{"id":2888,"date":"2025-05-15T06:43:22","date_gmt":"2025-05-15T06:43:22","guid":{"rendered":"https:\/\/renic.es\/agente\/ket-de-ciberseguridad-y-blockchain\/"},"modified":"2025-06-02T11:02:37","modified_gmt":"2025-06-02T11:02:37","slug":"ket-de-ciberseguridad-y-blockchain","status":"publish","type":"agente","link":"https:\/\/renic.es\/en\/agente\/ket-de-ciberseguridad-y-blockchain\/","title":{"rendered":"KET DE CIBERSEGURIDAD Y BLOCKCHAIN"},"content":{"rendered":"","protected":false},"template":"","topics-investigacion-egente":[476,477,512,437,568,445,428,663,450,438,462,683,464,465,472,453,481,482,444,484,457,637,657,561,522,518,514,648,504,505,501,552,537,515,553,645,459,652,593,595,684,611,582,583,627,429,460,588,591,596,608,607,604,605,662,617,643,487,526,625,626,628,701,638,491,549,439,433,489,527,452,634,467,633,660,571,673,676,680,461,430,543,598,695,678,511,468],"area-investigacion-agente":[414,422,416,415,423,419,418,424,417],"ccaa-agente":[735],"ente-juridico-agente":[752],"tipologia-agente":[],"class_list":["post-2888","agente","type-agente","status-publish","hentry","topics-investigacion-egente-access-control-and-authentication","topics-investigacion-egente-access-control-based-on-behaviour","topics-investigacion-egente-anomaly-detection","topics-investigacion-egente-architecture-of-protection","topics-investigacion-egente-attacker-identification-and-location","topics-investigacion-egente-authentication-of-transactions-at-global-level","topics-investigacion-egente-big-data-analysis-focussed-on-privacy","topics-investigacion-egente-big-data-security","topics-investigacion-egente-blockchain-and-other-dlts","topics-investigacion-egente-cloud-and-web-application-architecture","topics-investigacion-egente-cloud-computing-en","topics-investigacion-egente-communication-systems-resistant-to-programmed-attacks","topics-investigacion-egente-compliancecertification-en","topics-investigacion-egente-computation-of-relevant-metadata","topics-investigacion-egente-confidence-and-reliable-big-data","topics-investigacion-egente-cpss-en","topics-investigacion-egente-creation-of-barriers-to-entry","topics-investigacion-egente-creation-of-information-repositories","topics-investigacion-egente-cryptographic-authentication","topics-investigacion-egente-cryptography","topics-investigacion-egente-cyber-risks","topics-investigacion-egente-data-protection-confidentiality","topics-investigacion-egente-data-sanitization-and-anonymization","topics-investigacion-egente-decision-making-management-tools","topics-investigacion-egente-design-of-security-requirements","topics-investigacion-egente-detection-and-monitoring-of-attacks","topics-investigacion-egente-detection-of-malicious-software","topics-investigacion-egente-detection-protocols-system-programming-and-prevention-programmes","topics-investigacion-egente-development-of-data-harvesting-mechanisms","topics-investigacion-egente-development-of-methodologies-for-increased-reliability-and-updating-of-systems","topics-investigacion-egente-development-of-threat-detection-tools","topics-investigacion-egente-digital-rights-management","topics-investigacion-egente-dynamic-evaluation-and-management-of-risks","topics-investigacion-egente-early-detection-of-cyber-risks","topics-investigacion-egente-electronic-evidence-management","topics-investigacion-egente-encryption-protocols-for-preserving-privacy","topics-investigacion-egente-forensic-science","topics-investigacion-egente-harvesting-of-information-on-threats","topics-investigacion-egente-improved-security-in-technological-standards","topics-investigacion-egente-improvement-of-security-protocols-and-standards","topics-investigacion-egente-industrial-control-systems-in-networks-water-electricity-food-transport-finance-health-e-health-etc","topics-investigacion-egente-integrated-risk-metrics-and-indicators","topics-investigacion-egente-internet-of-things","topics-investigacion-egente-interoperability-of-systems","topics-investigacion-egente-iot-privacy","topics-investigacion-egente-large-scale-data-analysis","topics-investigacion