{"id":6207,"date":"2026-02-26T14:32:25","date_gmt":"2026-02-26T19:32:25","guid":{"rendered":"https:\/\/revista.uearturofreire.edu.ec\/?p=6207"},"modified":"2026-02-26T15:28:30","modified_gmt":"2026-02-26T20:28:30","slug":"hackers-al-acecho-estas-preparado-ven-y-aprende-sobre-el-ciberseguridad","status":"publish","type":"post","link":"https:\/\/revista.uearturofreire.edu.ec\/?p=6207","title":{"rendered":"\u201cHackers al Acecho: \u00bfEst\u00e1s Preparado?\u201d Ven y aprende sobre el Ciberseguridad"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"6207\" class=\"elementor elementor-6207\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e89e0f8 e-flex e-con-boxed e-con e-parent\" data-id=\"e89e0f8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c9d2cc4 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"c9d2cc4\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInDown&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Introducci\u00f3n <\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-aeec2d6 e-flex e-con-boxed e-con e-parent\" data-id=\"aeec2d6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ba20c71 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"ba20c71\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInDown&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"40\" data-end=\"356\">En la actualidad, vivimos conectados a internet casi todo el tiempo: usamos redes sociales, enviamos tareas por correo electr\u00f3nico, realizamos investigaciones y compartimos informaci\u00f3n personal. Pero as\u00ed como la tecnolog\u00eda nos facilita la vida, tambi\u00e9n existen riesgos digitales que pueden afectar nuestra seguridad.<\/p><p data-start=\"358\" data-end=\"664\">La <strong data-start=\"361\" data-end=\"379\">ciberseguridad<\/strong> es el conjunto de medidas, herramientas y pr\u00e1cticas que se utilizan para proteger dispositivos, redes y datos frente a ataques inform\u00e1ticos, accesos no autorizados o robos de informaci\u00f3n. Su objetivo principal es garantizar que nuestra informaci\u00f3n personal y acad\u00e9mica est\u00e9 protegida.<\/p><p data-start=\"666\" data-end=\"924\">Para los estudiantes de Inform\u00e1tica, comprender la ciberseguridad es fundamental, ya que no solo se trata de aprender a programar o manejar sistemas, sino tambi\u00e9n de saber c\u00f3mo prevenir amenazas digitales y actuar de manera responsable en el entorno virtual.<\/p><p data-start=\"926\" data-end=\"1052\" data-is-last-node=\"\" data-is-only-node=\"\">En un mundo cada vez m\u00e1s digital, la ciberseguridad se convierte en una habilidad esencial para el presente y el futuro. \ud83d\udee1\ufe0f\ud83d\udcbb<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7de2791 e-flex e-con-boxed e-con e-parent\" data-id=\"7de2791\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-63c8f51 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"63c8f51\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Conoce mas \u00bfQu\u00e9 es el ciberseguridad?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9619e01 e-flex e-con-boxed e-con e-parent\" data-id=\"9619e01\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-4244e94 e-con-full e-flex e-con e-child\" data-id=\"4244e94\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2a0eb75 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"2a0eb75\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"flex flex-col text-sm pb-25\"><article class=\"text-token-text-primary w-full focus:outline-none [--shadow-height:45px] has-data-writing-block:pointer-events-none has-data-writing-block:-mt-(--shadow-height) has-data-writing-block:pt-(--shadow-height) [&amp;:has([data-writing-block])&gt;*]:pointer-events-auto scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]\" dir=\"auto\" tabindex=\"-1\" data-turn-id=\"request-WEB:fbaf06c8-fc1d-4f94-8e27-267dff2b8256-3\" data-testid=\"conversation-turn-8\" data-scroll-anchor=\"true\" data-turn=\"assistant\"><div class=\"text-base my-auto mx-auto pb-10 [--thread-content-margin:--spacing(4)] @w-sm\/main:[--thread-content-margin:--spacing(6)] @w-lg\/main:[--thread-content-margin:--spacing(16)] px-(--thread-content-margin)\"><div class=\"[--thread-content-max-width:40rem] @w-lg\/main:[--thread-content-max-width:48rem] mx-auto max-w-(--thread-content-max-width) flex-1 group\/turn-messages focus-visible:outline-hidden relative flex w-full min-w-0 flex-col agent-turn\" tabindex=\"-1\"><div class=\"flex max-w-full flex-col grow\"><div class=\"min-h-8 text-message relative flex w-full flex-col items-end gap-2 text-start break-words whitespace-normal [.text-message+&amp;]:mt-1\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"898eaba8-03f3-4b76-9c60-5d4498f9a2a5\" data-message-model-slug=\"gpt-5-2\"><div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[1px]\"><div class=\"markdown prose dark:prose-invert w-full wrap-break-word light markdown-new-styling\"><p data-start=\"34\" data-end=\"210\">La <strong data-start=\"37\" data-end=\"55\">ciberseguridad<\/strong> es el conjunto de medidas, normas y herramientas que se utilizan para proteger computadoras, redes, programas y datos de ataques o accesos no autorizados.