Mostrar el registro sencillo del ítem

dc.contributor.advisorSoto Valle, Carlos Julio
dc.contributor.authorLema Altamirano, Dayana Esther
dc.date.accessioned2023-06-02T14:29:38Z
dc.date.available2023-06-02T14:29:38Z
dc.date.issued2023
dc.identifier.urihttp://dspace.utb.edu.ec/handle/49000/14188
dc.descriptionThreat control: 1. Install an open-source software firewall – Install an open-source software firewall, such as pfSense, to block malicious websites from accessing your home network. 2. Establish a strong password policy: Establish a strong password policy for all devices connected to the home network, at least 8 alphanumeric characters and at least one uppercase letter, one lowercase letter, and one number. 3. Update operating systems and software: It is important to keep operating systems and software updated to their latest version, to avoid exploiting known vulnerabilities. Home network security is a growing concern for homeowners. Due to constant technological advances, homeowners now have to pay attention to a wide variety of computer threats to their home network, including viruses, spyware, malware, denial of service attacks, and in some cases even phishing attacks. . To deal with these threats, homeowners must have a good understanding of basic computer security principles and how to implement these principles in their home network. One of the best approaches to keep your home network secure is to implement an open source-based solution. These solutions are based on code software; Threat and intrusion control in an open source-based home network is a major challenge. In most cases, configuring a firewall to block malicious traffic is a basic measure for network security. However, there are other methods that must be considered to protect the network from a variety of computer threats. These include the use of intrusion detection tools and the implementation of security policies to limit access to the network and resources. In addition, steps must be taken to ensure that operating systems and applications are up to date to prevent the exploitation of known vulnerabilities. Finally, steps should be taken to monitor network traffic to detect which.es_ES
dc.descriptionThreat control: 1. Install an open-source software firewall – Install an open-source software firewall, such as pfSense, to block malicious websites from accessing your home network. 2. Establish a strong password policy: Establish a strong password policy for all devices connected to the home network, at least 8 alphanumeric characters and at least one uppercase letter, one lowercase letter, and one number. 3. Update operating systems and software: It is important to keep operating systems and software updated to their latest version, to avoid exploiting known vulnerabilities. Home network security is a growing concern for homeowners. Due to constant technological advances, homeowners now have to pay attention to a wide variety of computer threats to their home network, including viruses, spyware, malware, denial of service attacks, and in some cases even phishing attacks. . To deal with these threats, homeowners must have a good understanding of basic computer security principles and how to implement these principles in their home network. One of the best approaches to keep your home network secure is to implement an open source-based solution. These solutions are based on code software; Threat and intrusion control in an open source-based home network is a major challenge. In most cases, configuring a firewall to block malicious traffic is a basic measure for network security. However, there are other methods that must be considered to protect the network from a variety of computer threats. These include the use of intrusion detection tools and the implementation of security policies to limit access to the network and resources. In addition, steps must be taken to ensure that operating systems and applications are up to date to prevent the exploitation of known vulnerabilities. Finally, steps should be taken to monitor network traffic to detect which.es_ES
dc.description.abstractControl de amenazas: 1. Instalar un cortafuegos de software de código abierto: instalar un cortafuegos de software de código abierto, como pfSense, para bloquear el acceso a la red doméstica de sitios web maliciosos. 2. Establecer una política de contraseñas fuertes: establecer una política de contraseñas fuertes para todos los dispositivos conectados a la red doméstica, como mínimo 8 caracteres alfanuméricos y al menos una letra mayúscula, una letra minúscula y un número. 3. Actualizar los sistemas operativos y el software: es importante mantener actualizados los sistemas operativos y el software a su última versión, para evitar la explotación de vulnerabilidades conocidas. La seguridad de la red doméstica es una preocupación cada vez mayor para los propietarios de hogares. Debido a los constantes avances tecnológicos, los propietarios de hogares ahora tienen que prestar atención a una amplia variedad de amenazas informáticas a su red doméstica, incluyendo virus, spyware, malware, ataques de negación de servicio y, en algunos casos, incluso ataques de phishing. Para hacer frente a estas amenazas, los propietarios de hogares deben tener una buena comprensión de los principios básicos de la seguridad informática y cómo implementar estos principios en su red doméstica. Uno de los mejores enfoques para mantener la seguridad de la red doméstica es la implementación de una solución basada en open source. Estas soluciones se basan en software de código; El control de amenazas e intrusos en una red doméstica basada en open source es un desafío importante. En la mayoría de los casos, la configuración de un firewall para bloquear el tráfico malicioso es una medida básica para la seguridad de la red. Sin embargo, existen otros métodos que deben tenerse en cuenta para proteger la red de una variedad de amenazas informáticas. Estos incluyen el uso de herramientas de detección de intrusiones y la implementación de políticas de seguridad para limitar el acceso a la red y a los recursos. Además, se deben tomar medidas para asegurar que los sistemas operativos y las aplicaciones estén actualizados para prevenir la explotación de vulnerabilidades conocidas. Finalmente, se deben tomar medidas para monitorear el tráfico de la red para detectar cual.es_ES
dc.format.extent30 p.es_ES
dc.language.isoeses_ES
dc.publisherBabahoyo: UTB-FAFI. 2023es_ES
dc.rightsAtribución-NoComercial-SinDerivadas 3.0 Ecuador*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/ec/*
dc.subjectCódigo Abiertoes_ES
dc.subjectSistema Operativoes_ES
dc.subjectControl de Amenazases_ES
dc.subjectVulnerabilidades_ES
dc.titleControl de amenazas e instrucciones informáticas en una red domestica basadas en Open Source.es_ES
dc.typebachelorThesises_ES


Ficheros en el ítem

Thumbnail
Thumbnail

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem

Atribución-NoComercial-SinDerivadas 3.0 Ecuador
Excepto si se señala otra cosa, la licencia del ítem se describe como Atribución-NoComercial-SinDerivadas 3.0 Ecuador