{"id":21514,"date":"2024-03-21T11:23:25","date_gmt":"2024-03-21T15:23:25","guid":{"rendered":"https:\/\/www.lpi.org\/articles\/\/"},"modified":"2024-05-08T11:01:05","modified_gmt":"2024-05-08T15:01:05","slug":"cybersecurity-essentials-concepts","status":"publish","type":"post","link":"https:\/\/www.lpi.org\/es\/blog\/2024\/03\/21\/cybersecurity-essentials-concepts\/","title":{"rendered":"Cybersecurity: Essential(s) Concepts"},"content":{"rendered":"<p>Over the past 10 to 15 years, technology adoption has virtually exploded, and staying ahead of the curve has become increasingly difficult\u2014for companies as well as individual experts. But it is not just the chase for continued innovation that grips these companies and experts: As the amount of available technology has increased, security threats have also grown.<\/p>\n<p><a href=\"https:\/\/www.npr.org\/sections\/health-shots\/2024\/03\/09\/1237038928\/health-industry-ransomware-cyberattack-change-healthcare-optum-uhc-united\" target=\"_blank\" rel=\"noopener\">News of ransomware attacks<\/a>, intellectual property violations, and malicious disruptions are now commonplace, with associated reputational and economic damage for those involved. Hence the need for companies and institutions to find qualified personnel to deal with the daily challenges in cybersecurity.<\/p>\n<p>But let&#8217;s go step by step: What is cybersecurity and what principles is it based?<\/p>\n<p>In general, cybersecurity refers to the protection of infrastructure, systems, networks, software, data, devices, and other assets from attacks and unauthorized access using different types of technologies and processes, with the aim of reducing, mitigating, and preventing risks and threats.<\/p>\n<h2>Core Characteristics<\/h2>\n<p>The core principles underlying cybersecurity are part of the so-called CIA, an acronym that stands for:<\/p>\n<ul>\n<li>Confidentiality<\/li>\n<li>Integrity<\/li>\n<li>Availability<\/li>\n<\/ul>\n<p>We\u2019ll look at each characteristic in turn.<\/p>\n<h3>Confidentiality<\/h3>\n<p><em>Confidentiality<\/em> is understood to mean ensuring that data and resources are adequately protected from view by unauthorized parties. Confidentiality must be ensured at every stage of data processing, whether in transit from one destination to another or when physically stored.<\/p>\n<p>To maintain this requirement, it is necessary always to use robust authentication, such as properly implementing a strong password (yes, our dog&#8217;s name is not enough to keep us safe \ud83d\ude09 ) combined with MFA (multi-factor authentication).<\/p>\n<p>Also, beware of possible \u201csocial engineering\u201d attempts aimed at stealing credentials. These can take place through links in phishing emails or text messages, which diverte you to malicious websites that appear very similar to trusted ones and that invite you to enter your credentials.<\/p>\n<h3>Integrity<\/h3>\n<p><em>Integrity<\/em> is the ability to keep unauthorized parties from altering data. This characteristic is commonly achieved through <a href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/cryptography\" target=\"_blank\" rel=\"noopener\">cryptography<\/a> and technologies that make it possible to hide data, whether in transit through a VPN or through other mechanisms such as <a href=\"https:\/\/en.wikipedia.org\/wiki\/Steganography\" target=\"_blank\" rel=\"noopener\">steganography<\/a>.<\/p>\n<p>Many protocols used on networks use a dedicated field called a \u00abchecksum,\u00bb contained in the header of transmitted packets, which allows a quick check on the integrity of the data.<\/p>\n<h3>Availability<\/h3>\n<p><em>Availability<\/em> guarantees access to a resource by those who have permission. The resource in question has to be available at all times, avoiding interruptions or instabilities in the service.<\/p>\n<p>To achieve availability, technologies and policies should uphold the principles of <em>high reliability<\/em> and <em>business continuity<\/em>, provide <em>disaster recovery<\/em> plans and risk management if there are any problems, and implement proper <em>backups<\/em>.