Loading
{"id":1066635,"type":0,"block_id":"721209097_1367951580","theme_id":21,"user_id":367844,"path":"Seguridad-en-Redes-para-Telefona","title":"Seguridad en Redes para Telefonía","pubtitle":"Seguridad en Redes para Telefonía","tags":"","public":true,"publicAccess":true,"private_link_enabled":0,"thumb":"https://s3-eu-west-1.amazonaws.com/infogram-thumbs-200/721209097_1367951580.jpg","width":550,"copyright":"Copyright technolifeandmore.blogspot.com","properties":{"publishType":0,"transparent":false,"rtl":false,"export_settings":{"showGrid":true,"showValues":true},"whitelabel":false,"embed_button":"enabled","title_link":"infogram","custom_logo":"infogram","custom_link_url":"","embed_button_text":"Share","decimal_separator":".,"},"elements":[{"type":"particle","particle_id":11850745,"object_id":"4a728d03-e9fc-11e4-a037-7b5f270fdca9","particle_type":"maintitle","picture":null,"text":"Seguridad en Redes para Telefonía","content_type":"","title":null,"shrink":null},{"type":"particle","particle_id":1166194,"object_id":"7212090971367951762","particle_type":"bodytext","picture":null,"text":"Con el importante crecimiento que va teniendo los dispositivos móviles, día a día esta área va teniendo una mayor demanda. Uno de los aspectos importantes que involucran, va relacionado con la seguridad de redes móviles.","content_type":"","title":"","shrink":null},{"type":"particle","particle_id":1166212,"object_id":"7212090971367951828","particle_type":"bodytext","picture":null,"text":"Desde 2009 se ha visto un incremento entorno a los temas sensibles de seguridad","content_type":"","title":"","shrink":null},{"type":"chart","chart_id":1687889,"object_id":"721209097_1367951932","chart_type_nr":6,"data":[[["Past GDP","2009","2010","2011","2012","2013"],["Incremento hackeo en móviles","9","9.8","11","13.2","15"]]],"custom":{"grid":true,"smooth":true,"showPoints":true,"reverse":false,"height":"250","legacyTransposeDone":true,"switchRowsColumns":true},"colors":["#339bd6","#363636","#636363","#898989","#acacac","#cccccc","#ebebeb","#ffffff","#ffffff"],"dimensions":[],"modifier":0,"sheetnames":[],"sheets_settings":[]},{"type":"chart","chart_id":1688013,"object_id":"721209097_1367952315","chart_type_nr":23,"data":[[["Principal motivo","El principal motivo del incremento que se ha visto en los últimos años en la inseguridad en las redes telefónicas es el desinterés o la no conciencia del uso de las redes de las telecomunicaciones por parte del usuario.","boyPath",""],["México","En México existen 88,797,186 teléfonos móviles","upPath"]]],"custom":{},"colors":[],"dimensions":[],"modifier":0,"sheetnames":[],"sheets_settings":[]},{"type":"particle","particle_id":1167400,"object_id":"7212090971367958244","particle_type":"bodytitle","picture":null,"text":"definiendo un poco","content_type":"","title":"","shrink":null},{"type":"chart","chart_id":1688078,"object_id":"721209097_1367952542","chart_type_nr":23,"data":[[["Red Telecomunicación","Una red de telecomunicaciones consiste en una infraestructura física a través de la cual se transporta la información desde la fuente hasta el destino","circlePath",""],["Comunicación","Para recibir un servicio de telecomunicación, un usuario utiliza un equipo terminal a través del cual obtiene entrada a la red por medio de un canal de acceso","circlePath"]]],"custom":{},"colors":[],"dimensions":[],"modifier":0,"sheetnames":[],"sheets_settings":[]},{"type":"particle","particle_id":1166776,"object_id":"7212090971367954448","particle_type":"bodytitle","picture":null,"text":"Tipos Redes de