{"id":12879,"date":"2018-04-17T12:12:10","date_gmt":"2018-04-17T10:12:10","guid":{"rendered":"https:\/\/www.lisot.com\/amenazas-de-seguridad-en-la-red-informatica-ii\/"},"modified":"2018-04-17T13:23:57","modified_gmt":"2018-04-17T11:23:57","slug":"amenaces-de-seguretat-a-la-xarxa-informatica-ii","status":"publish","type":"post","link":"https:\/\/www.lisot.com\/ca\/amenaces-de-seguretat-a-la-xarxa-informatica-ii\/","title":{"rendered":"Amenaces de seguretat a la xarxa Inform\u00e0tica (II)"},"content":{"rendered":"<p>Nom\u00e9s existeixen dos tipus de companyies, les que han estat atacades i les que ho seran. Sempre va a existir un vector d&#8217;atac sobre el qual poder accedir al nostre sistema inform\u00e0tic.<\/p>\n<p>Tal com indiquem en l&#8217;article anterior sobre <a href=\"https:\/\/www.lisot.com\/ca\/amenazas-de-seguridad-en-la-red-informatica\/\">seguretat inform\u00e0tica<\/a>, explicarem els principals tipus d&#8217;atacs inform\u00e0tics que podem rebre: <\/p>\n<ul>\n<li><a href=\"#apt\">Advanced Persistent Threats \u2013 Amenaces persistents avan\u00e7ades<\/a><\/li>\n<li><a href=\"#bot\">Botnets o redes zombies<br \/>\nBotnets o xarxes zombies<\/a><\/li>\n<li><a href=\"#dos\">DoS \u2013 Distributed Denial of Service \u2013 Denegaci\u00f3 de servei distribu\u00eft<\/a><\/li>\n<li><a href=\"#mal\">Malware o programari malici\u00f3s<\/a><\/li>\n<li><a href=\"#web\">Atacs WEB<\/a><\/li>\n<li><a href=\"#hit\">Session Hijacking o Robatoris de sessi\u00f3<\/a><\/li>\n<li><a href=\"#dns\">Poisoning o Enverinament DNS<\/a><\/li>\n<\/ul>\n<p><a name=\"apt\"><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Advanced Persistent Threats \u2013 APT &#8211; Amenaces persistents avan\u00e7ades:<\/strong><\/p>\n<p>Els atacs avan\u00e7ats persistents es dirigeixen a un govern o organitzaci\u00f3 concreta, amb l&#8217;\u00e0nim d&#8217;extreure certa informaci\u00f3 (espionatge industrial o desestabilitzar un pa\u00eds)<\/p>\n<p>Estan realitzats per ciberdelincuents organitzats en m\u00e0fies que actuen sobre objectius molt concrets.<\/p>\n<p>Estudien l&#8217;objectiu de manera intensa, localitzen un vector d&#8217;atac i despr\u00e9s dissenyen un malware espec\u00edfic per a aquesta acci\u00f3.<a name=\"bot\"><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Botnets o xarxes zombies:<\/strong><\/p>\n<p>Un bot \u00e9s un programari malici\u00f3s que infecta una m\u00e0quina i permet controlar-la de manera remota.<\/p>\n<p>Si aconseguim infectar moltes m\u00e0quines alhora i les controlem totes de forma simult\u00e0nia, disposem d&#8217;una xarxa d&#8217;atac d&#8217;una for\u00e7a enorme.<\/p>\n<p>A trav\u00e9s d&#8217;aquesta xarxa de zombies (botnet)podem llan\u00e7ar diferents tipus d&#8217;atacs massius, com a enviaments de correus (spam), denegacions de servei o robatori de dades. <a name=\"dos\"><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><strong>DoS \u2013 Distributed Denial of Service \u2013\u00a0 Denegaci\u00f3 de servei distribu\u00eft:<\/strong><\/p>\n<p>A trav\u00e9s d&#8217;una botnet podem crear una ataqui tan simple com llan\u00e7ar el comando \u201cping\u201d a una p\u00e0gina web des de totes les m\u00e0quines infectades de forma simult\u00e0nia per deixar sense servei a aquesta p\u00e0gina web.<\/p>\n<p>Normalment aquestes infeccions es realitzen sense coneixement de l&#8217;usuari, per\u00f2 avui dia organitzacions com Anonymous han creat programes que els seus simpatitzants tenen instal\u00b7lats en els seus equips perqu\u00e8 siguin utilitzats per aquests per realitzar els atacs que considerin oportuns.<a name=\"mal\"><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Malware:<\/strong><\/p>\n<p>Per introduir, dir que, com el seu nom indica, \u00e9s un programari amb un prop\u00f2sit malici\u00f3s. Existeixen multitud de tipus i variants: virus, cucs, troians, rootkits, spyware, keyloggers, \u2026<\/p>\n<p>Parlarem de forma espec\u00edfica en el seg\u00fcent article. <a name=\"web\"><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Atacs WEB:<\/strong><\/p>\n<p>Atacs dirigits a una p\u00e0gina web en concret, a fi de prendre el seu control.