{"id":168338,"date":"2025-09-19T13:33:39","date_gmt":"2025-09-19T13:33:39","guid":{"rendered":"https:\/\/raed.academy\/?p=168338"},"modified":"2025-09-19T13:33:39","modified_gmt":"2025-09-19T13:33:39","slug":"ciberatacs-ciberguerra-i-ciberseguretat","status":"publish","type":"post","link":"https:\/\/raed.academy\/ca\/ciberatacs-ciberguerra-i-ciberseguretat\/","title":{"rendered":"Ciberatacs, ciberguerra i ciberseguretat"},"content":{"rendered":"<div id=\"attachment_95277\" style=\"width: 341px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-95277\" class=\"wp-image-95277\" src=\"https:\/\/raed.academy\/wp-content\/uploads\/2020\/10\/August-Corominas.jpg\" alt=\"August Corominas\" width=\"331\" height=\"331\" srcset=\"https:\/\/raed.academy\/wp-content\/uploads\/2020\/10\/August-Corominas.jpg 380w, https:\/\/raed.academy\/wp-content\/uploads\/2020\/10\/August-Corominas-150x150.jpg 150w\" sizes=\"(max-width: 331px) 100vw, 331px\" \/><p id=\"caption-attachment-95277\" class=\"wp-caption-text\">Dr. August Corominas<\/p><\/div>\n<p><a href=\"https:\/\/raed.academy\/ca\/academics\/dr-august-corominas-vilardell\/\" target=\"_blank\" rel=\"noopener\"><em><strong>August Corominas<\/strong><\/em><\/a>, professor de Fisiologia Humana de la <strong>Universitat de M\u00farcia<\/strong> i de la <strong>Universitat Aut\u00f2noma de Barcelona<\/strong> i acad\u00e8mic em\u00e8rit de la <strong>Reial Acad\u00e8mia Europea de Doctors<\/strong> (RAED), comparteix amb la comunitat acad\u00e8mica l&#8217;article<strong> &#8220;Ciberatacs, ciberguerra i ciberseguretat&#8221;<\/strong>, en el qual aborda les amenaces de la guerra h\u00edbrida que afronta Occident. L&#8217;acad\u00e8mic ha compartit recentment en aquesta publicaci\u00f3 els articles <a href=\"https:\/\/raed.academy\/ca\/els-secrets-de-la-longevitat-i-les-zones-blaves\/\" target=\"_blank\" rel=\"noopener\"><strong>Els secrets de la longevitat i les &#8216;zones blaves&#8217;<\/strong><\/a>, <a href=\"https:\/\/raed.academy\/ca\/atencio-a-les-caigudes-de-nit-i-de-dia\/\" target=\"_blank\" rel=\"noopener\"><strong>&#8220;Atenci\u00f3 a les caigudes, de nit i de dia&#8221;<\/strong><\/a>,\u00a0<a href=\"https:\/\/raed.academy\/ca\/la-bona-vida-i-la-vida-bona\/\" target=\"_blank\" rel=\"noopener\"><strong>&#8220;La bona vida i la vida bona&#8221;<\/strong><\/a>, <a href=\"https:\/\/raed.academy\/ca\/vida-biologica-i-vida-quantica\/\" target=\"_blank\" rel=\"noopener\"><strong>&#8220;Vida biol\u00f2gica i Vida Qu\u00e0ntica&#8221;<\/strong><\/a>, <a href=\"https:\/\/raed.academy\/ca\/lera-dels-hospitals-intel%c2%b7ligents\/\" target=\"_blank\" rel=\"noopener\"><strong>&#8220;Hospitals intel\u00b7ligents&#8221;<\/strong><\/a>, <a href=\"https:\/\/raed.academy\/ca\/cosmonautica-i-medicina-espacial\/\" target=\"_blank\" rel=\"noopener\"><strong>&#8220;Cosmon\u00e0utica i medicina espacial&#8221;<\/strong><\/a>, <a href=\"https:\/\/raed.academy\/ca\/el-maltractament-i-la-seva-gestio\/\" target=\"_blank\" rel=\"noopener\"><strong>&#8220;El maltractament i la seva gesti\u00f3&#8221;<\/strong><\/a>, <a href=\"https:\/\/raed.academy\/ca\/biologia-quantica\/\" target=\"_blank\" rel=\"noopener\"><strong>&#8220;Biologia qu\u00e0ntica&#8221;<\/strong><\/a>, <a href=\"https:\/\/raed.academy\/ca\/lexemple-del-negre-de-banyoles\/\" target=\"_blank\" rel=\"noopener\"><strong>&#8220;El negre de Banyoles (boixim\u00e0 o hotentot)&#8221;<\/strong><\/a>, <a href=\"https:\/\/raed.academy\/ca\/polidactilia-la-peculiaritat-de-tenir-sis-dits\/\" target=\"_blank\" rel=\"noopener\"><strong>&#8220;Polidact\u00edlia&#8221;<\/strong><\/a>, <a href=\"https:\/\/raed.academy\/ca\/ladolescencia-una-edat-critica\/\" target=\"_blank\" rel=\"noopener\"><strong>&#8220;Adolesc\u00e8ncia, edat