Sindbad~EG File Manager
{"metadata":{"generator":"Captivate","generatorVersion":"8.0.1","schemaVersion":"","author":"author","title":"","description":"project description","email":"author@company.com","website":"www.company.com","tags":"","thumbnail":"","source":"assets","durationInFrames":58200,"frameRate":30,"totalSlides":60,"width":801,"height":600,"responsive":false,"scalable":true,"launchFile":"index.html"},"contentStructure":[{"id":"SmartShape_3053","class":"TODO::Senthil","instance":"SmartShape_3053","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2300","class":"TODO::Senthil","instance":"Image_2300","roles":{}},{"id":"Text_Caption_489","class":"TODO::Senthil","instance":"Text_Caption_489","title":"Bienvenido, bienvenida al curso “Seguridad de la Información” ","roles":{"textData":{}}},{"id":"Image_2301","class":"TODO::Senthil","instance":"Image_2301","roles":{}},{"id":"Slide74144602","class":"Normal Slide","instance":"","thumbnail":"dr/Slide74144602_thnail.jpg","children":["Image_2300","Text_Caption_489","Image_2301"],"roles":{"slide":{"durationInFrames":306},"navigation":{"navid":"Slide74144602"}}},{"id":"Image_2262","class":"TODO::Senthil","instance":"Image_2262","roles":{}},{"id":"Image_2263","class":"TODO::Senthil","instance":"Image_2263","roles":{}},{"id":"SmartShape_3149","class":"TODO::Senthil","instance":"SmartShape_3149","title":"El objetivo del mismo consiste en concienciar a los colaboradores del Banco sobre la adopción de las mejores prácticas, que permitan cuidar información confidencial del banco, evitando todo ataque delictivo dirigido al robo de dicha información. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3150","class":"TODO::Senthil","instance":"SmartShape_3150","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_573","class":"TODO::Senthil","instance":"Text_Caption_573","title":"Objetivo ","roles":{"textData":{}}},{"id":"Slide81722271","class":"Normal Slide","instance":"Objetivos","thumbnail":"dr/Slide81722271_thnail.jpg","children":["Image_2262","Image_2263","Text_Caption_573"],"roles":{"slide":{"durationInFrames":246},"navigation":{"navid":"Slide81722271"}}},{"id":"Image_2148","class":"TODO::Senthil","instance":"Image_2148","roles":{}},{"id":"Image_2257","class":"TODO::Senthil","instance":"Image_2257","roles":{}},{"id":"Text_Caption_571","class":"TODO::Senthil","instance":"Text_Caption_571","title":"Un concepto erróneo que muchas personas tienen, es no creer que sean el objetivo de los criminales cibernéticos, que ellas o sus equipos no tengan valor alguno. Nada podría estar más lejos de la verdad. ","roles":{"textData":{}}},{"id":"SmartShape_3147","class":"TODO::Senthil","instance":"SmartShape_3147","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2258","class":"TODO::Senthil","instance":"Image_2258","roles":{}},{"id":"Image_2259","class":"TODO::Senthil","instance":"Image_2259","roles":{}},{"id":"Text_Caption_572","class":"TODO::Senthil","instance":"Text_Caption_572","title":"A continuación te explicamos porque eres un objetivo, cómo estás siendo atacado y qué puedes hacer para protegerte. ","roles":{"textData":{}}},{"id":"SmartShape_3148","class":"TODO::Senthil","instance":"SmartShape_3148","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2260","class":"TODO::Senthil","instance":"Image_2260","roles":{}},{"id":"SmartShape_2515","class":"TODO::Senthil","instance":"SmartShape_2515","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_2516","class":"TODO::Senthil","instance":"SmartShape_2516","title":"Equipo ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_1767","class":"TODO::Senthil","instance":"Image_1767","roles":{}},{"id":"SmartShape_2519","class":"TODO::Senthil","instance":"SmartShape_2519","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_2520","class":"TODO::Senthil","instance":"SmartShape_2520","title":"Una cuenta asociada a un correo electrónico, tarjeta de crédito ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2134","class":"TODO::Senthil","instance":"Image_2134","roles":{}},{"id":"SmartShape_2521","class":"TODO::Senthil","instance":"SmartShape_2521","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_2522","class":"TODO::Senthil","instance":"SmartShape_2522","title":"Dispositivo móvil ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_1769","class":"TODO::Senthil","instance":"Image_1769","roles":{}},{"id":"SmartShape_2517","class":"TODO::Senthil","instance":"SmartShape_2517","title":". ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_2518","class":"TODO::Senthil","instance":"SmartShape_2518","title":"Cualquier otro tipo de actividad en linea ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2133","class":"TODO::Senthil","instance":"Image_2133","roles":{}},{"id":"SmartShape_3063","class":"TODO::Senthil","instance":"SmartShape_3063","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_499","class":"TODO::Senthil","instance":"Text_Caption_499","title":"Objetivo ","roles":{"textData":{}}},{"id":"Slide46793123","class":"Normal Slide","instance":"Ser el objetivo","thumbnail":"dr/Slide46793123_thnail.jpg","children":["Image_2148","Image_2257","Text_Caption_571","Image_2258","Image_2259","Text_Caption_572","Image_2260","Image_1767","Image_2134","Image_1769","Image_2133","Text_Caption_499"],"roles":{"slide":{"durationInFrames":597},"navigation":{"navid":"Slide46793123"}}},{"id":"Image_2149","class":"TODO::Senthil","instance":"Image_2149","roles":{}},{"id":"Image_1770","class":"TODO::Senthil","instance":"Image_1770","roles":{}},{"id":"Image_1771","class":"TODO::Senthil","instance":"Image_1771","roles":{}},{"id":"Image_1772","class":"TODO::Senthil","instance":"Image_1772","roles":{}},{"id":"Image_1773","class":"TODO::Senthil","instance":"Image_1773","roles":{}},{"id":"Image_1774","class":"TODO::Senthil","instance":"Image_1774","roles":{}},{"id":"Image_1775","class":"TODO::Senthil","instance":"Image_1775","roles":{}},{"id":"Image_1776","class":"TODO::Senthil","instance":"Image_1776","roles":{}},{"id":"Image_1777","class":"TODO::Senthil","instance":"Image_1777","roles":{}},{"id":"Image_2302","class":"TODO::Senthil","instance":"Image_2302","roles":{}},{"id":"SmartShape_2525","class":"TODO::Senthil","instance":"SmartShape_2525","title":"Delitos como fraudes, robo de identidad o extorsiones han existido desde que surgieron las civilizaciones; son parte de nuestro día a día. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3064","class":"TODO::Senthil","instance":"SmartShape_3064","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2136","class":"TODO::Senthil","instance":"Image_2136","roles":{}},{"id":"Text_Caption_500","class":"TODO::Senthil","instance":"Text_Caption_500","title":"1 ","roles":{"textData":{}}},{"id":"SmartShape_2526","class":"TODO::Senthil","instance":"SmartShape_2526","title":"El objetivo de los criminales siempre ha sido el mismo, hacer tanto dinero como sea posible, de la manera más sencilla y con el menor riesgo. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3065","class":"TODO::Senthil","instance":"SmartShape_3065","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2142","class":"TODO::Senthil","instance":"Image_2142","roles":{}},{"id":"Text_Caption_507","class":"TODO::Senthil","instance":"Text_Caption_507","title":"2 ","roles":{"textData":{}}},{"id":"SmartShape_2527","class":"TODO::Senthil","instance":"SmartShape_2527","title":"Anteriormente era dífícil, porque los delincuentes estaban limitados por su ubicación y tenían que interactuar físicamente con sus víctimas. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3066","class":"TODO::Senthil","instance":"SmartShape_3066","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2143","class":"TODO::Senthil","instance":"Image_2143","roles":{}},{"id":"Text_Caption_508","class":"TODO::Senthil","instance":"Text_Caption_508","title":"3 ","roles":{"textData":{}}},{"id":"SmartShape_2528","class":"TODO::Senthil","instance":"SmartShape_2528","title":"Esto no sólo los limitaba en cuanto a quiénes podían elegir como blancos, también los exponía a un gran riesgo. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3073","class":"TODO::Senthil","instance":"SmartShape_3073","title":" Sin embargo, el crimen ha cambiado radicalmente con la aparición de Internet y la tecnología en línea. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3067","class":"TODO::Senthil","instance":"SmartShape_3067","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2144","class":"TODO::Senthil","instance":"Image_2144","roles":{}},{"id":"Text_Caption_509","class":"TODO::Senthil","instance":"Text_Caption_509","title":"4 ","roles":{"textData":{}}},{"id":"SmartShape_2529","class":"TODO::Senthil","instance":"SmartShape_2529","title":"Los criminales cibernéticos pueden llegar fácilmente a cualquier persona en el mundo, a un bajo costo o inclusive sin costo alguno y con muy poco riesgo. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3068","class":"TODO::Senthil","instance":"SmartShape_3068","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2145","class":"TODO::Senthil","instance":"Image_2145","roles":{}},{"id":"Text_Caption_510","class":"TODO::Senthil","instance":"Text_Caption_510","title":"5 ","roles":{"textData":{}}},{"id":"SmartShape_2530","class":"TODO::Senthil","instance":"SmartShape_2530","title":"Actualmente los criminales cibernéticos se han vuelto altamente organizados y eficientes, lo que les permite ser más efectivos que nunca. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3069","class":"TODO::Senthil","instance":"SmartShape_3069","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2146","class":"TODO::Senthil","instance":"Image_2146","roles":{}},{"id":"Text_Caption_511","class":"TODO::Senthil","instance":"Text_Caption_511","title":"6 ","roles":{"textData":{}}},{"id":"SmartShape_3061","class":"TODO::Senthil","instance":"SmartShape_3061","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_497","class":"TODO::Senthil","instance":"Text_Caption_497","title":"¿Por qué eres un objetivo? ","roles":{"textData":{}}},{"id":"Slide46795112","class":"Normal Slide","instance":"Por qué eres un objetivo?","thumbnail":"dr/Slide46795112_thnail.jpg","children":["Image_2149","Image_1770","Image_1771","Image_1772","Image_1773","Image_1774","Image_1775","Image_1776","Image_1777","Image_2302","Image_2136","Text_Caption_500","Image_2142","Text_Caption_507","Image_2143","Text_Caption_508","Image_2144","Text_Caption_509","Image_2145","Text_Caption_510","Image_2146","Text_Caption_511","Text_Caption_497"],"roles":{"slide":{"durationInFrames":1731},"navigation":{"navid":"Slide46795112"}}},{"id":"Image_2152","class":"TODO::Senthil","instance":"Image_2152","roles":{}},{"id":"Image_2158","class":"TODO::Senthil","instance":"Image_2158","roles":{}},{"id":"Image_2159","class":"TODO::Senthil","instance":"Image_2159","roles":{}},{"id":"Image_2153","class":"TODO::Senthil","instance":"Image_2153","roles":{}},{"id":"Image_2154","class":"TODO::Senthil","instance":"Image_2154","roles":{}},{"id":"Image_2157","class":"TODO::Senthil","instance":"Image_2157","roles":{}},{"id":"Image_2156","class":"TODO::Senthil","instance":"Image_2156","roles":{}},{"id":"Image_2155","class":"TODO::Senthil","instance":"Image_2155","roles":{}},{"id":"Image_1785","class":"TODO::Senthil","instance":"Image_1785","roles":{}},{"id":"SmartShape_2531","class":"TODO::Senthil","instance":"SmartShape_2531","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_2533","class":"TODO::Senthil","instance":"SmartShape_2533","title":"Entre más datos de tarjetas de crédito roben más cuentas logren hackear y... ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_2534","class":"TODO::Senthil","instance":"SmartShape_2534","title":"más contraseñas obtengan literalmente intentan hackear... ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_2536","class":"TODO::Senthil","instance":"SmartShape_2536","title":"...a cualquier persona conectada a internet , ¡incluyendo a ti! ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_2537","class":"TODO::Senthil","instance":"SmartShape_2537","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_515","class":"TODO::Senthil","instance":"Text_Caption_515","title":"saben que: ","roles":{"textData":{}}},{"id":"Text_Caption_512","class":"TODO::Senthil","instance":"Text_Caption_512","title":"Los criminales cibernéticos ","roles":{"textData":{}}},{"id":"Image_1787","class":"TODO::Senthil","instance":"Image_1787","roles":{}},{"id":"Image_1788","class":"TODO::Senthil","instance":"Image_1788","roles":{}},{"id":"Image_1789","class":"TODO::Senthil","instance":"Image_1789","roles":{}},{"id":"SmartShape_3074","class":"TODO::Senthil","instance":"SmartShape_3074","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_514","class":"TODO::Senthil","instance":"Text_Caption_514","title":"En el gráfico de esta sección puedes observar, lo que los criminales cibernéticos saben para hackear a toda persona conectada a internet, incluyendote a ti. ","roles":{"textData":{}}},{"id":"SmartShape_3070","class":"TODO::Senthil","instance":"SmartShape_3070","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_513","class":"TODO::Senthil","instance":"Text_Caption_513","title":"¿Por qué eres un objetivo? ","roles":{"textData":{}}},{"id":"Slide46797087","class":"Normal Slide","instance":"Por qué eres un objetivo?","thumbnail":"dr/Slide46797087_thnail.jpg","children":["Image_2152","Image_2158","Image_2159","Image_2153","Image_2154","Image_2157","Image_2156","Image_2155","Image_1785","Text_Caption_515","Text_Caption_512","Image_1787","Image_1788","Image_1789","Text_Caption_514","Text_Caption_513"],"roles":{"slide":{"durationInFrames":624},"navigation":{"navid":"Slide46797087"}}},{"id":"Image_2160","class":"TODO::Senthil","instance":"Image_2160","roles":{}},{"id":"Image_2161","class":"TODO::Senthil","instance":"Image_2161","roles":{}},{"id":"Image_2163","class":"TODO::Senthil","instance":"Image_2163","roles":{}},{"id":"Image_2164","class":"TODO::Senthil","instance":"Image_2164","roles":{}},{"id":"Image_2165","class":"TODO::Senthil","instance":"Image_2165","roles":{}},{"id":"Image_2166","class":"TODO::Senthil","instance":"Image_2166","roles":{}},{"id":"Image_2167","class":"TODO::Senthil","instance":"Image_2167","roles":{}},{"id":"SmartShape_2539","class":"TODO::Senthil","instance":"SmartShape_2539","title":"Pueden diseñar bases de datos con millones de correos electrónicos y... ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_2540","class":"TODO::Senthil","instance":"SmartShape_2540","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_2541","class":"TODO::Senthil","instance":"SmartShape_2541","title":" usar una herramienta informática, para enviar mensajes de phishing a cada una de las direcciones de correo. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_2542","class":"TODO::Senthil","instance":"SmartShape_2542","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3079","class":"TODO::Senthil","instance":"SmartShape_3079","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_1792","class":"TODO::Senthil","instance":"Image_1792","roles":{}},{"id":"Image_1793","class":"TODO::Senthil","instance":"Image_1793","roles":{}},{"id":"Image_1794","class":"TODO::Senthil","instance":"Image_1794","roles":{}},{"id":"SmartShape_3076","class":"TODO::Senthil","instance":"SmartShape_3076","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_516","class":"TODO::Senthil","instance":"Text_Caption_516","title":"Hackear a millones de personas alrededor del mundo quizás pueda parecer mucho trabajo, pero es sorprendentemente fácil, ya que utilizan herramientas automatizadas, que realizan todo el trabajo. ","roles":{"textData":{}}},{"id":"SmartShape_3077","class":"TODO::Senthil","instance":"SmartShape_3077","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_517","class":"TODO::Senthil","instance":"Text_Caption_517","title":"Evitemos ser un objetivo ","roles":{"textData":{}}},{"id":"Image_2247","class":"TODO::Senthil","instance":"Image_2247","roles":{}},{"id":"Image_2248","class":"TODO::Senthil","instance":"Image_2248","roles":{}},{"id":"Slide46798804","class":"Normal Slide","instance":" Evitemos ser un objetivo","thumbnail":"dr/Slide46798804_thnail.jpg","children":["Image_2160","Image_2161","Image_2163","Image_2164","Image_2165","Image_2166","Image_2167","Image_1792","Image_1793","Image_1794","Text_Caption_516","Text_Caption_517","Image_2247","Image_2248"],"roles":{"slide":{"durationInFrames":699},"navigation":{"navid":"Slide46798804"}}},{"id":"Image_2303","class":"TODO::Senthil","instance":"Image_2303","roles":{}},{"id":"SmartShape_2546","class":"TODO::Senthil","instance":"SmartShape_2546","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_519","class":"TODO::Senthil","instance":"Text_Caption_519","title":"Recuerda ","roles":{"textData":{}}},{"id":"SmartShape_2547","class":"TODO::Senthil","instance":"SmartShape_2547","title":"No eres elegido porque seas especial. Más bien, los delincuentes tienen como objetivo a todas las personas posibles, ¡también tu! ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_1796","class":"TODO::Senthil","instance":"Image_1796","roles":{}},{"id":"Image_1797","class":"TODO::Senthil","instance":"Image_1797","roles":{}},{"id":"Image_1798","class":"TODO::Senthil","instance":"Image_1798","roles":{}},{"id":"Image_1799","class":"TODO::Senthil","instance":"Image_1799","roles":{}},{"id":"Image_1800","class":"TODO::Senthil","instance":"Image_1800","roles":{}},{"id":"Image_1801","class":"TODO::Senthil","instance":"Image_1801","roles":{}},{"id":"Image_1802","class":"TODO::Senthil","instance":"Image_1802","roles":{}},{"id":"Image_1803","class":"TODO::Senthil","instance":"Image_1803","roles":{}},{"id":"SmartShape_2548","class":"TODO::Senthil","instance":"SmartShape_2548","title":" El costo por enviar correos electrónicos es casi nulo, ellos simplemente usan otroequipo comprometido (incluso podría ser el tuyo), para realizar el trabajo sucio. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_2549","class":"TODO::Senthil","instance":"SmartShape_2549","title":" Éste es otro ejemplo del porqué tus dispositivos tienen valor, ya que como mínimo, pueden ser usados para comprometer o dañar a otros. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_2550","class":"TODO::Senthil","instance":"SmartShape_2550","title":"Finalmente, los delincuentes no saben quiénes serán las víctimas que caerán en los ataques por correo electrónico, pero están conscientes de que a más correos masivos envíen, más personas eventualmente caerán en sus ataques. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_2551","class":"TODO::Senthil","instance":"SmartShape_2551","title":" Tal vez, los delincuentes literalmente monitoreen cada equipo en Internet (una vez más, a través de equipos comprometidos para monitorear), en busca de cualquier dispositivo que pueda ser hackeado. