Inicio https://watermark.lovepik.com/photo/40215/8902.jpg_wh1200.jpg
Introducción https://dpd.aec.es/wp-content/uploads/2019/10/Dise%C3%B1o-sin-t%C3%ADtulo-4.jpg
Amenazas https://perfilmedia.es/es/wp-content/uploads/2018/10/peligrosyamenazasenlared.jpg
Protección de datos https://mf-sicherheit.de/wp-content/uploads/2020/09/AdobeStock_145409265-scaled.jpeg
Seguridad familiar https://edexec.co.uk/wp-content/uploads/2022/10/iStock-1400381376-678x381.jpg
Seguridad de correo electrónico https://agenciaseoasturias.es/wp-content/uploads/2021/02/como-se-envia-correo-electronico-1080x675.png
Compras y transacciones segura https://img.freepik.com/fotos-premium/transacciones-tarjetas-credito-compras-linea-seguras-billetera-protegida-ciberseguridad_1036975-109028.jpg
Figura 1 https://miro.medium.com/v2/resize:fit:800/0*XOd1J0lEu0zEgiZx.jpg
Figura 2 https://sered.net/wp-content/uploads/2023/03/como-hackear.jpg
Figura 3 https://th.bing.com/th/id/OIP.6dOvaLCRmxGKEIrVNbHqvQHaDa?w=744&h=343&rs=1&pid=ImgDetMain
Figura 4 https://www.vadesecure.com/hubfs/Imported_Blog_Media/Locky-ransomware-ransomware-2.png
Figura 6 https://miro.medium.com/v2/resize:fit:416/0*BO1Wcv6XjT5qimVB.jpg
Figura 7 https://th.bing.com/th/id/OIP.acIGOMsQU9MNVMSCVcritwHaHa?w=800&h=800&rs=1&pid=ImgDetMain
Figura 8 https://th.bing.com/th/id/OIP.uV6WZW0N7PcIInsrBTiT3AHaE3?rs=1&pid=ImgDetMain
Figura 9 https://whatphone.net/wp-content/uploads/2015/08/password.jpg
Figura 11 https://i.imgur.com/K5ANzDi.jpg
Figura 12 https://images.wakelet.com/resize?id=e8qfhbQRoS4lhxUqSXb9a&h=300&w=400&q=85
Figura 13 https://th.bing.com/th/id/OIP.buZMjsUE8QDgY8Ni1KrfxwHaD8?w=1200&h=640&rs=1&pid=ImgDetMain
Figura 14 https://aodatacloud.es/wp-content/uploads/2023/11/DMARC.jpeg
Figura 15 https://www.comodo.com/images/free-spam-remover.jpg
Figura 17 https://cly.1cdn.vn/2023/07/18/gia-lai..xu-phat.jpg
Figura 18 https://th.bing.com/th/id/OIP.uMLUUFWAG4TcviCnpzvPaAHaHa?w=720&h=720&rs=1&pid=ImgDetMain
Figura 19 https://www-static.cdn-one.com/cmsimages/en_spam-filterx3.png
Figura 20 https://art-u1.infcdn.net/articles_uploads/1/1662/AppleSpyware.png
Figura 21 https://media.canalnet.tv/2022/02/FRAUDE-VIRTUAL_t670x470.jpg
Figura 23 https://xigentsolutions.com/wp-content/uploads/2021/06/phoner-1.jpg
Figura 24 https://espiando.es/wp-content/uploads/2023/03/Conclusion_1-2.jpg
Figura 27 https://img.freepik.com/vector-premium/compras-seguras-linea_18591-19574.jpg
Figura 28 https://arazcloud.com/blog/wp-content/uploads/2020/10/2-1.jpg
Figura 29 https://anderxx1.neocities.org/imagenes/contrasegura.jpg
Figura 30 https://firmadocumentos.es/wp-content/uploads/2020/09/doble-factor-de-autenticacion-480x300.jpg
Figura 31 https://th.bing.com/th/id/OIP.x3gjP6rM7fDyAdoOo6W_rAHaHa?w=980&h=980&rs=1&pid=ImgDetMain
Figura 32 https://static.mediawire.in/pr/metadata/81410909/temp/16279511_sEARCH_SPAM.png?id=26839
Figura 33 https://www.lanscope.jp/blogs/wp-content/uploads/sites/2/2023/12/image19.jpg
Figura 35 https://adnmedialab.com/wp-content/uploads/2022/01/10-mejores-sitio-de-ecommerce-mexico-1.png-1.png
Figura 36 https://th.bing.com/th/id/OIP._Kr5yXFxBQIySzrmAPYKwwHaE7?w=1600&h=1066&rs=1&pid=ImgDetMain
Figura 37 https://www.grupo5.com/almacen/noticias/zoom_nocompartir.jpg
Figura 38 https://arcussoft.com.pl/wp-content/uploads/2021/03/Blog-arcus-soft30.03.jpg