{"id":87167,"date":"2024-09-02T07:58:42","date_gmt":"2024-09-02T12:58:42","guid":{"rendered":"https:\/\/thecitizenfortheworld.com\/?p=87167"},"modified":"2024-09-02T07:58:42","modified_gmt":"2024-09-02T12:58:42","slug":"glosario-de-tecnologia-como-es-un-ataque-informatico","status":"publish","type":"post","link":"https:\/\/thecitizenfortheworld.com\/?p=87167","title":{"rendered":"Glosario de tecnolog\u00eda: c\u00f3mo es un ataque inform\u00e1tico"},"content":{"rendered":"<p>Conocer el significado de nuevas palabras ayudar\u00e1 a incrementar el conocimiento y vocabulario por igual<\/p>\n<p>En las \u00faltimas d\u00e9cadas\u00a0<b>la tecnolog\u00eda<\/b>\u00a0no solo se convirti\u00f3 en una herramienta b\u00e1sica, sino en parte de nuestra vida diaria, al punto de que es casi imposible imaginar c\u00f3mo ser\u00eda realizar tareas sin ella.<\/p>\n<p class=\"paragraph\" data-mrf-recirculation=\"Links inline\">Sin duda, la pandemia de COVID-19 impuls\u00f3 a partir del 2020 que en todo el mundo las personas se aproximaron m\u00e1s al\u00a0<b>internet de las cosas<\/b>, para a su vez, acercarse a las personas con las que se tuvieron que alejar f\u00edsicamente. De repente, hasta los m\u00e1s renuentes se acercaron a la tecnolog\u00eda y tuvieron que aprender a usarla para sacarle provecho.<\/p>\n<p class=\"paragraph\" data-mrf-recirculation=\"Links inline\">Sin embargo, las cosas no terminaron con la pandemia. Ha quedado m\u00e1s que claro que la tecnolog\u00eda no solo seguir\u00e1 en nuestra vida, si no que\u00a0<b>seguir\u00e1 tomando importancia<\/b>\u00a0en la forma en que realizamos todas nuestras actividades, por ello es necesario que nuestro entendimiento y conocimiento siga ampli\u00e1ndose para evitar quedar rezagados.<\/p>\n<div class=\"headline-wrapper\">\n<h2 class=\"header headline-class-h2\">Ataque inform\u00e1tico<\/h2>\n<\/div>\n<div class=\"visual__image\"><img decoding=\"async\" loading=\"lazy\" class=\"\" src=\"https:\/\/www.infobae.com\/new-resizer\/9WXVPG8gk8nambFY_fGttQj8LAQ=\/420x280\/filters:format(webp):quality(85)\/cloudfront-us-east-1.images.arcpublishing.com\/infobae\/SBCKBMR4CVCCNOK2MHSTSGYBPA.jpg%20420w\" sizes=\"(min-width: 1560px) 856px, (min-width: 1000px) calc(74.63vw - 293px), (min-width: 780px) calc(100vw - 376px), (min-width: 580px) calc(100vw - 32px), 100vw\" srcset=\"https:\/\/www.infobae.com\/new-resizer\/9WXVPG8gk8nambFY_fGttQj8LAQ=\/420x280\/filters:format(webp):quality(85)\/cloudfront-us-east-1.images.arcpublishing.com\/infobae\/SBCKBMR4CVCCNOK2MHSTSGYBPA.jpg 420w,https:\/\/www.infobae.com\/new-resizer\/_pYMOGOrVlpbhGgDNcstNXvA3vw=\/768x512\/filters:format(webp):quality(85)\/cloudfront-us-east-1.images.arcpublishing.com\/infobae\/SBCKBMR4CVCCNOK2MHSTSGYBPA.jpg 768w,https:\/\/www.infobae.com\/new-resizer\/HOtVZ76c8DhfkyanKUwsNCT7fWE=\/992x661\/filters:format(webp):quality(85)\/cloudfront-us-east-1.images.arcpublishing.com\/infobae\/SBCKBMR4CVCCNOK2MHSTSGYBPA.jpg 992w,https:\/\/www.infobae.com\/new-resizer\/5osJ8Bwh-Hq5h4b1Yc2cRtKMTLM=\/1200x800\/filters:format(webp):quality(85)\/cloudfront-us-east-1.images.arcpublishing.com\/infobae\/SBCKBMR4CVCCNOK2MHSTSGYBPA.jpg 1200w,https:\/\/www.infobae.com\/new-resizer\/hZ088fw-Mkt8JCDQRe6B7bR0ahk=\/1440x960\/filters:format(webp):quality(85)\/cloudfront-us-east-1.images.arcpublishing.com\/infobae\/SBCKBMR4CVCCNOK2MHSTSGYBPA.jpg 1440w\" alt=\"La tecnolog\u00eda es sumamente \u00fatil en las actividades diarias. (Getty Images)\" width=\"612\" height=\"408\" data-src=\"https:\/\/www.infobae.com\/new-resizer\/9WXVPG8gk8nambFY_fGttQj8LAQ=\/420x280\/filters:format(webp):quality(85)\/cloudfront-us-east-1.images.arcpublishing.com\/infobae\/SBCKBMR4CVCCNOK2MHSTSGYBPA.jpg 420w\" \/><\/div>\n<div class=\"visual__image\"><em>La tecnolog\u00eda es sumamente \u00fatil en las actividades diarias. (Getty Images)<\/em><\/div>\n<p class=\"paragraph\" data-mrf-recirculation=\"Links inline\"><b>Un ataque inform\u00e1tico (tambi\u00e9n llamado ciberataque) es un intento de da\u00f1ar o eliminar todos los componentes de un sistema inform\u00e1tico.<\/b><\/p>\n<div class=\"inline_2_DSK ad-wrapper ad-desktop\">\n<div class=\"dfpAd ad-inline\">Normalmente los ciberataques tienen un objetivo, ya sea el de obtener informaci\u00f3n privilegiada para beneficio propio o para hacer chantajes.<\/div>\n<\/div>\n<div><\/div>\n<div>\n<div class=\"headline-wrapper\">\n<h2 class=\"header headline-class-h2\">Tipos de ataques inform\u00e1ticos<\/h2>\n<\/div>\n<p class=\"paragraph\" data-mrf-recirculation=\"Links inline\">Cada ciberataque es distinto, todo dependiendo principalmente de lo que quieran conseguir los atacantes:<\/p>\n<ul class=\"list\" data-icon=\"\u2b24\">\n<li data-icon=\"\u2b24\"><b>Malware\u00a0<\/b>. Se trata de un software malicioso que puede tener varias funciones como por ejemplo, el bloquear funcionas o incluso transmitir informaci\u00f3n delicada. Los malwares tienen su propia subdivisi\u00f3n: Ransomware. El ransomware es el bloqueo de la informaci\u00f3n importante para as\u00ed pedir dinero a cambio de su liberaci\u00f3n. Alteraci\u00f3n de componentes. Un malware puede estar dise\u00f1ado para simplemente da\u00f1ar los componentes donde se est\u00e9 alojando. Spyware. El spyware es un software malicioso cuyo objetivo es obtener informaci\u00f3n restringida o importante.<\/li>\n<li data-icon=\"\u2b24\"><b>Phishing\u00a0<\/b>. El phishing es la suplantaci\u00f3n de identidad a trav\u00e9s de la red. Esta normalmente se hace enviando comunicados fraudulentos a trav\u00e9s de varios medios. Gracias a esto, obtienen informaci\u00f3n importante como usuarios y contrase\u00f1as.<\/li>\n<li data-icon=\"\u2b24\"><b>Ataque de intermediario\u00a0<\/b>. Este tipo de ataques se da cuando existen comunicaciones entre dos partes criminales.<\/li>\n<li data-icon=\"\u2b24\"><b>Denegaci\u00f3n de servicio\u00a0<\/b>. En este caso se saturan o llenan los servicios pertinentes, todo para acabar los servicios y el ancho de banda.<\/li>\n<li data-icon=\"\u2b24\"><b>Inyecci\u00f3n de SQL\u00a0<\/b>. La inyecci\u00f3n de SQL consiste en alojar un c\u00f3digo especial en un servidor que haga uso de SQL. Esto hace que revele informaci\u00f3n importante.<\/li>\n<li data-icon=\"\u2b24\"><b>Ataque de d\u00eda cero\u00a0<\/b>. Se comienza por atacar un ordenador en espec\u00edfico, explotando sus debilidades para luego ir contra un sistema m\u00e1s grande.<\/li>\n<li data-icon=\"\u2b24\"><b>Man-in-the-middle (MitM)\u00a0<\/b>. El atacante supervisa la comunicaci\u00f3n entre dos partes, para luego pasar a falsificar mientras se hace pasar por uno de ellos.<\/li>\n<li data-icon=\"\u2b24\"><b>Ataque de transmisi\u00f3n\u00a0<\/b>. Aqu\u00ed se env\u00eda alg\u00fan archivo o software malicioso de forma camuflada a trav\u00e9s de una transmisi\u00f3n de datos.