{"id":3680,"date":"2022-12-01T22:36:32","date_gmt":"2022-12-01T22:36:32","guid":{"rendered":"https:\/\/zidtech.net\/ztch\/?p=3680"},"modified":"2022-12-02T00:32:28","modified_gmt":"2022-12-02T00:32:28","slug":"30-nov-dia-de-la-seguridad-informatica","status":"publish","type":"post","link":"https:\/\/zidtech.net\/ztch\/30-nov-dia-de-la-seguridad-informatica\/","title":{"rendered":"30 Nov Dia de la Seguridad Informatica"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"3680\" class=\"elementor elementor-3680\" data-elementor-settings=\"[]\">\n\t\t\t\t\t\t<div class=\"elementor-inner\">\n\t\t\t\t\t\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c57d817 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c57d817\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d972840\" data-id=\"d972840\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d129b99 elementor-widget elementor-widget-heading\" data-id=\"d129b99\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\u00bfQu\u00e9 es la Seguridad Inform\u00e1tica?<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e97195c elementor-widget elementor-widget-text-editor\" data-id=\"e97195c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t\t<p>\u00a0Es una rama de la seguridad que se dedica a proteger los sistemas inform\u00e1ticos de amenazas externas e internas.<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aa0c9a3 elementor-widget elementor-widget-heading\" data-id=\"aa0c9a3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Tipos de Amenzas<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-76ca1fa elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"76ca1fa\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-9a45108\" data-id=\"9a45108\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-24c1097 elementor-widget elementor-widget-heading\" data-id=\"24c1097\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Amenazas Internas<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3acd68e elementor-widget elementor-widget-heading\" data-id=\"3acd68e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\"><P>Las amenazas internas son aquellas que provienen del propio sistema, tales como: \n<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e4721b8 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"e4721b8\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Errores Humanos<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Exposici\u00f3n p\u00fablica de credenciales<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Fallos o desactualizaciones en el software<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Fallos en el hardware<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Y Muchos Otros<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-2cc4d58\" data-id=\"2cc4d58\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6b86680 elementor-widget elementor-widget-heading\" data-id=\"6b86680\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Amenazas Externas<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-de8aa25 elementor-widget elementor-widget-heading\" data-id=\"de8aa25\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\"><p>Las amenazas externas son aquellas que provienen del entorno exterior en el que se encuentra el sistema como:<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-24c2982 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"24c2982\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Ataques Inform\u00e1ticos<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Virus<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Robos de Informaci\u00f3n<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Suplantaci\u00f3n de Identidad<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Entre Otros<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-0e36874 elementor-widget elementor-widget-heading\" data-id=\"0e36874\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\"><p><p> Es por ello por lo que en ZIDtech te invitamos a que te empapes m\u00e1s del tema, y puedas generar esta cultura de seguridad y protecci\u00f3n, tanto a nivel profesional, como a nivel personal. incluso nos atrevemos a decirte que podr\u00eda ser un tema que deban tocar en familia, y como dice el dicho m\u00e1s vale prevenir que lamentar, por nuestra parte iremos publicando m\u00e1s informaci\u00f3n al respecto.\n<p>\nLas buenas pr\u00e1cticas mantendr\u00e1n a salvo nuestra informaci\u00f3n y tambi\u00e9n nuestra integridad en temas de seguridad inform\u00e1tica no debemos escatimar, ya que es mas bien un tema de cultura y prevenci\u00f3n.