<\/p>\n<p>Parlarem de forma espec\u00edfica en seg\u00fcents articles.<br \/>\n<a name=\"hit\"><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><strong><img decoding=\"async\" class=\"wp-image-12872 alignright\" src=\"https:\/\/www.lisot.com\/wp-content\/uploads\/2018\/04\/seguridad-informatica-hijacking.png\" alt=\"Seguridad informatica - Ataques hijacking\" width=\"429\" height=\"187\" \/>Session Hijacking o Robatoris de sessi\u00f3:<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>Tracta de robar la sessi\u00f3 d&#8217;un usuari a trav\u00e9s de la xarxa.<\/p>\n<p>El m\u00e8tode m\u00e9s habitual \u00e9s falsejar l&#8217;adre\u00e7a IP d&#8217;origen per la IP de l&#8217;atacant, de manera que tots els missatges que rebi el destinatari no seran de l&#8217;origen correcte sin\u00f3 del suplantador.<a name=\"dns\"><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"size-full wp-image-12870 alignleft\" src=\"https:\/\/www.lisot.com\/wp-content\/uploads\/2018\/04\/seguridad-informatica-dns-poisoning.png\" alt=\"Seguridad informatica - Ataques DNS poisoning\" width=\"533\" height=\"308\" srcset=\"https:\/\/www.lisot.com\/wp-content\/uploads\/2018\/04\/seguridad-informatica-dns-poisoning-200x116.png 200w, https:\/\/www.lisot.com\/wp-content\/uploads\/2018\/04\/seguridad-informatica-dns-poisoning-300x173.png 300w, https:\/\/www.lisot.com\/wp-content\/uploads\/2018\/04\/seguridad-informatica-dns-poisoning-400x231.png 400w, https:\/\/www.lisot.com\/wp-content\/uploads\/2018\/04\/seguridad-informatica-dns-poisoning.png 533w\" sizes=\"(max-width: 533px) 100vw, 533px\" \/><strong>DNS Poisoning o Enverinament DNS:<\/strong><\/p>\n<p>El DNS (Domain Namne Server \u2013 Sistema de Noms de Domini) permet traduir els noms en adreces IP. Les cach\u00e9 de DNS ens permeten guardar en mem\u00f2ria les resolucions de nom, de manera que naveguem de forma m\u00e9s r\u00e0pida per Internet.<\/p>\n<p>Si aconseguim infectar un cach\u00e9 de DNS i modificar la resoluci\u00f3 de noms de p\u00e0gines web cap a IPs malicioses, des d&#8217;aquestes podrem robar la informaci\u00f3 que desitgem.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Nom\u00e9s existeixen dos tipus de companyies, les que han estat atacades i les que ho seran. Sempre va a existir un vector d&#8217;atac sobre el qual poder accedir al nostre sistema inform\u00e0tic. Tal com indiquem en l&#8217;article anterior sobre seguretat inform\u00e0tica, explicarem els principals tipus d&#8217;atacs inform\u00e0tics que podem rebre: Advanced Persistent Threats \u2013 Amenaces persistents  [&#8230;]<\/p>\n","protected":false},"author":1,"featured_media":12869,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[70,93],"tags":[94,72,95,74],"class_list":["post-12879","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciberseguridad-ca","category-mantenimiento-informatico-ca","tag-ataques-web-ca","tag-ciberseguridad-ca","tag-malware-ca","tag-seguridad-informatica-ca"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Amenaces de seguretat a la xarxa Inform\u00e0tica (II) - LISOT<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.lisot.com\/ca\/amenaces-de-seguretat-a-la-xarxa-informatica-ii\/\" \/>\n<meta property=\"og:locale\" content=\"ca_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Amenaces de seguretat a la xarxa Inform\u00e0tica (II) - LISOT\" \/>\n<meta property=\"og:description\" content=\"Nom\u00e9s existeixen dos tipus de companyies, les que han estat atacades i les que ho seran. Sempre va a existir un vector d&#8217;atac sobre el qual poder accedir al nostre sistema inform\u00e0tic. Tal com indiquem en l&#8217;article anterior sobre seguretat inform\u00e0tica, explicarem els principals tipus d&#8217;atacs inform\u00e0tics que podem rebre: Advanced Persistent Threats \u2013 Amenaces persistents [...]