<\/p>\n<h2>Risk Assessments<\/h2>\n<p>To ensure the CIA principles, a risk assessment must be conducted to identify hazards that could have a negative impact on an organization&#8217;s ability to ensure critical security prerequisites. These assessments identify salient risks and provide measures, processes, and controls to reduce the impact of these threats on business operations. Risk assessments generally involve the following steps:<\/p>\n<ul>\n<li>Identify threats<\/li>\n<li>Determine the attack surface and what can be affected<\/li>\n<li>Conduct analysis<\/li>\n<li>Review and regularly update the assessments conducted<\/li>\n<\/ul>\n<p>The ultimate goal is to obtain a <em>risk profile<\/em> based on the type of business and the resources and data included in the organization&#8217;s asset. The analysis and review seek to identify the organization\u2019s most sensitive and prioritized points by determining an inherent risk factor.<\/p>\n<p>But not only that: A risk assessment also aims to identify potential control measures that would hopefully offset any negative impact that a successful attack would have on the organization&#8217;s business processes or resources.<\/p>\n<h2>Security Players<\/h2>\n<p>Now that we know all this, it would be interesting to understand who is behind this scenario. Or rather, who are the main players on the security stage?<br \/>\nWell, we can break down players somewhat to see where the \u00abthe good, the bad, and the ugly\u00bb stand: To each his hat! \ud83d\ude42<\/p>\n<h3>Script Kiddies<\/h3>\n<p>These use tools made by others to try to do harm, but often without much result.<\/p>\n<h3>Black Hat Hacker<\/h3>\n<p>Let&#8217;s face it\u2026 We&#8217;ve pretty much all imagined it: With that fascination worthy of science fiction movies, these characters try to steal sensitive data via ransomware, keyloggers, or social engineering attacks. Typically, the data is then sold on the Dark Web.<\/p>\n<h3>White Hat Hacker<\/h3>\n<p>They are referred to as \u00abethical hackers,\u00bb because they put their skills and knowledge at the service of communities and companies. White Hats discover new vulnerabilities and patch them for mitigation or resolution.<\/p>\n<h3>Grey Hat Hacker<\/h3>\n<p>Well, the color speaks for itself: We are talking about people with the same skills already mentioned, but it is their sense of duty that decides what is \u00abright to do,\u00bb teetering between convenience and the latest discovered vulnerability&#8230; You be the judge \ud83d\ude09<\/p>\n<p>Here we are talking mainly about ethical values, above technical ones.<\/p>\n<h3>Hacktivist<\/h3>\n<p>These are groups that advocate certain ideals and usually target organizations contrary to the ideas they advocate: Often extremists who seek to harm a third party or exfiltrate sensitive information.<\/p>\n<h3>Nation State<\/h3>\n<p>These are departments operating on behalf of government institutions or under their indirect command, thus having full technical and financial support to be able to execute very complex cyber plans and attacks with purposes that can have international political and military impacts.<\/p>\n<p>We now know what and who is behind IT security. Please keep in mind that in addition to deep knowledge, it is critical to always keep a white hat on and work on using the knowledge and skills acquired to grow personally and in a professional context.<\/p>\n<p>A White Hat thinks and operates as if they were an attacker, and then intervenes as a defender of the information system.<\/p>\n<p>This makes them seem like a perhaps somewhat controversial professional figure, for although their actions are dictated by good principles and aimed at general security, their work often seems to shade over into \u00abillegal\u00bb activity in some operational contexts.<\/p>\n<p>And as is very often the case, appearances are deceiving. The only thing that does not deceive is knowledge, and quoting the ancient philosopher Lao Tzu:<\/p>\n<p>\u00abKnowledge is a treasure, but practice is the key to it.