{"id":3441,"date":"2020-09-21T22:07:52","date_gmt":"2020-09-21T22:07:52","guid":{"rendered":"http:\/\/soporteti.org\/worpress\/?p=3441"},"modified":"2020-10-19T17:02:33","modified_gmt":"2020-10-19T17:02:33","slug":"estas-son-las-diferencias-entre-vulnerabilidad-y-amenaza","status":"publish","type":"post","link":"https:\/\/webssti.lcred.net\/en\/2020\/09\/21\/estas-son-las-diferencias-entre-vulnerabilidad-y-amenaza\/","title":{"rendered":"These are the differences between vulnerability and threat."},"content":{"rendered":"<p>Although there are many people that use them as synonyms, in reality they are two different things, related but different.<\/p>\n<p style=\"text-align: left;\">Published in Computerhoy.com by Sandra Arteaga<\/p>\n<p>Main illustration <a href=\"https:\/\/pixabay.com\/es\/users\/geralt-9301\/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=3327240\">Gerd Altmann<\/a> in <a href=\"https:\/\/pixabay.com\/es\/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=3327240\">Pixabay<\/a><\/p>\n<p>Today, with the news related to\u00a0<strong>cyber-security<\/strong>\u00a0in all the covers, we're more than accustomed to listen to or read\u00a0<strong>the concepts threat or vulnerability<\/strong>Although there are many people that use them as synonyms, in reality they are two different things, related but different.<\/p>\n<p>Explained in a fast way, in short,\u00a0<span class=\"bold\">the vulnerabilities are the conditions and characteristics of the systems that make them susceptible to the threats.<\/span>Therefore, it is necessary that there be a vulnerability for which there is a threat. However, we are going to be defined in detail for an understanding of both concepts.<\/p>\n<h4 class=\"visible-first down\">What is vulnerability<\/h4>\n<p>To understand the\u00a0<strong>difference between vulnerability and threat<\/strong>, in the first place we have a clear definition of each one of them.\u00a0<strong>Vulnerability computer<\/strong>\u00a0is this a fault or weakness in the information system that puts in danger the security, and therefore compromise the integrity, availability or confidentiality of the data. For this reason, it is of vital importance to find these holes as soon as possible, so as to be able to find solutions quickly.<\/p>\n<h4 class=\"visible visible-first\">What is a threat<\/h4>\n<p>A threat refers to the action that exploits a vulnerability<span class=\"bold\">\u00a0to compromise the security of an information system<\/span>It can come from malicious attacks, events, physical or neglect, and institutional decisions, and can be internal or external to the talk about organizations.<\/p>\n<p>Sources of more common threats are the following:<\/p>\n<ul>\n<li class=\"firstItem\"><strong>Malware:<\/strong>\u00a0it gives attackers many opportunities to exploit the computer, whether it's spying on personal and private data or carrying out any malicious action with the goal of hurting the victim.<\/li>\n<li><strong>Social engineering\u00a0<\/strong>: it is the employment of techniques of persuasion to trick users with malicious intent, such as theft of information, and then carry out other attacks or to sell data on the black market.<\/li>\n<li><strong>APT or advanced persistent threats<\/strong>: they are coordinated attacks that apply social engineering, targeted against an organization with the goal of stealing or filter information without being detected.<\/li>\n<li><strong>Botnets<\/strong>a network of infected computers controlled by the attackers that are used in other most sophisticated attacks, such as denial of service attacks or ddos.<\/li>\n<li class=\"lastItem\"><strong>Cloud services: cloud services<\/strong>:  it is also a common source of threats for computers.<\/li>\n<\/ul>\n<h4 class=\"visible visible-first\">Another factor to take into account: the risk.<\/h4>\n<p>Risk\u00a0<span class=\"bold\">must also be taken into account in this operation<\/span>. It is the possibility of a security issue, and it materializes in the event of loss or damage. to measure it, it is necessary to determine the probability that a threat exploits a vulnerability and causes harm or impact. In function of the values obtained is set to a level of risk or the other.