{"id":9027,"date":"2020-04-16T00:00:00","date_gmt":"2020-04-16T00:00:00","guid":{"rendered":"https:\/\/abes.org.br\/?p=9027"},"modified":"2020-04-16T00:00:00","modified_gmt":"2020-04-16T00:00:00","slug":"seguranca-cibernetica-do-basico-bem-feito-passando-pela-criptografia-ate-certificacao-digital","status":"publish","type":"post","link":"https:\/\/abes.org.br\/en\/seguranca-cibernetica-do-basico-bem-feito-passando-pela-criptografia-ate-certificacao-digital\/","title":{"rendered":"Cyber Security: From Basics Well Done to Encryption to Digital Certification"},"content":{"rendered":"<div style=\"text-align: justify;\">\n<p>\n\t<img decoding=\"async\" alt=\"\" src=\"\/wp-content\/uploads\/anterior\/Imagens\/webinar%20-%20seguran%C3%A7a%20cibern%C3%A9tica%20-%20foto.PNG\" style=\"width: 380px; height: 146px;\" \/><\/p>\n<p>\tIn the webinar promoted on Cyber Security, held by ABES on April 8th, Dr. Roberto Gallo, director of ABES, president of ABIMDE and General Director of Kryptus Seguran\u00e7a da Informa\u00e7\u00e3o, highlighted that companies have had information as a crucial element for a long time. of your business. \u201cThere are entrepreneurs who think they do not have confidential information to protect, but he is wrong. Every organization has private information, which they have the obligation to protect, including from a strategic business point of view, such as tax data, private customer and employee information, contract terms, cost spreadsheet, among other materials,&quot; he explained .<\/p>\n<p>\tAs part of this \u201cwell done basics\u201d strategy, it is necessary to formalize the data protection policy with employees, training them periodically, guiding suppliers, especially those with whom the company exchanges private and strategic data. It is also important to concentrate services on the same provider, know how to configure cloud services, keep software up to date, including information security.<\/p>\n<p>\t<strong>Cryptography<\/strong><\/p>\n<p>\tDr. Ricardo Dahab, a professor at Unicamp&#039;s Computing Institute, since 1982, addressed the importance of cryptography, which can be performed using different tools to ensure message integrity and authentication, among other applications. \u201cToday, cryptography involves a collection of techniques to provide the information security requirements that are part of a software&#039;s substrate. It needs to be correctly implemented to avoid creating vulnerabilities in the applications\u201d, he informed.<\/p>\n<p>\t<strong>Bit doesn&#039;t wear a uniform<\/strong><\/p>\n<p>\tGeneral Paulo Melo Carvalho, Reserve Division General with expertise in the Cybernetics area at the political-strategic and operational-technical levels, headed the Cyber Defense Center from 2014 to 2016, stressed that the cyber space is wide and recalled that the bit \u201cdoes not wear a uniform\u201d and that there is no secure 100% computer system. \u201cWe&#039;re already living in a cyber war, in which opponents engage in cybercrime, can join nation-state teams, can engage in cyberterrorism, or work to identify software vulnerabilities,\u201d he explained. He pointed out that the military understands that combat currently takes place in five dimensions: land, sea, air, space and cybernetics. \u201cIt is impossible for the military to conduct cyber defense alone. We count on the collaboration of companies and universities\u201d, he added.<\/p>\n<p>\t<strong>cyber warfare<\/strong><\/p>\n<p>\tThe relationship between social isolation, the need for people to communicate virtually and, consequently, greater exposure to the risks of cyber attacks were analyzed by Otavio Carlos Cunha da Silva, Director of CEPESC\/Abin and first Director-President of ITI\/Casa Civil of the Presidency of the Republic, responsible for the implementation process of the Public Key Infrastructure of Brazil (ICP-Brasil). \u201cWe&#039;re past the stage of thinking the hacker is an unpretentious kid. There are criminal organizations that work in a very structured way, even nation-states, which have people who act to spread panic attacks and online. Who to attribute these attacks to? It&#039;s hard to identify,\u201d he explained.