<\/p><p data-start=\"212\" data-end=\"380\">En palabras sencillas, es la forma de <strong data-start=\"250\" data-end=\"292\">cuidar nuestra informaci\u00f3n en internet<\/strong>, como contrase\u00f1as, fotos, correos electr\u00f3nicos, cuentas bancarias o trabajos escolares.<\/p><p data-start=\"382\" data-end=\"432\">La ciberseguridad ayuda a prevenir problemas como:<\/p><ul data-start=\"433\" data-end=\"524\"><li data-start=\"433\" data-end=\"456\"><p data-start=\"435\" data-end=\"456\">Robo de informaci\u00f3n<\/p><\/li><li data-start=\"457\" data-end=\"479\"><p data-start=\"459\" data-end=\"479\">Virus inform\u00e1ticos<\/p><\/li><li data-start=\"480\" data-end=\"501\"><p data-start=\"482\" data-end=\"501\">Estafas digitales<\/p><\/li><li data-start=\"502\" data-end=\"524\"><p data-start=\"504\" data-end=\"524\">Hackeos de cuentas<\/p><\/li><\/ul><p data-start=\"526\" data-end=\"726\">Hoy en d\u00eda, como usamos plataformas como <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">Instagram<\/span><\/span>, <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">WhatsApp<\/span><\/span> o <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">Facebook<\/span><\/span>, es muy importante saber c\u00f3mo protegernos.<\/p><p data-start=\"728\" data-end=\"796\" data-is-last-node=\"\" data-is-only-node=\"\">En resumen, la ciberseguridad es la defensa del mundo digital. \ud83d\udee1\ufe0f\ud83d\udcbb<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/article><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7da9c34 e-con-full e-flex e-con e-child\" data-id=\"7da9c34\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-59ebaa3 elementor-invisible elementor-widget elementor-widget-image\" data-id=\"59ebaa3\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"525\" height=\"787\" src=\"https:\/\/revista.uearturofreire.edu.ec\/wp-content\/uploads\/2026\/02\/ChatGPT-Image-26-feb-2026-14_29_47-683x1024.png\" class=\"attachment-large size-large wp-image-6318\" alt=\"\" srcset=\"https:\/\/revista.uearturofreire.edu.ec\/wp-content\/uploads\/2026\/02\/ChatGPT-Image-26-feb-2026-14_29_47-683x1024.png 683w, https:\/\/revista.uearturofreire.edu.ec\/wp-content\/uploads\/2026\/02\/ChatGPT-Image-26-feb-2026-14_29_47-200x300.png 200w, https:\/\/revista.uearturofreire.edu.ec\/wp-content\/uploads\/2026\/02\/ChatGPT-Image-26-feb-2026-14_29_47-768x1152.png 768w, https:\/\/revista.uearturofreire.edu.ec\/wp-content\/uploads\/2026\/02\/ChatGPT-Image-26-feb-2026-14_29_47.png 1024w\" sizes=\"(max-width: 525px) 100vw, 525px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a26dd15 e-flex e-con-boxed e-con e-parent\" data-id=\"a26dd15\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-54534fc elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"54534fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Principales riesgos para estudiantes<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-614ce9c e-flex e-con-boxed e-con e-parent\" data-id=\"614ce9c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-71837c9 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"71837c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"48\" data-end=\"174\"><strong>En el mundo digital existen varios peligros que pueden afectar a estudiantes y usuarios en general. Estos son los m\u00e1s comunes:<\/strong><\/p><hr data-start=\"176\" data-end=\"179\" \/><h3 data-start=\"181\" data-end=\"210\"><strong>\ud83d\udd13 1. Robo de contrase\u00f1as<\/strong><\/h3><p data-start=\"211\" data-end=\"373\"><strong>Cuando alguien obtiene tu clave sin permiso y accede a tus cuentas personales, como <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">Instagram<\/span><\/span> o <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">Facebook<\/span><\/span>.