{"id":344,"date":"2021-06-04T15:49:04","date_gmt":"2021-06-04T15:49:04","guid":{"rendered":"https:\/\/blogs.uninter.edu.mx\/DTIP\/?p=344"},"modified":"2021-06-04T15:49:06","modified_gmt":"2021-06-04T15:49:06","slug":"que-es-un-ataque-cibernetico-y-sus-tipos","status":"publish","type":"post","link":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/04\/que-es-un-ataque-cibernetico-y-sus-tipos\/","title":{"rendered":"\u00bfQu\u00e9 es un ataque cibern\u00e9tico y sus tipos?"},"content":{"rendered":"\n<p class=\"has-text-align-left\">Un ataque cibern\u00e9tico es cuando un individuo o una organizaci\u00f3n intenta deliberada y maliciosamente violar sistemas de seguridad para robar informaci\u00f3n personal o institucional, lo que causa perjuicios muy graves. Por esto, estos grupos se dedican a la creaci\u00f3n y difusi\u00f3n de programas maliciosos (virus), accesos web no autorizados, sitios web falsos y otros medios que aprovechen <strong>fallas previamente desconocidas en el software<\/strong>.<\/p>\n\n\n\n<p>En la mayor\u00eda de ocasiones, se buscan rescates u otro tipo de beneficios econ\u00f3micos. Del mismo modo, pueden ser perpetuados con una serie de motivos, incluidos los prop\u00f3sitos de activismo pol\u00edtico.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/pexels-tima-miroshnichenko-5380664-1024x683.jpg\" alt=\"Ataque cibern\u00e9tico\" class=\"wp-image-376\" width=\"512\" height=\"342\" srcset=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/pexels-tima-miroshnichenko-5380664-1024x683.jpg 1024w, https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/pexels-tima-miroshnichenko-5380664-300x200.jpg 300w, https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/pexels-tima-miroshnichenko-5380664-768x512.jpg 768w, https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/pexels-tima-miroshnichenko-5380664-1536x1024.jpg 1536w, https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/pexels-tima-miroshnichenko-5380664-2048x1365.jpg 2048w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" \/><figcaption>Ciberseguridad, es el mayor reto de la era digital<\/figcaption><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Los tipos m\u00e1s comunes de ataques cibern\u00e9ticos<\/strong><\/h2>\n\n\n\n<p>Existen muchas formas de ciberataques, como:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Malware<\/li><li>Virus<\/li><li>Troyanos<\/li><li>Gusanos<\/li><li>Ransomware<\/li><li>Spyware<\/li><li><a href=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/05\/21\/como-identificar-y-evitar-un-correo-de-phishing\/\">Phishing<\/a><\/li><li>Inyecciones SQL<\/li><li>Denegaci\u00f3n de Servicio (DOS)<\/li><\/ul>\n\n\n\n<p>Gracias a algunos ataques cibern\u00e9ticos mundialmente conocidos, peliculas y series, es probable que la palabra &#8220;hacker&#8221; haya aparecido en los medios con bastante m\u00e1s frecuencia en los \u00faltimos a\u00f1os.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\u00bf<strong>Qu\u00e9 es un hacker?<\/strong><\/h2>\n\n\n\n<p>Un hacker o pirata inform\u00e1tico puede referirse a cualquier persona con habilidades t\u00e9cnicas para obtener acceso no autorizado a sistemas o redes con el fin de cometer delitos. Por ejemplo:<\/p>\n\n\n\n<ul class=\"wp-block-list\" id=\"block-b2affe2f-3433-4108-9677-c2bf966046ca\"><li>Robo de identidad, fraude y extorsi\u00f3n<\/li><li>Robo de hardware<\/li><li>Ataques de denegaci\u00f3n de servicio<\/li><li>Incumplimiento de acceso<\/li><li>Rastreo de contrase\u00f1as<\/li><li>Infiltraci\u00f3n de sistema<\/li><li>Desfiguraci\u00f3n de sitio web<\/li><li>Vulnerabilidades en exploradores web<\/li><\/ul>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/d4b07ed6d1d74838536d66dbb2c9d676.jpg\" alt=\"Hacker inform\u00e1tico\" class=\"wp-image-346\" width=\"480\" height=\"360\" srcset=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/d4b07ed6d1d74838536d66dbb2c9d676.jpg 960w, https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/d4b07ed6d1d74838536d66dbb2c9d676-300x225.jpg 300w, https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/d4b07ed6d1d74838536d66dbb2c9d676-768x576.jpg 768w\" sizes=\"auto, (max-width: 480px) 100vw, 480px\" \/><figcaption>Cuidado con los hackers por internet<\/figcaption><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>\u00bfC\u00f3mo podemos prevenir un ataque cibern\u00e9tico?