{"id":82665,"date":"2018-07-05T09:00:36","date_gmt":"2018-07-05T09:00:36","guid":{"rendered":"https:\/\/www.internetsociety.org\/blog\/2018\/07\/tracking-dnssec-see-the-deployment-maps\/"},"modified":"2025-11-14T15:22:30","modified_gmt":"2025-11-14T15:22:30","slug":"tracking-dnssec-see-the-deployment-maps","status":"publish","type":"post","link":"https:\/\/www.internetsociety.org\/es\/blog\/2018\/07\/tracking-dnssec-see-the-deployment-maps\/","title":{"rendered":"Seguimiento de DNSSEC: Ver mapas de implementaci\u00f3n"},"content":{"rendered":"<p>\u00bfSab\u00eda que el programa Deploy360 de Internet Society (<a href=\"https:\/\/www.internetsociety.org\/es\/deploy360\/\">Internet Society Deploy360 Programme<\/a>) proporciona una vista semanal de la implementaci\u00f3n <a href=\"https:\/\/www.internetsociety.org\/deploy360\/dnssec\/maps\/\">global de DNSSEC?<\/a> Cada lunes, generamos nuevos mapas y los enviamos a <a href=\"https:\/\/elists.isoc.org\/mailman\/listinfo\/dnssec-maps\">la lista de correo de DNSSEC-Maps<\/a>. Tambi\u00e9n actualizamos la p\u00e1gina Mapas de implementaci\u00f3n de DNSSEC (<a href=\"https:\/\/www.internetsociety.org\/deploy360\/dnssec\/maps\/\">DNSSEC Deployment Maps<\/a>) peri\u00f3dicamente, generalmente antes de las reuniones de la ICANN.<\/p>\n<p>Extensiones de seguridad de DNS, com\u00fanmente conocidas como DNSSEC, hogar y escuela. DNSSEC act\u00faa como un embalaje a prueba de manipulaci\u00f3n de datos de nombres de dominio, lo que ayuda a garantizar que se est\u00e1 comunicando con el sitio web o servicio correcto. Sin embargo, DNSSEC se debe mover a cada paso en la b\u00fasqueda de la zona ra\u00edz al nombre de dominio final. Los dominios de nivel superior (gTLD) y los dominios de nivel superior de c\u00f3digo de pa\u00eds (ccTLD) son vitales para este proceso general. Estos mapas ayudan a mostrar qu\u00e9 progreso es el objetivo t\u00e9cnico de la implementaci\u00f3n completa de DNSSEC.<\/p>\n<p>Estos mapas son un poco diferentes de otras fuentes de informaci\u00f3n, presentaciones y otros datos recopilados. Para obtener m\u00e1s informaci\u00f3n sobre c\u00f3mo realizar un seguimiento del estado de implementaci\u00f3n de los TLD, lea nuestra p\u00e1gina sobre <a href=\"https:\/\/www.internetsociety.org\/deploy360\/dnssec\/maps\/5-stages\/\">las 5 etapas de la implementaci\u00f3n de DNSSEC<\/a>.<\/p>\n<p>Los mapas y los archivos de datos asociados incluyen el estado DNSSEC de los TLD de c\u00f3digo de pa\u00eds (ccTLD), que se muestran en los mapas, y tambi\u00e9n los TLD gen\u00e9ricos (gTLD), que se muestran en los archivos de valores separados por comas (CSV).<\/p>\n<p>Si desea obtener m\u00e1s informaci\u00f3n sobre DNSSEC, puede comenzar con estos enlaces:<\/p>\n<ul>\n<li><a href=\"\/?page_id=28771\">Deploy360 DNSSEC Home Page<\/a><\/li>\n<li><a href=\"https:\/\/www.internetsociety.org\/deploy360\/dnssec\/factsheet\/\">Internet Society DNSSEC Fact Sheet<\/a><\/li>\n<li><a href=\"https:\/\/www.internetsociety.org\/resources\/doc\/2016\/state-of-dnssec-deployment-2016\/\">State of DNSSEC Deployment<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>\u00bfSab\u00eda que el programa Deploy360 de Internet Society (Internet Society Deploy360 Programme) proporciona una vista semanal de la implementaci\u00f3n global de DNSSEC? Cada lunes, generamos nuevos mapas y los enviamos a la lista de correo de DNSSEC-Maps. Tambi\u00e9n actualizamos la p\u00e1gina Mapas de implementaci\u00f3n de DNSSEC (DNSSEC Deployment Maps) peri\u00f3dicamente, generalmente antes de las reuniones [&hellip;]<\/p>\n","protected":false},"author":819,"featured_media":82182,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[6188,186,168,2584,179,4910,4777,184,147],"tags":[6239],"region_news_regions":[6030],"content_category":[6102],"ppma_author":[4083],"class_list":["post-82665","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-como-funciona-internet","category-confianza","category-normas-abiertos-de-internet","category-extensiones-de-seguridad-del-dns-es","category-seguridad","category-fortalecimiento-de-internet","category-seguridad-es","category-tecnologia","category-deploy360-es","tag-extensiones-de-seguridad-del-sistema-de-nombres-de-dominio-dnssec","region_news_regions-global","content_category-blog-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/06\/DNSSEC-deployment-map-March2018.png",720,410,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/06\/DNSSEC-deployment-map-March2018-150x150.png",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/06\/DNSSEC-deployment-map-March2018-300x171.png",300,171,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/06\/DNSSEC-deployment-map-March2018.png",720,410,false],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/06\/DNSSEC-deployment-map-March2018.png",720,410,false],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/06\/DNSSEC-deployment-map-March2018.png",720,410,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/06\/DNSSEC-deployment-map-March2018.png",720,410,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/06\/DNSSEC-deployment-map-March2018-250x142.png",250,142,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/06\/DNSSEC-deployment-map-March2018-600x410.png",600,410,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/06\/DNSSEC-deployment-map-March2018.png",300,171,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/06\/DNSSEC-deployment-map-March2018.png",400,228,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/06\/DNSSEC-deployment-map-March2018.png",600,342,false]},"uagb_author_info":{"display_name":"Megan Kruse","author_link":"https:\/\/www.internetsociety.org\/es\/author\/kruse\/"},"uagb_comment_info":0,"uagb_excerpt":"\u00bfSab\u00eda que el programa Deploy360 de Internet Society (Internet Society Deploy360 Programme) proporciona una vista semanal de la implementaci\u00f3n global de DNSSEC? Cada lunes, generamos nuevos mapas y los enviamos a la lista de correo de DNSSEC-Maps. Tambi\u00e9n actualizamos la p\u00e1gina Mapas de implementaci\u00f3n de DNSSEC (DNSSEC Deployment Maps) peri\u00f3dicamente, generalmente antes de las reuniones&hellip;","authors":[{"term_id":4083,"user_id":819,"is_guest":0,"slug":"kruse","display_name":"Megan Kruse","avatar_url":{"url":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/05\/Megan-Kruse-min.jpg","url2x":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/05\/Megan-Kruse-min.jpg"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/posts\/82665","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/users\/819"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/comments?post=82665"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/posts\/82665\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/media\/82182"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/media?parent=82665"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/categories?post=82665"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/tags?post=82665"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/region_news_regions?post=82665"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/content_category?post=82665"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/ppma_author?post=82665"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}