{"id":122291,"date":"2024-02-12T19:43:41","date_gmt":"2024-02-12T18:43:41","guid":{"rendered":"https:\/\/territorialchallenges.com\/?p=122291"},"modified":"2024-02-12T19:43:43","modified_gmt":"2024-02-12T18:43:43","slug":"cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie","status":"publish","type":"post","link":"https:\/\/territorialchallenges.com\/es\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/","title":{"rendered":"Amenaza cibern\u00e9tica electoral: desarrollo de una doctrina de ciberseguridad para proteger la democracia"},"content":{"rendered":"<p>Ante el alarmante aumento de la desinformaci\u00f3n impulsada por la inteligencia artificial, los funcionarios electos locales se movilizan para garantizar la seguridad electoral. Ante incidentes recientes, como el uso de deepfakes durante las primarias de New Hampshire en Estados Unidos, los funcionarios electos y pol\u00edticos estadounidenses est\u00e1n dando la voz de alarma, enfatizando la necesidad de una doctrina de ciberseguridad... <\/p>\n<div class=\"pmpro_content_message\">Art\u00edculo disponible s\u00f3lo para suscriptores.<br \/><a href=\"https:\/\/territorialchallenges.com\/wp-login.php\">Acceso<\/a><br \/><a href=\"https:\/\/territorialchallenges.com\/es\/wp-login.php\/?action=register\">Registro<\/a><\/div>","protected":false},"excerpt":{"rendered":"<p>Face \u00e0 la mont\u00e9e alarmante de la d\u00e9sinformation propuls\u00e9e par l&rsquo;intelligence artificielle, les \u00e9lus locaux se mobilisent pour s\u00e9curiser les \u00e9lections. \u00c0 la lumi\u00e8re des r\u00e9cents incidents, notamment l&rsquo;utilisation de deepfakes lors des primaires au New Hampshire aux Etats-Unis, des \u00e9lus et politiques amricains, tirent la sonnette d&rsquo;alarme, soulignant la n\u00e9cessit\u00e9 d&rsquo;une doctrine de cybers\u00e9curit\u00e9... <\/p>\n<div class=\"pmpro_content_message\">Art\u00edculo disponible s\u00f3lo para suscriptores.<br \/><a href=\"https:\/\/territorialchallenges.com\/wp-login.php\">Acceso<\/a><br \/><a href=\"https:\/\/territorialchallenges.com\/es\/wp-login.php\/?action=register\">Registro<\/a><\/div>","protected":false},"author":11,"featured_media":122292,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"pmpro_default_level":0,"footnotes":""},"categories":[130,117],"tags":[],"blocksy_meta":"","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybermenace \u00e9lectorale : \u00e9laboration d&#039;une doctrine de cybers\u00e9curit\u00e9 pour prot\u00e9ger la d\u00e9mocratie - Territorial Challenges<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/territorialchallenges.com\/es\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybermenace \u00e9lectorale : \u00e9laboration d&#039;une doctrine de cybers\u00e9curit\u00e9 pour prot\u00e9ger la d\u00e9mocratie - Territorial Challenges\" \/>\n<meta property=\"og:description\" content=\"Face \u00e0 la mont\u00e9e alarmante de la d\u00e9sinformation propuls\u00e9e par l&rsquo;intelligence artificielle, les \u00e9lus locaux se mobilisent pour s\u00e9curiser les \u00e9lections. \u00c0 la lumi\u00e8re des r\u00e9cents incidents, notamment l&rsquo;utilisation de deepfakes lors des primaires au New Hampshire aux Etats-Unis, des \u00e9lus et politiques amricains, tirent la sonnette d&rsquo;alarme, soulignant la n\u00e9cessit\u00e9 d&rsquo;une doctrine de cybers\u00e9curit\u00e9 [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/territorialchallenges.com\/es\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/\" \/>\n<meta property=\"og:site_name\" content=\"Territorial Challenges\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-12T18:43:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-12T18:43:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/territorialchallenges.com\/wp-content\/uploads\/2024\/02\/reflexionfaite12.02.24.Photo_.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ni.abdi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Ni.abdi\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"ni.abdi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/territorialchallenges.com\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/territorialchallenges.com\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/\"},\"author\":{\"name\":\"ni.abdi\",\"@id\":\"https:\/\/territorialchallenges.com\/#\/schema\/person\/098f145c7c61a021c425e010f840080f\"},\"headline\":\"Cybermenace \u00e9lectorale : \u00e9laboration d&rsquo;une doctrine de cybers\u00e9curit\u00e9 pour prot\u00e9ger la