Telecomunicaciones","content_type":"","title":"","shrink":null},{"type":"particle","particle_id":1166793,"object_id":"7212090971367954642","particle_type":"bodytext","picture":null,"text":"GSM - Es el más empleado, una de las desventajas es que los provedores del servicio pueden acceder a la información del usuario.","content_type":"","title":"","shrink":null},{"type":"particle","particle_id":1166809,"object_id":"7212090971367954723","particle_type":"bodytext","picture":null,"text":"GPRS - Servicio de paquetes de radio, era usado en los años 60 una de las desventajas que tiene es que el cifrado es muy vulnerable.","content_type":"","title":"","shrink":null},{"type":"particle","particle_id":1166799,"object_id":"7212090971367954695","particle_type":"bodytext","picture":null,"text":"EDGE - Es la sucesora de GPRS y trabaja en conjunto con GSM.","content_type":"","title":"","shrink":null},{"type":"particle","particle_id":1166804,"object_id":"7212090971367954713","particle_type":"bodytext","picture":null,"text":"CDMA - Es la red de telecomunicación empleado por NEXTEL, este tipo de red funcionan asociándose con el número telefónico con el número de serie del dispositivo, haciéndolo seguro, ya que no se puede tener un duplicado.","content_type":"","title":"","shrink":null},{"type":"particle","particle_id":1167223,"object_id":"7212090971367957239","particle_type":"bodytitle","picture":null,"text":"Tipo de cifrado ","content_type":"","title":"","shrink":null},{"type":"chart","chart_id":1688413,"object_id":"721209097_1367954251","chart_type_nr":19,"data":[[["Membership","A5","RC4","GEA"],["GSM","x"],["EDGE","x"],["CDMA","","x"],["UMTS","x"],["GPRS","","","x"]]],"custom":{},"colors":["#000000"],"dimensions":[],"modifier":0,"sheetnames":[],"sheets_settings":[]},{"type":"particle","particle_id":1167008,"object_id":"7212090971367955974","particle_type":"bodytitle","picture":null,"text":"Criptografia en GSM","content_type":"","title":"","shrink":null},{"type":"particle","particle_id":1167027,"object_id":"7212090971367956075","particle_type":"bodytext","picture":null,"text":"La red de telecomunicación más predominante y más importante es el GSM, por lo tanto es importante mencionar como funciona su sistema criptográfico.","content_type":"","title":"","shrink":null},{"type":"particle","particle_id":1167014,"object_id":"721209097_1367955998","particle_type":"image","picture":"http://s3-eu-west-1.amazonaws.com/infogram-particles-700/721209097_1367955998.gif"},{"type":"particle","particle_id":1167196,"object_id":"7212090971367957057","particle_type":"maintitle","picture":null,"text":"Referencias:","content_type":"","title":"","shrink":null},{"type":"particle","particle_id":1167180,"object_id":"7212090971367956954","particle_type":"bodytext","picture":null,"text":"http://es.wikipedia.org/wiki/Sistema_global_para_las_co_\nmunicaciones_m%C3%B3viles\nhttp://es.wikipedia.org/wiki/Red_de_telecomunicaci%C3_\n%B3n\nhttp://www.tendencias21.net/La-telefonia-movil-se-conv_\nierte-en-objetivo-hacker_a2653.html\nhttp://www.networkworld.com/news/2012/091912-mobile-security-262581.html","content_type":"","title":"","shrink":null}],"theme":{"createdAt":"2016-04-22T04:54:06.000Z","updatedAt":"2016-12-28T10:32:26.000Z","logoImages":[""],"charts":{"treemap":{"labels":{"name":{"fontFamily":"PT Sans Narrow","fontWeight":"700"},"value":{"fontFamily":"PT Sans