{"id":3684,"date":"2025-01-26T12:05:27","date_gmt":"2025-01-26T18:05:27","guid":{"rendered":"https:\/\/blogs.uo.edu.cu\/seginf\/?p=3684"},"modified":"2025-01-26T13:41:37","modified_gmt":"2025-01-26T19:41:37","slug":"percepcion-de-riesgo","status":"publish","type":"post","link":"https:\/\/blogs.uo.edu.cu\/seginf\/?p=3684","title":{"rendered":"Percepci\u00f3n de riesgo"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2024\/02\/ciberviernes-300x165.jpg\" alt=\"\" width=\"300\" height=\"165\" class=\"alignleft size-medium wp-image-2823\" srcset=\"https:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2024\/02\/ciberviernes-300x165.jpg 300w, https:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2024\/02\/ciberviernes-768x422.jpg 768w, https:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2024\/02\/ciberviernes.jpg 891w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-medium wp-image-3688\" src=\"http:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2025\/01\/20250108_170053-300x169.jpg\" alt=\"\" width=\"300\" height=\"169\" srcset=\"https:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2025\/01\/20250108_170053-300x169.jpg 300w, https:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2025\/01\/20250108_170053-1024x576.jpg 1024w, https:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2025\/01\/20250108_170053-768x432.jpg 768w, https:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2025\/01\/20250108_170053.jpg 1200w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p align=\"justify\">Para esbozar la idea sobre este problema se ha considerado exponer este art\u00edculo tomado una <a href=\"https:\/\/x.com\/santiagohramos\/status\/1877075949830959605?t=FWU4_I9_dYboIaCsZLw0_g&amp;s=03\" target=\"_blank\" rel=\"noopener\">publicaci\u00f3n en X de Santiago Hern\u00e1ndez Ramos.<\/p>\n<p><\/a><\/p>\n<p align=\"justify\">\u00bf\ud835\udc10\ud835\udc2e\u00e9 \ud835\udc1e\ud835\udc2c \ud835\udc19\ud835\udc1e\ud835\udc2b\ud835\udc28 \ud835\udc13\ud835\udc2b\ud835\udc2e\ud835\udc2c\ud835\udc2d?<\/p>\n<p align=\"justify\">El concepto de Zero Trust (Confianza Cero) es un enfoque de Ciberseguridad que se ha vuelto muy popular en los \u00faltimos a\u00f1os.<\/p>\n<p><!--more--><\/p>\n<p align=\"justify\">La idea fundamental es que, por defecto, no se debe confiar en ninguna entidad, ya sea interna o externa.<\/p>\n<p align=\"justify\">En lugar de otorgar acceso libre a los recursos y datos dentro de una red o sistema a usuarios o dispositivos simplemente por pertenecer a esa red, se debe verificar y autenticar constantemente la identidad y la seguridad de cada usuario y dispositivo, as\u00ed como recertificar y limitar el acceso seg\u00fan sea necesario.<\/p>\n<p align=\"justify\">Aqu\u00ed hay algunos aspectos clave del enfoque Zero Trust:<\/p>\n<p align=\"justify\">\ud835\udc0d\ud835\udc28 \ud835\udc2c\ud835\udc1e \ud835\udc1c\ud835\udc28\ud835\udc27\ud835\udc1f\ud835\udc22\u0301\ud835\udc1a \ud835\udc1e\ud835\udc27 \ud835\udc27\ud835\udc1a\ud835\udc1d\ud835\udc22\ud835\udc1e \ud835\udc29\ud835\udc28\ud835\udc2b \ud835\udc1d\ud835\udc1e\ud835\udc1f\ud835\udc1e\ud835\udc1c\ud835\udc2d\ud835\udc28: Zero Trust parte del principio de que no se debe confiar en ning\u00fan usuario, dispositivo o proceso, incluso si est\u00e1n dentro de la red corporativa. Esto se aplica tanto a empleados como a usuarios externos.<\/p>\n<p align=\"justify\">\ud835\udc15\ud835\udc1e\ud835\udc2b\ud835\udc22\ud835\udc1f\ud835\udc22\ud835\udc1c\ud835\udc1a\ud835\udc1c\ud835\udc22\ud835\udc28\u0301\ud835\udc27 \ud835\udc1c\ud835\udc28\ud835\udc27\ud835\udc2d\ud835\udc22\ud835\udc27\ud835\udc2e\ud835\udc1a \ud835\udc1d\ud835\udc1e \ud835\udc22\ud835\udc1d\ud835\udc1e\ud835\udc27\ud835\udc2d\ud835\udc22\ud835\udc1d\ud835\udc1a\ud835\udc1d \ud835\udc32 \ud835\udc2c\ud835\udc1e\ud835\udc20\ud835\udc2e\ud835\udc2b\ud835\udc22\ud835\udc1d\ud835\udc1a\ud835\udc1d: En un entorno de Confianza Cero, se verifica constantemente la identidad y la seguridad de todos los usuarios y dispositivos que intentan acceder a recursos. Esto se hace a trav\u00e9s de mecanismos de autenticaci\u00f3n y la evaluaci\u00f3n de la postura de seguridad de los dispositivos.