d\u00e9mocratie\",\"datePublished\":\"2024-02-12T18:43:41+00:00\",\"dateModified\":\"2024-02-12T18:43:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/territorialchallenges.com\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/\"},\"wordCount\":577,\"publisher\":{\"@id\":\"https:\/\/territorialchallenges.com\/#organization\"},\"articleSection\":[\"R\u00e9flexion faite\",\"\u00c9cosyst\u00e8me\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/territorialchallenges.com\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/\",\"url\":\"https:\/\/territorialchallenges.com\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/\",\"name\":\"Cybermenace \u00e9lectorale : \u00e9laboration d'une doctrine de cybers\u00e9curit\u00e9 pour prot\u00e9ger la d\u00e9mocratie - Territorial Challenges\",\"isPartOf\":{\"@id\":\"https:\/\/territorialchallenges.com\/#website\"},\"datePublished\":\"2024-02-12T18:43:41+00:00\",\"dateModified\":\"2024-02-12T18:43:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/territorialchallenges.com\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/territorialchallenges.com\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/territorialchallenges.com\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/territorialchallenges.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybermenace \u00e9lectorale : \u00e9laboration d&rsquo;une doctrine de cybers\u00e9curit\u00e9 pour prot\u00e9ger la d\u00e9mocratie\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/territorialchallenges.com\/#website\",\"url\":\"https:\/\/territorialchallenges.com\/\",\"name\":\"Territorial Challenges\",\"description\":\"Veille Internationale - Strat\u00e9gie Intelligentes - Bonnes pratiques\",\"publisher\":{\"@id\":\"https:\/\/territorialchallenges.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/territorialchallenges.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/territorialchallenges.com\/#organization\",\"name\":\"Territorial Challenges\",\"url\":\"https:\/\/territorialchallenges.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/territorialchallenges.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/territorialchallenges.com\/wp-content\/uploads\/2023\/10\/logo-1.png\",\"contentUrl\":\"https:\/\/territorialchallenges.com\/wp-content\/uploads\/2023\/10\/logo-1.png\",\"width\":1832,\"height\":576,\"caption\":\"Territorial Challenges\"},\"image\":{\"@id\":\"https:\/\/territorialchallenges.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/territorialchallenges.com\/#\/schema\/person\/098f145c7c61a021c425e010f840080f\",\"name\":\"ni.abdi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/territorialchallenges.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2a2f2491f3c80039986ba989b1e4b510?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2a2f2491f3c80039986ba989b1e4b510?s=96&d=identicon&r=g\",\"caption\":\"ni.abdi\"},\"sameAs\":[\"https:\/\/twitter.com\/Ni.abdi\"],\"url\":\"https:\/\/territorialchallenges.com\/es\/author\/ni-abdi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybermenace \u00e9lectorale : \u00e9laboration d'une doctrine de cybers\u00e9curit\u00e9 pour prot\u00e9ger la d\u00e9mocratie - Territorial Challenges","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/territorialchallenges.com\/es\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/","og_locale":"es_ES","og_type":"article","og_title":"Cybermenace \u00e9lectorale : \u00e9laboration d'une doctrine de cybers\u00e9curit\u00e9 pour prot\u00e9ger la d\u00e9mocratie - Territorial Challenges","og_description":"Face \u00e0 la mont\u00e9e alarmante de la d\u00e9sinformation propuls\u00e9e par l&rsquo;intelligence artificielle, les \u00e9lus locaux se mobilisent pour s\u00e9curiser les \u00e9lections. \u00c0 la lumi\u00e8re des r\u00e9cents incidents, notamment l&rsquo;utilisation de deepfakes lors des primaires au New Hampshire aux Etats-Unis, des \u00e9lus et politiques amricains, tirent la sonnette d&rsquo;alarme, soulignant la n\u00e9cessit\u00e9 d&rsquo;une doctrine de cybers\u00e9curit\u00e9 [&hellip;]","og_url":"https:\/\/territorialchallenges.com\/es\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/","og_site_name":"Territorial Challenges","article_published_time":"2024-02-12T18:43:41+00:00","article_modified_time":"2024-02-12T18:43:43+00:00","og_image":[{"width":1280,"height":853,"url":"https:\/\/territorialchallenges.com\/wp-content\/uploads\/2024\/02\/reflexionfaite12.02.24.Photo_.jpg","type":"image\/jpeg"}],"author":"ni.abdi","twitter_card":"summary_large_image","twitter_creator":"@Ni.abdi","twitter_misc":{"Escrito