{"id":1152,"date":"2023-07-23T10:03:53","date_gmt":"2023-07-23T13:03:53","guid":{"rendered":"https:\/\/fysinformatica.com\/new2\/?p=1152"},"modified":"2025-03-01T09:33:06","modified_gmt":"2025-03-01T12:33:06","slug":"caso-analisis-forense-en-sistema-de-acceso","status":"publish","type":"post","link":"https:\/\/fysinformatica.com\/new2\/caso-analisis-forense-en-sistema-de-acceso\/","title":{"rendered":"Causa Judicial &#8211; An\u00e1lisis Forense en Sistema de Acceso"},"content":{"rendered":"<h1><div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Alternar tabla de contenidos\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-1'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/fysinformatica.com\/new2\/caso-analisis-forense-en-sistema-de-acceso\/#Titulo_del_caso\" >T\u00edtulo del caso<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-1'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/fysinformatica.com\/new2\/caso-analisis-forense-en-sistema-de-acceso\/#Descripcion_del_caso\" >Descripci\u00f3n del caso:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-1'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/fysinformatica.com\/new2\/caso-analisis-forense-en-sistema-de-acceso\/#Puntos_de_pericia\" >Puntos de pericia<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-1'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/fysinformatica.com\/new2\/caso-analisis-forense-en-sistema-de-acceso\/#Contenido_del_informe\" >Contenido del informe<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-1'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/fysinformatica.com\/new2\/caso-analisis-forense-en-sistema-de-acceso\/#Metodologia_utilizada\" >Metodolog\u00eda utilizada<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-1'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/fysinformatica.com\/new2\/caso-analisis-forense-en-sistema-de-acceso\/#Conclusiones\" >Conclusiones<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-1'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/fysinformatica.com\/new2\/caso-analisis-forense-en-sistema-de-acceso\/#Sentencia\" >Sentencia<\/a><\/li><\/ul><\/nav><\/div>\n<\/h1>\n<h1><span class=\"ez-toc-section\" id=\"Titulo_del_caso\"><\/span>T\u00edtulo del caso<span class=\"ez-toc-section-end\"><\/span><\/h1>\n<ul style=\"list-style-type: disc;\">\n<li>Expediente: CNT 050163\/2014<\/li>\n<li><label>Jurisdicci\u00f3n: <\/label><span id=\"expediente:j_idt90:detailCamera\" class=\"form_control\">C\u00e1mara Nacional de Apelaciones del Trabajo<\/span><span id=\"expediente:j_idt85:detailCamera\"><\/span><\/li>\n<li class=\"row no-margin no-padding\">\n<div class=\"col-xs-12 col-sm-12 col-md-12 col-lg-12\">\n<div class=\"form-group\">\n<div><label for=\"detailDependencia\">Dependencia:\u00a0<\/label><span id=\"expediente:j_idt90:detailDependencia\" class=\"form_control\">JUZGADO NACIONAL DE 1RA INSTANCIA DEL TRABAJO NRO. 10<\/span><\/div>\n<div><\/div>\n<\/div>\n<\/div>\n<\/li>\n<\/ul>\n<h1><span class=\"ez-toc-section\" id=\"Descripcion_del_caso\"><\/span>Descripci\u00f3n del caso:<span class=\"ez-toc-section-end\"><\/span><\/h1>\n<p style=\"text-align: justify;\">En el presente caso, se llev\u00f3 a cabo mediante la presencia del perito en las instalaciones de la empresa, desde donde se produjo el an\u00e1lisis forense en el sistema de acceso que la empresa pose\u00eda. Con el prop\u00f3sito de realizar la adquisici\u00f3n y preservaci\u00f3n de la evidencia que surge desde los sistemas de la empresa. A trav\u00e9s de este proceso, se logr\u00f3 recuperar informaci\u00f3n relevante, que resultaron fundamentales para el posterior dictamen judicial.<\/p>\n<h1><span class=\"ez-toc-section\" id=\"Puntos_de_pericia\"><\/span>Puntos de pericia<span class=\"ez-toc-section-end\"><\/span><\/h1>\n<p>La siguiente imagen muestra los puntos de perica de la causa.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1155 aligncenter\" src=\"https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Puntos-de-perica-CNT-050163-2014-300x87.png\" alt=\"\" width=\"634\" height=\"184\" srcset=\"https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Puntos-de-perica-CNT-050163-2014-300x87.png 300w, https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Puntos-de-perica-CNT-050163-2014.png 670w\" sizes=\"auto, (max-width: 634px) 100vw, 634px\" \/><\/p>\n<h1><\/h1>\n<h1><span class=\"ez-toc-section\" id=\"Contenido_del_informe\"><\/span>Contenido del informe<span class=\"ez-toc-section-end\"><\/span><\/h1>\n<p>A continuaci\u00f3n, se presenta detalladamente el contenido del informe a trav\u00e9s de la siguiente imagen.