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.lisot.com\/ca\/amenaces-de-seguretat-a-la-xarxa-informatica-ii\/\" \/>\n<meta property=\"og:site_name\" content=\"LISOT\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/lisot.bcn\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-04-17T10:12:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-04-17T11:23:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.lisot.com\/wp-content\/uploads\/2018\/04\/seguridad-informatica-botnet.png\" \/>\n\t<meta property=\"og:image:width\" content=\"877\" \/>\n\t<meta property=\"og:image:height\" content=\"598\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Lisot Inform\u00e1tica empresarial\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrit per\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lisot Inform\u00e1tica empresarial\" \/>\n\t<meta name=\"twitter:label2\" content=\"Temps estimat de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuts\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.lisot.com\/ca\/amenaces-de-seguretat-a-la-xarxa-informatica-ii\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.lisot.com\/ca\/amenaces-de-seguretat-a-la-xarxa-informatica-ii\/\"},\"author\":{\"name\":\"Lisot Inform\u00e1tica empresarial\",\"@id\":\"https:\/\/www.lisot.com\/ca\/#\/schema\/person\/ad47c23ca839daac904ca459ba7089b4\"},\"headline\":\"Amenaces de seguretat a la xarxa Inform\u00e0tica (II)\",\"datePublished\":\"2018-04-17T10:12:10+00:00\",\"dateModified\":\"2018-04-17T11:23:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.lisot.com\/ca\/amenaces-de-seguretat-a-la-xarxa-informatica-ii\/\"},\"wordCount\":567,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.lisot.com\/ca\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.lisot.com\/ca\/amenaces-de-seguretat-a-la-xarxa-informatica-ii\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.lisot.com\/wp-content\/uploads\/2018\/04\/seguridad-informatica-botnet.png\",\"keywords\":[\"atacs web\",\"ciberseguretat\",\"malware\",\"seguretat inform\u00e0tica\"],\"articleSection\":[\"Ciberseguretat\",\"Manteniment inform\u00e0tic\"],\"inLanguage\":\"ca\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.lisot.com\/ca\/amenaces-de-seguretat-a-la-xarxa-informatica-ii\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.lisot.com\/ca\/amenaces-de-seguretat-a-la-xarxa-informatica-ii\/\",\"url\":\"https:\/\/www.lisot.com\/ca\/amenaces-de-seguretat-a-la-xarxa-informatica-ii\/\",\"name\":\"Amenaces de seguretat a la xarxa Inform\u00e0tica (II) - LISOT\",\"isPartOf\":{\"@id\":\"https:\/\/www.lisot.com\/ca\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.lisot.com\/ca\/amenaces-de-seguretat-a-la-xarxa-informatica-ii\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.lisot.com\/ca\/amenaces-de-seguretat-a-la-xarxa-informatica-ii\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.lisot.com\/wp-content\/uploads\/2018\/04\/seguridad-informatica-botnet.png\",\"datePublished\":\"2018-04-17T10:12:10+00:00\",\"dateModified\":\"2018-04-17T11:23:57+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.lisot.com\/ca\/amenaces-de-seguretat-a-la-xarxa-informatica-ii\/#breadcrumb\"},\"inLanguage\":\"ca\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.lisot.com\/ca\/amenaces-de-seguretat-a-la-xarxa-informatica-ii\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\/\/www.lisot.com\/ca\/amenaces-de-seguretat-a-la-xarxa-informatica-ii\/#primaryimage\",\"url\":\"https:\/\/www.lisot.com\/wp-content\/uploads\/2018\/04\/seguridad-informatica-botnet.png\",\"contentUrl\":\"https:\/\/www.lisot.com\/wp-content\/uploads\/2018\/04\/seguridad-informatica-botnet.png\",\"width\":877,\"height\":598,\"caption\":\"Seguridad informatica - Ataques botnet\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.lisot.com\/ca\/amenaces-de-seguretat-a-la-xarxa-informatica-ii\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.lisot.com\/ca\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Amenaces de seguretat a la xarxa Inform\u00e0tica (II)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.lisot.com\/ca\/#website\",\"url\":\"https:\/\/www.lisot.com\/ca\/\",\"name\":\"LISOT\",\"description\":\"Empresa de mantenimient inform\u00e0tic a