{"id":53221,"date":"2024-08-16T17:17:10","date_gmt":"2024-08-16T20:17:10","guid":{"rendered":"https:\/\/www.itba.edu.ar\/intranet\/ti\/?p=53221"},"modified":"2024-10-17T11:31:10","modified_gmt":"2024-10-17T14:31:10","slug":"que-es-la-ingenieria-social","status":"publish","type":"post","link":"https:\/\/www.itba.edu.ar\/intranet\/ti\/que-es-la-ingenieria-social\/","title":{"rendered":"\u00bfQu\u00e9 es la ingenier\u00eda social? \u00bfC\u00f3mo evitar enga\u00f1os y estafas?"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00bb1&#8243; admin_label=\u00bbHeader\u00bb _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb use_background_color_gradient=\u00bbon\u00bb background_color_gradient_type=\u00bbcircular\u00bb background_color_gradient_direction_radial=\u00bbtop right\u00bb background_color_gradient_stops=\u00bb#00ffd8 0%|#0029e2 100%\u00bb background_color_gradient_start=\u00bb#00ffd8&#8243; background_color_gradient_end=\u00bb#0029e2&#8243; background_image=\u00bbhttps:\/\/intranet-nv.s3.amazonaws.com\/wp-content\/uploads\/sites\/2\/2022\/05\/cyber-security-18.png\u00bb parallax=\u00bbon\u00bb custom_padding=\u00bb7vw|||||\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row column_structure=\u00bb1_2,1_2&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb z_index=\u00bb1&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbMontserrat|700|||||||\u00bb text_font_size=\u00bb30px\u00bb header_font=\u00bbOverpass|900|||||||\u00bb header_font_size=\u00bb73px\u00bb background_layout=\u00bbdark\u00bb custom_margin=\u00bb|-98px||||\u00bb header_font_size_tablet=\u00bb54px\u00bb header_font_size_phone=\u00bb32px\u00bb header_font_size_last_edited=\u00bbon|desktop\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h1>\u00bfQu\u00e9 es la ingenier\u00eda social?<\/h1>\n<p>\u00bfC\u00f3mo evitar enga\u00f1os y estafas?<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/intranet-nv.s3.amazonaws.com\/wp-content\/uploads\/sites\/2\/2023\/08\/cyber-security-10.png\u00bb title_text=\u00bbcyber-security-10&#8243; align=\u00bbright\u00bb _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb width=\u00bb100%\u00bb max_width_tablet=\u00bb400px\u00bb max_width_phone=\u00bb\u00bb max_width_last_edited=\u00bbon|desktop\u00bb module_alignment=\u00bbcenter\u00bb custom_margin=\u00bb-10vw|0vw||\u00bb custom_margin_tablet=\u00bb-2vw|0vw||\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|desktop\u00bb animation_style=\u00bbzoom\u00bb animation_intensity_zoom=\u00bb5%\u00bb border_width_all=\u00bb48px\u00bb border_color_all=\u00bbrgba(0,0,0,0)\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb z_index=\u00bb0&#8243; width=\u00bb100%\u00bb max_width=\u00bbnone\u00bb custom_padding=\u00bb||0px|||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image show_bottom_space=\u00bboff\u00bb force_fullwidth=\u00bbon\u00bb _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb0vw||-2px\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_divider show_divider=\u00bboff\u00bb _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_divider][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; admin_label=\u00bbContact Form\u00bb _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#f1fafe\u00bb z_index=\u00bb10&#8243; custom_padding=\u00bb||1px|||\u00bb bottom_divider_height=\u00bb26vw\u00bb bottom_divider_flip=\u00bbhorizontal\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row make_equal=\u00bbon\u00bb _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#ffffff\u00bb min_height=\u00bb233.8px\u00bb custom_margin=\u00bb-146px|auto|-2px|auto||\u00bb custom_padding=\u00bb0px|8px|0px||true|\u00bb border_radii=\u00bbon|10px|10px|10px|10px\u00bb box_shadow_style=\u00bbpreset1&#8243; box_shadow_vertical=\u00bb40px\u00bb box_shadow_blur=\u00bb60px\u00bb box_shadow_spread=\u00bb-8px\u00bb box_shadow_color=\u00bbrgba(10,45,97,0.48)\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb60px|40px|60px|40px|true|true\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbMontserrat||||||||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p><span style=\"font-size: 14px;\">La ingenier\u00eda social es una t\u00e9cnica