<\/p>\n<p>\t<strong>Identity Assurance<\/strong><\/p>\n<p>\tThe webinar was closed by Paulo Milliet Roque, co-founder of DigiForte and Vice President of ABES, who discussed digital certification and explained that this is one of the safest mass identification methods in the world and with a centralized process, as it has a central certifier and with a low rate of fraud. Due to the pandemic, Paulo clarifies that the procedures for issuing the certificate are changing a little. \u201cWe have new security protocols for those who need to renew their digital certificate, allowing online renewal through videoconference. We believe that the issuance of digital certificates will continue to grow in Brazil and with new commercialization proposals, especially for people who use the certificate in few transactions\u201d, he concluded.<\/p>\n<p>\tWatch the full webinar via the link&nbsp;<a href=\"https:\/\/www.youtube.com\/watch?v=0R-5QUsvbQE&amp;list=PL2X1JJqBpAkOvAJ7KS25L7wFzIUUQHMih&amp;index=5\">https:\/\/www.youtube.com\/watch?v=0R-5QUsvbQE&amp;list=PL2X1JJqBpAkOvAJ7KS25L7wFzIUUQHMih&amp;index=5<\/a><\/div>","protected":false},"excerpt":{"rendered":"<p>No webinar promovido sobre Seguran&ccedil;a Cibern&eacute;tica, realizado pela ABES no dia 08 de abril, Dr. Roberto Gallo, conselheiro da ABES, presidente da ABIMDE e Diretor Geral da Kryptus Seguran&ccedil;a da Informa&ccedil;&atilde;o, destacou que h&aacute; muito tempo as empresas t&ecirc;m a informa&ccedil;&atilde;o como elemento crucial dos seus neg&oacute;cios. &ldquo;Tem empres&aacute;rio que acha que n&atilde;o possui informa&ccedil;&atilde;o [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[19],"tags":[],"class_list":["post-9027","post","type-post","status-publish","format-standard","hentry","category-ultimas-noticias"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Seguran\u00e7a cibern\u00e9tica: Do b\u00e1sico bem feito, passando pela criptografia at\u00e9 certifica\u00e7\u00e3o digital - ABES<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abes.org.br\/en\/seguranca-cibernetica-do-basico-bem-feito-passando-pela-criptografia-ate-certificacao-digital\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Seguran\u00e7a cibern\u00e9tica: Do b\u00e1sico bem feito, passando pela criptografia at\u00e9 certifica\u00e7\u00e3o digital - ABES\" \/>\n<meta property=\"og:description\" content=\"No webinar promovido sobre Seguran&ccedil;a Cibern&eacute;tica, realizado pela ABES no dia 08 de abril, Dr. Roberto Gallo, conselheiro da ABES, presidente da ABIMDE e Diretor Geral da Kryptus Seguran&ccedil;a da Informa&ccedil;&atilde;o, destacou que h&aacute; muito tempo as empresas t&ecirc;m a informa&ccedil;&atilde;o como elemento crucial dos seus neg&oacute;cios. &ldquo;Tem empres&aacute;rio que acha que n&atilde;o possui informa&ccedil;&atilde;o [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abes.org.br\/en\/seguranca-cibernetica-do-basico-bem-feito-passando-pela-criptografia-ate-certificacao-digital\/\" \/>\n<meta property=\"og:site_name\" content=\"ABES\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ABES.software\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-16T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/01\/logo_abes_marca_tagline_horizontal_colorido_rgb.png\" \/>\n\t<meta property=\"og:image:width\" content=\"3509\" \/>\n\t<meta property=\"og:image:height\" content=\"2482\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"prima-dev\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:site\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"prima-dev\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/seguranca-cibernetica-do-basico-bem-feito-passando-pela-criptografia-ate-certificacao-digital\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/seguranca-cibernetica-do-basico-bem-feito-passando-pela-criptografia-ate-certificacao-digital\\\/\"},\"author\":{\"name\":\"prima-dev\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/1bad6bff859e7d56ec5664b01968e27e\"},\"headline\":\"Seguran\u00e7a cibern\u00e9tica: Do b\u00e1sico bem feito, passando pela criptografia at\u00e9 