Narrow"}}},"wordcloud":{"labels":{"fontFamily":"Arial","fontWeight":"700"}},"table":{"cellBackground":"#ffffff","headerBackground":"#fcee21","cellColor":"#464646","headerColor":"#000","shapeFill":"#232323"}},"color":{"bg":"#ffffff","text":"#000000","chart":{"bg":"transparent","text":"#000000"},"element":{"bg":"transparent","text":"#000000"}},"colorPresets":[],"localFonts":[],"font":{"common":{"textAlign":"initial","fontSize":"16","fontStyle":"normal","fontWeight":"400","fontFamily":"PT Sans"},"legend":{"fontWeight":"400","fontSize":"16"},"label":{"fontWeight":400,"fontSize":16}},"fontPresets":[],"fontFamilies":["PT Sans Narrow","PT Sans","Arial Narrow"],"id":21,"title":"Yellow-updated","usergroup":"","picture":"https://d1m5pq7b4fzvad.cloudfront.net/21/thumbnail.png","thumb":"/i/templates/S/yellow.png","order":26,"public":0,"width":550,"fonts":"PT+Sans+Narrow:400,700","colors":["#000000","#363636","#636363","#898989","#acacac","#cccccc","#ebebeb","#ffffff"],"logocolor":"000000","logoUrl":"","showLogo":"","showEmbed":"","embedButtonText":"","top":20,"padding":20,"spacing":24,"shrinkMargin":20,"shrinkPadding":20,"spacingElementMin":null,"spacingElementMax":null,"css":".igc-sheets .igc-sheet .igc-sheet-ico,\n.igc-sheets .igc-sheet:hover .igc-sheet-ico {\n\tborder-color: #000000;\n}\n.igc-sheets .igc-sheet .igc-sheet-label,\n.igc-sheets .igc-sheet:hover .igc-sheet-label,\n.igc-sheets .igc-sheet.active .igc-sheet-label {\n\tcolor: #7d7d7d;\n}\n.igc-sheet .igc-sheet-ico,\n.igc-sheet.active .igc-sheet-ico {\n\tbackground: transparent;\n}\n.igc-sheets .igc-sheet.active .igc-sheet-ico::after,\n.igc-sheets .igc-sheet:hover .igc-sheet-ico::after {\n\theight: 14px;\n\twidth: 14px;\n\tleft: 2px;\n\ttop: 2px;\n\tbackground: #000000;\n}\n.igc-textual-figure {\n\tfont-size: 45px;\n}\n.igc-table-scroll {\n\tbackground: black;\n}\n.igc-table .igc-table-cell {\n\tfont-size: 16px;\n\tborder-color: #000;\n\tborder-width: 1px;\n\tborder-style: solid;\n}\n.igc-table .igc-table-header {\n\tfont-size: 16px;\n\tborder-color: #000;\n\tborder-width: 2px;\n\tborder-style: solid;\n\tfont-weight: bold;\n}\n.ig-container {\n\tbackground-color: #fcee21;\n\tbackground-image: url(/i/templates/21/1-yellow-bckgrnd.png);\n}\n.headline {\n\tfont-family: PT Sans Narrow;\n\tfont-weight: 700;\n\tfont-size: 60px;\n\ttext-transform: uppercase;\n\tcolor: #000000;\n\ttext-align: center;\n\tmargin-right: 20px;\n\tmargin-left: 20px;\n}\n.chart-title {\n\tmargin-right: 20px;\n\tmargin-left: 20px;\n}\ndiv.quoted {\n\tmargin-right: 20px;\n\tmargin-left: 20px;\n}\ndiv.body-text {\n\tmargin-right: 20px;\n\tmargin-left: 20px;\n}\ndiv.picture {\n\tmargin-right: 20px;\n\tmargin-left: 20px;\n}\n.chart {\n\tmargin-left: 20px;\n\tmargin-right: 20px;\n}\n.bodytitle .innertext {\n\tfont-family: 'PT Sans Narrow';\n\tfont-weight: 700;\n\tmin-height: 18px;\n\tcolor: #000;\n\ttext-transform: uppercase;\n\tpadding: 12px;\n\tbackground: #fcee21;\n\ttext-align: center;\n\tmargin-right: 27px;\n\tborder: 2px solid black;\n}\n.bodytitle .innertext::after {\n\tcontent: '';\n\tposition: absolute;\n\tbottom: -7px;\n\tright: 11px;\n\twidth: 27px;\n\theight: 47px;\n\tbackground: url(/i/templates/21/chart-title-flag.png);\n}\n.quote {\n\tfont-family: PT Sans Narrow;\n\tfont-weight: 400;\n\tfont-size: 36px;\n\tcolor: #000000;\n\ttext-align: center;\n\tbackground-image: url(/i/templates/21/quote.png);\n\tbackground-size: 71px 71px;\n\tbackground-position: 50% 0%;\n\tbackground-repeat: no-repeat;\n\tpadding-top: 80px;\n}\n.quotetitle {\n\tfont-size: 24px;\n}\n.bodytext {\n\tfont-family: PT Sans Narrow;\n\tfont-weight: 400;\n\tfont-size: 20px;\n\tcolor: #000;\n\ttext-align: justify;\n\tpadding-left: 32px;\n\tpadding-right: 32px;\n}\n.ig-copyright,\n#madewith {\n\tcolor: #000;\n}\n#madewith a:link,\n#madewith a:active,\n#madewith