{"id":1914,"date":"2024-03-07T06:17:33","date_gmt":"2024-03-07T05:17:33","guid":{"rendered":"https:\/\/ciberseguridad.situada.online\/?page_id=1914"},"modified":"2024-04-27T08:18:40","modified_gmt":"2024-04-27T06:18:40","slug":"glosario","status":"publish","type":"page","link":"https:\/\/ciberseguridad.situada.online\/en\/proyecto\/glosario\/","title":{"rendered":"Resource 1: Glossary"},"content":{"rendered":"<div class=\"wp-block-uagb-container uagb-block-3ad17e27 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-8a1eebc0\"><h1 class=\"uagb-heading-text\">Resource 1: Glossary<\/h1><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-f8ec2bd3 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-info-box uagb-block-4220334d uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><\/div><p class=\"uagb-ifb-desc\">The glossary is a fundamental tool in this study. It provides a comprehensive list of specific cybersecurity terms used in the project. Clear definitions help users understand the technical language associated with open-source SIEM implementation. By providing a user-friendly reference, the glossary facilitates effective communication between working communities and ensures a common understanding of key concepts in the cybersecurity domain.<\/p><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-b59ff7ed alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-image uagb-block-f5222877 wp-block-uagb-image--layout-default wp-block-uagb-image--effect-static wp-block-uagb-image--align-none\"><figure class=\"wp-block-uagb-image__figure\"><img decoding=\"async\" srcset=\"https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/ciberseguridad.situada.online2.png 1414w, https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/ciberseguridad.situada.online2-212x300.png 212w, https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/ciberseguridad.situada.online2-724x1024.png 724w, https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/ciberseguridad.situada.online2-768x1086.png 768w, https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/ciberseguridad.situada.online2-1086x1536.png 1086w, https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/ciberseguridad.situada.online2-8x12.png 8w\" sizes=\"(max-width: 480px) 150px\" src=\"https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/ciberseguridad.situada.online2.png\" alt=\"\" class=\"uag-image-2115\" width=\"733\" height=\"1038\" title=\"portada_recurso1\" loading=\"lazy\"\/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-75e5dba5\">\n<div class=\"wp-block-uagb-buttons uagb-buttons__outer-wrap uagb-btn__default-btn uagb-btn-tablet__default-btn uagb-btn-mobile__default-btn uagb-block-06be232d\"><div class=\"uagb-buttons__wrap uagb-buttons-layout-wrap\">\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-53aba445 wp-block-button\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" aria-label=\"\" href=\"https:\/\/drive.google.com\/file\/d\/1XMYpobffdViPcF61s7MjhuFUpx_d_Z36\/view?usp=drive_link\" rel=\"follow noopener\" target=\"_blank\"><div class=\"uagb-button__link\">Descarga en Espa\u00f1ol<\/div><\/a><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-buttons uagb-buttons__outer-wrap uagb-btn__default-btn uagb-btn-tablet__default-btn uagb-btn-mobile__default-btn uagb-block-bbde84e2\"><div class=\"uagb-buttons__wrap uagb-buttons-layout-wrap\">\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-0a45d0e0 wp-block-button\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" aria-label=\"\" href=\"https:\/\/drive.google.com\/file\/d\/1436RSZcfU0Ti7MGf_RSWZJGdSoDumG-p\/view?usp=drive_link\" rel=\"follow noopener\" target=\"_blank\"><div class=\"uagb-button__link\">Download in English<\/div><\/a><\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-separator uagb-block-b9ead133\"><div class=\"wp-block-uagb-separator__inner\" style=\"--my-background-image:url(&quot;data:image\/svg+xml,%3Csvg width='16' height='16' viewBox='0 0 16 16' fill='none' xmlns='http:\/\/www.w3.org\/2000\/svg'%3E%3Cpath d='M6.29312 16.9999L17 6.29302M14.2931 16.9999L17 14.293M-0.707031 15.9999L16.0002 -0.707153M8.00017 -0.707153L-0.706882 7.9999' stroke='black'\/%3E%3C\/svg%3E&quot;)\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-879b59fa alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-image aligncenter uagb-block-1677c98e wp-block-uagb-image--layout-default wp-block-uagb-image--effect-static wp-block-uagb-image--align-center\"><figure class=\"wp-block-uagb-image__figure\"><img decoding=\"async\" srcset=\"https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/cybersecurity_resource1.situada.online2.png 1587w, https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/cybersecurity_resource1.situada.online2-212x300.png 212w, https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/cybersecurity_resource1.situada.online2-724x1024.png 724w, https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/cybersecurity_resource1.situada.online2-768x1086.png 768w, https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/cybersecurity_resource1.situada.online2-1086x1536.png 1086w, https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/cybersecurity_resource1.situada.online2-1448x2048.png 1448w, https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/cybersecurity_resource1.situada.online2-8x12.png 8w\" sizes=\"(max-width: 480px) 150px\" src=\"https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/cybersecurity_resource1.situada.online2.png\" alt=\"\" class=\"uag-image-2097\" width=\"775\" height=\"720\" title=\"ciberseguridad_recurso1.situada.online\" loading=\"lazy\"\/><\/figure><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-separator uagb-block-39b1a2e3\"><div class=\"wp-block-uagb-separator__inner\" style=\"--my-background-image:url(&quot;data:image\/svg+xml,%3Csvg width='16' height='16' viewBox='0 0 16 16' fill='none' xmlns='http:\/\/www.w3.org\/2000\/svg'%3E%3Cpath d='M6.29312 16.9999L17 6.29302M14.2931 16.9999L17 14.293M-0.707031 15.9999L16.0002 -0.707153M8.00017 -0.707153L-0.706882 7.9999' stroke='black'\/%3E%3C\/svg%3E&quot;)\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-31af2d26 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-info-box uagb-block-82b50b32 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\"><strong>Reference<\/strong><\/h3><\/div><p class=\"uagb-ifb-desc\">Trabajo de Fin de M\u00e1ster (TFM) del Master en Ciberseguridad, titulado \u201cMetodolog\u00eda para la implementaci\u00f3n de un SIEM open-source robusto en organizaciones de la Administraci\u00f3n P\u00fablica\u00bb.<\/p><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-separator uagb-block-9bf3dc1b\"><div class=\"wp-block-uagb-separator__inner\" style=\"--my-background-image:\"><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Resource 1: Glossary<\/p>","protected":false},"author":1,"featured_media":0,"parent":1324,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"full-width-container","site-content-style":"unboxed","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"enabled","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"trp-custom-language-flag":false},"uagb_author_info":{"display_name":"ximenamar04","author_link":"https:\/\/ciberseguridad.situada.online\/en\/author\/ximenamar04\/"},"uagb_comment_info":0,"uagb_excerpt":"Recurso 1: Glosario","_links":{"self":[{"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/pages\/1914"}],"collection":[{"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/comments?post=1914"}],"version-history":[{"count":15,"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/pages\/1914\/revisions"}],"predecessor-version":[{"id":2150,"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/pages\/1914\/revisions\/2150"}],"up":[{"embeddable":true,"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/pages\/1324"}],"wp:attachment":[{"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/media?parent=1914"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}