cr\u00edtica de la vida humana&#8221;<\/strong><\/a>, <a href=\"https:\/\/raed.academy\/ca\/de-les-sirenes-a-les-actuals-quimeres\/\" target=\"_blank\" rel=\"noopener\"><strong>&#8220;Les sirenes, il\u00b7lusi\u00f3 de navegants i homes de mar&#8221;<\/strong><\/a>, <a href=\"https:\/\/raed.academy\/ca\/alimentacio-biblica-i-dieta-mediterrania\/\" target=\"_blank\" rel=\"noopener\"><strong>&#8220;Alimentaci\u00f3 b\u00edblica: aliments purs i aliments impurs&#8221;<\/strong><\/a>,\u00a0<a href=\"https:\/\/raed.academy\/ca\/la-gana-a-gaza\/\" target=\"_blank\" rel=\"noopener\"><strong>&#8220;Els fam\u00e8lics de Gaza&#8221;<\/strong><\/a> i <a href=\"https:\/\/raed.academy\/ca\/el-sexe-de-ladolescencia-a-la-somatopausa\/\" target=\"_blank\" rel=\"noopener\"><strong>&#8220;Sexologia a l&#8217;adolesc\u00e8ncia i a la somatopausa: (andropausa i menopausa)<\/strong><\/a>. A m\u00e9s \u00e9s autor d&#8217;un dels cap\u00edtols del llibre <strong>&#8220;Vitalidad al envejecer. Si lo deseas, puedes vivir m\u00e1s a\u00f1os con salud&#8221;<\/strong>, editat per la Reial Corporaci\u00f3 amb el suport de <strong>Vichy Catal\u00e1n<\/strong>.<\/p>\n<h2>Ciberatacs, ciberguerra i ciberseguretat<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-168215 alignleft\" src=\"https:\/\/raed.academy\/wp-content\/uploads\/2025\/09\/shutt-ciberataques-ciberguerra-ciberseguridad-1.67.webp\" sizes=\"(max-width: 600px) 100vw, 600px\" srcset=\"https:\/\/raed.academy\/wp-content\/uploads\/2025\/09\/shutt-ciberataques-ciberguerra-ciberseguridad-1.67.webp 600w, https:\/\/raed.academy\/wp-content\/uploads\/2025\/09\/shutt-ciberataques-ciberguerra-ciberseguridad-1.67-440x264.webp 440w\" alt=\"\" width=\"600\" height=\"360\" \/>La seguretat i privacitat avui, segle XXI:<\/p>\n<p>R\u00fassia\u00a0\u00e9s un dels pa\u00efsos amb m\u00e9s capacitat en ciberatacs i operacions de ciberguerra.<\/p>\n<p>Capacitat t\u00e8cnica: R\u00fassia disposa de grups de hackers vinculats directament o indirectament a l&#8217;Estat (APT28 Fancy Bear, APT29 Cozy Bear, Sandworm, etc.).<\/p>\n<ul>\n<li>Poden llan\u00e7ar atacs massius contra infraestructures cr\u00edtiques (electricitat, transporti, hospitals, bancs).<\/li>\n<li>S\u00f3n experts en guerra h\u00edbrida, \u00e9s a dir, combinar desinformaci\u00f3, propaganda en xarxes i ciberatacs.<\/li>\n<\/ul>\n<p>Objectius: Pa\u00efsos ve\u00efns (Ucra\u00efna,\u00a0Est\u00f2nia,\u00a0Pol\u00f2nia,\u00a0Finl\u00e0ndia\u2026) han patit atacs molt greus. Tamb\u00e9 poden actuar contra pa\u00efsos llunyans (Estats Units,\u00a0Regne Unit,\u00a0Alemanya), aprofitant la xarxa global.<\/p>\n<ul>\n<li>La dist\u00e0ncia no importa en ciberespai: un atac pot llan\u00e7ar-se des de Moscou contra un hospital a Barcelona en segons.<\/li>\n<\/ul>\n<p>Escala de l&#8217;amena\u00e7a: S\u2019han documentat atacs amb desenes de milers o milions d&#8217;intents d&#8217;intrusi\u00f3 per dia.<\/p>\n<ul>\n<li>60.000 interaccions \u00e9s un volum perfectament plausible per a un atac dirigit contra un ministeri, un servidor militar o fins i tot una universitat.<\/li>\n<\/ul>\n<p>Exemples hist\u00f2rics:<\/p>\n<ul>\n<li>Est\u00f2nia (2007): atacs massius van deixar sense serveis bancaris, administratius i de premsa el pa\u00eds durant setmanes.<\/li>\n<li>Ucra\u00efna (2015 i 2016): hackeig de la xarxa el\u00e8ctrica, milions de persones sense llum.<\/li>\n<li>Estats Units (2016): interfer\u00e8ncies en eleccions, hackejo de correus electr\u00f2nics del <strong>Partit Dem\u00f2crata<\/strong>.<\/li>\n<li>Avi\u00f3 de la presidenta de\u00a0<strong>Comissi\u00f3\u00a0Europea<\/strong> (2025): \u00e9s, ara per ara, l&#8217;\u00faltim i m\u00e9s significatiu exemple.