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3080","class":"TODO::Senthil","instance":"SmartShape_3080","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_518","class":"TODO::Senthil","instance":"Text_Caption_518","title":"Evitemos ser un objetivo ","roles":{"textData":{}}},{"id":"Slide46800816","class":"Normal Slide","instance":" Evitemos ser un objetivo","thumbnail":"dr/Slide46800816_thnail.jpg","children":["Image_2303","Text_Caption_519","Image_1796","Image_1797","Image_1798","Image_1799","Image_1800","Image_1801","Image_1802","Image_1803","Text_Caption_518"],"roles":{"slide":{"durationInFrames":1572},"navigation":{"navid":"Slide46800816"}}},{"id":"Image_2169","class":"TODO::Senthil","instance":"Image_2169","roles":{}},{"id":"Image_2168","class":"TODO::Senthil","instance":"Image_2168","roles":{}},{"id":"Image_2170","class":"TODO::Senthil","instance":"Image_2170","roles":{}},{"id":"Image_2171","class":"TODO::Senthil","instance":"Image_2171","roles":{}},{"id":"Image_2172","class":"TODO::Senthil","instance":"Image_2172","roles":{}},{"id":"Image_2173","class":"TODO::Senthil","instance":"Image_2173","roles":{}},{"id":"Image_2174","class":"TODO::Senthil","instance":"Image_2174","roles":{}},{"id":"SmartShape_3082","class":"TODO::Senthil","instance":"SmartShape_3082","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_521","class":"TODO::Senthil","instance":"Text_Caption_521","title":"Cuando los criminales cibernéticos intentan comprometer personas alrededor del mundo, regularmente utilizan métodos relativamente sencillos. ","roles":{"textData":{}}},{"id":"Text_Caption_522","class":"TODO::Senthil","instance":"Text_Caption_522","title":" Afortunadamente, siguiendo unos simples pasos, puedes hacer mucho por protegerte. Algunos de los más recomendados son los siguientes: ","roles":{"textData":{}}},{"id":"Image_2178","class":"TODO::Senthil","instance":"Image_2178","roles":{}},{"id":"Image_2179","class":"TODO::Senthil","instance":"Image_2179","roles":{}},{"id":"Image_2180","class":"TODO::Senthil","instance":"Image_2180","roles":{}},{"id":"Image_2175","class":"TODO::Senthil","instance":"Image_2175","roles":{}},{"id":"Image_2176","class":"TODO::Senthil","instance":"Image_2176","roles":{}},{"id":"Image_2177","class":"TODO::Senthil","instance":"Image_2177","roles":{}},{"id":"Text_Caption_382","class":"TODO::Senthil","instance":"Text_Caption_382","title":"Tú mismo: eres el primero en la línea de defensa ante un ataque cibernético. ","roles":{"textData":{}}},{"id":"Text_Caption_384","class":"TODO::Senthil","instance":"Text_Caption_384","title":"Muchos ataques inician con un intento de enga- ñarte, como abrir el archivo adjunto de un correo electrónico que se encuentra infectado o engañándote para dar tu contraseña a través del teléfono. ","roles":{"textData":{}}},{"id":"Text_Caption_383","class":"TODO::Senthil","instance":"Text_Caption_383","title":"El sentido común es la mejor defensa, si algo parece extraño, sospechoso o muy bueno para ser verdad, seguramente se trata de un ataque. ","roles":{"textData":{}}},{"id":"SmartShape_3081","class":"TODO::Senthil","instance":"SmartShape_3081","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_520","class":"TODO::Senthil","instance":"Text_Caption_520","title":"Protegete ","roles":{"textData":{}}},{"id":"Text_Caption_586","class":"TODO::Senthil","instance":"Text_Caption_586","title":"Actualización: asegúrate de que el equipo o los dispositivos móviles que usas se encuentren actualizados y cuenten con los últimos parches. ","roles":{"textData":{}}},{"id":"Text_Caption_587","class":"TODO::Senthil","instance":"Text_Caption_587","title":"Esto no sólo es importante para el sistema operativo, también para cualquier aplicación o complemento que utilices. ","roles":{"textData":{}}},{"id":"Text_Caption_588","class":"TODO::Senthil","instance":"Text_Caption_588","title":"Mantener siempre tu sistema y aplicaciones actualizadas ayuda a protegerte de los ataques más comunes. ","roles":{"textData":{}}},{"id":"Image_2304","class":"TODO::Senthil","instance":"Image_2304","roles":{}},{"id":"Image_2305","class":"TODO::Senthil","instance":"Image_2305","roles":{}},{"id":"Image_2306","class":"TODO::Senthil","instance":"Image_2306","roles":{}},{"id":"Slide46802971","class":"Normal Slide","instance":"Protégete","thumbnail":"dr/Slide46802971_thnail.jpg","children":["Image_2169","Image_2168","Image_2170","Image_2171","Image_2172","Image_2173","Image_2174","Text_Caption_521","Text_Caption_522","Image_2178","Image_2179","Image_2180","Image_2175","Image_2176","Image_2177","Text_Caption_382","Text_Caption_384","Text_Caption_383","Text_Caption_520","Text_Caption_586","Text_Caption_587","Text_Caption_588","Image_2304","Image_2305","Image_2306"],"roles":{"slide":{"durationInFrames":1515},"navigation":{"navid":"Slide46802971"}}},{"id":"Image_2181","class":"TODO::Senthil","instance":"Image_2181","roles":{}},{"id":"Image_1811","class":"TODO::Senthil","instance":"Image_1811","roles":{}},{"id":"Image_2182","class":"TODO::Senthil","instance":"Image_2182","roles":{}},{"id":"Image_2183","class":"TODO::Senthil","instance":"Image_2183","roles":{}},{"id":"Image_2187","class":"TODO::Senthil","instance":"Image_2187","roles":{}},{"id":"Image_2185","class":"TODO::Senthil","instance":"Image_2185","roles":{}},{"id":"Image_2186","class":"TODO::Senthil","instance":"Image_2186","roles":{}},{"id":"Image_2184","class":"TODO::Senthil","instance":"Image_2184","roles":{}},{"id":"Image_1813","class":"TODO::Senthil","instance":"Image_1813","roles":{}},{"id":"Image_1814","class":"TODO::Senthil","instance":"Image_1814","roles":{}},{"id":"Image_1815","class":"TODO::Senthil","instance":"Image_1815","roles":{}},{"id":"Image_1816","class":"TODO::Senthil","instance":"Image_1816","roles":{}},{"id":"Image_2192","class":"TODO::Senthil","instance":"Image_2192","roles":{}},{"id":"SmartShape_3084","class":"TODO::Senthil","instance":"SmartShape_3084","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_524","class":"TODO::Senthil","instance":"Text_Caption_524","title":"En esta sección te presentamos una serie de sugerencias orientadas hacia un manejo adecuado de... ","roles":{"textData":{}}},{"id":"SmartShape_3087","class":"TODO::Senthil","instance":"SmartShape_3087","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3088","class":"TODO::Senthil","instance":"SmartShape_3088","title":"Utiliza una contraseña fuerte y única para cada una de tus cuentas. De esta manera si el sitio web que utilizas está hackeado y todas las contraseñas son comprometidas (incluida la tuya) tus otras cuentas están a salvo . Tambien asegùrate que tus dispositivos estén protegidos por una contraseña PIN, o cualquier otro mecanismo de protección que sea fuerte y único. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3086","class":"TODO::Senthil","instance":"SmartShape_3086","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2188","class":"TODO::Senthil","instance":"Image_2188","roles":{}},{"id":"Text_Caption_525","class":"TODO::Senthil","instance":"Text_Caption_525","title":"1 ","roles":{"textData":{}}},{"id":"SmartShape_3090","class":"TODO::Senthil","instance":"SmartShape_3090","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3091","class":"TODO::Senthil","instance":"SmartShape_3091","title":"Revisa tus estados de cuenta regularmente, te recomendamos hacerlo semanalmente (mensualmente no es suficiente). Tan pronto como veas una transacción no autorizada en tu tarjeta de crédito repórtalo al emisor de tu tarjeta. Si tu banco permite configurar alertas de correo electrónico o mensajes de textos para transacciones inusualmente grandes o extrañas, utilízalas para tener notificaciones de actividades sospechosas más rápidamente. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3089","class":"TODO::Senthil","instance":"SmartShape_3089","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2189","class":"TODO::Senthil","instance":"Image_2189","roles":{}},{"id":"Text_Caption_526","class":"TODO::Senthil","instance":"Text_Caption_526","title":"2 ","roles":{"textData":{}}},{"id":"SmartShape_3095","class":"TODO::Senthil","instance":"SmartShape_3095","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3093","class":"TODO::Senthil","instance":"SmartShape_3093","title":"Asegura el acceso de la red inalámbrica de tu hogar con una contraseña de administrador fuerte y asegúrate que la requiera cuando alguien quiera accede. También asegúrate de que conozcas los dispositivos que se encuentran conectados a la red de tu hogar y que todos los dispositivos estén actualizados. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3094","class":"TODO::Senthil","instance":"SmartShape_3094","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2190","class":"TODO::Senthil","instance":"Image_2190","roles":{}},{"id":"Text_Caption_527","class":"TODO::Senthil","instance":"Text_Caption_527","title":"3 ","roles":{"textData":{}}},{"id":"SmartShape_3096","class":"TODO::Senthil","instance":"SmartShape_3096","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3097","class":"TODO::Senthil","instance":"SmartShape_3097","title":"Cuanto más información publiques en línea, más es probable que puedas ponerte en riesgo. No sólo la información que publicas hace más fácil que seas el objetivo de los criminales cibernéticos para tratar de engañarte: esta información también puede identificarse como un objeto más valioso (economicamente interesante). ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3098","class":"TODO::Senthil","instance":"SmartShape_3098","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2191","class":"TODO::Senthil","instance":"Image_2191","roles":{}},{"id":"Text_Caption_528","class":"TODO::Senthil","instance":"Text_Caption_528","title":"4 ","roles":{"textData":{}}},{"id":"SmartShape_3083","class":"TODO::Senthil","instance":"SmartShape_3083","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_523","class":"TODO::Senthil","instance":"Text_Caption_523","title":"Varias medidas para la protección ","roles":{"textData":{}}},{"id":"Slide46804514","class":"Normal Slide","instance":"Varias medidas para la protección","thumbnail":"dr/Slide46804514_thnail.jpg","children":["Image_2181","Image_1811","Image_2182","Image_2183","Image_2187","Image_2185","Image_2186","Image_2184","Image_1813","Image_1814","Image_1815","Image_1816","Image_2192","Text_Caption_524","Image_2188","Text_Caption_525","Image_2189","Text_Caption_526","Image_2190","Text_Caption_527","Image_2191","Text_Caption_528","Text_Caption_523"],"roles":{"slide":{"durationInFrames":1800},"navigation":{"navid":"Slide46804514"}}},{"id":"Image_2205","class":"TODO::Senthil","instance":"Image_2205","roles":{}},{"id":"Image_2206","class":"TODO::Senthil","instance":"Image_2206","roles":{}},{"id":"Image_2197","class":"TODO::Senthil","instance":"Image_2197","roles":{}},{"id":"Image_2204","class":"TODO::Senthil","instance":"Image_2204","roles":{}},{"id":"Image_2198","class":"TODO::Senthil","instance":"Image_2198","roles":{}},{"id":"Image_2199","class":"TODO::Senthil","instance":"Image_2199","roles":{}},{"id":"Image_2200","class":"TODO::Senthil","instance":"Image_2200","roles":{}},{"id":"Image_2201","class":"TODO::Senthil","instance":"Image_2201","roles":{}},{"id":"Image_2202","class":"TODO::Senthil","instance":"Image_2202","roles":{}},{"id":"Image_2203","class":"TODO::Senthil","instance":"Image_2203","roles":{}},{"id":"Text_Caption_530","class":"TODO::Senthil","instance":"Text_Caption_530","title":"El correo electrónico es uno de los princi- pales medios con los que podemos comunicarnos. ","roles":{"textData":{}}},{"id":"Text_Caption_529","class":"TODO::Senthil","instance":"Text_Caption_529","title":"Lo usamos todos los días para trabajar, sino tam- bién para estar en con- tacto con nuestros amigos y familiares. ","roles":{"textData":{}}},{"id":"Text_Caption_531","class":"TODO::Senthil","instance":"Text_Caption_531","title":"Además, el correo elec- trónico es el medio por el cual las compañías ofrecen muchos pro- ductos o servicios... ","roles":{"textData":{}}},{"id":"Text_Caption_532","class":"TODO::Senthil","instance":"Text_Caption_532","title":"...como la confirmación de una compra en línea o la disponibilidad de tus estados de cuenta. ","roles":{"textData":{}}},{"id":"Text_Caption_533","class":"TODO::Senthil","instance":"Text_Caption_533","title":"Desde que mucha gente alrededor del mundo depende del uso del correo electrónico, los ataques a este servicio... ","roles":{"textData":{}}},{"id":"Text_Caption_534","class":"TODO::Senthil","instance":"Text_Caption_534","title":"...se han conver- tido en uno de los principales métodos utilizados por los delin- cuentes cibernéticos. ","roles":{"textData":{}}},{"id":"SmartShape_3103","class":"TODO::Senthil","instance":"SmartShape_3103","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_535","class":"TODO::Senthil","instance":"Text_Caption_535","title":"Cuidados aplicados al e-mail ","roles":{"textData":{}}},{"id":"Text_Caption_536","class":"TODO::Senthil","instance":"Text_Caption_536","title":"1 ","roles":{"textData":{}}},{"id":"Text_Caption_537","class":"TODO::Senthil","instance":"Text_Caption_537","title":"2 ","roles":{"textData":{}}},{"id":"Text_Caption_538","class":"TODO::Senthil","instance":"Text_Caption_538","title":"3 ","roles":{"textData":{}}},{"id":"Text_Caption_539","class":"TODO::Senthil","instance":"Text_Caption_539","title":"4 ","roles":{"textData":{}}},{"id":"Text_Caption_540","class":"TODO::Senthil","instance":"Text_Caption_540","title":"5 ","roles":{"textData":{}}},{"id":"Text_Caption_541","class":"TODO::Senthil","instance":"Text_Caption_541","title":"6 ","roles":{"textData":{}}},{"id":"Slide46806528","class":"Normal Slide","instance":"Cuidados aplicados al e-mail","thumbnail":"dr/Slide46806528_thnail.jpg","children":["Image_2205","Image_2206","Image_2197","Image_2204","Image_2198","Image_2199","Image_2200","Image_2201","Image_2202","Image_2203","Text_Caption_530","Text_Caption_529","Text_Caption_531","Text_Caption_532","Text_Caption_533","Text_Caption_534","Text_Caption_535","Text_Caption_536","Text_Caption_537","Text_Caption_538","Text_Caption_539","Text_Caption_540","Text_Caption_541"],"roles":{"slide":{"durationInFrames":1500},"navigation":{"navid":"Slide46806528"}}},{"id":"Image_2208","class":"TODO::Senthil","instance":"Image_2208","roles":{}},{"id":"Image_2209","class":"TODO::Senthil","instance":"Image_2209","roles":{}},{"id":"Image_1823","class":"TODO::Senthil","instance":"Image_1823","roles":{}},{"id":"Image_1824","class":"TODO::Senthil","instance":"Image_1824","roles":{}},{"id":"Image_1825","class":"TODO::Senthil","instance":"Image_1825","roles":{}},{"id":"Image_1826","class":"TODO::Senthil","instance":"Image_1826","roles":{}},{"id":"Image_1827","class":"TODO::Senthil","instance":"Image_1827","roles":{}},{"id":"SmartShape_3107","class":"TODO::Senthil","instance":"SmartShape_3107","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_544","class":"TODO::Senthil","instance":"Text_Caption_544","title":"Phishing es un término utilizado originalmente para describir ataques de correo electrónico, diseñados para robar tu nombre de usuario y contraseña de algún servicio bancario. ","roles":{"textData":{}}},{"id":"SmartShape_3112","class":"TODO::Senthil","instance":"SmartShape_3112","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_543","class":"TODO::Senthil","instance":"Text_Caption_543","title":" Sin embargo, el término ha evolucionado y ahora se refiere a casi cualquier ataque basado en correo electrónico. El phishing utiliza ingeniería social: una técnica en la que los atacantes cibernéticos tratan de engañarte, para que realices alguna acción. ","roles":{"textData":{}}},{"id":"SmartShape_3106","class":"TODO::Senthil","instance":"SmartShape_3106","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_542","class":"TODO::Senthil","instance":"Text_Caption_542","title":"Ataque phishing ","roles":{"textData":{}}},{"id":"Image_2207","class":"TODO::Senthil","instance":"Image_2207","roles":{}},{"id":"SmartShape_3113","class":"TODO::Senthil","instance":"SmartShape_3113","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3114","class":"TODO::Senthil","instance":"SmartShape_3114","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3115","class":"TODO::Senthil","instance":"SmartShape_3115","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3116","class":"TODO::Senthil","instance":"SmartShape_3116","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3117","class":"TODO::Senthil","instance":"SmartShape_3117","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3118","class":"TODO::Senthil","instance":"SmartShape_3118","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Slide46807867","class":"Normal Slide","instance":"Ataque Phishing","thumbnail":"dr/Slide46807867_thnail.jpg","children":["Image_2208","Image_2209","Image_1823","Image_1824","Image_1825","Image_1826","Image_1827","Text_Caption_544","Text_Caption_543","Text_Caption_542","Image_2207"],"roles":{"slide":{"durationInFrames":831},"navigation":{"navid":"Slide46807867"}}},{"id":"Image_2210","class":"TODO::Senthil","instance":"Image_2210","roles":{}},{"id":"SmartShape_3120","class":"TODO::Senthil","instance":"SmartShape_3120","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_389","class":"TODO::Senthil","instance":"Text_Caption_389","title":"Los criminales cibernéticos crean es- tos mensajes de correo electrónico a modo de parecer convincentes, enviándolos, literal- mente a millones de personas alrededor de todo el mundo. ","roles":{"textData":{}}},{"id":"SmartShape_3121","class":"TODO::Senthil","instance":"SmartShape_3121","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_390","class":"TODO::Senthil","instance":"Text_Caption_390","title":"Los delincuentes no tienen un objetivo específico en mente, ni saben exactamente quién caerá víctima de su engaño. Solamente saben que entre más correos envíen, existe la posibilidad de que más personas pueden ser engañadas. ","roles":{"textData":{}}},{"id":"SmartShape_3122","class":"TODO::Senthil","instance":"SmartShape_3122","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_391","class":"TODO::Senthil","instance":"Text_Caption_391","title":"A menudo estos ataques comienzan con un criminal cibernético que envía un correo electrónico pretendiendo ser alguien o algo que conoces o en lo que confías, como un amigo, tu banco o tu tienda en línea favorita. ","roles":{"textData":{}}},{"id":"SmartShape_3123","class":"TODO::Senthil","instance":"SmartShape_3123","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_392","class":"TODO::Senthil","instance":"Text_Caption_392","title":"¿Cómo son estos tipos de mensajes, con fines delictivos?Te motivan a realizar alguna acción, como hacer clic en un enlace, abrir un archivo adjunto o responder a un mensaje. ","roles":{"textData":{}}},{"id":"SmartShape_2580","class":"TODO::Senthil","instance":"SmartShape_2580","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_1834","class":"TODO::Senthil","instance":"Image_1834","roles":{}},{"id":"Image_1835","class":"TODO::Senthil","instance":"Image_1835","roles":{}},{"id":"Image_1836","class":"TODO::Senthil","instance":"Image_1836","roles":{}},{"id":"Image_1837","class":"TODO::Senthil","instance":"Image_1837","roles":{}},{"id":"Image_1838","class":"TODO::Senthil","instance":"Image_1838","roles":{}},{"id":"SmartShape_3119","class":"TODO::Senthil","instance":"SmartShape_3119","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_545","class":"TODO::Senthil","instance":"Text_Caption_545","title":"Ataque phishing ","roles":{"textData":{}}},{"id":"Slide46810084","class":"Normal Slide","instance":"Ataque Phishing","thumbnail":"dr/Slide46810084_thnail.jpg","children":["Image_2210","Text_Caption_389","Text_Caption_390","Text_Caption_391","Text_Caption_392","Image_1834","Image_1835","Image_1836","Image_1837","Image_1838","Text_Caption_545"],"roles":{"slide":{"durationInFrames":1413},"navigation":{"navid":"Slide46810084"}}},{"id":"Image_2211","class":"TODO::Senthil","instance":"Image_2211","roles":{}},{"id":"SmartShape_2581","class":"TODO::Senthil","instance":"SmartShape_2581","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_2582","class":"TODO::Senthil","instance":"SmartShape_2582","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_548","class":"TODO::Senthil","instance":"Text_Caption_548","title":"Los ataques phishing funcionan de 4 formas: ","roles":{"textData":{}}},{"id":"SmartShape_2584","class":"TODO::Senthil","instance":"SmartShape_2584","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_2585","class":"TODO::Senthil","instance":"SmartShape_2585","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_394","class":"TODO::Senthil","instance":"Text_Caption_394","title":"Una vez más, el objetivo del atacante es que tu hagas clic en un enlace. Sin embargo, en lugar de recolectar tu información, su objetivo es infectar tu computadora. Si haces clic en el enlace, te redirige a un sitio web que de forma silenciosa lanza un ataque contra tu equipo y, si tiene éxito, infectará el sistema de tu máquina. ","roles":{"textData":{}}},{"id":"Image_1840","class":"TODO::Senthil","instance":"Image_1840","roles":{}},{"id":"Text_Caption_395","class":"TODO::Senthil","instance":"Text_Caption_395","title":"Infección de la computadora con enlaces maliciosos: ","roles":{"textData":{}}},{"id":"Image_1841","class":"TODO::Senthil","instance":"Image_1841","roles":{}},{"id":"Image_1842","class":"TODO::Senthil","instance":"Image_1842","roles":{}},{"id":"Text_Caption_396","class":"TODO::Senthil","instance":"Text_Caption_396","title":"El objetivo del atacante cibernético es engañarte para hacer clic en un enlace que te llevará a una página web, que pide tu nombre de usuario y contraseña o, tal vez, tu número de tarjeta de crédito o tu PIN, para usar el cajero automático. ","roles":{"textData":{}}},{"id":"Text_Caption_397","class":"TODO::Senthil","instance":"Text_Caption_397","title":"Recolección de información ","roles":{"textData":{}}},{"id":"SmartShape_2586","class":"TODO::Senthil","instance":"SmartShape_2586","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_2587","class":"TODO::Senthil","instance":"SmartShape_2587","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_1843","class":"TODO::Senthil","instance":"Image_1843","roles":{}},{"id":"SmartShape_2588","class":"TODO::Senthil","instance":"SmartShape_2588","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3124","class":"TODO::Senthil","instance":"SmartShape_3124","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_546","class":"TODO::Senthil","instance":"Text_Caption_546","title":"Ataque phishing ","roles":{"textData":{}}},{"id":"Slide46811858","class":"Normal Slide","instance":"Ataque phishing (2.da parte)","thumbnail":"dr/Slide46811858_thnail.jpg","children":["Image_2211","Text_Caption_548","Text_Caption_394","Image_1840","Text_Caption_395","Image_1841","Image_1842","Text_Caption_396","Text_Caption_397","Image_1843","Text_Caption_546"],"roles":{"slide":{"durationInFrames":540},"navigation":{"navid":"Slide46811858"}}},{"id":"Image_2212","class":"TODO::Senthil","instance":"Image_2212","roles":{}},{"id":"SmartShape_3128","class":"TODO::Senthil","instance":"SmartShape_3128","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_1854","class":"TODO::Senthil","instance":"Image_1854","roles":{}},{"id":"Image_1852","class":"TODO::Senthil","instance":"Image_1852","roles":{}},{"id":"Image_1853","class":"TODO::Senthil","instance":"Image_1853","roles":{}},{"id":"SmartShape_2591","class":"TODO::Senthil","instance":"SmartShape_2591","title":"Solicitudes de donaciones de caridad ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_2592","class":"TODO::Senthil","instance":"SmartShape_2592","title":"Dignatario que necesita transferir millones de dólares a tu país y está dispuesto a pagarte ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_2593","class":"TODO::Senthil","instance":"SmartShape_2593","title":"Noticias como que has ganado la lotería ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_1845","class":"TODO::Senthil","instance":"Image_1845","roles":{}},{"id":"Image_1857","class":"TODO::Senthil","instance":"Image_1857","roles":{}},{"id":"Image_1846","class":"TODO::Senthil","instance":"Image_1846","roles":{}},{"id":"Line_75","class":"TODO::Senthil","instance":"Line_75","roles":{}},{"id":"Line_76","class":"TODO::Senthil","instance":"Line_76","roles":{}},{"id":"Line_77","class":"TODO::Senthil","instance":"Line_77","roles":{}},{"id":"SmartShape_2972","class":"TODO::Senthil","instance":"SmartShape_2972","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_2971","class":"TODO::Senthil","instance":"SmartShape_2971","title":"En estos correos electronicos phishing que contienen archivos adjuntos maliciosos, tales como archivos PDF o documentos de Microsoft Office infectados , si los abres atacarán tu computadora; si tienen éxito le darán al ataque control total sobre tu equipo. Son intentos realizados por delincuentes para estafarte efectos clásicos incluyen: ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3126","class":"TODO::Senthil","instance":"SmartShape_3126","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_549","class":"TODO::Senthil","instance":"Text_Caption_549","title":"También se producen debido a la infección de la computadora con archivos adjuntos maliciosos y mediante estafas, en formatos de noticias. Tipo de las que ganaste la lotería. ","roles":{"textData":{}}},{"id":"Text_Caption_550","class":"TODO::Senthil","instance":"Text_Caption_550","title":"Se trata de estafas de criminales que estan detrás de tu dinero ","roles":{"textData":{}}},{"id":"SmartShape_3125","class":"TODO::Senthil","instance":"SmartShape_3125","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_547","class":"TODO::Senthil","instance":"Text_Caption_547","title":"Ataque phishing ","roles":{"textData":{}}},{"id":"Slide46813831","class":"Normal Slide","instance":"Ataque phishing (3ra parte)","thumbnail":"dr/Slide46813831_thnail.jpg","children":["Image_2212","Image_1854","Image_1852","Image_1853","Image_1845","Image_1857","Image_1846","Text_Caption_549","Text_Caption_550","Text_Caption_547"],"roles":{"slide":{"durationInFrames":936},"navigation":{"navid":"Slide46813831"}}},{"id":"Image_2213","class":"TODO::Senthil","instance":"Image_2213","roles":{}},{"id":"Image_1416","class":"TODO::Senthil","instance":"Image_1416","roles":{}},{"id":"Image_1856","class":"TODO::Senthil","instance":"Image_1856","roles":{}},{"id":"Image_1855","class":"TODO::Senthil","instance":"Image_1855","roles":{}},{"id":"SmartShape_3131","class":"TODO::Senthil","instance":"SmartShape_3131","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3130","class":"TODO::Senthil","instance":"SmartShape_3130","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_552","class":"TODO::Senthil","instance":"Text_Caption_552","title":"Tipos de protección ","roles":{"textData":{}}},{"id":"Text_Caption_553","class":"TODO::Senthil","instance":"Text_Caption_553","title":"En la mayoría de los casos, abrir un correo electrónico es seguro y para que la mayor parte de los ataques funcionen, tienes que hacer algo después de leer el correo (por ejemplo, abrir el archivo adjunto, dar clic en un enlace o responder la solicitud de información). ","roles":{"textData":{}}},{"id":"Slide33487864","class":"Normal Slide","instance":"Tipos de protección","thumbnail":"dr/Slide33487864_thnail.jpg","children":["Image_2213","Image_1416","Image_1856","Image_1855","Text_Caption_552","Text_Caption_553"],"roles":{"slide":{"durationInFrames":567},"navigation":{"navid":"Slide33487864"}}},{"id":"Image_1861","class":"TODO::Senthil","instance":"Image_1861","roles":{}},{"id":"Image_1860","class":"TODO::Senthil","instance":"Image_1860","roles":{}},{"id":"Image_1859","class":"TODO::Senthil","instance":"Image_1859","roles":{}},{"id":"Image_1858","class":"TODO::Senthil","instance":"Image_1858","roles":{}},{"id":"SmartShape_2612","class":"TODO::Senthil","instance":"SmartShape_2612","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_556","class":"TODO::Senthil","instance":"Text_Caption_556","title":"Aqui te presentamos algunos tips, para reconocer un ataque por correo electrónico ","roles":{"textData":{}}},{"id":"SmartShape_2608","class":"TODO::Senthil","instance":"SmartShape_2608","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_2607","class":"TODO::Senthil","instance":"SmartShape_2607","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_1855","class":"TODO::Senthil","instance":"SmartShape_1855","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_1833","class":"TODO::Senthil","instance":"SmartShape_1833","title":"Sospecha de correos electronicos dirigidos a “Estimado Cliente” o algún otro saludo genérico. Si efectivamente se trata de tu banco, seguramente conoce tu nombre. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_1832","class":"TODO::Senthil","instance":"SmartShape_1832","title":"Sospecha de cualquier correo que requiera una “acción inmediata” o que genere un sentido de urgencia. Esta es una técnica común, usada por los criminales para apresurar a la gente a cometer un error. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_1837","class":"TODO::Senthil","instance":"SmartShape_1837","title":"Sospecha de los documentos adjuntos y abre solo aquellos que estés esperando. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_2609","class":"TODO::Senthil","instance":"SmartShape_2609","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_1836","class":"TODO::Senthil","instance":"SmartShape_1836","title":"Sospecha de errores gramaticales o de ortografía, la mayoria de los negocios corrigen sus mensajes cuidadosamente antes de enviarlos. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_2611","class":"TODO::Senthil","instance":"SmartShape_2611","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3133","class":"TODO::Senthil","instance":"SmartShape_3133","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_555","class":"TODO::Senthil","instance":"Text_Caption_555","title":"Tipos de protección ","roles":{"textData":{}}},{"id":"Slide33487282","class":"Normal Slide","instance":"Tipos de protección","thumbnail":"dr/Slide33487282_thnail.jpg","children":["Image_1861","Image_1860","Image_1859","Image_1858","Text_Caption_556","Text_Caption_555"],"roles":{"slide":{"durationInFrames":1110},"navigation":{"navid":"Slide33487282"}}},{"id":"Image_2222","class":"TODO::Senthil","instance":"Image_2222","roles":{}},{"id":"Image_2221","class":"TODO::Senthil","instance":"Image_2221","roles":{}},{"id":"Image_2223","class":"TODO::Senthil","instance":"Image_2223","roles":{}},{"id":"Image_2224","class":"TODO::Senthil","instance":"Image_2224","roles":{}},{"id":"Image_2225","class":"TODO::Senthil","instance":"Image_2225","roles":{}},{"id":"Image_2226","class":"TODO::Senthil","instance":"Image_2226","roles":{}},{"id":"Image_2227","class":"TODO::Senthil","instance":"Image_2227","roles":{}},{"id":"Image_2228","class":"TODO::Senthil","instance":"Image_2228","roles":{}},{"id":"Image_2229","class":"TODO::Senthil","instance":"Image_2229","roles":{}},{"id":"Text_Caption_564","class":"TODO::Senthil","instance":"Text_Caption_564","title":"Recomendaciones ","roles":{"textData":{}}},{"id":"Image_1867","class":"TODO::Senthil","instance":"Image_1867","roles":{}},{"id":"Image_1866","class":"TODO::Senthil","instance":"Image_1866","roles":{}},{"id":"Image_1865","class":"TODO::Senthil","instance":"Image_1865","roles":{}},{"id":"Image_1864","class":"TODO::Senthil","instance":"Image_1864","roles":{}},{"id":"Image_1863","class":"TODO::Senthil","instance":"Image_1863","roles":{}},{"id":"SmartShape_3136","class":"TODO::Senthil","instance":"SmartShape_3136","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_559","class":"TODO::Senthil","instance":"Text_Caption_559","title":"Medidas de protección ","roles":{"textData":{}}},{"id":"Image_2236","class":"TODO::Senthil","instance":"Image_2236","roles":{}},{"id":"SmartShape_3137","class":"TODO::Senthil","instance":"SmartShape_3137","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2234","class":"TODO::Senthil","instance":"Image_2234","roles":{}},{"id":"Text_Caption_560","class":"TODO::Senthil","instance":"Text_Caption_560","title":"No des clics en los enlaces. Sitúa el ratón sobre el enlace: esto te mostrará el verdadero destino al que irías si realmente hicieras clic en él. ","roles":{"textData":{}}},{"id":"Text_Caption_565","class":"TODO::Senthil","instance":"Text_Caption_565","title":"1 ","roles":{"textData":{}}},{"id":"Image_2237","class":"TODO::Senthil","instance":"Image_2237","roles":{}},{"id":"Text_Caption_561","class":"TODO::Senthil","instance":"Text_Caption_561","title":"Si la dirección destino del enlace es diferente a la que se muestra en el correo, puede ser un claro indicador de fraude. ","roles":{"textData":{}}},{"id":"SmartShape_3138","class":"TODO::Senthil","instance":"SmartShape_3138","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2238","class":"TODO::Senthil","instance":"Image_2238","roles":{}},{"id":"Text_Caption_566","class":"TODO::Senthil","instance":"Text_Caption_566","title":"2 ","roles":{"textData":{}}},{"id":"Image_2239","class":"TODO::Senthil","instance":"Image_2239","roles":{}},{"id":"Text_Caption_562","class":"TODO::Senthil","instance":"Text_Caption_562","title":"El hecho de recibir un correo electrónico de un amigo no quiere decir que realmente fue él quien lo envió. La computadora de tu amigo podría estar infectada... ","roles":{"textData":{}}},{"id":"SmartShape_3139","class":"TODO::Senthil","instance":"SmartShape_3139","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2241","class":"TODO::Senthil","instance":"Image_2241","roles":{}},{"id":"Text_Caption_567","class":"TODO::Senthil","instance":"Text_Caption_567","title":"3 ","roles":{"textData":{}}},{"id":"Image_2240","class":"TODO::Senthil","instance":"Image_2240","roles":{}},{"id":"Text_Caption_563","class":"TODO::Senthil","instance":"Text_Caption_563","title":"...o su cuenta de correo electrónico probablemen- te comprometida y el malware está enviando ese correo a todos los contactos de tu amigo. ","roles":{"textData":{}}},{"id":"SmartShape_3140","class":"TODO::Senthil","instance":"SmartShape_3140","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2242","class":"TODO::Senthil","instance":"Image_2242","roles":{}},{"id":"Text_Caption_568","class":"TODO::Senthil","instance":"Text_Caption_568","title":"4 ","roles":{"textData":{}}},{"id":"Slide33489415","class":"Normal Slide","instance":"Más medidas de protección","thumbnail":"dr/Slide33489415_thnail.jpg","children":["Image_2222","Image_2221","Image_2223","Image_2224","Image_2225","Image_2226","Image_2227","Image_2228","Image_2229","Text_Caption_564","Image_1867","Image_1866","Image_1865","Image_1864","Image_1863","Text_Caption_559","Image_2236","Image_2234","Text_Caption_560","Text_Caption_565","Image_2237","Text_Caption_561","Image_2238","Text_Caption_566","Image_2239","Text_Caption_562","Image_2241","Text_Caption_567","Image_2240","Text_Caption_563","Image_2242","Text_Caption_568"],"roles":{"slide":{"durationInFrames":795},"navigation":{"navid":"Slide33489415"}}},{"id":"Image_2296","class":"TODO::Senthil","instance":"Image_2296","roles":{}},{"id":"Image_2295","class":"TODO::Senthil","instance":"Image_2295","roles":{}},{"id":"SmartShape_3166","class":"TODO::Senthil","instance":"SmartShape_3166","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3164","class":"TODO::Senthil","instance":"SmartShape_3164","title":"Si recibes un correo sospechoso de una fuente confiable o un amigo, háblales para confirmar que efectivamente ellos lo enviaron. Siempre usa un número telefónico que conozcas o puedas verificar de forma independiente, no uno incluido en el cuerpo del correo. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2297","class":"TODO::Senthil","instance":"Image_2297","roles":{}},{"id":"Image_2298","class":"TODO::Senthil","instance":"Image_2298","roles":{}},{"id":"SmartShape_3167","class":"TODO::Senthil","instance":"SmartShape_3167","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_585","class":"TODO::Senthil","instance":"Text_Caption_585","title":"Usa el sentido común: si un correo electrónico te parece extraño o demasiado bueno para ser verdad, muy probablemente se trate de un ataque. ","roles":{"textData":{}}},{"id":"SmartShape_3165","class":"TODO::Senthil","instance":"SmartShape_3165","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_584","class":"TODO::Senthil","instance":"Text_Caption_584","title":"Medidas de protección ","roles":{"textData":{}}},{"id":"Slide81984022","class":"Normal Slide","instance":"En resumen...","thumbnail":"dr/Slide81984022_thnail.jpg","children":["Image_2296","Image_2295","Image_2297","Image_2298","Text_Caption_585","Text_Caption_584"],"roles":{"slide":{"durationInFrames":600},"navigation":{"navid":"Slide81984022"}}},{"id":"Image_2309","class":"TODO::Senthil","instance":"Image_2309","roles":{}},{"id":"Image_2310","class":"TODO::Senthil","instance":"Image_2310","roles":{}},{"id":"Image_2311","class":"TODO::Senthil","instance":"Image_2311","roles":{}},{"id":"Image_2312","class":"TODO::Senthil","instance":"Image_2312","roles":{}},{"id":"Image_2313","class":"TODO::Senthil","instance":"Image_2313","roles":{}},{"id":"Image_2314","class":"TODO::Senthil","instance":"Image_2314","roles":{}},{"id":"Image_2315","class":"TODO::Senthil","instance":"Image_2315","roles":{}},{"id":"Image_2316","class":"TODO::Senthil","instance":"Image_2316","roles":{}},{"id":"SmartShape_3174","class":"TODO::Senthil","instance":"SmartShape_3174","title":"Aunque el phishing sigue siendo efectivo, se ha desarrollado un tipo de ataque relativamente nuevo llamado spear phishing. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3175","class":"TODO::Senthil","instance":"SmartShape_3175","title":"El concepto es el mismo: los ciberatacantes envian correos electrónicos a sus posibles víctimas, haciéndose pasar por una organización o una persona de confianza; sin embargo, a diferencia de los correos electrónicos phishing tradicionales, los mensajes de spear phishing son muy específicos. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3176","class":"TODO::Senthil","instance":"SmartShape_3176","title":"En lugar de que se envíe su correo electrónico a millones de victimas potenciales, los ciberatacantes envían un correo electrónico a unos cuantos individuos previamente seleccionados, tal vez cinco o diez personas específicas. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3177","class":"TODO::Senthil","instance":"SmartShape_3177","title":"A diferencia del phishing tradicional -con el spear phishing- los ciberatacantes se ven obligados a investigar a sus objetivos, revisando sus cuentas de Facebook, Linkedln o leyendo mensajes que publican en foros o blogs públicos. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3178","class":"TODO::Senthil","instance":"SmartShape_3178","title":"Con base a este rastreo de datos, los atacantes crean un correo electrónico altamente personalizado, el cual pretende causar un impacto real a los posibles bancos. Así las personas son mucho más propensas a caer víctima de los ataques. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3179","class":"TODO::Senthil","instance":"SmartShape_3179","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_589","class":"TODO::Senthil","instance":"Text_Caption_589","title":"Spear phishing ","roles":{"textData":{}}},{"id":"Slide84444844","class":"Normal Slide","instance":"Spear Phishing","thumbnail":"dr/Slide84444844_thnail.jpg","children":["Image_2309","Image_2310","Image_2311","Image_2312","Image_2313","Image_2314","Image_2315","Image_2316","Text_Caption_589"],"roles":{"slide":{"durationInFrames":1614},"navigation":{"navid":"Slide84444844"}}},{"id":"Image_2317","class":"TODO::Senthil","instance":"Image_2317","roles":{}},{"id":"Image_2318","class":"TODO::Senthil","instance":"Image_2318","roles":{}},{"id":"Image_2319","class":"TODO::Senthil","instance":"Image_2319","roles":{}},{"id":"Image_2320","class":"TODO::Senthil","instance":"Image_2320","roles":{}},{"id":"Image_2321","class":"TODO::Senthil","instance":"Image_2321","roles":{}},{"id":"Image_2322","class":"TODO::Senthil","instance":"Image_2322","roles":{}},{"id":"SmartShape_3180","class":"TODO::Senthil","instance":"SmartShape_3180","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3181","class":"TODO::Senthil","instance":"SmartShape_3181","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3182","class":"TODO::Senthil","instance":"SmartShape_3182","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3183","class":"TODO::Senthil","instance":"SmartShape_3183","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3184","class":"TODO::Senthil","instance":"SmartShape_3184","title":"El spear phishing se utiliza cuando el ciberdelincuente quiere atacar a una persona o a una organización en particular. En lugar de simplemente robar dinero, los atacantes que utilizan spear phishing... ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3185","class":"TODO::Senthil","instance":"SmartShape_3185","title":"El spear phishing se utiliza cuando el ciberdelincuente quiere atacar a una persona o a una organización en particular. En lugar de simplemente robar dinero, los atacantes que utilizan spear phishing... ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3186","class":"TODO::Senthil","instance":"SmartShape_3186","title":"...tienen objetivos particulares: obtener acceso a información altamente confidencial, como secretos comerciales corporativos, planes de tecnologia o comunicaciones confidenciales del gobierno. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3187","class":"TODO::Senthil","instance":"SmartShape_3187","title":"Tal vez tu organización es un simple trampolín para obtener acceso a otra organización. Por lo mucho que ambicionan ganar, estos atacantes están dispuestos a invertir el tiempo y el esfuerzo necesario. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3188","class":"TODO::Senthil","instance":"SmartShape_3188","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_590","class":"TODO::Senthil","instance":"Text_Caption_590","title":"Efectividad del spear phishing ","roles":{"textData":{}}},{"id":"Slide84447895","class":"Normal Slide","instance":"Efectividad del Spear Phishing","thumbnail":"dr/Slide84447895_thnail.jpg","children":["Image_2317","Image_2318","Image_2319","Image_2320","Image_2321","Image_2322","Text_Caption_590"],"roles":{"slide":{"durationInFrames":1281},"navigation":{"navid":"Slide84447895"}}},{"id":"Image_2323","class":"TODO::Senthil","instance":"Image_2323","roles":{}},{"id":"SmartShape_3189","class":"TODO::Senthil","instance":"SmartShape_3189","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3190","class":"TODO::Senthil","instance":"SmartShape_3190","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3191","class":"TODO::Senthil","instance":"SmartShape_3191","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3192","class":"TODO::Senthil","instance":"SmartShape_3192","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3193","class":"TODO::Senthil","instance":"SmartShape_3193","title":"El correo electrónico tiene una archivo adjunto que pretende ser -por ejemplo- una factura, cuando en realidad es un documento infectado. Dos de las 3 personas seleccionadas son engañadaspor el correo electronico spear phishing y abren el archivo adjunto infectado... ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3194","class":"TODO::Senthil","instance":"SmartShape_3194","title":"...dando acceso total a sus equipos y a todos los secretos de la producción de su empresa, que ahora van a producir ellos mismos. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3195","class":"TODO::Senthil","instance":"SmartShape_3195","title":"Supongamos que una organización criminal decide realizar una estafa en el mercado local, en ese momento te conviertes en el blanco. Los atacantes investigan el sitio web de tu organización e identifican 3 individuos claves. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3196","class":"TODO::Senthil","instance":"SmartShape_3196","title":"Después investigan las páginas de Facebook, Twitter y Linkedln de estos 3 individuos, para crear un expediente completo de ellos. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3197","class":"TODO::Senthil","instance":"SmartShape_3197","title":"Despúes de analizar a estos individuos los atacantes crean un correo electrónico spear phishing pretendiendo ser un proveedor de tu organización ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3198","class":"TODO::Senthil","instance":"SmartShape_3198","title":"El spear phishing es una amenaza mucho más peligrosa que los simples ataques de phishing, ya que los ciberdelicuentes elaboran un ataque muy específico para una persona u organización . Esto no solo aumenta las posibilidades del éxito de los atacantes sino que son más difíciles de detectar. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2324","class":"TODO::Senthil","instance":"Image_2324","roles":{}},{"id":"Image_2325","class":"TODO::Senthil","instance":"Image_2325","roles":{}},{"id":"Image_2326","class":"TODO::Senthil","instance":"Image_2326","roles":{}},{"id":"Image_2327","class":"TODO::Senthil","instance":"Image_2327","roles":{}},{"id":"SmartShape_3199","class":"TODO::Senthil","instance":"SmartShape_3199","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3200","class":"TODO::Senthil","instance":"SmartShape_3200","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3201","class":"TODO::Senthil","instance":"SmartShape_3201","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3202","class":"TODO::Senthil","instance":"SmartShape_3202","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2328","class":"TODO::Senthil","instance":"Image_2328","roles":{}},{"id":"Image_2329","class":"TODO::Senthil","instance":"Image_2329","roles":{}},{"id":"Image_2330","class":"TODO::Senthil","instance":"Image_2330","roles":{}},{"id":"Image_2331","class":"TODO::Senthil","instance":"Image_2331","roles":{}},{"id":"SmartShape_3203","class":"TODO::Senthil","instance":"SmartShape_3203","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_591","class":"TODO::Senthil","instance":"Text_Caption_591","title":"Efectividad del spear phishing ","roles":{"textData":{}}},{"id":"Slide84451228","class":"Normal Slide","instance":"Efectividad del Spear Phishing","thumbnail":"dr/Slide84451228_thnail.jpg","children":["Image_2323","Image_2324","Image_2325","Image_2326","Image_2327","Image_2328","Image_2329","Image_2330","Image_2331","Text_Caption_591"],"roles":{"slide":{"durationInFrames":1689},"navigation":{"navid":"Slide84451228"}}},{"id":"Image_2332","class":"TODO::Senthil","instance":"Image_2332","roles":{}},{"id":"Image_2333","class":"TODO::Senthil","instance":"Image_2333","roles":{}},{"id":"Image_2334","class":"TODO::Senthil","instance":"Image_2334","roles":{}},{"id":"Image_2335","class":"TODO::Senthil","instance":"Image_2335","roles":{}},{"id":"Image_2336","class":"TODO::Senthil","instance":"Image_2336","roles":{}},{"id":"Image_2337","class":"TODO::Senthil","instance":"Image_2337","roles":{}},{"id":"Image_2338","class":"TODO::Senthil","instance":"Image_2338","roles":{}},{"id":"Image_2339","class":"TODO::Senthil","instance":"Image_2339","roles":{}},{"id":"Image_2340","class":"TODO::Senthil","instance":"Image_2340","roles":{}},{"id":"Image_2341","class":"TODO::Senthil","instance":"Image_2341","roles":{}},{"id":"SmartShape_3204","class":"TODO::Senthil","instance":"SmartShape_3204","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_592","class":"TODO::Senthil","instance":"Text_Caption_592","title":"El primer paso para protegerse contra estos ataques dirigidos es comprender que tú puedes ser un objetivo. ","roles":{"textData":{}}},{"id":"Text_Caption_593","class":"TODO::Senthil","instance":"Text_Caption_593","title":"Después de todo, tu probablemente poseas información sensible que otra persona pudiera desear o que pudiera ser usada para acceder a otra organización. ","roles":{"textData":{}}},{"id":"Text_Caption_594","class":"TODO::Senthil","instance":"Text_Caption_594","title":"Una vez que comprendas que puedes ser el blanco, toma las siguientes precauciones para protegerte a ti mismo y a la compañía. ","roles":{"textData":{}}},{"id":"SmartShape_3205","class":"TODO::Senthil","instance":"SmartShape_3205","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_595","class":"TODO::Senthil","instance":"Text_Caption_595","title":"Medidas de protección de spear phishing ","roles":{"textData":{}}},{"id":"Slide84452382","class":"Normal Slide","instance":"Medidas de protección de spear phishing","thumbnail":"dr/Slide84452382_thnail.jpg","children":["Image_2332","Image_2333","Image_2334","Image_2335","Image_2336","Image_2337","Image_2338","Image_2339","Image_2340","Image_2341","Text_Caption_592","Text_Caption_593","Text_Caption_594","Text_Caption_595"],"roles":{"slide":{"durationInFrames":828},"navigation":{"navid":"Slide84452382"}}},{"id":"Image_2342","class":"TODO::Senthil","instance":"Image_2342","roles":{}},{"id":"Image_2343","class":"TODO::Senthil","instance":"Image_2343","roles":{}},{"id":"Image_2344","class":"TODO::Senthil","instance":"Image_2344","roles":{}},{"id":"Image_2345","class":"TODO::Senthil","instance":"Image_2345","roles":{}},{"id":"Image_2346","class":"TODO::Senthil","instance":"Image_2346","roles":{}},{"id":"Image_2347","class":"TODO::Senthil","instance":"Image_2347","roles":{}},{"id":"Image_2348","class":"TODO::Senthil","instance":"Image_2348","roles":{}},{"id":"Image_2349","class":"TODO::Senthil","instance":"Image_2349","roles":{}},{"id":"Image_2350","class":"TODO::Senthil","instance":"Image_2350","roles":{}},{"id":"Image_2351","class":"TODO::Senthil","instance":"Image_2351","roles":{}},{"id":"Image_2352","class":"TODO::Senthil","instance":"Image_2352","roles":{}},{"id":"Image_2353","class":"TODO::Senthil","instance":"Image_2353","roles":{}},{"id":"Image_2354","class":"TODO::Senthil","instance":"Image_2354","roles":{}},{"id":"Image_2355","class":"TODO::Senthil","instance":"Image_2355","roles":{}},{"id":"Image_2356","class":"TODO::Senthil","instance":"Image_2356","roles":{}},{"id":"Image_2357","class":"TODO::Senthil","instance":"Image_2357","roles":{}},{"id":"Image_2358","class":"TODO::Senthil","instance":"Image_2358","roles":{}},{"id":"Image_2359","class":"TODO::Senthil","instance":"Image_2359","roles":{}},{"id":"Image_2360","class":"TODO::Senthil","instance":"Image_2360","roles":{}},{"id":"Image_2361","class":"TODO::Senthil","instance":"Image_2361","roles":{}},{"id":"SmartShape_3206","class":"TODO::Senthil","instance":"SmartShape_3206","title":" Entre más detalles personales compartas, más fácil es para los ciber atacantes elaborar un correo electrónico de spear phishing , que parezca un correo relevante y genuino. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3207","class":"TODO::Senthil","instance":"SmartShape_3207","title":" Limita la información que publicas sobre tí en foros públicos en Facebook , Linkedln o en sitios similares. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3208","class":"TODO::Senthil","instance":"SmartShape_3208","title":" Si un correo electrónico te pide que abras un archivo adjunto , que hagas clic en un vínculo que parezca sospechoso o te solicita información sensible: ¡verifica el mensaje! ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3209","class":"TODO::Senthil","instance":"SmartShape_3209","title":" Si el correo electrónico parece venir de una empresa o de una persona que conozcas,usa los datos del contacto que poseias previamente para comunicarte con el remitente y comprobar que el te envio el mensaje ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3210","class":"TODO::Senthil","instance":"SmartShape_3210","title":"Mantén los esfuerzos de seguridad de tu empresa, siguiendo las políticas de seguridad apropiadas y haciendo uso de las herramientas de seguridad como antivirus, cifrado o actualizaciones que estén disponibles . ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3211","class":"TODO::Senthil","instance":"SmartShape_3211","title":"Recuerda que la tecnologia no puede filtrar ni detener todos los ataques de correo electrónico especialmente los correos electrónicos de spear phishing. Si un correo electrónico parece un poco extraño al prinicipio léelo con cuidado. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3212","class":"TODO::Senthil","instance":"SmartShape_3212","title":"Si te preocupa que hubieras recibido un correo electrónico de spear phishing o incluso si has sido víctima de un ataque que podria ser de spear phishing contacta de inmediato al departamento de seguridad informática de tu empresa. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3213","class":"TODO::Senthil","instance":"SmartShape_3213","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_596","class":"TODO::Senthil","instance":"Text_Caption_596","title":"Medidas de protección de spear phishing ","roles":{"textData":{}}},{"id":"Slide84454342","class":"Normal Slide","instance":"Medidas de protección de spear phishing","thumbnail":"dr/Slide84454342_thnail.jpg","children":["Image_2342","Image_2343","Image_2344","Image_2345","Image_2346","Image_2347","Image_2348","Image_2349","Image_2350","Image_2351","Image_2352","Image_2353","Image_2354","Image_2355","Image_2356","Image_2357","Image_2358","Image_2359","Image_2360","Image_2361","Text_Caption_596"],"roles":{"slide":{"durationInFrames":1380},"navigation":{"navid":"Slide84454342"}}},{"id":"Image_2362","class":"TODO::Senthil","instance":"Image_2362","roles":{}},{"id":"Image_2363","class":"TODO::Senthil","instance":"Image_2363","roles":{}},{"id":"Image_2364","class":"TODO::Senthil","instance":"Image_2364","roles":{}},{"id":"Image_2365","class":"TODO::Senthil","instance":"Image_2365","roles":{}},{"id":"Image_2366","class":"TODO::Senthil","instance":"Image_2366","roles":{}},{"id":"Image_2367","class":"TODO::Senthil","instance":"Image_2367","roles":{}},{"id":"Image_2368","class":"TODO::Senthil","instance":"Image_2368","roles":{}},{"id":"SmartShape_3214","class":"TODO::Senthil","instance":"SmartShape_3214","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_597","class":"TODO::Senthil","instance":"Text_Caption_597","title":"Redes sociales ","roles":{"textData":{}}},{"id":"SmartShape_3215","class":"TODO::Senthil","instance":"SmartShape_3215","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_598","class":"TODO::Senthil","instance":"Text_Caption_598","title":"Son poderosas y te permiten conocer, interactuar y compartir cosas con personas alrededor del mundo. ","roles":{"textData":{}}},{"id":"Text_Caption_599","class":"TODO::Senthil","instance":"Text_Caption_599","title":"Sin embargo, todas estas características implican riesgos: no sólo para tí, tambien para tu familia, amigos y empleados. ","roles":{"textData":{}}},{"id":"Slide84455557","class":"Normal Slide","instance":"Las redes sociales","thumbnail":"dr/Slide84455557_thnail.jpg","children":["Image_2362","Image_2363","Image_2364","Image_2365","Image_2366","Image_2367","Image_2368","Text_Caption_597","Text_Caption_598","Text_Caption_599"],"roles":{"slide":{"durationInFrames":543},"navigation":{"navid":"Slide84455557"}}},{"id":"Image_2369","class":"TODO::Senthil","instance":"Image_2369","roles":{}},{"id":"Image_2370","class":"TODO::Senthil","instance":"Image_2370","roles":{}},{"id":"Image_2371","class":"TODO::Senthil","instance":"Image_2371","roles":{}},{"id":"SmartShape_3216","class":"TODO::Senthil","instance":"SmartShape_3216","title":"Una inquietud común en las redes sociales es la protección de la privacidad de información personal y la información sensible de otros. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2372","class":"TODO::Senthil","instance":"Image_2372","roles":{}},{"id":"Text_Caption_600","class":"TODO::Senthil","instance":"Text_Caption_600","title":"Impacto en el futuro ","roles":{"textData":{}}},{"id":"Image_2373","class":"TODO::Senthil","instance":"Image_2373","roles":{}},{"id":"Text_Caption_601","class":"TODO::Senthil","instance":"Text_Caption_601","title":"Ataques en tu contra ","roles":{"textData":{}}},{"id":"Image_2374","class":"TODO::Senthil","instance":"Image_2374","roles":{}},{"id":"Text_Caption_602","class":"TODO::Senthil","instance":"Text_Caption_602","title":"Daños a tu empresa ","roles":{"textData":{}}},{"id":"Image_2375","class":"TODO::Senthil","instance":"Image_2375","roles":{}},{"id":"SmartShape_3217","class":"TODO::Senthil","instance":"SmartShape_3217","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3218","class":"TODO::Senthil","instance":"SmartShape_3218","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3219","class":"TODO::Senthil","instance":"SmartShape_3219","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3220","class":"TODO::Senthil","instance":"SmartShape_3220","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2376","class":"TODO::Senthil","instance":"Image_2376","roles":{}},{"id":"Text_Caption_603","class":"TODO::Senthil","instance":"Text_Caption_603","title":"Muchas universidades realizan investigaciones similares en la solicitud de nuevos estudiates. Las opciones de privacidad podrían no protegerte ya que una organizacion puede pedirte dar me gusta o unirte a sus sitios antes de contian con el proceso de aplicación. ","roles":{"textData":{}}},{"id":"Image_2377","class":"TODO::Senthil","instance":"Image_2377","roles":{}},{"id":"Text_Caption_604","class":"TODO::Senthil","instance":"Text_Caption_604","title":"Por ejemplo pueden usar tu información para adivinar las respuestas de tu preguntas secretas y cambiar tus contraseñas, crear ataques spear phishing o solicitar tarjetas de crédito usando tu nombre. ","roles":{"textData":{}}},{"id":"Image_2378","class":"TODO::Senthil","instance":"Image_2378","roles":{}},{"id":"Text_Caption_605","class":"TODO::Senthil","instance":"Text_Caption_605","title":"Además estos ataques pueden reflejarse en el mundo físico ya que pueden identificar en donde trabajas o vives. Cibercriminales pueden obtener tu información personal y utilizarla para realizar ataques en tu contra ","roles":{"textData":{}}},{"id":"Image_2379","class":"TODO::Senthil","instance":"Image_2379","roles":{}},{"id":"Text_Caption_606","class":"TODO::Senthil","instance":"Text_Caption_606","title":"Los criminales o competidores pueden usar cualquier información sensible publicada por ti acerca de tu organización en contra de la misma. Tus publicaciones podrían causar un daño potencial a la organización. ","roles":{"textData":{}}},{"id":"Image_2380","class":"TODO::Senthil","instance":"Image_2380","roles":{}},{"id":"SmartShape_3221","class":"TODO::Senthil","instance":"SmartShape_3221","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_607","class":"TODO::Senthil","instance":"Text_Caption_607","title":"Privacidad ","roles":{"textData":{}}},{"id":"Slide84458466","class":"Normal Slide","instance":"Privacidad","thumbnail":"dr/Slide84458466_thnail.jpg","children":["Image_2369","Image_2370","Image_2371","Image_2372","Text_Caption_600","Image_2373","Text_Caption_601","Image_2374","Text_Caption_602","Image_2375","Image_2376","Text_Caption_603","Image_2377","Text_Caption_604","Image_2378","Text_Caption_605","Image_2379","Text_Caption_606","Image_2380","Text_Caption_607"],"roles":{"slide":{"durationInFrames":1473},"navigation":{"navid":"Slide84458466"}}},{"id":"Image_2381","class":"TODO::Senthil","instance":"Image_2381","roles":{}},{"id":"Image_2382","class":"TODO::Senthil","instance":"Image_2382","roles":{}},{"id":"Image_2383","class":"TODO::Senthil","instance":"Image_2383","roles":{}},{"id":"Image_2384","class":"TODO::Senthil","instance":"Image_2384","roles":{}},{"id":"Image_2385","class":"TODO::Senthil","instance":"Image_2385","roles":{}},{"id":"Image_2386","class":"TODO::Senthil","instance":"Image_2386","roles":{}},{"id":"Image_2387","class":"TODO::Senthil","instance":"Image_2387","roles":{}},{"id":"Image_2388","class":"TODO::Senthil","instance":"Image_2388","roles":{}},{"id":"Image_2389","class":"TODO::Senthil","instance":"Image_2389","roles":{}},{"id":"SmartShape_3222","class":"TODO::Senthil","instance":"SmartShape_3222","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_608","class":"TODO::Senthil","instance":"Text_Caption_608","title":"Consejos de seguridad ","roles":{"textData":{}}},{"id":"SmartShape_3223","class":"TODO::Senthil","instance":"SmartShape_3223","title":"Inicia tu sesion ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3224","class":"TODO::Senthil","instance":"SmartShape_3224","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_609","class":"TODO::Senthil","instance":"Text_Caption_609","title":"Protege tus cuentas de redes sociales con contraseñas seguras y no las compartas con nadie, ni la utilices en otros sitios. Algunas redes sociales soportan una autenticación segura, como la verificación en 2 pasos. Activa el método de autenticación segura cuando sea posible. ","roles":{"textData":{}}},{"id":"Text_Caption_610","class":"TODO::Senthil","instance":"Text_Caption_610","title":"Desconfía de correos que pretenden venir de sitios de redes sociales: estos pueden ser facilmente falsificados de cibercriminales. La manera segura de responder a estos mensajes es acceder al sitio web directamente, tal vez desde un marcador y revisar cualquier mensaje o notificación en el sitio web directamente. ","roles":{"textData":{}}},{"id":"SmartShape_3225","class":"TODO::Senthil","instance":"SmartShape_3225","title":"Correo electrónico ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3226","class":"TODO::Senthil","instance":"SmartShape_3226","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_611","class":"TODO::Senthil","instance":"Text_Caption_611","title":"Sé precavido en cuanto a los enlaces maliciosos, sospechosos o estafas potenciales publicadas en sitios de redes sociales .Los atacantes pueden publicar enlaces malisiosos y, si tú accedes a ellos ,serás enviados a sitios web que podrían infectar tu computadora ","roles":{"textData":{}}},{"id":"SmartShape_3227","class":"TODO::Senthil","instance":"SmartShape_3227","title":"Enlases maliciosos/fraude ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3228","class":"TODO::Senthil","instance":"SmartShape_3228","title":"Enlases maliciosos/fraude ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3229","class":"TODO::Senthil","instance":"SmartShape_3229","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_612","class":"TODO::Senthil","instance":"Text_Caption_612","title":"Además no hay que confiar en un mensaje sólo porque es enviado por un amigo, ya que no siempre significa que provenga de él. Su cuenta pudo haber sido comprometida. Si un miembro de la familia publica un mensaje (que no puede ser verificado) como aquellos que indica que fue asaltado y necesita que le envíes dinero, trata de comunicarte con él/ella por otros medios, para confirmar el mensaje. ","roles":{"textData":{}}},{"id":"SmartShape_3230","class":"TODO::Senthil","instance":"SmartShape_3230","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_613","class":"TODO::Senthil","instance":"Text_Caption_613","title":"Algunos sitios de redes sociales te permiten agregar o instalar aplicaciones de terceros por ejemplo juegos.Ten en mente que exite un minimo o nulo control de calidad o revición de estas aplicaciones podrían tener acceso a tu cuenta y a tu información privada .Solo instala aplicaciones que necesites que sean bien conocidas o de sitios confiables y elimínalas cuando ya no las necesites. ","roles":{"textData":{}}},{"id":"SmartShape_3231","class":"TODO::Senthil","instance":"SmartShape_3231","title":"Aplicaciones ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3232","class":"TODO::Senthil","instance":"SmartShape_3232","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3233","class":"TODO::Senthil","instance":"SmartShape_3233","title":"Cifrado ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_614","class":"TODO::Senthil","instance":"Text_Caption_614","title":"Muchos sitios de redes sociales permiten cifrar la comunicación usando el protocolo seguro https, lo que asegura tu conexión al sitio. Algunos sitios como Twitter y Google tienen estas caracteristicas predeterminadas, mientras que otros sitios requieren que se actualicen manualmente, mediante las actualizaciones de la cuenta. Utiliza https siempre que sea posible. ","roles":{"textData":{}}},{"id":"SmartShape_3234","class":"TODO::Senthil","instance":"SmartShape_3234","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_615","class":"TODO::Senthil","instance":"Text_Caption_615","title":"Consejos de seguridad ","roles":{"textData":{}}},{"id":"SmartShape_3235","class":"TODO::Senthil","instance":"SmartShape_3235","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_616","class":"TODO::Senthil","instance":"Text_Caption_616","title":"Además de los problemas de privacidad, las redes sociales pueden ser usadas por los cibercriminales para atacarte a tí o a tus dispositivos. ","roles":{"textData":{}}},{"id":"Slide84460954","class":"Normal Slide","instance":"Consejos de seguridad","thumbnail":"dr/Slide84460954_thnail.jpg","children":["Image_2381","Image_2382","Image_2383","Image_2384","Image_2385","Image_2386","Image_2387","Image_2388","Image_2389","Text_Caption_608","Text_Caption_609","Text_Caption_610","Text_Caption_611","Text_Caption_612","Text_Caption_613","Text_Caption_614","Text_Caption_615","Text_Caption_616"],"roles":{"slide":{"durationInFrames":1659},"navigation":{"navid":"Slide84460954"}}},{"id":"Image_2390","class":"TODO::Senthil","instance":"Image_2390","roles":{}},{"id":"Image_2391","class":"TODO::Senthil","instance":"Image_2391","roles":{}},{"id":"Image_2392","class":"TODO::Senthil","instance":"Image_2392","roles":{}},{"id":"Text_Caption_617","class":"TODO::Senthil","instance":"Text_Caption_617","title":"Las contraseñas son una de las principales maneras para verificar nuestra identidad. Con ellas accedes a tu correo electrónico, banca electrónica, realizas compras en línea e ingresas a dispositivos como tu laptop o teléfono. ","roles":{"textData":{}}},{"id":"Image_2393","class":"TODO::Senthil","instance":"Image_2393","roles":{}},{"id":"Image_2394","class":"TODO::Senthil","instance":"Image_2394","roles":{}},{"id":"Text_Caption_618","class":"TODO::Senthil","instance":"Text_Caption_618","title":"En muchos sentidos, las contraseñas son las llaves de tu reino. Como resultado, si alguien tiene tu contraseña puede robar tu identidad. También puede aprobar operaciones, hacer transferencias de dinero o acceder a tu información personal. ","roles":{"textData":{}}},{"id":"Image_2395","class":"TODO::Senthil","instance":"Image_2395","roles":{}},{"id":"Image_2396","class":"TODO::Senthil","instance":"Image_2396","roles":{}},{"id":"Text_Caption_619","class":"TODO::Senthil","instance":"Text_Caption_619","title":"Las