{"id":390,"date":"2025-01-08T11:18:22","date_gmt":"2025-01-08T11:18:22","guid":{"rendered":"https:\/\/www.nimsistemas.es\/?page_id=390"},"modified":"2025-02-17T17:18:25","modified_gmt":"2025-02-17T17:18:25","slug":"analisis-forense-informatico","status":"publish","type":"page","link":"https:\/\/www.nimsistemas.es\/?page_id=390","title":{"rendered":"An\u00e1lisis Forense Inform\u00e1tico"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-r2nhvpap alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-info-box uagb-block-dx8xdkt0 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h2 class=\"uagb-ifb-title\">Directrices y T\u00e9cnicas de seguridad<\/h2><\/div><p class=\"uagb-ifb-desc\">Tras un ataque, entienda lo sucedido y aproveche para fortalecer sus sistemas gracias a nuestras t\u00e9cnicas y herramientas de an\u00e1lisis para poder extraer la informaci\u00f3n de cualquier soporte sin llegar a alterar su estado.<\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-jfxwp0xe\">\n<div class=\"wp-block-uagb-container uagb-block-fzolyhkh\">\n<div class=\"wp-block-uagb-image alignleft uagb-block-nr2vlklk wp-block-uagb-image--layout-default wp-block-uagb-image--effect-static wp-block-uagb-image--align-left\"><figure class=\"wp-block-uagb-image__figure\"><img loading=\"lazy\" decoding=\"async\" srcset=\"https:\/\/www.nimsistemas.es\/wp-content\/uploads\/2025\/02\/estudio-ciberseguridad.jpg ,https:\/\/www.nimsistemas.es\/wp-content\/uploads\/2025\/02\/estudio-ciberseguridad.jpg 780w, https:\/\/www.nimsistemas.es\/wp-content\/uploads\/2025\/02\/estudio-ciberseguridad.jpg 360w\" sizes=\"auto, (max-width: 480px) 150px\" src=\"https:\/\/www.nimsistemas.es\/wp-content\/uploads\/2025\/02\/estudio-ciberseguridad.jpg\" alt=\"\" class=\"uag-image-704\" width=\"600\" height=\"450\" title=\"estudio ciberseguridad\" loading=\"lazy\" role=\"img\"\/><\/figure><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-nlnqsws7\">\n<div class=\"wp-block-uagb-info-box uagb-block-g4vzur8t uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><p class=\"uagb-ifb-title-prefix\">01<\/p><h3 class=\"uagb-ifb-title\">Estudio e identificaci\u00f3n<\/h3><\/div><p class=\"uagb-ifb-desc\">Estudiamos la escena y aseguramos las evidencias mediante clonaciones para que no puedan ser alteradas, inventariando los dispositivos y sistemas a analizar.<\/p><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-zqwh2jzh\">\n<div class=\"wp-block-uagb-info-box uagb-block-0mdchqqj uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><p class=\"uagb-ifb-title-prefix\">02<\/p><h3 class=\"uagb-ifb-title\">Datos<\/h3><\/div><p class=\"uagb-ifb-desc\">Recopilar, preservar y analizar de la informaci\u00f3n y cualquier rastro en el sistema de ficheros, logs, registros, accesos para descubrir el origen del delito.<\/p><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-5vfbnqgz\">\n<div class=\"wp-block-uagb-image alignleft uagb-block-meplzljd wp-block-uagb-image--layout-default wp-block-uagb-image--effect-static wp-block-uagb-image--align-left\"><figure class=\"wp-block-uagb-image__figure\"><img loading=\"lazy\" decoding=\"async\" srcset=\"https:\/\/www.nimsistemas.es\/wp-content\/uploads\/2025\/02\/ciberseguridad.jpg ,https:\/\/www.nimsistemas.es\/wp-content\/uploads\/2025\/02\/ciberseguridad.jpg 780w, https:\/\/www.nimsistemas.es\/wp-content\/uploads\/2025\/02\/ciberseguridad.jpg 360w\" sizes=\"auto, (max-width: 480px) 150px\" src=\"https:\/\/www.nimsistemas.es\/wp-content\/uploads\/2025\/02\/ciberseguridad.jpg\" alt=\"\" class=\"uag-image-670\" width=\"600\" height=\"450\" title=\"ciberseguridad\" loading=\"lazy\" role=\"img\"\/><\/figure><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-zmdvdtpa\">\n<div class=\"wp-block-uagb-image alignleft uagb-block-imxhtkrj wp-block-uagb-image--layout-default wp-block-uagb-image--effect-static wp-block-uagb-image--align-left\"><figure class=\"wp-block-uagb-image__figure\"><img loading=\"lazy\" decoding=\"async\" srcset=\"https:\/\/www.nimsistemas.es\/wp-content\/uploads\/2025\/02\/Cuales-son-las-4-areas-de-la-seguridad-informatic.webp ,https:\/\/www.nimsistemas.es\/wp-content\/uploads\/2025\/02\/Cuales-son-las-4-areas-de-la-seguridad-informatic.webp 780w, https:\/\/www.nimsistemas.es\/wp-content\/uploads\/2025\/02\/Cuales-son-las-4-areas-de-la-seguridad-informatic.webp 360w\" sizes=\"auto, (max-width: 480px) 150px\" src=\"https:\/\/www.nimsistemas.es\/wp-content\/uploads\/2025\/02\/Cuales-son-las-4-areas-de-la-seguridad-informatic.webp\" alt=\"\" class=\"uag-image-702\" width=\"600\" height=\"450\" title=\"Cuales-son-las-4-areas-de-la-seguridad-informatic\" loading=\"lazy\" role=\"img\"\/><\/figure><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-lweoymh7\">\n<div class=\"wp-block-uagb-info-box uagb-block-8k4lb8zw uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><p class=\"uagb-ifb-title-prefix\">03<\/p><h3 class=\"uagb-ifb-title\">Informe final<\/h3><\/div><p class=\"uagb-ifb-desc\">Presentando un trabajo detallado con conclusiones e implementando medidas correctoras para mejorar la seguridad del negocio.<\/p><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","footnotes":""},"class_list":["post-390","page","type-page","status-publish","hentry"],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"NIMSISTEMAS","author_link":"https:\/\/www.nimsistemas.es\/?author=2"},"uagb_comment_info":0,"uagb_excerpt":null,"_links":{"self":[{"href":"https:\/\/www.nimsistemas.es\/index.php?rest_route=\/wp\/v2\/pages\/390","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nimsistemas.es\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.nimsistemas.es\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.nimsistemas.es\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nimsistemas.es\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=390"}],"version-history":[{"count":9,"href":"https:\/\/www.nimsistemas.es\/index.php?rest_route=\/wp\/v2\/pages\/390\/revisions"}],"predecessor-version":[{"id":705,"href":"https:\/\/www.nimsistemas.es\/index.php?rest_route=\/wp\/v2\/pages\/390\/revisions\/705"}],"wp:attachment":[{"href":"https:\/\/www.nimsistemas.es\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=390"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}