{"id":20543,"date":"2023-11-27T09:28:13","date_gmt":"2023-11-27T08:28:13","guid":{"rendered":"https:\/\/urquiabas.com\/diccionari-ciberproteccio\/"},"modified":"2024-06-17T13:30:17","modified_gmt":"2024-06-17T11:30:17","slug":"diccionari-ciberproteccio","status":"publish","type":"page","link":"https:\/\/urquiabas.com\/ca\/diccionari-ciberproteccio\/","title":{"rendered":"Diccionari ciberprotecci\u00f3"},"content":{"rendered":"\n<table>\n        <thead>\n            <tr>\n                <th>Lletra<\/th>\n                <th>Termes<\/th>\n            <\/tr>\n        <\/thead>\n        <tbody>\n            <tr>\n                <td>A<\/td>\n                <td>\n                    <a href=\"#Adaware\">Adaware<\/a> , <a href=\"#Agujero_de_seguridad\">Forat de seguretat<\/a> , <a href=\"#Amenazas_polimorfas\">Amenaces polimorfes<\/a> ,  \n                    <a href=\"#AntiSpam\">AntiSpam<\/a> , <a href=\"#Antivirus\">Antivirus<\/a> , <a href=\"#APT\">APT<\/a> , <a href=\"#Ataque_Brute_Force\">Atac Brute Force<\/a>\n                <\/td>\n            <\/tr>\n            <tr>\n                <td>B<\/td>\n                <td>\n                    <a href=\"#BIOS\">BIOS<\/a> , <a href=\"#Bit\">Bit<\/a> , <a href=\"#Botnet\">Botnet<\/a> , <a href=\"#Browser_Hijacking\">Browser Hijacking<\/a> , <a href=\"#BSOD\">BSOD<\/a> , <a href=\"#Byte\">Byte<\/a>\n                <\/td>\n            <\/tr>\n            <tr>\n                <td>C<\/td>\n                <td>\n                    <a href=\"#Certificado_Digital\">Certificat Digital<\/a> , <a href=\"#Ciberdelito\">Ciberdelicte<\/a> , <a href=\"#Cifrado\">Xifrat<\/a> , <a href=\"#Cloud_Computing\">Cloud Computing<\/a> ,  \n                    <a href=\"#Comercio_electr%C3%B3nico\">Ets aqu\u00ed : Comer\u00e7 electr\u00f2nic<\/a> , <a href=\"#Control_de_dispositivos\">Control de dispositius<\/a> , <a href=\"#Cookie\">Cookie<\/a> , <a href=\"#CPU\">CPU<\/a> ,  \n                    <a href=\"#Crack\">Crack<\/a> , <a href=\"#Craker\">Craker<\/a>\n                <\/td>\n            <\/tr>\n            <tr>\n                <td>D<\/td>\n                <td>\n                    <a href=\"#DDoS\">DDoS<\/a> , <a href=\"#Defacement\">Defacement<\/a> , <a href=\"#Disipador\">Dissipador<\/a> , <a href=\"#DNS_Hijacking\">DNS Hijacking<\/a>\n                <\/td>\n            <\/tr>\n            <tr>\n                <td>E<\/td>\n                <td>\n                    <a href=\"#Exploit\">Exploit<\/a>\n                <\/td>\n            <\/tr>\n            <tr>\n                <td>F<\/td>\n                <td>\n                    <a href=\"#Firewall\">Firewall<\/a> , <a href=\"#Footprinting\">Footprinting<\/a>\n                <\/td>\n            <\/tr>\n            <tr>\n                <td>G<\/td>\n                <td>\n                    <a href=\"#Gusano\">Cuc<\/a>\n                <\/td>\n            <\/tr>\n            <tr>\n                <td>H<\/td>\n                <td>\n                    <a href=\"#Hacker\">Hacker<\/a> , <a href=\"#Hacktivismo\">Hacktivisme<\/a> , <a href=\"#Hoax\">Hoax<\/a> , <a href=\"#Honeypot\">Honeypot<\/a>\n                <\/td>\n            <\/tr>\n            <tr>\n                <td>I<\/td>\n                <td>\n                    <a href=\"#IDS\">IDS<\/a> , <a href=\"#Ingenieria_Social\">Enginyeria Social<\/a> , <a href=\"#Internet_Profunda\">Internet Profunda<\/a>\n                <\/td>\n            <\/tr>\n            <tr>\n                <td>K<\/td>\n                <td>\n                    <a href=\"#Keylogger\">Keylogger<\/a>\n                <\/td>\n            <\/tr>\n            <tr>\n                <td>M<\/td>\n                <td>\n                    <a href=\"#Macro_de_Office\">Macro d&#8217; Office<\/a> , <a href=\"#Malware\">Malware<\/a> , <a href=\"#Man_in_the_browser\">Man in the browser<\/a> , <a href=\"#Man_in_the_middle\">Man in the middle<\/a>\n                <\/td>\n            <\/tr>\n            <tr>\n                <td>N<\/td>\n                <td>\n                    <a href=\"#NFC\">NFC<\/a>\n                <\/td>\n            <\/tr>\n            <tr>\n                <td>P<\/td>\n                <td>\n                    <a href=\"#PC\">PC<\/a> , <a href=\"#Pharming\">Pharming<\/a>\n                <\/td>\n            <\/tr>\n            <tr>\n                <td>S<\/td>\n                <td>\n                    <a href=\"#Spear_Phishing\">Spear Phishing<\/a> , <a href=\"#Spyware\">Spyware<\/a>\n                <\/td>\n            <\/tr>\n            <tr>\n                <td>T<\/td>\n                <td>\n                    <a href=\"#Toolkit\">Toolkit<\/a> , <a href=\"#Troyano\">Troi\u00e0<\/a>\n                <\/td>\n            <\/tr>\n            <tr>\n                <td>V<\/td>\n                <td>\n                    <a href=\"#Virus_Residente\">Virus Resident<\/a> , <a href=\"#Virus\">Virus<\/a>\n                <\/td>\n            <\/tr>\n            <tr>\n                <td>Z<\/td>\n                <td>\n                    <a href=\"#Zombie\">Zombie<\/a>\n                <\/td>\n            <\/tr>\n        <\/tbody>\n    <\/table>\n\n    <!-- Definiciones -->\n    <div id=\"definiciones\">\n        <h2>Definicions<\/h2>\n        <h3 id=\"Adaware\" class=\"anchor\">Adaware<\/h3>\n        <p>Programari dissenyat per detectar i eliminar adware, que \u00e9s un tipus de programa que mostra publicitat no desitjada al dispositiu de lusuari.<\/p>\n\n        <h3 id=\"Agujero_de_seguridad\" class=\"anchor\">Forat de seguretat<\/h3>\n        <p>Vulnerabilitat en un sistema o aplicaci\u00f3 que pot ser explotada per atacants per obtenir acc\u00e9s no autoritzat o causar danys.<\/p>\n\n        <h3 id=\"Amenazas_polimorfas\" class=\"anchor\">Amenaces polimorfes<\/h3>\n        <p>Tipus de codi malici\u00f3s que canvien el seu codi per evitar ser detectats per programes antivirus.<\/p>\n\n        <h3 id=\"AntiSpam\" class=\"anchor\">AntiSpam<\/h3>\n        <p>Programari o t\u00e8cniques utilitzades per detectar i bloquejar correus electr\u00f2nics no desitjats o spam.<\/p>\n\n        <h3 id=\"Antivirus\" class=\"anchor\">Antivirus<\/h3>\n        <p>Programa de programari dissenyat per detectar, prevenir i eliminar virus i altres tipus de codi malici\u00f3s.<\/p>\n\n        <h3 id=\"APT\" class=\"anchor\">APT<\/h3>\n        <p>(Amena\u00e7a Persistent Avan\u00e7ada) Atacs perllongats i dirigits que busquen infiltrar-se en una xarxa de manera cont\u00ednua i persistent per robar informaci\u00f3.<\/p>\n\n        <h3 id=\"Ataque_Brute_Force\" class=\"anchor\">Atac Brute Force<\/h3>\n        <p>M\u00e8tode d&#8217;atac en qu\u00e8 es proven sistem\u00e0ticament totes les combinacions possibles de contrasenyes fins a trobar-ne la correcta.<\/p>\n\n        <h3 id=\"BIOS\" class=\"anchor\">BIOS<\/h3>\n        <p>(Basic Input\/Output System) Firmware utilitzat per fer la inicialitzaci\u00f3 del maquinari durant el proc\u00e9s d&#8217;arrencada d&#8217;un ordinador.<\/p>\n\n        <h3 id=\"Bit\" class=\"anchor\">Bit<\/h3>\n        <p>La unitat m\u00e9s petita dinformaci\u00f3 en inform\u00e0tica, que pot tenir un valor de 0 o 1.<\/p>\n\n        <h3 id=\"Botnet\" class=\"anchor\">Botnet<\/h3>\n        <p>Xarxa de dispositius infectats amb codi malici\u00f3s que s\u00f3n controlats de manera remota per un atacant.