{"id":53157,"date":"2024-07-01T15:29:14","date_gmt":"2024-07-01T18:29:14","guid":{"rendered":"https:\/\/www.itba.edu.ar\/intranet\/ti\/?p=53157"},"modified":"2024-10-17T11:31:25","modified_gmt":"2024-10-17T14:31:25","slug":"que-es-un-incidente-de-seguridad-como-reportarlo","status":"publish","type":"post","link":"https:\/\/www.itba.edu.ar\/intranet\/ti\/que-es-un-incidente-de-seguridad-como-reportarlo\/","title":{"rendered":"\u00bfQu\u00e9 es un incidente de seguridad y c\u00f3mo reportarlo?"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00bb1&#8243; admin_label=\u00bbHeader\u00bb _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb use_background_color_gradient=\u00bbon\u00bb background_color_gradient_type=\u00bbcircular\u00bb background_color_gradient_direction_radial=\u00bbtop right\u00bb background_color_gradient_stops=\u00bb#00ffd8 0%|#0029e2 100%\u00bb background_color_gradient_start=\u00bb#00ffd8&#8243; background_color_gradient_end=\u00bb#0029e2&#8243; background_image=\u00bbhttps:\/\/intranet-nv.s3.amazonaws.com\/wp-content\/uploads\/sites\/2\/2022\/05\/cyber-security-18.png\u00bb parallax=\u00bbon\u00bb custom_padding=\u00bb7vw|||||\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row column_structure=\u00bb1_2,1_2&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb z_index=\u00bb1&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbMontserrat|700|||||||\u00bb text_font_size=\u00bb30px\u00bb header_font=\u00bbOverpass|900|||||||\u00bb header_font_size=\u00bb73px\u00bb background_layout=\u00bbdark\u00bb header_font_size_tablet=\u00bb54px\u00bb header_font_size_phone=\u00bb32px\u00bb header_font_size_last_edited=\u00bbon|desktop\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h1>\u00bfQu\u00e9 es un incidente de seguridad?<\/h1>\n<p>\u00bfC\u00f3mo reportarlo?<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/intranet-nv.s3.amazonaws.com\/wp-content\/uploads\/sites\/2\/2023\/08\/cyber-security-10.png\u00bb title_text=\u00bbcyber-security-10&#8243; align=\u00bbright\u00bb _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb width=\u00bb100%\u00bb max_width_tablet=\u00bb400px\u00bb max_width_phone=\u00bb\u00bb max_width_last_edited=\u00bbon|desktop\u00bb module_alignment=\u00bbcenter\u00bb custom_margin=\u00bb-10vw|0vw||\u00bb custom_margin_tablet=\u00bb-2vw|0vw||\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|desktop\u00bb animation_style=\u00bbzoom\u00bb animation_intensity_zoom=\u00bb5%\u00bb border_width_all=\u00bb48px\u00bb border_color_all=\u00bbrgba(0,0,0,0)\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb z_index=\u00bb0&#8243; width=\u00bb100%\u00bb max_width=\u00bbnone\u00bb custom_padding=\u00bb||0px|||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image show_bottom_space=\u00bboff\u00bb force_fullwidth=\u00bbon\u00bb _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb0vw||-2px\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_divider show_divider=\u00bboff\u00bb _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_divider][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; admin_label=\u00bbContact Form\u00bb _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#f1fafe\u00bb z_index=\u00bb10&#8243; custom_padding=\u00bb||1px|||\u00bb bottom_divider_height=\u00bb26vw\u00bb bottom_divider_flip=\u00bbhorizontal\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row make_equal=\u00bbon\u00bb _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#ffffff\u00bb min_height=\u00bb233.8px\u00bb custom_margin=\u00bb-146px|auto|-2px|auto||\u00bb custom_padding=\u00bb0px|8px|0px||true|\u00bb border_radii=\u00bbon|10px|10px|10px|10px\u00bb box_shadow_style=\u00bbpreset1&#8243; box_shadow_vertical=\u00bb40px\u00bb box_shadow_blur=\u00bb60px\u00bb box_shadow_spread=\u00bb-8px\u00bb box_shadow_color=\u00bbrgba(10,45,97,0.48)\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb60px|40px|60px|40px|true|true\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbMontserrat||||||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p><span style=\"font-weight: 400;\">Un incidente de seguridad es un evento que puede comprometer la confidencialidad, integridad y disponibilidad de la informaci\u00f3n.