<\/li>\n<li data-icon=\"\u2b24\"><b>Cadena de suministro\u00a0<\/b>. Se centra en vulnerar a un tercero que suministre un servicio como por ejemplo internet.<\/li>\n<\/ul>\n<div class=\"headline-wrapper\">\n<h2 class=\"header headline-class-h2\">Consecuencias de un ataque inform\u00e1tico<\/h2>\n<\/div>\n<p class=\"paragraph\" data-mrf-recirculation=\"Links inline\">Como bien se dijo antes, un ciberataque suele tener un objetivo en espec\u00edfico. Y all\u00ed es d\u00f3nde se pueden ver las consecuencias.<\/p>\n<p class=\"paragraph\" data-mrf-recirculation=\"Links inline\">Desde la filtraci\u00f3n de datos importantes y delicados, pasando por la eliminaci\u00f3n de informaci\u00f3n igual de importante.<\/p>\n<p class=\"paragraph\" data-mrf-recirculation=\"Links inline\">Tambi\u00e9n se cuenta el ataque a un sistema mayor, siendo una pr\u00e1ctica usual para da\u00f1arlo.<\/p>\n<div class=\"headline-wrapper\">\n<h2 class=\"header headline-class-h2\">Objetivos y motivaciones de un ataque inform\u00e1tico<\/h2>\n<\/div>\n<p class=\"paragraph\" data-mrf-recirculation=\"Links inline\">Se sabe que detr\u00e1s de un ataque inform\u00e1tico hay una raz\u00f3n y un objetivo. Adem\u00e1s, hay clasificaci\u00f3n que se hace para esto:<\/p>\n<ul class=\"list\" data-icon=\"\u2b24\">\n<li data-icon=\"\u2b24\"><b>Ataques indistintos\u00a0<\/b>. Estos ataques son globales y no hacen distinci\u00f3n a compa\u00f1\u00edas o gobiernos.<\/li>\n<li data-icon=\"\u2b24\"><b>Ataques destructivos\u00a0<\/b>. Se concentran en hacer da\u00f1o a organizaciones espec\u00edficas<\/li>\n<li data-icon=\"\u2b24\"><b>Guerra cibern\u00e9tica\u00a0<\/b>. Ataque de dos o m\u00e1s bandos donde los intereses pol\u00edticos suelen ser los m\u00e1s comunes.<\/li>\n<li data-icon=\"\u2b24\"><b>Espionaje\u00a0<\/b>. Refieren al robo de informaci\u00f3n a una organizaci\u00f3n, empresa o gobierno.<\/li>\n<li data-icon=\"\u2b24\"><b>Hurto de datos de acceso y correos electr\u00f3nicos\u00a0<\/b>. Como bien dice su nombre, se hace referencia a los usuarios y contrase\u00f1as que se utilizan para ingresar a un correo electr\u00f3nico o a una p\u00e1gina en espec\u00edfico.<\/li>\n<li data-icon=\"\u2b24\"><b>Robo de datos financieros\u00a0<\/b>. Hace referencia a cuentas bancarias y tarjetas de cr\u00e9dito.<\/li>\n<\/ul>\n<div class=\"visual__image\"><img decoding=\"async\" loading=\"lazy\" class=\"\" src=\"https:\/\/www.infobae.com\/new-resizer\/qct3Kg9EoJortWJkJF299likM9I=\/420x236\/filters:format(webp):quality(85)\/cloudfront-us-east-1.images.arcpublishing.com\/infobae\/GLOFWRJ7M5B4RPONJPYFFCVIWU.jpg%20420w\" sizes=\"(min-width: 1560px) 856px, (min-width: 1000px) calc(74.63vw - 293px), (min-width: 780px) calc(100vw - 376px), (min-width: 580px) calc(100vw - 32px), 100vw\" srcset=\"https:\/\/www.infobae.com\/new-resizer\/qct3Kg9EoJortWJkJF299likM9I=\/420x236\/filters:format(webp):quality(85)\/cloudfront-us-east-1.images.arcpublishing.com\/infobae\/GLOFWRJ7M5B4RPONJPYFFCVIWU.jpg 420w,https:\/\/www.infobae.com\/new-resizer\/QOID9Ze93jOwOSSBO4PBJgUKato=\/768x432\/filters:format(webp):quality(85)\/cloudfront-us-east-1.images.arcpublishing.com\/infobae\/GLOFWRJ7M5B4RPONJPYFFCVIWU.jpg 768w,https:\/\/www.infobae.com\/new-resizer\/Ti7FH04lkbuvqGhPCZtMBfitgC8=\/992x558\/filters:format(webp):quality(85)\/cloudfront-us-east-1.images.arcpublishing.com\/infobae\/GLOFWRJ7M5B4RPONJPYFFCVIWU.jpg 