Sindbad~EG File Manager

Current Path : /var/www/moodledata/mdata-demo/filedir/6d/1f/
Upload File :
Current File : /var/www/moodledata/mdata-demo/filedir/6d/1f/6d1f37a1239f7f171e6622580867edcb5c816add

{"metadata":{"generator":"Captivate","generatorVersion":"8.0.1","schemaVersion":"","author":"author","title":"","description":"project description","email":"author@company.com","website":"www.company.com","tags":"","thumbnail":"","source":"assets","durationInFrames":47559,"frameRate":30,"totalSlides":50,"width":1920,"height":1080,"responsive":false,"scalable":true,"launchFile":"index.html"},"contentStructure":[{"id":"si1315","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si1334","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si4766","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si4781","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_1","class":"TODO::Senthil","instance":"SmartShape_1","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_1","class":"TODO::Senthil","instance":"Image_1","roles":{}},{"id":"Image_2","class":"TODO::Senthil","instance":"Image_2","roles":{}},{"id":"Slide4754","class":"Normal Slide","instance":"","thumbnail":"dr/Slide4754_thnail.jpg","children":["Image_1","Image_2"],"roles":{"slide":{"durationInFrames":138},"navigation":{"navid":"Slide4754"}}},{"id":"si6703","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si6718","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_2","class":"TODO::Senthil","instance":"SmartShape_2","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_88","class":"TODO::Senthil","instance":"SmartShape_88","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_379","class":"TODO::Senthil","instance":"Image_379","roles":{}},{"id":"Image_378","class":"TODO::Senthil","instance":"Image_378","roles":{}},{"id":"Text_Caption_273","class":"TODO::Senthil","instance":"Text_Caption_273","title":"BIENVENIDOS A ESTE CURSO DE ","roles":{"textData":{}}},{"id":"Text_Caption_5","class":"TODO::Senthil","instance":"Text_Caption_5","title":"\"CIBERSEGURIDAD,  CIBERCRIMEN Y TIPOLOGÍAS” ","roles":{"textData":{}}},{"id":"Image_380","class":"TODO::Senthil","instance":"Image_380","roles":{}},{"id":"Slide6702","class":"Normal Slide","instance":"","thumbnail":"dr/Slide6702_thnail.jpg","children":["Image_379","Image_378","Text_Caption_273","Text_Caption_5","Image_380"],"roles":{"slide":{"durationInFrames":240},"navigation":{"navid":"Slide6702"}}},{"id":"si47740","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si47755","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_71","class":"TODO::Senthil","instance":"SmartShape_71","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_53","class":"TODO::Senthil","instance":"Text_Caption_53","title":"Consiste en la protección de activos de información mediante el tratamiento de las amenazas existentes para la información que  es procesada... ","roles":{"textData":{}}},{"id":"Text_Caption_278","class":"TODO::Senthil","instance":"Text_Caption_278","title":"...almacenada y transportada por sistemas de información que se encuentran conectados en el ciberespacio. ","roles":{"textData":{}}},{"id":"Image_190","class":"TODO::Senthil","instance":"Image_190","roles":{}},{"id":"Image_188","class":"TODO::Senthil","instance":"Image_188","roles":{}},{"id":"SmartShape_89","class":"TODO::Senthil","instance":"SmartShape_89","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_90","class":"TODO::Senthil","instance":"SmartShape_90","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_276","class":"TODO::Senthil","instance":"Text_Caption_276","title":"CIBERSEGURIDAD ","roles":{"textData":{}}},{"id":"Image_381","class":"TODO::Senthil","instance":"Image_381","roles":{}},{"id":"SmartShape_91","class":"TODO::Senthil","instance":"SmartShape_91","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_279","class":"TODO::Senthil","instance":"Text_Caption_279","title":"¿QUÉ ES LA  CIBERSEGURIDAD ?    ","roles":{"textData":{}}},{"id":"Image_383","class":"TODO::Senthil","instance":"Image_383","roles":{}},{"id":"Slide47739","class":"Normal Slide","instance":"","thumbnail":"dr/Slide47739_thnail.jpg","children":["Text_Caption_53","Text_Caption_278","Image_190","Image_188","Text_Caption_276","Image_381","Text_Caption_279","Image_383"],"roles":{"slide":{"durationInFrames":651},"navigation":{"navid":"Slide47739"}}},{"id":"si54072","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si54087","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_76","class":"TODO::Senthil","instance":"SmartShape_76","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_197","class":"TODO::Senthil","instance":"Image_197","roles":{}},{"id":"Image_199","class":"TODO::Senthil","instance":"Image_199","roles":{}},{"id":"Image_198","class":"TODO::Senthil","instance":"Image_198","roles":{}},{"id":"SmartShape_92","class":"TODO::Senthil","instance":"SmartShape_92","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_93","class":"TODO::Senthil","instance":"SmartShape_93","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_280","class":"TODO::Senthil","instance":"Text_Caption_280","title":"PILARES DE LA CIBERSEGURIDAD ","roles":{"textData":{}}},{"id":"Image_384","class":"TODO::Senthil","instance":"Image_384","roles":{}},{"id":"Text_Caption_281","class":"TODO::Senthil","instance":"Text_Caption_281","title":"INTEGRIDAD ","roles":{"textData":{}}},{"id":"Text_Caption_282","class":"TODO::Senthil","instance":"Text_Caption_282","title":"DISPOSICIÓN ","roles":{"textData":{}}},{"id":"Text_Caption_283","class":"TODO::Senthil","instance":"Text_Caption_283","title":"CONFIABILIDAD ","roles":{"textData":{}}},{"id":"SmartShape_98","class":"TODO::Senthil","instance":"SmartShape_98","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_385","class":"TODO::Senthil","instance":"Image_385","roles":{}},{"id":"Text_Caption_284","class":"TODO::Senthil","instance":"Text_Caption_284","title":"PILARES DE LA  CIBERSEGURIDAD    ","roles":{"textData":{}}},{"id":"Slide54071","class":"Normal Slide","instance":"","thumbnail":"dr/Slide54071_thnail.jpg","children":["Image_197","Image_199","Image_198","Text_Caption_280","Image_384","Text_Caption_281","Text_Caption_282","Text_Caption_283","Image_385","Text_Caption_284"],"roles":{"slide":{"durationInFrames":261},"navigation":{"navid":"Slide54071"}}},{"id":"si54329","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si54344","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_79","class":"TODO::Senthil","instance":"SmartShape_79","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_55","class":"TODO::Senthil","instance":"Text_Caption_55","title":"Los delitos informáticos son todas las acciones dirigidas a lesionar la integridad, disposición y confiabilidad de datos y de sistemas informáticos... ","roles":{"textData":{}}},{"id":"Text_Caption_288","class":"TODO::Senthil","instance":"Text_Caption_288","title":"...así como aquellas conductas que atentan contra el patrimonio de las personas utilizando herramientas tecnológicas e informáticas. ","roles":{"textData":{}}},{"id":"Image_208","class":"TODO::Senthil","instance":"Image_208","roles":{}},{"id":"Image_209","class":"TODO::Senthil","instance":"Image_209","roles":{}},{"id":"Image_210","class":"TODO::Senthil","instance":"Image_210","roles":{}},{"id":"Image_391","class":"TODO::Senthil","instance":"Image_391","roles":{}},{"id":"Image_392","class":"TODO::Senthil","instance":"Image_392","roles":{}},{"id":"Image_393","class":"TODO::Senthil","instance":"Image_393","roles":{}},{"id":"SmartShape_104","class":"TODO::Senthil","instance":"SmartShape_104","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_56","class":"TODO::Senthil","instance":"Text_Caption_56","title":"Pornografía Relativa a niños y adolescentes ","roles":{"textData":{}}},{"id":"SmartShape_105","class":"TODO::Senthil","instance":"SmartShape_105","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_57","class":"TODO::Senthil","instance":"Text_Caption_57","title":"Acceso indebido a datos ","roles":{"textData":{}}},{"id":"SmartShape_106","class":"TODO::Senthil","instance":"SmartShape_106","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_58","class":"TODO::Senthil","instance":"Text_Caption_58","title":"Interceptación ","roles":{"textData":{}}},{"id":"SmartShape_107","class":"TODO::Senthil","instance":"SmartShape_107","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_59","class":"TODO::Senthil","instance":"Text_Caption_59","title":"Preparación al acceso indebido a datos ","roles":{"textData":{}}},{"id":"SmartShape_108","class":"TODO::Senthil","instance":"SmartShape_108","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_60","class":"TODO::Senthil","instance":"Text_Caption_60","title":"Alteración de datos ","roles":{"textData":{}}},{"id":"SmartShape_109","class":"TODO::Senthil","instance":"SmartShape_109","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_61","class":"TODO::Senthil","instance":"Text_Caption_61","title":"Acceso indebido a sistemas informáticos ","roles":{"textData":{}}},{"id":"SmartShape_110","class":"TODO::Senthil","instance":"SmartShape_110","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_62","class":"TODO::Senthil","instance":"Text_Caption_62","title":"Sabotaje a sistemas informáticos ","roles":{"textData":{}}},{"id":"SmartShape_111","class":"TODO::Senthil","instance":"SmartShape_111","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_63","class":"TODO::Senthil","instance":"Text_Caption_63","title":"Alteración de datos relevantes ","roles":{"textData":{}}},{"id":"SmartShape_112","class":"TODO::Senthil","instance":"SmartShape_112","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_64","class":"TODO::Senthil","instance":"Text_Caption_64","title":"Falsificación de tarjetas de crédito y débito y estafa mediante sistemas informáticos ","roles":{"textData":{}}},{"id":"SmartShape_99","class":"TODO::Senthil","instance":"SmartShape_99","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_386","class":"TODO::Senthil","instance":"Image_386","roles":{}},{"id":"Text_Caption_285","class":"TODO::Senthil","instance":"Text_Caption_285","title":"CIBERCRIMEN  LOS DELITOS INFORMÁTICOS  ","roles":{"textData":{}}},{"id":"Image_389","class":"TODO::Senthil","instance":"Image_389","roles":{}},{"id":"SmartShape_102","class":"TODO::Senthil","instance":"SmartShape_102","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_290","class":"TODO::Senthil","instance":"Text_Caption_290","title":"LEY QUE SANCIONA LOS DELITOS  INFORMÁTICOS EN PARAGUAY ","roles":{"textData":{}}},{"id":"Image_390","class":"TODO::Senthil","instance":"Image_390","roles":{}},{"id":"SmartShape_103","class":"TODO::Senthil","instance":"SmartShape_103","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_292","class":"TODO::Senthil","instance":"Text_Caption_292","title":"Ley N. ° 4439 / MODIFICA Y AMPLIA VARIOS  ARTICULOS DE LA LEY N° 1160/97 “CODIGO PENAL ","roles":{"textData":{}}},{"id":"SmartShape_100","class":"TODO::Senthil","instance":"SmartShape_100","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_101","class":"TODO::Senthil","instance":"SmartShape_101","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_287","class":"TODO::Senthil","instance":"Text_Caption_287","title":"CIBERCRIMEN - DELITOS INFORMÁTICOS ","roles":{"textData":{}}},{"id":"Image_387","class":"TODO::Senthil","instance":"Image_387","roles":{}},{"id":"Image_394","class":"TODO::Senthil","instance":"Image_394","roles":{}},{"id":"Image_395","class":"TODO::Senthil","instance":"Image_395","roles":{}},{"id":"Image_396","class":"TODO::Senthil","instance":"Image_396","roles":{}},{"id":"Slide54328","class":"Normal Slide","instance":"","thumbnail":"dr/Slide54328_thnail.jpg","children":["Text_Caption_55","Text_Caption_288","Image_208","Image_209","Image_210","Image_391","Image_392","Image_393","Text_Caption_56","Text_Caption_57","Text_Caption_58","Text_Caption_59","Text_Caption_60","Text_Caption_61","Text_Caption_62","Text_Caption_63","Text_Caption_64","Image_386","Text_Caption_285","Image_389","Text_Caption_290","Image_390","Text_Caption_292","Text_Caption_287","Image_387","Image_394","Image_395","Image_396"],"roles":{"slide":{"durationInFrames":2238},"navigation":{"navid":"Slide54328"}}},{"id":"si12683","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si12698","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_6","class":"TODO::Senthil","instance":"SmartShape_6","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_7","class":"TODO::Senthil","instance":"SmartShape_7","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_8","class":"TODO::Senthil","instance":"SmartShape_8","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_6","class":"TODO::Senthil","instance":"Text_Caption_6","title":"Principales Delitos Informáticos  ","roles":{"textData":{}}},{"id":"Image_7","class":"TODO::Senthil","instance":"Image_7","roles":{}},{"id":"SmartShape_21","class":"TODO::Senthil","instance":"SmartShape_21","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_40","class":"TODO::Senthil","instance":"SmartShape_40","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_9","class":"TODO::Senthil","instance":"Text_Caption_9","title":"Art. 140.- Pornografía relativa a niños y adolescentes. ","roles":{"textData":{}}},{"id":"Text_Caption_38","class":"TODO::Senthil","instance":"Text_Caption_38","title":"Artículo 146 b.- Acceso indebido a datos ","roles":{"textData":{}}},{"id":"SmartShape_41","class":"TODO::Senthil","instance":"SmartShape_41","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_39","class":"TODO::Senthil","instance":"Text_Caption_39","title":"Artículo 146 c.- Interceptación de datos. ","roles":{"textData":{}}},{"id":"SmartShape_42","class":"TODO::Senthil","instance":"SmartShape_42","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_40","class":"TODO::Senthil","instance":"Text_Caption_40","title":"Artículo 146 d.- Preparación de acceso indebido e interceptación de datos. ","roles":{"textData":{}}},{"id":"SmartShape_43","class":"TODO::Senthil","instance":"SmartShape_43","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_41","class":"TODO::Senthil","instance":"Text_Caption_41","title":"Artículo 174 b.- Acceso indebido a sistemas informáticos ","roles":{"textData":{}}},{"id":"SmartShape_44","class":"TODO::Senthil","instance":"SmartShape_44","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_42","class":"TODO::Senthil","instance":"Text_Caption_42","title":"Artículo 188.