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Estos pueden incluir todo tipo de ciberataques que afecten y da\u00f1en los sistemas inform\u00e1ticos del Instituto Tecnol\u00f3gico de Buenos Aires o interrumpan las operaciones normales de la Universidad. <\/span><span style=\"font-weight: 400;\">Por otra parte, un incidente tambi\u00e9n puede ser un acceso no autorizado a las bases de datos o sistemas ITBA.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">El eslab\u00f3n m\u00e1s d\u00e9bil es el usuario por lo que hay que estar informado sobre los incidentes. <strong>A continuaci\u00f3n te brindamos algunos ejemplos de incidentes de seguridad para que puedas identificarlos y reportarlos.<\/strong><\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb min_height=\u00bb95.8px\u00bb custom_margin=\u00bb|auto|-82px|auto||\u00bb custom_padding=\u00bb69px||49px|||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_3,1_3,1_3&#8243; custom_padding_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#ffffff\u00bb z_index=\u00bb1&#8243; custom_margin=\u00bb0vw|auto|-16vw|auto||\u00bb custom_padding=\u00bb60px|60px|60px|60px|true|true\u00bb custom_padding_tablet=\u00bb|40px||40px||true\u00bb custom_padding_phone=\u00bb|20px||20px||true\u00bb border_radii=\u00bbon|10px|10px|10px|10px\u00bb box_shadow_style=\u00bbpreset1&#8243; box_shadow_vertical=\u00bb10px\u00bb box_shadow_blur=\u00bb60px\u00bb box_shadow_color=\u00bbrgba(10,45,97,0.1)\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_blurb title=\u00bbPHISHING\u00bb image=\u00bbhttps:\/\/intranet-nv.s3.amazonaws.com\/wp-content\/uploads\/sites\/2\/2022\/05\/cyber-security-icon-28.png\u00bb _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bbMontserrat|900||on|||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb custom_padding=\u00bb|||13px||\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p><span style=\"font-weight: 400;\">Enga\u00f1os a trav\u00e9s de correos electr\u00f3nicos falsos para obtener informaci\u00f3n confidencial o sensible.<\/span><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb title=\u00bbDENEGACI\u00d3N DE SERVICIO\u00bb image=\u00bbhttps:\/\/intranet-nv.s3.amazonaws.com\/wp-content\/uploads\/sites\/2\/2022\/05\/cyber-security-icon-13.png\u00bb _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bbMontserrat|900||on|||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p><span style=\"font-weight: 400;\">Ataque donde terceros sobrecargan los sistemas y servidores para hacerlos inaccesibles.<\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_blurb title=\u00bbRansomware\u00bb image=\u00bbhttps:\/\/intranet-nv.s3.amazonaws.com\/wp-content\/uploads\/sites\/2\/2022\/05\/cyber-security-icon-28.png\u00bb _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bbMontserrat|900||on|||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p><span style=\"font-weight: 400;\">Malware que cifra la informaci\u00f3n, la hace inaccesible, y se exige rescate para devolverlos. <\/span><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb title=\u00bbIngenier\u00eda social\u00bb image=\u00bbhttps:\/\/intranet-nv.s3.amazonaws.com\/wp-content\/uploads\/sites\/2\/2022\/05\/cyber-security-icon-6.png\u00bb _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bbMontserrat|900||on|||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p><span style=\"font-weight: 400;\">Ataque donde los atacantes manipulan a las personas para obtener informaci\u00f3n confidencial o sensible. <\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_blurb title=\u00bbROBO DE DATOS\u00bb image=\u00bbhttps:\/\/intranet-nv.s3.amazonaws.com\/wp-content\/uploads\/sites\/2\/2022\/05\/cyber-security-icon-28.png\u00bb _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bbMontserrat|900||on|||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p><span style=\"font-weight: 400;\">Acceso no autorizado a sistemas y bases de datos para obtener informaci\u00f3n confidencial o sensible.