<\/p>\n\n        <h3 id=\"Browser_Hijacking\" class=\"anchor\">Browser Hijacking<\/h3>\n        <p>T\u00e8cnica maliciosa que modifica la configuraci\u00f3 del navegador web de lusuari per redirigir-lo a llocs no desitjats o infectats.<\/p>\n\n        <h3 id=\"BSOD\" class=\"anchor\">BSOD<\/h3>\n        <p>(Blue Screen of Death) Pantalla blava derror en sistemes Windows que indica una fallada cr\u00edtica del sistema operatiu.<\/p>\n\n        <h3 id=\"Byte\" class=\"anchor\">Byte<\/h3>\n        <p>Unitat dinformaci\u00f3 que consta de 8 bits i pot representar un sol car\u00e0cter de text en un ordinador.<\/p>\n\n        <h3 id=\"Certificado_Digital\" class=\"anchor\">Certificat Digital<\/h3>\n        <p>Document electr\u00f2nic que utilitza la criptografia per garantir la identitat duna persona o entitat a internet.<\/p>\n\n        <h3 id=\"Ciberdelito\" class=\"anchor\">Ciberdelicte<\/h3>\n        <p>Activitat criminal que es fa utilitzant mitjans digitals, com el robatori d&#8217;identitat o el frau en l\u00ednia.<\/p>\n\n        <h3 id=\"Cifrado\" class=\"anchor\">Xifrat<\/h3>\n        <p>Proc\u00e9s de convertir informaci\u00f3 en un codi secret per protegir-la d&#8217;accessos no autoritzats.<\/p>\n\n        <h3 id=\"Cloud_Computing\" class=\"anchor\">Cloud Computing<\/h3>\n        <p>Tecnologia que permet l&#8217;acc\u00e9s remot a recursos inform\u00e0tics i emmagatzematge a trav\u00e9s d&#8217;Internet.<\/p>\n\n        <h3 id=\"Comercio_electr\u00f3nico\" class=\"anchor\">Comer\u00e7 electr\u00f2nic<\/h3>\n        <p>Transaccions comercials fetes a trav\u00e9s d&#8217;internet.<\/p>\n\n        <h3 id=\"Control_de_dispositivos\" class=\"anchor\">Control de dispositius<\/h3>\n        <p>Eines i pol\u00edtiques per gestionar i restringir l\u00fas de dispositius dins una xarxa corporativa.<\/p>\n\n        <h3 id=\"Cookie\" class=\"anchor\">Cookie<\/h3>\n        <p>Petit fitxer de dades enviat per un lloc web i emmagatzemat al navegador de l&#8217;usuari per recordar informaci\u00f3 sobre la seva visita.<\/p>\n\n        <h3 id=\"CPU\" class=\"anchor\">CPU<\/h3>\n        <p>(Unitat Central de Processament) El component principal dun ordinador que realitza les operacions de processament de dades.<\/p>\n\n        <h3 id=\"Crack\" class=\"anchor\">Crack<\/h3>\n        <p>Eina o m\u00e8tode utilitzat per trencar la protecci\u00f3 de programari i permetre&#8217;n l&#8217;\u00fas sense autoritzaci\u00f3.<\/p>\n\n        <h3 id=\"Craker\" class=\"anchor\">Craker<\/h3>\n        <p>Individu que utilitza les seves habilitats inform\u00e0tiques per trencar sistemes de seguretat i accedir a informaci\u00f3 o serveis sense perm\u00eds.<\/p>\n\n        <h3 id=\"DDoS\" class=\"anchor\">DDoS<\/h3>\n        <p>(Atac Distribu\u00eft de Denegaci\u00f3 de Servei) Atac en qu\u00e8 m\u00faltiples sistemes compromesos ataquen un objectiu, sobrecarregant els seus recursos i fent-ho inaccessible.<\/p>\n\n        <h3 id=\"Defacement\" class=\"anchor\">Defacement<\/h3>\n        <p>Tipus d&#8217;atac cibern\u00e8tic on s&#8217;altera l&#8217;aparen\u00e7a visual d&#8217;un lloc web.<\/p>\n\n        <h3 id=\"Disipador\" class=\"anchor\">Dissipador<\/h3>\n        <p>Component de maquinari que sutilitza per reduir la calor generada pels components electr\u00f2nics dun dispositiu.<\/p>\n\n        <h3 id=\"DNS_Hijacking\" class=\"anchor\">DNS Hijacking<\/h3>\n        <p>T\u00e8cnica maliciosa que redirigeix \u200b\u200bles sol\u00b7licituds de DNS a llocs web fraudulents.<\/p>\n\n        <h3 id=\"Exploit\" class=\"anchor\">Exploit<\/h3>\n        <p>Programa o codi que aprofita una vulnerabilitat en un sistema per fer accions no autoritzades.