<\/strong><\/h2>\n\n\n\n<p>Hay que tener claro que a\u00fan sabiendo que es un ataque cibern\u00e9tico no siempre es suficiente para evitarlos. Los hackers parecen ir un paso por delante, por lo que los usuarios se ven obligados a tomar todas las medidas de seguridad b\u00e1sicas a su alcance.<\/p>\n\n\n\n<p>Sobre todo, el contar con protocolos de codificaci\u00f3n seguros, mantener actualizados los sistemas y el software de de seguridad, aprovechar los cortafuegos y las herramientas y soluciones de gesti\u00f3n de amenazas. Del mismo modo, instalar software antivirus en todos los sistemas, controlar el acceso y los privilegios de los usuarios, realizar copias de seguridad con frecuencia y buscar proactivamente amenazas desconocidas.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/pexels-dan-nelson-3949100-1024x577.jpg\" alt=\"Imagen de una pc siendo conectada a una Red Privada Virtual (VPN)\" class=\"wp-image-354\" width=\"768\" height=\"433\" srcset=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/pexels-dan-nelson-3949100-1024x577.jpg 1024w, https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/pexels-dan-nelson-3949100-300x169.jpg 300w, https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/pexels-dan-nelson-3949100-768x433.jpg 768w, https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/pexels-dan-nelson-3949100-1536x865.jpg 1536w, https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/pexels-dan-nelson-3949100-2048x1154.jpg 2048w, https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/pexels-dan-nelson-3949100-460x260.jpg 460w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/><figcaption>Conecta tus dispositivos a una VPN para una conexi\u00f3n segura<\/figcaption><\/figure><\/div>\n\n\n\n<p>En conclusi\u00f3n, ser diligente con respecto a la ciberseguridad en el lugar de trabajo y en el hogar puede marcar una gran diferencia para nuestra seguridad y la de nuestra empresa por esto y mas siempre sigue las recomendaciones de seguridad de tu departamento de tecnolog\u00eda y en caso de tener alguna duda, contactalos.<\/p>\n\n\n\n<p>Te invitamos a seguir nuestro blog para m\u00e1s informaci\u00f3n: <a href=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/\">DTIP<\/a><\/p>\n\n\n\n<p>Fuentes: <a href=\"https:\/\/ticnegocios.camaravalencia.com\/servicios\/tendencias\/que-es-un-ciberataque-y-que-tipos-existen\/#Que_tipos_de_ciberataque_existen\">ticnegocios<\/a> <a href=\"https:\/\/www.infocyte.com\/es\/blog\/2019\/05\/01\/cybersecurity-101-intro-to-the-top-10-common-types-of-cyber-security-attacks\/\">infocyte<\/a> <a href=\"https:\/\/www.techopedia.com\/definition\/24748\/cyberattack\">Techopedia<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Un ataque cibern\u00e9tico es cuando un individuo o una organizaci\u00f3n intenta deliberada y maliciosamente violar sistemas de seguridad para robar informaci\u00f3n personal o institucional, lo que causa perjuicios muy graves. Por esto, estos grupos se dedican a la creaci\u00f3n y difusi\u00f3n de programas maliciosos (virus), accesos web no autorizados, sitios web falsos y otros medios&hellip;<\/p>\n","protected":false},"author":2,"featured_media":398,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[30],"tags":[41,32,42],"class_list":["post-344","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciberseguridad","tag-ataque-cibernetico","tag-ciberseguridad","tag-sistemas"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>\u00bfQu\u00e9 es un ataque cibern\u00e9tico y sus tipos? - DTIP<\/title>\r\n<meta name=\"description\" content=\"En esta entrada del blog veremos que es un ataque cibern\u00e9tico y sus tipos. Ingresa a este blog para m\u00e1s consejos de ciberseguridad.