<\/span><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb title=\u00bbp\u00e9rdida o robo de dispositivos \u00bb image=\u00bbhttps:\/\/intranet-nv.s3.amazonaws.com\/wp-content\/uploads\/sites\/2\/2022\/05\/cyber-security-icon-29.png\u00bb _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bbMontserrat|900||on|||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p><span style=\"font-weight: 400;\">Pueden obtener m\u00e1s informaci\u00f3n sobre este caso <a href=\"https:\/\/www.itba.edu.ar\/intranet\/ti\/como-actuar-ante-el-robo-o-extravio-de-tu-dispositivo\/\">pulsando aqui.<\/a><\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.25.1&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.25.1&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_divider show_divider=\u00bboff\u00bb _builder_version=\u00bb4.25.1&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_divider][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb use_background_color_gradient=\u00bbon\u00bb background_color_gradient_type=\u00bbcircular\u00bb background_color_gradient_stops=\u00bb#004183 0%|#001f4c 100%\u00bb background_color_gradient_start=\u00bb#004183&#8243; background_color_gradient_end=\u00bb#001f4c\u00bb custom_margin=\u00bb||-47vw|||\u00bb custom_padding=\u00bb0vw||6vw||false|\u00bb top_divider_height=\u00bb27vw\u00bb top_divider_flip=\u00bbhorizontal\u00bb bottom_divider_height=\u00bb27vw\u00bb bottom_divider_flip=\u00bbhorizontal\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.24.2&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb0px||0px|||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.24.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_divider show_divider=\u00bboff\u00bb _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb0px||170px|||\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_divider][et_pb_divider show_divider=\u00bboff\u00bb _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_divider][et_pb_cta title=\u00bb\u00bfDonde PUEDO DENUNCIAR UN INCIDENTE DE SEGURIDAD?\u00bb button_url=\u00bbhttps:\/\/www.itba.edu.ar\/intranet\/ti\/reporta-un-incidente-informatico\/\u00bb button_text=\u00bbReport\u00e1 un incidente inform\u00e1tico\u00bb _builder_version=\u00bb4.25.1&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bbOverpass|900|||||||\u00bb header_font_size=\u00bb38px\u00bb body_font=\u00bbOverpass||||||||\u00bb body_font_size=\u00bb18px\u00bb background_color=\u00bb#FFFFFF\u00bb custom_button=\u00bbon\u00bb button_text_color=\u00bb#FFFFFF\u00bb button_bg_color=\u00bbgcid-44e89228-3a3c-46af-8196-5047e9ac16fe\u00bb button_border_width=\u00bb12px\u00bb button_border_radius=\u00bb50px\u00bb button_font=\u00bbMontserrat|700|||||||\u00bb background_layout=\u00bblight\u00bb border_radii=\u00bbon|8px|8px|8px|8px\u00bb box_shadow_style=\u00bbpreset1&#8243; global_colors_info=\u00bb{%22gcid-44e89228-3a3c-46af-8196-5047e9ac16fe%22:%91%22button_bg_color%22%93}\u00bb button_border_radius__hover_enabled=\u00bbon|desktop\u00bb button_border_radius__hover=\u00bb50px\u00bb]<\/p>\n<p><span style=\"font-weight: 400;\">Complet\u00e1 el formulario indicando el tipo de incidente de seguridad con toda la informaci\u00f3n posible sobre el caso, acompa\u00f1a con archivos complementarios como capturas o videos para dar una soluci\u00f3n m\u00e1s r\u00e1pida.