{"id":32986,"date":"2024-06-20T06:45:25","date_gmt":"2024-06-20T04:45:25","guid":{"rendered":"https:\/\/www.techopedia.com\/es\/?post_type=definition&p=32986"},"modified":"2024-06-20T10:03:46","modified_gmt":"2024-06-20T08:03:46","slug":"ataque","status":"publish","type":"definition","link":"https:\/\/www.techopedia.com\/es\/definicion\/ataque","title":{"rendered":"Ataque"},"content":{"rendered":"

\u00bfQu\u00e9 significa ataque?<\/span><\/h2>\n

Un ataque es una amenaza a la seguridad de la informaci\u00f3n<\/strong> que implica un intento de obtener, alterar, destruir, eliminar, implantar o revelar informaci\u00f3n sin acceso o permiso autorizado.<\/p>\n

Ocurre tanto a individuos como a organizaciones. Existen muchos tipos diferentes de ataques, entre los que se incluyen los pasivos, activos, dirigidos, clickjacking, brandjacking, botnet, phishing<\/a>, spamming<\/a>, internos y externos.<\/p>\n

Definici\u00f3n de ataque<\/span><\/h2>\n

Un ataque es una de las mayores amenazas a la seguridad en la tecnolog\u00eda de la informaci\u00f3n<\/a>, y se presenta en diferentes formas. Un ataque pasivo es aquel que no afecta a ning\u00fan sistema<\/strong>, aunque se obtiene informaci\u00f3n. Un buen ejemplo son las escuchas telef\u00f3nicas.<\/p>\n

Un ataque activo tiene el potencial de causar da\u00f1os importantes<\/strong> a los recursos de una persona u organizaci\u00f3n porque intenta alterar los recursos del sistema o afectar a su funcionamiento. Un buen ejemplo de esto podr\u00eda ser un virus u otro tipo de malware.<\/p>\n","protected":false},"excerpt":{"rendered":"

\u00bfQu\u00e9 significa ataque? Un ataque es una amenaza a la seguridad de la informaci\u00f3n que implica un intento de obtener, alterar, destruir, eliminar, implantar o revelar informaci\u00f3n sin acceso o permiso autorizado. Ocurre tanto a individuos como a organizaciones. Existen muchos tipos diferentes de ataques, entre los que se incluyen los pasivos, activos, dirigidos, clickjacking, […]<\/p>\n","protected":false},"author":7813,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","format":"standard","meta":{"_acf_changed":false,"_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"definitioncat":[30],"class_list":["post-32986","definition","type-definition","status-publish","format-standard","hentry","definitioncat-ciberseguridad"],"acf":[],"yoast_head":"\nTipos de ataques en inform\u00e1tica<\/title>\n<meta name=\"description\" content=\"Te contamos sobre los diversos tipos de ataques y cuales seri\u00e1n las consecuencias catastr\u00f3ficas para los usuarios u ordenadores.\" \/>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ataque\" \/>\n<meta property=\"og:description\" content=\"Te contamos sobre los diversos tipos de ataques y cuales seri\u00e1n las consecuencias catastr\u00f3ficas para los usuarios u ordenadores.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.techopedia.com\/es\/definicion\/ataque\" \/>\n<meta property=\"og:site_name\" content=\"Techopedia Espa\u00f1ol\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-20T08:03:46+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.techopedia.com\/es\/definicion\/ataque#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.techopedia.com\/es\/definicion\/ataque\"},\"author\":{\"name\":\"Margaret Rouse\",\"@id\":\"https:\/\/www.techopedia.com\/es\/#\/schema\/person\/f5dd538e31ee352d105b8af36c4268a5\"},\"headline\":\"Ataque\",\"datePublished\":\"2024-06-20T04:45:25+00:00\",\"dateModified\":\"2024-06-20T08:03:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.techopedia.com\/es\/definicion\/ataque\"},\"wordCount\":166,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.techopedia.com\/es\/#organization\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.techopedia.com\/es\/definicion\/ataque#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.techopedia.com\/es\/definicion\/ataque\",\"url\":\"https:\/\/www.techopedia.com\/es\/definicion\/ataque\",\"name\":\"Tipos de ataques en inform\u00e1tica\",\"isPartOf\":{\"@id\":\"https:\/\/www.techopedia.com\/es\/#website\"},\"datePublished\":\"2024-06-20T04:45:25+00:00\",\"dateModified\":\"2024-06-20T08:03:46+00:00\",\"description\":\"Te contamos sobre los diversos tipos de ataques y cuales seri\u00e1n las consecuencias catastr\u00f3ficas para los usuarios u ordenadores.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.techopedia.com\/es\/definicion\/ataque#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.techopedia.com\/es\/definicion\/ataque\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.techopedia.com\/es\/definicion\/ataque#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\/\/www.techopedia.com\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Term\",\"item\":\"https:\/\/www.techopedia.com\/es\/definicion\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Ataque\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.techopedia.com\/es\/#website\",\"url\":\"https:\/\/www.techopedia.com\/es\/\",\"name\":\"Techopedia\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.techopedia.com\/es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.techopedia.com\/es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.techopedia.com\/es\/#organization\",\"name\":\"Techopedia en Espa\u00f1ol\",\"url\":\"https:\/\/www.techopedia.com\/es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.techopedia.com\/es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.techopedia.com\/es\/wp-content\/uploads\/sites\/4\/2025\/02\/techopedia-light-logo.svg\",\"contentUrl\":\"https:\/\/www.techopedia.com\/es\/wp-content\/uploads\/sites\/4\/2025\/02\/techopedia-light-logo.svg\",\"caption\":\"Techopedia en Espa\u00f1ol\"},\"image\":{\"@id\":\"https:\/\/www.techopedia.com\/es\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.techopedia.com\/es\/#\/schema\/person\/f5dd538e31ee352d105b8af36c4268a5\",\"name\":\"Margaret Rouse\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.techopedia.com\/es\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/margaret-rouse-headshot.jpeg\",\"contentUrl\":\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/margaret-rouse-headshot.jpeg\",\"caption\":\"Margaret Rouse\"},\"description\":\"Margaret is an award-winning technical writer and teacher known for her ability to explain complex technical subjects to a non-technical business audience. Over the past twenty years, her IT definitions have been published by Que in an encyclopedia of technology terms and cited in articles by the New York Times, Time Magazine, USA Today, ZDNet, PC Magazine, and Discovery Magazine. She joined Techopedia in 2011. Margaret's idea of a fun day is helping IT and business professionals learn to speak each other\u2019s highly specialized languages.