<\/li>\n<\/ul>\n<p>En resum: s\u00ed, R\u00fassia (i tamb\u00e9 d&#8217;altres pa\u00efsos) poden atacar tant a ve\u00efns com a pa\u00efsos llunyans. La ciberseguretat s&#8217;ha convertit en un nou camp de batalla global, on 60.000 interaccions serien nom\u00e9s una dada m\u00e9s dins d&#8217;operacions molt m\u00e9s grans.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>August Corominas aborda les amenaces de la guerra h\u00edbrida que afronta Occident, a l&#8217;article &#8220;Ciberataques, ciberguerra y ciberseguridad&#8221;<\/p>\n","protected":false},"author":12,"featured_media":168216,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[436,380,325,354],"tags":[],"class_list":["post-168338","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-computacio","category-conflictes-bellics","category-enginyeria-industrial","category-tecnologies-de-la-informacio-i-de-la-comunicacio","et-has-post-format-content","et_post_format-et-post-format-standard"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ciberatacs, ciberguerra i ciberseguretat - Reial Acad\u00e8mia Europea de Doctors<\/title>\n<meta name=\"description\" content=\"August Corominas aborda les amenaces de la guerra h\u00edbrida que afronta Occident, a l&#039;article &quot;Ciberataques, ciberguerra y ciberseguridad&quot;\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/raed.academy\/ca\/ciberatacs-ciberguerra-i-ciberseguretat\/\" \/>\n<meta property=\"og:locale\" content=\"ca_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ciberatacs, ciberguerra i ciberseguretat - Reial Acad\u00e8mia Europea de Doctors\" \/>\n<meta property=\"og:description\" content=\"August Corominas aborda les amenaces de la guerra h\u00edbrida que afronta Occident, a l&#039;article &quot;Ciberataques, ciberguerra y ciberseguridad&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/raed.academy\/ca\/ciberatacs-ciberguerra-i-ciberseguretat\/\" \/>\n<meta property=\"og:site_name\" content=\"Reial Acad\u00e8mia Europea de Doctors\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/fb.me\/raed.academy\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-19T13:33:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/raed.academy\/wp-content\/uploads\/2025\/09\/shutt-ciberataques-ciberguerra-ciberseguridad-1.67.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"360\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"RAED\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@raedacademy\" \/>\n<meta name=\"twitter:site\" content=\"@raedacademy\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"RAED\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/raed.academy\\\/ca\\\/ciberatacs-ciberguerra-i-ciberseguretat\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/raed.academy\\\/ca\\\/ciberatacs-ciberguerra-i-ciberseguretat\\\/\"},\"author\":{\"name\":\"RAED\",\"@id\":\"https:\\\/\\\/raed.academy\\\/ca\\\/#\\\/schema\\\/person\\\/5a755da80d1d979fd66ba745c8702927\"},\"headline\":\"Ciberatacs, ciberguerra i ciberseguretat\",\"datePublished\":\"2025-09-19T13:33:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/raed.academy\\\/ca\\\/ciberatacs-ciberguerra-i-ciberseguretat\\\/\"},\"wordCount\":527,\"publisher\":{\"@id\":\"https:\\\/\\\/raed.academy\\\/ca\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/raed.academy\\\/ca\\\/ciberatacs-ciberguerra-i-ciberseguretat\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/raed.academy\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/shutt-ciberataques-ciberguerra-ciberseguridad-1.67.webp\",\"articleSection\":[\"Computaci\u00f3\",\"Conflictes b\u00e8l\u00b7lics\",\"Enginyeria industrial\",\"Tecnologies de la informaci\u00f3 i de la