<\/p>\n\n        <h3 id=\"Firewall\" class=\"anchor\">Firewall<\/h3>\n        <p>Sistema de seguretat que controla el tr\u00e0nsit de xarxa entrant i sortint basat en regles de seguretat predeterminades.<\/p>\n\n        <h3 id=\"Footprinting\" class=\"anchor\">Footprinting<\/h3>\n        <p>T\u00e8cnica de recopilaci\u00f3 d&#8217;informaci\u00f3 sobre un objectiu per identificar possibles vulnerabilitats.<\/p>\n\n        <h3 id=\"Gusano\" class=\"anchor\">Cuc<\/h3>\n        <p>Tipus de codi malici\u00f3s que es replica a si mateix per propagar-se a altres dispositius a trav\u00e9s de xarxes.<\/p>\n\n        <h3 id=\"Hacker\" class=\"anchor\">Hacker<\/h3>\n        <p>Persona amb coneixements avan\u00e7ats en inform\u00e0tica que fa servir les seves habilitats per explorar i manipular sistemes.<\/p>\n\n        <h3 id=\"Hacktivismo\" class=\"anchor\">Hacktivisme<\/h3>\n        <p>\u00das de t\u00e8cniques de hacking per promoure causes pol\u00edtiques o socials.<\/p>\n\n        <h3 id=\"Hoax\" class=\"anchor\">Hoax<\/h3>\n        <p>Missatge fals o engany\u00f3s que es difon amb l&#8217;objectiu de confondre o alarmar les persones.<\/p>\n\n        <h3 id=\"Honeypot\" class=\"anchor\">Honeypot<\/h3>\n        <p>Sistema de seguretat dissenyat per atraure i analitzar atacs cibern\u00e8tics per millorar la protecci\u00f3 de la xarxa.<\/p>\n\n        <h3 id=\"IDS\" class=\"anchor\">IDS<\/h3>\n        <p>(Sistema de Detecci\u00f3 d&#8217;Intrusos) Eina de seguretat que monitoritza el tr\u00e0nsit de xarxa per detectar activitats sospitoses o malicioses.<\/p>\n\n        <h3 id=\"Ingenieria_Social\" class=\"anchor\">Enginyeria Social<\/h3>\n        <p>T\u00e8cniques utilitzades per manipular les persones i obtenir informaci\u00f3 confidencial.<\/p>\n\n        <h3 id=\"Internet_Profunda\" class=\"anchor\">Internet Profunda<\/h3>\n        <p>Parteix d&#8217;internet que no \u00e9s indexada pels motors de cerca convencionals i cont\u00e9 contingut accessible nom\u00e9s mitjan\u00e7ant eines espec\u00edfiques.<\/p>\n\n        <h3 id=\"Keylogger\" class=\"anchor\">Keylogger<\/h3>\n        <p>Programari o maquinari que registra les pulsacions de tecles dun usuari sense el seu coneixement per capturar informaci\u00f3 sensible.<\/p>\n\n        <h3 id=\"Macro_de_Office\" class=\"anchor\">Macro d&#8217;Office<\/h3>\n        <p>Seq\u00fc\u00e8ncia d&#8217;instruccions que automatitzen tasques repetitives en aplicacions de Microsoft Office.<\/p>\n\n        <h3 id=\"Malware\" class=\"anchor\">Malware<\/h3>\n        <p>Programari malici\u00f3s dissenyat per danyar, interrompre o robar informaci\u00f3 dun sistema.<\/p>\n\n        <h3 id=\"Man_in_the_browser\" class=\"anchor\">Man in the browser<\/h3>\n        <p>Tipus d&#8217;atac en qu\u00e8 un codi malici\u00f3s infecta el navegador web i modifica les transaccions en l\u00ednia sense que l&#8217;usuari ho s\u00e0piga.<\/p>\n\n        <h3 id=\"Man_in_the_middle\" class=\"anchor\">Man in the middle<\/h3>\n        <p>Atac en qu\u00e8 l&#8217;atacant intercepta i possiblement altera la comunicaci\u00f3 entre dues parts sense que aquestes ho s\u00e0piguen.<\/p>\n\n        <h3 id=\"NFC\" class=\"anchor\">NFC<\/h3>\n        <p>(Near Field Communication) Tecnologia de comunicaci\u00f3 sense fils de curt abast utilitzada per intercanviar dades entre dispositius propers.<\/p>\n\n        <h3 id=\"PC\" class=\"anchor\">PC<\/h3>\n        <p>(Ordinador Personal) Dispositiu inform\u00e0tic utilitzat per individus per fer tasques personals o professionals.<\/p>\n\n        <h3 id=\"Pharming\" class=\"anchor\">Pharming<\/h3>\n        <p>T\u00e8cnica de ciberatac que redirigeix \u200b\u200bels usuaris des de llocs web leg\u00edtims a llocs falsos per robar informaci\u00f3 personal.