
{"id":127,"date":"2007-04-05T09:27:47","date_gmt":"2007-04-05T12:27:47","guid":{"rendered":"http:\/\/talsoft.com.ar\/weblog\/?p=127"},"modified":"2007-04-05T09:30:18","modified_gmt":"2007-04-05T12:30:18","slug":"sistema-de-gestion-de-la-seguridad-de-la-informacion","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/sistema-de-gestion-de-la-seguridad-de-la-informacion\/","title":{"rendered":"Sistema de Gesti\u00c3\u00b3n de la Seguridad de la Informaci\u00c3\u00b3n"},"content":{"rendered":"<p><span lang=\"ES-TRAD\">El SGSI (Sistema de Gesti\u00c3\u00b3n de Seguridad de la Informaci\u00c3\u00b3n) es el concepto sobre el que se construye ISO 27001.<\/span><\/p>\n<p class=\"ISO27000-Contenido\"><span lang=\"ES-TRAD\">La gesti\u00c3\u00b3n de la seguridad de la informaci\u00c3\u00b3n debe realizarse mediante un proceso sistem\u00c3\u00a1tico, documentado y conocido por toda la organizaci\u00c3\u00b3n.<\/span><\/p>\n<p class=\"ISO27000-Contenido\"><span lang=\"ES-TRAD\">Este proceso es el que constituye un SGSI, que podr\u00c3\u00ada considerarse, por analog\u00c3\u00ada con una norma tan conocida como <\/span><span lang=\"ES-TRAD\">la ISO<\/span><span lang=\"ES-TRAD\"> 9001, como el sistema de calidad para la seguridad de la informaci\u00c3\u00b3n.<\/span><\/p>\n<p class=\"ISO27000-Contenido\"><span lang=\"ES-TRAD\">Garantizar un nivel de protecci\u00c3\u00b3n total es imposible incluso en el caso de disponer de un presupuesto ilimitado. El prop\u00c3\u00b3sito de un sistema de gesti\u00c3\u00b3n de la seguridad de la informaci\u00c3\u00b3n es, por tanto, garantizar que los riesgos de la seguridad de la informaci\u00c3\u00b3n son conocidos<\/span><span lang=\"ES\">, asumidos, gestionados y minimizados por la organizaci\u00c3\u00b3n de una forma <\/span><span lang=\"ES-TRAD\">documentada, sistem\u00c3\u00a1tica, estructurada, repetible, eficiente y adaptada a los cambios que se produzcan en los riesgos, el entorno y las tecnolog\u00c3\u00adas.<\/span><\/p>\n<p class=\"ISO27000-Contenido\"><a href=\"http:\/\/www.iso27000.es\/doc_sgsi_all.htm\"><font color=\"#e0ad12\">Seguir leyendo<\/font><\/a><\/p>\n<p class=\"ISO27000-Contenido\"><span lang=\"ES\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>El SGSI (Sistema de Gesti\u00c3\u00b3n de Seguridad de la Informaci\u00c3\u00b3n) es el concepto sobre el que se construye ISO 27001. La gesti\u00c3\u00b3n de la seguridad de la informaci\u00c3\u00b3n debe realizarse mediante un proceso sistem\u00c3\u00a1tico, documentado y conocido por toda la organizaci\u00c3\u00b3n. Este proceso es el que constituye un SGSI, que podr\u00c3\u00ada considerarse, por analog\u00c3\u00ada con [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[3,1],"tags":[],"class_list":["post-127","post","type-post","status-publish","format-standard","hentry","category-articulos","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Sistema de Gesti\u00c3\u00b3n de la Seguridad de la Informaci\u00c3\u00b3n<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/sistema-de-gestion-de-la-seguridad-de-la-informacion\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/sistema-de-gestion-de-la-seguridad-de-la-informacion\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/sistema-de-gestion-de-la-seguridad-de-la-informacion\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Sistema de Gesti\u00c3\u00b3n de la Seguridad de la Informaci\u00c3\u00b3n\",\"datePublished\":\"2007-04-05T12:27:47+00:00\",\"dateModified\":\"2007-04-05T12:30:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/sistema-de-gestion-de-la-seguridad-de-la-informacion\/\"},\"wordCount\":179,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"articleSection\":[\"Art\u00c3\u00adculos\",\"Profesional\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/sistema-de-gestion-de-la-seguridad-de-la-informacion\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/sistema-de-gestion-de-la-seguridad-de-la-informacion\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/sistema-de-gestion-de-la-seguridad-de-la-informacion\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Sistema de Gesti\u00c3\u00b3n de la Seguridad de la Informaci\u00c3\u00b3n\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2007-04-05T12:27:47+00:00\",\"dateModified\":\"2007-04-05T12:30:18+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/sistema-de-gestion-de-la-seguridad-de-la-informacion\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Sistema de Gesti\u00c3\u00b3n de la Seguridad de la Informaci\u00c3\u00b3n","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/sistema-de-gestion-de-la-seguridad-de-la-informacion\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/sistema-de-gestion-de-la-seguridad-de-la-informacion\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/sistema-de-gestion-de-la-seguridad-de-la-informacion\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Sistema de Gesti\u00c3\u00b3n de la Seguridad de la Informaci\u00c3\u00b3n","datePublished":"2007-04-05T12:27:47+00:00","dateModified":"2007-04-05T12:30:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/sistema-de-gestion-de-la-seguridad-de-la-informacion\/"},"wordCount":179,"commentCount":0,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"articleSection":["Art\u00c3\u00adculos","Profesional"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.talsoft-security.com\/site\/sistema-de-gestion-de-la-seguridad-de-la-informacion\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/sistema-de-gestion-de-la-seguridad-de-la-informacion\/","url":"https:\/\/www.talsoft-security.com\/site\/sistema-de-gestion-de-la-seguridad-de-la-informacion\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Sistema de Gesti\u00c3\u00b3n de la Seguridad de la Informaci\u00c3\u00b3n","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2007-04-05T12:27:47+00:00","dateModified":"2007-04-05T12:30:18+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/sistema-de-gestion-de-la-seguridad-de-la-informacion\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/127","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=127"}],"version-history":[{"count":0,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/127\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=127"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=127"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=127"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}