comunicaci\u00f3\"],\"inLanguage\":\"ca-ES\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/raed.academy\\\/ca\\\/ciberatacs-ciberguerra-i-ciberseguretat\\\/\",\"url\":\"https:\\\/\\\/raed.academy\\\/ca\\\/ciberatacs-ciberguerra-i-ciberseguretat\\\/\",\"name\":\"Ciberatacs, ciberguerra i ciberseguretat - Reial Acad\u00e8mia Europea de Doctors\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/raed.academy\\\/ca\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/raed.academy\\\/ca\\\/ciberatacs-ciberguerra-i-ciberseguretat\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/raed.academy\\\/ca\\\/ciberatacs-ciberguerra-i-ciberseguretat\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/raed.academy\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/shutt-ciberataques-ciberguerra-ciberseguridad-1.67.webp\",\"datePublished\":\"2025-09-19T13:33:39+00:00\",\"description\":\"August Corominas aborda les amenaces de la guerra h\u00edbrida que afronta Occident, a l'article \\\"Ciberataques, ciberguerra y ciberseguridad\\\"\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/raed.academy\\\/ca\\\/ciberatacs-ciberguerra-i-ciberseguretat\\\/#breadcrumb\"},\"inLanguage\":\"ca-ES\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/raed.academy\\\/ca\\\/ciberatacs-ciberguerra-i-ciberseguretat\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ca-ES\",\"@id\":\"https:\\\/\\\/raed.academy\\\/ca\\\/ciberatacs-ciberguerra-i-ciberseguretat\\\/#primaryimage\",\"url\":\"https:\\\/\\\/raed.academy\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/shutt-ciberataques-ciberguerra-ciberseguridad-1.67.webp\",\"contentUrl\":\"https:\\\/\\\/raed.academy\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/shutt-ciberataques-ciberguerra-ciberseguridad-1.67.webp\",\"width\":600,\"height\":360},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/raed.academy\\\/ca\\\/ciberatacs-ciberguerra-i-ciberseguretat\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\\\/\\\/raed.academy\\\/ca\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ciberatacs, ciberguerra i ciberseguretat\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/raed.academy\\\/ca\\\/#website\",\"url\":\"https:\\\/\\\/raed.academy\\\/ca\\\/\",\"name\":\"Reial Acad\u00e8mia Europea de Doctors\",\"description\":\"Corporaci\u00f3n de derecho p\u00fablico de car\u00e1cter cient\u00edfico, t\u00e9cnico y art\u00edstico, que tiene por objeto la investigaci\u00f3n, el estudio, el fomento y la extensi\u00f3n del conocimiento en su sentido m\u00e1s amplio\",\"publisher\":{\"@id\":\"https:\\\/\\\/raed.academy\\\/ca\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/raed.academy\\\/ca\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ca-ES\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/raed.academy\\\/ca\\\/#organization\",\"name\":\"Real Academia Europea de Doctores\",\"url\":\"https:\\\/\\\/raed.academy\\\/ca\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca-ES\",\"@id\":\"https:\\\/\\\/raed.academy\\\/ca\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/raed.academy\\\/wp-content\\\/uploads\\\/2017\\\/01\\\/cropped-logo_raed.png\",\"contentUrl\":\"https:\\\/\\\/raed.academy\\\/wp-content\\\/uploads\\\/2017\\\/01\\\/cropped-logo_raed.png\",\"width\":512,\"height\":512,\"caption\":\"Real Academia Europea de Doctores\"},\"image\":{\"@id\":\"https:\\\/\\\/raed.academy\\\/ca\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"http:\\\/\\\/fb.me\\\/raed.academy\",\"https:\\\/\\\/x.com\\\/raedacademy\",\"https:\\\/\\\/www.instagram.com\\\/raed.academy\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCUYQwW2KrdirNWihxMDObwg\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/raed.academy\\\/ca\\\/#\\\/schema\\\/person\\\/5a755da80d1d979fd66ba745c8702927\",\"name\":\"RAED\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca-ES\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/19fdfdc0d67fb9c45714b703a2ac82251c4fcea3637f002ac3c9b74c0183583c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/19fdfdc0d67fb9c45714b703a2ac82251c4fcea3637f002ac3c9b74c0183583c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/19fdfdc0d67fb9c45714b703a2ac82251c4fcea3637f002ac3c9b74c0183583c?s=96&d=mm&r=g\",\"caption\":\"RAED\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ciberatacs, ciberguerra