<\/p>\n\n        <h3 id=\"Spear_Phishing\" class=\"anchor\">Spear Phishing<\/h3>\n        <p>Variant de phishing en qu\u00e8 els atacants envien missatges personalitzats i dirigits a un individu espec\u00edfic per robar informaci\u00f3.<\/p>\n\n        <h3 id=\"Spyware\" class=\"anchor\">Spyware<\/h3>\n        <p>Programari que recopila informaci\u00f3 sobre una persona o entitat sense el seu coneixement i la transmet a una altra banda.<\/p>\n\n        <h3 id=\"Toolkit\" class=\"anchor\">Toolkit<\/h3>\n        <p>Conjunt d&#8217;eines de programari utilitzades per fer tasques espec\u00edfiques, sovint en el context de la seguretat inform\u00e0tica.<\/p>\n\n        <h3 id=\"Troyano\" class=\"anchor\">Troi\u00e0<\/h3>\n        <p>Tipus de codi malici\u00f3s que es disfressa de programari leg\u00edtim per enganyar els usuaris i realitzar accions malicioses en els seus sistemes.<\/p>\n\n        <h3 id=\"Virus_Residente\" class=\"anchor\">Virus Resident<\/h3>\n        <p>Tipus de virus que s&#8217;instal\u00b7la a la mem\u00f2ria de l&#8217;ordinador i pot infectar altres fitxers i programes que s&#8217;executin al sistema.<\/p>\n\n        <h3 id=\"Virus\" class=\"anchor\">Virus<\/h3>\n        <p>Programa malici\u00f3s que es replica inserint-se en altres programes o fitxers per causar dany o realitzar accions no desitjades.<\/p>\n\n        <h3 id=\"Zombie\" class=\"anchor\">Zombie<\/h3>\n        <p>Dispositiu comprom\u00e8s que \u00e9s controlat de manera remota per un atacant per fer tasques malicioses, com a part d&#8217;una botnet.<\/p>\n    <\/div>\n","protected":false},"excerpt":{"rendered":"<p>Lletra Termes A Adaware , Forat de seguretat , Amenaces polimorfes , AntiSpam , Antivirus , APT , Atac Brute Force B BIOS , Bit , Botnet , Browser Hijacking , BSOD , Byte C Certificat Digital , Ciberdelicte , Xifrat , Cloud Computing , Ets aqu\u00ed : Comer\u00e7 electr\u00f2nic , Control de dispositius , [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":6991,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"seguro.php","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-20543","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":{"contacte":"ramon","titulo":"Diccionari de CiberProtecci\u00f3","id_nex":"288"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Diccionari ciberprotecci\u00f3 - Urqu\u00eda&amp;Bas<\/title>\n<meta name=\"description\" content=\"T&#039;oferim el nostre diccionari ciberprotecci\u00f3 perqu\u00e8 estiguis al dia en els termes i nomenclatures que pots trobar al m\u00f3n ciber.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/urquiabas.com\/ca\/diccionari-ciberproteccio\/\" \/>\n<meta property=\"og:locale\" content=\"ca_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Diccionari ciberprotecci\u00f3 - Urqu\u00eda&amp;Bas\" \/>\n<meta property=\"og:description\" content=\"T&#039;oferim el nostre diccionari ciberprotecci\u00f3 perqu\u00e8 estiguis al dia en els termes i nomenclatures que pots trobar al m\u00f3n ciber.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/urquiabas.com\/ca\/diccionari-ciberproteccio\/\" \/>\n<meta property=\"og:site_name\" content=\"Urqu\u00eda&amp;Bas\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/UrquiaBas\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-17T11:30:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/urquiabas.com\/wp-content\/uploads\/2020\/03\/slider_1920_ciber.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@BasUrquia\" \/>\n<meta name=\"twitter:label1\" content=\"Temps estimat de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minuts\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/urquiabas.com\\\/ca\\\/diccionari-ciberproteccio\\\/\",\"url\":\"https:\\\/\\\/urquiabas.com\\\/ca\\\/diccionari-ciberproteccio\\\/\",\"name\":\"Diccionari ciberprotecci\u00f3 - Urqu\u00eda&amp;Bas\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/urquiabas.