certifica\u00e7\u00e3o digital\",\"datePublished\":\"2020-04-16T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/seguranca-cibernetica-do-basico-bem-feito-passando-pela-criptografia-ate-certificacao-digital\\\/\"},\"wordCount\":874,\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"articleSection\":[\"\u00daltimas not\u00edcias\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/seguranca-cibernetica-do-basico-bem-feito-passando-pela-criptografia-ate-certificacao-digital\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/seguranca-cibernetica-do-basico-bem-feito-passando-pela-criptografia-ate-certificacao-digital\\\/\",\"name\":\"Seguran\u00e7a cibern\u00e9tica: Do b\u00e1sico bem feito, passando pela criptografia at\u00e9 certifica\u00e7\u00e3o digital - ABES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\"},\"datePublished\":\"2020-04-16T00:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/seguranca-cibernetica-do-basico-bem-feito-passando-pela-criptografia-ate-certificacao-digital\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abes.org.br\\\/seguranca-cibernetica-do-basico-bem-feito-passando-pela-criptografia-ate-certificacao-digital\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/seguranca-cibernetica-do-basico-bem-feito-passando-pela-criptografia-ate-certificacao-digital\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/abes.org.br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Seguran\u00e7a cibern\u00e9tica: Do b\u00e1sico bem feito, passando pela criptografia at\u00e9 certifica\u00e7\u00e3o digital\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"name\":\"ABES\",\"description\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abes.org.br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\",\"name\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"width\":324,\"height\":70,\"caption\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ABES.software\",\"https:\\\/\\\/x.com\\\/ABES_SOFTWARE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abes-software\\\/\",\"https:\\\/\\\/www.instagram.com\\\/abes_software\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/1bad6bff859e7d56ec5664b01968e27e\",\"name\":\"prima-dev\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/039c6325210cecd393c57645bc755f7d13deed578fddf4dbfa87bc05dcbcfa4b?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/039c6325210cecd393c57645bc755f7d13deed578fddf4dbfa87bc05dcbcfa4b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/039c6325210cecd393c57645bc755f7d13deed578fddf4dbfa87bc05dcbcfa4b?s=96&d=mm&r=g\",\"caption\":\"prima-dev\"},\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/author\\\/prima-dev\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Seguran\u00e7a cibern\u00e9tica: Do b\u00e1sico bem feito, passando pela criptografia at\u00e9 certifica\u00e7\u00e3o digital - ABES","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abes.org.br\/en\/seguranca-cibernetica-do-basico-bem-feito-passando-pela-criptografia-ate-certificacao-digital\/","og_locale":"en_US","og_type":"article","og_title":"Seguran\u00e7a cibern\u00e9tica: Do b\u00e1sico bem feito, passando pela criptografia at\u00e9 certifica\u00e7\u00e3o digital - ABES","og_description":"No webinar promovido sobre Seguran&ccedil;a Cibern&eacute;tica, realizado pela ABES no dia 08 de abril, Dr. Roberto Gallo, conselheiro da ABES, presidente da ABIMDE e Diretor Geral da Kryptus Seguran&ccedil;a da Informa&ccedil;&atilde;o, destacou que h&aacute; muito tempo as empresas t&ecirc;m a informa&ccedil;&atilde;o como elemento crucial dos seus neg&oacute;cios. &ldquo;Tem empres&aacute;rio que acha que n&atilde;o possui informa&ccedil;&atilde;o [&hellip;]","og_url":"https:\/\/abes.org.br\/en\/seguranca-cibernetica-do-basico-bem-feito-passando-pela-criptografia-ate-certificacao-digital\/","og_site_name":"ABES","article_publisher":"https:\/\/www.facebook.com\/ABES.software","article_published_time":"2020-04-16T00:00:00+00:00","og_image":[{"width":3509,"height":2482,"url":"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/01\/logo_abes_marca_tagline_horizontal_colorido_rgb.png","type":"image\/png"}],"author":"prima-dev","twitter_card":"summary_large_image","twitter_creator":"@ABES_SOFTWARE","twitter_site":"@ABES_SOFTWARE","twitter_misc":{"Written