null
US
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
{"ad_unit_id":"App_Resource_Sidebar_Upper","resource":{"id":4027669,"author_id":1988682,"title":"Seguridad informática","created_at":"2015-11-13T02:57:19Z","updated_at":"2016-02-19T09:18:49Z","sample":false,"description":"antivirus: Analiza y ejecuta","alerts_enabled":true,"cached_tag_list":"ambientales, tecnologicos, humanos","deleted_at":null,"hidden":false,"average_rating":null,"demote":false,"private":false,"copyable":true,"score":16,"artificial_base_score":0,"recalculate_score":false,"profane":false,"hide_summary":false,"tag_list":["ambientales","tecnologicos","humanos"],"admin_tag_list":[],"study_aid_type":"MindMap","show_path":"/mind_maps/4027669","folder_id":3072396,"public_author":{"id":1988682,"profile":{"name":"san.comida123","about":null,"avatar_service":"gravatar","locale":"es","google_author_link":null,"user_type_id":230,"escaped_name":" Berenice Mata","full_name":" Berenice Mata","badge_classes":""}}},"width":300,"height":250,"rtype":"MindMap","rmode":"canonical","sizes":"[[[0, 0], [[300, 250]]]]","custom":[{"key":"rsubject","value":"tecnologias de la informacion"},{"key":"rlevel","value":"Tercero"},{"key":"env","value":"production"},{"key":"rtype","value":"MindMap"},{"key":"rmode","value":"canonical"},{"key":"sequence","value":1},{"key":"uauth","value":"f"},{"key":"uadmin","value":"f"},{"key":"ulang","value":"en_us"},{"key":"ucurrency","value":"usd"}]}
{"ad_unit_id":"App_Resource_Sidebar_Lower","resource":{"id":4027669,"author_id":1988682,"title":"Seguridad informática","created_at":"2015-11-13T02:57:19Z","updated_at":"2016-02-19T09:18:49Z","sample":false,"description":"antivirus: Analiza y ejecuta","alerts_enabled":true,"cached_tag_list":"ambientales, tecnologicos, humanos","deleted_at":null,"hidden":false,"average_rating":null,"demote":false,"private":false,"copyable":true,"score":16,"artificial_base_score":0,"recalculate_score":false,"profane":false,"hide_summary":false,"tag_list":["ambientales","tecnologicos","humanos"],"admin_tag_list":[],"study_aid_type":"MindMap","show_path":"/mind_maps/4027669","folder_id":3072396,"public_author":{"id":1988682,"profile":{"name":"san.comida123","about":null,"avatar_service":"gravatar","locale":"es","google_author_link":null,"user_type_id":230,"escaped_name":" Berenice Mata","full_name":" Berenice Mata","badge_classes":""}}},"width":300,"height":250,"rtype":"MindMap","rmode":"canonical","sizes":"[[[0, 0], [[300, 250]]]]","custom":[{"key":"rsubject","value":"tecnologias de la informacion"},{"key":"rlevel","value":"Tercero"},{"key":"env","value":"production"},{"key":"rtype","value":"MindMap"},{"key":"rmode","value":"canonical"},{"key":"sequence","value":1},{"key":"uauth","value":"f"},{"key":"uadmin","value":"f"},{"key":"ulang","value":"en_us"},{"key":"ucurrency","value":"usd"}]}
Next up
Copy and Edit
You need to log in to complete this action!
Register for Free
4027669
Seguridad informática
Description
antivirus: Analiza y ejecuta
No tags specified
ambientales
tecnologicos
humanos
tercero
Mind Map by
Berenice Mata
, updated more than 1 year ago
More
Less
Created by
Berenice Mata
over 6 years ago
3
0
0
{"ad_unit_id":"App_Resource_Leaderboard","width":728,"height":90,"rtype":"MindMap","rmode":"canonical","placement":1,"sizes":"[[[1200, 0], [[728, 90]]], [[0, 0], [[468, 60], [234, 60], [336, 280], [300, 250]]]]","custom":[{"key":"env","value":"production"},{"key":"rtype","value":"MindMap"},{"key":"rmode","value":"canonical"},{"key":"placement","value":1},{"key":"sequence","value":1},{"key":"uauth","value":"f"},{"key":"uadmin","value":"f"},{"key":"ulang","value":"en_us"},{"key":"ucurrency","value":"usd"}]}
Resource summary
Seguridad informática
Disciplina que se ocupa de diseñar las normas, orientados a proveer condiciones seguras
Factores de Riesgo
Ambientales
Tecnológicos
Humanos
Virus informáticos
Tipos de virus
Sector de arranque
Virus mutante
Caballo de Troya
Una bomba de tiempo
Macrovirus
Bomba lógica
Gusanos
Spyware
Dialers
Hackers y Crackers
Invasión de sistemas sin acceso autorizado
Invadir un sistema protegido
Mecanismos de seguridad
Respaldos
Incremental
Total
Diferencial
Antivirus
Ejecutar
Analizar
Firewall
Show full summary
Hide full summary
Similar
Seguridad Informática
M Siller
Seguridad en la red
Diego Santos
Informática I, Primer Semestre, Bloque 1: Funciones básicas del sistema operativo y la seguridad de la información.
Paulo Barrientos
Enfermedades transmitibles
ed_gar1703
¿Qué son los derechos humanos?
creaticciencias
El Cerebro Humano
Ximena Olivera
CONCEPTOS RELEVANTES DEL AREA DE RECURSOS HUMANOS
Angie Grey De Ma8553
Célula.
Vivi.Vilches
PRINCIPIOS DE SEGURIDAD INFORMÁTICA
Marisol Monroy
Seguridad informática
karina aguirre
Los valores humanos
Dora Marlen Araque Beltrán
Browse Library
{"ad_unit_id":"App_Resource_Leaderboard","width":728,"height":90,"rtype":"MindMap","rmode":"canonical","placement":2,"sizes":"[[[0, 0], [[970, 250], [970, 90], [728, 90]]]]","custom":[{"key":"env","value":"production"},{"key":"rtype","value":"MindMap"},{"key":"rmode","value":"canonical"},{"key":"placement","value":2},{"key":"sequence","value":1},{"key":"uauth","value":"f"},{"key":"uadmin","value":"f"},{"key":"ulang","value":"en_us"},{"key":"ucurrency","value":"usd"}]}