\u00bb<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.lpi.org\/blog\/2024\/01\/19\/cybersecurity-top-and-bottom-of-it\/\">&lt;&lt; Read the previous part of this series<\/a>\u00a0| <a href=\"https:\/\/www.lpi.org\/blog\/2024\/05\/08\/a-crash-course-in-cryptography\/\">Read the next part of this series &gt;&gt;<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>If you want to learn more about cybersecurity and how to protect your data and reputation, take a look at <a href=\"https:\/\/www.lpi.org\/our-certifications\/security-essentials-overview\/\">Linux Professional Institute Security Essentials<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Over the past 10 to 15 years, technology adoption has virtually exploded, and staying ahead of the curve has become increasingly difficult\u2014for companies as well as individual experts. But it is not just the chase for continued innovation that grips &#8230; <a href=\"https:\/\/www.lpi.org\/es\/blog\/2024\/03\/21\/cybersecurity-essentials-concepts\/\" class=\"button-link\">Leer m\u00e1s<\/a><\/p>\n","protected":false},"author":34,"featured_media":21515,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[50],"country":[159],"language":[360],"ppma_author":[515],"class_list":["post-21514","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-europe","country-italy","language-english-fr"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cybersecurity: Essential(s) Concepts - Linux Professional Institute (LPI)<\/title>\n<meta name=\"description\" content=\"With the increase in available technology, security threats have also increased. Learn more about cybersecurity and its principles.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.lpi.org\/es\/blog\/2024\/03\/21\/cybersecurity-essentials-concepts\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity: Essential(s) Concepts\" \/>\n<meta property=\"og:description\" content=\"With the increase in available technology, security threats have also increased. Learn more about cybersecurity and its principles.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.lpi.org\/es\/blog\/2024\/03\/21\/cybersecurity-essentials-concepts\/\" \/>\n<meta property=\"og:site_name\" content=\"Linux Professional Institute (LPI)\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/LPIConnect\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-21T15:23:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-08T15:01:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.lpi.org\/wp-content\/uploads\/2024\/03\/article-Simo-Bertulli_Security-Essentials-Series-EP2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"994\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Simone Bertulli\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lpiconnect\" \/>\n<meta name=\"twitter:site\" content=\"@lpiconnect\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Simone Bertulli\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/blog\\\/2024\\\/03\\\/21\\\/cybersecurity-essentials-concepts\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/blog\\\/2024\\\/03\\\/21\\\/cybersecurity-essentials-concepts\\\/\"},\"author\":{\"name\":\"Simone Bertulli\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/#\\\/schema\\\/person\\\/3a18cdc7284afcf4c46c2552e71e7241\"},\"headline\":\"Cybersecurity: Essential(s) Concepts\",\"datePublished\":\"2024-03-21T15:23:25+00:00\",\"dateModified\":\"2024-05-08T15:01:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/blog\\\/2024\\\/03\\\/21\\\/cybersecurity-essentials-concepts\\\/\"},\"wordCount\":1080,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/blog\\\/2024\\\/03\\\/21\\\/cybersecurity-essentials-concepts\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/article-Simo-Bertulli_Security-Essentials-Series-EP2.jpg\",\"articleSection\":[\"Europe\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.lpi.org\\\/es\\\/blog\\\/2024\\\/03\\\/21\\\/cybersecurity-essentials-concepts\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/blog\\\/2024\\\/03\\\/21\\\/cybersecurity-essentials-concepts\\\/\",\"url\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/blog\\\/2024\\\/03\\\/21\\\/cybersecurity-essentials-concepts\\\/\",\"name\":\"Cybersecurity: Essential(s) Concepts - Linux Professional Institute (LPI)\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/blog\\\/2024\\\/03\\\/21\\\/cybersecurity-essentials-concepts\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/blog\\\/2024\\\/03\\\/21\\\/cybersecurity-essentials-concepts\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/article-Simo-Bertulli_Security-Essentials-Series-EP2.jpg\",\"datePublished\":\"2024-03-21T15:23:25+00:00\",\"dateModified\":\"2024-05-08T15:01:05+00:00\",\"description\":\"With the increase in available technology, security threats have also increased. Learn more about cybersecurity and its principles.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/blog\\\/2024\\\/03\\\/21\\\/cybersecurity-essentials-concepts\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.lpi.org\\\/es\\\/blog\\\/2024\\\/03\\\/21\\\/cybersecurity-essentials-concepts\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/blog\\\/2024\\\/03\\\/21\\\/cybersecurity-essentials-concepts\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/article-Simo-Bertulli_Security-Essentials-Series-EP2.jpg\",\"contentUrl\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/article-Simo-Bertulli_Security-Essentials-Series-EP2.jpg\",\"width\":1440,\"height\":994,\"caption\":\"Cybersecurity: Essential(s) Concepts by Simone \\\"Simo\\\" Bertulli - Images with the author and the LPI Security Essentials Certificate logo\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/blog\\\/2024\\\/03\\\/21\\\/cybersecurity-essentials-concepts\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity: Essential(s) Concepts\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/\",\"name\":\"Linux Professional Institute (LPI)\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/#organization\",\"name\":\"Linux Professional Institute (LPI)\",\"url\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/logo.png\",\"contentUrl\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/logo.png\",\"width\":496,\"height\":175,\"caption\":\"Linux Professional Institute (LPI)\"},\"image\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/LPIConnect\",\"https:\\\/\\\/x.com\\\/lpiconnect\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/35136\",\"https:\\\/\\\/www.instagram.com\\\/lpi_org\\\/\",\"https:\\\/\\\/fosstodon.org\\\/@LPI\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/#\\\/schema\\\/person\\\/3a18cdc7284afcf4c46c2552e71e7241\",\"name\":\"Simone Bertulli\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/picture-1286-1612199480-96x96.pnga6b459de06d985945d89776ec3f0216c\",\"url\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/picture-1286-1612199480-96x96.png\",\"contentUrl\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/picture-1286-1612199480-96x96.png\",\"caption\":\"Simone Bertulli\"},\"description\":\"Simone \\\"Simo\\\" Bertulli is a Cyber Security Expert and a Linux Enterprise Specialist; he started working on Linux systems since 2012, then extending his interest to the whole open source world, also creating a community in the Italian reality. Discovering the potential of open source software and the new opportunities they can create in the workplace is a stimulus for this passion, which brings with it the sustainability of technical solutions and professional skills. In the Cyber Security field he works in a SOC and has collaborated with the Packt publisher on the technical reviews of some video courses about blue team activities. In his spare time he takes technical certifications on various IT topics (\\\"never stop learning\\\" is his motto) and he likes to experiment with new technologies about security and virtualization for SOHO &amp; Enterprise environments.\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity: Essential(s) Concepts - Linux Professional Institute (LPI)","description":"With the increase in available technology, security threats have also increased. Learn more about cybersecurity and its principles.