<\/p>\n<p align=\"justify\">\ud835\udc02\ud835\udc28\ud835\udc27\ud835\udc2d\ud835\udc2b\ud835\udc28\ud835\udc25 \ud835\udc1d\ud835\udc1e \ud835\udc1a\ud835\udc1c\ud835\udc1c\ud835\udc1e\ud835\udc2c\ud835\udc28 \ud835\udc1b\ud835\udc1a\ud835\udc2c\ud835\udc1a\ud835\udc1d\ud835\udc28 \ud835\udc1e\ud835\udc27 \ud835\udc29\ud835\udc28\ud835\udc25\ud835\udc22\u0301\ud835\udc2d\ud835\udc22\ud835\udc1c\ud835\udc1a\ud835\udc2c: Se aplican pol\u00edticas de acceso granulares que determinan qui\u00e9n puede acceder a qu\u00e9 recursos y bajo qu\u00e9 condiciones. Estas pol\u00edticas se basan en el principio de \u00abnecesidad de saber\u00bb y \u00abnecesidad de acceso\u00bb, lo que significa que los usuarios solo tienen acceso a los recursos necesarios para realizar su trabajo.<\/p>\n<p align=\"justify\">\ud835\udc12\ud835\udc1e\ud835\udc20\ud835\udc26\ud835\udc1e\ud835\udc27\ud835\udc2d\ud835\udc1a\ud835\udc1c\ud835\udc22\ud835\udc28\u0301\ud835\udc27 \ud835\udc1d\ud835\udc1e \ud835\udc2b\ud835\udc1e\ud835\udc1d: Las redes se dividen en segmentos m\u00e1s peque\u00f1os y aislados, lo que limita la propagaci\u00f3n de amenazas en caso de una violaci\u00f3n de seguridad. Esto evita que los atacantes se muevan libremente dentro de la red.<\/p>\n<p align=\"justify\">\ud835\udc15\ud835\udc22\ud835\udc2c\ud835\udc22\ud835\udc1b\ud835\udc22\ud835\udc25\ud835\udc22\ud835\udc1d\ud835\udc1a\ud835\udc1d \ud835\udc32 \ud835\udc26\ud835\udc28\ud835\udc27\ud835\udc22\ud835\udc2d\ud835\udc28\ud835\udc2b\ud835\udc22\ud835\udc33\ud835\udc1a\ud835\udc1c\ud835\udc22\ud835\udc28\u0301\ud835\udc27 \ud835\udc1c\ud835\udc28\ud835\udc27\ud835\udc2d\ud835\udc22\ud835\udc27\ud835\udc2e\ud835\udc1a: Se implementan herramientas de seguridad avanzadas para monitorizar y detectar actividades an\u00f3malas en tiempo real. Esto permite identificar posibles amenazas y responder de manera proactiva.<\/p>\n<p align=\"justify\">La adopci\u00f3n de un enfoque Zero Trust es una respuesta a la creciente sofisticaci\u00f3n de las amenazas. A medida que las organizaciones se enfrentan a un mundo digital m\u00e1s complejo y conectado, la implementaci\u00f3n de Zero Trust se ha convertido en una estrategia clave para proteger activos y datos cr\u00edticos.<\/p>\n<h3>Im\u00e1genes Relacionadas:<\/h3>","protected":false},"excerpt":{"rendered":"<p>Para esbozar la idea sobre este problema se ha considerado exponer este art\u00edculo tomado una publicaci\u00f3n en X de Santiago Hern\u00e1ndez Ramos. \u00bf\ud835\udc10\ud835\udc2e\u00e9 \ud835\udc1e\ud835\udc2c \ud835\udc19\ud835\udc1e\ud835\udc2b\ud835\udc28 \ud835\udc13\ud835\udc2b\ud835\udc2e\ud835\udc2c\ud835\udc2d? El concepto de Zero Trust (Confianza Cero) es un enfoque de Ciberseguridad que se &hellip; <a href=\"https:\/\/blogs.uo.edu.cu\/seginf\/?p=3684\">Sigue leyendo <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[2,56,67,57,19,24],"tags":[],"class_list":["post-3684","post","type-post","status-publish","format-standard","hentry","category-amenazas","category-buenas-practicas","category-ciberseguridad","category-educacion-de-usuarios","category-percepcion-de-riesgo","category-prevencion"],"_links":{"self":[{"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=\/wp\/v2\/posts\/3684","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3684"}],"version-history":[{"count":7,"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=\/wp\/v2\/posts\/3684\/revisions"}],"predecessor-version":[{"id":3712,"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=\/wp\/v2\/posts\/3684\/revisions\/3712"}],"wp:attachment":[{"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3684"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3684"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3684"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}