null
US
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
{"ad_unit_id":"App_Resource_Sidebar_Upper","resource":{"id":4024965,"author_id":1988581,"title":"Seguridad informática","created_at":"2015-11-12T21:17:35Z","updated_at":"2016-06-27T00:31:59Z","sample":false,"description":"Características de seguridad informática ","alerts_enabled":true,"cached_tag_list":"sector que arranca, humanos, tecnología","deleted_at":null,"hidden":false,"average_rating":null,"demote":false,"private":false,"copyable":true,"score":16,"artificial_base_score":0,"recalculate_score":false,"profane":false,"hide_summary":false,"tag_list":["sector que arranca","humanos","tecnología"],"admin_tag_list":[],"study_aid_type":"MindMap","show_path":"/mind_maps/4024965","folder_id":3072202,"public_author":{"id":1988581,"profile":{"name":"holanalaura","about":null,"avatar_service":"facebook","locale":"es-MX","google_author_link":null,"user_type_id":230,"escaped_name":"Ana Valadez ","full_name":"Ana Valadez ","badge_classes":""}}},"width":300,"height":250,"rtype":"MindMap","rmode":"canonical","sizes":"[[[0, 0], [[300, 250]]]]","custom":[{"key":"rsubject","value":"Matemáticas"},{"key":"rlevel","value":"Bachillerato/Preparatoria"},{"key":"env","value":"production"},{"key":"rtype","value":"MindMap"},{"key":"rmode","value":"canonical"},{"key":"sequence","value":1},{"key":"uauth","value":"f"},{"key":"uadmin","value":"f"},{"key":"ulang","value":"en_us"},{"key":"ucurrency","value":"usd"}]}
{"ad_unit_id":"App_Resource_Sidebar_Lower","resource":{"id":4024965,"author_id":1988581,"title":"Seguridad informática","created_at":"2015-11-12T21:17:35Z","updated_at":"2016-06-27T00:31:59Z","sample":false,"description":"Características de seguridad informática ","alerts_enabled":true,"cached_tag_list":"sector que arranca, humanos, tecnología","deleted_at":null,"hidden":false,"average_rating":null,"demote":false,"private":false,"copyable":true,"score":16,"artificial_base_score":0,"recalculate_score":false,"profane":false,"hide_summary":false,"tag_list":["sector que arranca","humanos","tecnología"],"admin_tag_list":[],"study_aid_type":"MindMap","show_path":"/mind_maps/4024965","folder_id":3072202,"public_author":{"id":1988581,"profile":{"name":"holanalaura","about":null,"avatar_service":"facebook","locale":"es-MX","google_author_link":null,"user_type_id":230,"escaped_name":"Ana Valadez ","full_name":"Ana Valadez ","badge_classes":""}}},"width":300,"height":250,"rtype":"MindMap","rmode":"canonical","sizes":"[[[0, 0], [[300, 250]]]]","custom":[{"key":"rsubject","value":"Matemáticas"},{"key":"rlevel","value":"Bachillerato/Preparatoria"},{"key":"env","value":"production"},{"key":"rtype","value":"MindMap"},{"key":"rmode","value":"canonical"},{"key":"sequence","value":1},{"key":"uauth","value":"f"},{"key":"uadmin","value":"f"},{"key":"ulang","value":"en_us"},{"key":"ucurrency","value":"usd"}]}
Next up
Copy and Edit
You need to log in to complete this action!
Register for Free
4024965
Seguridad informática
Description
Características de seguridad informática
No tags specified
sector que arranca
humanos
tecnología
bachillerato/preparatoria
Mind Map by
Ana Valadez
, updated more than 1 year ago
More
Less
Created by
Ana Valadez
over 6 years ago
5
0
0
{"ad_unit_id":"App_Resource_Leaderboard","width":728,"height":90,"rtype":"MindMap","rmode":"canonical","placement":1,"sizes":"[[[1200, 0], [[728, 90]]], [[0, 0], [[468, 60], [234, 60], [336, 280], [300, 250]]]]","custom":[{"key":"env","value":"production"},{"key":"rtype","value":"MindMap"},{"key":"rmode","value":"canonical"},{"key":"placement","value":1},{"key":"sequence","value":1},{"key":"uauth","value":"f"},{"key":"uadmin","value":"f"},{"key":"ulang","value":"en_us"},{"key":"ucurrency","value":"usd"}]}
Resource summary
Seguridad informática
Disciplina que diseña las normas .
Factores de riesgo
Ambientales
Tecnológicos
Humanos
Virus informático
Programa que se reproduce
Sector de arranque
Virus mutante
Copias de memoria
Caballo de Troya
Hackers
INVADEN
Mecanismo de seguridad
Herramientas
Antivirus
DETECTA
Encriptación
Esconde datos
Media attachments
8902f24e-8dd3-426d-a816-1a1aaa8f5d9f (image/jpg)
586512bc-8c26-490b-98ce-9607e5b20f8c (image/jpg)
60d5ec92-d519-401a-b95c-edd11cb2f7e8 (image/jpg)
abcfc0d8-54d6-43c5-82cf-66743d4b75b0 (image/jpg)
1d396e27-7557-48ce-b55d-37863f45d904 (image/jpg)
84af0d93-9edb-4089-8608-9659bc5a80a9 (image/png)
352aeaa2-4e80-47e9-ad6f-b3d62e95ed05 (image/jpg)
35311e82-b0e9-476c-b205-3ea7145359b9 (image/jpg)
618625fa-7b0a-4513-81ab-71a51f310bcd (image/jpg)
999a1a2a-77e6-4c10-b6f4-cca2ee7a1c57 (image/jpg)
49c1ed4a-778c-43b9-9be8-799fd2efa201 (image/jpg)
cdc91e5d-d93a-4d90-9c64-b5f4367aaae7 (image/jpg)
Show full summary
Hide full summary
Similar
Seguridad Informática
M Siller
Seguridad en la red
Diego Santos
Informática I, Primer Semestre, Bloque 1: Funciones básicas del sistema operativo y la seguridad de la información.
Paulo Barrientos
Seguridad informática
Héctor Miranda
¿Qué son los derechos humanos?
creaticciencias
MAPAS CONCEPTUALES
mario castro
Unidad 3. La tecnología digital
VICTOR SABINO HERNANDEZ
Test Estructuras II: Tipos de esfuerzos I
Pedro Landín
Examen semestral - Tecnología - Grado 6to
jvanegas
Test Estructuras I: Introducción a las estructuras
Pedro Landín
ESTRUCTURAS
RICARDO MURCIA SALAMANCA
Browse Library
{"ad_unit_id":"App_Resource_Leaderboard","width":728,"height":90,"rtype":"MindMap","rmode":"canonical","placement":2,"sizes":"[[[0, 0], [[970, 250], [970, 90], [728, 90]]]]","custom":[{"key":"env","value":"production"},{"key":"rtype","value":"MindMap"},{"key":"rmode","value":"canonical"},{"key":"placement","value":2},{"key":"sequence","value":1},{"key":"uauth","value":"f"},{"key":"uadmin","value":"f"},{"key":"ulang","value":"en_us"},{"key":"ucurrency","value":"usd"}]}