992w,https:\/\/www.infobae.com\/new-resizer\/dEzedBzDkzPbFyKdWBftv4D0Y9c=\/1200x675\/filters:format(webp):quality(85)\/cloudfront-us-east-1.images.arcpublishing.com\/infobae\/GLOFWRJ7M5B4RPONJPYFFCVIWU.jpg 1200w,https:\/\/www.infobae.com\/new-resizer\/rOP3ERIQlqzYr4WYNL_GZ4xMmWs=\/1440x810\/filters:format(webp):quality(85)\/cloudfront-us-east-1.images.arcpublishing.com\/infobae\/GLOFWRJ7M5B4RPONJPYFFCVIWU.jpg 1440w\" alt=\"La tecnolog\u00eda es un aliado de las personas en su d\u00eda a d\u00eda. (Imagen Ilustrativa Infobae) \" width=\"1456\" height=\"816\" data-src=\"https:\/\/www.infobae.com\/new-resizer\/qct3Kg9EoJortWJkJF299likM9I=\/420x236\/filters:format(webp):quality(85)\/cloudfront-us-east-1.images.arcpublishing.com\/infobae\/GLOFWRJ7M5B4RPONJPYFFCVIWU.jpg 420w\" \/><em>La tecnolog\u00eda es un aliado de las personas en su d\u00eda a d\u00eda. (Imagen Ilustrativa Infobae)<\/em><\/div>\n<div class=\"headline-wrapper\">\n<h2 class=\"header headline-class-h2\">La tecnolog\u00eda y la vida<\/h2>\n<\/div>\n<p class=\"paragraph\" data-mrf-recirculation=\"Links inline\">La tecnolog\u00eda, omnipresente en cada aspecto de la\u00a0<b>vida cotidiana<\/b>, puede generar inseguridad o desconcierto en algunas personas ante ciertas situaciones. No obstante,\u00a0<b>adquirir conocimientos y habilidades<\/b>\u00a0en este \u00e1mbito se presenta como la estrategia m\u00e1s efectiva para enfrentar estos desaf\u00edos.<\/p>\n<p class=\"paragraph\" data-mrf-recirculation=\"Links inline\">Por caso, el estar familiarizado con t\u00e9cnicas como el phishing es crucial para prevenir el fraude. Esto no solo protege al individuo, sino que tambi\u00e9n le permite advertir a otros si detecta\u00a0<b>comportamientos sospechosos<\/b>\u00a0en los sitios web que visita.<\/p>\n<p data-mrf-recirculation=\"Links inline\">(<em>Con informaci\u00f3n de Infobae<\/em>)<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Conocer el significado de nuevas palabras ayudar\u00e1 a incrementar el conocimiento y vocabulario por igual En las \u00faltimas d\u00e9cadas\u00a0la tecnolog\u00eda\u00a0no solo se convirti\u00f3 en una herramienta b\u00e1sica, sino en parte de nuestra vida diaria, al punto de que es casi imposible imaginar c\u00f3mo ser\u00eda realizar tareas sin ella. Sin duda, la pandemia de COVID-19 impuls\u00f3 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":87168,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_mi_skip_tracking":false},"categories":[7],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Glosario de tecnolog\u00eda: c\u00f3mo es un ataque inform\u00e1tico - The citizen for the world<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/thecitizenfortheworld.com\/?p=87167\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Glosario de tecnolog\u00eda: c\u00f3mo es un ataque inform\u00e1tico - The citizen for the world\" \/>\n<meta property=\"og:description\" content=\"Conocer el significado de nuevas palabras ayudar\u00e1 a incrementar el conocimiento y vocabulario por igual En las \u00faltimas d\u00e9cadas\u00a0la tecnolog\u00eda\u00a0no solo se convirti\u00f3 en una herramienta b\u00e1sica, sino en parte de nuestra vida diaria, al punto de que es casi imposible imaginar c\u00f3mo ser\u00eda realizar tareas sin ella. Sin duda, la pandemia de COVID-19 impuls\u00f3 [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/thecitizenfortheworld.com\/?p=87167\" \/>\n<meta property=\"og:site_name\" content=\"The citizen for the world\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/thecitizenfortheworld\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-02T12:58:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/thecitizenfortheworld.com\/wp-content\/uploads\/2024\/09\/glosario.