by":"prima-dev","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/abes.org.br\/seguranca-cibernetica-do-basico-bem-feito-passando-pela-criptografia-ate-certificacao-digital\/#article","isPartOf":{"@id":"https:\/\/abes.org.br\/seguranca-cibernetica-do-basico-bem-feito-passando-pela-criptografia-ate-certificacao-digital\/"},"author":{"name":"prima-dev","@id":"https:\/\/abes.org.br\/#\/schema\/person\/1bad6bff859e7d56ec5664b01968e27e"},"headline":"Seguran\u00e7a cibern\u00e9tica: Do b\u00e1sico bem feito, passando pela criptografia at\u00e9 certifica\u00e7\u00e3o digital","datePublished":"2020-04-16T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/abes.org.br\/seguranca-cibernetica-do-basico-bem-feito-passando-pela-criptografia-ate-certificacao-digital\/"},"wordCount":874,"publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"articleSection":["\u00daltimas not\u00edcias"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/abes.org.br\/seguranca-cibernetica-do-basico-bem-feito-passando-pela-criptografia-ate-certificacao-digital\/","url":"https:\/\/abes.org.br\/seguranca-cibernetica-do-basico-bem-feito-passando-pela-criptografia-ate-certificacao-digital\/","name":"Seguran\u00e7a cibern\u00e9tica: Do b\u00e1sico bem feito, passando pela criptografia at\u00e9 certifica\u00e7\u00e3o digital - ABES","isPartOf":{"@id":"https:\/\/abes.org.br\/#website"},"datePublished":"2020-04-16T00:00:00+00:00","breadcrumb":{"@id":"https:\/\/abes.org.br\/seguranca-cibernetica-do-basico-bem-feito-passando-pela-criptografia-ate-certificacao-digital\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abes.org.br\/seguranca-cibernetica-do-basico-bem-feito-passando-pela-criptografia-ate-certificacao-digital\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/abes.org.br\/seguranca-cibernetica-do-basico-bem-feito-passando-pela-criptografia-ate-certificacao-digital\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/abes.org.br\/"},{"@type":"ListItem","position":2,"name":"Seguran\u00e7a cibern\u00e9tica: Do b\u00e1sico bem feito, passando pela criptografia at\u00e9 certifica\u00e7\u00e3o digital"}]},{"@type":"WebSite","@id":"https:\/\/abes.org.br\/#website","url":"https:\/\/abes.org.br\/","name":"ABES","description":"Brazilian Association of Software Companies","publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abes.org.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abes.org.br\/#organization","name":"Brazilian Association of Software Companies","url":"https:\/\/abes.org.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","width":324,"height":70,"caption":"Associa\u00e7\u00e3o Brasileira das Empresas de Software"},"image":{"@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ABES.software","https:\/\/x.com\/ABES_SOFTWARE","https:\/\/www.linkedin.com\/company\/abes-software\/","https:\/\/www.instagram.com\/abes_software\/"]},{"@type":"Person","@id":"https:\/\/abes.org.br\/#\/schema\/person\/1bad6bff859e7d56ec5664b01968e27e","name":"prima-dev","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/039c6325210cecd393c57645bc755f7d13deed578fddf4dbfa87bc05dcbcfa4b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/039c6325210cecd393c57645bc755f7d13deed578fddf4dbfa87bc05dcbcfa4b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/039c6325210cecd393c57645bc755f7d13deed578fddf4dbfa87bc05dcbcfa4b?s=96&d=mm&r=g","caption":"prima-dev"},"url":"https:\/\/abes.org.br\/en\/author\/prima-dev\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-04-27 23:34:10","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/9027","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/comments?post=9027"}],"version-history":[{"count":0,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/9027\/revisions"}],"wp:attachment":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media?parent=9027"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/categories?post=9027"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/tags?post=9027"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}