{"id":9876,"date":"2021-09-23T20:28:41","date_gmt":"2021-09-23T20:28:41","guid":{"rendered":"https:\/\/puceapex.puce.edu.ec\/web\/cev\/?p=9876"},"modified":"2021-09-23T20:34:13","modified_gmt":"2021-09-23T20:34:13","slug":"gestion-de-seguridad-de-informacion","status":"publish","type":"post","link":"https:\/\/puceapex.puce.edu.ec\/web\/cev\/gestion-de-seguridad-de-informacion\/","title":{"rendered":"Gesti\u00f3n de seguridad de informaci\u00f3n"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00bb1&#8243; admin_label=\u00bbsection\u00bb _builder_version=\u00bb3.22&#8243; da_disable_devices=\u00bboff|off|off\u00bb da_is_popup=\u00bboff\u00bb da_exit_intent=\u00bboff\u00bb da_has_close=\u00bbon\u00bb da_alt_close=\u00bboff\u00bb da_dark_close=\u00bboff\u00bb da_not_modal=\u00bbon\u00bb da_is_singular=\u00bboff\u00bb da_with_loader=\u00bboff\u00bb da_has_shadow=\u00bbon\u00bb][et_pb_row admin_label=\u00bbrow\u00bb _builder_version=\u00bb3.25&#8243; background_size=\u00bbinitial\u00bb background_position=\u00bbtop_left\u00bb background_repeat=\u00bbrepeat\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb3.25&#8243; custom_padding=\u00bb|||\u00bb custom_padding__hover=\u00bb|||\u00bb][et_pb_code _builder_version=\u00bb4.9.10&#8243; _module_preset=\u00bbdefault\u00bb]<code><\/p>\n<div style=\"width: 100%;\">\n<div style=\"position: relative; padding-bottom: 56.25%; padding-top: 0; height: 0;\"><iframe loading=\"lazy\" frameborder=\"0\" width=\"1200\" height=\"675\" style=\"position: absolute; top: 0; left: 0; width: 100%; height: 100%;\" src=\"https:\/\/view.genial.ly\/5f64219d96e6bf0d97ce3548\" type=\"text\/html\" allowscriptaccess=\"always\" allowfullscreen=\"true\" scrolling=\"yes\" allownetworking=\"all\"><\/iframe> <\/div>\n<\/p><\/div>\n<p><\/code>[\/et_pb_code][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.9.10&#8243; _module_preset=\u00bbdefault\u00bb min_height=\u00bb182px\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.9.10&#8243; _module_preset=\u00bbdefault\u00bb][et_pb_text admin_label=\u00bbText\u00bb _builder_version=\u00bb4.9.10&#8243; background_size=\u00bbinitial\u00bb background_position=\u00bbtop_left\u00bb background_repeat=\u00bbrepeat\u00bb custom_padding=\u00bb||16px|||\u00bb]<\/p>\n<p><b>Facultad:<\/b> <span>Ingenier\u00eda<\/span><br \/><b>Maestr\u00eda:<\/b> <span>Maestr\u00eda en Tecnolog\u00edas de la Informaci\u00f3n<\/span><br \/><b>Materia: <\/b>Gesti\u00f3n de seguridad de informaci\u00f3n<\/p>\n<p><strong><b>Gesti\u00f3n de seguridad de informaci\u00f3n<\/b><\/strong><\/p>\n<p><span>Esta primera parte pretende dar a conocer los conceptos relacionados a la seguridad de un sistema inform\u00e1tico.<\/span><span><\/span><\/p>\n<div>\n<div><span>Cuando se necesita brindar la seguridad a un sistema inform\u00e1tico se deben de tomar en cuenta todos los elementos que componen dicho sistema. Tambi\u00e9n se deben examinar las posibles amenazas que enfrentan con el fin de valorar el impacto que las amenazas generan.<\/span><\/div>\n<div><span>\u00a0<\/span><\/div>\n<\/div>\n<div><span>Por lo tanto, en este tema se manejan los aspectos de la gesti\u00f3n de riesgos inform\u00e1ticos relacionados con la identificaci\u00f3n, clasificaci\u00f3n y riesgos a los activos de informaci\u00f3n, junto con el an\u00e1lisis, valoraci\u00f3n, aceptaci\u00f3n, transferencia y mitigaci\u00f3n de estos riesgos.<\/span><\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.9.10&#8243; _module_preset=\u00bbdefault\u00bb hover_enabled=\u00bb0&#8243; sticky_enabled=\u00bb0&#8243;]<strong>C\u00f3digo iFrame<\/strong><\/p>\n<pre class=\"brush: php; title: ; notranslate\" title=\"\">\n&lt;div style=&quot;width: 100%;&quot;&gt;\n&lt;div style=&quot;width: 100%;&quot;&gt;&lt;div style=&quot;position: relative; padding-bottom: 56.25%; padding-top: 0; height: 0;&quot;&gt;&lt;iframe frameborder=&quot;0&quot; width=&quot;1200&quot; height=&quot;675&quot; style=&quot;position: absolute; top: 0; left: 0; width: 100%; height: 100%;&quot; src=&quot;https:\/\/view.genial.ly\/5f64219d96e6bf0d97ce3548&quot; type=&quot;text\/html&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; scrolling=&quot;yes&quot; allownetworking=&quot;all&quot;&gt;&lt;\/iframe&gt; &lt;\/div&gt; &lt;\/div&gt;\n<\/pre>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Facultad: Ingenier\u00edaMaestr\u00eda: Maestr\u00eda en Tecnolog\u00edas de la Informaci\u00f3nMateria: Gesti\u00f3n de seguridad de informaci\u00f3n Gesti\u00f3n de seguridad de informaci\u00f3n Esta primera parte pretende dar a conocer los conceptos relacionados a la seguridad de un sistema inform\u00e1tico. Cuando se necesita brindar la seguridad a un sistema inform\u00e1tico se deben de tomar en cuenta todos los elementos que [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":9881,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[2165,387],"tags":[2201,2479,2480,2474],"_links":{"self":[{"href":"https:\/\/puceapex.puce.edu.ec\/web\/cev\/wp-json\/wp\/v2\/posts\/9876"}],"collection":[{"href":"https:\/\/puceapex.puce.edu.ec\/web\/cev\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/puceapex.puce.edu.ec\/web\/cev\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/puceapex.puce.edu.ec\/web\/cev\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/puceapex.puce.edu.ec\/web\/cev\/wp-json\/wp\/v2\/comments?post=9876"}],"version-history":[{"count":7,"href":"https:\/\/puceapex.puce.edu.ec\/web\/cev\/wp-json\/wp\/v2\/posts\/9876\/revisions"}],"predecessor-version":[{"id":9884,"href":"https:\/\/puceapex.puce.edu.ec\/web\/cev\/wp-json\/wp\/v2\/posts\/9876\/revisions\/9884"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/puceapex.puce.edu.ec\/web\/cev\/wp-json\/wp\/v2\/media\/9881"}],"wp:attachment":[{"href":"https:\/\/puceapex.puce.edu.ec\/web\/cev\/wp-json\/wp\/v2\/media?parent=9876"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/puceapex.puce.edu.ec\/web\/cev\/wp-json\/wp\/v2\/categories?post=9876"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/puceapex.puce.edu.ec\/web\/cev\/wp-json\/wp\/v2\/tags?post=9876"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}