en la que un atacante utiliza enga\u00f1os y t\u00e9cnicas de manipulaci\u00f3n para poder obtener informaci\u00f3n sensible de la v\u00edctima, informaci\u00f3n confidencial, informaci\u00f3n crediticia, credenciales, datos sensibles y personales. A continuaci\u00f3n detallamos cuatro tipos de ingenier\u00eda social:<\/span><\/p>\n<ul>\n<li><strong>Phishing<\/strong>: enga\u00f1o a trav\u00e9s de correo electr\u00f3nico donde el atacante suplanta la identidad de una persona o una entidad. Por ejemplo, un atacante env\u00eda un archivo adjunto o solicita que ingresemos los datos en un formulario haci\u00e9ndose pasar por empleado de un banco.<\/li>\n<li><strong>Spear Phishing:<\/strong> el atacante personaliza los mensajes a la v\u00edctima para que sea m\u00e1s convincente el enga\u00f1o. Por ejemplo, en el correo incluye datos personales de la v\u00edctima e informaci\u00f3n espec\u00edfica.<\/li>\n<li><strong>Vishing:<\/strong> es la combinaci\u00f3n de voice y phishing, el enga\u00f1o se hace a trav\u00e9s de una llamada telef\u00f3nica en la que el atacante suplanta la identidad de una persona o una entidad. Por ejemplo, podr\u00eda llamar una persona haci\u00e9ndose pasar por un colaborador de la Mesa de Ayuda de TI para obtener credenciales de acceso u otro tipo de informaci\u00f3n sensible.<\/li>\n<li><strong>Smishing:<\/strong> es un tipo de enga\u00f1o donde el atacante env\u00eda mensajes de textos para que la v\u00edctima env\u00ede informaci\u00f3n confidencial. Por ejemplo, los atacantes se hacen pasar por una entidad que solicita im\u00e1genes del DNI o datos financieros.<\/li>\n<\/ul>\n<p><strong style=\"font-size: 14px;\">Para no ser v\u00edctima de ingenier\u00eda social y de algunos tipos de enga\u00f1os y\/o estafas es importante seguir los siguientes consejos y buenas pr\u00e1cticas:<\/strong><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb min_height=\u00bb95.8px\u00bb custom_margin=\u00bb|auto|-82px|auto||\u00bb custom_padding=\u00bb69px||49px|||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_3,1_3,1_3&#8243; custom_padding_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#ffffff\u00bb z_index=\u00bb1&#8243; custom_margin=\u00bb0vw|auto|-16vw|auto||\u00bb custom_padding=\u00bb60px|60px|60px|60px|true|true\u00bb custom_padding_tablet=\u00bb|40px||40px||true\u00bb custom_padding_phone=\u00bb|20px||20px||true\u00bb border_radii=\u00bbon|10px|10px|10px|10px\u00bb box_shadow_style=\u00bbpreset1&#8243; box_shadow_vertical=\u00bb10px\u00bb box_shadow_blur=\u00bb60px\u00bb box_shadow_color=\u00bbrgba(10,45,97,0.1)\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_blurb title=\u00bbVerificar fuentes\u00bb image=\u00bbhttps:\/\/intranet-nv.s3.amazonaws.com\/wp-content\/uploads\/sites\/2\/2022\/05\/cyber-security-icon-28.png\u00bb _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bbMontserrat|900||on|||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb custom_padding=\u00bb|||13px||\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p><span style=\"font-weight: 400;\">Verificar la autenticidad de los correos electr\u00f3nicos o mensajes de texto especialmente si solicitan informaci\u00f3n confidencial o sensible.<\/span><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb title=\u00bbACTUALIZACIONES\u00bb image=\u00bbhttps:\/\/intranet-nv.s3.amazonaws.com\/wp-content\/uploads\/sites\/2\/2022\/05\/cyber-security-icon-14.png\u00bb _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bbMontserrat|900||on|||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p>Tener actualizado el antivirus que provee el Departamento de TI y el sistema operativo, en caso de ser v\u00edctima de phishing tener la capa de seguridad actualizada.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_blurb title=\u00bbConciencia y educaci\u00f3n\u00bb image=\u00bbhttps:\/\/intranet-nv.s3.amazonaws.com\/wp-content\/uploads\/sites\/2\/2023\/08\/cyber-security-icon-18.png\u00bb _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bbMontserrat|900||on|||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p><span style=\"font-weight: 400;\">El usuario es el eslab\u00f3n m\u00e1s d\u00e9bil por lo que es importante estar informado sobre los diferentes m\u00e9todos de ingenier\u00eda social y enga\u00f1os.