Barcelona\",\"publisher\":{\"@id\":\"https:\/\/www.lisot.com\/ca\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.lisot.com\/ca\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ca\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.lisot.com\/ca\/#organization\",\"name\":\"Lisot - Inform\u00e1tica empresarial en Barcelona\",\"url\":\"https:\/\/www.lisot.com\/ca\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\/\/www.lisot.com\/ca\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.lisot.com\/wp-content\/uploads\/2017\/06\/mantenimiento-informatico-barcelona-LISOT.png\",\"contentUrl\":\"https:\/\/www.lisot.com\/wp-content\/uploads\/2017\/06\/mantenimiento-informatico-barcelona-LISOT.png\",\"width\":112,\"height\":38,\"caption\":\"Lisot - Inform\u00e1tica empresarial en Barcelona\"},\"image\":{\"@id\":\"https:\/\/www.lisot.com\/ca\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/lisot.bcn\/\",\"https:\/\/es.linkedin.com\/company\/lisot\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.lisot.com\/ca\/#\/schema\/person\/ad47c23ca839daac904ca459ba7089b4\",\"name\":\"Lisot Inform\u00e1tica empresarial\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\/\/www.lisot.com\/ca\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d097aebc0b37148ee92655c7ec8d5736?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d097aebc0b37148ee92655c7ec8d5736?s=96&d=mm&r=g\",\"caption\":\"Lisot Inform\u00e1tica empresarial\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Amenaces de seguretat a la xarxa Inform\u00e0tica (II) - LISOT","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.lisot.com\/ca\/amenaces-de-seguretat-a-la-xarxa-informatica-ii\/","og_locale":"ca_ES","og_type":"article","og_title":"Amenaces de seguretat a la xarxa Inform\u00e0tica (II) - LISOT","og_description":"Nom\u00e9s existeixen dos tipus de companyies, les que han estat atacades i les que ho seran. Sempre va a existir un vector d&#8217;atac sobre el qual poder accedir al nostre sistema inform\u00e0tic. Tal com indiquem en l&#8217;article anterior sobre seguretat inform\u00e0tica, explicarem els principals tipus d&#8217;atacs inform\u00e0tics que podem rebre: Advanced Persistent Threats \u2013 Amenaces persistents [...]","og_url":"https:\/\/www.lisot.com\/ca\/amenaces-de-seguretat-a-la-xarxa-informatica-ii\/","og_site_name":"LISOT","article_publisher":"https:\/\/www.facebook.com\/lisot.bcn\/","article_published_time":"2018-04-17T10:12:10+00:00","article_modified_time":"2018-04-17T11:23:57+00:00","og_image":[{"width":877,"height":598,"url":"https:\/\/www.lisot.com\/wp-content\/uploads\/2018\/04\/seguridad-informatica-botnet.png","type":"image\/png"}],"author":"Lisot Inform\u00e1tica empresarial","twitter_card":"summary_large_image","twitter_misc":{"Escrit per":"Lisot Inform\u00e1tica empresarial","Temps estimat de lectura":"3 minuts"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.lisot.com\/ca\/amenaces-de-seguretat-a-la-xarxa-informatica-ii\/#article","isPartOf":{"@id":"https:\/\/www.lisot.com\/ca\/amenaces-de-seguretat-a-la-xarxa-informatica-ii\/"},"author":{"name":"Lisot Inform\u00e1tica empresarial","@id":"https:\/\/www.lisot.com\/ca\/#\/schema\/person\/ad47c23ca839daac904ca459ba7089b4"},"headline":"Amenaces de seguretat a la xarxa Inform\u00e0tica (II)","datePublished":"2018-04-17T10:12:10+00:00","dateModified":"2018-04-17T11:23:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.lisot.com\/ca\/amenaces-de-seguretat-a-la-xarxa-informatica-ii\/"},"wordCount":567,"commentCount":0,"publisher":{"@id":"https:\/\/www.lisot.com\/ca\/#organization"},"image":{"@id":"https:\/\/www.lisot.com\/ca\/amenaces-de-seguretat-a-la-xarxa-informatica-ii\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lisot.com\/wp-content\/uploads\/2018\/04\/seguridad-informatica-botnet.png","keywords":["atacs web","ciberseguretat","malware","seguretat inform\u00e0tica"],"articleSection":["Ciberseguretat","Manteniment inform\u00e0tic"],"inLanguage":"ca","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.lisot.com\/ca\/amenaces-de-seguretat-a-la-xarxa-informatica-ii\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.lisot.com\/ca\/amenaces-de-seguretat-a-la-xarxa-informatica-ii\/","url":"https:\/\/www.lisot.com\/ca\/amenaces-de-seguretat-a-la-xarxa-informatica-ii\/","name":"Amenaces