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"309\" \/>\n\t<meta property=\"og:image:height\" content=\"163\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"thecitizenfortheworld23@gmail.com\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"thecitizenfortheworld23@gmail.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo estimado de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/thecitizenfortheworld.com\/?p=87167#article\",\"isPartOf\":{\"@id\":\"https:\/\/thecitizenfortheworld.com\/?p=87167\"},\"author\":{\"name\":\"thecitizenfortheworld23@gmail.com\",\"@id\":\"https:\/\/thecitizenfortheworld.com\/#\/schema\/person\/1f6b82847278ca8d344c472822b5b66f\"},\"headline\":\"Glosario de tecnolog\u00eda: c\u00f3mo es un ataque inform\u00e1tico\",\"datePublished\":\"2024-09-02T12:58:42+00:00\",\"dateModified\":\"2024-09-02T12:58:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/thecitizenfortheworld.com\/?p=87167\"},\"wordCount\":896,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/thecitizenfortheworld.com\/#organization\"},\"articleSection\":[\"Tecnolog\u00eda\"],\"inLanguage\":\"es-CO\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/thecitizenfortheworld.com\/?p=87167#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/thecitizenfortheworld.com\/?p=87167\",\"url\":\"https:\/\/thecitizenfortheworld.com\/?p=87167\",\"name\":\"Glosario de tecnolog\u00eda: c\u00f3mo es un ataque inform\u00e1tico - The citizen for the world\",\"isPartOf\":{\"@id\":\"https:\/\/thecitizenfortheworld.com\/#website\"},\"datePublished\":\"2024-09-02T12:58:42+00:00\",\"dateModified\":\"2024-09-02T12:58:42+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/thecitizenfortheworld.com\/?p=87167#breadcrumb\"},\"inLanguage\":\"es-CO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/thecitizenfortheworld.com\/?p=87167\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/thecitizenfortheworld.com\/?p=87167#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\/\/thecitizenfortheworld.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Glosario de tecnolog\u00eda: c\u00f3mo es un ataque inform\u00e1tico\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/thecitizenfortheworld.com\/#website\",\"url\":\"https:\/\/thecitizenfortheworld.com\/\",\"name\":\"The citizen for the world\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/thecitizenfortheworld.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/thecitizenfortheworld.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"es-CO\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/thecitizenfortheworld.com\/#organization\",\"name\":\"The citizen for the world\",\"url\":\"https:\/\/thecitizenfortheworld.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-CO\",\"@id\":\"https:\/\/thecitizenfortheworld.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/thecitizenfortheworld.com\/wp-content\/uploads\/2023\/04\/cropped-the-citizens.png\",\"contentUrl\":\"https:\/\/thecitizenfortheworld.com\/wp-content\/uploads\/2023\/04\/cropped-the-citizens.png\",\"width\":1135,\"height\":1302,\"caption\":\"The citizen for the world\"},\"image\":{\"@id\":\"https:\/\/thecitizenfortheworld.