<\/p>\n<p>It is very important to try\u00a0<span class=\"bold\">to quantify the risk and put the appropriate measures in order to reduce,\u00a0<\/span>as in this way they decrease the chances of occurrence of a security problem.<\/p>","protected":false},"excerpt":{"rendered":"<p>Aunque hay muchas personas que los utilizan como sin\u00f3nimos, en realidad son cosas distintas, relacionadas pero diferentes. Publicado en Computerhoy.com por Sandra Arteaga Imagen de [&hellip;]<\/p>","protected":false},"author":1,"featured_media":3442,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[138],"tags":[139,140],"class_list":["post-3441","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tecnologia","tag-ataques-ciberneticos","tag-seguridad"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Estas son las diferencias entre vulnerabilidad y amenaza | SSTI<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/webssti.lcred.net\/en\/2020\/09\/21\/estas-son-las-diferencias-entre-vulnerabilidad-y-amenaza\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Estas son las diferencias entre vulnerabilidad y amenaza | SSTI\" \/>\n<meta property=\"og:description\" content=\"Aunque hay muchas personas que los utilizan como sin\u00f3nimos, en realidad son cosas distintas, relacionadas pero diferentes. Publicado en Computerhoy.com por Sandra Arteaga Imagen de [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/webssti.lcred.net\/en\/2020\/09\/21\/estas-son-las-diferencias-entre-vulnerabilidad-y-amenaza\/\" \/>\n<meta property=\"og:site_name\" content=\"SSTI\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-21T22:07:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-19T17:02:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/webssti.lcred.net\/wp-content\/uploads\/2020\/09\/cyber800.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"490\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"adminGRW\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"adminGRW\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/webssti.lcred.net\/en\/2020\/09\/21\/estas-son-las-diferencias-entre-vulnerabilidad-y-amenaza\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/webssti.lcred.net\/en\/2020\/09\/21\/estas-son-las-diferencias-entre-vulnerabilidad-y-amenaza\/\"},\"author\":{\"name\":\"adminGRW\",\"@id\":\"https:\/\/webssti.lcred.net\/#\/schema\/person\/41a0bc95ca56969e7d5ba619b49a0448\"},\"headline\":\"Estas son las diferencias entre vulnerabilidad y amenaza\",\"datePublished\":\"2020-09-21T22:07:52+00:00\",\"dateModified\":\"2020-10-19T17:02:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/webssti.lcred.net\/en\/2020\/09\/21\/estas-son-las-diferencias-entre-vulnerabilidad-y-amenaza\/\"},\"wordCount\":555,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/webssti.lcred.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/webssti.lcred.net\/en\/2020\/09\/21\/estas-son-las-diferencias-entre-vulnerabilidad-y-amenaza\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/webssti.lcred.net\/wp-content\/uploads\/2020\/09\/cyber800.jpg\",\"keywords\":[\"Ataques cib\u00e9rneticos\",\"Seguridad\"],\"articleSection\":[\"Tecnolog\u00eda\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/webssti.lcred.net\/en\/2020\/09\/21\/estas-son-las-diferencias-entre-vulnerabilidad-y-amenaza\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/webssti.lcred.net\/en\/2020\/09\/21\/estas-son-las-diferencias-entre-vulnerabilidad-y-amenaza\/\",\"url\":\"https:\/\/webssti.lcred.net\/en\/2020\/09\/21\/estas-son-las-diferencias-entre-vulnerabilidad-y-amenaza\/\",\"name\":\"Estas son las diferencias entre vulnerabilidad y amenaza | SSTI\",\"isPartOf\":{\"@id\":\"https:\/\/webssti.lcred.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/webssti.lcred.net\/en\/2020\/09\/21\/estas-son-las-diferencias-entre-vulnerabilidad-y-amenaza\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/webssti.lcred.net\/en\/2020\/09\/21\/estas-son-las-diferencias-entre-vulnerabilidad-y-amenaza\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/webssti.lcred.net\/wp-content\/uploads\/2020\/09\/cyber800.jpg\",\"datePublished\":\"2020-09-21T22:07:52+00:00\",\"dateModified\":\"2020-10-19T17:02:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/webssti.lcred.net\/en\/2020\/09\/21\/estas-son-las-diferencias-entre-vulnerabilidad-y-amenaza\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/webssti.lcred.net\/en\/2020\/09\/21\/estas-son-las-diferencias-entre-vulnerabilidad-y-amenaza\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/webssti.lcred.net\/en\/2020\/09\/21\/estas-son-las-diferencias-entre-vulnerabilidad-y-amenaza\/#primaryimage\",\"url\":\"https:\/\/webssti.lcred.net\/wp-content\/uploads\/2020\/09\/cyber800.jpg\",\"contentUrl\":\"https:\/\/webssti.lcred.net\/wp-content\/uploads\/2020\/09\/cyber800.jpg\",\"width\":800,\"height\":490},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/webssti.lcred.net\/en\/2020\/09\/21\/estas-son-las-diferencias-entre-vulnerabilidad-y-amenaza\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\/\/webssti.lcred.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Estas son las diferencias entre vulnerabilidad y amenaza\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/webssti.lcred.net\/#website\",\"url\":\"https:\/\/webssti.lcred.net\/\",\"name\":\"SSTI\",\"description\":\"Contamos con un grupo de expertos\",\"publisher\":{\"@id\":\"https:\/\/webssti.lcred.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/webssti.lcred.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/webssti.lcred.net\/#organization\",\"name\":\"SSTI\",\"url\":\"https:\/\/webssti.lcred.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/webssti.lcred.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/soporteti.org\/wp-content\/uploads\/2020\/09\/logo.png\",\"contentUrl\":\"https:\/\/soporteti.org\/wp-content\/uploads\/2020\/09\/logo.png\",\"width\":171,\"height\":50,\"caption\":\"SSTI\"},\"image\":{\"@id\":\"https:\/\/webssti.lcred.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/webssti.lcred.net\/#\/schema\/person\/41a0bc95ca56969e7d5ba619b49a0448\",\"name\":\"adminGRW\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/webssti.lcred.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5db94e80177208849909cc5cccee6fefa47b09bb58028f02b9ec5428f366e771?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5db94e80177208849909cc5cccee6fefa47b09bb58028f02b9ec5428f366e771?s=96&d=mm&r=g\",\"caption\":\"adminGRW\"},\"sameAs\":[\"https:\/\/soporteti.org\/worpress\"],\"url\":\"https:\/\/webssti.lcred.net\/en\/author\/admingrw\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Estas son las diferencias entre vulnerabilidad y amenaza | SSTI","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/webssti.lcred.net\/en\/2020\/09\/21\/estas-son-las-diferencias-entre-vulnerabilidad-y-amenaza\/","og_locale":"en_US","og_type":"article","og_title":"Estas son las diferencias entre vulnerabilidad y amenaza | SSTI","og_description":"Aunque hay muchas personas que los utilizan como sin\u00f3nimos, en realidad son cosas distintas, relacionadas pero diferentes. Publicado en Computerhoy.com por Sandra Arteaga Imagen de [&hellip;]","og_url":"https:\/\/webssti.lcred.net\/en\/2020\/09\/21\/estas-son-las-diferencias-entre-vulnerabilidad-y-amenaza\/","og_site_name":"SSTI","article_published_time":"2020-09-21T22:07:52+00:00","article_modified_time":"2020-10-19T17:02:33+00:00","og_image":[{"width":800,"height":490,"url":"https:\/\/webssti.lcred.net\/wp-content\/uploads\/2020\/09\/cyber800.jpg","type":"image\/jpeg"}],"author":"adminGRW","twitter_card":"summary_large_image","twitter_misc":{"Written by":"adminGRW","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/webssti.lcred.net\/en\/2020\/09\/21\/estas-son-las-diferencias-entre-vulnerabilidad-y-amenaza\/#article","isPartOf":{"@id":"https:\/\/webssti.lcred.net\/en\/2020\/09\/21\/estas-son-las-diferencias-entre-vulnerabilidad-y-amenaza\/"},"author":{"name":"adminGRW","@id":"https:\/\/webssti.lcred.net\/#\/schema\/person\/41a0bc95ca56969e7d5ba619b49a0448"},"headline":"Estas son las diferencias entre vulnerabilidad y amenaza","datePublished":"2020-09-21T22:07:52+00:00","dateModified":"2020-10-19T17:02:33+00:00","mainEntityOfPage":{"@id":"https:\/\/webssti.lcred.net\/en\/2020\/09\/21\/estas-son-las-diferencias-entre-vulnerabilidad-y-amenaza\/"},"wordCount":555,"commentCount":0,"publisher":{"@id":"https:\/\/webssti.lcred.net\/#organization"},"image":{"@id":"https:\/\/webssti.lcred.net\/en\/2020\/09\/21\/estas-son-las-diferencias-entre-vulnerabilidad-y-amenaza\/#primaryimage"},"thumbnailUrl":"https:\/\/webssti.lcred.net\/wp-content\/uploads\/2020\/09\/cyber800.jpg","keywords":["Ataques cib\u00e9rneticos","Seguridad"],"articleSection":["Tecnolog\u00eda"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/webssti.lcred.net\/en\/2020\/09\/21\/estas-son-las-diferencias-entre-vulnerabilidad-y-amenaza\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/webssti.lcred.net\/en\/2020\/09\/21\/estas-son-las-diferencias-entre-vulnerabilidad-y-amenaza\/","url":"https:\/\/webssti.lcred.net\/en\/2020\/09\/21\/estas-son-las-diferencias-entre-vulnerabilidad-y-amenaza\/","name":"Estas son las diferencias entre vulnerabilidad y amenaza | SSTI","isPartOf":{"@id":"https:\/\/webssti.lcred.