{"ad_unit_id":"App_Resource_Sidebar_Upper","resource":{"id":26861508,"author_id":10237565,"title":"RIESGOS DEL INTERNET Y FORMAS PARA EVITARLOS","created_at":"2020-10-23T18:38:33Z","updated_at":"2020-10-23T18:38:33Z","sample":false,"description":"Riesgos del internet y formas para evitarlos","alerts_enabled":true,"cached_tag_list":"internet, amenezas, soluciones","deleted_at":null,"hidden":false,"average_rating":null,"demote":false,"private":false,"copyable":true,"score":1468,"artificial_base_score":0,"recalculate_score":true,"profane":false,"hide_summary":false,"tag_list":["internet","amenezas","soluciones"],"admin_tag_list":[],"study_aid_type":"MindMap","show_path":"/mind_maps/26861508","folder_id":32458705,"public_author":{"id":10237565,"profile":{"name":"Luis Miguel Rodr7656","about":null,"avatar_service":"google","locale":"es","google_author_link":null,"user_type_id":581,"escaped_name":"Luis Miguel Rodríguez Martínez","full_name":"Luis Miguel Rodríguez Martínez","badge_classes":"ubadge ubadge-educator "}}},"width":300,"height":250,"rtype":"MindMap","rmode":"canonical","sizes":"[[[0, 0], [[300, 250]]]]","custom":[{"key":"rsubject","value":"TICs"},{"key":"rlevel","value":"4º de ESO"},{"key":"env","value":"production"},{"key":"rtype","value":"MindMap"},{"key":"rmode","value":"canonical"},{"key":"uauth","value":"f"},{"key":"uadmin","value":"f"},{"key":"ulang","value":"en_us"},{"key":"ucurrency","value":"usd"}]}
{"ad_unit_id":"App_Resource_Sidebar_Lower","resource":{"id":26861508,"author_id":10237565,"title":"RIESGOS DEL INTERNET Y FORMAS PARA EVITARLOS","created_at":"2020-10-23T18:38:33Z","updated_at":"2020-10-23T18:38:33Z","sample":false,"description":"Riesgos del internet y formas para evitarlos","alerts_enabled":true,"cached_tag_list":"internet, amenezas, soluciones","deleted_at":null,"hidden":false,"average_rating":null,"demote":false,"private":false,"copyable":true,"score":1468,"artificial_base_score":0,"recalculate_score":true,"profane":false,"hide_summary":false,"tag_list":["internet","amenezas","soluciones"],"admin_tag_list":[],"study_aid_type":"MindMap","show_path":"/mind_maps/26861508","folder_id":32458705,"public_author":{"id":10237565,"profile":{"name":"Luis Miguel Rodr7656","about":null,"avatar_service":"google","locale":"es","google_author_link":null,"user_type_id":581,"escaped_name":"Luis Miguel Rodríguez Martínez","full_name":"Luis Miguel Rodríguez Martínez","badge_classes":"ubadge ubadge-educator "}}},"width":300,"height":250,"rtype":"MindMap","rmode":"canonical","sizes":"[[[0, 0], [[300, 250]]]]","custom":[{"key":"rsubject","value":"TICs"},{"key":"rlevel","value":"4º de ESO"},{"key":"env","value":"production"},{"key":"rtype","value":"MindMap"},{"key":"rmode","value":"canonical"},{"key":"uauth","value":"f"},{"key":"uadmin","value":"f"},{"key":"ulang","value":"en_us"},{"key":"ucurrency","value":"usd"}]}
Referencias
Espinosa, Liliana (2013). Modulo Herramientas Telemáticas.
UNAD. Colombia. Recuperado de:
http://datateca.unad.edu.co/contenidos/100201/AVA_2014-1/Unidad_1_Principios_Basicos_del_Networking/Bibliografias_Referidas/Capitulo_1_Internet/Bibliografia_Unad-Capitulo1Internet.pdf
Protección Online. (S/F). ¿Cuáles son los principales
peligros en Internet? Recuperado el 24 de Febrero de 2016, de
http://www.protecciononline.com/: http:/ /www.protecciononline.com/%C2%BFcuales-son-los-principales-peligros-en-internet/
Malware
Software Malicioso
Acceso no
Autorizado
Daño al Equipo
Tipos
Spyware
Recolección no autorizada
de información del usuario