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/margaretrouse\/\",\"https:\/\/x.com\/https:\/\/twitter.com\/@techdefinitions\"],\"knowsAbout\":[\"Technology Expert\"],\"url\":\"https:\/\/www.techopedia.com\/es\/autor\/margaret-rouse\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Tipos de ataques en inform\u00e1tica","description":"Te contamos sobre los diversos tipos de ataques y cuales seri\u00e1n las consecuencias catastr\u00f3ficas para los usuarios u ordenadores.","robots":{"index":"noindex","follow":"follow"},"og_locale":"es_ES","og_type":"article","og_title":"Ataque","og_description":"Te contamos sobre los diversos tipos de ataques y cuales seri\u00e1n las consecuencias catastr\u00f3ficas para los usuarios u ordenadores.","og_url":"https:\/\/www.techopedia.com\/es\/definicion\/ataque","og_site_name":"Techopedia Espa\u00f1ol","article_modified_time":"2024-06-20T08:03:46+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.techopedia.com\/es\/definicion\/ataque#article","isPartOf":{"@id":"https:\/\/www.techopedia.com\/es\/definicion\/ataque"},"author":{"name":"Margaret Rouse","@id":"https:\/\/www.techopedia.com\/es\/#\/schema\/person\/f5dd538e31ee352d105b8af36c4268a5"},"headline":"Ataque","datePublished":"2024-06-20T04:45:25+00:00","dateModified":"2024-06-20T08:03:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.techopedia.com\/es\/definicion\/ataque"},"wordCount":166,"commentCount":0,"publisher":{"@id":"https:\/\/www.techopedia.com\/es\/#organization"},"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.techopedia.com\/es\/definicion\/ataque#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.techopedia.com\/es\/definicion\/ataque","url":"https:\/\/www.techopedia.com\/es\/definicion\/ataque","name":"Tipos de ataques en inform\u00e1tica","isPartOf":{"@id":"https:\/\/www.techopedia.com\/es\/#website"},"datePublished":"2024-06-20T04:45:25+00:00","dateModified":"2024-06-20T08:03:46+00:00","description":"Te contamos sobre los diversos tipos de ataques y cuales seri\u00e1n las consecuencias catastr\u00f3ficas para los usuarios u ordenadores.","breadcrumb":{"@id":"https:\/\/www.techopedia.com\/es\/definicion\/ataque#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.techopedia.com\/es\/definicion\/ataque"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.techopedia.com\/es\/definicion\/ataque#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/www.techopedia.com\/es\/"},{"@type":"ListItem","position":2,"name":"Term","item":"https:\/\/www.techopedia.com\/es\/definicion"},{"@type":"ListItem","position":3,"name":"Ataque"}]},{"@type":"WebSite","@id":"https:\/\/www.techopedia.com\/es\/#website","url":"https:\/\/www.techopedia.com\/es\/","name":"Techopedia","description":"","publisher":{"@id":"https:\/\/www.techopedia.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.techopedia.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.techopedia.com\/es\/#organization","name":"Techopedia en Espa\u00f1ol","url":"https:\/\/www.techopedia.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.techopedia.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/www.techopedia.com\/es\/wp-content\/uploads\/sites\/4\/2025\/02\/techopedia-light-logo.svg","contentUrl":"https:\/\/www.techopedia.com\/es\/wp-content\/uploads\/sites\/4\/2025\/02\/techopedia-light-logo.svg","caption":"Techopedia en Espa\u00f1ol"},"image":{"@id":"https:\/\/www.techopedia.com\/es\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.techopedia.com\/es\/#\/schema\/person\/f5dd538e31ee352d105b8af36c4268a5","name":"Margaret Rouse","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.techopedia.com\/es\/#\/schema\/person\/image\/","url":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/margaret-rouse-headshot.jpeg","contentUrl":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/margaret-rouse-headshot.jpeg","caption":"Margaret Rouse"},"description":"Margaret is an award-winning technical writer and teacher known for her ability to explain complex technical subjects to a non-technical business audience. Over the past twenty years, her IT definitions have been published by Que in an encyclopedia of technology terms and cited in articles by the New York Times, Time Magazine, USA Today, ZDNet, PC Magazine, and Discovery Magazine. She joined Techopedia in 2011. Margaret's idea of a fun day is helping IT and business professionals learn to speak each other\u2019s highly specialized languages.","sameAs":["https:\/\/www.linkedin.com\/in\/margaretrouse\/","https:\/\/x.com\/https:\/\/twitter.com\/@techdefinitions"],"knowsAbout":["Technology Expert"],"url":"https:\/\/www.techopedia.com\/es\/autor\/margaret-rouse"}]}},"_links":{"self":[{"href":"https:\/\/www.techopedia.com\/es\/wp-json\/wp\/v2\/definition\/32986","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.techopedia.com\/es\/wp-json\/wp\/v2\/definition"}],"about":[{"href":"https:\/\/www.techopedia.com\/es\/wp-json\/wp\/v2\/types\/definition"}],"author":[{"embeddable":true,"href":"https:\/\/www.techopedia.com\/es\/wp-json\/wp\/v2\/users\/7813"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techopedia.com\/es\/wp-json\/wp\/v2\/comments?post=32986"}],"version-history":[{"count":0,"href":"https:\/\/www.techopedia.com\/es\/wp-json\/wp\/v2\/definition\/32986\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.techopedia.com\/es\/wp-json\/wp\/v2\/media?parent=32986"}],"wp:term":[{"taxonomy":"definitioncat","embeddable":true,"href":"https:\/\/www.techopedia.com\/es\/wp-json\/wp\/v2\/definitioncat?post=32986"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}