- Estafa mediante sistemas informáticos ","roles":{"textData":{}}},{"id":"SmartShape_45","class":"TODO::Senthil","instance":"SmartShape_45","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_43","class":"TODO::Senthil","instance":"Text_Caption_43","title":"Artículo 248 b.- Falsificación de tarjetas de débito o de crédito y otros medios electrónicos de pago. ","roles":{"textData":{}}},{"id":"Image_30","class":"TODO::Senthil","instance":"Image_30","roles":{}},{"id":"Image_31","class":"TODO::Senthil","instance":"Image_31","roles":{}},{"id":"Image_32","class":"TODO::Senthil","instance":"Image_32","roles":{}},{"id":"Image_33","class":"TODO::Senthil","instance":"Image_33","roles":{}},{"id":"Image_34","class":"TODO::Senthil","instance":"Image_34","roles":{}},{"id":"Image_35","class":"TODO::Senthil","instance":"Image_35","roles":{}},{"id":"Image_36","class":"TODO::Senthil","instance":"Image_36","roles":{}},{"id":"Click_Box_8","class":"TODO::Senthil","instance":"Click_Box_8","roles":{"click":{"subtype":"button"}}},{"id":"Click_Box_9","class":"TODO::Senthil","instance":"Click_Box_9","roles":{"click":{"subtype":"button"}}},{"id":"Click_Box_10","class":"TODO::Senthil","instance":"Click_Box_10","roles":{"click":{"subtype":"button"}}},{"id":"Click_Box_11","class":"TODO::Senthil","instance":"Click_Box_11","roles":{"click":{"subtype":"button"}}},{"id":"Click_Box_12","class":"TODO::Senthil","instance":"Click_Box_12","roles":{"click":{"subtype":"button"}}},{"id":"Click_Box_13","class":"TODO::Senthil","instance":"Click_Box_13","roles":{"click":{"subtype":"button"}}},{"id":"Click_Box_14","class":"TODO::Senthil","instance":"Click_Box_14","roles":{"click":{"subtype":"button"}}},{"id":"Text_Caption_75","class":"TODO::Senthil","instance":"Text_Caption_75","title":"Siguiente tema ","roles":{"textData":{}}},{"id":"Image_229","class":"TODO::Senthil","instance":"Image_229","roles":{}},{"id":"Click_Box_32","class":"TODO::Senthil","instance":"Click_Box_32","roles":{"click":{"subtype":"button"}}},{"id":"Slide12682","class":"Normal Slide","instance":"","thumbnail":"dr/Slide12682_thnail.jpg","children":["Text_Caption_6","Image_7","Text_Caption_9","Text_Caption_38","Text_Caption_39","Text_Caption_40","Text_Caption_41","Text_Caption_42","Text_Caption_43","Image_30","Image_31","Image_32","Image_33","Image_34","Image_35","Image_36","Click_Box_8","Click_Box_9","Click_Box_10","Click_Box_11","Click_Box_12","Click_Box_13","Click_Box_14","Text_Caption_75","Image_229","Click_Box_32"],"roles":{"slide":{"durationInFrames":207},"navigation":{"navid":"Slide12682"}}},{"id":"si14721","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si14736","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_82","class":"TODO::Senthil","instance":"SmartShape_82","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_35","class":"TODO::Senthil","instance":"SmartShape_35","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_38","class":"TODO::Senthil","instance":"SmartShape_38","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_34","class":"TODO::Senthil","instance":"Text_Caption_34","title":"Art. 140.- Pornografía relativa  a niños y adolescentes. ","roles":{"textData":{}}},{"id":"Text_Caption_35","class":"TODO::Senthil","instance":"Text_Caption_35","title":"El que produjere publicaciones, que representen actos sexuales con participación de personas menores de dieciocho años de edad o la exhibición de sus partes genitales; organizara, financiara o promocionara espectáculos, públicos o privados, en los que participe... ","roles":{"textData":{}}},{"id":"SmartShape_39","class":"TODO::Senthil","instance":"SmartShape_39","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_36","class":"TODO::Senthil","instance":"Text_Caption_36","title":"El Grooming ¿Qué es? ","roles":{"textData":{}}},{"id":"Text_Caption_37","class":"TODO::Senthil","instance":"Text_Caption_37","title":"Grooming es la acción deliberada de un adulto, varón o mujer, de acosar sexualmente a una niña, niño o adolescente a través de un medio digital que permita la interacción entre dos o más personas, como por ejemplo redes sociales, correo electrónico, mensajes de texto,  sitios de chat o juegos en línea. ","roles":{"textData":{}}},{"id":"Image_29","class":"TODO::Senthil","instance":"Image_29","roles":{}},{"id":"SmartShape_52","class":"TODO::Senthil","instance":"SmartShape_52","title":"volver al menú ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Click_Box_7","class":"TODO::Senthil","instance":"Click_Box_7","roles":{"click":{"subtype":"button"}}},{"id":"Image_144","class":"TODO::Senthil","instance":"Image_144","roles":{}},{"id":"Text_Caption_293","class":"TODO::Senthil","instance":"Text_Caption_293","title":" ...una persona menor de 18 años en la realización de  actos sexuales, distribuyera, importara, exportara, ofertara, canjeara, exhibiera, difundiera, promocionara o financiara la producción o reproducción  de publicaciones. ","roles":{"textData":{}}},{"id":"Image_397","class":"TODO::Senthil","instance":"Image_397","roles":{}},{"id":"Image_398","class":"TODO::Senthil","instance":"Image_398","roles":{}},{"id":"SmartShape_119","class":"TODO::Senthil","instance":"SmartShape_119","title":"ver video explicativo ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Click_Box_37","class":"TODO::Senthil","instance":"Click_Box_37","roles":{"click":{"subtype":"button"}}},{"id":"Image_400","class":"TODO::Senthil","instance":"Image_400","roles":{}},{"id":"Slide14720","class":"Normal Slide","instance":"","thumbnail":"dr/Slide14720_thnail.jpg","children":["Text_Caption_34","Text_Caption_35","Text_Caption_36","Text_Caption_37","Image_29","Click_Box_7","Image_144","Text_Caption_293","Image_397","Image_398","Click_Box_37","Image_400"],"roles":{"slide":{"durationInFrames":1878},"navigation":{"navid":"Slide14720"}}},{"id":"si13060","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si13075","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_9","class":"TODO::Senthil","instance":"SmartShape_9","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_20","class":"TODO::Senthil","instance":"SmartShape_20","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_14","class":"TODO::Senthil","instance":"Text_Caption_14","title":"Artículo 146 b Acceso indebido a datos ","roles":{"textData":{}}},{"id":"Text_Caption_15","class":"TODO::Senthil","instance":"Text_Caption_15","title":"1° El que sin autorización y violando sistemas de seguridad obtuviere para sí o para terceros, el acceso a datos no destinados a él y especialmente protegidos contra el acceso no autorizado, será castigado con pena privativa de libertad  de hasta tres años o multa.  ","roles":{"textData":{}}},{"id":"Text_Caption_294","class":"TODO::Senthil","instance":"Text_Caption_294","title":"2° Como datos, se entenderán solo aquellos, que se almacenan o transmiten electrónicamente, magnéticamente o de otra manera no inmediatamente visible.  ","roles":{"textData":{}}},{"id":"Image_12","class":"TODO::Senthil","instance":"Image_12","roles":{}},{"id":"SmartShape_51","class":"TODO::Senthil","instance":"SmartShape_51","title":"volver al menú ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Click_Box_6","class":"TODO::Senthil","instance":"Click_Box_6","roles":{"click":{"subtype":"button"}}},{"id":"Image_145","class":"TODO::Senthil","instance":"Image_145","roles":{}},{"id":"Slide13059","class":"Normal Slide","instance":"","thumbnail":"dr/Slide13059_thnail.jpg","children":["Text_Caption_14","Text_Caption_15","Text_Caption_294","Image_12","Click_Box_6","Image_145"],"roles":{"slide":{"durationInFrames":975},"navigation":{"navid":"Slide13059"}}},{"id":"si13291","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si13306","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_12","class":"TODO::Senthil","instance":"SmartShape_12","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_19","class":"TODO::Senthil","instance":"SmartShape_19","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_19","class":"TODO::Senthil","instance":"Text_Caption_19","title":"Artículo 146 c.  Interceptación de datos. ","roles":{"textData":{}}},{"id":"Text_Caption_20","class":"TODO::Senthil","instance":"Text_Caption_20","title":"El que, sin autorización y utilizando medios técnicos:  ","roles":{"textData":{}}},{"id":"Text_Caption_295","class":"TODO::Senthil","instance":"Text_Caption_295","title":"1° obtuviere para sí o para un tercero, datos en sentido del Artículo 146 b, inciso 2°, no destinados para él; ","roles":{"textData":{}}},{"id":"Text_Caption_296","class":"TODO::Senthil","instance":"Text_Caption_296","title":"2° diera a otro una transferencia no pública de datos;  ","roles":{"textData":{}}},{"id":"Text_Caption_297","class":"TODO::Senthil","instance":"Text_Caption_297","title":"3° o transfiriera la radiación electromagnética de un equipo de procesamiento de datos, será castigado con pena privativa de libertad de hasta dos años o multa, salvo que el hecho sea sancionado por otra disposición con una pena mayor. ","roles":{"textData":{}}},{"id":"Image_15","class":"TODO::Senthil","instance":"Image_15","roles":{}},{"id":"SmartShape_50","class":"TODO::Senthil","instance":"SmartShape_50","title":"volver al menú ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Click_Box_5","class":"TODO::Senthil","instance":"Click_Box_5","roles":{"click":{"subtype":"button"}}},{"id":"Image_146","class":"TODO::Senthil","instance":"Image_146","roles":{}},{"id":"Slide13290","class":"Normal Slide","instance":"","thumbnail":"dr/Slide13290_thnail.jpg","children":["Text_Caption_19","Text_Caption_20","Text_Caption_295","Text_Caption_296","Text_Caption_297","Image_15","Click_Box_5","Image_146"],"roles":{"slide":{"durationInFrames":1140},"navigation":{"navid":"Slide13290"}}},{"id":"si13522","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si13537","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_15","class":"TODO::Senthil","instance":"SmartShape_15","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_18","class":"TODO::Senthil","instance":"SmartShape_18","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_22","class":"TODO::Senthil","instance":"Text_Caption_22","title":"Artículo 146 d.- Preparación de acceso indebido e interceptación de datos. ","roles":{"textData":{}}},{"id":"Text_Caption_23","class":"TODO::Senthil","instance":"Text_Caption_23","title":"1° El que prepare un hecho punible según el Artículo 146 b o el Artículo 146 c produciendo, difundiendo o haciendo accesible de otra manera a terceros: ","roles":{"textData":{}}},{"id":"Text_Caption_298","class":"TODO::Senthil","instance":"Text_Caption_298","title":"1- Las claves de acceso u otros códigos de seguridad, que permitan el acceso a datos en sentido del Artículo 146 b, inciso 2°. ","roles":{"textData":{}}},{"id":"Text_Caption_299","class":"TODO::Senthil","instance":"Text_Caption_299","title":"2- Los programas de computación destinados a la realización de tal hecho, será castigado con pena privativa de libertad de hasta un año o multa. ","roles":{"textData":{}}},{"id":"Image_18","class":"TODO::Senthil","instance":"Image_18","roles":{}},{"id":"SmartShape_49","class":"TODO::Senthil","instance":"SmartShape_49","title":"volver al menú ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Click_Box_4","class":"TODO::Senthil","instance":"Click_Box_4","roles":{"click":{"subtype":"button"}}},{"id":"Image_147","class":"TODO::Senthil","instance":"Image_147","roles":{}},{"id":"Text_Caption_300","class":"TODO::Senthil","instance":"Text_Caption_300","title":"2° Se aplicará, en lo pertinente, lo previsto en el Artículo 266, incisos 2° y 3°. ","roles":{"textData":{}}},{"id":"Slide13521","class":"Normal Slide","instance":"","thumbnail":"dr/Slide13521_thnail.jpg","children":["Text_Caption_22","Text_Caption_23","Text_Caption_298","Text_Caption_299","Image_18","Click_Box_4","Image_147","Text_Caption_300"],"roles":{"slide":{"durationInFrames":1386},"navigation":{"navid":"Slide13521"}}},{"id":"si13912","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si13927","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_23","class":"TODO::Senthil","instance":"SmartShape_23","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_26","class":"TODO::Senthil","instance":"SmartShape_26","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_25","class":"TODO::Senthil","instance":"Text_Caption_25","title":"Artículo 174 b.- Acceso indebido a sistemas informáticos ","roles":{"textData":{}}},{"id":"Text_Caption_26","class":"TODO::Senthil","instance":"Text_Caption_26","title":"1° El que accediere a un sistema informático o a sus componentes, utilizando su identidad o una ajena; o excediendo una autorización, será castigado con pena privativa de libertad de hasta tres años o multa.    ","roles":{"textData":{}}},{"id":"Image_23","class":"TODO::Senthil","instance":"Image_23","roles":{}},{"id":"Image_24","class":"TODO::Senthil","instance":"Image_24","roles":{}},{"id":"Image_25","class":"TODO::Senthil","instance":"Image_25","roles":{}},{"id":"SmartShape_48","class":"TODO::Senthil","instance":"SmartShape_48","title":"volver al menú ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Click_Box_3","class":"TODO::Senthil","instance":"Click_Box_3","roles":{"click":{"subtype":"button"}}},{"id":"Image_148","class":"TODO::Senthil","instance":"Image_148","roles":{}},{"id":"Text_Caption_78","class":"TODO::Senthil","instance":"Text_Caption_78","title":"2° Se entenderá como sistema informático a todo dispositivo aislado o al conjunto de dispositivos interconectados o relacionados entre sí, cuya función, o la de alguno de sus componentes, sea el tratamiento de datos por medio de un programa informático.    ","roles":{"textData":{}}},{"id":"Slide13911","class":"Normal Slide","instance":"","thumbnail":"dr/Slide13911_thnail.jpg","children":["Text_Caption_25","Text_Caption_26","Image_23","Image_24","Image_25","Click_Box_3","Image_148","Text_Caption_78"],"roles":{"slide":{"durationInFrames":1131},"navigation":{"navid":"Slide13911"}}},{"id":"si14157","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si14172","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_27","class":"TODO::Senthil","instance":"SmartShape_27","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_30","class":"TODO::Senthil","instance":"SmartShape_30","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_28","class":"TODO::Senthil","instance":"Text_Caption_28","title":"Artículo 188.