a,\n#madewith a:visited,\n#madewith a:hover {\n\tcolor: #000000 !important;\n}\n.headline.active:hover span {\n\tcolor: #fcee21;\n\tbackground: #000;\n\tdisplay: inline;\n\tpadding-left: 10px;\n\tpadding-right: 20px;\n}\n#madewith.active a:hover {\n\tcolor: #898989 !important;\n}\n.titlepopup1,\n.titlepopup2 {\n\tborder-color: #fcee21;\n\tbackground: #000 !important;\n}\n.shrink .chart > .inner {\n\tpadding-left: 10px;\n\tpadding-right: 10px;\n}\n.shrink .chart {\n\tmargin-left: 0;\n\tmargin-right: 0;\n}\n.ig-separator-line {\n\tbackground: rgba(0, 0, 0, 0.5);\n}\n.heatmap-legend {\n\tbackground: rgba(255, 255, 255, 0.7);\n}\n.heatmap-legend-item,\n.heatmap-label {\n\tcolor: #000;\n\tfont-size: 11px;\n\tfont-family: PT Sans;\n}\n.igc-graph-pie-piece {\n\tstroke: rgba(255, 255, 255, 0.7);\n}\n.igc-tabs .igc-tab-active {\n background: #ffffff;\n }\n .igc-tabs .igc-tab .igc-tab-content,\n .igc-tabs .igc-tab.icon-down:after {\n font-family: PT Sans;\n color: #000000;\n font-weight: 400;\n }\n .igc-tabs .igc-tab,\n .igc-tab-switcher {\n color: #000000;\n } .igc-tabs.igc-tabs-dropdown .igc-tab-name {\n font-family: PT Sans;\n color: #000000;\n font-weight: 400;\n } .captiontext {font-family: PT Sans;color: #000000;font-weight: 400;} .captiontext .innertext {line-height: 1.5;}","chartOptions":{"progress":{"backgroundInactive":{"stroke-width":1,"stroke":"#000000","stroke-opacity":1,"fill":"transparent"}},"waterfall":{"colors":"959595 ffffff 000000"},"candle":{"blankfill":"#fcee21","colors":"000000 959595"},"matrix":{"maxRows":7},"gauge":{"gaugeStyle":{"stroke-width":1,"stroke":"#000","fill":"#fcee21"},"gaugeFillStyle":{"stroke-width":1,"stroke":"#000","fill":"#000"},"gaugeNeedleStyle":{"stroke-width":0,"stroke-opacity":0,"fill":"#707070"}},"map":{"showLegend":false,"countryStroke":"#000000","countryFill":"#fcee21","canvasFill":"transparent"},"common":{"_categoryOptions":{"backgroundStyle":{"fill":"#fcee21","stroke":"#000","stroke-opacity":1,"stroke-width":1},"text":{"labelFontStyle":{"fill":"#000000"}}},"textStyle":{"font-family":"PT Sans Narrow, Arial Narrow","font-size":16,"cursor":"default","fill":"black"},"backgroundStyle":{"fill":"transparent","stroke-opacity":0,"stroke-width":0},"_gridOptions":{"baseLineStyle":{"stroke-width":1,"stroke":"#000"},"marginLineStyle":{"stroke-width":0,"stroke":"transparent"},"fontStyle":{"font-family":"PT Sans","font-size":11,"text-anchor":"start","fill":"#000","cursor":"default"},"lineStyle":{"stroke-width":1,"stroke":"#000","fill":"none","stroke-dasharray":"."}},"legendOptions":{"font-size":16,"font-family":"PT Sans Narrow"},"tooltipOptions":{"nameFontStyle":{"font-family":"PT Sans Narrow","text-anchor":"start","font-weight":700,"font-size":16,"fill":"#ffffff"},"valueFontStyle":{"font-family":"PT Sans Narrow","font-size":16,"text-anchor":"start","fill":"#fff"},"containerStyle":{"stroke":"#464646","fill":"#464646"}}}},"version":1,"archived":true,"tabs":false,"zeroPaddingEmbed":true,"created_at":"2016-04-22T04:54:06.000Z","updated_at":"2016-12-28T10:32:26.000Z"},"embed":"<script id=\"infogram_0_Seguridad-en-Redes-para-Telefona\" title=\"Seguridad en Redes para Telefonía\" src=\"//e.infogr.am/js/dist/embed.js?5Jj\" type=\"text/javascript\"></script><div style=\"padding:8px 0;font-family:Arial!important;font-size:13px!important;line-height:15px!important;text-align:center;border-top:1px solid #dadada;margin:0 30px\"><a href=\"https://infogr.am/Seguridad-en-Redes-para-Telefona\" style=\"color:#989898!important;text-decoration:none!important;\" target=\"_blank\" rel=\"nofollow\">Seguridad en Redes para