-egente-lattice-based-homomorphic-encryption","topics-investigacion-egente-legacy-systems-management","topics-investigacion-egente-mechanisms-for-data-harvesting","topics-investigacion-egente-methodology-for-the-adoption-of-best-practice-and-reduction-of-barriers-in-relation-to-risks","topics-investigacion-egente-methods-and-development-of-protection-tools","topics-investigacion-egente-methods-for-reducing-and-managing-complex-systems","topics-investigacion-egente-monitoring-and-profiling","topics-investigacion-egente-network-monitoring-and-security","topics-investigacion-egente-network-security","topics-investigacion-egente-pet-for-organizations-and-infrastructures","topics-investigacion-egente-physical-data-protection","topics-investigacion-egente-post-quantum-encryption","topics-investigacion-egente-preparation-of-mechanisms-to-respond-to-attacks","topics-investigacion-egente-privacy","topics-investigacion-egente-privacy-in-the-cloud","topics-investigacion-egente-privacy-of-consultations","topics-investigacion-egente-privacy-aware-security-technologies","topics-investigacion-egente-proteccion-de-datos-integridad-y-disponibilidad-en","topics-investigacion-egente-regulatory-security-compliance","topics-investigacion-egente-reliable-global-level-identity-generation","topics-investigacion-egente-resilient-architectures","topics-investigacion-egente-risk-management-and-analysis","topics-investigacion-egente-risk-quantification","topics-investigacion-egente-scalability-and-interoperability-of-identity-management-solutions","topics-investigacion-egente-search-for-the-origin-of-the-threat","topics-investigacion-egente-secure-data-processing","topics-investigacion-egente-secure-multipart-computing","topics-investigacion-egente-secure-processing-of-encrypted-data-and-signals","topics-investigacion-egente-security-privacy-through-design","topics-investigacion-egente-security-engineering","topics-investigacion-egente-security-in-critical-systems-aeronautics-rail-automotive","topics-investigacion-egente-security-support-services","topics-investigacion-egente-simulation-of-dangerous-environments","topics-investigacion-egente-smart-cities-and-safe-cities","topics-investigacion-egente-statistical-and-predictive-risk-analysis","topics-investigacion-egente-system-entry-and-exit-filters","topics-investigacion-egente-system-modelling-and-system-attacks","topics-investigacion-egente-systems-compliance-en","topics-investigacion-egente-threat-and-attack-simulation","topics-investigacion-egente-threat-detection","topics-investigacion-egente-verifiable-computing","area-investigacion-agente-attack-and-defence-against-threats","area-investigacion-agente-critical-infrastructures","area-investigacion-agente-data-processing","area-investigacion-agente-evaluation-of-systems-and-cyber-risk","area-investigacion-agente-identity-management","area-investigacion-agente-others","area-investigacion-agente-privacy","area-investigacion-agente-promotion-and-awareness-of-safety","area-investigacion-agente-reliable-and-upgradeable-systems","ccaa-agente-pais-vasco-en","ente-juridico-agente-tecnalia-en"],"_links":{"self":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/agente\/2888","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/agente"}],"about":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/types\/agente"}],"wp:attachment":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/media?parent=2888"}],"wp:term":[{"taxonomy":"topics-investigacion-egente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/topics-investigacion-egente?post=2888"},{"taxonomy":"area-investigacion-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/area-investigacion-agente?post=2888"},{"taxonomy":"ccaa-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/ccaa-agente?post=2888"},{"taxonomy":"ente-juridico-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/ente-juridico-agente?post=2888"},{"taxonomy":"tipologia-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/tipologia-agente?post=2888"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}