\n<p>\nA lo largo de tiempo hemos o\u00eddo hablar de que empresa x, empresa y, empresa z, recibi\u00f3 un ataque, una intrusi\u00f3n, un robo de informaci\u00f3n etc., es un tema que podr\u00edamos pensar que no nos ata\u00f1e a nosotros, que no nos afecta, sin embargo si nos ponemos a pensar mas detenidamente, las empresas ofrecen productos y\/o servicios, quienes son los consumidores de esos productos y\/o servicios, es por esta simple raz\u00f3n, que es un tema que nos interesa a todos y tener los conocimientos de como prevenirlo es nuestro deber, e incluso el como saber actuar y tomar la decisi\u00f3n correcta, ante alguna experiencia de esta indoles que se est\u00e9 viviendo, o que se haya tenido.\n<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\u00bfQu\u00e9 es la Seguridad Inform\u00e1tica? Es una rama de la seguridad que se dedica a proteger los sistemas inform\u00e1ticos de amenazas externas e internas. Tipos de Amenzas Amenazas Internas Las amenazas internas son aquellas que provienen del propio sistema, tales como: Errores Humanos Exposici\u00f3n p\u00fablica de credenciales Fallos o desactualizaciones en el software Fallos en [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3681,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[17,10,11,14],"tags":[],"class_list":["post-3680","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-excel","category-noticias","category-tecnologia","category-zidtech"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v16.1 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>30 Nov Dia de la Seguridad Informatica - Zidtech - Zona Integral Digital de Tecnolog\u00eda<\/title>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"es_MX\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"30 Nov Dia de la Seguridad Informatica - Zidtech - Zona Integral Digital de Tecnolog\u00eda\" \/>\n<meta property=\"og:description\" content=\"\u00bfQu\u00e9 es la Seguridad Inform\u00e1tica? Es una rama de la seguridad que se dedica a proteger los sistemas inform\u00e1ticos de amenazas externas e internas. Tipos de Amenzas Amenazas Internas Las amenazas internas son aquellas que provienen del propio sistema, tales como: Errores Humanos Exposici\u00f3n p\u00fablica de credenciales Fallos o desactualizaciones en el software Fallos en [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/zidtech.net\/ztch\/30-nov-dia-de-la-seguridad-informatica\/\" \/>\n<meta property=\"og:site_name\" content=\"Zidtech - Zona Integral Digital de Tecnolog\u00eda\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Zidtech.net\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-01T22:36:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-02T00:32:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/zidtech.net\/ztch\/wp-content\/uploads\/2022\/11\/Post-para-Facebook-publicidad-para-universidades-azul-y-naranja-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"940\" \/>\n\t<meta property=\"og:image:height\" content=\"788\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"joel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"joel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/zidtech.net\\\/ztch\\\/30-nov-dia-de-la-seguridad-informatica\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/zidtech.net\\\/ztch\\\/30-nov-dia-de-la-seguridad-informatica\\\/\"},\"author\":{\"name\":\"joel\",\"@id\":\"https:\\\/\\\/zidtech.net\\\/ztch\\\/#\\\/schema\\\/person\\\/7dbb2653b7d15b1df3264a53bfcab0ed\"},\"headline\":\"30 Nov Dia de la Seguridad Informatica\",\"datePublished\":\"2022-12-01T22:36:32+00:00\",\"dateModified\":\"2022-12-02T00:32:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/zidtech.net\\\/ztch\\\/30-nov-dia-de-la-seguridad-informatica\\\/\"},\"wordCount\":340,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\\\/\\\/zidtech.net\\\/ztch\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/zidtech.net\\\/ztch\\\/30-nov-dia-de-la-seguridad-informatica\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/zidtech.net\\\/ztch\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/Post-para-Facebook-publicidad-para-universidades-azul-y-naranja-1.jpg\",\"articleSection\":[\"Excel\",\"Noticias\",\"Tecnolog\u00eda\",\"Zidtech\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/zidtech.net\\\/ztch\\\/30-nov-dia-de-la-seguridad-informatica\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/zidtech.net\\\/ztch\\\/30-nov-dia-de-la-seguridad-informatica\\\/\",\"url\":\"https:\\\/\\\/zidtech.net\\\/ztch\\\/30-nov-dia-de-la-seguridad-informatica\\\/\",\"name\":\"30 Nov Dia de la Seguridad Informatica - Zidtech - Zona Integral Digital de