{"id":9885,"date":"2021-09-23T20:58:42","date_gmt":"2021-09-23T20:58:42","guid":{"rendered":"https:\/\/puceapex.puce.edu.ec\/web\/cev\/?p=9885"},"modified":"2021-09-23T21:01:21","modified_gmt":"2021-09-23T21:01:21","slug":"manejo-de-la-seguridad-informatica-corporativa","status":"publish","type":"post","link":"https:\/\/puceapex.puce.edu.ec\/web\/cev\/manejo-de-la-seguridad-informatica-corporativa\/","title":{"rendered":"Manejo de la seguridad inform\u00e1tica corporativa"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00bb1&#8243; admin_label=\u00bbsection\u00bb _builder_version=\u00bb3.22&#8243; da_disable_devices=\u00bboff|off|off\u00bb da_is_popup=\u00bboff\u00bb da_exit_intent=\u00bboff\u00bb da_has_close=\u00bbon\u00bb da_alt_close=\u00bboff\u00bb da_dark_close=\u00bboff\u00bb da_not_modal=\u00bbon\u00bb da_is_singular=\u00bboff\u00bb da_with_loader=\u00bboff\u00bb da_has_shadow=\u00bbon\u00bb][et_pb_row admin_label=\u00bbrow\u00bb _builder_version=\u00bb3.25&#8243; background_size=\u00bbinitial\u00bb background_position=\u00bbtop_left\u00bb background_repeat=\u00bbrepeat\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb3.25&#8243; custom_padding=\u00bb|||\u00bb custom_padding__hover=\u00bb|||\u00bb][et_pb_code _builder_version=\u00bb4.9.10&#8243; _module_preset=\u00bbdefault\u00bb]<code><\/p>\n<div style=\"width: 100%;\">\n<div style=\"position: relative; padding-bottom: 56.25%; padding-top: 0; height: 0;\"><iframe loading=\"lazy\" frameborder=\"0\" width=\"1200\" height=\"675\" style=\"position: absolute; top: 0; left: 0; width: 100%; height: 100%;\" src=\"https:\/\/view.genial.ly\/5f666bd1aeba3b0d96caf256\" type=\"text\/html\" allowscriptaccess=\"always\" allowfullscreen=\"true\" scrolling=\"yes\" allownetworking=\"all\"><\/iframe> <\/div>\n<\/p><\/div>\n<p><\/code>[\/et_pb_code][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.9.10&#8243; _module_preset=\u00bbdefault\u00bb min_height=\u00bb182px\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.9.10&#8243; _module_preset=\u00bbdefault\u00bb][et_pb_text admin_label=\u00bbText\u00bb _builder_version=\u00bb4.9.10&#8243; background_size=\u00bbinitial\u00bb background_position=\u00bbtop_left\u00bb background_repeat=\u00bbrepeat\u00bb custom_padding=\u00bb||16px|||\u00bb]<\/p>\n<p><b>Facultad:<\/b> <span>Ingenier\u00eda<\/span><br \/><b>Maestr\u00eda:<\/b> <span>Maestr\u00eda en Tecnolog\u00edas de la Informaci\u00f3n<\/span><br \/><b>Materia: <\/b>Gesti\u00f3n de seguridad de informaci\u00f3n<\/p>\n<p><strong><span style=\"color: #000000;\">Manejo de la seguridad <\/span><\/strong><strong><span style=\"color: #000000;\">inform\u00e1tica corporativa<\/span><\/strong><\/p>\n<p><span>En la actualidad la seguridad inform\u00e1tica corporativa es de suma importancia y escalable. Est\u00e1 compuesta de normas, reglamentos y pr\u00e1cticas de regulaciones (generales o propias de cada organizaci\u00f3n o empresa) que gobierna la gesti\u00f3n, protecci\u00f3n y distribuci\u00f3n de los activos de informaci\u00f3n.<\/span><\/p>\n<div>\n<div>Por tanto, a lo largo de este tema se cubren varios de los aspectos que est\u00e1n relacionados con las pol\u00edticas y procedimientos de seguridad inform\u00e1tica corporativa, adem\u00e1s de la arquitectura esencial en la que est\u00e1 basada el aseguramiento de la informaci\u00f3n.<\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.9.10&#8243; _module_preset=\u00bbdefault\u00bb hover_enabled=\u00bb0&#8243; sticky_enabled=\u00bb0&#8243;]<strong>C\u00f3digo iFrame<\/strong><\/p>\n<pre class=\"brush: php; title: ; notranslate\" title=\"\">\n&lt;div style=&quot;width: 100%;&quot;&gt;&lt;div style=&quot;position: relative; padding-bottom: 56.25%; padding-top: 0; height: 0;&quot;&gt;&lt;iframe frameborder=&quot;0&quot; width=&quot;1200&quot; height=&quot;675&quot; style=&quot;position: absolute; top: 0; left: 0; width: 100%; height: 100%;&quot; src=&quot;https:\/\/view.genial.ly\/5f666bd1aeba3b0d96caf256&quot; type=&quot;text\/html&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; scrolling=&quot;yes&quot; allownetworking=&quot;all&quot;&gt;&lt;\/iframe&gt; &lt;\/div&gt; &lt;\/div&gt;\n<\/pre>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Facultad: Ingenier\u00edaMaestr\u00eda: Maestr\u00eda en Tecnolog\u00edas de la Informaci\u00f3nMateria: Gesti\u00f3n de seguridad de informaci\u00f3n Manejo de la seguridad inform\u00e1tica corporativa En la actualidad la seguridad inform\u00e1tica corporativa es de suma importancia y escalable. Est\u00e1 compuesta de normas, reglamentos y pr\u00e1cticas de regulaciones (generales o propias de cada organizaci\u00f3n o empresa) que gobierna la gesti\u00f3n, protecci\u00f3n y [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":9890,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[2165,387],"tags":[2482,2481,2479,2480,2474],"_links":{"self":[{"href":"https:\/\/puceapex.puce.edu.ec\/web\/cev\/wp-json\/wp\/v2\/posts\/9885"}],"collection":[{"href":"https:\/\/puceapex.puce.edu.ec\/web\/cev\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/puceapex.puce.edu.ec\/web\/cev\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/puceapex.puce.edu.ec\/web\/cev\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/puceapex.puce.edu.ec\/web\/cev\/wp-json\/wp\/v2\/comments?post=9885"}],"version-history":[{"count":6,"href":"https:\/\/puceapex.puce.edu.ec\/web\/cev\/wp-json\/wp\/v2\/posts\/9885\/revisions"}],"predecessor-version":[{"id":9893,"href":"https:\/\/puceapex.puce.edu.ec\/web\/cev\/wp-json\/wp\/v2\/posts\/9885\/revisions\/9893"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/puceapex.puce.edu.ec\/web\/cev\/wp-json\/wp\/v2\/media\/9890"}],"wp:attachment":[{"href":"https:\/\/puceapex.puce.edu.ec\/web\/cev\/wp-json\/wp\/v2\/media?parent=9885"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/puceapex.puce.edu.ec\/web\/cev\/wp-json\/wp\/v2\/categories?post=9885"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/puceapex.puce.edu.ec\/web\/cev\/wp-json\/wp\/v2\/tags?post=9885"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}