i ciberseguretat - Reial Acad\u00e8mia Europea de Doctors","description":"August Corominas aborda les amenaces de la guerra h\u00edbrida que afronta Occident, a l'article \"Ciberataques, ciberguerra y ciberseguridad\"","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/raed.academy\/ca\/ciberatacs-ciberguerra-i-ciberseguretat\/","og_locale":"ca_ES","og_type":"article","og_title":"Ciberatacs, ciberguerra i ciberseguretat - Reial Acad\u00e8mia Europea de Doctors","og_description":"August Corominas aborda les amenaces de la guerra h\u00edbrida que afronta Occident, a l'article \"Ciberataques, ciberguerra y ciberseguridad\"","og_url":"https:\/\/raed.academy\/ca\/ciberatacs-ciberguerra-i-ciberseguretat\/","og_site_name":"Reial Acad\u00e8mia Europea de Doctors","article_publisher":"http:\/\/fb.me\/raed.academy","article_published_time":"2025-09-19T13:33:39+00:00","og_image":[{"width":600,"height":360,"url":"https:\/\/raed.academy\/wp-content\/uploads\/2025\/09\/shutt-ciberataques-ciberguerra-ciberseguridad-1.67.webp","type":"image\/webp"}],"author":"RAED","twitter_card":"summary_large_image","twitter_creator":"@raedacademy","twitter_site":"@raedacademy","twitter_misc":{"Written by":"RAED","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/raed.academy\/ca\/ciberatacs-ciberguerra-i-ciberseguretat\/#article","isPartOf":{"@id":"https:\/\/raed.academy\/ca\/ciberatacs-ciberguerra-i-ciberseguretat\/"},"author":{"name":"RAED","@id":"https:\/\/raed.academy\/ca\/#\/schema\/person\/5a755da80d1d979fd66ba745c8702927"},"headline":"Ciberatacs, ciberguerra i ciberseguretat","datePublished":"2025-09-19T13:33:39+00:00","mainEntityOfPage":{"@id":"https:\/\/raed.academy\/ca\/ciberatacs-ciberguerra-i-ciberseguretat\/"},"wordCount":527,"publisher":{"@id":"https:\/\/raed.academy\/ca\/#organization"},"image":{"@id":"https:\/\/raed.academy\/ca\/ciberatacs-ciberguerra-i-ciberseguretat\/#primaryimage"},"thumbnailUrl":"https:\/\/raed.academy\/wp-content\/uploads\/2025\/09\/shutt-ciberataques-ciberguerra-ciberseguridad-1.67.webp","articleSection":["Computaci\u00f3","Conflictes b\u00e8l\u00b7lics","Enginyeria industrial","Tecnologies de la informaci\u00f3 i de la comunicaci\u00f3"],"inLanguage":"ca-ES"},{"@type":"WebPage","@id":"https:\/\/raed.academy\/ca\/ciberatacs-ciberguerra-i-ciberseguretat\/","url":"https:\/\/raed.academy\/ca\/ciberatacs-ciberguerra-i-ciberseguretat\/","name":"Ciberatacs, ciberguerra i ciberseguretat - Reial Acad\u00e8mia Europea de Doctors","isPartOf":{"@id":"https:\/\/raed.academy\/ca\/#website"},"primaryImageOfPage":{"@id":"https:\/\/raed.academy\/ca\/ciberatacs-ciberguerra-i-ciberseguretat\/#primaryimage"},"image":{"@id":"https:\/\/raed.academy\/ca\/ciberatacs-ciberguerra-i-ciberseguretat\/#primaryimage"},"thumbnailUrl":"https:\/\/raed.academy\/wp-content\/uploads\/2025\/09\/shutt-ciberataques-ciberguerra-ciberseguridad-1.67.webp","datePublished":"2025-09-19T13:33:39+00:00","description":"August Corominas aborda les amenaces de la guerra h\u00edbrida que afronta Occident, a l'article \"Ciberataques, ciberguerra y