{"id":6282,"date":"2024-01-08T16:59:22","date_gmt":"2024-01-08T15:59:22","guid":{"rendered":"https:\/\/mascalagrimas.es\/dev-enthec_old\/?p=6282"},"modified":"2024-04-10T16:49:43","modified_gmt":"2024-04-10T14:49:43","slug":"tipos-comunes-de-ciberataques","status":"publish","type":"post","link":"https:\/\/mascalagrimas.es\/dev-enthec_old\/tipos-comunes-de-ciberataques\/","title":{"rendered":"Tipos comunes de ciberataques. Parte I."},"content":{"rendered":"<h1 style=\"text-align: center;\">Tipos comunes de ciberataques. Parte I.<\/h1>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">En este art\u00edculo vamos a hablar de los tipos de ciberataques m\u00e1s habituales.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Llamamos <strong>ciberataque<\/strong> a cualquier tipo de maniobra ofensiva empleada por individuos u organizaciones enteras, que tenga como objetivo sistemas inform\u00e1ticos, infraestructuras, redes inform\u00e1ticas y\/o dispositivos inform\u00e1ticos personales. Estos ataques intentan mediante uno o varios actos digitales, generalmente originados en una fuente an\u00f3nima, piratear un sistema para robar, alterar o destruir un objetivo espec\u00edfico.<\/span><\/p>\n<h2>Tipos de ciberataques m\u00e1s comunes<\/h2>\n<p><strong>Malware<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Es cualquier tipo de software que intencionalmente realiza acciones maliciosas en un sistema, sin que el usuario sea consciente de dichas acciones. Los virus, gusanos o caballos de Troya son diferentes tipos de malware.<\/span><\/p>\n<p><strong>Virus<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Un virus inform\u00e1tico es un peque\u00f1o script de c\u00f3digo que, cuando se ejecuta, se replica modificando otros programas inform\u00e1ticos, que se denominan hosts, e insertando su propio c\u00f3digo para alterar la forma en que opera una computadora. Por supuesto, dado que este es un tipo de malware, todo esto se hace sin el permiso o el conocimiento del usuario.<\/span><\/p>\n<p><strong>Gusano<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Un gusano inform\u00e1tico es un programa inform\u00e1tico de malware independiente que se replica a s\u00ed mismo para propagarse a otras computadoras. Esto es diferente de un virus, porque el virus necesita un programa anfitri\u00f3n, pero el gusano no. Un gusano a menudo usa una red inform\u00e1tica para propagarse, confiando en fallas de seguridad en la computadora de destino para acceder a \u00e9l. Una vez all\u00ed, intentar\u00e1 escanear e infectar otras computadoras.<\/span><\/p>\n<p><strong>Caballo de Troya<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Un virus de caballo de Troya es un tipo de malware que se descarga en una computadora disfrazado como un programa leg\u00edtimo. Por lo general, se oculta como un archivo adjunto en un correo electr\u00f3nico o en un archivo de descarga gratuita y luego se transfiere al dispositivo del usuario. Una vez descargado, el c\u00f3digo malicioso ejecutar\u00e1 la tarea para la que el atacante lo dise\u00f1\u00f3, como espiar la actividad en l\u00ednea de los usuarios o robar datos confidenciales.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Una maniobra ofensiva de un individuo o una organizaci\u00f3n contra sistemas inform\u00e1ticos, infraestructuras, redes inform\u00e1ticas y\/o dispositivos inform\u00e1ticos personales, recibe el nombre de ciberataque.<\/p>\n","protected":false},"author":4,"featured_media":6313,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[43,45],"tags":[54,49],"class_list":["post-6282","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciberataque","category-ciberseguridad","tag-ciberseguridad","tag-riesgos"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Tipos comunes de ciberataques. Parte I. - Enthec<\/title>\n<meta name=\"description\" content=\"Un ciberataque pretende, mediante uno o varios actos digitales, piratear un sistema para robar, alterar o destruir un objetivo espec\u00edfico.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tipos comunes de ciberataques. Parte I. - Enthec\" \/>\n<meta property=\"og:description\" content=\"Un ciberataque pretende, mediante uno o varios actos digitales, piratear un sistema para robar, alterar o destruir un objetivo espec\u00edfico.