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.lpi.org\/es\/blog\/2024\/03\/21\/cybersecurity-essentials-concepts\/","og_locale":"es_ES","og_type":"article","og_title":"Cybersecurity: Essential(s) Concepts","og_description":"With the increase in available technology, security threats have also increased. Learn more about cybersecurity and its principles.","og_url":"https:\/\/www.lpi.org\/es\/blog\/2024\/03\/21\/cybersecurity-essentials-concepts\/","og_site_name":"Linux Professional Institute (LPI)","article_publisher":"https:\/\/www.facebook.com\/LPIConnect","article_published_time":"2024-03-21T15:23:25+00:00","article_modified_time":"2024-05-08T15:01:05+00:00","og_image":[{"width":1440,"height":994,"url":"https:\/\/www.lpi.org\/wp-content\/uploads\/2024\/03\/article-Simo-Bertulli_Security-Essentials-Series-EP2.jpg","type":"image\/jpeg"}],"author":"Simone Bertulli","twitter_card":"summary_large_image","twitter_creator":"@lpiconnect","twitter_site":"@lpiconnect","twitter_misc":{"Escrito por":"Simone Bertulli","Tiempo de lectura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.lpi.org\/es\/blog\/2024\/03\/21\/cybersecurity-essentials-concepts\/#article","isPartOf":{"@id":"https:\/\/www.lpi.org\/es\/blog\/2024\/03\/21\/cybersecurity-essentials-concepts\/"},"author":{"name":"Simone Bertulli","@id":"https:\/\/www.lpi.org\/es\/#\/schema\/person\/3a18cdc7284afcf4c46c2552e71e7241"},"headline":"Cybersecurity: Essential(s) Concepts","datePublished":"2024-03-21T15:23:25+00:00","dateModified":"2024-05-08T15:01:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.lpi.org\/es\/blog\/2024\/03\/21\/cybersecurity-essentials-concepts\/"},"wordCount":1080,"commentCount":0,"publisher":{"@id":"https:\/\/www.lpi.org\/es\/#organization"},"image":{"@id":"https:\/\/www.lpi.org\/es\/blog\/2024\/03\/21\/cybersecurity-essentials-concepts\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lpi.org\/wp-content\/uploads\/2024\/03\/article-Simo-Bertulli_Security-Essentials-Series-EP2.jpg","articleSection":["Europe"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.lpi.org\/es\/blog\/2024\/03\/21\/cybersecurity-essentials-concepts\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.lpi.org\/es\/blog\/2024\/03\/21\/cybersecurity-essentials-concepts\/","url":"https:\/\/www.lpi.org\/es\/blog\/2024\/03\/21\/cybersecurity-essentials-concepts\/","name":"Cybersecurity: Essential(s) Concepts - Linux Professional Institute (LPI)","isPartOf":{"@id":"https:\/\/www.lpi.org\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.lpi.org\/es\/blog\/2024\/03\/21\/cybersecurity-essentials-concepts\/#primaryimage"},"image":{"@id":"https:\/\/www.lpi.org\/es\/blog\/2024\/03\/21\/cybersecurity-essentials-concepts\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lpi.org\/wp-content\/uploads\/2024\/03\/article-Simo-Bertulli_Security-Essentials-Series-EP2.jpg","datePublished":"2024-03-21T15:23:25+00:00","dateModified":"2024-05-08T15:01:05+00:00","description":"With the increase in available technology, security threats have also increased. Learn more about cybersecurity and its principles.","breadcrumb":{"@id":"https:\/\/www.lpi.org\/es\/blog\/2024\/03\/21\/cybersecurity-essentials-concepts\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.lpi.org\/es\/blog\/2024\/03\/21\/cybersecurity-essentials-concepts\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.lpi.org\/es\/blog\/2024\/03\/21\/cybersecurity-essentials-concepts\/#primaryimage","url":"https:\/\/www.lpi.org\/wp-content\/uploads\/2024\/03\/article-Simo-Bertulli_Security-Essentials-Series-EP2.jpg","contentUrl":"https:\/\/www.lpi.org\/wp-content\/uploads\/2024\/03\/article-Simo-Bertulli_Security-Essentials-Series-EP2.jpg","width":1440,"height":994,"caption":"Cybersecurity: Essential(s) Concepts by Simone \"Simo\" Bertulli - Images with the author and the LPI Security Essentials Certificate