\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/04\/que-es-un-ataque-cibernetico-y-sus-tipos\/\" \/>\r\n<meta property=\"og:locale\" content=\"es_MX\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"\u00bfQu\u00e9 es un ataque cibern\u00e9tico y sus tipos? - DTIP\" \/>\r\n<meta property=\"og:description\" content=\"En esta entrada del blog veremos que es un ataque cibern\u00e9tico y sus tipos. Ingresa a este blog para m\u00e1s consejos de ciberseguridad.\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/04\/que-es-un-ataque-cibernetico-y-sus-tipos\/\" \/>\r\n<meta property=\"og:site_name\" content=\"DTIP\" \/>\r\n<meta property=\"article:published_time\" content=\"2021-06-04T15:49:04+00:00\" \/>\r\n<meta property=\"article:modified_time\" content=\"2021-06-04T15:49:06+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/ATAQUE-CIBERNETICO-4.jpg\" \/>\r\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\r\n\t<meta property=\"og:image:height\" content=\"628\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\r\n<meta name=\"author\" content=\"Alejandro Navarro\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alejandro Navarro\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/04\/que-es-un-ataque-cibernetico-y-sus-tipos\/\",\"url\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/04\/que-es-un-ataque-cibernetico-y-sus-tipos\/\",\"name\":\"\u00bfQu\u00e9 es un ataque cibern\u00e9tico y sus tipos? - DTIP\",\"isPartOf\":{\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/04\/que-es-un-ataque-cibernetico-y-sus-tipos\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/04\/que-es-un-ataque-cibernetico-y-sus-tipos\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/ATAQUE-CIBERNETICO-3.jpg\",\"datePublished\":\"2021-06-04T15:49:04+00:00\",\"dateModified\":\"2021-06-04T15:49:06+00:00\",\"author\":{\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/#\/schema\/person\/4fb1c915f41fffa4fde5651cfab88e3a\"},\"description\":\"En esta entrada del blog veremos que es un ataque cibern\u00e9tico y sus tipos. Ingresa a este blog para m\u00e1s consejos de ciberseguridad.\",\"breadcrumb\":{\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/04\/que-es-un-ataque-cibernetico-y-sus-tipos\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/04\/que-es-un-ataque-cibernetico-y-sus-tipos\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/04\/que-es-un-ataque-cibernetico-y-sus-tipos\/#primaryimage\",\"url\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/ATAQUE-CIBERNETICO-3.jpg\",\"contentUrl\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/ATAQUE-CIBERNETICO-3.jpg\",\"width\":460,\"height\":260,\"caption\":\"Ataque cibern\u00e9tico\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/04\/que-es-un-ataque-cibernetico-y-sus-tipos\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u00bfQu\u00e9 es un ataque cibern\u00e9tico y sus tipos?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/#website\",\"url\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/\",\"name\":\"DTIP\",\"description\":\"Direcci\u00f3n de Tecnolog\u00edas y Publicidad\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/#\/schema\/person\/4fb1c915f41fffa4fde5651cfab88e3a\",\"name\":\"Alejandro Navarro\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/bf2c65c0900ca2ec69daf572d5da8dc41dece9a6a90e483f9b8464cb37c15c6c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/bf2c65c0900ca2ec69daf572d5da8dc41dece9a6a90e483f9b8464cb37c15c6c?s=96&d=mm&r=g\",\"caption\":\"Alejandro Navarro\"},\"url\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/author\/anavarro\/\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u00bfQu\u00e9 es un ataque cibern\u00e9tico y sus tipos? - DTIP","description":"En esta entrada del blog veremos que es un ataque cibern\u00e9tico y sus tipos. Ingresa a este blog para m\u00e1s consejos de ciberseguridad.