Tecnolog\u00eda\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/zidtech.net\\\/ztch\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/zidtech.net\\\/ztch\\\/30-nov-dia-de-la-seguridad-informatica\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/zidtech.net\\\/ztch\\\/30-nov-dia-de-la-seguridad-informatica\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/zidtech.net\\\/ztch\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/Post-para-Facebook-publicidad-para-universidades-azul-y-naranja-1.jpg\",\"datePublished\":\"2022-12-01T22:36:32+00:00\",\"dateModified\":\"2022-12-02T00:32:28+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/zidtech.net\\\/ztch\\\/30-nov-dia-de-la-seguridad-informatica\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/zidtech.net\\\/ztch\\\/30-nov-dia-de-la-seguridad-informatica\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/zidtech.net\\\/ztch\\\/30-nov-dia-de-la-seguridad-informatica\\\/#primaryimage\",\"url\":\"https:\\\/\\\/zidtech.net\\\/ztch\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/Post-para-Facebook-publicidad-para-universidades-azul-y-naranja-1.jpg\",\"contentUrl\":\"https:\\\/\\\/zidtech.net\\\/ztch\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/Post-para-Facebook-publicidad-para-universidades-azul-y-naranja-1.jpg\",\"width\":940,\"height\":788,\"caption\":\"Portada Seguridad Informatica\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/zidtech.net\\\/ztch\\\/30-nov-dia-de-la-seguridad-informatica\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\\\/\\\/zidtech.net\\\/ztch\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"30 Nov Dia de la Seguridad Informatica\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/zidtech.net\\\/ztch\\\/#website\",\"url\":\"https:\\\/\\\/zidtech.net\\\/ztch\\\/\",\"name\":\"Zidtech - Zona Integral Digital de Tecnolog\u00eda\",\"description\":\"Zidtech - Soluciones en Tecnolog\u00eda y Capacitaci\u00f3n\",\"publisher\":{\"@id\":\"https:\\\/\\\/zidtech.net\\\/ztch\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/zidtech.net\\\/ztch\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/zidtech.net\\\/ztch\\\/#organization\",\"name\":\"Zidtech\",\"url\":\"https:\\\/\\\/zidtech.net\\\/ztch\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/zidtech.net\\\/ztch\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/zidtech.net\\\/ztch\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/LogoOficialZidtechClaro.png\",\"contentUrl\":\"https:\\\/\\\/zidtech.net\\\/ztch\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/LogoOficialZidtechClaro.png\",\"width\":3055,\"height\":1750,\"caption\":\"Zidtech\"},\"image\":{\"@id\":\"https:\\\/\\\/zidtech.net\\\/ztch\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Zidtech.net\\\/\",\"https:\\\/\\\/youtube.com\\\/channel\\\/UCu2EDRRvePAGvA-05OG1Yxg\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/zidtech.net\\\/ztch\\\/#\\\/schema\\\/person\\\/7dbb2653b7d15b1df3264a53bfcab0ed\",\"name\":\"joel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d6a6f84e82eb3bc9f7fcd6c8d40bee021610670e085feab02920b41d7a135410?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d6a6f84e82eb3bc9f7fcd6c8d40bee021610670e085feab02920b41d7a135410?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d6a6f84e82eb3bc9f7fcd6c8d40bee021610670e085feab02920b41d7a135410?s=96&d=mm&r=g\",\"caption\":\"joel\"},\"sameAs\":[\"https:\\\/\\\/zidtech.net\\\/ztch\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"30 Nov Dia de la Seguridad Informatica - Zidtech - Zona Integral Digital de Tecnolog\u00eda","robots":{"index":"noindex","follow":"follow"},"og_locale":"es_MX","og_type":"article","og_title":"30 Nov Dia de la Seguridad Informatica - Zidtech - Zona Integral Digital de Tecnolog\u00eda","og_description":"\u00bfQu\u00e9 es la Seguridad Inform\u00e1tica? Es una rama de la seguridad que se dedica a proteger los sistemas inform\u00e1ticos de amenazas externas e internas. Tipos de Amenzas Amenazas Internas Las amenazas internas son aquellas que provienen del propio sistema, tales como: Errores Humanos Exposici\u00f3n p\u00fablica de credenciales Fallos o desactualizaciones en el software Fallos en [&hellip;]","og_url":"https:\/\/zidtech.net\/ztch\/30-nov-dia-de-la-seguridad-informatica\/","og_site_name":"Zidtech - Zona Integral Digital de Tecnolog\u00eda","article_publisher":"https:\/\/www.facebook.com\/Zidtech.net\/","article_published_time":"2022-12-01T22:36:32+00:00","article_modified_time":"2022-12-02T00:32:28+00:00","og_image":[{"width":940,"height":788,"url":"https:\/\/zidtech.net\/ztch\/wp-content\/uploads\/2022\/11\/Post-para-Facebook-publicidad-para-universidades-azul-y-naranja-1.jpg","type":"image\/jpeg"}],"author":"joel","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"joel","Tiempo de lectura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/zidtech.net\/ztch\/30-nov-dia-de-la-seguridad-informatica\/#article","isPartOf":{"@id":"https:\/\/zidtech.net\/ztch\/30-nov-dia-de-la-seguridad-informatica\/"},"author":{"name":"joel","@id":"https:\/\/zidtech.net\/ztch\/#\/schema\/person\/7dbb2653b7d15b1df3264a53bfcab0ed"},"headline":"30 Nov Dia de la Seguridad