<\/strong><\/p><hr data-start=\"375\" data-end=\"378\" \/><h3 data-start=\"380\" data-end=\"418\"><strong>\ud83c\udfa3 2. Phishing (estafas digitales)<\/strong><\/h3><p data-start=\"419\" data-end=\"607\"><strong>Son mensajes o correos falsos que aparentan ser de empresas reales como <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">WhatsApp<\/span><\/span> o <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">Gmail<\/span><\/span> para enga\u00f1arte y robar tu informaci\u00f3n.<\/strong><\/p><hr data-start=\"609\" data-end=\"612\" \/><h3 data-start=\"614\" data-end=\"639\"><strong>\ud83e\udda0 3. Virus y malware<\/strong><\/h3><p data-start=\"640\" data-end=\"734\"><strong>Programas da\u00f1inos que infectan tu computadora o celular, pueden borrar archivos o robar datos.<\/strong><\/p><hr data-start=\"736\" data-end=\"739\" \/><h3 data-start=\"741\" data-end=\"776\"><strong>\ud83d\udc64 4. Suplantaci\u00f3n de identidad<\/strong><\/h3><p data-start=\"777\" data-end=\"851\"><strong>Cuando alguien se hace pasar por otra persona usando fotos o datos falsos.<\/strong><\/p><hr data-start=\"853\" data-end=\"856\" \/><h3 data-start=\"858\" data-end=\"878\"><strong>\ud83d\udcac 5. Ciberacoso<\/strong><\/h3><p data-start=\"879\" data-end=\"963\"><strong>Uso de redes sociales o mensajes para intimidar, molestar o amenazar a otra persona.<\/strong><\/p><hr data-start=\"965\" data-end=\"968\" \/><h3 data-start=\"970\" data-end=\"1008\"><strong>\ud83d\udcb3 6. Robo de informaci\u00f3n personal<\/strong><\/h3><p data-start=\"1009\" data-end=\"1114\"><strong>Datos como n\u00fameros de tel\u00e9fono, direcciones o informaci\u00f3n bancaria pueden ser utilizados de forma ilegal.<\/strong><\/p><hr data-start=\"1116\" data-end=\"1119\" \/><h2 data-start=\"1121\" data-end=\"1138\"><strong>\ud83d\udee1\ufe0f En resumen<\/strong><\/h2><p data-start=\"1139\" data-end=\"1321\"><strong>El mayor riesgo no es solo la tecnolog\u00eda, sino el desconocimiento. Por eso, aprender sobre ciberseguridad es fundamental para proteger nuestra informaci\u00f3n y navegar de manera segura.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9a5efef e-flex e-con-boxed e-con e-parent\" data-id=\"9a5efef\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0695951 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"0695951\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Consejos pr\u00e1cticos<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eff3e59 e-flex e-con-boxed e-con e-parent\" data-id=\"eff3e59\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-224918e elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"224918e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"49\" data-end=\"322\">En la actualidad, gran parte de nuestra vida se desarrolla en internet: estudiamos, nos comunicamos y compartimos informaci\u00f3n a trav\u00e9s de diferentes plataformas digitales. Sin embargo, este entorno tambi\u00e9n presenta riesgos que pueden afectar nuestra privacidad y seguridad.<\/p><p data-start=\"324\" data-end=\"548\" data-is-last-node=\"\" data-is-only-node=\"\">La ciberseguridad es la forma de proteger nuestros datos, dispositivos y cuentas frente a amenazas digitales. Aprender sobre este tema es fundamental para navegar de manera segura y responsable en el mundo tecnol\u00f3gico. \ud83d\udcbb\ud83d\udee1\ufe0f<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-df50292 e-flex e-con-boxed e-con e-parent\" data-id=\"df50292\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-08f954a e-con-full e-flex e-con e-child\" data-id=\"08f954a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-db0a7f0 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"db0a7f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h3 data-start=\"141\" data-end=\"174\">\ud83d\udd10 1. Usa contrase\u00f1as seguras<\/h3><ul data-start=\"175\" data-end=\"336\"><li data-start=\"175\" data-end=\"235\"><p data-start=\"177\" data-end=\"235\">Combina letras may\u00fasculas, min\u00fasculas, n\u00fameros y s\u00edmbolos.<\/p><\/li><li data-start=\"236\" data-end=\"281\"><p data-start=\"238\" data-end=\"281\">No uses tu fecha de nacimiento o tu nombre.<\/p><\/li><li data-start=\"282\" data-end=\"336\"><p data-start=\"284\" data-end=\"336\">No repitas la misma contrase\u00f1a en todas tus cuentas.<\/p><\/li><\/ul><hr data-start=\"338\" data-end=\"341\" \/><h3 data-start=\"343\" data-end=\"388\">\ud83d\udcf2 2. Activa la verificaci\u00f3n en dos pasos<\/h3><p data-start=\"389\" data-end=\"570\">Plataformas como <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">Instagram<\/span><\/span>, <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">WhatsApp<\/span><\/span> y <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">Facebook<\/span><\/span> permiten activar una segunda capa de seguridad.