<\/span><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb title=\u00bbRevisar las URLs\u00bb image=\u00bbhttps:\/\/intranet-nv.s3.amazonaws.com\/wp-content\/uploads\/sites\/2\/2022\/05\/cyber-security-icon-6.png\u00bb _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bbMontserrat|900||on|||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p>\u00a0Para verificar que sea leg\u00edtimo el remitente tener le costumbre de revisar las URLs que nos llegan de desconocidos por diferentes medios antes de ingresar.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_blurb title=\u00bbPOL\u00cdTICAS DE SEGURIDAD\u00bb image=\u00bbhttps:\/\/intranet-nv.s3.amazonaws.com\/wp-content\/uploads\/sites\/2\/2022\/05\/cyber-security-icon-13.png\u00bb _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bbMontserrat|900||on|||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p>Implementar y seguir los lineamientos de la Pol\u00edtica de Seguridad de la Informaci\u00f3n de la Universidad para prevenir accesos no autorizados.<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb title=\u00bbproteger la informaci\u00f3n\u00bb image=\u00bbhttps:\/\/intranet-nv.s3.amazonaws.com\/wp-content\/uploads\/sites\/2\/2022\/05\/cyber-security-icon-29.png\u00bb _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bbMontserrat|900||on|||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p><span style=\"font-weight: 400;\">No brindar informaci\u00f3n personal, confidencial y\/o sensible como contrase\u00f1as, datos personales, nombres de usuario. Resguardar dicha informaci\u00f3n.<\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.25.1&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.25.1&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_divider show_divider=\u00bboff\u00bb _builder_version=\u00bb4.25.1&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_divider][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb use_background_color_gradient=\u00bbon\u00bb background_color_gradient_type=\u00bbcircular\u00bb background_color_gradient_stops=\u00bb#004183 0%|#001f4c 100%\u00bb background_color_gradient_start=\u00bb#004183&#8243; background_color_gradient_end=\u00bb#001f4c\u00bb custom_margin=\u00bb||-47vw|||\u00bb custom_padding=\u00bb0vw||6vw||false|\u00bb top_divider_height=\u00bb27vw\u00bb top_divider_flip=\u00bbhorizontal\u00bb bottom_divider_height=\u00bb27vw\u00bb bottom_divider_flip=\u00bbhorizontal\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.24.2&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb0px||0px|||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.24.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_divider show_divider=\u00bboff\u00bb _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb0px||170px|||\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_divider][et_pb_divider show_divider=\u00bboff\u00bb _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_divider][et_pb_cta title=\u00bb\u00bfDonde PUEDO DENUNCIAR UN INCIDENTE DE SEGURIDAD?\u00bb button_url=\u00bbhttps:\/\/www.itba.edu.ar\/intranet\/ti\/reporta-un-incidente-informatico\/\u00bb button_text=\u00bbReport\u00e1 un incidente inform\u00e1tico\u00bb _builder_version=\u00bb4.25.1&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bbOverpass|900|||||||\u00bb header_font_size=\u00bb38px\u00bb body_font=\u00bbOverpass||||||||\u00bb body_font_size=\u00bb18px\u00bb background_color=\u00bb#FFFFFF\u00bb custom_button=\u00bbon\u00bb button_text_color=\u00bb#FFFFFF\u00bb button_bg_color=\u00bbgcid-44e89228-3a3c-46af-8196-5047e9ac16fe\u00bb button_border_width=\u00bb12px\u00bb button_border_radius=\u00bb50px\u00bb button_font=\u00bbMontserrat|700|||||||\u00bb background_layout=\u00bblight\u00bb border_radii=\u00bbon|8px|8px|8px|8px\u00bb box_shadow_style=\u00bbpreset1&#8243; global_colors_info=\u00bb{%22gcid-44e89228-3a3c-46af-8196-5047e9ac16fe%22:%91%22button_bg_color%22%93}\u00bb button_border_radius__hover_enabled=\u00bbon|desktop\u00bb button_border_radius__hover=\u00bb50px\u00bb]<\/p>\n<p><span style=\"font-weight: 400;\">Complet\u00e1 el formulario indicando el tipo de incidente de seguridad con toda la informaci\u00f3n posible sobre el caso, acompa\u00f1a con archivos complementarios como capturas o videos para dar una soluci\u00f3n m\u00e1s r\u00e1pida.