ciberseguridad\"","breadcrumb":{"@id":"https:\/\/raed.academy\/ca\/ciberatacs-ciberguerra-i-ciberseguretat\/#breadcrumb"},"inLanguage":"ca-ES","potentialAction":[{"@type":"ReadAction","target":["https:\/\/raed.academy\/ca\/ciberatacs-ciberguerra-i-ciberseguretat\/"]}]},{"@type":"ImageObject","inLanguage":"ca-ES","@id":"https:\/\/raed.academy\/ca\/ciberatacs-ciberguerra-i-ciberseguretat\/#primaryimage","url":"https:\/\/raed.academy\/wp-content\/uploads\/2025\/09\/shutt-ciberataques-ciberguerra-ciberseguridad-1.67.webp","contentUrl":"https:\/\/raed.academy\/wp-content\/uploads\/2025\/09\/shutt-ciberataques-ciberguerra-ciberseguridad-1.67.webp","width":600,"height":360},{"@type":"BreadcrumbList","@id":"https:\/\/raed.academy\/ca\/ciberatacs-ciberguerra-i-ciberseguretat\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/raed.academy\/ca\/"},{"@type":"ListItem","position":2,"name":"Ciberatacs, ciberguerra i ciberseguretat"}]},{"@type":"WebSite","@id":"https:\/\/raed.academy\/ca\/#website","url":"https:\/\/raed.academy\/ca\/","name":"Reial Acad\u00e8mia Europea de Doctors","description":"Corporaci\u00f3n de derecho p\u00fablico de car\u00e1cter cient\u00edfico, t\u00e9cnico y art\u00edstico, que tiene por objeto la investigaci\u00f3n, el estudio, el fomento y la extensi\u00f3n del conocimiento en su sentido m\u00e1s amplio","publisher":{"@id":"https:\/\/raed.academy\/ca\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/raed.academy\/ca\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ca-ES"},{"@type":"Organization","@id":"https:\/\/raed.academy\/ca\/#organization","name":"Real Academia Europea de Doctores","url":"https:\/\/raed.academy\/ca\/","logo":{"@type":"ImageObject","inLanguage":"ca-ES","@id":"https:\/\/raed.academy\/ca\/#\/schema\/logo\/image\/","url":"https:\/\/raed.academy\/wp-content\/uploads\/2017\/01\/cropped-logo_raed.png","contentUrl":"https:\/\/raed.academy\/wp-content\/uploads\/2017\/01\/cropped-logo_raed.png","width":512,"height":512,"caption":"Real Academia Europea de Doctores"},"image":{"@id":"https:\/\/raed.academy\/ca\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/fb.me\/raed.academy","https:\/\/x.com\/raedacademy","https:\/\/www.instagram.com\/raed.academy\/","https:\/\/www.youtube.com\/channel\/UCUYQwW2KrdirNWihxMDObwg"]},{"@type":"Person","@id":"https:\/\/raed.academy\/ca\/#\/schema\/person\/5a755da80d1d979fd66ba745c8702927","name":"RAED","image":{"@type":"ImageObject","inLanguage":"ca-ES","@id":"https:\/\/secure.gravatar.com\/avatar\/19fdfdc0d67fb9c45714b703a2ac82251c4fcea3637f002ac3c9b74c0183583c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/19fdfdc0d67fb9c45714b703a2ac82251c4fcea3637f002ac3c9b74c0183583c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/19fdfdc0d67fb9c45714b703a2ac82251c4fcea3637f002ac3c9b74c0183583c?s=96&d=mm&r=g","caption":"RAED"}}]}},"_links":{"self":[{"href":"https:\/\/raed.academy\/ca\/wp-json\/wp\/v2\/posts\/168338","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/raed.academy\/ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/raed.academy\/ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/raed.academy\/ca\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/raed.academy\/ca\/wp-json\/wp\/v2\/comments?post=168338"}],"version-history":[{"count":3,"href":"https:\/\/raed.academy\/ca\/wp-json\/wp\/v2\/posts\/168338\/revisions"}],"predecessor-version":[{"id":168386,"href":"https:\/\/raed.academy\/ca\/wp-json\/wp\/v2\/posts\/168338\/revisions\/168386"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/raed.academy\/ca\/wp-json\/wp\/v2\/media\/168216"}],"wp:attachment":[{"href":"https:\/\/raed.academy\/ca\/wp-json\/wp\/v2\/media?parent=168338"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/raed.academy\/ca\/wp-json\/wp\/v2\/categories?post=168338"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/raed.academy\/ca\/wp-json\/wp\/v2\/tags?post=168338"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}