contraseñas fuertes son esenciales, esto para proteger información e identidad. Aprendamos qué es lo que hace robusta a una contraseña y cómo usarla con seguridad. ","roles":{"textData":{}}},{"id":"Image_2397","class":"TODO::Senthil","instance":"Image_2397","roles":{}},{"id":"SmartShape_3236","class":"TODO::Senthil","instance":"SmartShape_3236","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_620","class":"TODO::Senthil","instance":"Text_Caption_620","title":"Las contraseñas ","roles":{"textData":{}}},{"id":"Slide84462351","class":"Normal Slide","instance":"Las contraseñas","thumbnail":"dr/Slide84462351_thnail.jpg","children":["Image_2390","Image_2391","Image_2392","Text_Caption_617","Image_2393","Image_2394","Text_Caption_618","Image_2395","Image_2396","Text_Caption_619","Image_2397","Text_Caption_620"],"roles":{"slide":{"durationInFrames":1176},"navigation":{"navid":"Slide84462351"}}},{"id":"Image_2398","class":"TODO::Senthil","instance":"Image_2398","roles":{}},{"id":"Image_2399","class":"TODO::Senthil","instance":"Image_2399","roles":{}},{"id":"Image_2400","class":"TODO::Senthil","instance":"Image_2400","roles":{}},{"id":"Image_2401","class":"TODO::Senthil","instance":"Image_2401","roles":{}},{"id":"Image_2402","class":"TODO::Senthil","instance":"Image_2402","roles":{}},{"id":"Image_2403","class":"TODO::Senthil","instance":"Image_2403","roles":{}},{"id":"Image_2404","class":"TODO::Senthil","instance":"Image_2404","roles":{}},{"id":"Image_2405","class":"TODO::Senthil","instance":"Image_2405","roles":{}},{"id":"Image_2406","class":"TODO::Senthil","instance":"Image_2406","roles":{}},{"id":"Image_2407","class":"TODO::Senthil","instance":"Image_2407","roles":{}},{"id":"Image_2408","class":"TODO::Senthil","instance":"Image_2408","roles":{}},{"id":"Image_2409","class":"TODO::Senthil","instance":"Image_2409","roles":{}},{"id":"SmartShape_3237","class":"TODO::Senthil","instance":"SmartShape_3237","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_621","class":"TODO::Senthil","instance":"Text_Caption_621","title":"Si una contraseña sólo está formada por una palabra del diccionario, por muy rara que sea, también estamos en peligro: los hackers se sirven de programas que realizan los llamados “ataques de diccionario”, para adivinar las contraseñas y vulnerar nuestra privacidad. ","roles":{"textData":{}}},{"id":"SmartShape_3238","class":"TODO::Senthil","instance":"SmartShape_3238","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2410","class":"TODO::Senthil","instance":"Image_2410","roles":{}},{"id":"Image_2411","class":"TODO::Senthil","instance":"Image_2411","roles":{}},{"id":"SmartShape_3239","class":"TODO::Senthil","instance":"SmartShape_3239","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_622","class":"TODO::Senthil","instance":"Text_Caption_622","title":"Una buena forma de saber si nuestra contraseña es fuerte, es probarla en esta página de Microsoft https://www.microsoft.com/protect/fraud/passwords/checker.aspx donde se evalúa si es lo suficientemente segura. ","roles":{"textData":{}}},{"id":"SmartShape_3240","class":"TODO::Senthil","instance":"SmartShape_3240","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2412","class":"TODO::Senthil","instance":"Image_2412","roles":{}},{"id":"Image_2413","class":"TODO::Senthil","instance":"Image_2413","roles":{}},{"id":"SmartShape_3241","class":"TODO::Senthil","instance":"SmartShape_3241","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_623","class":"TODO::Senthil","instance":"Text_Caption_623","title":"¿Por qué una contraseña es débil? ","roles":{"textData":{}}},{"id":"Slide84463980","class":"Normal Slide","instance":"¿Por qué una contraseña es débil?","thumbnail":"dr/Slide84463980_thnail.jpg","children":["Image_2398","Image_2399","Image_2400","Image_2401","Image_2402","Image_2403","Image_2404","Image_2405","Image_2406","Image_2407","Image_2408","Image_2409","Text_Caption_621","Image_2410","Image_2411","Text_Caption_622","Image_2412","Image_2413","Text_Caption_623"],"roles":{"slide":{"durationInFrames":861},"navigation":{"navid":"Slide84463980"}}},{"id":"Image_2414","class":"TODO::Senthil","instance":"Image_2414","roles":{}},{"id":"Image_2415","class":"TODO::Senthil","instance":"Image_2415","roles":{}},{"id":"Image_2416","class":"TODO::Senthil","instance":"Image_2416","roles":{}},{"id":"SmartShape_3242","class":"TODO::Senthil","instance":"SmartShape_3242","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_624","class":"TODO::Senthil","instance":"Text_Caption_624","title":"jorgealfredo ","roles":{"textData":{}}},{"id":"Text_Caption_625","class":"TODO::Senthil","instance":"Text_Caption_625","title":"ferreiro ","roles":{"textData":{}}},{"id":"Text_Caption_626","class":"TODO::Senthil","instance":"Text_Caption_626","title":"magdalena ","roles":{"textData":{}}},{"id":"SmartShape_3243","class":"TODO::Senthil","instance":"SmartShape_3243","title":" Nuestro nombre o apellido: ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2417","class":"TODO::Senthil","instance":"Image_2417","roles":{}},{"id":"Image_2418","class":"TODO::Senthil","instance":"Image_2418","roles":{}},{"id":"SmartShape_3244","class":"TODO::Senthil","instance":"SmartShape_3244","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_627","class":"TODO::Senthil","instance":"Text_Caption_627","title":"abcdefg ","roles":{"textData":{}}},{"id":"Text_Caption_628","class":"TODO::Senthil","instance":"Text_Caption_628","title":"qwerty ","roles":{"textData":{}}},{"id":"SmartShape_3245","class":"TODO::Senthil","instance":"SmartShape_3245","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_629","class":"TODO::Senthil","instance":"Text_Caption_629","title":"Las primeras letras del abecedario o las del teclado: ","roles":{"textData":{}}},{"id":"Image_2419","class":"TODO::Senthil","instance":"Image_2419","roles":{}},{"id":"Image_2420","class":"TODO::Senthil","instance":"Image_2420","roles":{}},{"id":"SmartShape_3246","class":"TODO::Senthil","instance":"SmartShape_3246","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_630","class":"TODO::Senthil","instance":"Text_Caption_630","title":"Consejos de seguridad ","roles":{"textData":{}}},{"id":"Image_2421","class":"TODO::Senthil","instance":"Image_2421","roles":{}},{"id":"Text_Caption_631","class":"TODO::Senthil","instance":"Text_Caption_631","title":"También son ejemplo de malas contraseñas las que estén formadas por... ","roles":{"textData":{}}},{"id":"Image_2422","class":"TODO::Senthil","instance":"Image_2422","roles":{}},{"id":"Text_Caption_632","class":"TODO::Senthil","instance":"Text_Caption_632","title":"Todas ellas son muy fáciles de recordar, pero son a la vez muy vulnerables. ","roles":{"textData":{}}},{"id":"Slide84466225","class":"Normal Slide","instance":"Consejos de seguridad","thumbnail":"dr/Slide84466225_thnail.jpg","children":["Image_2414","Image_2415","Image_2416","Text_Caption_624","Text_Caption_625","Text_Caption_626","Image_2417","Image_2418","Text_Caption_627","Text_Caption_628","Text_Caption_629","Image_2419","Image_2420","Text_Caption_630","Image_2421","Text_Caption_631","Image_2422","Text_Caption_632"],"roles":{"slide":{"durationInFrames":801},"navigation":{"navid":"Slide84466225"}}},{"id":"Image_2423","class":"TODO::Senthil","instance":"Image_2423","roles":{}},{"id":"Image_2424","class":"TODO::Senthil","instance":"Image_2424","roles":{}},{"id":"Image_2425","class":"TODO::Senthil","instance":"Image_2425","roles":{}},{"id":"Image_2426","class":"TODO::Senthil","instance":"Image_2426","roles":{}},{"id":"SmartShape_3247","class":"TODO::Senthil","instance":"SmartShape_3247","title":"El problema con las contraseñas es que los cibercriminales han desarrollado programas sofisticados que pueden aplicar fuerza bruta o adivinar tus contraseñas y, constantemente están mejorándolos. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3248","class":"TODO::Senthil","instance":"SmartShape_3248","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2427","class":"TODO::Senthil","instance":"Image_2427","roles":{}},{"id":"Image_2428","class":"TODO::Senthil","instance":"Image_2428","roles":{}},{"id":"SmartShape_3249","class":"TODO::Senthil","instance":"SmartShape_3249","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_633","class":"TODO::Senthil","instance":"Text_Caption_633","title":"Esto significa que pueden robar tus contraseñas si son débiles o fáciles de adivinar. ","roles":{"textData":{}}},{"id":"Image_2429","class":"TODO::Senthil","instance":"Image_2429","roles":{}},{"id":"Image_2430","class":"TODO::Senthil","instance":"Image_2430","roles":{}},{"id":"Image_2431","class":"TODO::Senthil","instance":"Image_2431","roles":{}},{"id":"Image_2432","class":"TODO::Senthil","instance":"Image_2432","roles":{}},{"id":"SmartShape_3250","class":"TODO::Senthil","instance":"SmartShape_3250","title":"Nunca utilices información común como contraseña, fecha de nacimiento, el nombre de tu mascota o cualquier cosa que se pueda determinar fácilmente a partir de una publicación de redes sociales o Google. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3251","class":"TODO::Senthil","instance":"SmartShape_3251","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2433","class":"TODO::Senthil","instance":"Image_2433","roles":{}},{"id":"Image_2434","class":"TODO::Senthil","instance":"Image_2434","roles":{}},{"id":"Image_2435","class":"TODO::Senthil","instance":"Image_2435","roles":{}},{"id":"Image_2436","class":"TODO::Senthil","instance":"Image_2436","roles":{}},{"id":"SmartShape_3252","class":"TODO::Senthil","instance":"SmartShape_3252","title":"La mejor manera de crear una contraseña segura es usar una contraseña larga y entre más caracteres contenga es mejor. De hecho, en lugar de utilizar una sola palabra, usa varias palabras o incluso una frase completa. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3253","class":"TODO::Senthil","instance":"SmartShape_3253","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2437","class":"TODO::Senthil","instance":"Image_2437","roles":{}},{"id":"Image_2438","class":"TODO::Senthil","instance":"Image_2438","roles":{}},{"id":"Image_2439","class":"TODO::Senthil","instance":"Image_2439","roles":{}},{"id":"SmartShape_3254","class":"TODO::Senthil","instance":"SmartShape_3254","title":"Este tipo de contraseñas como passphrase y es una de las más fuertes que se puede utilizar. Un ejemplo es el siguiente: ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_634","class":"TODO::Senthil","instance":"Text_Caption_634","title":"esto es un secreto ","roles":{"textData":{}}},{"id":"SmartShape_3255","class":"TODO::Senthil","instance":"SmartShape_3255","title":"Eso es todo lo que necesitas. Luego debes hacer tu contraseña más segura mediante la adición de símbolos, letras mayúsculas o nú- meros, como se muestra en el siguiente ejemplo: ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_635","class":"TODO::Senthil","instance":"Text_Caption_635","title":"3sto 3s un s3cr3to ","roles":{"textData":{}}},{"id":"Image_2440","class":"TODO::Senthil","instance":"Image_2440","roles":{}},{"id":"Image_2441","class":"TODO::Senthil","instance":"Image_2441","roles":{}},{"id":"SmartShape_3256","class":"TODO::Senthil","instance":"SmartShape_3256","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3257","class":"TODO::Senthil","instance":"SmartShape_3257","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_636","class":"TODO::Senthil","instance":"Text_Caption_636","title":"También puedes reemplazar letras por números o símbolos como reemplazar una letra \"a\" con el símbolo \"@\" y la letra \"o\" con el cero o utilizar las marcas de puntuación comunes, como un signo de interrogación, punto o espacio. ","roles":{"textData":{}}},{"id":"SmartShape_3258","class":"TODO::Senthil","instance":"SmartShape_3258","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3259","class":"TODO::Senthil","instance":"SmartShape_3259","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_637","class":"TODO::Senthil","instance":"Text_Caption_637","title":"Si un sitio web o programa limita el número de caracteres, entonces es recomendable utilizar el número máximo de caracteres permitidos. ","roles":{"textData":{}}},{"id":"SmartShape_3260","class":"TODO::Senthil","instance":"SmartShape_3260","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_638","class":"TODO::Senthil","instance":"Text_Caption_638","title":"Contraseñas seguras: passphrases ","roles":{"textData":{}}},{"id":"Image_2442","class":"TODO::Senthil","instance":"Image_2442","roles":{}},{"id":"Slide84470086","class":"Normal Slide","instance":"Contraseñas seguras: passphrases","thumbnail":"dr/Slide84470086_thnail.jpg","children":["Image_2423","Image_2424","Image_2425","Image_2426","Image_2427","Image_2428","Text_Caption_633","Image_2429","Image_2430","Image_2431","Image_2432","Image_2433","Image_2434","Image_2435","Image_2436","Image_2437","Image_2438","Image_2439","Text_Caption_634","Text_Caption_635","Image_2440","Image_2441","Text_Caption_636","Text_Caption_637","Text_Caption_638","Image_2442"],"roles":{"slide":{"durationInFrames":2694},"navigation":{"navid":"Slide84470086"}}},{"id":"Image_2443","class":"TODO::Senthil","instance":"Image_2443","roles":{}},{"id":"SmartShape_3261","class":"TODO::Senthil","instance":"SmartShape_3261","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3262","class":"TODO::Senthil","instance":"SmartShape_3262","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3263","class":"TODO::Senthil","instance":"SmartShape_3263","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3264","class":"TODO::Senthil","instance":"SmartShape_3264","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2444","class":"TODO::Senthil","instance":"Image_2444","roles":{}},{"id":"SmartShape_3265","class":"TODO::Senthil","instance":"SmartShape_3265","title":" Nombre o “apodos” de clubes deportivos. Ejemplos: ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3266","class":"TODO::Senthil","instance":"SmartShape_3266","title":"ElDecano, GH1S, Repollero, CCP, NacionalQuerido, ElAborigen ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3267","class":"TODO::Senthil","instance":"SmartShape_3267","title":"Apodos o nombres de mascotas. Ejemplos: ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3268","class":"TODO::Senthil","instance":"SmartShape_3268","title":"Pepe, ElColo, Kaiser, Cacho ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3269","class":"TODO::Senthil","instance":"SmartShape_3269","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3270","class":"TODO::Senthil","instance":"SmartShape_3270","title":"Nombre de la compañía, nombre de lasucursal o frase adicional. Ejemplos: ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3271","class":"TODO::Senthil","instance":"SmartShape_3271","title":"Solar, SiSePuede, AtlasAsuncion ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3272","class":"TODO::Senthil","instance":"SmartShape_3272","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3273","class":"TODO::Senthil","instance":"SmartShape_3273","title":" Típicamente estas frases son utilizadas en combinación con dígitos que identifican al año, como ser: ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3274","class":"TODO::Senthil","instance":"SmartShape_3274","title":"ElDecano2015, El Aborigen150, CCPJunio2015, KaiserSetiembre14, AtlasJulio16, AtlasAsuncion2015 ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3275","class":"TODO::Senthil","instance":"SmartShape_3275","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3276","class":"TODO::Senthil","instance":"SmartShape_3276","title":"Este tipo de combinaciones si bien aparentan ser contraseñas fuertes, son combinaciones comunes y por lo tanto pueden ser fácilmente deducidas y utilizadas por un atacante de forma trivial. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3277","class":"TODO::Senthil","instance":"SmartShape_3277","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2445","class":"TODO::Senthil","instance":"Image_2445","roles":{}},{"id":"Image_2446","class":"TODO::Senthil","instance":"Image_2446","roles":{}},{"id":"SmartShape_3278","class":"TODO::Senthil","instance":"SmartShape_3278","title":"Es una herramienta útil para la creación de contraseñas fuertes ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3279","class":"TODO::Senthil","instance":"SmartShape_3279","title":"Debemos evitar que estén compuestas únicamente por palabras conocidas ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3280","class":"TODO::Senthil","instance":"SmartShape_3280","title":"Patrones fácilmente deducibles ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2447","class":"TODO::Senthil","instance":"Image_2447","roles":{}},{"id":"SmartShape_3281","class":"TODO::Senthil","instance":"SmartShape_3281","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_639","class":"TODO::Senthil","instance":"Text_Caption_639","title":"Contraseñas seguras: passphrases ","roles":{"textData":{}}},{"id":"Slide84472851","class":"Normal Slide","instance":"Más acerca de las passphrases","thumbnail":"dr/Slide84472851_thnail.jpg","children":["Image_2443","Image_2444","Image_2445","Image_2446","Image_2447","Text_Caption_639"],"roles":{"slide":{"durationInFrames":924},"navigation":{"navid":"Slide84472851"}}},{"id":"Image_2448","class":"TODO::Senthil","instance":"Image_2448","roles":{}},{"id":"Image_2449","class":"TODO::Senthil","instance":"Image_2449","roles":{}},{"id":"SmartShape_3282","class":"TODO::Senthil","instance":"SmartShape_3282","title":"Además de utilizar contraseñas seguras, debes tener cuidado cómo las usas. Tener una contraseña fuerte no ayuda en mucho, si alguien puede robarla o copiarla. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2450","class":"TODO::Senthil","instance":"Image_2450","roles":{}},{"id":"Text_Caption_640","class":"TODO::Senthil","instance":"Text_Caption_640","title":"Si alguien más conoce tu contra- seña, no es seguro. Si accidentalmente compartes tu contraseña... ","roles":{"textData":{}}},{"id":"Image_2451","class":"TODO::Senthil","instance":"Image_2451","roles":{}},{"id":"Text_Caption_641","class":"TODO::Senthil","instance":"Text_Caption_641","title":"...con alguien o crees que ha sido comprometida o robada, asegurate de cambiarla inmediatamente. ","roles":{"textData":{}}},{"id":"Image_2452","class":"TODO::Senthil","instance":"Image_2452","roles":{}},{"id":"SmartShape_3283","class":"TODO::Senthil","instance":"SmartShape_3283","title":"Usa diferentes contraseñas para cada tipo de cuenta. No utilices las contraseñas de las cuentas de trabajo o Home Banking para personales como Facebook, YouTube o Twitter. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2453","class":"TODO::Senthil","instance":"Image_2453","roles":{}},{"id":"SmartShape_3284","class":"TODO::Senthil","instance":"SmartShape_3284","title":"Si tu contraseña es comprometida, las otras cuentas estarán a salvo. Si tienes que recordar muchas contra- señas, considera usar un administrador de contraseñas. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2454","class":"TODO::Senthil","instance":"Image_2454","roles":{}},{"id":"SmartShape_3285","class":"TODO::Senthil","instance":"SmartShape_3285","title":"Esto es un programa especial que se ejecuta en tu computadora o dispositivo móvil, que almacena por ti -de forma segura- todas las contraseñas. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2455","class":"TODO::Senthil","instance":"Image_2455","roles":{}},{"id":"SmartShape_3286","class":"TODO::Senthil","instance":"SmartShape_3286","title":"Sólo tendrás que recordar la contraseña de tu computadora y del programa que administra las contraseñas. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2456","class":"TODO::Senthil","instance":"Image_2456","roles":{}},{"id":"SmartShape_3287","class":"TODO::Senthil","instance":"SmartShape_3287","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Line_95","class":"TODO::Senthil","instance":"Line_95","roles":{}},{"id":"Line_96","class":"TODO::Senthil","instance":"Line_96","roles":{}},{"id":"SmartShape_3288","class":"TODO::Senthil","instance":"SmartShape_3288","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3289","class":"TODO::Senthil","instance":"SmartShape_3289","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2457","class":"TODO::Senthil","instance":"Image_2457","roles":{}},{"id":"Image_2458","class":"TODO::Senthil","instance":"Image_2458","roles":{}},{"id":"Image_2459","class":"TODO::Senthil","instance":"Image_2459","roles":{}},{"id":"Image_2460","class":"TODO::Senthil","instance":"Image_2460","roles":{}},{"id":"Image_2461","class":"TODO::Senthil","instance":"Image_2461","roles":{}},{"id":"Image_2462","class":"TODO::Senthil","instance":"Image_2462","roles":{}},{"id":"Image_2463","class":"TODO::Senthil","instance":"Image_2463","roles":{}},{"id":"SmartShape_3290","class":"TODO::Senthil","instance":"SmartShape_3290","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_642","class":"TODO::Senthil","instance":"Text_Caption_642","title":"El uso de contraseñas de forma segura ","roles":{"textData":{}}},{"id":"Slide84476693","class":"Normal Slide","instance":"El uso de contraseñas de forma segura","thumbnail":"dr/Slide84476693_thnail.jpg","children":["Image_2448","Image_2449","Image_2450","Text_Caption_640","Image_2451","Text_Caption_641","Image_2452","Image_2453","Image_2454","Image_2455","Image_2456","Image_2457","Image_2458","Image_2459","Image_2460","Image_2461","Image_2462","Image_2463","Text_Caption_642"],"roles":{"slide":{"durationInFrames":1437},"navigation":{"navid":"Slide84476693"}}},{"id":"Image_2464","class":"TODO::Senthil","instance":"Image_2464","roles":{}},{"id":"Image_2465","class":"TODO::Senthil","instance":"Image_2465","roles":{}},{"id":"SmartShape_3291","class":"TODO::Senthil","instance":"SmartShape_3291","title":"Sé cuidadoso con los sitios que requieren que contestes preguntas personales. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3292","class":"TODO::Senthil","instance":"SmartShape_3292","title":" Estas preguntas son usadas si olvidaste tu contraseña y necesitas restablecerla. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3293","class":"TODO::Senthil","instance":"SmartShape_3293","title":" El problema es que las respuestas pueden encontrarse en internet o, incluso, en tu página de Facebook. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3294","class":"TODO::Senthil","instance":"SmartShape_3294","title":" Asegúrate que si respondes preguntas personales, utilices información que no sea pública o que sea ficticia. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3295","class":"TODO::Senthil","instance":"SmartShape_3295","title":"Los manejadores de contraseñas pueden ser útiles en este caso. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3296","class":"TODO::Senthil","instance":"SmartShape_3296","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3297","class":"TODO::Senthil","instance":"SmartShape_3297","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3298","class":"TODO::Senthil","instance":"SmartShape_3298","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3299","class":"TODO::Senthil","instance":"SmartShape_3299","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3300","class":"TODO::Senthil","instance":"SmartShape_3300","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2466","class":"TODO::Senthil","instance":"Image_2466","roles":{}},{"id":"Image_2467","class":"TODO::Senthil","instance":"Image_2467","roles":{}},{"id":"Image_2468","class":"TODO::Senthil","instance":"Image_2468","roles":{}},{"id":"Image_2469","class":"TODO::Senthil","instance":"Image_2469","roles":{}},{"id":"Image_2470","class":"TODO::Senthil","instance":"Image_2470","roles":{}},{"id":"Image_2471","class":"TODO::Senthil","instance":"Image_2471","roles":{}},{"id":"Image_2472","class":"TODO::Senthil","instance":"Image_2472","roles":{}},{"id":"SmartShape_3301","class":"TODO::Senthil","instance":"SmartShape_3301","title":" No utilices computadoras públicas, como las que se encuentran en hoteles o bibliotecas, para iniciar sesión en cuentas de trabajo o bancarias. Dado que cualquiera hace uso de estos equipos, podrían estar infectados con códigos maliciosos que capturan todo lo que tecleas. Sólo accedea tus cuentas de trabajo y de banco en computadoras o dispositivos móviles confiables. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3302","class":"TODO::Senthil","instance":"SmartShape_3302","title":"Acerca del uso de computadoras públicas ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3303","class":"TODO::Senthil","instance":"SmartShape_3303","title":" Sé cuidadoso/a con los sitios que requieren que contestes con preguntas personales. Estas preguntas son usadas si olvidaste tu contraseña y necesitas reestablecerla. El problema es que las repuestas pueden encontrarse en internet o incluye en tu página de Fácebook. Asegúrate que si respondes preguntas personales, utilices información que no sea pública o que sea ficticia. Los manejadores de contraseñas pueden ser útiles en este caso. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3304","class":"TODO::Senthil","instance":"SmartShape_3304","title":"Sitios que requieren que se responda con preguntas personales ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3305","class":"TODO::Senthil","instance":"SmartShape_3305","title":" Muchas cuentas en línea ofrecen algo llamado \"autenticación de doble factor\" o \"verificación endos pasos\". Esto significa que se requiere más que sólo las contraseña para acceder, como puede ser algún código enviado a tu teléfono inteligente. Esta opción brinda mucha más seguridad queuna contraseña por sí misma. Usa este método de autenticación siempre que te sea posible. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3306","class":"TODO::Senthil","instance":"SmartShape_3306","title":"Autenticación de doble factor o verificación en dos pasos ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3307","class":"TODO::Senthil","instance":"SmartShape_3307","title":" Los dispositivos móviles usualmente requieren de un PIN para acceder a él. Recuerda que el PIN no es otra cosa que una contraseña. Mientras más largo sea el PIN, más seguro es. Muchos de los dispositivos móviles te permiten cambiar tu número PIN por una contraseña efectiva. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3308","class":"TODO::Senthil","instance":"SmartShape_3308","title":"El PIN de los dispositivos móviles ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3309","class":"TODO::Senthil","instance":"SmartShape_3309","title":"Finalmente, si ya no utilizas alguna de tus cuentas, asegúrate de cerrarla o deshabilitarla. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3310","class":"TODO::Senthil","instance":"SmartShape_3310","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_643","class":"TODO::Senthil","instance":"Text_Caption_643","title":"El uso de contraseñas de forma segura ","roles":{"textData":{}}},{"id":"Slide84479592","class":"Normal Slide","instance":"El uso de contraseñas de forma segura (2.da parte)","thumbnail":"dr/Slide84479592_thnail.jpg","children":["Image_2464","Image_2465","Image_2466","Image_2467","Image_2468","Image_2469","Image_2470","Image_2471","Image_2472","Text_Caption_643"],"roles":{"slide":{"durationInFrames":2250},"navigation":{"navid":"Slide84479592"}}},{"id":"Image_2473","class":"TODO::Senthil","instance":"Image_2473","roles":{}},{"id":"Image_2474","class":"TODO::Senthil","instance":"Image_2474","roles":{}},{"id":"Image_2475","class":"TODO::Senthil","instance":"Image_2475","roles":{}},{"id":"Image_2476","class":"TODO::Senthil","instance":"Image_2476","roles":{}},{"id":"Image_2477","class":"TODO::Senthil","instance":"Image_2477","roles":{}},{"id":"Image_2478","class":"TODO::Senthil","instance":"Image_2478","roles":{}},{"id":"Image_2479","class":"TODO::Senthil","instance":"Image_2479","roles":{}},{"id":"Image_2480","class":"TODO::Senthil","instance":"Image_2480","roles":{}},{"id":"Image_2481","class":"TODO::Senthil","instance":"Image_2481","roles":{}},{"id":"SmartShape_3311","class":"TODO::Senthil","instance":"SmartShape_3311","title":"Utiliza letras y números. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3312","class":"TODO::Senthil","instance":"SmartShape_3312","title":"Usa caracteres especiales, como la arroba ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3313","class":"TODO::Senthil","instance":"SmartShape_3313","title":"Combina mayúsculas y minúsculas. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3314","class":"TODO::Senthil","instance":"SmartShape_3314","title":"Cambia la contraseña al menos una vez al mes. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3315","class":"TODO::Senthil","instance":"SmartShape_3315","title":"Crea una que esté compuesta por, al menos, 10 caracteres (una longitud de 16 es lo más recomendable). ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3316","class":"TODO::Senthil","instance":"SmartShape_3316","title":"Nunca crees un archivo en tu ordenador que contenga tus contraseñas. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3317","class":"TODO::Senthil","instance":"SmartShape_3317","title":"No uses la misma contraseña para diferentes sitios. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3318","class":"TODO::Senthil","instance":"SmartShape_3318","title":"No teclees una contraseña delante de alguien. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3319","class":"TODO::Senthil","instance":"SmartShape_3319","title":"Usa un antivirus actualizado o un programa para encontrar software malicioso, para saber si en tu ordenador está instalado uno de reconocimiento de contraseñas. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3320","class":"TODO::Senthil","instance":"SmartShape_3320","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_644","class":"TODO::Senthil","instance":"Text_Caption_644","title":"En resumen ","roles":{"textData":{}}},{"id":"Slide84481208","class":"Normal Slide","instance":"En resumen...","thumbnail":"dr/Slide84481208_thnail.jpg","children":["Image_2473","Image_2474","Image_2475","Image_2476","Image_2477","Image_2478","Image_2479","Image_2480","Image_2481","Text_Caption_644"],"roles":{"slide":{"durationInFrames":1329},"navigation":{"navid":"Slide84481208"}}},{"id":"Image_2483","class":"TODO::Senthil","instance":"Image_2483","roles":{}},{"id":"Image_2484","class":"TODO::Senthil","instance":"Image_2484","roles":{}},{"id":"Image_2485","class":"TODO::Senthil","instance":"Image_2485","roles":{}},{"id":"Image_2486","class":"TODO::Senthil","instance":"Image_2486","roles":{}},{"id":"Image_2487","class":"TODO::Senthil","instance":"Image_2487","roles":{}},{"id":"Image_2488","class":"TODO::Senthil","instance":"Image_2488","roles":{}},{"id":"Image_2489","class":"TODO::Senthil","instance":"Image_2489","roles":{}},{"id":"Image_2490","class":"TODO::Senthil","instance":"Image_2490","roles":{}},{"id":"Image_2491","class":"TODO::Senthil","instance":"Image_2491","roles":{}},{"id":"Image_2492","class":"TODO::Senthil","instance":"Image_2492","roles":{}},{"id":"Image_2493","class":"TODO::Senthil","instance":"Image_2493","roles":{}},{"id":"Image_2494","class":"TODO::Senthil","instance":"Image_2494","roles":{}},{"id":"SmartShape_3322","class":"TODO::Senthil","instance":"SmartShape_3322","title":"Malware: Una de las principales amenazas de los sistemas informáticos son los virus que se propa- gan principalmente mediante Internet repro- duciéndose ficheros infectados. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3323","class":"TODO::Senthil","instance":"SmartShape_3323","title":"Proviene de la contracción de las palabras mali- cious software. El malware es cualquier progra- ma o mensaje dañino para un ordenador. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3324","class":"TODO::Senthil","instance":"SmartShape_3324","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2495","class":"TODO::Senthil","instance":"Image_2495","roles":{}},{"id":"Image_2496","class":"TODO::Senthil","instance":"Image_2496","roles":{}},{"id":"Text_Caption_646","class":"TODO::Senthil","instance":"Text_Caption_646","title":"1 ","roles":{"textData":{}}},{"id":"SmartShape_3325","class":"TODO::Senthil","instance":"SmartShape_3325","title":"Virus, gusanos, troyanos, backdoors. Habitualmente están ocultos en otros programas y se ejecutan automáticamente haciendo copias de sí mismo dentro de otros programas. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3326","class":"TODO::Senthil","instance":"SmartShape_3326","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2497","class":"TODO::Senthil","instance":"Image_2497","roles":{}},{"id":"Image_2498","class":"TODO::Senthil","instance":"Image_2498","roles":{}},{"id":"Text_Caption_647","class":"TODO::Senthil","instance":"Text_Caption_647","title":"2 ","roles":{"textData":{}}},{"id":"SmartShape_3327","class":"TODO::Senthil","instance":"SmartShape_3327","title":"Intrusos, hacker, cracker, y keylogger. Utilizan herra- mientas para acceder a un ordenador y obtener información confidencial, lanzar ataques, etc. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3328","class":"TODO::Senthil","instance":"SmartShape_3328","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2499","class":"TODO::Senthil","instance":"Image_2499","roles":{}},{"id":"Image_2500","class":"TODO::Senthil","instance":"Image_2500","roles":{}},{"id":"Text_Caption_648","class":"TODO::Senthil","instance":"Text_Caption_648","title":"3 ","roles":{"textData":{}}},{"id":"SmartShape_3329","class":"TODO::Senthil","instance":"SmartShape_3329","title":"Spam. Correo basura con el que se bombardea a los e-mails. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3330","class":"TODO::Senthil","instance":"SmartShape_3330","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2501","class":"TODO::Senthil","instance":"Image_2501","roles":{}},{"id":"Text_Caption_649","class":"TODO::Senthil","instance":"Text_Caption_649","title":"4 ","roles":{"textData":{}}},{"id":"SmartShape_3331","class":"TODO::Senthil","instance":"SmartShape_3331","title":"Spyware. Utiliza la conexión a internet para obtener datos. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3332","class":"TODO::Senthil","instance":"SmartShape_3332","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2502","class":"TODO::Senthil","instance":"Image_2502","roles":{}},{"id":"Text_Caption_650","class":"TODO::Senthil","instance":"Text_Caption_650","title":"5 ","roles":{"textData":{}}},{"id":"SmartShape_3333","class":"TODO::Senthil","instance":"SmartShape_3333","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_651","class":"TODO::Senthil","instance":"Text_Caption_651","title":"Otros tipos de ataques ","roles":{"textData":{}}},{"id":"Slide84483634","class":"Normal Slide","instance":"Por qué eres un objetivo?","thumbnail":"dr/Slide84483634_thnail.jpg","children":["Image_2483","Image_2484","Image_2485","Image_2486","Image_2487","Image_2488","Image_2489","Image_2490","Image_2491","Image_2492","Image_2493","Image_2494","Image_2495","Image_2496","Text_Caption_646","Image_2497","Image_2498","Text_Caption_647","Image_2499","Image_2500","Text_Caption_648","Image_2501","Text_Caption_649","Image_2502","Text_Caption_650","Text_Caption_651"],"roles":{"slide":{"durationInFrames":1728},"navigation":{"navid":"Slide84483634"}}},{"id":"Image_2503","class":"TODO::Senthil","instance":"Image_2503","roles":{}},{"id":"Image_2504","class":"TODO::Senthil","instance":"Image_2504","roles":{}},{"id":"Image_2505","class":"TODO::Senthil","instance":"Image_2505","roles":{}},{"id":"SmartShape_3334","class":"TODO::Senthil","instance":"SmartShape_3334","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2506","class":"TODO::Senthil","instance":"Image_2506","roles":{}},{"id":"Text_Caption_652","class":"TODO::Senthil","instance":"Text_Caption_652","title":"Incluyen, pero no están limitadas a: contraseñas y parámetros del sistema. ","roles":{"textData":{}}},{"id":"Text_Caption_653","class":"TODO::Senthil","instance":"Text_Caption_653","title":"1 ","roles":{"textData":{}}},{"id":"Image_2507","class":"TODO::Senthil","instance":"Image_2507","roles":{}},{"id":"SmartShape_3335","class":"TODO::Senthil","instance":"SmartShape_3335","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2508","class":"TODO::Senthil","instance":"Image_2508","roles":{}},{"id":"Text_Caption_654","class":"TODO::Senthil","instance":"Text_Caption_654","title":"2 ","roles":{"textData":{}}},{"id":"Text_Caption_655","class":"TODO::Senthil","instance":"Text_Caption_655","title":"incluyen, pero no están limitadas a documentos privados de la Entidad, estrategias corporativas sensibles para la competencia, secretos bancarios, especificaciones, lista de clientes y datos de investigación. ","roles":{"textData":{}}},{"id":"Text_Caption_656","class":"TODO::Senthil","instance":"Text_Caption_656","title":"Los funcionarios deben tomar todas las medidas necesarias para evitar el acceso no autorizado a esta información. ","roles":{"textData":{}}},{"id":"Image_2509","class":"TODO::Senthil","instance":"Image_2509","roles":{}},{"id":"Text_Caption_657","class":"TODO::Senthil","instance":"Text_Caption_657","title":"Datos que sólo pueden ser divulgados previa autorización o dentro de un departamento. Incluyen, pero no están limitadas a: datos de cliente y sueldos del personal. ","roles":{"textData":{}}},{"id":"SmartShape_3336","class":"TODO::Senthil","instance":"SmartShape_3336","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2510","class":"TODO::Senthil","instance":"Image_2510","roles":{}},{"id":"Text_Caption_658","class":"TODO::Senthil","instance":"Text_Caption_658","title":"3 ","roles":{"textData":{}}},{"id":"Image_2511","class":"TODO::Senthil","instance":"Image_2511","roles":{}},{"id":"Text_Caption_659","class":"TODO::Senthil","instance":"Text_Caption_659","title":"Datos que pueden ser conocidos por el público, pero que pueden ser actualizados, eliminados sólo por el personal autorizado. Incluyen, pero no están limitadas a: Páginas web y Balances de la Financiera. ","roles":{"textData":{}}},{"id":"SmartShape_3337","class":"TODO::Senthil","instance":"SmartShape_3337","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2512","class":"TODO::Senthil","instance":"Image_2512","roles":{}},{"id":"Text_Caption_660","class":"TODO::Senthil","instance":"Text_Caption_660","title":"4 ","roles":{"textData":{}}},{"id":"Text_Caption_661","class":"TODO::Senthil","instance":"Text_Caption_661","title":"Sensitiva ","roles":{"textData":{}}},{"id":"Text_Caption_662","class":"TODO::Senthil","instance":"Text_Caption_662","title":"Confidencial ","roles":{"textData":{}}},{"id":"Text_Caption_663","class":"TODO::Senthil","instance":"Text_Caption_663","title":"Privada ","roles":{"textData":{}}},{"id":"Text_Caption_664","class":"TODO::Senthil","instance":"Text_Caption_664","title":"Pública ","roles":{"textData":{}}},{"id":"SmartShape_3338","class":"TODO::Senthil","instance":"SmartShape_3338","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_665","class":"TODO::Senthil","instance":"Text_Caption_665","title":"Política de seguridad - Clasificación de la información ","roles":{"textData":{}}},{"id":"Slide84484920","class":"Normal Slide","instance":"Más medidas de protección","thumbnail":"dr/Slide84484920_thnail.jpg","children":["Image_2503","Image_2504","Image_2505","Image_2506","Text_Caption_652","Text_Caption_653","Image_2507","Image_2508","Text_Caption_654","Text_Caption_655","Text_Caption_656","Image_2509","Text_Caption_657","Image_2510","Text_Caption_658","Image_2511","Text_Caption_659","Image_2512","Text_Caption_660","Text_Caption_661","Text_Caption_662","Text_Caption_663","Text_Caption_664","Text_Caption_665"],"roles":{"slide":{"durationInFrames":1761},"navigation":{"navid":"Slide84484920"}}},{"id":"Image_2513","class":"TODO::Senthil","instance":"Image_2513","roles":{}},{"id":"Image_2514","class":"TODO::Senthil","instance":"Image_2514","roles":{}},{"id":"Image_2515","class":"TODO::Senthil","instance":"Image_2515","roles":{}},{"id":"Image_2516","class":"TODO::Senthil","instance":"Image_2516","roles":{}},{"id":"Text_Caption_666","class":"TODO::Senthil","instance":"Text_Caption_666","title":"Toda información, valor, documento importante, formulario de uso interno o externo que se en- cuentre debidamente conformado, documentos de identidad, informes confidenciales (Inform- conf) o cualquier papel firmado que sea desecha- do deberá ser totalmente destruido y no deberá ser reciclado. ","roles":{"textData":{}}},{"id":"Image_2517","class":"TODO::Senthil","instance":"Image_2517","roles":{}},{"id":"Image_2518","class":"TODO::Senthil","instance":"Image_2518","roles":{}},{"id":"Text_Caption_667","class":"TODO::Senthil","instance":"Text_Caption_667","title":"El funcionario que quiera desechar papelería conteniendo información cuya divulgación podría violar el secreto bancario, deberá tomarse el tiem- po que sea necesario para romperla en cuantos pedazos sea posible como para que no sean legibles a simple vista. ","roles":{"textData":{}}},{"id":"Image_2519","class":"TODO::Senthil","instance":"Image_2519","roles":{}},{"id":"Image_2520","class":"TODO::Senthil","instance":"Image_2520","roles":{}},{"id":"Text_Caption_668","class":"TODO::Senthil","instance":"Text_Caption_668","title":"Todos los funcionarios de la Financiera Paraguayo Japonesa deben ser cuidadosos de no divulgar información confidencial en lugares públicos, en conversaciones o situaciones que pongan en ries- gos la seguridad y el buen nombre de la Entidad. ","roles":{"textData":{}}},{"id":"Image_2521","class":"TODO::Senthil","instance":"Image_2521","roles":{}},{"id":"Image_2522","class":"TODO::Senthil","instance":"Image_2522","roles":{}},{"id":"Image_2523","class":"TODO::Senthil","instance":"Image_2523","roles":{}},{"id":"SmartShape_3339","class":"TODO::Senthil","instance":"SmartShape_3339","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_669","class":"TODO::Senthil","instance":"Text_Caption_669","title":"Política de seguridad - Clasificación de la información ","roles":{"textData":{}}},{"id":"Slide84486822","class":"Normal Slide","instance":"Objetivos","thumbnail":"dr/Slide84486822_thnail.jpg","children":["Image_2513","Image_2514","Image_2515","Image_2516","Text_Caption_666","Image_2517","Image_2518","Text_Caption_667","Image_2519","Image_2520","Text_Caption_668","Image_2521","Image_2522","Image_2523","Text_Caption_669"],"roles":{"slide":{"durationInFrames":1485},"navigation":{"navid":"Slide84486822"}}},{"id":"Image_2524","class":"TODO::Senthil","instance":"Image_2524","roles":{}},{"id":"Image_2525","class":"TODO::Senthil","instance":"Image_2525","roles":{}},{"id":"Image_2526","class":"TODO::Senthil","instance":"Image_2526","roles":{}},{"id":"Image_2527","class":"TODO::Senthil","instance":"Image_2527","roles":{}},{"id":"Image_2528","class":"TODO::Senthil","instance":"Image_2528","roles":{}},{"id":"Image_2529","class":"TODO::Senthil","instance":"Image_2529","roles":{}},{"id":"SmartShape_3340","class":"TODO::Senthil","instance":"SmartShape_3340","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_670","class":"TODO::Senthil","instance":"Text_Caption_670","title":"Toda