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mascalagrimas.es\/dev-enthec_old\/tipos-comunes-de-ciberataques\/\" \/>\n<meta property=\"og:site_name\" content=\"Enthec\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-08T15:59:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-10T14:49:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/12\/Tipos-ciberatac-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"amorena\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"amorena\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/tipos-comunes-de-ciberataques\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/tipos-comunes-de-ciberataques\/\"},\"author\":{\"name\":\"amorena\",\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/#\/schema\/person\/fd44f5e93825eeafe172152d8bbf4661\"},\"headline\":\"Tipos comunes de ciberataques. Parte I.\",\"datePublished\":\"2024-01-08T15:59:22+00:00\",\"dateModified\":\"2024-04-10T14:49:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/tipos-comunes-de-ciberataques\/\"},\"wordCount\":355,\"publisher\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/#organization\"},\"image\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/tipos-comunes-de-ciberataques\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/12\/Tipos-ciberatac-scaled.jpg\",\"keywords\":[\"Ciberseguridad\",\"Riesgos\"],\"articleSection\":[\"Ciberataque\",\"Ciberseguridad\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/tipos-comunes-de-ciberataques\/\",\"url\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/tipos-comunes-de-ciberataques\/\",\"name\":\"Tipos comunes de ciberataques. Parte I. - Enthec\",\"isPartOf\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/tipos-comunes-de-ciberataques\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/tipos-comunes-de-ciberataques\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/12\/Tipos-ciberatac-scaled.jpg\",\"datePublished\":\"2024-01-08T15:59:22+00:00\",\"dateModified\":\"2024-04-10T14:49:43+00:00\",\"description\":\"Un ciberataque pretende, mediante uno o varios actos digitales, piratear un sistema para robar, alterar o destruir un objetivo espec\u00edfico.\",\"breadcrumb\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/tipos-comunes-de-ciberataques\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/mascalagrimas.es\/dev-enthec_old\/tipos-comunes-de-ciberataques\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/tipos-comunes-de-ciberataques\/#primaryimage\",\"url\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/12\/Tipos-ciberatac-scaled.jpg\",\"contentUrl\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/12\/Tipos-ciberatac-scaled.jpg\",\"width\":2560,\"height\":1440,\"caption\":\"Hacker attack computer hardware microchip while process data through internet network, 3d rendering insecure Cyber Security exploit database breach concept, virus malware unlock warning screen\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/tipos-comunes-de-ciberataques\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tipos comunes de ciberataques. Parte I.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/#website\",\"url\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/\",\"name\":\"Enthec\",\"description\":\"La plataforma XTI automatizada\",\"publisher\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/#organization\"},\"alternateName\":\"Kartos by Enthec\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/#organization\",\"name\":\"Enthec\",\"alternateName\":\"Kartos by Enthec\u00e7\",\"url\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/09\/cropped-Mesa-de-trabajo-2-copia-5-1.png\",\"contentUrl\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/09\/cropped-Mesa-de-trabajo-2-copia-5-1.png\",\"width\":512,\"height\":512,\"caption\":\"Enthec\"},\"image\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/#\/schema\/person\/fd44f5e93825eeafe172152d8bbf4661\",\"name\":\"amorena\",\"url\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/author\/amorena\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tipos comunes de ciberataques. Parte I. - Enthec","description":"Un ciberataque pretende, mediante uno o varios actos digitales, piratear un sistema para robar, alterar o destruir un objetivo espec\u00edfico.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"es_ES","og_type":"article","og_title":"Tipos comunes de ciberataques. Parte I. - Enthec","og_description":"Un ciberataque pretende, mediante uno o varios actos digitales, piratear un sistema para robar, alterar o destruir un objetivo espec\u00edfico.","og_url":"https:\/\/mascalagrimas.es\/dev-enthec_old\/tipos-comunes-de-ciberataques\/","og_site_name":"Enthec","article_published_time":"2024-01-08T15:59:22+00:00","article_modified_time":"2024-04-10T14:49:43+00:00","og_image":[{"width":2560,"height":1440,"url":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/12\/Tipos-ciberatac-scaled.jpg","type":"image\/jpeg"}],"author":"amorena","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"amorena","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/tipos-comunes-de-ciberataques\/#article","isPartOf":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/tipos-comunes-de-ciberataques\/"},"author":{"name":"amorena","@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/#\/schema\/person\/fd44f5e93825eeafe172152d8bbf4661"},"headline":"Tipos