por":"ni.abdi","Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/territorialchallenges.com\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/#article","isPartOf":{"@id":"https:\/\/territorialchallenges.com\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/"},"author":{"name":"ni.abdi","@id":"https:\/\/territorialchallenges.com\/#\/schema\/person\/098f145c7c61a021c425e010f840080f"},"headline":"Cybermenace \u00e9lectorale : \u00e9laboration d&rsquo;une doctrine de cybers\u00e9curit\u00e9 pour prot\u00e9ger la d\u00e9mocratie","datePublished":"2024-02-12T18:43:41+00:00","dateModified":"2024-02-12T18:43:43+00:00","mainEntityOfPage":{"@id":"https:\/\/territorialchallenges.com\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/"},"wordCount":577,"publisher":{"@id":"https:\/\/territorialchallenges.com\/#organization"},"articleSection":["R\u00e9flexion faite","\u00c9cosyst\u00e8me"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/territorialchallenges.com\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/","url":"https:\/\/territorialchallenges.com\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/","name":"Cybermenace \u00e9lectorale : \u00e9laboration d'une doctrine de cybers\u00e9curit\u00e9 pour prot\u00e9ger la d\u00e9mocratie - Territorial Challenges","isPartOf":{"@id":"https:\/\/territorialchallenges.com\/#website"},"datePublished":"2024-02-12T18:43:41+00:00","dateModified":"2024-02-12T18:43:43+00:00","breadcrumb":{"@id":"https:\/\/territorialchallenges.com\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/territorialchallenges.com\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/territorialchallenges.com\/2024\/02\/12\/cybermenace-electorale-elaboration-dune-doctrine-de-cybersecurite-pour-proteger-la-democratie\/122291\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/territorialchallenges.com\/"},{"@type":"ListItem","position":2,"name":"Cybermenace \u00e9lectorale : \u00e9laboration d&rsquo;une doctrine de cybers\u00e9curit\u00e9 pour prot\u00e9ger la d\u00e9mocratie"}]},{"@type":"WebSite","@id":"https:\/\/territorialchallenges.com\/#website","url":"https:\/\/territorialchallenges.com\/","name":"Desaf\u00edos territoriales","description":"Monitoreo Internacional - Estrategias Inteligentes - Mejores Pr\u00e1cticas","publisher":{"@id":"https:\/\/territorialchallenges.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/territorialchallenges.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/territorialchallenges.com\/#organization","name":"Desaf\u00edos territoriales","url":"https:\/\/territorialchallenges.com\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/territorialchallenges.com\/#\/schema\/logo\/image\/","url":"https:\/\/territorialchallenges.com\/wp-content\/uploads\/2023\/10\/logo-1.png","contentUrl":"https:\/\/territorialchallenges.com\/wp-content\/uploads\/2023\/10\/logo-1.png","width":1832,"height":576,"caption":"Territorial Challenges"},"image":{"@id":"https:\/\/territorialchallenges.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/territorialchallenges.com\/#\/schema\/person\/098f145c7c61a021c425e010f840080f","name":"ni.abdi","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/territorialchallenges.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2a2f2491f3c80039986ba989b1e4b510?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2a2f2491f3c80039986ba989b1e4b510?s=96&d=identicon&r=g","caption":"ni.abdi"},"sameAs":["https:\/\/twitter.com\/Ni.abdi"],"url":"https:\/\/territorialchallenges.com\/es\/author\/ni-abdi\/"}]}},"_links":{"self":[{"href":"https:\/\/territorialchallenges.com\/es\/wp-json\/wp\/v2\/posts\/122291"}],"collection":[{"href":"https:\/\/territorialchallenges.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/territorialchallenges.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/territorialchallenges.com\/es\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/territorialchallenges.com\/es\/wp-json\/wp\/v2\/comments?post=122291"}],"version-history":[{"count":1,"href":"https:\/\/territorialchallenges.com\/es\/wp-json\/wp\/v2\/posts\/122291\/revisions"}],"predecessor-version":[{"id":122293,"href":"https:\/\/territorialchallenges.com\/es\/wp-json\/wp\/v2\/posts\/122291\/revisions\/122293"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/territorialchallenges.com\/es\/wp-json\/wp\/v2\/media\/122292"}],"wp:attachment":[{"href":"https:\/\/territorialchallenges.com\/es\/wp-json\/wp\/v2\/media?parent=122291"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/territorialchallenges.com\/es\/wp-json\/wp\/v2\/categories?post=122291"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/territorialchallenges.com\/es\/wp-json\/wp\/v2\/tags?post=122291"}],"curies":[{"name":"gracias","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}