Mostrar el registro sencillo del ítem

dc.contributor.advisorZúñiga Sánchez, Miguel Ángel
dc.contributor.authorMosquera Mazacon, María Brigitte
dc.date.accessioned2022-05-17T17:09:56Z
dc.date.available2022-05-17T17:09:56Z
dc.date.issued2022
dc.identifier.urihttp://dspace.utb.edu.ec/handle/49000/11622
dc.descriptionCurrently, there are many companies that have a lot of information stored in computer systems or in clouds (clouds), hence the need for the company to protect databases and equipment from attacks or intruders, which is relevant both for the activity of this, as for its reputation. And that is why they pay attention to computer security or cybersecurity. Computer security activates different mechanisms in order to solve a problem that arises before computer equipment due to intrusions or misuse by the person who handles it, either involuntarily or intentionally. Cyber attacks are a huge problem for businesses, putting their sensitive information at risk and forcing them to spend millions of dollars to regain control of their systems and data. Generating a computer security plan is essential for any organization. This will allow companies to detect vulnerabilities in their systems and establish measures to prevent attacks. The goal is to help protect critical business data and systems. Working to reinforce the computer security of a business becomes one of the fundamental processes for companies to guarantee its good performance. For this, it is important to know in depth the main computer security tools and, above all, to know which are those that are most recommended and in shape throughout the current period.es_ES
dc.descriptionCurrently, there are many companies that have a lot of information stored in computer systems or in clouds (clouds), hence the need for the company to protect databases and equipment from attacks or intruders, which is relevant both for the activity of this, as for its reputation. And that is why they pay attention to computer security or cybersecurity. Computer security activates different mechanisms in order to solve a problem that arises before computer equipment due to intrusions or misuse by the person who handles it, either involuntarily or intentionally. Cyber attacks are a huge problem for businesses, putting their sensitive information at risk and forcing them to spend millions of dollars to regain control of their systems and data. Generating a computer security plan is essential for any organization. This will allow companies to detect vulnerabilities in their systems and establish measures to prevent attacks. The goal is to help protect critical business data and systems. Working to reinforce the computer security of a business becomes one of the fundamental processes for companies to guarantee its good performance. For this, it is important to know in depth the main computer security tools and, above all, to know which are those that are most recommended and in shape throughout the current period.es_ES
dc.description.abstractActualmente, son muchas las empresas que tienen información almacenada en sistemas informáticos o en nubes, de allí nace la necesidad de la empresa de proteger las bases de datos y equipos de los ataques o intrusos, lo cual es relevante tanto para la actividad de esta, como para su reputación. Y es por ello que le prestan atención a la seguridad informática o ciberseguridad. La seguridad informática acciona diferentes mecanismos con el fin de resolver un problema que se presente ante los equipos informáticos debido a las intrusiones o por el mal uso por parte de la persona que lo maneja, ya sea de forma involuntaria o intencionada. Los ataques informáticos son un gran problema para las empresas, ya que ponen en riesgo su información confidencial y los obligan a gastar millones de dólares para recuperar el control de sus sistemas y datos. Generar un plan de seguridad informática es imprescindible para cualquier organización. Esto les permitirá a las empresas detectar vulnerabilidades en sus sistemas y establecer medidas para prevenir ataques. El objetivo es que ayude a proteger los datos y sistemas críticos del negocio. Trabajar en reforzar la seguridad informática de un negocio se convierte en uno de los procesos fundamentales para que las empresas puedan garantizar el buen rendimiento de la misma. Para ello es importante conocer a fondo las principales herramientas de seguridad informática y, sobre todo, saber cuáles son aquellas que se encuentran más recomendadas y en forma a lo largo del periodo actual.es_ES
dc.format.extent28 p.es_ES
dc.language.isoeses_ES
dc.publisherBabahoyo: UTB-FAFI. 2022es_ES
dc.rightsAtribución-NoComercial-SinDerivadas 3.0 Ecuador*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/ec/*
dc.subjectSeguridad informáticaes_ES
dc.subjectCiberdelincuenteses_ES
dc.subjectHerramientas de seguridades_ES
dc.titleAnálisis comparativo sobre las herramientas de Seguridad Informática Open Source: Nessus y Snort.es_ES
dc.typebachelorThesises_ES


Ficheros en el ítem

Thumbnail
Thumbnail

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem

Atribución-NoComercial-SinDerivadas 3.0 Ecuador
Excepto si se señala otra cosa, la licencia del ítem se describe como Atribución-NoComercial-SinDerivadas 3.0 Ecuador