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/webssti.lcred.net\/en\/2020\/09\/21\/estas-son-las-diferencias-entre-vulnerabilidad-y-amenaza\/#primaryimage"},"image":{"@id":"https:\/\/webssti.lcred.net\/en\/2020\/09\/21\/estas-son-las-diferencias-entre-vulnerabilidad-y-amenaza\/#primaryimage"},"thumbnailUrl":"https:\/\/webssti.lcred.net\/wp-content\/uploads\/2020\/09\/cyber800.jpg","datePublished":"2020-09-21T22:07:52+00:00","dateModified":"2020-10-19T17:02:33+00:00","breadcrumb":{"@id":"https:\/\/webssti.lcred.net\/en\/2020\/09\/21\/estas-son-las-diferencias-entre-vulnerabilidad-y-amenaza\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/webssti.lcred.net\/en\/2020\/09\/21\/estas-son-las-diferencias-entre-vulnerabilidad-y-amenaza\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/webssti.lcred.net\/en\/2020\/09\/21\/estas-son-las-diferencias-entre-vulnerabilidad-y-amenaza\/#primaryimage","url":"https:\/\/webssti.lcred.net\/wp-content\/uploads\/2020\/09\/cyber800.jpg","contentUrl":"https:\/\/webssti.lcred.net\/wp-content\/uploads\/2020\/09\/cyber800.jpg","width":800,"height":490},{"@type":"BreadcrumbList","@id":"https:\/\/webssti.lcred.net\/en\/2020\/09\/21\/estas-son-las-diferencias-entre-vulnerabilidad-y-amenaza\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/webssti.lcred.net\/"},{"@type":"ListItem","position":2,"name":"Estas son las diferencias entre vulnerabilidad y amenaza"}]},{"@type":"WebSite","@id":"https:\/\/webssti.lcred.net\/#website","url":"https:\/\/webssti.lcred.net\/","name":"SSTI","description":"Contamos con un grupo de expertos","publisher":{"@id":"https:\/\/webssti.lcred.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/webssti.lcred.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/webssti.lcred.net\/#organization","name":"SSTI","url":"https:\/\/webssti.lcred.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/webssti.lcred.net\/#\/schema\/logo\/image\/","url":"https:\/\/soporteti.org\/wp-content\/uploads\/2020\/09\/logo.png","contentUrl":"https:\/\/soporteti.org\/wp-content\/uploads\/2020\/09\/logo.png","width":171,"height":50,"caption":"SSTI"},"image":{"@id":"https:\/\/webssti.lcred.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/webssti.lcred.net\/#\/schema\/person\/41a0bc95ca56969e7d5ba619b49a0448","name":"adminGRW","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/webssti.lcred.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5db94e80177208849909cc5cccee6fefa47b09bb58028f02b9ec5428f366e771?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5db94e80177208849909cc5cccee6fefa47b09bb58028f02b9ec5428f366e771?s=96&d=mm&r=g","caption":"adminGRW"},"sameAs":["https:\/\/soporteti.org\/worpress"],"url":"https:\/\/webssti.lcred.net\/en\/author\/admingrw\/"}]}},"_links":{"self":[{"href":"https:\/\/webssti.lcred.net\/en\/wp-json\/wp\/v2\/posts\/3441","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/webssti.lcred.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/webssti.lcred.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/webssti.lcred.net\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/webssti.lcred.net\/en\/wp-json\/wp\/v2\/comments?post=3441"}],"version-history":[{"count":0,"href":"https:\/\/webssti.lcred.net\/en\/wp-json\/wp\/v2\/posts\/3441\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/webssti.lcred.net\/en\/wp-json\/wp\/v2\/media\/3442"}],"wp:attachment":[{"href":"https:\/\/webssti.lcred.net\/en\/wp-json\/wp\/v2\/media?parent=3441"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/webssti.lcred.net\/en\/wp-json\/wp\/v2\/categories?post=3441"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/webssti.lcred.net\/en\/wp-json\/wp\/v2\/tags?post=3441"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}