\/\/colombiainteligente.org\/tendencias\/the-national-cyber-force-responsible-cyber-power-in-practice\/#primaryimage"},"thumbnailUrl":"https:\/\/colombiainteligente.org\/wp-content\/uploads\/2023\/04\/The-National-Cyber-Force.png","articleSection":["Digitalizaci\u00f3n","Tendencias"],"inLanguage":"es-CO","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/colombiainteligente.org\/tendencias\/the-national-cyber-force-responsible-cyber-power-in-practice\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/colombiainteligente.org\/tendencias\/the-national-cyber-force-responsible-cyber-power-in-practice\/","url":"https:\/\/colombiainteligente.org\/tendencias\/the-national-cyber-force-responsible-cyber-power-in-practice\/","name":"The National Cyber Force: Responsible Cyber Power in Practice - Colombia Inteligente","isPartOf":{"@id":"https:\/\/colombiainteligente.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/colombiainteligente.org\/tendencias\/the-national-cyber-force-responsible-cyber-power-in-practice\/#primaryimage"},"image":{"@id":"https:\/\/colombiainteligente.org\/tendencias\/the-national-cyber-force-responsible-cyber-power-in-practice\/#primaryimage"},"thumbnailUrl":"https:\/\/colombiainteligente.org\/wp-content\/uploads\/2023\/04\/The-National-Cyber-Force.png","datePublished":"2023-04-11T14:32:39+00:00","dateModified":"2023-04-11T14:34:16+00:00","breadcrumb":{"@id":"https:\/\/colombiainteligente.org\/tendencias\/the-national-cyber-force-responsible-cyber-power-in-practice\/#breadcrumb"},"inLanguage":"es-CO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/colombiainteligente.org\/tendencias\/the-national-cyber-force-responsible-cyber-power-in-practice\/"]}]},{"@type":"ImageObject","inLanguage":"es-CO","@id":"https:\/\/colombiainteligente.org\/tendencias\/the-national-cyber-force-responsible-cyber-power-in-practice\/#primaryimage","url":"https:\/\/colombiainteligente.org\/wp-content\/uploads\/2023\/04\/The-National-Cyber-Force.png","contentUrl":"https:\/\/colombiainteligente.org\/wp-content\/uploads\/2023\/04\/The-National-Cyber-Force.png","width":377,"height":525,"caption":"The-National-Cyber-Force.png"},{"@type":"BreadcrumbList","@id":"https:\/\/colombiainteligente.org\/tendencias\/the-national-cyber-force-responsible-cyber-power-in-practice\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/colombiainteligente.org\/"},{"@type":"ListItem","position":2,"name":"The National Cyber Force: Responsible Cyber Power in Practice"}]},{"@type":"WebSite","@id":"https:\/\/colombiainteligente.org\/#website","url":"https:\/\/colombiainteligente.org\/","name":"Colombia Inteligente","description":"Alianza estrat\u00e9gica, conformada por empresas y entidades, para la inserci\u00f3n integral y eficiente de las redes inteligentes a la infraestructura del sector el\u00e9ctrico colombiano","publisher":{"@id":"https:\/\/colombiainteligente.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/colombiainteligente.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es-CO"},{"@type":"Organization","@id":"https:\/\/colombiainteligente.org\/#organization","name":"Colombia Inteligente","url":"https:\/\/colombiainteligente.org\/","logo":{"@type":"ImageObject","inLanguage":"es-CO","@id":"https:\/\/colombiainteligente.org\/#\/schema\/logo\/image\/","url":"https:\/\/colombiainteligente.org\/wp-content\/uploads\/2022\/07\/Image.png","contentUrl":"https:\/\/colombiainteligente.org\/wp-content\/uploads\/2022\/07\/Image.png","width":588,"height":274,"caption":"Colombia Inteligente"},"image":{"@id":"https:\/\/colombiainteligente.org\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/colombiaintelig","https:\/\/www.linkedin.com\/company\/colombiainteligente\/"]},{"@type":"Person","@id":"https:\/\/colombiainteligente.org\/#\/schema\/person\/e207145d548b75a6d339ff1d4d3b0432","name":"DIFUSI\u00d3N COLOMBIA INTELIGENTE","image":{"@type":"ImageObject","inLanguage":"es-CO","@id":"https:\/\/secure.gravatar.com\/avatar\/df2e679ff2abf288cf4bf58830dad897e596908105ec8969f50f748a6d837869?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/df2e679ff2abf288cf4bf58830dad897e596908105ec8969f50f748a6d837869?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/df2e679ff2abf288cf4bf58830dad897e596908105ec8969f50f748a6d837869?s=96&d=mm&r=g","caption":"DIFUSI\u00d3N COLOMBIA INTELIGENTE"},"url":"https:\/\/colombiainteligente.org\/es_co\/author\/difusioncolombiainteligente-org\/"}]}},"_links":{"self":[{"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/posts\/31025","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/users\/23"}],"replies":[{"embeddable":true,"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/comments?post=31025"}],"version-history":[{"count":4,"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/posts\/31025\/revisions"}],"predecessor-version":[{"id":31030,"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/posts\/31025\/revisions\/31030"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/media\/31026"}],"wp:attachment":[{"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/media?parent=31025"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/categories?post=31025"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/tags?post=31025"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}