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1156 aligncenter\" src=\"https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Contenido-CNT-050163-2014-300x68.png\" alt=\"\" width=\"666\" height=\"151\" srcset=\"https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Contenido-CNT-050163-2014-300x68.png 300w, https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Contenido-CNT-050163-2014.png 665w\" sizes=\"auto, (max-width: 666px) 100vw, 666px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h1><span class=\"ez-toc-section\" id=\"Metodologia_utilizada\"><\/span>Metodolog\u00eda utilizada<span class=\"ez-toc-section-end\"><\/span><\/h1>\n<p>Para el presente caso, se aplicaron las <a href=\"https:\/\/fysinformatica.com\/new2\/2023\/01\/15\/fases-del-analisis-informatico-forense\/\" target=\"_blank\" rel=\"noopener\">Fases del An\u00e1lisis Inform\u00e1tico Forense<\/a><\/p>\n<p>&nbsp;<\/p>\n<h1><span class=\"ez-toc-section\" id=\"Conclusiones\"><\/span>Conclusiones<span class=\"ez-toc-section-end\"><\/span><\/h1>\n<p>A continuaci\u00f3n, se muestra la conclusi\u00f3n del informe pericial en la siguiente imagen:<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1158 aligncenter\" src=\"https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Conclusiones-CNT-050163-2014-300x67.png\" alt=\"\" width=\"717\" height=\"160\" srcset=\"https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Conclusiones-CNT-050163-2014-300x67.png 300w, https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Conclusiones-CNT-050163-2014.png 677w\" sizes=\"auto, (max-width: 717px) 100vw, 717px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h1><span class=\"ez-toc-section\" id=\"Sentencia\"><\/span>Sentencia<span class=\"ez-toc-section-end\"><\/span><\/h1>\n<p>A continuaci\u00f3n, se presenta una imagen que muestra un fragmento de la sentencia judicial, en el cual se toma en consideraci\u00f3n la tarea llevada a cabo en el proceso.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1159 aligncenter\" src=\"https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Sentencia-CNT-050163-2014-300x180.png\" alt=\"\" width=\"673\" height=\"404\" srcset=\"https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Sentencia-CNT-050163-2014-300x180.png 300w, https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Sentencia-CNT-050163-2014.png 718w\" sizes=\"auto, (max-width: 673px) 100vw, 673px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>T\u00edtulo del caso Expediente: CNT 050163\/2014 Jurisdicci\u00f3n: C\u00e1mara Nacional de Apelaciones del Trabajo Dependencia:\u00a0JUZGADO NACIONAL DE 1RA INSTANCIA DEL TRABAJO NRO. 10 Descripci\u00f3n del caso: En el presente caso, se llev\u00f3 a cabo mediante la presencia del perito en las instalaciones de la empresa, desde donde se produjo el an\u00e1lisis forense en el sistema de [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1161,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[54],"tags":[],"class_list":["post-1152","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-portfolio"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Causa Judicial - An\u00e1lisis Forense en Sistema de Acceso - Perito Inform\u00e1tico Forense<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fysinformatica.com\/new2\/caso-analisis-forense-en-sistema-de-acceso\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Causa Judicial - An\u00e1lisis Forense en Sistema de Acceso - Perito Inform\u00e1tico Forense\" \/>\n<meta property=\"og:description\" content=\"T\u00edtulo del caso Expediente: CNT 050163\/2014 Jurisdicci\u00f3n: C\u00e1mara Nacional de Apelaciones del Trabajo Dependencia:\u00a0JUZGADO NACIONAL DE 1RA INSTANCIA DEL TRABAJO NRO. 10 Descripci\u00f3n del caso: En el presente caso, se llev\u00f3 a cabo mediante la presencia del perito en las instalaciones de la empresa, desde donde se produjo el an\u00e1lisis forense en el sistema de [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fysinformatica.com\/new2\/caso-analisis-forense-en-sistema-de-acceso\/\" \/>\n<meta property=\"og:site_name\" content=\"Perito Inform\u00e1tico Forense\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-23T13:03:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-01T12:33:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Diseno-de-imagen-16.png\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"540\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Fabi\u00e1n Abel Rocha\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fabi\u00e1n Abel Rocha\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/caso-analisis-forense-en-sistema-de-acceso\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/caso-analisis-forense-en-sistema-de-acceso\\\/\"},\"author\":{\"name\":\"Fabi\u00e1n Abel Rocha\",\"@id\":\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/#\\\/schema\\\/person\\\/5ec1f03e4a0ea7b72643b272b7236c13\"},\"headline\":\"Causa Judicial &#8211; An\u00e1lisis Forense en Sistema de Acceso\",\"datePublished\":\"2023-07-23T13:03:53+00:00\",\"dateModified\":\"2025-03-01T12:33:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/caso-analisis-forense-en-sistema-de-acceso\\\/\"},\"wordCount\":224,\"publisher\":{\"@id\":\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/#\\\/schema\\\/person\\\/5ec1f03e4a0ea7b72643b272b7236c13\"},\"image\":{\"@id\":\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/caso-analisis-forense-en-sistema-de-acceso\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/Diseno-de-imagen-16.png\",\"articleSection\":[\"Portfolio\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/caso-analisis-forense-en-sistema-de-acceso\\\/\",\"url\":\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/caso-analisis-forense-en-sistema-de-acceso\\\/\",\"name\":\"Causa Judicial - An\u00e1lisis Forense en Sistema de Acceso - Perito Inform\u00e1tico Forense\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/caso-analisis-forense-en-sistema-de-acceso\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/caso-analisis-forense-en-sistema-de-acceso\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/Diseno-de-imagen-16.png\",\"datePublished\":\"2023-07-23T13:03:53+00:00\",\"dateModified\":\"2025-03-01T12:33:06+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/caso-analisis-forense-en-sistema-de-acceso\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/caso-analisis-forense-en-sistema-de-acceso\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/caso-analisis-forense-en-sistema-de-acceso\\\/#primaryimage\",\"url\":\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/Diseno-de-imagen-16.png\",\"contentUrl\":\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/Diseno-de-imagen-16.png\",\"width\":960,\"height\":540},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/caso-analisis-forense-en-sistema-de-acceso\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Causa Judicial &#8211; An\u00e1lisis Forense en Sistema de Acceso\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/#website\",\"url\":\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/\",\"name\":\"Perito Inform\u00e1tico Forense\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/#\\\/schema\\\/person\\\/5ec1f03e4a0ea7b72643b272b7236c13\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/#\\\/schema\\\/person\\\/5ec1f03e4a0ea7b72643b272b7236c13\",\"name\":\"Fabi\u00e1n Abel Rocha\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8c8f49babfab8102e90e4cbe9472df2cbb160e9ea66074070642c8e707185647?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8c8f49babfab8102e90e4cbe9472df2cbb160e9ea66074070642c8e707185647?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8c8f49babfab8102e90e4cbe9472df2cbb160e9ea66074070642c8e707185647?s=96&d=mm&r=g\",\"caption\":\"Fabi\u00e1n Abel Rocha\"},\"logo\":{\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8c8f49babfab8102e90e4cbe9472df2cbb160e9ea66074070642c8e707185647?s=96&d=mm&r=g\"},\"sameAs\":[\"https:\\\/\\\/fysinformatica.com\\\/new2\"],\"url\":\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/author\\\/frocha\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Causa Judicial - An\u00e1lisis Forense en Sistema de Acceso - Perito Inform\u00e1tico Forense","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fysinformatica.com\/new2\/caso-analisis-forense-en-sistema-de-acceso\/","og_locale":"es_ES","og_type":"article","og_title":"Causa Judicial - An\u00e1lisis Forense en Sistema de Acceso - Perito Inform\u00e1tico Forense","og_description":"T\u00edtulo del caso Expediente: CNT 050163\/2014 Jurisdicci\u00f3n: C\u00e1mara Nacional de Apelaciones del Trabajo Dependencia:\u00a0JUZGADO NACIONAL DE 1RA INSTANCIA DEL TRABAJO NRO. 10 Descripci\u00f3n del caso: En el presente caso, se llev\u00f3 a cabo mediante la presencia del perito en las instalaciones de la empresa, desde donde se produjo el an\u00e1lisis forense en el sistema de [&hellip;]","og_url":"https:\/\/fysinformatica.com\/new2\/caso-analisis-forense-en-sistema-de-acceso\/","og_site_name":"Perito Inform\u00e1tico Forense","article_published_time":"2023-07-23T13:03:53+00:00","article_modified_time":"2025-03-01T12:33:06+00:00","og_image":[{"width":960,"height":540,"url":"https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Diseno-de-imagen-16.png","type":"image\/png"}],"author":"Fabi\u00e1n Abel Rocha","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Fabi\u00e1n Abel Rocha","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fysinformatica.com\/new2\/caso-analisis-forense-en-sistema-de-acceso\/#article","isPartOf":{"@id":"https:\/\/fysinformatica.com\/new2\/caso-analisis-forense-en-sistema-de-acceso\/"},"author":{"name":"Fabi\u00e1n Abel