la información almacenada en dispositivos móviles (CD, PEN DRIVE, DISCO EXTERNO, CINTAS, u otros similares) deben ser protegidos de forma adecuada, tanto física o lógicamente. ","roles":{"textData":{}}},{"id":"Image_2530","class":"TODO::Senthil","instance":"Image_2530","roles":{}},{"id":"Image_2531","class":"TODO::Senthil","instance":"Image_2531","roles":{}},{"id":"Image_2532","class":"TODO::Senthil","instance":"Image_2532","roles":{}},{"id":"SmartShape_3341","class":"TODO::Senthil","instance":"SmartShape_3341","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2533","class":"TODO::Senthil","instance":"Image_2533","roles":{}},{"id":"Image_2534","class":"TODO::Senthil","instance":"Image_2534","roles":{}},{"id":"Text_Caption_671","class":"TODO::Senthil","instance":"Text_Caption_671","title":"Adicionalmente, en caso que información almacenada en dispositivos móviles deba ser trasladada, deberá ser asignado a un personal debidamente autorizado. ","roles":{"textData":{}}},{"id":"Image_2535","class":"TODO::Senthil","instance":"Image_2535","roles":{}},{"id":"SmartShape_3342","class":"TODO::Senthil","instance":"SmartShape_3342","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_672","class":"TODO::Senthil","instance":"Text_Caption_672","title":"Traslado de información ","roles":{"textData":{}}},{"id":"Slide84488715","class":"Normal Slide","instance":"Objetivos","thumbnail":"dr/Slide84488715_thnail.jpg","children":["Image_2524","Image_2525","Image_2526","Image_2527","Image_2528","Image_2529","Text_Caption_670","Image_2530","Image_2531","Image_2532","Image_2533","Image_2534","Text_Caption_671","Image_2535","Text_Caption_672"],"roles":{"slide":{"durationInFrames":795},"navigation":{"navid":"Slide84488715"}}},{"id":"Image_2536","class":"TODO::Senthil","instance":"Image_2536","roles":{}},{"id":"SmartShape_3343","class":"TODO::Senthil","instance":"SmartShape_3343","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_673","class":"TODO::Senthil","instance":"Text_Caption_673","title":"Control de Acceso ","roles":{"textData":{}}},{"id":"Image_2537","class":"TODO::Senthil","instance":"Image_2537","roles":{}},{"id":"Click_Box_156","class":"TODO::Senthil","instance":"Click_Box_156","roles":{"click":{"subtype":"button"}}},{"id":"Slide84489114","class":"Normal Slide","instance":"Objetivos","thumbnail":"dr/Slide84489114_thnail.jpg","children":["Image_2536","Text_Caption_673","Image_2537","Click_Box_156"],"roles":{"slide":{"durationInFrames":198},"navigation":{"navid":"Slide84489114"}}},{"id":"Image_2538","class":"TODO::Senthil","instance":"Image_2538","roles":{}},{"id":"Image_2539","class":"TODO::Senthil","instance":"Image_2539","roles":{}},{"id":"SmartShape_3344","class":"TODO::Senthil","instance":"SmartShape_3344","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_674","class":"TODO::Senthil","instance":"Text_Caption_674","title":"Cada responsable de sucursal deberá asignar un área de carga y descarga segura, de manera a tener controlado el acceso. ","roles":{"textData":{}}},{"id":"SmartShape_3345","class":"TODO::Senthil","instance":"SmartShape_3345","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_675","class":"TODO::Senthil","instance":"Text_Caption_675","title":"Áreas de carga ","roles":{"textData":{}}},{"id":"Slide84489886","class":"Normal Slide","instance":"Objetivos","thumbnail":"dr/Slide84489886_thnail.jpg","children":["Image_2538","Image_2539","Text_Caption_674","Text_Caption_675"],"roles":{"slide":{"durationInFrames":303},"navigation":{"navid":"Slide84489886"}}},{"id":"Image_2540","class":"TODO::Senthil","instance":"Image_2540","roles":{}},{"id":"Image_2541","class":"TODO::Senthil","instance":"Image_2541","roles":{}},{"id":"Text_Caption_676","class":"TODO::Senthil","instance":"Text_Caption_676","title":"01 ","roles":{"textData":{}}},{"id":"Text_Caption_677","class":"TODO::Senthil","instance":"Text_Caption_677","title":"Selección inicial ","roles":{"textData":{}}},{"id":"Text_Caption_678","class":"TODO::Senthil","instance":"Text_Caption_678","title":"Se debe garantizar que se realizan controles de antecedentes adecuados al personal de la Financiera Paraguayo Japonesa en función al puesto. ","roles":{"textData":{}}},{"id":"Image_2542","class":"TODO::Senthil","instance":"Image_2542","roles":{}},{"id":"Image_2543","class":"TODO::Senthil","instance":"Image_2543","roles":{}},{"id":"Text_Caption_679","class":"TODO::Senthil","instance":"Text_Caption_679","title":"Gestión de personas debe garantizar que los funcionarios firmen un contrato de trabajo, que debe incluir la declaración de confidencialidad antes de iniciar las actividades laborales de los funcionarios. ","roles":{"textData":{}}},{"id":"Text_Caption_680","class":"TODO::Senthil","instance":"Text_Caption_680","title":"Contrato de trabajo ","roles":{"textData":{}}},{"id":"Text_Caption_681","class":"TODO::Senthil","instance":"Text_Caption_681","title":"02 ","roles":{"textData":{}}},{"id":"Image_2544","class":"TODO::Senthil","instance":"Image_2544","roles":{}},{"id":"SmartShape_3346","class":"TODO::Senthil","instance":"SmartShape_3346","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_682","class":"TODO::Senthil","instance":"Text_Caption_682","title":"Previo a la contratación ","roles":{"textData":{}}},{"id":"SmartShape_3347","class":"TODO::Senthil","instance":"SmartShape_3347","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_683","class":"TODO::Senthil","instance":"Text_Caption_683","title":"Seguridad de Gestión de Personas ","roles":{"textData":{}}},{"id":"Slide84491445","class":"Normal Slide","instance":"Objetivos","thumbnail":"dr/Slide84491445_thnail.jpg","children":["Image_2540","Image_2541","Text_Caption_676","Text_Caption_677","Text_Caption_678","Image_2542","Image_2543","Text_Caption_679","Text_Caption_680","Text_Caption_681","Image_2544","Text_Caption_682","Text_Caption_683"],"roles":{"slide":{"durationInFrames":846},"navigation":{"navid":"Slide84491445"}}},{"id":"Image_2545","class":"TODO::Senthil","instance":"Image_2545","roles":{}},{"id":"Image_2546","class":"TODO::Senthil","instance":"Image_2546","roles":{}},{"id":"Image_2547","class":"TODO::Senthil","instance":"Image_2547","roles":{}},{"id":"Text_Caption_684","class":"TODO::Senthil","instance":"Text_Caption_684","title":"Responsabilidades ","roles":{"textData":{}}},{"id":"Image_2548","class":"TODO::Senthil","instance":"Image_2548","roles":{}},{"id":"Image_2549","class":"TODO::Senthil","instance":"Image_2549","roles":{}},{"id":"SmartShape_3348","class":"TODO::Senthil","instance":"SmartShape_3348","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_685","class":"TODO::Senthil","instance":"Text_Caption_685","title":"Durante la permanencia en la Financiera Paraguayo Japonesa ","roles":{"textData":{}}},{"id":"SmartShape_3349","class":"TODO::Senthil","instance":"SmartShape_3349","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_686","class":"TODO::Senthil","instance":"Text_Caption_686","title":"La Alta Dirección debe establecer funciones y responsabilidades adecuadamente definidas para cada funcionario... ","roles":{"textData":{}}},{"id":"Text_Caption_687","class":"TODO::Senthil","instance":"Text_Caption_687","title":"...y las mismas deben ser comunicadas al funcionario previamente al otorgamiento de acceso a los sistemas o a la información. ","roles":{"textData":{}}},{"id":"Slide84492938","class":"Normal Slide","instance":"Objetivos","thumbnail":"dr/Slide84492938_thnail.jpg","children":["Image_2545","Image_2546","Image_2547","Text_Caption_684","Image_2548","Image_2549","Text_Caption_685","Text_Caption_686","Text_Caption_687"],"roles":{"slide":{"durationInFrames":600},"navigation":{"navid":"Slide84492938"}}},{"id":"Image_2550","class":"TODO::Senthil","instance":"Image_2550","roles":{}},{"id":"Image_2551","class":"TODO::Senthil","instance":"Image_2551","roles":{}},{"id":"Image_2552","class":"TODO::Senthil","instance":"Image_2552","roles":{}},{"id":"Image_2553","class":"TODO::Senthil","instance":"Image_2553","roles":{}},{"id":"Image_2554","class":"TODO::Senthil","instance":"Image_2554","roles":{}},{"id":"SmartShape_3350","class":"TODO::Senthil","instance":"SmartShape_3350","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_688","class":"TODO::Senthil","instance":"Text_Caption_688","title":"El área de Seguridad de la Información es responsable de llevar a cabo o (ya sea desde Seguridad de la Información o realizando contratación a un tercero)... ","roles":{"textData":{}}},{"id":"Text_Caption_689","class":"TODO::Senthil","instance":"Text_Caption_689","title":"...el entrenamiento y concienciación de los usuarios con respecto a temas referentes a Seguridad de la Información... ","roles":{"textData":{}}},{"id":"Text_Caption_690","class":"TODO::Senthil","instance":"Text_Caption_690","title":"...con el soporte del área de Gestión de Personas, Gerentes, Sub Gerentes, Jefes y Supervisores de las diferentes áreas. ","roles":{"textData":{}}},{"id":"SmartShape_3351","class":"TODO::Senthil","instance":"SmartShape_3351","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_691","class":"TODO::Senthil","instance":"Text_Caption_691","title":"Concienciación y entrenamiento de Seguridad de la Información ","roles":{"textData":{}}},{"id":"Slide84494083","class":"Normal Slide","instance":"Objetivos","thumbnail":"dr/Slide84494083_thnail.jpg","children":["Image_2550","Image_2551","Image_2552","Image_2553","Image_2554","Text_Caption_688","Text_Caption_689","Text_Caption_690","Text_Caption_691"],"roles":{"slide":{"durationInFrames":783},"navigation":{"navid":"Slide84494083"}}},{"id":"Image_2555","class":"TODO::Senthil","instance":"Image_2555","roles":{}},{"id":"Image_2556","class":"TODO::Senthil","instance":"Image_2556","roles":{}},{"id":"Image_2557","class":"TODO::Senthil","instance":"Image_2557","roles":{}},{"id":"Image_2558","class":"TODO::Senthil","instance":"Image_2558","roles":{}},{"id":"SmartShape_3352","class":"TODO::Senthil","instance":"SmartShape_3352","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_692","class":"TODO::Senthil","instance":"Text_Caption_692","title":"Cualquier incumplimiento de la Política de Seguridad de la Información como también al Manual de Conducta de la Financiera... ","roles":{"textData":{}}},{"id":"Text_Caption_693","class":"TODO::Senthil","instance":"Text_Caption_693","title":"...deberá ser registrado en el legajo del funcionario y aplicar las medidas correspondientes en caso que aplicara. ","roles":{"textData":{}}},{"id":"SmartShape_3353","class":"TODO::Senthil","instance":"SmartShape_3353","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_694","class":"TODO::Senthil","instance":"Text_Caption_694","title":"Proceso de Disciplina ","roles":{"textData":{}}},{"id":"Slide84495223","class":"Normal Slide","instance":"Objetivos","thumbnail":"dr/Slide84495223_thnail.jpg","children":["Image_2555","Image_2556","Image_2557","Image_2558","Text_Caption_692","Text_Caption_693","Text_Caption_694"],"roles":{"slide":{"durationInFrames":447},"navigation":{"navid":"Slide84495223"}}},{"id":"Image_2559","class":"TODO::Senthil","instance":"Image_2559","roles":{}},{"id":"Image_2560","class":"TODO::Senthil","instance":"Image_2560","roles":{}},{"id":"Image_2561","class":"TODO::Senthil","instance":"Image_2561","roles":{}},{"id":"SmartShape_3354","class":"TODO::Senthil","instance":"SmartShape_3354","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_695","class":"TODO::Senthil","instance":"Text_Caption_695","title":"La Entidad establece un proceso de selección de proveedores, a fin de verificar y supervisar el desempeño de los mismos, respecto al manejo de Información. ","roles":{"textData":{}}},{"id":"SmartShape_3355","class":"TODO::Senthil","instance":"SmartShape_3355","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_696","class":"TODO::Senthil","instance":"Text_Caption_696","title":"Proveedores ","roles":{"textData":{}}},{"id":"Slide84496004","class":"Normal Slide","instance":"Objetivos","thumbnail":"dr/Slide84496004_thnail.jpg","children":["Image_2559","Image_2560","Image_2561","Text_Caption_695","Text_Caption_696"],"roles":{"slide":{"durationInFrames":336},"navigation":{"navid":"Slide84496004"}}},{"id":"Image_2816","class":"TODO::Senthil","instance":"Image_2816","roles":{}},{"id":"Image_2817","class":"TODO::Senthil","instance":"Image_2817","roles":{}},{"id":"Image_2818","class":"TODO::Senthil","instance":"Image_2818","roles":{}},{"id":"Text_Caption_710","class":"TODO::Senthil","instance":"Text_Caption_710","title":"Todos los dispositivos móviles que sean de propiedad personal de los funcionarios, como también Laptos, Notebooks, Smartphones, u otros, deben tener una aprobación documentada por el superior y un director... ","roles":{"textData":{}}},{"id":"SmartShape_3376","class":"TODO::Senthil","instance":"SmartShape_3376","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2819","class":"TODO::Senthil","instance":"Image_2819","roles":{}},{"id":"Image_2820","class":"TODO::Senthil","instance":"Image_2820","roles":{}},{"id":"Text_Caption_711","class":"TODO::Senthil","instance":"Text_Caption_711","title":"...antes de conectarse a la red de la Financiera Paraguayo Japonesa o procesar información perteneciente a la Financiera. ","roles":{"textData":{}}},{"id":"SmartShape_3377","class":"TODO::Senthil","instance":"SmartShape_3377","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2821","class":"TODO::Senthil","instance":"Image_2821","roles":{}},{"id":"SmartShape_3378","class":"TODO::Senthil","instance":"SmartShape_3378","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3379","class":"TODO::Senthil","instance":"SmartShape_3379","title":"Dispositivos móviles ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2822","class":"TODO::Senthil","instance":"Image_2822","roles":{}},{"id":"SmartShape_3380","class":"TODO::Senthil","instance":"SmartShape_3380","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3381","class":"TODO::Senthil","instance":"SmartShape_3381","title":"Laptos, Notebooks ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2823","class":"TODO::Senthil","instance":"Image_2823","roles":{}},{"id":"SmartShape_3382","class":"TODO::Senthil","instance":"SmartShape_3382","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3383","class":"TODO::Senthil","instance":"SmartShape_3383","title":"Smartphones ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2824","class":"TODO::Senthil","instance":"Image_2824","roles":{}},{"id":"SmartShape_3384","class":"TODO::Senthil","instance":"SmartShape_3384","title":". ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3385","class":"TODO::Senthil","instance":"SmartShape_3385","title":"u otros ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2825","class":"TODO::Senthil","instance":"Image_2825","roles":{}},{"id":"SmartShape_3386","class":"TODO::Senthil","instance":"SmartShape_3386","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_712","class":"TODO::Senthil","instance":"Text_Caption_712","title":"Utilización de dispositivos móviles propios (BYOD – Bring your own device por sus siglas en inglés) ","roles":{"textData":{}}},{"id":"Slide85559716","class":"Normal Slide","instance":"Ser el objetivo","thumbnail":"dr/Slide85559716_thnail.jpg","children":["Image_2816","Image_2817","Image_2818","Text_Caption_710","Image_2819","Image_2820","Text_Caption_711","Image_2821","Image_2822","Image_2823","Image_2824","Image_2825","Text_Caption_712"],"roles":{"slide":{"durationInFrames":831},"navigation":{"navid":"Slide85559716"}}},{"id":"Image_2826","class":"TODO::Senthil","instance":"Image_2826","roles":{}},{"id":"SmartShape_3375","class":"TODO::Senthil","instance":"SmartShape_3375","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_709","class":"TODO::Senthil","instance":"Text_Caption_709","title":"Control de Acceso ","roles":{"textData":{}}},{"id":"Image_2815","class":"TODO::Senthil","instance":"Image_2815","roles":{}},{"id":"Click_Box_157","class":"TODO::Senthil","instance":"Click_Box_157","roles":{"click":{"subtype":"button"}}},{"id":"Slide85557286","class":"Normal Slide","instance":"Objetivos","thumbnail":"dr/Slide85557286_thnail.jpg","children":["Image_2826","Text_Caption_709","Image_2815","Click_Box_157"],"roles":{"slide":{"durationInFrames":165},"navigation":{"navid":"Slide85557286"}}},{"id":"Image_2827","class":"TODO::Senthil","instance":"Image_2827","roles":{}},{"id":"Image_2838","class":"TODO::Senthil","instance":"Image_2838","roles":{}},{"id":"Image_2839","class":"TODO::Senthil","instance":"Image_2839","roles":{}},{"id":"Image_2840","class":"TODO::Senthil","instance":"Image_2840","roles":{}},{"id":"SmartShape_3387","class":"TODO::Senthil","instance":"SmartShape_3387","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3388","class":"TODO::Senthil","instance":"SmartShape_3388","title":"Dejar evidencia de la eliminación y destrucción. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3389","class":"TODO::Senthil","instance":"SmartShape_3389","title":"Impedir la recuperación de la información destruida o eliminada. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3390","class":"TODO::Senthil","instance":"SmartShape_3390","title":"Si se contrata un servicio de eliminación o destrucción con un tercero... ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3391","class":"TODO::Senthil","instance":"SmartShape_3391","title":"se debe realizar un proceso de selección adecuado, garantizando... ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3392","class":"TODO::Senthil","instance":"SmartShape_3392","title":"...la experiencia, idoneidad, transparencia y definir los acuerdos de servicios claros. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3393","class":"TODO::Senthil","instance":"SmartShape_3393","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_713","class":"TODO::Senthil","instance":"Text_Caption_713","title":"Se debe considerar mecanismos de eliminación o destrucción, de acuerdo con el tipo de dispositivo se debe contemplar: ","roles":{"textData":{}}},{"id":"Image_2829","class":"TODO::Senthil","instance":"Image_2829","roles":{}},{"id":"Image_2830","class":"TODO::Senthil","instance":"Image_2830","roles":{}},{"id":"Image_2831","class":"TODO::Senthil","instance":"Image_2831","roles":{}},{"id":"SmartShape_3395","class":"TODO::Senthil","instance":"SmartShape_3395","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_715","class":"TODO::Senthil","instance":"Text_Caption_715","title":"Destrucción y eliminación de activos ","roles":{"textData":{}}},{"id":"Slide85561365","class":"Normal Slide","instance":"Por qué eres un objetivo?","thumbnail":"dr/Slide85561365_thnail.jpg","children":["Image_2827","Image_2838","Image_2839","Image_2840","Text_Caption_713","Image_2829","Image_2830","Image_2831","Text_Caption_715"],"roles":{"slide":{"durationInFrames":966},"navigation":{"navid":"Slide85561365"}}},{"id":"Image_2850","class":"TODO::Senthil","instance":"Image_2850","roles":{}},{"id":"Image_2841","class":"TODO::Senthil","instance":"Image_2841","roles":{}},{"id":"Image_2851","class":"TODO::Senthil","instance":"Image_2851","roles":{}},{"id":"Image_2852","class":"TODO::Senthil","instance":"Image_2852","roles":{}},{"id":"Image_2853","class":"TODO::Senthil","instance":"Image_2853","roles":{}},{"id":"SmartShape_3400","class":"TODO::Senthil","instance":"SmartShape_3400","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3402","class":"TODO::Senthil","instance":"SmartShape_3402","title":"La Financiera proporcionará mecanismos necesarios que garantice la protección de la información y recursos de la plataforma tecnológica en donde se procesa y almacena... ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3403","class":"TODO::Senthil","instance":"SmartShape_3403","title":"...adoptando controles necesarios para evitar la divulgación, modificación o daño permanente ocasionados por una infección de software malicioso. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3406","class":"TODO::Senthil","instance":"SmartShape_3406","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_721","class":"TODO::Senthil","instance":"Text_Caption_721","title":"Protección contra software malicioso ","roles":{"textData":{}}},{"id":"Slide85579964","class":"Normal Slide","instance":" Evitemos ser un objetivo","thumbnail":"dr/Slide85579964_thnail.jpg","children":["Image_2850","Image_2841","Image_2851","Image_2852","Image_2853","Text_Caption_721"],"roles":{"slide":{"durationInFrames":669},"navigation":{"navid":"Slide85579964"}}},{"id":"Image_2858","class":"TODO::Senthil","instance":"Image_2858","roles":{}},{"id":"Image_2859","class":"TODO::Senthil","instance":"Image_2859","roles":{}},{"id":"Image_2860","class":"TODO::Senthil","instance":"Image_2860","roles":{}},{"id":"Image_2861","class":"TODO::Senthil","instance":"Image_2861","roles":{}},{"id":"SmartShape_3407","class":"TODO::Senthil","instance":"SmartShape_3407","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_723","class":"TODO::Senthil","instance":"Text_Caption_723","title":"Se debe garantizar la generación de copias de respaldo y almacenamiento de su información crítica, proporcionando los recursos necesarios y estableciendo los procedimientos y mecanismos para la realización de estos procedimientos. ","roles":{"textData":{}}},{"id":"SmartShape_3408","class":"TODO::Senthil","instance":"SmartShape_3408","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_722","class":"TODO::Senthil","instance":"Text_Caption_722","title":"Copias de respaldo de la información ","roles":{"textData":{}}},{"id":"Slide85581891","class":"Normal Slide","instance":"Tipos de protección","thumbnail":"dr/Slide85581891_thnail.jpg","children":["Image_2858","Image_2859","Image_2860","Image_2861","Text_Caption_723","Text_Caption_722"],"roles":{"slide":{"durationInFrames":510},"navigation":{"navid":"Slide85581891"}}},{"id":"Image_2870","class":"TODO::Senthil","instance":"Image_2870","roles":{}},{"id":"Image_2871","class":"TODO::Senthil","instance":"Image_2871","roles":{}},{"id":"Text_Caption_724","class":"TODO::Senthil","instance":"Text_Caption_724","title":"La Financiera Paraguayo Japonesa propenderá entre ","roles":{"textData":{}}},{"id":"Text_Caption_727","class":"TODO::Senthil","instance":"Text_Caption_727","title":"los funcionarios y personal tercerizado y proveedores ","roles":{"textData":{}}},{"id":"Text_Caption_725","class":"TODO::Senthil","instance":"Text_Caption_725","title":"el reporte de incidentes relacionados con seguridad de la información, incluyendo cualquier tipo de medio de almacenamiento de información ","roles":{"textData":{}}},{"id":"Text_Caption_729","class":"TODO::Senthil","instance":"Text_Caption_729","title":"(plataforma tecnológica, sistemas de información, medios físicos de almacenamiento y personas). ","roles":{"textData":{}}},{"id":"SmartShape_3411","class":"TODO::Senthil","instance":"SmartShape_3411","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_726","class":"TODO::Senthil","instance":"Text_Caption_726","title":"Incidentes de seguridad de la información ","roles":{"textData":{}}},{"id":"Slide85614603","class":"Normal Slide","instance":"Ataque Phishing","thumbnail":"dr/Slide85614603_thnail.jpg","children":["Image_2870","Image_2871","Text_Caption_724","Text_Caption_727","Text_Caption_725","Text_Caption_729","Text_Caption_726"],"roles":{"slide":{"durationInFrames":762},"navigation":{"navid":"Slide85614603"}}},{"id":"Image_2562","class":"TODO::Senthil","instance":"Image_2562","roles":{}},{"id":"SmartShape_3356","class":"TODO::Senthil","instance":"SmartShape_3356","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_697","class":"TODO::Senthil","instance":"Text_Caption_697","title":"Gestión de continuidad del negocio ","roles":{"textData":{}}},{"id":"Image_2563","class":"TODO::Senthil","instance":"Image_2563","roles":{}},{"id":"Image_2564","class":"TODO::Senthil","instance":"Image_2564","roles":{}},{"id":"Image_2565","class":"TODO::Senthil","instance":"Image_2565","roles":{}},{"id":"Image_2566","class":"TODO::Senthil","instance":"Image_2566","roles":{}},{"id":"Image_2567","class":"TODO::Senthil","instance":"Image_2567","roles":{}},{"id":"SmartShape_3357","class":"TODO::Senthil","instance":"SmartShape_3357","title":"La Financiera Paraguayo Japonesa proporcionará los recursos suficientes para proporcionar una respuesta efectiva de funcionarios y procesos en caso de contingencia o eventos catastróficos que se presenten en la Entidad y que afecten la continuidad de su operación. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3358","class":"TODO::Senthil","instance":"SmartShape_3358","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_698","class":"TODO::Senthil","instance":"Text_Caption_698","title":"Gestión de continuidad del negocio ","roles":{"textData":{}}},{"id":"Slide84496847","class":"Normal Slide","instance":"Por qué eres un objetivo?","thumbnail":"dr/Slide84496847_thnail.jpg","children":["Image_2562","Text_Caption_697","Image_2563","Image_2564","Image_2565","Image_2566","Image_2567","Text_Caption_698"],"roles":{"slide":{"durationInFrames":561},"navigation":{"navid":"Slide84496847"}}},{"id":"Image_2568","class":"TODO::Senthil","instance":"Image_2568","roles":{}},{"id":"SmartShape_3359","class":"TODO::Senthil","instance":"SmartShape_3359","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_699","class":"TODO::Senthil","instance":"Text_Caption_699","title":"Protección de datos personales y privacidad ","roles":{"textData":{}}},{"id":"Image_2569","class":"TODO::Senthil","instance":"Image_2569","roles":{}},{"id":"Image_2570","class":"TODO::Senthil","instance":"Image_2570","roles":{}},{"id":"SmartShape_3360","class":"TODO::Senthil","instance":"SmartShape_3360","title":"La Financiera deberá velar por la protección de los datos personales de sus beneficiarios, proveedores y demás terceros de los cuales reciba y administre información. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3361","class":"TODO::Senthil","instance":"SmartShape_3361","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_700","class":"TODO::Senthil","instance":"Text_Caption_700","title":"Protección de datos personales y privacidad ","roles":{"textData":{}}},{"id":"Slide84497672","class":"Normal Slide","instance":"Por qué eres un objetivo?","thumbnail":"dr/Slide84497672_thnail.jpg","children":["Image_2568","Text_Caption_699","Image_2569","Image_2570","Text_Caption_700"],"roles":{"slide":{"durationInFrames":393},"navigation":{"navid":"Slide84497672"}}},{"id":"Image_2876","class":"TODO::Senthil","instance":"Image_2876","roles":{}},{"id":"Image_2884","class":"TODO::Senthil","instance":"Image_2884","roles":{}},{"id":"SmartShape_3429","class":"TODO::Senthil","instance":"SmartShape_3429","title":"Las redes de la Entidad deberán ser administradas y controladas para proteger la información en los sistemas y aplicaciones. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3431","class":"TODO::Senthil","instance":"SmartShape_3431","title":"La red que soporta los servidores de la plataforma tecnológica de la Entidad debe estar separada en segmentos de red físicos y lógi¬cos e independientes de los segmentos de red de usuarios, de cone-xiones con redes con terceros y del servicio de acceso a Internet. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3432","class":"TODO::Senthil","instance":"SmartShape_3432","title":"Segregación de redes ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3438","class":"TODO::Senthil","instance":"SmartShape_3438","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_731","class":"TODO::Senthil","instance":"Text_Caption_731","title":"Controles de red ","roles":{"textData":{}}},{"id":"Slide85658448","class":"Normal Slide","instance":"El uso de contraseñas de forma segura (2.da parte)","thumbnail":"dr/Slide85658448_thnail.jpg","children":["Image_2876","Image_2884","Text_Caption_731"],"roles":{"slide":{"durationInFrames":831},"navigation":{"navid":"Slide85658448"}}},{"id":"Image_2874","class":"TODO::Senthil","instance":"Image_2874","roles":{}},{"id":"SmartShape_3418","class":"TODO::Senthil","instance":"SmartShape_3418","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_730","class":"TODO::Senthil","instance":"Text_Caption_730","title":"Intercambio de información con partes externas ","roles":{"textData":{}}},{"id":"Image_2873","class":"TODO::Senthil","instance":"Image_2873","roles":{}},{"id":"Click_Box_158","class":"TODO::Senthil","instance":"Click_Box_158","roles":{"click":{"subtype":"button"}}},{"id":"Slide85616102","class":"Normal Slide","instance":"Objetivos","thumbnail":"dr/Slide85616102_thnail.jpg","children":["Image_2874","Text_Caption_730","Image_2873","Click_Box_158"],"roles":{"slide":{"durationInFrames":186},"navigation":{"navid":"Slide85616102"}}},{"id":"Image_2571","class":"TODO::Senthil","instance":"Image_2571","roles":{}},{"id":"Image_2572","class":"TODO::Senthil","instance":"Image_2572","roles":{}},{"id":"Image_2573","class":"TODO::Senthil","instance":"Image_2573","roles":{}},{"id":"Image_2574","class":"TODO::Senthil","instance":"Image_2574","roles":{}},{"id":"SmartShape_3362","class":"TODO::Senthil","instance":"SmartShape_3362","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_701","class":"TODO::Senthil","instance":"Text_Caption_701","title":"La información involucrada en la mensajería electrónica será debidamente protegida. ","roles":{"textData":{}}},{"id":"Image_2575","class":"TODO::Senthil","instance":"Image_2575","roles":{}},{"id":"SmartShape_3363","class":"TODO::Senthil","instance":"SmartShape_3363","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_702","class":"TODO::Senthil","instance":"Text_Caption_702","title":"Acuerdos de confidencialidad o de no divulgación ","roles":{"textData":{}}},{"id":"Image_2576","class":"TODO::Senthil","instance":"Image_2576","roles":{}},{"id":"Image_2577","class":"TODO::Senthil","instance":"Image_2577","roles":{}},{"id":"Image_2578","class":"TODO::Senthil","instance":"Image_2578","roles":{}},{"id":"Image_2579","class":"TODO::Senthil","instance":"Image_2579","roles":{}},{"id":"SmartShape_3364","class":"TODO::Senthil","instance":"SmartShape_3364","title":"Se debe revisar, identificar y documentar regularmente los diferentes requisitos para los acuerdos de confidencialidad o de no divulgación que reflejen las necesidades de la organización para la protección de la información. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3365","class":"TODO::Senthil","instance":"SmartShape_3365","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_703","class":"TODO::Senthil","instance":"Text_Caption_703","title":"Mensajería electrónica ","roles":{"textData":{}}},{"id":"Slide84499294","class":"Normal Slide","instance":"Por qué eres un objetivo?","thumbnail":"dr/Slide84499294_thnail.jpg","children":["Image_2571","Image_2572","Image_2573","Image_2574","Text_Caption_701","Image_2575","Text_Caption_702","Image_2576","Image_2577","Image_2578","Image_2579","Text_Caption_703"],"roles":{"slide":{"durationInFrames":756},"navigation":{"navid":"Slide84499294"}}},{"id":"Image_2834","class":"TODO::Senthil","instance":"Image_2834","roles":{}},{"id":"SmartShape_3396","class":"TODO::Senthil","instance":"SmartShape_3396","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_716","class":"TODO::Senthil","instance":"Text_Caption_716","title":"Relaciones con los proveedores ","roles":{"textData":{}}},{"id":"Image_2833","class":"TODO::Senthil","instance":"Image_2833","roles":{}},{"id":"Click_Box_159","class":"TODO::Senthil","instance":"Click_Box_159","roles":{"click":{"subtype":"button"}}},{"id":"Slide85561754","class":"Normal Slide","instance":"Objetivos","thumbnail":"dr/Slide85561754_thnail.jpg","children":["Image_2834","Text_Caption_716","Image_2833","Click_Box_159"],"roles":{"slide":{"durationInFrames":165},"navigation":{"navid":"Slide85561754"}}},{"id":"Image_2580","class":"TODO::Senthil","instance":"Image_2580","roles":{}},{"id":"Image_2581","class":"TODO::Senthil","instance":"Image_2581","roles":{}},{"id":"Image_2582","class":"TODO::Senthil","instance":"Image_2582","roles":{}},{"id":"Image_2583","class":"TODO::Senthil","instance":"Image_2583","roles":{}},{"id":"SmartShape_3366","class":"TODO::Senthil","instance":"SmartShape_3366","title":"Garantizar un enfoque coherente y eficaz para la gestión de incidentes en la seguridad de la información, incluyendo la comunicación de eventos de seguridad y debilidades. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3368","class":"TODO::Senthil","instance":"SmartShape_3368","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_705","class":"TODO::Senthil","instance":"Text_Caption_705","title":"Gestión de incidentes de seguridad de la información y mejoras ","roles":{"textData":{}}},{"id":"Image_2585","class":"TODO::Senthil","instance":"Image_2585","roles":{}},{"id":"Image_2586","class":"TODO::Senthil","instance":"Image_2586","roles":{}},{"id":"Image_2587","class":"TODO::Senthil","instance":"Image_2587","roles":{}},{"id":"SmartShape_3369","class":"TODO::Senthil","instance":"SmartShape_3369","title":"Evitar el incumplimiento de las obligaciones legales, estatutarias, reglamentarias o contractuales relacionadas con la seguridad de la información y de los requisitos de seguridad. Las situaciones o acciones que violen la presente Política deben ser detectadas, registradas, analizadas, resueltas y reportadas de manera inmediata a través de los canales señalados para el efecto a los dueños de procesos o al Comité de TI. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3370","class":"TODO::Senthil","instance":"SmartShape_3370","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_706","class":"TODO::Senthil","instance":"Text_Caption_706","title":"Cumplimiento de los requisitos legales y contractuales ","roles":{"textData":{}}},{"id":"Image_2654","class":"TODO::Senthil","instance":"Image_2654","roles":{}},{"id":"Image_2655","class":"TODO::Senthil","instance":"Image_2655","roles":{}},{"id":"Image_2656","class":"TODO::Senthil","instance":"Image_2656","roles":{}},{"id":"SmartShape_3371","class":"TODO::Senthil","instance":"SmartShape_3371","title":"Se aplicarán procedimientos apropiados para garantizar el cumplimiento de requisitos legales, reglamentarios y contractuales, relacionados con los derechos de propiedad intelectual y uso de productos de software propietario. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3372","class":"TODO::Senthil","instance":"SmartShape_3372","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_707","class":"TODO::Senthil","instance":"Text_Caption_707","title":"Derechos de propiedad intelectual ","roles":{"textData":{}}},{"id":"Image_2714","class":"TODO::Senthil","instance":"Image_2714","roles":{}},{"id":"Image_2715","class":"TODO::Senthil","instance":"Image_2715","roles":{}},{"id":"Image_2716","class":"TODO::Senthil","instance":"Image_2716","roles":{}},{"id":"SmartShape_3373","class":"TODO::Senthil","instance":"SmartShape_3373","title":"El acceso a la red Internet se realizará a través de equipos especializados como ser servidores Proxy, el cual podrá restringir el acceso a ciertas páginas consideradas dañinas o que afecten a la moral y las buenas costumbres o puedan degradar la performance de las comunicaciones. ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_3374","class":"TODO::Senthil","instance":"SmartShape_3374","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_708","class":"TODO::Senthil","instance":"Text_Caption_708","title":"Acceso a Internet ","roles":{"textData":{}}},{"id":"Image_2765","class":"TODO::Senthil","instance":"Image_2765","roles":{}},{"id":"Image_2766","class":"TODO::Senthil","instance":"Image_2766","roles":{}},{"id":"Image_2767","class":"TODO::Senthil","instance":"Image_2767","roles":{}},{"id":"SmartShape_3367","class":"TODO::Senthil","instance":"SmartShape_3367","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_704","class":"TODO::Senthil","instance":"Text_Caption_704","title":"Gestión de incidentes de seguridad de información ","roles":{"textData":{}}},{"id":"Slide84500788","class":"Normal Slide","instance":"Por qué eres un objetivo?","thumbnail":"dr/Slide84500788_thnail.jpg","children":["Image_2580","Image_2581","Image_2582","Image_2583","Text_Caption_705","Image_2585","Image_2586","Image_2587","Text_Caption_706","Image_2654","Image_2655","Image_2656","Text_Caption_707","Image_2714","Image_2715","Image_2716","Text_Caption_708","Image_2765","Image_2766","Image_2767","Text_Caption_704"],"roles":{"slide":{"durationInFrames":2430},"navigation":{"navid":"Slide84500788"}}},{"id":"Image_2835","class":"TODO::Senthil","instance":"Image_2835","roles":{}},{"id":"SmartShape_3321","class":"TODO::Senthil","instance":"SmartShape_3321","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_645","class":"TODO::Senthil","instance":"Text_Caption_645","title":"Agradecimientos ","roles":{"textData":{}}},{"id":"SmartShape_3398","class":"TODO::Senthil","instance":"SmartShape_3398","title":"¡Muchas gracias por tu participación y éxitos ahora, al aplicar lo aprendido y al resolver la evaluación! ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Slide84481574","class":"Normal Slide","instance":"Agradecimientos","thumbnail":"dr/Slide84481574_thnail.jpg","children":["Image_2835","Text_Caption_645"],"roles":{"slide":{"durationInFrames":216},"navigation":{"navid":"Slide84481574"}}},{"id":"SmartShape_3399","class":"TODO::Senthil","instance":"SmartShape_3399","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_2836","class":"TODO::Senthil","instance":"Image_2836","roles":{}},{"id":"Image_2837","class":"TODO::Senthil","instance":"Image_2837","roles":{}},{"id":"Slide85577932","class":"Normal Slide","instance":"","thumbnail":"dr/Slide85577932_thnail.jpg","children":["Image_2836","Image_2837"],"roles":{"slide":{"durationInFrames":156},"navigation":{"navid":"Slide85577932"}}},{"id":"SEGURIDAD-INFORMACION","class":"project","title":"SEGURIDAD-INFORMACION","children":["Slide74144602","Slide81722271","Slide46793123","Slide46795112","Slide46797087","Slide46798804","Slide46800816","Slide46802971","Slide46804514","Slide46806528","Slide46807867","Slide46810084","Slide46811858","Slide46813831","Slide33487864","Slide33487282","Slide33489415","Slide81984022","Slide84444844","Slide84447895","Slide84451228","Slide84452382","Slide84454342","Slide84455557","Slide84458466","Slide84460954","Slide84462351","Slide84463980","Slide84466225","Slide84470086","Slide84472851","Slide84476693","Slide84479592","Slide84481208","Slide84483634","Slide84484920","Slide84486822","Slide84488715","Slide84489114","Slide84489886","Slide84491445","Slide84492938","Slide84494083","Slide84495223","Slide84496004","Slide85559716","Slide85557286","Slide85561365","Slide85579964","Slide85581891","Slide85614603","Slide84496847","Slide84497672","Slide85658448","Slide85616102","Slide84499294","Slide85561754","Slide84500788","Slide84481574","Slide85577932"],"roles":{"quiz":{"id":455,"branched":false,"submitAll":false,"review":true,"questions":[],"minScore":0,"maxScore":0,"passScore":0}}}],"contentSettings":{"global":{"branchAware":false},"toc":{"enabled":false},"playbar":{"enabled":true}},"contentReporting":{"CCCriteria":"launch_content","SCCriteria":"launch_content","exitNormalIfCompleted":false},"toc":[{"id":"Slide74144602","title":"Slide 1"},{"id":"Slide81722271","title":"Objetivos"},{"id":"Slide46793123","title":"Ser el objetivo"},{"id":"Slide46795112","title":"Por qué eres un objetivo?"},{"id":"Slide46797087","title":"Por qué eres un objetivo?"},{"id":"Slide46798804","title":" Evitemos ser un objetivo"},{"id":"Slide46800816","title":" Evitemos ser un objetivo"},{"id":"Slide46802971","title":"Protégete"},{"id":"Slide46804514","title":"Varias medidas para la protección"},{"id":"Slide46806528","title":"Cuidados aplicados al e-mail"},{"id":"Slide46807867","title":"Ataque Phishing"},{"id":"Slide46810084","title":"Ataque Phishing"},{"id":"Slide46811858","title":"Ataque phishing (2.da parte)"},{"id":"Slide46813831","title":"Ataque phishing (3ra parte)"},{"id":"Slide33487864","title":"Tipos de protección"},{"id":"Slide33487282","title":"Tipos de protección"},{"id":"Slide33489415","title":"Más medidas de protección"},{"id":"Slide81984022","title":"En resumen..."},{"id":"Slide84444844","title":"Spear Phishing"},{"id":"Slide84447895","title":"Efectividad del Spear Phishing"},{"id":"Slide84451228","title":"Efectividad del Spear Phishing"},{"id":"Slide84452382","title":"Medidas de protección de spear phishing"},{"id":"Slide84454342","title":"Medidas de protección de spear phishing"},{"id":"Slide84455557","title":"Las redes sociales"},{"id":"Slide84458466","title":"Privacidad"},{"id":"Slide84460954","title":"Consejos de seguridad"},{"id":"Slide84462351","title":"Las contraseñas"},{"id":"Slide84463980","title":"¿Por qué una contraseña es débil?"},{"id":"Slide84466225","title":"Consejos de seguridad"},{"id":"Slide84470086","title":"Contraseñas seguras: passphrases"},{"id":"Slide84472851","title":"Más acerca de las passphrases"},{"id":"Slide84476693","title":"El uso de contraseñas de forma segura"},{"id":"Slide84479592","title":"El uso de contraseñas de forma segura (2.da parte)"},{"id":"Slide84481208","title":"En resumen..."},{"id":"Slide84483634","title":"Por qué eres un objetivo?"},{"id":"Slide84484920","title":"Más medidas de protección"},{"id":"Slide84486822","title":"Objetivos"},{"id":"Slide84488715","title":"Objetivos"},{"id":"Slide84489114","title":"Objetivos"},{"id":"Slide84489886","title":"Objetivos"},{"id":"Slide84491445","title":"Objetivos"},{"id":"Slide84492938","title":"Objetivos"},{"id":"Slide84494083","title":"Objetivos"},{"id":"Slide84495223","title":"Objetivos"},{"id":"Slide84496004","title":"Objetivos"},{"id":"Slide85559716","title":"Ser el objetivo"},{"id":"Slide85557286","title":"Objetivos"},{"id":"Slide85561365","title":"Por qué eres un objetivo?"},{"id":"Slide85579964","title":" Evitemos ser un objetivo"},{"id":"Slide85581891","title":"Tipos de protección"},{"id":"Slide85614603","title":"Ataque Phishing"},{"id":"Slide84496847","title":"Por qué eres un objetivo?"},{"id":"Slide84497672","title":"Por qué eres un objetivo?"},{"id":"Slide85658448","title":"El uso de contraseñas de forma segura (2.da parte)"},{"id":"Slide85616102","title":"Objetivos"},{"id":"Slide84499294","title":"Por qué eres un objetivo?"},{"id":"Slide85561754","title":"Objetivos"},{"id":"Slide84500788","title":"Por qué eres un objetivo?"},{"id":"Slide84481574","title":"Agradecimientos"},{"id":"Slide85577932","title":"Slide 60"}]}
Sindbad File Manager Version 1.0, Coded By Sindbad EG ~ The Terrorists