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/thecitizenfortheworld\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/thecitizenfortheworld.com\/#\/schema\/person\/1f6b82847278ca8d344c472822b5b66f\",\"name\":\"thecitizenfortheworld23@gmail.com\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-CO\",\"@id\":\"https:\/\/thecitizenfortheworld.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fa0768c808e84d205962885f7091f34b?s=96&d=mm&r=pg\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fa0768c808e84d205962885f7091f34b?s=96&d=mm&r=pg\",\"caption\":\"thecitizenfortheworld23@gmail.com\"},\"sameAs\":[\"http:\/\/thecitizenfortheworld.com\"],\"url\":\"https:\/\/thecitizenfortheworld.com\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Glosario de tecnolog\u00eda: c\u00f3mo es un ataque inform\u00e1tico - The citizen for the world","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/thecitizenfortheworld.com\/?p=87167","og_locale":"es_ES","og_type":"article","og_title":"Glosario de tecnolog\u00eda: c\u00f3mo es un ataque inform\u00e1tico - The citizen for the world","og_description":"Conocer el significado de nuevas palabras ayudar\u00e1 a incrementar el conocimiento y vocabulario por igual En las \u00faltimas d\u00e9cadas\u00a0la tecnolog\u00eda\u00a0no solo se convirti\u00f3 en una herramienta b\u00e1sica, sino en parte de nuestra vida diaria, al punto de que es casi imposible imaginar c\u00f3mo ser\u00eda realizar tareas sin ella. Sin duda, la pandemia de COVID-19 impuls\u00f3 [&hellip;]","og_url":"https:\/\/thecitizenfortheworld.com\/?p=87167","og_site_name":"The citizen for the world","article_publisher":"https:\/\/www.facebook.com\/thecitizenfortheworld","article_published_time":"2024-09-02T12:58:42+00:00","og_image":[{"width":309,"height":163,"url":"https:\/\/thecitizenfortheworld.com\/wp-content\/uploads\/2024\/09\/glosario.jpeg","type":"image\/jpeg"}],"author":"thecitizenfortheworld23@gmail.com","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"thecitizenfortheworld23@gmail.com","Tiempo estimado de lectura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/thecitizenfortheworld.com\/?p=87167#article","isPartOf":{"@id":"https:\/\/thecitizenfortheworld.com\/?p=87167"},"author":{"name":"thecitizenfortheworld23@gmail.com","@id":"https:\/\/thecitizenfortheworld.com\/#\/schema\/person\/1f6b82847278ca8d344c472822b5b66f"},"headline":"Glosario de tecnolog\u00eda: c\u00f3mo es un ataque inform\u00e1tico","datePublished":"2024-09-02T12:58:42+00:00","dateModified":"2024-09-02T12:58:42+00:00","mainEntityOfPage":{"@id":"https:\/\/thecitizenfortheworld.com\/?p=87167"},"wordCount":896,"commentCount":0,"publisher":{"@id":"https:\/\/thecitizenfortheworld.com\/#organization"},"articleSection":["Tecnolog\u00eda"],"inLanguage":"es-CO","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/thecitizenfortheworld.com\/?p=87167#respond"]}]},{"@type":"WebPage","@id":"https:\/\/thecitizenfortheworld.com\/?p=87167","url":"https:\/\/thecitizenfortheworld.com\/?p=87167","name":"Glosario de tecnolog\u00eda: c\u00f3mo es un ataque inform\u00e1tico - The citizen for the