de seguretat a la xarxa Inform\u00e0tica (II) - LISOT","isPartOf":{"@id":"https:\/\/www.lisot.com\/ca\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.lisot.com\/ca\/amenaces-de-seguretat-a-la-xarxa-informatica-ii\/#primaryimage"},"image":{"@id":"https:\/\/www.lisot.com\/ca\/amenaces-de-seguretat-a-la-xarxa-informatica-ii\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lisot.com\/wp-content\/uploads\/2018\/04\/seguridad-informatica-botnet.png","datePublished":"2018-04-17T10:12:10+00:00","dateModified":"2018-04-17T11:23:57+00:00","breadcrumb":{"@id":"https:\/\/www.lisot.com\/ca\/amenaces-de-seguretat-a-la-xarxa-informatica-ii\/#breadcrumb"},"inLanguage":"ca","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.lisot.com\/ca\/amenaces-de-seguretat-a-la-xarxa-informatica-ii\/"]}]},{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/www.lisot.com\/ca\/amenaces-de-seguretat-a-la-xarxa-informatica-ii\/#primaryimage","url":"https:\/\/www.lisot.com\/wp-content\/uploads\/2018\/04\/seguridad-informatica-botnet.png","contentUrl":"https:\/\/www.lisot.com\/wp-content\/uploads\/2018\/04\/seguridad-informatica-botnet.png","width":877,"height":598,"caption":"Seguridad informatica - Ataques botnet"},{"@type":"BreadcrumbList","@id":"https:\/\/www.lisot.com\/ca\/amenaces-de-seguretat-a-la-xarxa-informatica-ii\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.lisot.com\/ca\/"},{"@type":"ListItem","position":2,"name":"Amenaces de seguretat a la xarxa Inform\u00e0tica (II)"}]},{"@type":"WebSite","@id":"https:\/\/www.lisot.com\/ca\/#website","url":"https:\/\/www.lisot.com\/ca\/","name":"LISOT","description":"Empresa de mantenimient inform\u00e0tic a Barcelona","publisher":{"@id":"https:\/\/www.lisot.com\/ca\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.lisot.com\/ca\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ca"},{"@type":"Organization","@id":"https:\/\/www.lisot.com\/ca\/#organization","name":"Lisot - Inform\u00e1tica empresarial en Barcelona","url":"https:\/\/www.lisot.com\/ca\/","logo":{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/www.lisot.com\/ca\/#\/schema\/logo\/image\/","url":"https:\/\/www.lisot.com\/wp-content\/uploads\/2017\/06\/mantenimiento-informatico-barcelona-LISOT.png","contentUrl":"https:\/\/www.lisot.com\/wp-content\/uploads\/2017\/06\/mantenimiento-informatico-barcelona-LISOT.png","width":112,"height":38,"caption":"Lisot - Inform\u00e1tica empresarial en Barcelona"},"image":{"@id":"https:\/\/www.lisot.com\/ca\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/lisot.bcn\/","https:\/\/es.linkedin.com\/company\/lisot"]},{"@type":"Person","@id":"https:\/\/www.lisot.com\/ca\/#\/schema\/person\/ad47c23ca839daac904ca459ba7089b4","name":"Lisot Inform\u00e1tica empresarial","image":{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/www.lisot.com\/ca\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d097aebc0b37148ee92655c7ec8d5736?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d097aebc0b37148ee92655c7ec8d5736?s=96&d=mm&r=g","caption":"Lisot Inform\u00e1tica empresarial"}}]}},"_links":{"self":[{"href":"https:\/\/www.lisot.com\/ca\/wp-json\/wp\/v2\/posts\/12879"}],"collection":[{"href":"https:\/\/www.lisot.com\/ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lisot.com\/ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lisot.com\/ca\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lisot.com\/ca\/wp-json\/wp\/v2\/comments?post=12879"}],"version-history":[{"count":0,"href":"https:\/\/www.lisot.com\/ca\/wp-json\/wp\/v2\/posts\/12879\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lisot.com\/ca\/wp-json\/wp\/v2\/media\/12869"}],"wp:attachment":[{"href":"https:\/\/www.lisot.com\/ca\/wp-json\/wp\/v2\/media?parent=12879"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lisot.com\/ca\/wp-json\/wp\/v2\/categories?post=12879"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lisot.com\/ca\/wp-json\/wp\/v2\/tags?post=12879"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}