<\/span><\/p>\n<p>[\/et_pb_cta][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.24.2&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb12px|||||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.24.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_divider show_divider=\u00bboff\u00bb _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_divider][et_pb_text _builder_version=\u00bb4.24.2&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbMontserrat||||||||\u00bb text_text_color=\u00bb#2d2d2d\u00bb text_font_size=\u00bb17px\u00bb text_line_height=\u00bb1.8em\u00bb header_font=\u00bb||||||||\u00bb header_font_size=\u00bb21px\u00bb header_2_font=\u00bbOverpass|900|||||||\u00bb header_2_font_size=\u00bb56px\u00bb header_2_line_height=\u00bb1.1em\u00bb header_3_font=\u00bbOverpass|600|||||||\u00bb header_3_text_color=\u00bb#00b4ff\u00bb header_3_font_size=\u00bb30px\u00bb header_3_line_height=\u00bb1.2em\u00bb background_color=\u00bb#f7f7f7&#8243; text_orientation=\u00bbcenter\u00bb background_layout=\u00bbdark\u00bb custom_margin=\u00bb0px|0px|0px||false|false\u00bb custom_padding=\u00bb22px|0px|0px||false|false\u00bb text_font_size_tablet=\u00bb\u00bb text_font_size_phone=\u00bb14px\u00bb text_font_size_last_edited=\u00bbon|desktop\u00bb header_2_font_size_tablet=\u00bb38px\u00bb header_2_font_size_phone=\u00bb26px\u00bb header_2_font_size_last_edited=\u00bbon|desktop\u00bb header_3_font_tablet=\u00bb\u00bb header_3_font_phone=\u00bbOverpass|700|||||||\u00bb header_3_font_last_edited=\u00bbon|phone\u00bb header_3_font_size_tablet=\u00bb24px\u00bb header_3_font_size_phone=\u00bb18px\u00bb header_3_font_size_last_edited=\u00bbon|desktop\u00bb border_radii=\u00bbon|10px|10px|10px|10px\u00bb box_shadow_style=\u00bbpreset1&#8243; box_shadow_horizontal=\u00bb4px\u00bb box_shadow_blur=\u00bb20px\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p>Si tenes dudas o consultas comunicate con la Mesa de ayuda de TI<\/p>\n<p>\u00a0<a href=\"mailto:ayuda@itba.edu.ar\">ayudati@itba.edu.ar<\/a><\/p>\n<h3><\/h3>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00bfQu\u00e9 es un incidente de seguridad? \u00bfC\u00f3mo reportarlo?Un incidente de seguridad es un evento que puede comprometer la confidencialidad, integridad y disponibilidad de la informaci\u00f3n.\u00a0 Estos pueden incluir todo tipo de ciberataques que afecten y da\u00f1en los sistemas inform\u00e1ticos del Instituto Tecnol\u00f3gico de Buenos Aires o interrumpan las operaciones normales de la Universidad. Por otra [&hellip;]<\/p>\n","protected":false},"author":5198,"featured_media":53170,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","yasr_overall_rating":0,"yasr_post_is_review":"","yasr_auto_insert_disabled":"","yasr_review_type":"","footnotes":""},"categories":[31],"tags":[],"class_list":["post-53157","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-seguridad-de-la-info"],"yasr_visitor_votes":{"stars_attributes":{"read_only":false,"span_bottom":false},"number_of_votes":0,"sum_votes":0},"_links":{"self":[{"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/posts\/53157","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/users\/5198"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/comments?post=53157"}],"version-history":[{"count":13,"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/posts\/53157\/revisions"}],"predecessor-version":[{"id":53262,"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/posts\/53157\/revisions\/53262"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/media\/53170"}],"wp:attachment":[{"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/media?parent=53157"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/categories?post=53157"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/tags?post=53157"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}