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/04\/que-es-un-ataque-cibernetico-y-sus-tipos\/","og_locale":"es_MX","og_type":"article","og_title":"\u00bfQu\u00e9 es un ataque cibern\u00e9tico y sus tipos? - DTIP","og_description":"En esta entrada del blog veremos que es un ataque cibern\u00e9tico y sus tipos. Ingresa a este blog para m\u00e1s consejos de ciberseguridad.","og_url":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/04\/que-es-un-ataque-cibernetico-y-sus-tipos\/","og_site_name":"DTIP","article_published_time":"2021-06-04T15:49:04+00:00","article_modified_time":"2021-06-04T15:49:06+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/ATAQUE-CIBERNETICO-4.jpg","type":"image\/jpeg"}],"author":"Alejandro Navarro","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Alejandro Navarro","Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/04\/que-es-un-ataque-cibernetico-y-sus-tipos\/","url":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/04\/que-es-un-ataque-cibernetico-y-sus-tipos\/","name":"\u00bfQu\u00e9 es un ataque cibern\u00e9tico y sus tipos? - DTIP","isPartOf":{"@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/04\/que-es-un-ataque-cibernetico-y-sus-tipos\/#primaryimage"},"image":{"@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/04\/que-es-un-ataque-cibernetico-y-sus-tipos\/#primaryimage"},"thumbnailUrl":"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/ATAQUE-CIBERNETICO-3.jpg","datePublished":"2021-06-04T15:49:04+00:00","dateModified":"2021-06-04T15:49:06+00:00","author":{"@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/#\/schema\/person\/4fb1c915f41fffa4fde5651cfab88e3a"},"description":"En esta entrada del blog veremos que es un ataque cibern\u00e9tico y sus tipos. Ingresa a este blog para m\u00e1s consejos de ciberseguridad.","breadcrumb":{"@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/04\/que-es-un-ataque-cibernetico-y-sus-tipos\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/04\/que-es-un-ataque-cibernetico-y-sus-tipos\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/04\/que-es-un-ataque-cibernetico-y-sus-tipos\/#primaryimage","url":"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/ATAQUE-CIBERNETICO-3.jpg","contentUrl":"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/ATAQUE-CIBERNETICO-3.jpg","width":460,"height":260,"caption":"Ataque cibern\u00e9tico"},{"@type":"BreadcrumbList","@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/04\/que-es-un-ataque-cibernetico-y-sus-tipos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/blogs.uninter.edu.mx\/DTIP\/"},{"@type":"ListItem","position":2,"name":"\u00bfQu\u00e9 es un ataque cibern\u00e9tico y sus tipos?"}]},{"@type":"WebSite","@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/#website","url":"https:\/\/blogs.uninter.edu.mx\/DTIP\/","name":"DTIP","description":"Direcci\u00f3n de Tecnolog\u00edas y Publicidad","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blogs.uninter.edu.mx\/DTIP\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Person","@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/#\/schema\/person\/4fb1c915f41fffa4fde5651cfab88e3a","name":"Alejandro Navarro","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/bf2c65c0900ca2ec69daf572d5da8dc41dece9a6a90e483f9b8464cb37c15c6c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bf2c65c0900ca2ec69daf572d5da8dc41dece9a6a90e483f9b8464cb37c15c6c?s=96&d=mm&r=g","caption":"Alejandro Navarro"},"url":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/author\/anavarro\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/ATAQUE-CIBERNETICO-3.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/posts\/344","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/comments?post=344"}],"version-history":[{"count":32,"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/posts\/344\/revisions"}],"predecessor-version":[{"id":409,"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/posts\/344\/revisions\/409"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/media\/398"}],"wp:attachment":[{"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/media?parent=344"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/categories?post=344"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/tags?post=344"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}