Mostrar el registro sencillo del ítem
Análisis de vulnerabilidad de la base de datos en la empresa ISANET del cantón Montalvo
dc.contributor.advisor | Saltos Viteri, Harry | |
dc.contributor.author | Veloz Peñaherrera, Betty Samanta | |
dc.date.accessioned | 2021-11-17T15:57:48Z | |
dc.date.available | 2021-11-17T15:57:48Z | |
dc.date.issued | 2021 | |
dc.identifier.uri | http://dspace.utb.edu.ec/handle/49000/10542 | |
dc.description | There are many risks in information systems since today they have increased or increased the development of complexity in information technologies. Computers are always vulnerable as they connect to unknown networks and are exposed to various threats. The consequences are the increase in computer attacks. In this way the probabilities of the attacks that are carried out are reduced. The work below will derive some techniques and tools for the vulnerabilities of the databases and there is less risk, gas leaks or detection of vulnerabilities We present techniques before, during and after an attack that will determine which vulnerabilities can be mitigated with the use of these tools. | es_ES |
dc.description | There are many risks in information systems since today they have increased or increased the development of complexity in information technologies. Computers are always vulnerable as they connect to unknown networks and are exposed to various threats. The consequences are the increase in computer attacks. In this way the probabilities of the attacks that are carried out are reduced. The work below will derive some techniques and tools for the vulnerabilities of the databases and there is less risk, gas leaks or detection of vulnerabilities We present techniques before, during and after an attack that will determine which vulnerabilities can be mitigated with the use of these tools. | es_ES |
dc.description.abstract | Hay muchos riesgos en los sistemas de información ya que hoy en día han incrementado o elevado el desarrollo en la complejidad en las tecnologías de la información. Las computadoras siempre son vulnerables ya que se conectan a redes desconocidas y se exponen a diversas amenazas. Las consecuencias son el aumento de ataques informáticos. De este modo se disminuye las probabilidades a los ataques que sean realizados. El trabajo a continuación derivara algunas técnicas y herramientas para las vulnerabilidades de las bases de datos y haya menos riesgos, fugas de gases o detección de vulnerabilidades Presentamos técnicas antes durante y después de un ataque que determinaran cuales vulnerabilidades puedes ser mitigados con la utilización de dichas herramientas. | es_ES |
dc.format.extent | 29 p. | es_ES |
dc.language.iso | es | es_ES |
dc.publisher | BABAHOYO: UTB, 2021 | es_ES |
dc.rights | Atribución-NoComercial-SinDerivadas 3.0 Ecuador | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/ec/ | * |
dc.subject | Vulnerabilidades | es_ES |
dc.subject | Técnicas | es_ES |
dc.subject | Seguridad | es_ES |
dc.subject | Herramientas de detección de vulnerabilidades | es_ES |
dc.title | Análisis de vulnerabilidad de la base de datos en la empresa ISANET del cantón Montalvo | es_ES |
dc.type | bachelorThesis | es_ES |