Telefonía</a><br><a href=\"https://infogr.am\" style=\"color:#989898!important;text-decoration:none!important;\" target=\"_blank\" rel=\"nofollow\">Create your own infographics</a></div>","embedIframe":"<iframe src=\"//e.infogr.am/Seguridad-en-Redes-para-Telefona?src=embed\" title=\"Seguridad en Redes para Telefonía\" width=\"550\" height=\"\" scrolling=\"no\" frameborder=\"0\" style=\"border:none;\"></iframe><div style=\"padding:8px 0;font-family:Arial!important;font-size:13px!important;line-height:15px!important;text-align:center;border-top:1px solid #dadada;margin:0 30px\"><a href=\"https://infogr.am/Seguridad-en-Redes-para-Telefona\" style=\"color:#989898!important;text-decoration:none!important;\" target=\"_blank\" rel=\"nofollow\">Seguridad en Redes para Telefonía</a><br><a href=\"https://infogr.am\" style=\"color:#989898!important;text-decoration:none!important;\" target=\"_blank\" rel=\"nofollow\">Create your own infographics</a></div>","embedWordpress":"[infogram id=\"Seguridad-en-Redes-para-Telefona\" prefix=\"vtJ\" format=\"interactive\" title=\"Seguridad en Redes para Telefonía\"]","embedWordpressImage":"[infogram id=\"Seguridad-en-Redes-para-Telefona\" prefix=\"Zq4\" format=\"image\" title=\"Seguridad en Redes para Telefonía\"]","embedAsync":"<div class=\"infogram-embed\" data-id=\"Seguridad-en-Redes-para-Telefona\" data-type=\"interactive\" data-title=\"Seguridad en Redes para Telefonía\"></div><script>!function(e,t,n,s){var i=\"InfogramEmbeds\",o=e.getElementsByTagName(t),d=o[0],a=/^http:/.test(e.location)?\"http:\":\"https:\";if(/^\\/{2}/.test(s)&&(s=a+s),window[i]&&window[i].initialized)window[i].process&&window[i].process();else if(!e.getElementById(n)){var r=e.createElement(t);r.async=1,r.id=n,r.src=s,d.parentNode.insertBefore(r,d)}}(document,\"script\",\"infogram-async\",\"//e.infogr.am/js/dist/embed-loader-min.js\");</script><div style=\"padding:8px 0;font-family:Arial!important;font-size:13px!important;line-height:15px!important;text-align:center;border-top:1px solid #dadada;margin:0 30px\"><a href=\"https://infogr.am/Seguridad-en-Redes-para-Telefona\" style=\"color:#989898!important;text-decoration:none!important;\" target=\"_blank\" rel=\"nofollow\">Seguridad en Redes para Telefonía</a><br><a href=\"https://infogr.am\" style=\"color:#989898!important;text-decoration:none!important;\" target=\"_blank\" rel=\"nofollow\">Create your own infographics</a></div>","embedImageAsync":"<div class=\"infogram-embed\" data-id=\"Seguridad-en-Redes-para-Telefona\" data-type=\"image\" data-title=\"Seguridad en Redes para Telefonía\"></div><script>!function(e,t,n,s){var i=\"InfogramEmbeds\",o=e.getElementsByTagName(t),d=o[0],a=/^http:/.test(e.location)?\"http:\":\"https:\";if(/^\\/{2}/.test(s)&&(s=a+s),window[i]&&window[i].initialized)window[i].process&&window[i].process();else if(!e.getElementById(n)){var r=e.createElement(t);r.async=1,r.id=n,r.src=s,d.parentNode.insertBefore(r,d)}}(document,\"script\",\"infogram-async\",\"//e.infogr.am/js/dist/embed-loader-min.js\");</script><div style=\"padding:8px 0;font-family:Arial!important;font-size:13px!important;line-height:15px!important;text-align:center;border-top:1px solid #dadada;margin:0 30px\"><a href=\"https://infogr.am/Seguridad-en-Redes-para-Telefona\" style=\"color:#989898!important;text-decoration:none!important;\" target=\"_blank\" rel=\"nofollow\">Seguridad en Redes para Telefonía</a><br><a href=\"https://infogr.am\" style=\"color:#989898!important;text-decoration:none!important;\" target=\"_blank\" rel=\"nofollow\">Create your own infographics</a></div>"}