{"id":9868,"date":"2021-09-23T20:19:21","date_gmt":"2021-09-23T20:19:21","guid":{"rendered":"https:\/\/puceapex.puce.edu.ec\/web\/cev\/?p=9868"},"modified":"2021-09-23T20:22:16","modified_gmt":"2021-09-23T20:22:16","slug":"introduccion-a-la-seguridad-informatica","status":"publish","type":"post","link":"https:\/\/puceapex.puce.edu.ec\/web\/cev\/introduccion-a-la-seguridad-informatica\/","title":{"rendered":"Introducci\u00f3n a la seguridad inform\u00e1tica"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00bb1&#8243; admin_label=\u00bbsection\u00bb _builder_version=\u00bb3.22&#8243; da_disable_devices=\u00bboff|off|off\u00bb da_is_popup=\u00bboff\u00bb da_exit_intent=\u00bboff\u00bb da_has_close=\u00bbon\u00bb da_alt_close=\u00bboff\u00bb da_dark_close=\u00bboff\u00bb da_not_modal=\u00bbon\u00bb da_is_singular=\u00bboff\u00bb da_with_loader=\u00bboff\u00bb da_has_shadow=\u00bbon\u00bb][et_pb_row admin_label=\u00bbrow\u00bb _builder_version=\u00bb3.25&#8243; background_size=\u00bbinitial\u00bb background_position=\u00bbtop_left\u00bb background_repeat=\u00bbrepeat\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb3.25&#8243; custom_padding=\u00bb|||\u00bb custom_padding__hover=\u00bb|||\u00bb][et_pb_code _builder_version=\u00bb4.9.10&#8243; _module_preset=\u00bbdefault\u00bb]<code><\/p>\n<div style=\"width: 100%;\">\n<div style=\"position: relative; padding-bottom: 56.25%; padding-top: 0; height: 0;\"><iframe loading=\"lazy\" frameborder=\"0\" width=\"1200\" height=\"675\" style=\"position: absolute; top: 0; left: 0; width: 100%; height: 100%;\" src=\"https:\/\/view.genial.ly\/5f63fa87ddb2dc0d8fa572a1\" type=\"text\/html\" allowscriptaccess=\"always\" allowfullscreen=\"true\" scrolling=\"yes\" allownetworking=\"all\"><\/iframe> <\/div>\n<\/p><\/div>\n<p><\/code>[\/et_pb_code][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.9.10&#8243; _module_preset=\u00bbdefault\u00bb min_height=\u00bb182px\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.9.10&#8243; _module_preset=\u00bbdefault\u00bb][et_pb_text admin_label=\u00bbText\u00bb _builder_version=\u00bb4.9.10&#8243; background_size=\u00bbinitial\u00bb background_position=\u00bbtop_left\u00bb background_repeat=\u00bbrepeat\u00bb custom_padding=\u00bb||16px|||\u00bb]<\/p>\n<p><b>Facultad:<\/b> <span>Ingenier\u00eda<\/span><br \/><b>Maestr\u00eda:<\/b> <span>Maestr\u00eda en Tecnolog\u00edas de la Informaci\u00f3n<\/span><br \/><b>Materia: <\/b>Gesti\u00f3n de seguridad de informaci\u00f3n<\/p>\n<p><strong>Introducci\u00f3n a la seguridad inform\u00e1tica<\/strong><\/p>\n<p><span>Esta primera parte pretende dar a conocer los conceptos generales relacionados a la seguridad inform\u00e1tica.<\/span><\/p>\n<p><span><\/span><span>Al hablar de t\u00e9rminos de seguridad inform\u00e1tica se debe entender a las bases que conforman los cimientos de esta ciencia, para las partes m\u00e1s complejas de esta disciplina, una de estas bases es el concepto de seguridad, la cual consiste en un estado de bienestar.<\/span><\/p>\n<p><span>Para el fin de preservar la informaci\u00f3n, se ha demostrado que no es suficiente la implantaci\u00f3n de controles y procedimientos de seguridad realizados frecuentemente sin un criterio com\u00fan establecido, en torno a la compra de productos t\u00e9cnicos y sin considerar toda la informaci\u00f3n esencial que se debe proteger.<\/span><\/p>\n<div>\n<div>\n<ul><\/ul>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.9.10&#8243; _module_preset=\u00bbdefault\u00bb hover_enabled=\u00bb0&#8243; sticky_enabled=\u00bb0&#8243;]<strong>C\u00f3digo iFrame<\/strong><\/p>\n<pre class=\"brush: php; title: ; notranslate\" title=\"\">\n&lt;div style=&quot;width: 100%;&quot;&gt;&lt;div style=&quot;position: relative; padding-bottom: 56.25%; padding-top: 0; height: 0;&quot;&gt;&lt;iframe frameborder=&quot;0&quot; width=&quot;1200&quot; height=&quot;675&quot; style=&quot;position: absolute; top: 0; left: 0; width: 100%; height: 100%;&quot; src=&quot;https:\/\/view.genial.ly\/5f63fa87ddb2dc0d8fa572a1&quot; type=&quot;text\/html&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; scrolling=&quot;yes&quot; allownetworking=&quot;all&quot;&gt;&lt;\/iframe&gt; &lt;\/div&gt; &lt;\/div&gt;\n<\/pre>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Facultad: Ingenier\u00edaMaestr\u00eda: Maestr\u00eda en Tecnolog\u00edas de la Informaci\u00f3nMateria: Gesti\u00f3n de seguridad de informaci\u00f3n Introducci\u00f3n a la seguridad inform\u00e1tica Esta primera parte pretende dar a conocer los conceptos generales relacionados a la seguridad inform\u00e1tica. Al hablar de t\u00e9rminos de seguridad inform\u00e1tica se debe entender a las bases que conforman los cimientos de esta ciencia, para las [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":9872,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[2165,387],"tags":[385,2479,2480,2474],"_links":{"self":[{"href":"https:\/\/puceapex.puce.edu.ec\/web\/cev\/wp-json\/wp\/v2\/posts\/9868"}],"collection":[{"href":"https:\/\/puceapex.puce.edu.ec\/web\/cev\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/puceapex.puce.edu.ec\/web\/cev\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/puceapex.puce.edu.ec\/web\/cev\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/puceapex.puce.edu.ec\/web\/cev\/wp-json\/wp\/v2\/comments?post=9868"}],"version-history":[{"count":6,"href":"https:\/\/puceapex.puce.edu.ec\/web\/cev\/wp-json\/wp\/v2\/posts\/9868\/revisions"}],"predecessor-version":[{"id":9875,"href":"https:\/\/puceapex.puce.edu.ec\/web\/cev\/wp-json\/wp\/v2\/posts\/9868\/revisions\/9875"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/puceapex.puce.edu.ec\/web\/cev\/wp-json\/wp\/v2\/media\/9872"}],"wp:attachment":[{"href":"https:\/\/puceapex.puce.edu.ec\/web\/cev\/wp-json\/wp\/v2\/media?parent=9868"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/puceapex.puce.edu.ec\/web\/cev\/wp-json\/wp\/v2\/categories?post=9868"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/puceapex.puce.edu.ec\/web\/cev\/wp-json\/wp\/v2\/tags?post=9868"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}