Rocha","@id":"https:\/\/fysinformatica.com\/new2\/#\/schema\/person\/5ec1f03e4a0ea7b72643b272b7236c13"},"headline":"Causa Judicial &#8211; An\u00e1lisis Forense en Sistema de Acceso","datePublished":"2023-07-23T13:03:53+00:00","dateModified":"2025-03-01T12:33:06+00:00","mainEntityOfPage":{"@id":"https:\/\/fysinformatica.com\/new2\/caso-analisis-forense-en-sistema-de-acceso\/"},"wordCount":224,"publisher":{"@id":"https:\/\/fysinformatica.com\/new2\/#\/schema\/person\/5ec1f03e4a0ea7b72643b272b7236c13"},"image":{"@id":"https:\/\/fysinformatica.com\/new2\/caso-analisis-forense-en-sistema-de-acceso\/#primaryimage"},"thumbnailUrl":"https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Diseno-de-imagen-16.png","articleSection":["Portfolio"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/fysinformatica.com\/new2\/caso-analisis-forense-en-sistema-de-acceso\/","url":"https:\/\/fysinformatica.com\/new2\/caso-analisis-forense-en-sistema-de-acceso\/","name":"Causa Judicial - An\u00e1lisis Forense en Sistema de Acceso - Perito Inform\u00e1tico Forense","isPartOf":{"@id":"https:\/\/fysinformatica.com\/new2\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fysinformatica.com\/new2\/caso-analisis-forense-en-sistema-de-acceso\/#primaryimage"},"image":{"@id":"https:\/\/fysinformatica.com\/new2\/caso-analisis-forense-en-sistema-de-acceso\/#primaryimage"},"thumbnailUrl":"https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Diseno-de-imagen-16.png","datePublished":"2023-07-23T13:03:53+00:00","dateModified":"2025-03-01T12:33:06+00:00","breadcrumb":{"@id":"https:\/\/fysinformatica.com\/new2\/caso-analisis-forense-en-sistema-de-acceso\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fysinformatica.com\/new2\/caso-analisis-forense-en-sistema-de-acceso\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/fysinformatica.com\/new2\/caso-analisis-forense-en-sistema-de-acceso\/#primaryimage","url":"https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Diseno-de-imagen-16.png","contentUrl":"https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Diseno-de-imagen-16.png","width":960,"height":540},{"@type":"BreadcrumbList","@id":"https:\/\/fysinformatica.com\/new2\/caso-analisis-forense-en-sistema-de-acceso\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/fysinformatica.com\/new2\/"},{"@type":"ListItem","position":2,"name":"Causa Judicial &#8211; An\u00e1lisis Forense en Sistema de Acceso"}]},{"@type":"WebSite","@id":"https:\/\/fysinformatica.com\/new2\/#website","url":"https:\/\/fysinformatica.com\/new2\/","name":"Perito Inform\u00e1tico Forense","description":"","publisher":{"@id":"https:\/\/fysinformatica.com\/new2\/#\/schema\/person\/5ec1f03e4a0ea7b72643b272b7236c13"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fysinformatica.com\/new2\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":["Person","Organization"],"@id":"https:\/\/fysinformatica.com\/new2\/#\/schema\/person\/5ec1f03e4a0ea7b72643b272b7236c13","name":"Fabi\u00e1n Abel Rocha","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/8c8f49babfab8102e90e4cbe9472df2cbb160e9ea66074070642c8e707185647?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8c8f49babfab8102e90e4cbe9472df2cbb160e9ea66074070642c8e707185647?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8c8f49babfab8102e90e4cbe9472df2cbb160e9ea66074070642c8e707185647?s=96&d=mm&r=g","caption":"Fabi\u00e1n Abel Rocha"},"logo":{"@id":"https:\/\/secure.gravatar.com\/avatar\/8c8f49babfab8102e90e4cbe9472df2cbb160e9ea66074070642c8e707185647?s=96&d=mm&r=g"},"sameAs":["https:\/\/fysinformatica.com\/new2"],"url":"https:\/\/fysinformatica.com\/new2\/author\/frocha\/"}]}},"_links":{"self":[{"href":"https:\/\/fysinformatica.com\/new2\/wp-json\/wp\/v2\/posts\/1152","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fysinformatica.com\/new2\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fysinformatica.com\/new2\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fysinformatica.com\/new2\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/fysinformatica.com\/new2\/wp-json\/wp\/v2\/comments?post=1152"}],"version-history":[{"count":6,"href":"https:\/\/fysinformatica.com\/new2\/wp-json\/wp\/v2\/posts\/1152\/revisions"}],"predecessor-version":[{"id":1671,"href":"https:\/\/fysinformatica.com\/new2\/wp-json\/wp\/v2\/posts\/1152\/revisions\/1671"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fysinformatica.com\/new2\/wp-json\/wp\/v2\/media\/1161"}],"wp:attachment":[{"href":"https:\/\/fysinformatica.com\/new2\/wp-json\/wp\/v2\/media?parent=1152"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fysinformatica.com\/new2\/wp-json\/wp\/v2\/categories?post=1152"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fysinformatica.com\/new2\/wp-json\/wp\/v2\/tags?post=1152"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}