logo"},{"@type":"BreadcrumbList","@id":"https:\/\/www.lpi.org\/es\/blog\/2024\/03\/21\/cybersecurity-essentials-concepts\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.lpi.org\/es\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity: Essential(s) Concepts"}]},{"@type":"WebSite","@id":"https:\/\/www.lpi.org\/es\/#website","url":"https:\/\/www.lpi.org\/es\/","name":"Linux Professional Institute (LPI)","description":"","publisher":{"@id":"https:\/\/www.lpi.org\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.lpi.org\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.lpi.org\/es\/#organization","name":"Linux Professional Institute (LPI)","url":"https:\/\/www.lpi.org\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.lpi.org\/es\/#\/schema\/logo\/image\/","url":"https:\/\/www.lpi.org\/wp-content\/uploads\/2023\/04\/logo.png","contentUrl":"https:\/\/www.lpi.org\/wp-content\/uploads\/2023\/04\/logo.png","width":496,"height":175,"caption":"Linux Professional Institute (LPI)"},"image":{"@id":"https:\/\/www.lpi.org\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/LPIConnect","https:\/\/x.com\/lpiconnect","https:\/\/www.linkedin.com\/company\/35136","https:\/\/www.instagram.com\/lpi_org\/","https:\/\/fosstodon.org\/@LPI"]},{"@type":"Person","@id":"https:\/\/www.lpi.org\/es\/#\/schema\/person\/3a18cdc7284afcf4c46c2552e71e7241","name":"Simone Bertulli","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.lpi.org\/wp-content\/uploads\/2023\/05\/picture-1286-1612199480-96x96.pnga6b459de06d985945d89776ec3f0216c","url":"https:\/\/www.lpi.org\/wp-content\/uploads\/2023\/05\/picture-1286-1612199480-96x96.png","contentUrl":"https:\/\/www.lpi.org\/wp-content\/uploads\/2023\/05\/picture-1286-1612199480-96x96.png","caption":"Simone Bertulli"},"description":"Simone \"Simo\" Bertulli is a Cyber Security Expert and a Linux Enterprise Specialist; he started working on Linux systems since 2012, then extending his interest to the whole open source world, also creating a community in the Italian reality. Discovering the potential of open source software and the new opportunities they can create in the workplace is a stimulus for this passion, which brings with it the sustainability of technical solutions and professional skills. In the Cyber Security field he works in a SOC and has collaborated with the Packt publisher on the technical reviews of some video courses about blue team activities. In his spare time he takes technical certifications on various IT topics (\"never stop learning\" is his motto) and he likes to experiment with new technologies about security and virtualization for SOHO &amp; Enterprise environments."}]}},"views":1115,"authors":[{"term_id":515,"user_id":34,"is_guest":0,"slug":"sbertuilliexample-com","display_name":"Simone Bertulli","avatar_url":"https:\/\/www.lpi.org\/wp-content\/uploads\/2023\/05\/picture-1286-1612199480-96x96.png","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.lpi.org\/es\/wp-json\/wp\/v2\/posts\/21514","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.lpi.org\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lpi.org\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lpi.org\/es\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lpi.org\/es\/wp-json\/wp\/v2\/comments?post=21514"}],"version-history":[{"count":3,"href":"https:\/\/www.lpi.org\/es\/wp-json\/wp\/v2\/posts\/21514\/revisions"}],"predecessor-version":[{"id":22791,"href":"https:\/\/www.lpi.org\/es\/wp-json\/wp\/v2\/posts\/21514\/revisions\/22791"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lpi.org\/es\/wp-json\/wp\/v2\/media\/21515"}],"wp:attachment":[{"href":"https:\/\/www.lpi.org\/es\/wp-json\/wp\/v2\/media?parent=21514"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lpi.org\/es\/wp-json\/wp\/v2\/categories?post=21514"},{"taxonomy":"country","embeddable":true,"href":"https:\/\/www.lpi.org\/es\/wp-json\/wp\/v2\/country?post=21514"},{"taxonomy":"language","embeddable":true,"href":"https:\/\/www.lpi.org\/es\/wp-json\/wp\/v2\/language?post=21514"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.lpi.org\/es\/wp-json\/wp\/v2\/ppma_author?post=21514"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}