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/urquiabas.com\\\/ca\\\/diccionari-ciberproteccio\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/urquiabas.com\\\/ca\\\/diccionari-ciberproteccio\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/urquiabas.com\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/slider_1920_ciber.jpg\",\"datePublished\":\"2023-11-27T08:28:13+00:00\",\"dateModified\":\"2024-06-17T11:30:17+00:00\",\"description\":\"T'oferim el nostre diccionari ciberprotecci\u00f3 perqu\u00e8 estiguis al dia en els termes i nomenclatures que pots trobar al m\u00f3n ciber.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/urquiabas.com\\\/ca\\\/diccionari-ciberproteccio\\\/#breadcrumb\"},\"inLanguage\":\"ca\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/urquiabas.com\\\/ca\\\/diccionari-ciberproteccio\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\\\/\\\/urquiabas.com\\\/ca\\\/diccionari-ciberproteccio\\\/#primaryimage\",\"url\":\"https:\\\/\\\/urquiabas.com\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/slider_1920_ciber.jpg\",\"contentUrl\":\"https:\\\/\\\/urquiabas.com\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/slider_1920_ciber.jpg\",\"width\":1920,\"height\":667},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/urquiabas.com\\\/ca\\\/diccionari-ciberproteccio\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/urquiabas.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Diccionari ciberprotecci\u00f3\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/urquiabas.com\\\/#website\",\"url\":\"https:\\\/\\\/urquiabas.com\\\/\",\"name\":\"Urqu\u00eda&amp;Bas\",\"description\":\"Corredur\u00eda de seguros | Lleida\",\"publisher\":{\"@id\":\"https:\\\/\\\/urquiabas.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/urquiabas.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ca\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/urquiabas.com\\\/#organization\",\"name\":\"Urquia & Bas S.L\",\"url\":\"https:\\\/\\\/urquiabas.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\\\/\\\/urquiabas.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/urquiabas.com\\\/wp-content\\\/uploads\\\/2018\\\/03\\\/logoubmail2018.jpg\",\"contentUrl\":\"https:\\\/\\\/urquiabas.com\\\/wp-content\\\/uploads\\\/2018\\\/03\\\/logoubmail2018.jpg\",\"width\":258,\"height\":61,\"caption\":\"Urquia & Bas S.L\"},\"image\":{\"@id\":\"https:\\\/\\\/urquiabas.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/UrquiaBas\\\/\",\"https:\\\/\\\/x.com\\\/BasUrquia\",\"https:\\\/\\\/www.instagram.com\\\/urquiabas\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/3125928\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Diccionari ciberprotecci\u00f3 - Urqu\u00eda&amp;Bas","description":"T'oferim el nostre diccionari ciberprotecci\u00f3 perqu\u00e8 estiguis al dia en els termes i nomenclatures que pots trobar al m\u00f3n ciber.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/urquiabas.com\/ca\/diccionari-ciberproteccio\/","og_locale":"ca_ES","og_type":"article","og_title":"Diccionari ciberprotecci\u00f3 - Urqu\u00eda&amp;Bas","og_description":"T'oferim el nostre diccionari ciberprotecci\u00f3 perqu\u00e8 estiguis al dia en els termes i nomenclatures que pots trobar al m\u00f3n ciber.","og_url":"https:\/\/urquiabas.com\/ca\/diccionari-ciberproteccio\/","og_site_name":"Urqu\u00eda&amp;Bas","article_publisher":"https:\/\/www.facebook.com\/UrquiaBas\/","article_modified_time":"2024-06-17T11:30:17+00:00","og_image":[{"width":1920,"height":667,"url":"https:\/\/urquiabas.com\/wp-content\/uploads\/2020\/03\/slider_1920_ciber.