{"ad_unit_id":"App_Resource_Sidebar_Upper","resource":{"id":2134828,"author_id":1072012,"title":"RIESGOS CIBERNETICOS","created_at":"2015-02-26T13:17:06Z","updated_at":"2016-02-19T07:43:38Z","sample":false,"description":"INTERCEPCION MODIFICACION INTERRUPCION GENERACION ","alerts_enabled":true,"cached_tag_list":"tipos basicos, tipificacion de lasa perdidas, riesgos debidos a los equipos informaticos, riesgos que afectan a los sistemas logicos, riesgos que afectan a la informacion, riesgos asociados a las personas","deleted_at":null,"hidden":false,"average_rating":null,"demote":false,"private":false,"copyable":true,"score":22,"artificial_base_score":0,"recalculate_score":false,"profane":false,"hide_summary":false,"tag_list":["tipos basicos","tipificacion de lasa perdidas","riesgos debidos a los equipos informaticos","riesgos que afectan a los sistemas logicos","riesgos que afectan a la informacion","riesgos asociados a las personas"],"admin_tag_list":[],"study_aid_type":"MindMap","show_path":"/mind_maps/2134828","folder_id":1687834,"public_author":{"id":1072012,"profile":{"name":"simonbolivar164","about":null,"avatar_service":"gravatar","locale":"es","google_author_link":null,"user_type_id":248,"escaped_name":"ANGELA SOLANO CARREÑO","full_name":"ANGELA SOLANO CARREÑO","badge_classes":""}}},"width":300,"height":250,"rtype":"MindMap","rmode":"canonical","sizes":"[[[0, 0], [[300, 250]]]]","custom":[{"key":"rsubject","value":"Magisterio Educación"},{"key":"env","value":"production"},{"key":"rtype","value":"MindMap"},{"key":"rmode","value":"canonical"},{"key":"sequence","value":1},{"key":"uauth","value":"f"},{"key":"uadmin","value":"f"},{"key":"ulang","value":"en_us"},{"key":"ucurrency","value":"usd"}]}
{"ad_unit_id":"App_Resource_Sidebar_Lower","resource":{"id":2134828,"author_id":1072012,"title":"RIESGOS CIBERNETICOS","created_at":"2015-02-26T13:17:06Z","updated_at":"2016-02-19T07:43:38Z","sample":false,"description":"INTERCEPCION MODIFICACION INTERRUPCION GENERACION ","alerts_enabled":true,"cached_tag_list":"tipos basicos, tipificacion de lasa perdidas, riesgos debidos a los equipos informaticos, riesgos que afectan a los sistemas logicos, riesgos que afectan a la informacion, riesgos asociados a las personas","deleted_at":null,"hidden":false,"average_rating":null,"demote":false,"private":false,"copyable":true,"score":22,"artificial_base_score":0,"recalculate_score":false,"profane":false,"hide_summary":false,"tag_list":["tipos basicos","tipificacion de lasa perdidas","riesgos debidos a los equipos informaticos","riesgos que afectan a los sistemas logicos","riesgos que afectan a la informacion","riesgos asociados a las personas"],"admin_tag_list":[],"study_aid_type":"MindMap","show_path":"/mind_maps/2134828","folder_id":1687834,"public_author":{"id":1072012,"profile":{"name":"simonbolivar164","about":null,"avatar_service":"gravatar","locale":"es","google_author_link":null,"user_type_id":248,"escaped_name":"ANGELA SOLANO CARREÑO","full_name":"ANGELA SOLANO CARREÑO","badge_classes":""}}},"width":300,"height":250,"rtype":"MindMap","rmode":"canonical","sizes":"[[[0, 0], [[300, 250]]]]","custom":[{"key":"rsubject","value":"Magisterio Educación"},{"key":"env","value":"production"},{"key":"rtype","value":"MindMap"},{"key":"rmode","value":"canonical"},{"key":"sequence","value":1},{"key":"uauth","value":"f"},{"key":"uadmin","value":"f"},{"key":"ulang","value":"en_us"},{"key":"ucurrency","value":"usd"}]}