Informatica","datePublished":"2022-12-01T22:36:32+00:00","dateModified":"2022-12-02T00:32:28+00:00","mainEntityOfPage":{"@id":"https:\/\/zidtech.net\/ztch\/30-nov-dia-de-la-seguridad-informatica\/"},"wordCount":340,"commentCount":1,"publisher":{"@id":"https:\/\/zidtech.net\/ztch\/#organization"},"image":{"@id":"https:\/\/zidtech.net\/ztch\/30-nov-dia-de-la-seguridad-informatica\/#primaryimage"},"thumbnailUrl":"https:\/\/zidtech.net\/ztch\/wp-content\/uploads\/2022\/11\/Post-para-Facebook-publicidad-para-universidades-azul-y-naranja-1.jpg","articleSection":["Excel","Noticias","Tecnolog\u00eda","Zidtech"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/zidtech.net\/ztch\/30-nov-dia-de-la-seguridad-informatica\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/zidtech.net\/ztch\/30-nov-dia-de-la-seguridad-informatica\/","url":"https:\/\/zidtech.net\/ztch\/30-nov-dia-de-la-seguridad-informatica\/","name":"30 Nov Dia de la Seguridad Informatica - Zidtech - Zona Integral Digital de Tecnolog\u00eda","isPartOf":{"@id":"https:\/\/zidtech.net\/ztch\/#website"},"primaryImageOfPage":{"@id":"https:\/\/zidtech.net\/ztch\/30-nov-dia-de-la-seguridad-informatica\/#primaryimage"},"image":{"@id":"https:\/\/zidtech.net\/ztch\/30-nov-dia-de-la-seguridad-informatica\/#primaryimage"},"thumbnailUrl":"https:\/\/zidtech.net\/ztch\/wp-content\/uploads\/2022\/11\/Post-para-Facebook-publicidad-para-universidades-azul-y-naranja-1.jpg","datePublished":"2022-12-01T22:36:32+00:00","dateModified":"2022-12-02T00:32:28+00:00","breadcrumb":{"@id":"https:\/\/zidtech.net\/ztch\/30-nov-dia-de-la-seguridad-informatica\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/zidtech.net\/ztch\/30-nov-dia-de-la-seguridad-informatica\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/zidtech.net\/ztch\/30-nov-dia-de-la-seguridad-informatica\/#primaryimage","url":"https:\/\/zidtech.net\/ztch\/wp-content\/uploads\/2022\/11\/Post-para-Facebook-publicidad-para-universidades-azul-y-naranja-1.jpg","contentUrl":"https:\/\/zidtech.net\/ztch\/wp-content\/uploads\/2022\/11\/Post-para-Facebook-publicidad-para-universidades-azul-y-naranja-1.jpg","width":940,"height":788,"caption":"Portada Seguridad Informatica"},{"@type":"BreadcrumbList","@id":"https:\/\/zidtech.net\/ztch\/30-nov-dia-de-la-seguridad-informatica\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/zidtech.net\/ztch\/"},{"@type":"ListItem","position":2,"name":"30 Nov Dia de la Seguridad Informatica"}]},{"@type":"WebSite","@id":"https:\/\/zidtech.net\/ztch\/#website","url":"https:\/\/zidtech.net\/ztch\/","name":"Zidtech - Zona Integral Digital de Tecnolog\u00eda","description":"Zidtech - Soluciones en Tecnolog\u00eda y Capacitaci\u00f3n","publisher":{"@id":"https:\/\/zidtech.net\/ztch\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/zidtech.net\/ztch\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/zidtech.net\/ztch\/#organization","name":"Zidtech","url":"https:\/\/zidtech.net\/ztch\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/zidtech.net\/ztch\/#\/schema\/logo\/image\/","url":"https:\/\/zidtech.net\/ztch\/wp-content\/uploads\/2020\/12\/LogoOficialZidtechClaro.png","contentUrl":"https:\/\/zidtech.net\/ztch\/wp-content\/uploads\/2020\/12\/LogoOficialZidtechClaro.png","width":3055,"height":1750,"caption":"Zidtech"},"image":{"@id":"https:\/\/zidtech.net\/ztch\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Zidtech.net\/","https:\/\/youtube.com\/channel\/UCu2EDRRvePAGvA-05OG1Yxg"]},{"@type":"Person","@id":"https:\/\/zidtech.net\/ztch\/#\/schema\/person\/7dbb2653b7d15b1df3264a53bfcab0ed","name":"joel","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/d6a6f84e82eb3bc9f7fcd6c8d40bee021610670e085feab02920b41d7a135410?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d6a6f84e82eb3bc9f7fcd6c8d40bee021610670e085feab02920b41d7a135410?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d6a6f84e82eb3bc9f7fcd6c8d40bee021610670e085feab02920b41d7a135410?s=96&d=mm&r=g","caption":"joel"},"sameAs":["https:\/\/zidtech.net\/ztch"]}]}},"_links":{"self":[{"href":"https:\/\/zidtech.net\/ztch\/wp-json\/wp\/v2\/posts\/3680","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zidtech.net\/ztch\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zidtech.net\/ztch\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zidtech.net\/ztch\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/zidtech.net\/ztch\/wp-json\/wp\/v2\/comments?post=3680"}],"version-history":[{"count":8,"href":"https:\/\/zidtech.net\/ztch\/wp-json\/wp\/v2\/posts\/3680\/revisions"}],"predecessor-version":[{"id":3690,"href":"https:\/\/zidtech.net\/ztch\/wp-json\/wp\/v2\/posts\/3680\/revisions\/3690"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/zidtech.net\/ztch\/wp-json\/wp\/v2\/media\/3681"}],"wp:attachment":[{"href":"https:\/\/zidtech.net\/ztch\/wp-json\/wp\/v2\/media?parent=3680"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zidtech.net\/ztch\/wp-json\/wp\/v2\/categories?post=3680"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zidtech.net\/ztch\/wp-json\/wp\/v2\/tags?post=3680"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}