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@BasUrquia","twitter_misc":{"Temps estimat de lectura":"6 minuts"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/urquiabas.com\/ca\/diccionari-ciberproteccio\/","url":"https:\/\/urquiabas.com\/ca\/diccionari-ciberproteccio\/","name":"Diccionari ciberprotecci\u00f3 - Urqu\u00eda&amp;Bas","isPartOf":{"@id":"https:\/\/urquiabas.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/urquiabas.com\/ca\/diccionari-ciberproteccio\/#primaryimage"},"image":{"@id":"https:\/\/urquiabas.com\/ca\/diccionari-ciberproteccio\/#primaryimage"},"thumbnailUrl":"https:\/\/urquiabas.com\/wp-content\/uploads\/2020\/03\/slider_1920_ciber.jpg","datePublished":"2023-11-27T08:28:13+00:00","dateModified":"2024-06-17T11:30:17+00:00","description":"T'oferim el nostre diccionari ciberprotecci\u00f3 perqu\u00e8 estiguis al dia en els termes i nomenclatures que pots trobar al m\u00f3n ciber.","breadcrumb":{"@id":"https:\/\/urquiabas.com\/ca\/diccionari-ciberproteccio\/#breadcrumb"},"inLanguage":"ca","potentialAction":[{"@type":"ReadAction","target":["https:\/\/urquiabas.com\/ca\/diccionari-ciberproteccio\/"]}]},{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/urquiabas.com\/ca\/diccionari-ciberproteccio\/#primaryimage","url":"https:\/\/urquiabas.com\/wp-content\/uploads\/2020\/03\/slider_1920_ciber.jpg","contentUrl":"https:\/\/urquiabas.com\/wp-content\/uploads\/2020\/03\/slider_1920_ciber.jpg","width":1920,"height":667},{"@type":"BreadcrumbList","@id":"https:\/\/urquiabas.com\/ca\/diccionari-ciberproteccio\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/urquiabas.com\/"},{"@type":"ListItem","position":2,"name":"Diccionari ciberprotecci\u00f3"}]},{"@type":"WebSite","@id":"https:\/\/urquiabas.com\/#website","url":"https:\/\/urquiabas.com\/","name":"Urqu\u00eda&amp;Bas","description":"Corredur\u00eda de seguros | Lleida","publisher":{"@id":"https:\/\/urquiabas.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/urquiabas.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ca"},{"@type":"Organization","@id":"https:\/\/urquiabas.com\/#organization","name":"Urquia & Bas S.L","url":"https:\/\/urquiabas.com\/","logo":{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/urquiabas.com\/#\/schema\/logo\/image\/","url":"https:\/\/urquiabas.com\/wp-content\/uploads\/2018\/03\/logoubmail2018.jpg","contentUrl":"https:\/\/urquiabas.com\/wp-content\/uploads\/2018\/03\/logoubmail2018.jpg","width":258,"height":61,"caption":"Urquia & Bas S.L"},"image":{"@id":"https:\/\/urquiabas.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/UrquiaBas\/","https:\/\/x.com\/BasUrquia","https:\/\/www.instagram.com\/urquiabas\/","https:\/\/www.linkedin.com\/company\/3125928\/"]}]}},"_links":{"self":[{"href":"https:\/\/urquiabas.com\/ca\/wp-json\/wp\/v2\/pages\/20543","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/urquiabas.com\/ca\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/urquiabas.com\/ca\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/urquiabas.com\/ca\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/urquiabas.com\/ca\/wp-json\/wp\/v2\/comments?post=20543"}],"version-history":[{"count":0,"href":"https:\/\/urquiabas.com\/ca\/wp-json\/wp\/v2\/pages\/20543\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/urquiabas.com\/ca\/wp-json\/wp\/v2\/media\/6991"}],"wp:attachment":[{"href":"https:\/\/urquiabas.com\/ca\/wp-json\/wp\/v2\/media?parent=20543"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}