- Estafa mediante sistemas informáticos ","roles":{"textData":{}}},{"id":"Text_Caption_29","class":"TODO::Senthil","instance":"Text_Caption_29","title":"1° El que, con la intención de obtener para sí o para un tercero un beneficio patrimonial indebido, influyera sobre el resultado de un procesamiento de datos mediante: ","roles":{"textData":{}}},{"id":"Image_26","class":"TODO::Senthil","instance":"Image_26","roles":{}},{"id":"SmartShape_47","class":"TODO::Senthil","instance":"SmartShape_47","title":"volver al menú ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Click_Box_2","class":"TODO::Senthil","instance":"Click_Box_2","roles":{"click":{"subtype":"button"}}},{"id":"Image_149","class":"TODO::Senthil","instance":"Image_149","roles":{}},{"id":"Text_Caption_80","class":"TODO::Senthil","instance":"Text_Caption_80","title":"1.\t una programación incorrecta;  2.\tel uso de datos falsos o incompletos;  3.\tel uso indebido de datos;   4.\tla utilización de otra maniobra no autorizada; y con ello causara un perjuicio.  ","roles":{"textData":{}}},{"id":"Slide14156","class":"Normal Slide","instance":"","thumbnail":"dr/Slide14156_thnail.jpg","children":["Text_Caption_28","Text_Caption_29","Image_26","Click_Box_2","Image_149","Text_Caption_80"],"roles":{"slide":{"durationInFrames":825},"navigation":{"navid":"Slide14156"}}},{"id":"si14402","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si14417","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_31","class":"TODO::Senthil","instance":"SmartShape_31","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_34","class":"TODO::Senthil","instance":"SmartShape_34","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_31","class":"TODO::Senthil","instance":"Text_Caption_31","title":"Artículo 248 b.- Falsificación de tarjetas de débito o de crédito y otros medios electrónicos de pago. ","roles":{"textData":{}}},{"id":"Text_Caption_32","class":"TODO::Senthil","instance":"Text_Caption_32","title":"1° El que, con la intención de inducir en las relaciones jurídicas al error o de facilitar la inducción a tal error: ","roles":{"textData":{}}},{"id":"Text_Caption_81","class":"TODO::Senthil","instance":"Text_Caption_81","title":"1.\tfalsificare o alterare una tarjeta de crédito o débito u otro medio electrónico de pago; ","roles":{"textData":{}}},{"id":"Text_Caption_82","class":"TODO::Senthil","instance":"Text_Caption_82","title":"2.\tadquiera para sí o para un tercero, ofreciere, entregare a otro o utilizare tales tarjetas o medios electrónicos.   ","roles":{"textData":{}}},{"id":"Image_27","class":"TODO::Senthil","instance":"Image_27","roles":{}},{"id":"SmartShape_46","class":"TODO::Senthil","instance":"SmartShape_46","title":"volver al menú ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Click_Box_1","class":"TODO::Senthil","instance":"Click_Box_1","roles":{"click":{"subtype":"button"}}},{"id":"Image_150","class":"TODO::Senthil","instance":"Image_150","roles":{}},{"id":"Slide14401","class":"Normal Slide","instance":"","thumbnail":"dr/Slide14401_thnail.jpg","children":["Text_Caption_31","Text_Caption_32","Text_Caption_81","Text_Caption_82","Image_27","Click_Box_1","Image_150"],"roles":{"slide":{"durationInFrames":990},"navigation":{"navid":"Slide14401"}}},{"id":"si19015","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si19030","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_118","class":"TODO::Senthil","instance":"SmartShape_118","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_237","class":"TODO::Senthil","instance":"Image_237","roles":{}},{"id":"Text_Caption_87","class":"TODO::Senthil","instance":"Text_Caption_87","title":"Los ciber-delincuentes están siempre al acecho y cada día buscan nuevas técnicas para lograr sus fechorías. El robo de dinero es su principal objetivo y la preocupación primordial de los usuarios en la web, sobre todo cuando se trata de usuarios que usan el servicio de pago digital y tarjetas de crédito.     ","roles":{"textData":{}}},{"id":"SmartShape_116","class":"TODO::Senthil","instance":"SmartShape_116","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_117","class":"TODO::Senthil","instance":"SmartShape_117","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_301","class":"TODO::Senthil","instance":"Text_Caption_301","title":"Carding ","roles":{"textData":{}}},{"id":"Image_399","class":"TODO::Senthil","instance":"Image_399","roles":{}},{"id":"Slide19014","class":"Normal Slide","instance":"","thumbnail":"dr/Slide19014_thnail.jpg","children":["Image_237","Text_Caption_87","Text_Caption_301","Image_399"],"roles":{"slide":{"durationInFrames":651},"navigation":{"navid":"Slide19014"}}},{"id":"si85783","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si85798","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_121","class":"TODO::Senthil","instance":"SmartShape_121","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_89","class":"TODO::Senthil","instance":"Text_Caption_89","title":" Conocer los lugares en donde se usó la tarjeta   ","roles":{"textData":{}}},{"id":"Text_Caption_90","class":"TODO::Senthil","instance":"Text_Caption_90","title":"Verificar la boca u orificio de entrada de los ATM (cajero automático) que no se muevan o estén flojos     ","roles":{"textData":{}}},{"id":"Text_Caption_91","class":"TODO::Senthil","instance":"Text_Caption_91","title":"Controlar y monitorear el uso de las tarjetas  ","roles":{"textData":{}}},{"id":"Text_Caption_92","class":"TODO::Senthil","instance":"Text_Caption_92","title":"En los ATM (cajero automático)  acudir a lugares iluminados y bien ubicados      ","roles":{"textData":{}}},{"id":"Text_Caption_93","class":"TODO::Senthil","instance":"Text_Caption_93","title":"Cotejar las paginas web donde se usan para evitar fraudes   ","roles":{"textData":{}}},{"id":"SmartShape_120","class":"TODO::Senthil","instance":"SmartShape_120","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_401","class":"TODO::Senthil","instance":"Image_401","roles":{}},{"id":"Text_Caption_302","class":"TODO::Senthil","instance":"Text_Caption_302","title":"RECOMENDACIONES ÚTILES  ","roles":{"textData":{}}},{"id":"SmartShape_122","class":"TODO::Senthil","instance":"SmartShape_122","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_123","class":"TODO::Senthil","instance":"SmartShape_123","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_303","class":"TODO::Senthil","instance":"Text_Caption_303","title":"Recomendaciones útiles ","roles":{"textData":{}}},{"id":"Image_402","class":"TODO::Senthil","instance":"Image_402","roles":{}},{"id":"Slide85782","class":"Normal Slide","instance":"","thumbnail":"dr/Slide85782_thnail.jpg","children":["Text_Caption_89","Text_Caption_90","Text_Caption_91","Text_Caption_92","Text_Caption_93","Image_401","Text_Caption_302","Text_Caption_303","Image_402"],"roles":{"slide":{"durationInFrames":771},"navigation":{"navid":"Slide85782"}}},{"id":"si99769","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si99784","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_125","class":"TODO::Senthil","instance":"SmartShape_125","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_243","class":"TODO::Senthil","instance":"Image_243","roles":{}},{"id":"SmartShape_126","class":"TODO::Senthil","instance":"SmartShape_126","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_127","class":"TODO::Senthil","instance":"SmartShape_127","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_306","class":"TODO::Senthil","instance":"Text_Caption_306","title":"Objetivos de los ciberataques ","roles":{"textData":{}}},{"id":"Image_404","class":"TODO::Senthil","instance":"Image_404","roles":{}},{"id":"Image_244","class":"TODO::Senthil","instance":"Image_244","roles":{}},{"id":"Image_245","class":"TODO::Senthil","instance":"Image_245","roles":{}},{"id":"Text_Caption_100","class":"TODO::Senthil","instance":"Text_Caption_100","title":"Los ciberdelincuentes se encuentran siempre al acecho de nuevas formas con las que atacarnos a los usuarios aprovechándose de nuestro desconocimiento o vulnerabilidades en nuestras defensas. ","roles":{"textData":{}}},{"id":"Text_Caption_102","class":"TODO::Senthil","instance":"Text_Caption_102","title":"Sus objetivos son muchos y pueden tener distintas consecuencias para el usuario.  ","roles":{"textData":{}}},{"id":"SmartShape_124","class":"TODO::Senthil","instance":"SmartShape_124","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_403","class":"TODO::Senthil","instance":"Image_403","roles":{}},{"id":"Text_Caption_304","class":"TODO::Senthil","instance":"Text_Caption_304","title":"OBJETIVOS DE LOS CIBERATAQUES  ","roles":{"textData":{}}},{"id":"Text_Caption_305","class":"TODO::Senthil","instance":"Text_Caption_305","title":"Y SUS CONSECUENCIAS  PARA EL USUARIO ","roles":{"textData":{}}},{"id":"Slide99768","class":"Normal Slide","instance":"","thumbnail":"dr/Slide99768_thnail.jpg","children":["Image_243","Text_Caption_306","Image_404","Image_244","Image_245","Text_Caption_100","Text_Caption_102","Image_403","Text_Caption_304","Text_Caption_305"],"roles":{"slide":{"durationInFrames":690},"navigation":{"navid":"Slide99768"}}},{"id":"si99939","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si99954","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_129","class":"TODO::Senthil","instance":"SmartShape_129","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_101","class":"TODO::Senthil","instance":"Text_Caption_101","title":"Los ciberdelincuentes se sirven de diversas técnicas y herramientas con las que atacar a nuestras credenciales. ","roles":{"textData":{}}},{"id":"Text_Caption_103","class":"TODO::Senthil","instance":"Text_Caption_103","title":"Los usuarios no siempre les dificultamos esta  tarea, y solemos caer en malas prácticas  que ponen en peligro nuestra seguridad:       ","roles":{"textData":{}}},{"id":"Image_258","class":"TODO::Senthil","instance":"Image_258","roles":{}},{"id":"SmartShape_128","class":"TODO::Senthil","instance":"SmartShape_128","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_405","class":"TODO::Senthil","instance":"Image_405","roles":{}},{"id":"Text_Caption_307","class":"TODO::Senthil","instance":"Text_Caption_307","title":"DEBILIDADES DE LAS CONTRASEÑAS  ","roles":{"textData":{}}},{"id":"SmartShape_130","class":"TODO::Senthil","instance":"SmartShape_130","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_131","class":"TODO::Senthil","instance":"SmartShape_131","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_308","class":"TODO::Senthil","instance":"Text_Caption_308","title":"Debilidades de las contraseñas ","roles":{"textData":{}}},{"id":"Image_406","class":"TODO::Senthil","instance":"Image_406","roles":{}},{"id":"Slide99938","class":"Normal Slide","instance":"","thumbnail":"dr/Slide99938_thnail.jpg","children":["Text_Caption_101","Text_Caption_103","Image_258","Image_405","Text_Caption_307","Text_Caption_308","Image_406"],"roles":{"slide":{"durationInFrames":516},"navigation":{"navid":"Slide99938"}}},{"id":"si100111","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si100126","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_132","class":"TODO::Senthil","instance":"SmartShape_132","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_104","class":"TODO::Senthil","instance":"Text_Caption_104","title":"Utilizar la misma contraseña para distintos servicios. ","roles":{"textData":{}}},{"id":"Text_Caption_106","class":"TODO::Senthil","instance":"Text_Caption_106","title":"Utilizar contraseñas débiles, fáciles de recordar y de atacar  ","roles":{"textData":{}}},{"id":"Text_Caption_107","class":"TODO::Senthil","instance":"Text_Caption_107","title":"Utilizar información personal a modo de contraseñas, como la fecha de nacimiento.  ","roles":{"textData":{}}},{"id":"Text_Caption_108","class":"TODO::Senthil","instance":"Text_Caption_108","title":"Apuntarlas en notas o archivos sin cifrar.  ","roles":{"textData":{}}},{"id":"Text_Caption_109","class":"TODO::Senthil","instance":"Text_Caption_109","title":"Guardar las contraseñas en webs o en el navegador.  ","roles":{"textData":{}}},{"id":"Image_252","class":"TODO::Senthil","instance":"Image_252","roles":{}},{"id":"Image_253","class":"TODO::Senthil","instance":"Image_253","roles":{}},{"id":"SmartShape_133","class":"TODO::Senthil","instance":"SmartShape_133","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_134","class":"TODO::Senthil","instance":"SmartShape_134","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_309","class":"TODO::Senthil","instance":"Text_Caption_309","title":"Debilidades de las contraseñas ","roles":{"textData":{}}},{"id":"Image_407","class":"TODO::Senthil","instance":"Image_407","roles":{}},{"id":"Slide100110","class":"Normal Slide","instance":"","thumbnail":"dr/Slide100110_thnail.jpg","children":["Text_Caption_104","Text_Caption_106","Text_Caption_107","Text_Caption_108","Text_Caption_109","Image_252","Image_253","Text_Caption_309","Image_407"],"roles":{"slide":{"durationInFrames":666},"navigation":{"navid":"Slide100110"}}},{"id":"si100396","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si100411","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_135","class":"TODO::Senthil","instance":"SmartShape_135","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_116","class":"TODO::Senthil","instance":"Text_Caption_116","title":"Y, finalmente, hacer uso de patrones sencillos, como  utilizar la primera letra en mayúscula, seguida de 4 o 5 en  minúscula y añadir 1 o 2 números o un carácter especial.  ","roles":{"textData":{}}},{"id":"Image_259","class":"TODO::Senthil","instance":"Image_259","roles":{}},{"id":"SmartShape_136","class":"TODO::Senthil","instance":"SmartShape_136","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_137","class":"TODO::Senthil","instance":"SmartShape_137","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_310","class":"TODO::Senthil","instance":"Text_Caption_310","title":"Debilidades de las contraseñas ","roles":{"textData":{}}},{"id":"Image_408","class":"TODO::Senthil","instance":"Image_408","roles":{}},{"id":"Slide100395","class":"Normal Slide","instance":"","thumbnail":"dr/Slide100395_thnail.jpg","children":["Text_Caption_116","Image_259","Text_Caption_310","Image_408"],"roles":{"slide":{"durationInFrames":396},"navigation":{"navid":"Slide100395"}}},{"id":"si100555","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si100570","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_138","class":"TODO::Senthil","instance":"SmartShape_138","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_119","class":"TODO::Senthil","instance":"Text_Caption_119","title":"Consiste en adivinar nuestra contraseña a base de ensayo y error.  ","roles":{"textData":{}}},{"id":"Text_Caption_120","class":"TODO::Senthil","instance":"Text_Caption_120","title":"Los atacantes comienzan probando diferentes combinaciones con nuestros datos personales, en caso de conocerlos por otras vías.  ","roles":{"textData":{}}},{"id":"Text_Caption_121","class":"TODO::Senthil","instance":"Text_Caption_121","title":"Luego, continúan haciendo combinaciones de palabras al azar, conjugando nombres, letras y números, hasta que dan con el patrón correcto. ","roles":{"textData":{}}},{"id":"SmartShape_139","class":"TODO::Senthil","instance":"SmartShape_139","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_140","class":"TODO::Senthil","instance":"SmartShape_140","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_311","class":"TODO::Senthil","instance":"Text_Caption_311","title":"¿Qué es la fuerza bruta? ","roles":{"textData":{}}},{"id":"Image_409","class":"TODO::Senthil","instance":"Image_409","roles":{}},{"id":"Image_410","class":"TODO::Senthil","instance":"Image_410","roles":{}},{"id":"Slide100554","class":"Normal Slide","instance":"","thumbnail":"dr/Slide100554_thnail.jpg","children":["Text_Caption_119","Text_Caption_120","Text_Caption_121","Text_Caption_311","Image_409","Image_410"],"roles":{"slide":{"durationInFrames":759},"navigation":{"navid":"Slide100554"}}},{"id":"si105271","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si105286","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_141","class":"TODO::Senthil","instance":"SmartShape_141","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_126","class":"TODO::Senthil","instance":"Text_Caption_126","title":"El objetivo de los ciberdelincuentes siempre será conseguir la información almacenada en nuestras cuentas.  ","roles":{"textData":{}}},{"id":"Text_Caption_127","class":"TODO::Senthil","instance":"Text_Caption_127","title":"Dependiendo de si se trata de un correo electrónico, con el que obtener datos personales y contactos; ","roles":{"textData":{}}},{"id":"Text_Caption_128","class":"TODO::Senthil","instance":"Text_Caption_128","title":"una red social, con la que poder suplantar nuestra identidad...  ","roles":{"textData":{}}},{"id":"Text_Caption_129","class":"TODO::Senthil","instance":"Text_Caption_129","title":"...o datos bancarios, con los que llevar a cabo transferencias a su cuenta o realizar compras sin nuestro consentimiento, el atacante hará uso de esta información para su propio beneficio ","roles":{"textData":{}}},{"id":"SmartShape_142","class":"TODO::Senthil","instance":"SmartShape_142","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_143","class":"TODO::Senthil","instance":"SmartShape_143","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_312","class":"TODO::Senthil","instance":"Text_Caption_312","title":"¿Cuál es su objetivo? ","roles":{"textData":{}}},{"id":"Image_411","class":"TODO::Senthil","instance":"Image_411","roles":{}},{"id":"Image_412","class":"TODO::Senthil","instance":"Image_412","roles":{}},{"id":"Slide105270","class":"Normal Slide","instance":"","thumbnail":"dr/Slide105270_thnail.jpg","children":["Text_Caption_126","Text_Caption_127","Text_Caption_128","Text_Caption_129","Text_Caption_312","Image_411","Image_412"],"roles":{"slide":{"durationInFrames":948},"navigation":{"navid":"Slide105270"}}},{"id":"si105693","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si105708","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_144","class":"TODO::Senthil","instance":"SmartShape_144","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_136","class":"TODO::Senthil","instance":"Text_Caption_136","title":"Como protección, es fundamental evitar caer en los errores anteriores y mejorar la seguridad de las cuentas utilizando contraseñas robustas.  ","roles":{"textData":{}}},{"id":"Text_Caption_137","class":"TODO::Senthil","instance":"Text_Caption_137","title":"Además, es conveniente aplicar el factor de autenticación múltiple, siempre que el servicio lo permita, y utilizar gestores de contraseña.  ","roles":{"textData":{}}},{"id":"SmartShape_145","class":"TODO::Senthil","instance":"SmartShape_145","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_146","class":"TODO::Senthil","instance":"SmartShape_146","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_313","class":"TODO::Senthil","instance":"Text_Caption_313","title":"Recomendaciones ","roles":{"textData":{}}},{"id":"Image_413","class":"TODO::Senthil","instance":"Image_413","roles":{}},{"id":"Image_414","class":"TODO::Senthil","instance":"Image_414","roles":{}},{"id":"Slide105692","class":"Normal Slide","instance":"","thumbnail":"dr/Slide105692_thnail.jpg","children":["Text_Caption_136","Text_Caption_137","Text_Caption_313","Image_413","Image_414"],"roles":{"slide":{"durationInFrames":663},"navigation":{"navid":"Slide105692"}}},{"id":"si105883","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si105898","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_147","class":"TODO::Senthil","instance":"SmartShape_147","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_140","class":"TODO::Senthil","instance":"Text_Caption_140","title":"Los ataques por ingeniería social se basan en un conjunto de técnicas dirigidas a nosotros, los usuarios, con el objetivo de conseguir que revelemos información personal o permita al atacante tomar control de nuestros dispositivos.  ","roles":{"textData":{}}},{"id":"Text_Caption_141","class":"TODO::Senthil","instance":"Text_Caption_141","title":"Existen distintos tipos de ataques basados en el engaño y la manipulación, aunque sus consecuencias pueden variar mucho, ya que suelen utilizarse como paso previo a un ataque por malware (software malicioso). ","roles":{"textData":{}}},{"id":"SmartShape_148","class":"TODO::Senthil","instance":"SmartShape_148","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_149","class":"TODO::Senthil","instance":"SmartShape_149","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_314","class":"TODO::Senthil","instance":"Text_Caption_314","title":"Ingeniería Social ","roles":{"textData":{}}},{"id":"Image_415","class":"TODO::Senthil","instance":"Image_415","roles":{}},{"id":"Image_416","class":"TODO::Senthil","instance":"Image_416","roles":{}},{"id":"Slide105882","class":"Normal Slide","instance":"","thumbnail":"dr/Slide105882_thnail.jpg","children":["Text_Caption_140","Text_Caption_141","Text_Caption_314","Image_415","Image_416"],"roles":{"slide":{"durationInFrames":933},"navigation":{"navid":"Slide105882"}}},{"id":"si106073","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si106088","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_150","class":"TODO::Senthil","instance":"SmartShape_150","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_144","class":"TODO::Senthil","instance":"Text_Caption_144","title":"Se tratan de tres ataques basados en ingeniería social muy similares en su ejecución.  ","roles":{"textData":{}}},{"id":"Text_Caption_145","class":"TODO::Senthil","instance":"Text_Caption_145","title":"De forma general, el ciberdelincuente enviará un mensaje suplantando a una entidad legítima, como puede ser un banco, una red social, un servicio técnico o una entidad pública, con la que nos sintamos confiados, para lograr su objetivo.  ","roles":{"textData":{}}},{"id":"Text_Caption_146","class":"TODO::Senthil","instance":"Text_Caption_146","title":"Estos mensajes suelen ser de carácter urgente o atractivo, para evitar que apliquen el sentido común y se lo piensen dos veces. ","roles":{"textData":{}}},{"id":"SmartShape_151","class":"TODO::Senthil","instance":"SmartShape_151","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_152","class":"TODO::Senthil","instance":"SmartShape_152","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_315","class":"TODO::Senthil","instance":"Text_Caption_315","title":"¿Qué son los phishing,  vishing y smishing? ","roles":{"textData":{}}},{"id":"Image_417","class":"TODO::Senthil","instance":"Image_417","roles":{}},{"id":"Image_418","class":"TODO::Senthil","instance":"Image_418","roles":{}},{"id":"Slide106072","class":"Normal Slide","instance":"","thumbnail":"dr/Slide106072_thnail.jpg","children":["Text_Caption_144","Text_Caption_145","Text_Caption_146","Text_Caption_315","Image_417","Image_418"],"roles":{"slide":{"durationInFrames":1149},"navigation":{"navid":"Slide106072"}}},{"id":"si106313","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si106328","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_153","class":"TODO::Senthil","instance":"SmartShape_153","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_150","class":"TODO::Senthil","instance":"Text_Caption_150","title":"Es un método para engañarle y hacer que comparta contraseñas, números de tarjeta de crédito, y otra información confidencial haciéndose pasar por una institución de confianza en un mensaje de correo electrónico o llamada telefónica. ","roles":{"textData":{}}},{"id":"SmartShape_154","class":"TODO::Senthil","instance":"SmartShape_154","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_155","class":"TODO::Senthil","instance":"SmartShape_155","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_316","class":"TODO::Senthil","instance":"Text_Caption_316","title":"Phishing ","roles":{"textData":{}}},{"id":"Image_420","class":"TODO::Senthil","instance":"Image_420","roles":{}},{"id":"Image_421","class":"TODO::Senthil","instance":"Image_421","roles":{}},{"id":"Image_422","class":"TODO::Senthil","instance":"Image_422","roles":{}},{"id":"Image_423","class":"TODO::Senthil","instance":"Image_423","roles":{}},{"id":"Image_424","class":"TODO::Senthil","instance":"Image_424","roles":{}},{"id":"Slide106312","class":"Normal Slide","instance":"","thumbnail":"dr/Slide106312_thnail.jpg","children":["Text_Caption_150","Text_Caption_316","Image_420","Image_421","Image_422","Image_423","Image_424"],"roles":{"slide":{"durationInFrames":516},"navigation":{"navid":"Slide106312"}}},{"id":"si106465","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si106480","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_156","class":"TODO::Senthil","instance":"SmartShape_156","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_151","class":"TODO::Senthil","instance":"Text_Caption_151","title":"Un tipo de ataque peligrosamente eficaz que se apoya en  técnicas de ingeniería social y en el cual el atacante se comunica telefónicamente o vía mensaje de voz haciéndose... ","roles":{"textData":{}}},{"id":"Text_Caption_152","class":"TODO::Senthil","instance":"Text_Caption_152","title":"...pasar por una empresa o entidad confiable con la intención  de engañar a la víctima y convencerla de que realice  una acción que va en contra de sus intereses. ","roles":{"textData":{}}},{"id":"SmartShape_157","class":"TODO::Senthil","instance":"SmartShape_157","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_158","class":"TODO::Senthil","instance":"SmartShape_158","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_317","class":"TODO::Senthil","instance":"Text_Caption_317","title":"Vishing ","roles":{"textData":{}}},{"id":"Image_425","class":"TODO::Senthil","instance":"Image_425","roles":{}},{"id":"Image_426","class":"TODO::Senthil","instance":"Image_426","roles":{}},{"id":"Slide106464","class":"Normal Slide","instance":"","thumbnail":"dr/Slide106464_thnail.jpg","children":["Text_Caption_151","Text_Caption_152","Text_Caption_317","Image_425","Image_426"],"roles":{"slide":{"durationInFrames":678},"navigation":{"navid":"Slide106464"}}},{"id":"si106612","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si106627","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_159","class":"TODO::Senthil","instance":"SmartShape_159","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_153","class":"TODO::Senthil","instance":"Text_Caption_153","title":"Esta amenaza se produce cuando el cliente recibe un  mensaje de texto, donde el emisor se hace pasar por  el banco, y le informan que se ha realizado una  compra sospechosa con su tarjeta de crédito.  ","roles":{"textData":{}}},{"id":"Text_Caption_155","class":"TODO::Senthil","instance":"Text_Caption_155","title":"A su vez, el texto solicita que se comunique con la banca por  teléfono de la entidad financiera y le brinda un número falso.  ","roles":{"textData":{}}},{"id":"Text_Caption_156","class":"TODO::Senthil","instance":"Text_Caption_156","title":"El cliente devuelve la llamada y es ahí cuando el  ciberdelincuente, haciéndose pasar por el banco, solicita  información confidencial para supuestamente cancelar la compra.  ","roles":{"textData":{}}},{"id":"Text_Caption_157","class":"TODO::Senthil","instance":"Text_Caption_157","title":"En una variante de esta modalidad el mensaje  también podría incluir un enlace a una 'web'  fraudulenta para solicitar información sensible. ","roles":{"textData":{}}},{"id":"SmartShape_160","class":"TODO::Senthil","instance":"SmartShape_160","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_161","class":"TODO::Senthil","instance":"SmartShape_161","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_318","class":"TODO::Senthil","instance":"Text_Caption_318","title":"Smishing ","roles":{"textData":{}}},{"id":"Image_427","class":"TODO::Senthil","instance":"Image_427","roles":{}},{"id":"Image_428","class":"TODO::Senthil","instance":"Image_428","roles":{}},{"id":"Image_429","class":"TODO::Senthil","instance":"Image_429","roles":{}},{"id":"Slide106611","class":"Normal Slide","instance":"","thumbnail":"dr/Slide106611_thnail.jpg","children":["Text_Caption_153","Text_Caption_155","Text_Caption_156","Text_Caption_157","Text_Caption_318","Image_427","Image_428","Image_429"],"roles":{"slide":{"durationInFrames":1230},"navigation":{"navid":"Slide106611"}}},{"id":"si106883","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si106898","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_162","class":"TODO::Senthil","instance":"SmartShape_162","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_162","class":"TODO::Senthil","instance":"Text_Caption_162","title":"El principal consejo es ser precavido y leer el  mensaje detenidamente, especialmente si se  trata de entidades con peticiones urgentes,  promociones u ofertas demasiado atractivas.  ","roles":{"textData":{}}},{"id":"Text_Caption_163","class":"TODO::Senthil","instance":"Text_Caption_163","title":"Además, otras pautas que podemos seguir  para evitar ser víctima de un phishing son:  ","roles":{"textData":{}}},{"id":"Image_431","class":"TODO::Senthil","instance":"Image_431","roles":{}},{"id":"SmartShape_163","class":"TODO::Senthil","instance":"SmartShape_163","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_164","class":"TODO::Senthil","instance":"SmartShape_164","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_319","class":"TODO::Senthil","instance":"Text_Caption_319","title":"¿Cómo me protejo de estos ataques? ","roles":{"textData":{}}},{"id":"Image_430","class":"TODO::Senthil","instance":"Image_430","roles":{}},{"id":"SmartShape_165","class":"TODO::Senthil","instance":"SmartShape_165","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_320","class":"TODO::Senthil","instance":"Text_Caption_320","title":"Detectar errores gramaticales en el mensaje. Y, si se trata de un asunto urgente o acerca de una promoción muy atractiva, es muy probable que se trate de un fraude.  ","roles":{"textData":{}}},{"id":"Image_432","class":"TODO::Senthil","instance":"Image_432","roles":{}},{"id":"SmartShape_166","class":"TODO::Senthil","instance":"SmartShape_166","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_321","class":"TODO::Senthil","instance":"Text_Caption_321","title":"Revisar que el enlace coincide con la dirección a la que apunta. Y, en cualquier caso, debemos ingresar la dirección url nosotros directamente  en el navegador, sin copiar y pegar.  ","roles":{"textData":{}}},{"id":"Image_433","class":"TODO::Senthil","instance":"Image_433","roles":{}},{"id":"SmartShape_167","class":"TODO::Senthil","instance":"SmartShape_167","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_322","class":"TODO::Senthil","instance":"Text_Caption_322","title":"Comprobar  el remitente del  mensaje, o asegurarnos de que  se trata de un teléfono legítimo. ","roles":{"textData":{}}},{"id":"Image_434","class":"TODO::Senthil","instance":"Image_434","roles":{}},{"id":"SmartShape_168","class":"TODO::Senthil","instance":"SmartShape_168","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_323","class":"TODO::Senthil","instance":"Text_Caption_323","title":"No descargar  ningún archivo adjunto y analizarlo previamente con el antivirus. En caso de vishing, no debemos descargar ningún archivo que nos haya solicitado el atacante... ","roles":{"textData":{}}},{"id":"Text_Caption_324","class":"TODO::Senthil","instance":"Text_Caption_324","title":"...ni ceder el control de nuestro equipo por medio de algún software de control remoto.   ","roles":{"textData":{}}},{"id":"Image_435","class":"TODO::Senthil","instance":"Image_435","roles":{}},{"id":"SmartShape_169","class":"TODO::Senthil","instance":"SmartShape_169","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_325","class":"TODO::Senthil","instance":"Text_Caption_325","title":"No contestar nunca al  mensaje y eliminarlo. ","roles":{"textData":{}}},{"id":"Image_436","class":"TODO::Senthil","instance":"Image_436","roles":{}},{"id":"Slide106882","class":"Normal Slide","instance":"","thumbnail":"dr/Slide106882_thnail.jpg","children":["Text_Caption_162","Text_Caption_163","Image_431","Text_Caption_319","Image_430","Text_Caption_320","Image_432","Text_Caption_321","Image_433","Text_Caption_322","Image_434","Text_Caption_323","Text_Caption_324","Image_435","Text_Caption_325","Image_436"],"roles":{"slide":{"durationInFrames":2175},"navigation":{"navid":"Slide106882"}}},{"id":"si111853","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si111868","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_170","class":"TODO::Senthil","instance":"SmartShape_170","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_437","class":"TODO::Senthil","instance":"Image_437","roles":{}},{"id":"Text_Caption_326","class":"TODO::Senthil","instance":"Text_Caption_326","title":"LOS PELIGROS DE LA COMUNICACIÓN VIRTUAL  Redes Sociales ","roles":{"textData":{}}},{"id":"Slide111852","class":"Normal Slide","instance":"","thumbnail":"dr/Slide111852_thnail.jpg","children":["Image_437","Text_Caption_326"],"roles":{"slide":{"durationInFrames":165},"navigation":{"navid":"Slide111852"}}},{"id":"si111914","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si111929","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_440","class":"TODO::Senthil","instance":"Image_440","roles":{}},{"id":"SmartShape_172","class":"TODO::Senthil","instance":"SmartShape_172","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_174","class":"TODO::Senthil","instance":"Text_Caption_174","title":"Las redes sociales son estructuras sociales compuestas de grupos de personas, las cuales están conectadas por uno o varios tipos de relaciones, tales como amistad, parentesco, intereses comunes o que comparten conocimientos. ","roles":{"textData":{}}},{"id":"Image_441","class":"TODO::Senthil","instance":"Image_441","roles":{}},{"id":"Text_Caption_330","class":"TODO::Senthil","instance":"Text_Caption_330","title":"¿Qué pasa con las imagenes y/o videos levantados en las redes? ","roles":{"textData":{}}},{"id":"Text_Caption_175","class":"TODO::Senthil","instance":"Text_Caption_175","title":"El problema principal que ocurre es que cuando no se configura la parte de privacidad y no se lee las políticas y condiciones de uso, cualquier persona de cualquier lugar del mundo puede encontrar y quitar información personal sobre nosotros. ","roles":{"textData":{}}},{"id":"Text_Caption_176","class":"TODO::Senthil","instance":"Text_Caption_176","title":"De ahí que cuando se levanta imágenes o se envía contenidos audio visuales se pierde el control de las mismas y  puede hacerse viral.  ","roles":{"textData":{}}},{"id":"SmartShape_171","class":"TODO::Senthil","instance":"SmartShape_171","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_438","class":"TODO::Senthil","instance":"Image_438","roles":{}},{"id":"Text_Caption_327","class":"TODO::Senthil","instance":"Text_Caption_327","title":"¿QUÉ SON Y PARA  QUÉ FUERON CREADAS  EN PRINCIPIO?  ","roles":{"textData":{}}},{"id":"SmartShape_173","class":"TODO::Senthil","instance":"SmartShape_173","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_174","class":"TODO::Senthil","instance":"SmartShape_174","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_328","class":"TODO::Senthil","instance":"Text_Caption_328","title":"¿Qué son y para qué fueron  creadas en principio? ","roles":{"textData":{}}},{"id":"Image_439","class":"TODO::Senthil","instance":"Image_439","roles":{}},{"id":"SmartShape_175","class":"TODO::Senthil","instance":"SmartShape_175","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_442","class":"TODO::Senthil","instance":"Image_442","roles":{}},{"id":"Text_Caption_329","class":"TODO::Senthil","instance":"Text_Caption_329","title":"PRINCIPALES PROBLEMAS  DE LAS REDES SOCIALES ","roles":{"textData":{}}},{"id":"Image_444","class":"TODO::Senthil","instance":"Image_444","roles":{}},{"id":"Image_445","class":"TODO::Senthil","instance":"Image_445","roles":{}},{"id":"Image_446","class":"TODO::Senthil","instance":"Image_446","roles":{}},{"id":"Slide111913","class":"Normal Slide","instance":"","thumbnail":"dr/Slide111913_thnail.jpg","children":["Image_440","Text_Caption_174","Image_441","Text_Caption_330","Text_Caption_175","Text_Caption_176","Image_438","Text_Caption_327","Text_Caption_328","Image_439","Image_442","Text_Caption_329","Image_444","Image_445","Image_446"],"roles":{"slide":{"durationInFrames":1494},"navigation":{"navid":"Slide111913"}}},{"id":"si112185","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si112200","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_181","class":"TODO::Senthil","instance":"SmartShape_181","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_176","class":"TODO::Senthil","instance":"SmartShape_176","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_447","class":"TODO::Senthil","instance":"Image_447","roles":{}},{"id":"Text_Caption_331","class":"TODO::Senthil","instance":"Text_Caption_331","title":"¿A QUÉ TIPO DE INFORMACIÓN TIENEN ACCESO LOS CIBERDELINCUENTES? ","roles":{"textData":{}}},{"id":"SmartShape_179","class":"TODO::Senthil","instance":"SmartShape_179","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_180","class":"TODO::Senthil","instance":"SmartShape_180","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_334","class":"TODO::Senthil","instance":"Text_Caption_334","title":"¿A qué tipo de información tienen aceeso los ciberdelincuentes? ","roles":{"textData":{}}},{"id":"Image_450","class":"TODO::Senthil","instance":"Image_450","roles":{}},{"id":"Image_451","class":"TODO::Senthil","instance":"Image_451","roles":{}},{"id":"Text_Caption_335","class":"TODO::Senthil","instance":"Text_Caption_335","title":"Datos personales ","roles":{"textData":{}}},{"id":"Text_Caption_336","class":"TODO::Senthil","instance":"Text_Caption_336","title":"Familiares ","roles":{"textData":{}}},{"id":"Text_Caption_337","class":"TODO::Senthil","instance":"Text_Caption_337","title":"Correos ","roles":{"textData":{}}},{"id":"Text_Caption_338","class":"TODO::Senthil","instance":"Text_Caption_338","title":"Teléfonos ","roles":{"textData":{}}},{"id":"Text_Caption_340","class":"TODO::Senthil","instance":"Text_Caption_340","title":"Direcciones particulares ","roles":{"textData":{}}},{"id":"Text_Caption_341","class":"TODO::Senthil","instance":"Text_Caption_341","title":"Deportes ","roles":{"textData":{}}},{"id":"Text_Caption_342","class":"TODO::Senthil","instance":"Text_Caption_342","title":"Trabajos ","roles":{"textData":{}}},{"id":"Text_Caption_343","class":"TODO::Senthil","instance":"Text_Caption_343","title":"Ocios ","roles":{"textData":{}}},{"id":"Slide112184","class":"Normal Slide","instance":"","thumbnail":"dr/Slide112184_thnail.jpg","children":["Image_447","Text_Caption_331","Text_Caption_334","Image_450","Image_451","Text_Caption_335","Text_Caption_336","Text_Caption_337","Text_Caption_338","Text_Caption_340","Text_Caption_341","Text_Caption_342","Text_Caption_343"],"roles":{"slide":{"durationInFrames":468},"navigation":{"navid":"Slide112184"}}},{"id":"si112466","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si112481","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_183","class":"TODO::Senthil","instance":"SmartShape_183","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_180","class":"TODO::Senthil","instance":"Text_Caption_180","title":"(acrónimo derivado de las palabras inglesas sex y texting) es la acción de enviar o recibir imágenes, fotografías o vídeos de contenido sexual a través del móvil, las redes sociales o cualquier otro medio electrónico.  ","roles":{"textData":{}}},{"id":"SmartShape_177","class":"TODO::Senthil","instance":"SmartShape_177","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_448","class":"TODO::Senthil","instance":"Image_448","roles":{}},{"id":"Text_Caption_332","class":"TODO::Senthil","instance":"Text_Caption_332","title":"¿QUÉ ES EL SEXTING? ","roles":{"textData":{}}},{"id":"SmartShape_184","class":"TODO::Senthil","instance":"SmartShape_184","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_185","class":"TODO::Senthil","instance":"SmartShape_185","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_344","class":"TODO::Senthil","instance":"Text_Caption_344","title":"¿A qué tipo de información tienen aceeso los ciberdelincuentes? ","roles":{"textData":{}}},{"id":"Image_452","class":"TODO::Senthil","instance":"Image_452","roles":{}},{"id":"Image_453","class":"TODO::Senthil","instance":"Image_453","roles":{}},{"id":"Image_454","class":"TODO::Senthil","instance":"Image_454","roles":{}},{"id":"Slide112465","class":"Normal Slide","instance":"","thumbnail":"dr/Slide112465_thnail.jpg","children":["Text_Caption_180","Image_448","Text_Caption_332","Text_Caption_344","Image_452","Image_453","Image_454"],"roles":{"slide":{"durationInFrames":555},"navigation":{"navid":"Slide112465"}}},{"id":"si112624","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si112639","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_187","class":"TODO::Senthil","instance":"SmartShape_187","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_186","class":"TODO::Senthil","instance":"SmartShape_186","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_455","class":"TODO::Senthil","instance":"Image_455","roles":{}},{"id":"Text_Caption_345","class":"TODO::Senthil","instance":"Text_Caption_345","title":"¿QUÉ ES LA SEXTORSIÓN? ","roles":{"textData":{}}},{"id":"SmartShape_188","class":"TODO::Senthil","instance":"SmartShape_188","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_189","class":"TODO::Senthil","instance":"SmartShape_189","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_346","class":"TODO::Senthil","instance":"Text_Caption_346","title":"¿Qué es la sextorsión ","roles":{"textData":{}}},{"id":"Image_456","class":"TODO::Senthil","instance":"Image_456","roles":{}},{"id":"Text_Caption_182","class":"TODO::Senthil","instance":"Text_Caption_182","title":"Se define la sextorsión como un delito grave que ocurre cuando alguien amenaza con distribuir tu material privado y sensible si no le proporcionas imágenes de naturaleza sexual, favores sexuales o dinero.  ","roles":{"textData":{}}},{"id":"Text_Caption_183","class":"TODO::Senthil","instance":"Text_Caption_183","title":"Por lo general, el perpetrador tiene (o pretende tener) algunas imágenes o videos comprometedores de la víctima.  ","roles":{"textData":{}}},{"id":"Image_457","class":"TODO::Senthil","instance":"Image_457","roles":{}},{"id":"Image_458","class":"TODO::Senthil","instance":"Image_458","roles":{}},{"id":"Image_459","class":"TODO::Senthil","instance":"Image_459","roles":{}},{"id":"SmartShape_190","class":"TODO::Senthil","instance":"SmartShape_190","title":"ver video explicativo ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Click_Box_38","class":"TODO::Senthil","instance":"Click_Box_38","roles":{"click":{"subtype":"button"}}},{"id":"Image_460","class":"TODO::Senthil","instance":"Image_460","roles":{}},{"id":"Slide112623","class":"Normal Slide","instance":"","thumbnail":"dr/Slide112623_thnail.jpg","children":["Image_455","Text_Caption_345","Text_Caption_346","Image_456","Text_Caption_182","Text_Caption_183","Image_457","Image_458","Image_459","Click_Box_38","Image_460"],"roles":{"slide":{"durationInFrames":780},"navigation":{"navid":"Slide112623"}}},{"id":"si112833","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si112848","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_194","class":"TODO::Senthil","instance":"SmartShape_194","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_186","class":"TODO::Senthil","instance":"Text_Caption_186","title":"La ingeniería social aplicada en este caso y la más común suele ser que el ciberdelincuente se hace pasar por algún funcionario de entidades bancarias o prestadoras de servicios donde ofrecen beneficios accesibles o renovaciones de cuentas... ","roles":{"textData":{}}},{"id":"Text_Caption_187","class":"TODO::Senthil","instance":"Text_Caption_187","title":"...indistintamente donde una vez que tengan la atención de sus victimas inician el proceso de hackeo de cuenta de WhatsApp solicitando que lean un SMS (mensajes de texto) que les llega para validar el proceso de autenticación al cual  van a acceder... ","roles":{"textData":{}}},{"id":"Text_Caption_188","class":"TODO::Senthil","instance":"Text_Caption_188","title":"...encontrándose con la sorpresa de que ese SMS contenía el pin de atención de la cuenta de WhatsApp a ser hackeada o robada.  ","roles":{"textData":{}}},{"id":"SmartShape_191","class":"TODO::Senthil","instance":"SmartShape_191","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_461","class":"TODO::Senthil","instance":"Image_461","roles":{}},{"id":"Text_Caption_347","class":"TODO::Senthil","instance":"Text_Caption_347","title":"HACKEOS DE WHATSAPP ","roles":{"textData":{}}},{"id":"SmartShape_192","class":"TODO::Senthil","instance":"SmartShape_192","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_193","class":"TODO::Senthil","instance":"SmartShape_193","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_348","class":"TODO::Senthil","instance":"Text_Caption_348","title":"Hackeos de whatsapp ","roles":{"textData":{}}},{"id":"Image_462","class":"TODO::Senthil","instance":"Image_462","roles":{}},{"id":"Image_473","class":"TODO::Senthil","instance":"Image_473","roles":{}},{"id":"Image_463","class":"TODO::Senthil","instance":"Image_463","roles":{}},{"id":"Image_464","class":"TODO::Senthil","instance":"Image_464","roles":{}},{"id":"Slide112832","class":"Normal Slide","instance":"","thumbnail":"dr/Slide112832_thnail.jpg","children":["Text_Caption_186","Text_Caption_187","Text_Caption_188","Image_461","Text_Caption_347","Text_Caption_348","Image_462","Image_473","Image_463","Image_464"],"roles":{"slide":{"durationInFrames":1239},"navigation":{"navid":"Slide112832"}}},{"id":"si113091","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si113106","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_198","class":"TODO::Senthil","instance":"SmartShape_198","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_192","class":"TODO::Senthil","instance":"Text_Caption_192","title":"Al momento de que el supuesto funcionario empieza a preguntar o pedir la información personal y por sobre todo contraseñas y/o pin de acceso es donde se debe de cortar la llamada y no hacer caso al mismo. ","roles":{"textData":{}}},{"id":"Text_Caption_193","class":"TODO::Senthil","instance":"Text_Caption_193","title":"Inmediatamente después configurar la autenticación de doble factor de seguridad. ","roles":{"textData":{}}},{"id":"Text_Caption_194","class":"TODO::Senthil","instance":"Text_Caption_194","title":"No proporcionar ningún tipo de información personal  sean estas códigos o pines  de acceso a la cuenta. ","roles":{"textData":{}}},{"id":"SmartShape_195","class":"TODO::Senthil","instance":"SmartShape_195","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_465","class":"TODO::Senthil","instance":"Image_465","roles":{}},{"id":"Text_Caption_349","class":"TODO::Senthil","instance":"Text_Caption_349","title":"¿CÓMO ME PROTEJO? ","roles":{"textData":{}}},{"id":"SmartShape_196","class":"TODO::Senthil","instance":"SmartShape_196","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_197","class":"TODO::Senthil","instance":"SmartShape_197","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_350","class":"TODO::Senthil","instance":"Text_Caption_350","title":"¿Cómo me protejo? ","roles":{"textData":{}}},{"id":"Image_466","class":"TODO::Senthil","instance":"Image_466","roles":{}},{"id":"Image_467","class":"TODO::Senthil","instance":"Image_467","roles":{}},{"id":"Image_474","class":"TODO::Senthil","instance":"Image_474","roles":{}},{"id":"Slide113090","class":"Normal Slide","instance":"","thumbnail":"dr/Slide113090_thnail.jpg","children":["Text_Caption_192","Text_Caption_193","Text_Caption_194","Image_465","Text_Caption_349","Text_Caption_350","Image_466","Image_467","Image_474"],"roles":{"slide":{"durationInFrames":933},"navigation":{"navid":"Slide113090"}}},{"id":"si113349","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si113364","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_200","class":"TODO::Senthil","instance":"SmartShape_200","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_198","class":"TODO::Senthil","instance":"Text_Caption_198","title":"Realizar la denuncia ante la Policía Nacional en el Departamento Especializado en la Investigación del cibercrimen o en su defecto en la Comisaria Jurisdiccional más cercana. ","roles":{"textData":{}}},{"id":"Text_Caption_199","class":"TODO::Senthil","instance":"Text_Caption_199","title":"Enviar un correo electrónico al soporte técnico de WhatsApp, solicitando la desactivación de la cuenta introduciendo el numero de celular con el prefijo internacional +5959xxxx   ","roles":{"textData":{}}},{"id":"Text_Caption_200","class":"TODO::Senthil","instance":"Text_Caption_200","title":"Dar aviso a los contactos  de la situación y  reportar la cuenta.  Luego de 24 horas o 7  días se podrá resetear  la cuenta para volver  a utilizar la cuenta.   ","roles":{"textData":{}}},{"id":"SmartShape_199","class":"TODO::Senthil","instance":"SmartShape_199","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_468","class":"TODO::Senthil","instance":"Image_468","roles":{}},{"id":"Text_Caption_351","class":"TODO::Senthil","instance":"Text_Caption_351","title":"¿QUÉ HAGO EN CASO  DE SER VÍCTIMA? ","roles":{"textData":{}}},{"id":"SmartShape_201","class":"TODO::Senthil","instance":"SmartShape_201","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_202","class":"TODO::Senthil","instance":"SmartShape_202","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_352","class":"TODO::Senthil","instance":"Text_Caption_352","title":"¿Qué hago en caso de ser víctima? ","roles":{"textData":{}}},{"id":"Image_469","class":"TODO::Senthil","instance":"Image_469","roles":{}},{"id":"Image_470","class":"TODO::Senthil","instance":"Image_470","roles":{}},{"id":"Image_471","class":"TODO::Senthil","instance":"Image_471","roles":{}},{"id":"Image_475","class":"TODO::Senthil","instance":"Image_475","roles":{}},{"id":"Slide113348","class":"Normal Slide","instance":"","thumbnail":"dr/Slide113348_thnail.jpg","children":["Text_Caption_198","Text_Caption_199","Text_Caption_200","Image_468","Text_Caption_351","Text_Caption_352","Image_469","Image_470","Image_471","Image_475"],"roles":{"slide":{"durationInFrames":1041},"navigation":{"navid":"Slide113348"}}},{"id":"si113607","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si113622","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_206","class":"TODO::Senthil","instance":"SmartShape_206","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_204","class":"TODO::Senthil","instance":"Text_Caption_204","title":"Solamente a los contactos y grupos de WhatsApp.    ","roles":{"textData":{}}},{"id":"Text_Caption_205","class":"TODO::Senthil","instance":"Text_Caption_205","title":"Piden dinero manifestando una necesidad urgente haciéndose pasar por el titular de la cuenta.    ","roles":{"textData":{}}},{"id":"Text_Caption_206","class":"TODO::Senthil","instance":"Text_Caption_206","title":"Observación: No caer en hacer giros para recuperar la cuenta, no está garantizado. Y el problema es con App no la empresa telefónica.    ","roles":{"textData":{}}},{"id":"SmartShape_203","class":"TODO::Senthil","instance":"SmartShape_203","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_472","class":"TODO::Senthil","instance":"Image_472","roles":{}},{"id":"Text_Caption_353","class":"TODO::Senthil","instance":"Text_Caption_353","title":"¿A QUÉ TIENE ACCESO EL  CIBERDELINCUENTE? ","roles":{"textData":{}}},{"id":"SmartShape_204","class":"TODO::Senthil","instance":"SmartShape_204","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_205","class":"TODO::Senthil","instance":"SmartShape_205","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_354","class":"TODO::Senthil","instance":"Text_Caption_354","title":"¿A qué tiene acceso  el ciberdelincuente? ","roles":{"textData":{}}},{"id":"Image_476","class":"TODO::Senthil","instance":"Image_476","roles":{}},{"id":"Image_477","class":"TODO::Senthil","instance":"Image_477","roles":{}},{"id":"Image_478","class":"TODO::Senthil","instance":"Image_478","roles":{}},{"id":"Image_479","class":"TODO::Senthil","instance":"Image_479","roles":{}},{"id":"Slide113606","class":"Normal Slide","instance":"","thumbnail":"dr/Slide113606_thnail.jpg","children":["Text_Caption_204","Text_Caption_205","Text_Caption_206","Image_472","Text_Caption_353","Text_Caption_354","Image_476","Image_477","Image_478","Image_479"],"roles":{"slide":{"durationInFrames":768},"navigation":{"navid":"Slide113606"}}},{"id":"si113865","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si113880","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_210","class":"TODO::Senthil","instance":"SmartShape_210","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_210","class":"TODO::Senthil","instance":"Text_Caption_210","title":"Aquellas personas que no utilizan Internet como herramienta diaria o que simplemente no se encuentren familiarizadas con las nuevas tecnologías les generará dudas realizar trámites online como pueden ser las compras o las ventas.   ","roles":{"textData":{}}},{"id":"Text_Caption_211","class":"TODO::Senthil","instance":"Text_Caption_211","title":"Por lo tanto, se hace necesario estar al día en ciertos aspectos de seguridad tanto para perder el miedo al llevar a cabo este tipo de gestiones, como para que se realicen en un ámbito lo más seguro posible.  ","roles":{"textData":{}}},{"id":"Text_Caption_212","class":"TODO::Senthil","instance":"Text_Caption_212","title":"Por este motivo te invitamos a que sigas los consejos que te mostramos a continuación. ","roles":{"textData":{}}},{"id":"SmartShape_207","class":"TODO::Senthil","instance":"SmartShape_207","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_480","class":"TODO::Senthil","instance":"Image_480","roles":{}},{"id":"Text_Caption_355","class":"TODO::Senthil","instance":"Text_Caption_355","title":"PÁGINAS FRAUDULENTAS ","roles":{"textData":{}}},{"id":"SmartShape_208","class":"TODO::Senthil","instance":"SmartShape_208","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_209","class":"TODO::Senthil","instance":"SmartShape_209","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_356","class":"TODO::Senthil","instance":"Text_Caption_356","title":"Páginas fraudulentas ","roles":{"textData":{}}},{"id":"Image_481","class":"TODO::Senthil","instance":"Image_481","roles":{}},{"id":"Image_482","class":"TODO::Senthil","instance":"Image_482","roles":{}},{"id":"Image_483","class":"TODO::Senthil","instance":"Image_483","roles":{}},{"id":"Slide113864","class":"Normal Slide","instance":"","thumbnail":"dr/Slide113864_thnail.jpg","children":["Text_Caption_210","Text_Caption_211","Text_Caption_212","Image_480","Text_Caption_355","Text_Caption_356","Image_481","Image_482","Image_483"],"roles":{"slide":{"durationInFrames":984},"navigation":{"navid":"Slide113864"}}},{"id":"si114123","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si114138","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_213","class":"TODO::Senthil","instance":"SmartShape_213","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_492","class":"TODO::Senthil","instance":"Image_492","roles":{}},{"id":"SmartShape_214","class":"TODO::Senthil","instance":"SmartShape_214","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_216","class":"TODO::Senthil","instance":"Text_Caption_216","title":"No facilita información de la empresa como dirección, etc. Si tienes que reclamar a  alguien, debes saber a quién dirigirte. ","roles":{"textData":{}}},{"id":"Image_485","class":"TODO::Senthil","instance":"Image_485","roles":{}},{"id":"SmartShape_215","class":"TODO::Senthil","instance":"SmartShape_215","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_217","class":"TODO::Senthil","instance":"Text_Caption_217","title":"Ofrecen productos o servicios a precios extremadamente bajos, alejados de los precios reales que se manejan en el mercado o todos  los artículos se venden al mismo precio. ","roles":{"textData":{}}},{"id":"Image_486","class":"TODO::Senthil","instance":"Image_486","roles":{}},{"id":"SmartShape_216","class":"TODO::Senthil","instance":"SmartShape_216","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_218","class":"TODO::Senthil","instance":"Text_Caption_218","title":"Un producto aparece con un precio inicial muy inflado sobre el que posteriormente se aplica un descuento muy alto. ","roles":{"textData":{}}},{"id":"Image_487","class":"TODO::Senthil","instance":"Image_487","roles":{}},{"id":"SmartShape_217","class":"TODO::Senthil","instance":"SmartShape_217","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_219","class":"TODO::Senthil","instance":"Text_Caption_219","title":"No cuenta con un certificado digital ya que no garantiza ningún tipo de seguridad a la hora de introducir datos personales o tarjeta de crédito. ","roles":{"textData":{}}},{"id":"Image_488","class":"TODO::Senthil","instance":"Image_488","roles":{}},{"id":"SmartShape_218","class":"TODO::Senthil","instance":"SmartShape_218","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_220","class":"TODO::Senthil","instance":"Text_Caption_220","title":"Los “textos legales” (Términos y condiciones, Política de privacidad, etc.), o no se  facilitan o están mal redactados. ","roles":{"textData":{}}},{"id":"Image_489","class":"TODO::Senthil","instance":"Image_489","roles":{}},{"id":"SmartShape_219","class":"TODO::Senthil","instance":"SmartShape_219","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_221","class":"TODO::Senthil","instance":"Text_Caption_221","title":"Ofrece varias formas de pago y realmente sólo aceptan tarjeta de crédito. Existen tiendas que en la portada ofrecen varios medios de pago, pero a la hora de pagar, solamente permite la tarjeta de crédito.  ","roles":{"textData":{}}},{"id":"SmartShape_220","class":"TODO::Senthil","instance":"SmartShape_220","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_222","class":"TODO::Senthil","instance":"Text_Caption_222","title":"No hay comentarios en ningún foro ni referencias en ningún otro lugar en la Red.    ","roles":{"textData":{}}},{"id":"Image_490","class":"TODO::Senthil","instance":"Image_490","roles":{}},{"id":"SmartShape_211","class":"TODO::Senthil","instance":"SmartShape_211","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_212","class":"TODO::Senthil","instance":"SmartShape_212","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_357","class":"TODO::Senthil","instance":"Text_Caption_357","title":"No debemos comprar en  una tienda online si: ","roles":{"textData":{}}},{"id":"Image_484","class":"TODO::Senthil","instance":"Image_484","roles":{}},{"id":"SmartShape_221","class":"TODO::Senthil","instance":"SmartShape_221","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_491","class":"TODO::Senthil","instance":"Image_491","roles":{}},{"id":"Text_Caption_358","class":"TODO::Senthil","instance":"Text_Caption_358","title":"Aunque no es determinante, es aconsejable consultar Internet y preguntar por la tienda a fin de tenerlo en cuenta en caso de encontrar posibles quejas o comentarios negativos.   ","roles":{"textData":{}}},{"id":"Slide114122","class":"Normal Slide","instance":"","thumbnail":"dr/Slide114122_thnail.jpg","children":["Image_492","Text_Caption_216","Image_485","Text_Caption_217","Image_486","Text_Caption_218","Image_487","Text_Caption_219","Image_488","Text_Caption_220","Image_489","Text_Caption_221","Text_Caption_222","Image_490","Text_Caption_357","Image_484","Image_491","Text_Caption_358"],"roles":{"slide":{"durationInFrames":2322},"navigation":{"navid":"Slide114122"}}},{"id":"si124989","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si125004","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_225","class":"TODO::Senthil","instance":"SmartShape_225","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_230","class":"TODO::Senthil","instance":"Text_Caption_230","title":"¿Cómo funciona? Los virus se encuentran dentro de la categoría de malware y están diseñados para copiarse a sí mismos y propagarse a tantos dispositivos como les sea posible.  ","roles":{"textData":{}}},{"id":"Image_495","class":"TODO::Senthil","instance":"Image_495","roles":{}},{"id":"Text_Caption_231","class":"TODO::Senthil","instance":"Text_Caption_231","title":"¿Cómo se propaga, infecta y extiende? Proliferan infectando aplicaciones, a través del correo electrónico u otros servicios web, y pueden transmitirse por medio de dispositivos extraíbles, como memorias USB (pendrive) o archivos adjuntos, incluso a través de conexiones de red. ","roles":{"textData":{}}},{"id":"Image_496","class":"TODO::Senthil","instance":"Image_496","roles":{}},{"id":"Text_Caption_232","class":"TODO::Senthil","instance":"Text_Caption_232","title":"¿Cual es su objetivo? Pueden llegar a modificar o eliminar los archivos almacenados en el equipo. Son capaces de dañar un sistema, eliminando o corrompiendo datos esenciales para su correcto funcionamiento. ","roles":{"textData":{}}},{"id":"Image_497","class":"TODO::Senthil","instance":"Image_497","roles":{}},{"id":"SmartShape_222","class":"TODO::Senthil","instance":"SmartShape_222","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_493","class":"TODO::Senthil","instance":"Image_493","roles":{}},{"id":"Text_Caption_359","class":"TODO::Senthil","instance":"Text_Caption_359","title":"VIRUS ","roles":{"textData":{}}},{"id":"SmartShape_223","class":"TODO::Senthil","instance":"SmartShape_223","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_224","class":"TODO::Senthil","instance":"SmartShape_224","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_360","class":"TODO::Senthil","instance":"Text_Caption_360","title":"Virus ","roles":{"textData":{}}},{"id":"Image_494","class":"TODO::Senthil","instance":"Image_494","roles":{}},{"id":"Slide124988","class":"Normal Slide","instance":"","thumbnail":"dr/Slide124988_thnail.jpg","children":["Text_Caption_230","Image_495","Text_Caption_231","Image_496","Text_Caption_232","Image_497","Image_493","Text_Caption_359","Text_Caption_360","Image_494"],"roles":{"slide":{"durationInFrames":1374},"navigation":{"navid":"Slide124988"}}},{"id":"si99404","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si99419","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_227","class":"TODO::Senthil","instance":"SmartShape_227","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_499","class":"TODO::Senthil","instance":"Image_499","roles":{}},{"id":"Text_Caption_362","class":"TODO::Senthil","instance":"Text_Caption_362","title":"TIPOS DE VIRUS  MÁS COMUNES ","roles":{"textData":{}}},{"id":"Slide99403","class":"Normal Slide","instance":"","thumbnail":"dr/Slide99403_thnail.jpg","children":["Image_499","Text_Caption_362"],"roles":{"slide":{"durationInFrames":114},"navigation":{"navid":"Slide99403"}}},{"id":"si29629","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si29644","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_44","class":"TODO::Senthil","instance":"Image_44","roles":{}},{"id":"Click_Box_23","class":"TODO::Senthil","instance":"Click_Box_23","roles":{"click":{"subtype":"button"}}},{"id":"Click_Box_24","class":"TODO::Senthil","instance":"Click_Box_24","roles":{"click":{"subtype":"button"}}},{"id":"Image_151","class":"TODO::Senthil","instance":"Image_151","roles":{}},{"id":"Image_152","class":"TODO::Senthil","instance":"Image_152","roles":{}},{"id":"Image_153","class":"TODO::Senthil","instance":"Image_153","roles":{}},{"id":"Image_154","class":"TODO::Senthil","instance":"Image_154","roles":{}},{"id":"SmartShape_87","class":"TODO::Senthil","instance":"SmartShape_87","title":"Siguiente tema ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Click_Box_34","class":"TODO::Senthil","instance":"Click_Box_34","roles":{"click":{"subtype":"button"}}},{"id":"Image_370","class":"TODO::Senthil","instance":"Image_370","roles":{}},{"id":"Click_Box_22","class":"TODO::Senthil","instance":"Click_Box_22","roles":{"click":{"subtype":"button"}}},{"id":"Click_Box_17","class":"TODO::Senthil","instance":"Click_Box_17","roles":{"click":{"subtype":"button"}}},{"id":"Slide29628","class":"Normal Slide","instance":"","thumbnail":"dr/Slide29628_thnail.jpg","children":["Image_44","Click_Box_23","Click_Box_24","Image_151","Image_152","Image_153","Image_154","Click_Box_34","Image_370","Click_Box_22","Click_Box_17"],"roles":{"slide":{"durationInFrames":990},"navigation":{"navid":"Slide29628"}}},{"id":"si29754","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si29769","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_229","class":"TODO::Senthil","instance":"SmartShape_229","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_367","class":"TODO::Senthil","instance":"Text_Caption_367","title":"¿Cómo me protejo? ","roles":{"textData":{}}},{"id":"Text_Caption_233","class":"TODO::Senthil","instance":"Text_Caption_233","title":"Se trata de un software malicioso diseñado para mostrarnos anuncios no deseados de forma masiva. ","roles":{"textData":{}}},{"id":"Image_502","class":"TODO::Senthil","instance":"Image_502","roles":{}},{"id":"Text_Caption_365","class":"TODO::Senthil","instance":"Text_Caption_365","title":"¿Cómo se propaga, infecta y extiende? ","roles":{"textData":{}}},{"id":"Text_Caption_234","class":"TODO::Senthil","instance":"Text_Caption_234","title":"Suelen instalarse junto a otros programas legítimos que, sin que nos percatemos, aceptamos y terminamos por instalar en el equipo ","roles":{"textData":{}}},{"id":"Image_503","class":"TODO::Senthil","instance":"Image_503","roles":{}},{"id":"Text_Caption_366","class":"TODO::Senthil","instance":"Text_Caption_366","title":"¿Cual es su objetivo? ","roles":{"textData":{}}},{"id":"Text_Caption_235","class":"TODO::Senthil","instance":"Text_Caption_235","title":"Su objetivo es recopilar información sobre nuestra actividad y, de este modo, mostrarnos anuncios dirigidos.  ","roles":{"textData":{}}},{"id":"Text_Caption_236","class":"TODO::Senthil","instance":"Text_Caption_236","title":"Suelen suponer más una molestia y un incordio. Sin embargo, su instalación también puede suponer una bajada de rendimiento y un mal funcionamiento del dispositivo. ","roles":{"textData":{}}},{"id":"Text_Caption_237","class":"TODO::Senthil","instance":"Text_Caption_237","title":"Como protección, es fundamental evitar la descarga de aplicaciones de sitios no oficiales o el software pirata.  ","roles":{"textData":{}}},{"id":"Text_Caption_238","class":"TODO::Senthil","instance":"Text_Caption_238","title":"También, se debe prestar atención a los pasos de la instalación para evitar seleccionar alguna casilla  con la que instalar programas adicionales.  ","roles":{"textData":{}}},{"id":"SmartShape_65","class":"TODO::Senthil","instance":"SmartShape_65","title":"volver al menú ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Click_Box_26","class":"TODO::Senthil","instance":"Click_Box_26","roles":{"click":{"subtype":"button"}}},{"id":"Image_155","class":"TODO::Senthil","instance":"Image_155","roles":{}},{"id":"Text_Caption_239","class":"TODO::Senthil","instance":"Text_Caption_239","title":"Puede ser útil hacer clic en el botón de “Instalación Avanzada” u “Opciones de instalación”. Finalmente, otra recomendación es mantener las herramientas de protección debidamente actualizadas. ","roles":{"textData":{}}},{"id":"SmartShape_228","class":"TODO::Senthil","instance":"SmartShape_228","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_500","class":"TODO::Senthil","instance":"Image_500","roles":{}},{"id":"Text_Caption_363","class":"TODO::Senthil","instance":"Text_Caption_363","title":"ADWARE ¿CÓMO FUNCIONA? ","roles":{"textData":{}}},{"id":"SmartShape_230","class":"TODO::Senthil","instance":"SmartShape_230","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_231","class":"TODO::Senthil","instance":"SmartShape_231","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_364","class":"TODO::Senthil","instance":"Text_Caption_364","title":"Adware ","roles":{"textData":{}}},{"id":"Image_501","class":"TODO::Senthil","instance":"Image_501","roles":{}},{"id":"Image_504","class":"TODO::Senthil","instance":"Image_504","roles":{}},{"id":"Slide29753","class":"Normal Slide","instance":"","thumbnail":"dr/Slide29753_thnail.jpg","children":["Text_Caption_367","Text_Caption_233","Image_502","Text_Caption_365","Text_Caption_234","Image_503","Text_Caption_366","Text_Caption_235","Text_Caption_236","Text_Caption_237","Text_Caption_238","Click_Box_26","Image_155","Text_Caption_239","Image_500","Text_Caption_363","Text_Caption_364","Image_501","Image_504"],"roles":{"slide":{"durationInFrames":2148},"navigation":{"navid":"Slide29753"}}},{"id":"si29904","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si29919","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_233","class":"TODO::Senthil","instance":"SmartShape_233","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_240","class":"TODO::Senthil","instance":"Text_Caption_240","title":"Los troyanos suelen camuflarse como un software legítimo para infectar nuestro equipo, o a través de ataques de ingeniería social. ","roles":{"textData":{}}},{"id":"Text_Caption_241","class":"TODO::Senthil","instance":"Text_Caption_241","title":"A menudo, se propagan por medio de archivos adjuntos en correos electrónicos o desde páginas webs poco fiables, escondiéndose tras descargas de juegos, películas o aplicaciones no legítimas.  ","roles":{"textData":{}}},{"id":"Text_Caption_242","class":"TODO::Senthil","instance":"Text_Caption_242","title":"Nosotros, confiados, no somos conscientes de que nuestros equipos han sido infectados hasta que es demasiado tarde. ","roles":{"textData":{}}},{"id":"Text_Caption_243","class":"TODO::Senthil","instance":"Text_Caption_243","title":"La mayoría de los troyanos tienen como  objetivo controlar nuestro equipo, robar los  datos, introducir más software malicioso en el  equipo y propagarse a otros dispositivos. ","roles":{"textData":{}}},{"id":"Text_Caption_244","class":"TODO::Senthil","instance":"Text_Caption_244","title":"Las medidas de protección son comunes con otro tipo de malware, como mantener el equipo actualizado y las medidas de protección activadas (antivirus).  ","roles":{"textData":{}}},{"id":"Text_Caption_245","class":"TODO::Senthil","instance":"Text_Caption_245","title":"También, evitar ejecutar archivos, links o utilizar dispositivos USB de  dudosa procedencia. ","roles":{"textData":{}}},{"id":"SmartShape_66","class":"TODO::Senthil","instance":"SmartShape_66","title":"volver al menú ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_156","class":"TODO::Senthil","instance":"Image_156","roles":{}},{"id":"Click_Box_35","class":"TODO::Senthil","instance":"Click_Box_35","roles":{"click":{"subtype":"button"}}},{"id":"SmartShape_232","class":"TODO::Senthil","instance":"SmartShape_232","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_505","class":"TODO::Senthil","instance":"Image_505","roles":{}},{"id":"Text_Caption_368","class":"TODO::Senthil","instance":"Text_Caption_368","title":"TROYANOS ¿CÓMO FUNCIONA? ","roles":{"textData":{}}},{"id":"SmartShape_234","class":"TODO::Senthil","instance":"SmartShape_234","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_235","class":"TODO::Senthil","instance":"SmartShape_235","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_369","class":"TODO::Senthil","instance":"Text_Caption_369","title":"Troyanos ","roles":{"textData":{}}},{"id":"Image_506","class":"TODO::Senthil","instance":"Image_506","roles":{}},{"id":"Image_507","class":"TODO::Senthil","instance":"Image_507","roles":{}},{"id":"Text_Caption_370","class":"TODO::Senthil","instance":"Text_Caption_370","title":"¿Cómo se propaga, infecta y extiende ? ","roles":{"textData":{}}},{"id":"Text_Caption_371","class":"TODO::Senthil","instance":"Text_Caption_371","title":"¿Cual es su objetivo ? ","roles":{"textData":{}}},{"id":"Image_508","class":"TODO::Senthil","instance":"Image_508","roles":{}},{"id":"Text_Caption_372","class":"TODO::Senthil","instance":"Text_Caption_372","title":"¿Cómo me protejo ? ","roles":{"textData":{}}},{"id":"Image_509","class":"TODO::Senthil","instance":"Image_509","roles":{}},{"id":"Slide29903","class":"Normal Slide","instance":"","thumbnail":"dr/Slide29903_thnail.jpg","children":["Text_Caption_240","Text_Caption_241","Text_Caption_242","Text_Caption_243","Text_Caption_244","Text_Caption_245","Image_156","Click_Box_35","Image_505","Text_Caption_368","Text_Caption_369","Image_506","Image_507","Text_Caption_370","Text_Caption_371","Image_508","Text_Caption_372","Image_509"],"roles":{"slide":{"durationInFrames":2019},"navigation":{"navid":"Slide29903"}}},{"id":"si30066","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si30081","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_237","class":"TODO::Senthil","instance":"SmartShape_237","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_246","class":"TODO::Senthil","instance":"Text_Caption_246","title":"Se trata de un tipo de malware(software malicioso)que consigue tomar el control del dispositivo para cifrar el acceso al mismo y/o nuestros archivos o discos duros.  ","roles":{"textData":{}}},{"id":"Text_Caption_247","class":"TODO::Senthil","instance":"Text_Caption_247","title":"A cambio de recuperar el control y la información, nos exigirá el pago de un rescate.  ","roles":{"textData":{}}},{"id":"Image_512","class":"TODO::Senthil","instance":"Image_512","roles":{}},{"id":"Text_Caption_248","class":"TODO::Senthil","instance":"Text_Caption_248","title":"A menudo, se propagan por medio de archivos adjuntos en correos electrónicos o desde páginas webs poco fiables escondiéndose tras descargas de juegos, películas o aplicaciones no legítimas. No somos conscientes del ataque hasta que es demasiado tarde. ","roles":{"textData":{}}},{"id":"SmartShape_68","class":"TODO::Senthil","instance":"SmartShape_68","title":"volver al menú ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_157","class":"TODO::Senthil","instance":"Image_157","roles":{}},{"id":"Click_Box_36","class":"TODO::Senthil","instance":"Click_Box_36","roles":{"click":{"subtype":"button"}}},{"id":"Text_Caption_250","class":"TODO::Senthil","instance":"Text_Caption_250","title":"Una vez que el malware se ejecuta, poco a poco va cifrando todos los archivos y carpetas del dispositivo, impidiendo el acceso a ellos sin una clave.  ","roles":{"textData":{}}},{"id":"Text_Caption_251","class":"TODO::Senthil","instance":"Text_Caption_251","title":"Una vez completada su tarea, el atacante nos envía otro correo con las instrucciones para el pago y el posterior envío de la clave para descifrar el equipo. ","roles":{"textData":{}}},{"id":"Text_Caption_252","class":"TODO::Senthil","instance":"Text_Caption_252","title":" Las medidas de protección son comunes con otro tipo de malware, como mantener el equipo actualizado y las medidas de protección activadas (antivirus).   ","roles":{"textData":{}}},{"id":"Text_Caption_253","class":"TODO::Senthil","instance":"Text_Caption_253","title":"También, evitar ejecutar archivos, links (enlaces)o utilizar dispositivos USB (pendrive) de dudosa procedencia.  ","roles":{"textData":{}}},{"id":"SmartShape_236","class":"TODO::Senthil","instance":"SmartShape_236","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_510","class":"TODO::Senthil","instance":"Image_510","roles":{}},{"id":"Text_Caption_373","class":"TODO::Senthil","instance":"Text_Caption_373","title":"RANSOMWARE ¿CÓMO FUNCIONA? ","roles":{"textData":{}}},{"id":"SmartShape_238","class":"TODO::Senthil","instance":"SmartShape_238","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_239","class":"TODO::Senthil","instance":"SmartShape_239","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_374","class":"TODO::Senthil","instance":"Text_Caption_374","title":"Ransomware ","roles":{"textData":{}}},{"id":"Image_511","class":"TODO::Senthil","instance":"Image_511","roles":{}},{"id":"Text_Caption_375","class":"TODO::Senthil","instance":"Text_Caption_375","title":"¿Cómo se propaga, infecta y extiende ? ","roles":{"textData":{}}},{"id":"Image_513","class":"TODO::Senthil","instance":"Image_513","roles":{}},{"id":"Image_514","class":"TODO::Senthil","instance":"Image_514","roles":{}},{"id":"Text_Caption_376","class":"TODO::Senthil","instance":"Text_Caption_376","title":"¿Cual es su objetivo ? ","roles":{"textData":{}}},{"id":"Text_Caption_377","class":"TODO::Senthil","instance":"Text_Caption_377","title":"¿Cómo me protejo ? ","roles":{"textData":{}}},{"id":"Image_515","class":"TODO::Senthil","instance":"Image_515","roles":{}},{"id":"Slide30065","class":"Normal Slide","instance":"","thumbnail":"dr/Slide30065_thnail.jpg","children":["Text_Caption_246","Text_Caption_247","Image_512","Text_Caption_248","Image_157","Click_Box_36","Text_Caption_250","Text_Caption_251","Text_Caption_252","Text_Caption_253","Image_510","Text_Caption_373","Text_Caption_374","Image_511","Text_Caption_375","Image_513","Image_514","Text_Caption_376","Text_Caption_377","Image_515"],"roles":{"slide":{"durationInFrames":2337},"navigation":{"navid":"Slide30065"}}},{"id":"si30240","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si30255","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_243","class":"TODO::Senthil","instance":"SmartShape_243","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_70","class":"TODO::Senthil","instance":"SmartShape_70","title":"volver al menú ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Click_Box_31","class":"TODO::Senthil","instance":"Click_Box_31","roles":{"click":{"subtype":"button"}}},{"id":"Image_159","class":"TODO::Senthil","instance":"Image_159","roles":{}},{"id":"Text_Caption_254","class":"TODO::Senthil","instance":"Text_Caption_254","title":"Se trata de un tipo de malware que, una vez ejecutado en un sistema, puede modificar el código o las características de este.   ","roles":{"textData":{}}},{"id":"Text_Caption_255","class":"TODO::Senthil","instance":"Text_Caption_255","title":"Generalmente, pasan inadvertidos hasta que su proceso de reproducción se hace evidente, produciendo consecuencias en el rendimiento de nuestro equipo. ","roles":{"textData":{}}},{"id":"Text_Caption_256","class":"TODO::Senthil","instance":"Text_Caption_256","title":"Las formas más comunes son por medio de archivos adjuntos, las redes de intercambio de archivos y los enlaces a sitios web maliciosos.  ","roles":{"textData":{}}},{"id":"Text_Caption_257","class":"TODO::Senthil","instance":"Text_Caption_257","title":"También pueden infectar otros dispositivos al conectar dispositivos USB (pendrive) infectados con el gusano.  ","roles":{"textData":{}}},{"id":"Text_Caption_258","class":"TODO::Senthil","instance":"Text_Caption_258","title":"El objetivo de un gusano informático no es otro que el de replicarse e infectar otros dispositivos. Una vez dentro, es capaz de realizar cambios en el sistema sin nuestra autorización.  ","roles":{"textData":{}}},{"id":"Text_Caption_259","class":"TODO::Senthil","instance":"Text_Caption_259","title":"La propagación de este tipo de malware (software malicioso) supone un consumo de los recursos del sistema infectado. Puede traducirse en una disminución del rendimiento o una peor conexión al estar consumiendo parte de nuestro ancho de banda.  ","roles":{"textData":{}}},{"id":"Text_Caption_260","class":"TODO::Senthil","instance":"Text_Caption_260","title":"Las medidas de protección son comunes a otro tipo de ataques por malware. Se basan en mantener activos y actualizados los programas de protección, como el antivirus y el firewall...  ","roles":{"textData":{}}},{"id":"Text_Caption_261","class":"TODO::Senthil","instance":"Text_Caption_261","title":"...así como mantener nuestro sistema actualizado para evitar vulnerabilidades. Finalmente, es recomendable evitar la descargar de archivos maliciosos y navegar por sitios webs fraudulentos.   ","roles":{"textData":{}}},{"id":"SmartShape_240","class":"TODO::Senthil","instance":"SmartShape_240","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_516","class":"TODO::Senthil","instance":"Image_516","roles":{}},{"id":"Text_Caption_378","class":"TODO::Senthil","instance":"Text_Caption_378","title":"GUSANO ¿CÓMO FUNCIONA? ","roles":{"textData":{}}},{"id":"SmartShape_241","class":"TODO::Senthil","instance":"SmartShape_241","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_242","class":"TODO::Senthil","instance":"SmartShape_242","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_379","class":"TODO::Senthil","instance":"Text_Caption_379","title":"Gusano ","roles":{"textData":{}}},{"id":"Image_517","class":"TODO::Senthil","instance":"Image_517","roles":{}},{"id":"Image_518","class":"TODO::Senthil","instance":"Image_518","roles":{}},{"id":"Text_Caption_380","class":"TODO::Senthil","instance":"Text_Caption_380","title":"¿Cómo se propaga, infecta y extiende ? ","roles":{"textData":{}}},{"id":"Image_519","class":"TODO::Senthil","instance":"Image_519","roles":{}},{"id":"Image_520","class":"TODO::Senthil","instance":"Image_520","roles":{}},{"id":"Text_Caption_381","class":"TODO::Senthil","instance":"Text_Caption_381","title":"¿Cual es su objetivo ? ","roles":{"textData":{}}},{"id":"Text_Caption_382","class":"TODO::Senthil","instance":"Text_Caption_382","title":"¿Cómo me protejo ? ","roles":{"textData":{}}},{"id":"Image_521","class":"TODO::Senthil","instance":"Image_521","roles":{}},{"id":"Slide30239","class":"Normal Slide","instance":"","thumbnail":"dr/Slide30239_thnail.jpg","children":["Click_Box_31","Image_159","Text_Caption_254","Text_Caption_255","Text_Caption_256","Text_Caption_257","Text_Caption_258","Text_Caption_259","Text_Caption_260","Text_Caption_261","Image_516","Text_Caption_378","Text_Caption_379","Image_517","Image_518","Text_Caption_380","Image_519","Image_520","Text_Caption_381","Text_Caption_382","Image_521"],"roles":{"slide":{"durationInFrames":2715},"navigation":{"navid":"Slide30239"}}},{"id":"si334127","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si334142","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"SmartShape_244","class":"TODO::Senthil","instance":"SmartShape_244","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_524","class":"TODO::Senthil","instance":"Image_524","roles":{}},{"id":"Slide334126","class":"Normal Slide","instance":"","thumbnail":"dr/Slide334126_thnail.jpg","children":["Image_524"],"roles":{"slide":{"durationInFrames":141},"navigation":{"navid":"Slide334126"}}},{"id":"si133930","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"si133945","class":"TODO::Senthil","title":" ","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_525","class":"TODO::Senthil","instance":"Image_525","roles":{}},{"id":"Slide133929","class":"Normal Slide","instance":"","thumbnail":"dr/Slide133929_thnail.jpg","children":["Image_525"],"roles":{"slide":{"durationInFrames":171},"navigation":{"navid":"Slide133929"}}},{"id":"AVANCE","class":"project","title":"AVANCE","children":["Slide4754","Slide6702","Slide47739","Slide54071","Slide54328","Slide12682","Slide14720","Slide13059","Slide13290","Slide13521","Slide13911","Slide14156","Slide14401","Slide19014","Slide85782","Slide99768","Slide99938","Slide100110","Slide100395","Slide100554","Slide105270","Slide105692","Slide105882","Slide106072","Slide106312","Slide106464","Slide106611","Slide106882","Slide111852","Slide111913","Slide112184","Slide112465","Slide112623","Slide112832","Slide113090","Slide113348","Slide113606","Slide113864","Slide114122","Slide124988","Slide99403","Slide29628","Slide29753","Slide29903","Slide30065","Slide30239","Slide334126","Slide133929"],"roles":{"quiz":{"id":469,"branched":false,"submitAll":false,"review":true,"questions":[],"minScore":0,"maxScore":0,"passScore":0}}}],"contentSettings":{"global":{"branchAware":false},"toc":{"enabled":false},"playbar":{"enabled":true}},"contentReporting":{"CCCriteria":"launch_content","SCCriteria":"launch_content","exitNormalIfCompleted":false},"toc":[{"id":"Slide4754","title":"Slide 1"},{"id":"Slide6702","title":"Slide 2"},{"id":"Slide47739","title":"Slide 3"},{"id":"Slide54071","title":"Slide 4"},{"id":"Slide54328","title":"Slide 5"},{"id":"Slide12682","title":"Slide 6"},{"id":"Slide14720","title":"Slide 7"},{"id":"Slide13059","title":"Slide 8"},{"id":"Slide13290","title":"Slide 9"},{"id":"Slide13521","title":"Slide 10"},{"id":"Slide13911","title":"Slide 11"},{"id":"Slide14156","title":"Slide 12"},{"id":"Slide14401","title":"Slide 13"},{"id":"Slide19014","title":"Slide 14"},{"id":"Slide85782","title":"Slide 15"},{"id":"Slide99768","title":"Slide 16"},{"id":"Slide99938","title":"Slide 17"},{"id":"Slide100110","title":"Slide 18"},{"id":"Slide100395","title":"Slide 19"},{"id":"Slide100554","title":"Slide 20"},{"id":"Slide105270","title":"Slide 21"},{"id":"Slide105692","title":"Slide 22"},{"id":"Slide105882","title":"Slide 23"},{"id":"Slide106072","title":"Slide 24"},{"id":"Slide106312","title":"Slide 25"},{"id":"Slide106464","title":"Slide 26"},{"id":"Slide106611","title":"Slide 27"},{"id":"Slide106882","title":"Slide 28"},{"id":"Slide111852","title":"Slide 29"},{"id":"Slide111913","title":"Slide 30"},{"id":"Slide112184","title":"Slide 31"},{"id":"Slide112465","title":"Slide 32"},{"id":"Slide112623","title":"Slide 33"},{"id":"Slide112832","title":"Slide 34"},{"id":"Slide113090","title":"Slide 35"},{"id":"Slide113348","title":"Slide 36"},{"id":"Slide113606","title":"Slide 37"},{"id":"Slide113864","title":"Slide 38"},{"id":"Slide114122","title":"Slide 39"},{"id":"Slide124988","title":"Slide 40"},{"id":"Slide99403","title":"Slide 41"},{"id":"Slide29628","title":"Slide 42"},{"id":"Slide29753","title":"Slide 43"},{"id":"Slide29903","title":"Slide 44"},{"id":"Slide30065","title":"Slide 45"},{"id":"Slide30239","title":"Slide 46"},{"id":"Slide334126","title":"Slide 49"},{"id":"Slide133929","title":"Slide 50"}]}

Sindbad File Manager Version 1.0, Coded By Sindbad EG ~ The Terrorists