world","isPartOf":{"@id":"https:\/\/thecitizenfortheworld.com\/#website"},"datePublished":"2024-09-02T12:58:42+00:00","dateModified":"2024-09-02T12:58:42+00:00","breadcrumb":{"@id":"https:\/\/thecitizenfortheworld.com\/?p=87167#breadcrumb"},"inLanguage":"es-CO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/thecitizenfortheworld.com\/?p=87167"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/thecitizenfortheworld.com\/?p=87167#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/thecitizenfortheworld.com\/"},{"@type":"ListItem","position":2,"name":"Glosario de tecnolog\u00eda: c\u00f3mo es un ataque inform\u00e1tico"}]},{"@type":"WebSite","@id":"https:\/\/thecitizenfortheworld.com\/#website","url":"https:\/\/thecitizenfortheworld.com\/","name":"The citizen for the world","description":"","publisher":{"@id":"https:\/\/thecitizenfortheworld.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/thecitizenfortheworld.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"es-CO"},{"@type":"Organization","@id":"https:\/\/thecitizenfortheworld.com\/#organization","name":"The citizen for the world","url":"https:\/\/thecitizenfortheworld.com\/","logo":{"@type":"ImageObject","inLanguage":"es-CO","@id":"https:\/\/thecitizenfortheworld.com\/#\/schema\/logo\/image\/","url":"https:\/\/thecitizenfortheworld.com\/wp-content\/uploads\/2023\/04\/cropped-the-citizens.png","contentUrl":"https:\/\/thecitizenfortheworld.com\/wp-content\/uploads\/2023\/04\/cropped-the-citizens.png","width":1135,"height":1302,"caption":"The citizen for the world"},"image":{"@id":"https:\/\/thecitizenfortheworld.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/thecitizenfortheworld"]},{"@type":"Person","@id":"https:\/\/thecitizenfortheworld.com\/#\/schema\/person\/1f6b82847278ca8d344c472822b5b66f","name":"thecitizenfortheworld23@gmail.com","image":{"@type":"ImageObject","inLanguage":"es-CO","@id":"https:\/\/thecitizenfortheworld.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fa0768c808e84d205962885f7091f34b?s=96&d=mm&r=pg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fa0768c808e84d205962885f7091f34b?s=96&d=mm&r=pg","caption":"thecitizenfortheworld23@gmail.com"},"sameAs":["http:\/\/thecitizenfortheworld.com"],"url":"https:\/\/thecitizenfortheworld.com\/?author=1"}]}},"_links":{"self":[{"href":"https:\/\/thecitizenfortheworld.com\/index.php?rest_route=\/wp\/v2\/posts\/87167"}],"collection":[{"href":"https:\/\/thecitizenfortheworld.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thecitizenfortheworld.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thecitizenfortheworld.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thecitizenfortheworld.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=87167"}],"version-history":[{"count":1,"href":"https:\/\/thecitizenfortheworld.com\/index.php?rest_route=\/wp\/v2\/posts\/87167\/revisions"}],"predecessor-version":[{"id":87169,"href":"https:\/\/thecitizenfortheworld.com\/index.php?rest_route=\/wp\/v2\/posts\/87167\/revisions\/87169"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thecitizenfortheworld.com\/index.php?rest_route=\/wp\/v2\/media\/87168"}],"wp:attachment":[{"href":"https:\/\/thecitizenfortheworld.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=87167"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thecitizenfortheworld.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=87167"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thecitizenfortheworld.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=87167"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}