<\/p><hr data-start=\"572\" data-end=\"575\" \/><h3 data-start=\"577\" data-end=\"623\">\ud83c\udfa3 3. No hagas clic en enlaces sospechosos<\/h3><p data-start=\"624\" data-end=\"745\">Si recibes mensajes raros que dicen \u201cGanaste un premio\u201d o \u201cTu cuenta ser\u00e1 cerrada\u201d, verifica primero antes de hacer clic.<\/p><hr data-start=\"747\" data-end=\"750\" \/><h3 data-start=\"752\" data-end=\"798\">\ud83d\udcbb 4. Mant\u00e9n tus dispositivos actualizados<\/h3><p data-start=\"799\" data-end=\"875\">Las actualizaciones corrigen errores de seguridad y protegen tu informaci\u00f3n.<\/p><hr data-start=\"877\" data-end=\"880\" \/><h3 data-start=\"882\" data-end=\"925\">\ud83d\udc65 5. No compartas informaci\u00f3n personal<\/h3><p data-start=\"926\" data-end=\"996\">Evita publicar datos como direcci\u00f3n, n\u00famero de tel\u00e9fono o contrase\u00f1as.<\/p><hr data-start=\"998\" data-end=\"1001\" \/><h3 data-start=\"1003\" data-end=\"1043\">\ud83e\udda0 6. Instala un antivirus confiable<\/h3><p data-start=\"1044\" data-end=\"1134\">Un buen antivirus puede detectar virus o programas da\u00f1inos antes de que afecten tu equipo.<\/p><hr data-start=\"1136\" data-end=\"1139\" \/><h3 data-start=\"1141\" data-end=\"1179\">\ud83c\udf10 7. Cuidado con el Wi-Fi p\u00fablico<\/h3><p data-start=\"1180\" data-end=\"1256\">No ingreses contrase\u00f1as importantes cuando est\u00e9s conectado a redes p\u00fablicas.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5bab495 e-con-full e-flex e-con e-child\" data-id=\"5bab495\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-72cea03 elementor-invisible elementor-widget elementor-widget-image\" data-id=\"72cea03\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1024\" height=\"1536\" src=\"https:\/\/revista.uearturofreire.edu.ec\/wp-content\/uploads\/2026\/02\/ChatGPT-Image-26-feb-2026-14_57_42.png\" class=\"attachment-2048x2048 size-2048x2048 wp-image-6485\" alt=\"\" srcset=\"https:\/\/revista.uearturofreire.edu.ec\/wp-content\/uploads\/2026\/02\/ChatGPT-Image-26-feb-2026-14_57_42.png 1024w, https:\/\/revista.uearturofreire.edu.ec\/wp-content\/uploads\/2026\/02\/ChatGPT-Image-26-feb-2026-14_57_42-200x300.png 200w, https:\/\/revista.uearturofreire.edu.ec\/wp-content\/uploads\/2026\/02\/ChatGPT-Image-26-feb-2026-14_57_42-683x1024.png 683w, https:\/\/revista.uearturofreire.edu.ec\/wp-content\/uploads\/2026\/02\/ChatGPT-Image-26-feb-2026-14_57_42-768x1152.png 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Introducci\u00f3n En la actualidad, vivimos conectados a internet casi todo el tiempo: usamos redes sociales, enviamos tareas por correo electr\u00f3nico, realizamos investigaciones y compartimos informaci\u00f3n personal. Pero as\u00ed como la tecnolog\u00eda nos facilita la vida, tambi\u00e9n existen riesgos digitales que pueden afectar nuestra seguridad. La ciberseguridad es el conjunto de medidas, herramientas y pr\u00e1cticas que [&hellip;]<\/p>\n","protected":false},"author":20,"featured_media":6685,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[37,29],"tags":[],"class_list":["post-6207","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-1ro-inf","category-bachillerato-informatica"],"_links":{"self":[{"href":"https:\/\/revista.uearturofreire.edu.ec\/index.php?rest_route=\/wp\/v2\/posts\/6207","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/revista.uearturofreire.edu.ec\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/revista.uearturofreire.edu.ec\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/revista.uearturofreire.edu.ec\/index.php?rest_route=\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/revista.uearturofreire.edu.ec\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6207"}],"version-history":[{"count":4,"href":"https:\/\/revista.uearturofreire.edu.ec\/index.php?rest_route=\/wp\/v2\/posts\/6207\/revisions"}],"predecessor-version":[{"id":6517,"href":"https:\/\/revista.uearturofreire.edu.ec\/index.php?rest_route=\/wp\/v2\/posts\/6207\/revisions\/6517"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/revista.uearturofreire.edu.ec\/index.php?rest_route=\/wp\/v2\/media\/6685"}],"wp:attachment":[{"href":"https:\/\/revista.uearturofreire.edu.ec\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6207"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/revista.uearturofreire.edu.ec\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=6207"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/revista.uearturofreire.edu.ec\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=6207"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}