{"id":47,"date":"2017-07-06T21:29:00","date_gmt":"2017-07-07T01:29:00","guid":{"rendered":"https:\/\/cyberleopard.net\/?p=47"},"modified":"2025-02-18T22:47:33","modified_gmt":"2025-02-19T02:47:33","slug":"ingenieria-social","status":"publish","type":"post","link":"https:\/\/cbn.cyberleopard.com\/index.php\/2017\/07\/06\/ingenieria-social\/","title":{"rendered":"Ingenier\u00eda Social"},"content":{"rendered":"\n<p>\u00bfQu\u00e9 rol cumple la Ingenier\u00eda social en la Ciberseguridad? <br>La Ingenier\u00eda Social tiene un papel fundamental en una gran cantidad de ciberataques, m\u00e1s all\u00e1 de lo grande, peque\u00f1o o sofisticado que sea el crimen. De hecho, como ya observ\u00f3 el investigador senior de ESET David Harley en alguna ocasi\u00f3n anterior, siempre se ha mantenido como \u201cuna constante a lo largo de toda la historia de la seguridad de Internet\u201d.<br>Pero, \u00bfqu\u00e9 es exactamente? En su sentido m\u00e1s amplio, la Ingenier\u00eda Social se basa en la manipulaci\u00f3n psicol\u00f3gica, es decir, intenta lograr que las dem\u00e1s personas hagan las cosas que uno quiere que hagan.<br>En el contexto del crimen cibern\u00e9tico, es ampliamente descrita como un m\u00e9todo no t\u00e9cnico utilizado por los cibercriminales para obtener informaci\u00f3n, realizar fraudes u obtener acceso ileg\u00edtimo a los equipos de las v\u00edctimas.<\/p>\n\n\n\n<p>Fuente: Welivesecurity<br><a href=\"https:\/\/www.welivesecurity.com\/la-es\/2016\/01\/06\/5-cosas-sobre-ingenieria-social\/\">https:\/\/www.welivesecurity.com\/la-es\/2016\/01\/06\/5-cosas-sobre-ingenieria-social\/<\/a><\/p>\n\n\n\n<p><img decoding=\"async\" src=\"https:\/\/static.licdn.com\/aero-v1\/sc\/h\/8fz8rainn3wh49ad6ef9gotj1\" alt=\"like\"><img decoding=\"async\" src=\"https:\/\/static.licdn.com\/aero-v1\/sc\/h\/1mbfgcprj3z93pjntukfqbr8y\" alt=\"celebrate\"><img decoding=\"async\" src=\"https:\/\/static.licdn.com\/aero-v1\/sc\/h\/cv29x2jo14dbflduuli6de6bf\" alt=\"support\"><img decoding=\"async\" src=\"https:\/\/static.licdn.com\/aero-v1\/sc\/h\/6f5qp9agugsqw1swegjxj86me\" alt=\"love\"><img decoding=\"async\" src=\"https:\/\/static.licdn.com\/aero-v1\/sc\/h\/9ry9ng73p660hsehml9i440b2\" alt=\"insightful\"><img decoding=\"async\" src=\"https:\/\/static.licdn.com\/aero-v1\/sc\/h\/qye2jwjc8dw20nuv6diudrsi\" alt=\"funny\">Like<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00bfQu\u00e9 rol cumple la Ingenier\u00eda social en la Ciberseguridad? La Ingenier\u00eda Social tiene un papel fundamental en una gran cantidad de ciberataques, m\u00e1s all\u00e1 de lo grande, peque\u00f1o o sofisticado que sea el crimen. De hecho, como ya observ\u00f3 el investigador senior de ESET David Harley en alguna ocasi\u00f3n anterior, siempre se ha mantenido como&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-47","post","type-post","status-publish","format-standard","hentry","category-cybersecurity"],"_links":{"self":[{"href":"https:\/\/cbn.cyberleopard.com\/index.php\/wp-json\/wp\/v2\/posts\/47","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cbn.cyberleopard.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cbn.cyberleopard.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cbn.cyberleopard.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cbn.cyberleopard.com\/index.php\/wp-json\/wp\/v2\/comments?post=47"}],"version-history":[{"count":2,"href":"https:\/\/cbn.cyberleopard.com\/index.php\/wp-json\/wp\/v2\/posts\/47\/revisions"}],"predecessor-version":[{"id":49,"href":"https:\/\/cbn.cyberleopard.com\/index.php\/wp-json\/wp\/v2\/posts\/47\/revisions\/49"}],"wp:attachment":[{"href":"https:\/\/cbn.cyberleopard.com\/index.php\/wp-json\/wp\/v2\/media?parent=47"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cbn.cyberleopard.com\/index.php\/wp-json\/wp\/v2\/categories?post=47"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cbn.cyberleopard.com\/index.php\/wp-json\/wp\/v2\/tags?post=47"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}