<\/span><\/p>\n<p>[\/et_pb_cta][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.24.2&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb12px|||||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.24.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_divider show_divider=\u00bboff\u00bb _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_divider][et_pb_text _builder_version=\u00bb4.24.2&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbMontserrat||||||||\u00bb text_text_color=\u00bb#2d2d2d\u00bb text_font_size=\u00bb17px\u00bb text_line_height=\u00bb1.8em\u00bb header_font=\u00bb||||||||\u00bb header_font_size=\u00bb21px\u00bb header_2_font=\u00bbOverpass|900|||||||\u00bb header_2_font_size=\u00bb56px\u00bb header_2_line_height=\u00bb1.1em\u00bb header_3_font=\u00bbOverpass|600|||||||\u00bb header_3_text_color=\u00bb#00b4ff\u00bb header_3_font_size=\u00bb30px\u00bb header_3_line_height=\u00bb1.2em\u00bb background_color=\u00bb#f7f7f7&#8243; text_orientation=\u00bbcenter\u00bb background_layout=\u00bbdark\u00bb custom_margin=\u00bb0px|0px|0px||false|false\u00bb custom_padding=\u00bb22px|0px|0px||false|false\u00bb text_font_size_tablet=\u00bb\u00bb text_font_size_phone=\u00bb14px\u00bb text_font_size_last_edited=\u00bbon|desktop\u00bb header_2_font_size_tablet=\u00bb38px\u00bb header_2_font_size_phone=\u00bb26px\u00bb header_2_font_size_last_edited=\u00bbon|desktop\u00bb header_3_font_tablet=\u00bb\u00bb header_3_font_phone=\u00bbOverpass|700|||||||\u00bb header_3_font_last_edited=\u00bbon|phone\u00bb header_3_font_size_tablet=\u00bb24px\u00bb header_3_font_size_phone=\u00bb18px\u00bb header_3_font_size_last_edited=\u00bbon|desktop\u00bb border_radii=\u00bbon|10px|10px|10px|10px\u00bb box_shadow_style=\u00bbpreset1&#8243; box_shadow_horizontal=\u00bb4px\u00bb box_shadow_blur=\u00bb20px\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p>Si tenes dudas o consultas comunicate con la Mesa de ayuda de TI<\/p>\n<p>\u00a0<a href=\"mailto:ayuda@itba.edu.ar\">ayudati@itba.edu.ar<\/a><\/p>\n<h3><\/h3>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00bfQu\u00e9 es la ingenier\u00eda social? \u00bfC\u00f3mo evitar enga\u00f1os y estafas?La ingenier\u00eda social es una t\u00e9cnica en la que un atacante utiliza enga\u00f1os y t\u00e9cnicas de manipulaci\u00f3n para poder obtener informaci\u00f3n sensible de la v\u00edctima, informaci\u00f3n confidencial, informaci\u00f3n crediticia, credenciales, datos sensibles y personales. A continuaci\u00f3n detallamos cuatro tipos de ingenier\u00eda social: Phishing: enga\u00f1o a trav\u00e9s [&hellip;]<\/p>\n","protected":false},"author":5198,"featured_media":53233,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","yasr_overall_rating":0,"yasr_post_is_review":"","yasr_auto_insert_disabled":"","yasr_review_type":"","footnotes":""},"categories":[31],"tags":[],"class_list":["post-53221","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-seguridad-de-la-info"],"yasr_visitor_votes":{"stars_attributes":{"read_only":false,"span_bottom":false},"number_of_votes":0,"sum_votes":0},"_links":{"self":[{"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/posts\/53221","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/users\/5198"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/comments?post=53221"}],"version-history":[{"count":8,"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/posts\/53221\/revisions"}],"predecessor-version":[{"id":53236,"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/posts\/53221\/revisions\/53236"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/media\/53233"}],"wp:attachment":[{"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/media?parent=53221"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/categories?post=53221"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/tags?post=53221"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}