comunes de ciberataques. Parte I.","datePublished":"2024-01-08T15:59:22+00:00","dateModified":"2024-04-10T14:49:43+00:00","mainEntityOfPage":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/tipos-comunes-de-ciberataques\/"},"wordCount":355,"publisher":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/#organization"},"image":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/tipos-comunes-de-ciberataques\/#primaryimage"},"thumbnailUrl":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/12\/Tipos-ciberatac-scaled.jpg","keywords":["Ciberseguridad","Riesgos"],"articleSection":["Ciberataque","Ciberseguridad"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/tipos-comunes-de-ciberataques\/","url":"https:\/\/mascalagrimas.es\/dev-enthec_old\/tipos-comunes-de-ciberataques\/","name":"Tipos comunes de ciberataques. Parte I. - Enthec","isPartOf":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/tipos-comunes-de-ciberataques\/#primaryimage"},"image":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/tipos-comunes-de-ciberataques\/#primaryimage"},"thumbnailUrl":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/12\/Tipos-ciberatac-scaled.jpg","datePublished":"2024-01-08T15:59:22+00:00","dateModified":"2024-04-10T14:49:43+00:00","description":"Un ciberataque pretende, mediante uno o varios actos digitales, piratear un sistema para robar, alterar o destruir un objetivo espec\u00edfico.","breadcrumb":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/tipos-comunes-de-ciberataques\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mascalagrimas.es\/dev-enthec_old\/tipos-comunes-de-ciberataques\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/tipos-comunes-de-ciberataques\/#primaryimage","url":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/12\/Tipos-ciberatac-scaled.jpg","contentUrl":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/12\/Tipos-ciberatac-scaled.jpg","width":2560,"height":1440,"caption":"Hacker attack computer hardware microchip while process data through internet network, 3d rendering insecure Cyber Security exploit database breach concept, virus malware unlock warning screen"},{"@type":"BreadcrumbList","@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/tipos-comunes-de-ciberataques\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mascalagrimas.es\/dev-enthec_old\/"},{"@type":"ListItem","position":2,"name":"Tipos comunes de ciberataques. Parte I."}]},{"@type":"WebSite","@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/#website","url":"https:\/\/mascalagrimas.es\/dev-enthec_old\/","name":"Enthec","description":"La plataforma XTI automatizada","publisher":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/#organization"},"alternateName":"Kartos by Enthec","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mascalagrimas.es\/dev-enthec_old\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/#organization","name":"Enthec","alternateName":"Kartos by Enthec\u00e7","url":"https:\/\/mascalagrimas.es\/dev-enthec_old\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/#\/schema\/logo\/image\/","url":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/09\/cropped-Mesa-de-trabajo-2-copia-5-1.png","contentUrl":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/09\/cropped-Mesa-de-trabajo-2-copia-5-1.png","width":512,"height":512,"caption":"Enthec"},"image":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/#\/schema\/person\/fd44f5e93825eeafe172152d8bbf4661","name":"amorena","url":"https:\/\/mascalagrimas.es\/dev-enthec_old\/author\/amorena\/"}]}},"_links":{"self":[{"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-json\/wp\/v2\/posts\/6282","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-json\/wp\/v2\/comments?post=6282"}],"version-history":[{"count":5,"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-json\/wp\/v2\/posts\/6282\/revisions"}],"predecessor-version":[{"id":7016,"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-json\/wp\/v2\/posts\/6282\/revisions\/7016"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-json\/wp\/v2\/media\/6313"}],"wp:attachment":[{"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-json\/wp\/v2\/media?parent=6282"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-json\/wp\/v2\/categories?post=6282"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-json\/wp\/v2\/tags?post=6282"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}