{"id":2751,"date":"2025-05-15T06:43:15","date_gmt":"2025-05-15T06:43:15","guid":{"rendered":"https:\/\/renic.es\/agente\/ciberseguridad-industrial\/"},"modified":"2025-06-02T06:47:10","modified_gmt":"2025-06-02T06:47:10","slug":"ciberseguridad-industrial","status":"publish","type":"agente","link":"https:\/\/renic.es\/en\/agente\/ciberseguridad-industrial\/","title":{"rendered":"Ciberseguridad industrial"},"content":{"rendered":"","protected":false},"template":"","topics-investigacion-egente":[476,441,438,462,453,457,616,637,522,496,499,505,506,507,537,515,546,548,559,652,611,575,582,551,618,638,650,539,489,706,656,466,634,632,620,576,633,660,571,673,671,691,695],"area-investigacion-agente":[416,415,423,419,417],"ccaa-agente":[735],"ente-juridico-agente":[744],"tipologia-agente":[],"class_list":["post-2751","agente","type-agente","status-publish","hentry","topics-investigacion-egente-access-control-and-authentication","topics-investigacion-egente-audits-of-security-systems","topics-investigacion-egente-cloud-and-web-application-architecture","topics-investigacion-egente-cloud-computing-en","topics-investigacion-egente-cpss-en","topics-investigacion-egente-cyber-risks","topics-investigacion-egente-data-origination","topics-investigacion-egente-data-protection-confidentiality","topics-investigacion-egente-design-of-security-requirements","topics-investigacion-egente-development-of-applications","topics-investigacion-egente-development-of-integrated-security-environments","topics-investigacion-egente-development-of-methodologies-for-increased-reliability-and-updating-of-systems","topics-investigacion-egente-development-of-microelectronics","topics-investigacion-egente-development-of-prototypes-of-dependable-systems-in-applications-and-infrastructures","topics-investigacion-egente-dynamic-evaluation-and-management-of-risks","topics-investigacion-egente-early-detection-of-cyber-risks","topics-investigacion-egente-fog-computing-en","topics-investigacion-egente-fuzz-testing-of-industrial-systems","topics-investigacion-egente-hardware-testing-side-channel-attacks-and-flaw-injection","topics-investigacion-egente-harvesting-of-information-on-threats","topics-investigacion-egente-integrated-risk-metrics-and-indicators","topics-investigacion-egente-integration-of-systems","topics-investigacion-egente-internet-of-things","topics-investigacion-egente-key-and-certificate-management-pki","topics-investigacion-egente-penetration-testing-of-industrial-systems","topics-investigacion-egente-proteccion-de-datos-integridad-y-disponibilidad-en","topics-investigacion-egente-prototyping-of-reliable-and-upgradable-systems","topics-investigacion-egente-risk-evaluation-and-prevention","topics-investigacion-egente-risk-quantification","topics-investigacion-egente-robustness-testing-of-communications","topics-investigacion-egente-role-based-access-control-en","topics-investigacion-egente-secure-computing","topics-investigacion-egente-secure-data-processing","topics-investigacion-egente-secure-data-processing-based-on-hardware-security-module-hsm","topics-investigacion-egente-secure-execution-platforms","topics-investigacion-egente-secure-integration","topics-investigacion-egente-secure-processing-of-encrypted-data-and-signals","topics-investigacion-egente-security-privacy-through-design","topics-investigacion-egente-security-engineering","topics-investigacion-egente-security-in-critical-systems-aeronautics-rail-automotive","topics-investigacion-egente-security-in-operating-systems","topics-investigacion-egente-smart-cards-en","topics-investigacion-egente-systems-compliance-en","area-investigacion-agente-data-processing","area-investigacion-agente-evaluation-of-systems-and-cyber-risk","area-investigacion-agente-identity-management","area-investigacion-agente-others","area-investigacion-agente-reliable-and-upgradeable-systems","ccaa-agente-pais-vasco-en","ente-juridico-agente-ikerlan-en"],"_links":{"self":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/agente\/2751","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/agente"}],"about":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/types\/agente"}],"wp:attachment":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/media?parent=2751"}],"wp:term":[{"taxonomy":"topics-investigacion-egente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/topics-investigacion-egente?post=2751"},{"taxonomy":"area-investigacion-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/area-investigacion-agente?post=2751"},{"taxonomy":"ccaa-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/ccaa-agente?post=2751"},{"taxonomy":"ente-juridico-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/ente-juridico-agente?post=2751"},{"taxonomy":"tipologia-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/tipologia-agente?post=2751"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}