Mostrar el registro sencillo del ítem

dc.contributor.advisorVillares Pazmiño, José Danilo
dc.contributor.authorTamaquiza Murillo, Enzo Aldahir
dc.date.accessioned2023-06-05T15:47:41Z
dc.date.available2023-06-05T15:47:41Z
dc.date.issued2023
dc.identifier.urihttp://dspace.utb.edu.ec/handle/49000/14252
dc.descriptionThe purpose of this case study is to simulate a computer attack through the use of the Cobalt Strike tool on the Kali Linux testing system and, establish the procedures that can be implemented to detect that the systems continue to be attacked and thus prevent this from happening. i.e., to maintain system stability, therefore, tests will be performed to take the appropriate actions that can be performed, thus avoiding possible computer attacks, and counteracting possible and future threats. With this simulation as an example, ways in which the company's information can be protected from home servers to organizational servers will be identified, avoiding, and reducing the high rates of computer crimes. The purpose of this case study is to simulate a computer attack through the use of the Cobalt Strike tool on the Kali Linux testing system and, establish the procedures that can be implemented to detect that the systems continue to be attacked and thus prevent this from happening. i.e., to maintain system stability, therefore, tests will be performed to take the appropriate actions that can be performed, thus avoiding possible computer attacks and counteracting possible and future threats. With this simulation as an example, ways in which the company's information can be protected from home servers to organizational servers will be identified, avoiding and reducing the high rates of computer crimes. In conclusion, it was possible to identify the importance of using Ethical Hacking tools to improve the security of the business network and prevent possible attacks.es_ES
dc.descriptionThe purpose of this case study is to simulate a computer attack through the use of the Cobalt Strike tool on the Kali Linux testing system and, establish the procedures that can be implemented to detect that the systems continue to be attacked and thus prevent this from happening. i.e., to maintain system stability, therefore, tests will be performed to take the appropriate actions that can be performed, thus avoiding possible computer attacks, and counteracting possible and future threats. With this simulation as an example, ways in which the company's information can be protected from home servers to organizational servers will be identified, avoiding, and reducing the high rates of computer crimes. The purpose of this case study is to simulate a computer attack through the use of the Cobalt Strike tool on the Kali Linux testing system and, establish the procedures that can be implemented to detect that the systems continue to be attacked and thus prevent this from happening. i.e., to maintain system stability, therefore, tests will be performed to take the appropriate actions that can be performed, thus avoiding possible computer attacks and counteracting possible and future threats. With this simulation as an example, ways in which the company's information can be protected from home servers to organizational servers will be identified, avoiding and reducing the high rates of computer crimes. In conclusion, it was possible to identify the importance of using Ethical Hacking tools to improve the security of the business network and prevent possible attacks.es_ES
dc.description.abstractEl propósito de este caso de estudio es simular un ataque informático a través de con el uso de la herramienta Cobalt Strike sobre el sistema testeo Kali Linux y, establecer los procedimientos que se pueden implementar para detectar que se continúa atacando a los sistemas y así evitar que esto suceda. es decir, para mantener la estabilidad del sistema, por tanto, se realizarán pruebas para tomar las acciones oportunas que se puedan realizar, evitando así posibles ataques informáticos y contrarrestando posibles y futuras amenazas. Con esta simulación como ejemplo, se identificarán las formas en que la información de la empresa puede protegerse desde los servidores domésticos hasta los servidores organizacionales, evitando y reduciendo las altas tasas de delitos informáticos. El propósito de este caso de estudio es simular un ataque informático a través de con el uso de la herramienta Cobalt Strike sobre el sistema testeo Kali Linux y, establecer los procedimientos que se pueden implementar para detectar que se continúa atacando a los sistemas y así evitar que esto suceda. es decir, para mantener la estabilidad del sistema, por tanto, se realizarán pruebas para tomar las acciones oportunas que se puedan realizar, evitando así posibles ataques informáticos y contrarrestando posibles y futuras amenazas. Con esta simulación como ejemplo, se identificarán las formas en que la información de la empresa puede protegerse desde los servidores domésticos hasta los servidores organizacionales, evitando y reduciendo las altas tasas de delitos informáticos. En conclusión, se pudo identificar la importancia de utilizar herramientas de Hacking Ético para mejorar la seguridad de la red empresarial y prevenir posibles ataques.es_ES
dc.format.extent44 p.es_ES
dc.language.isoeses_ES
dc.publisherBabahoyo: UTB-FAFI. 2023es_ES
dc.rightsAtribución-NoComercial-SinDerivadas 3.0 Ecuador*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/ec/*
dc.subjectSimulaciónes_ES
dc.subjectCiberseguridades_ES
dc.subjectVulnerabilidadeses_ES
dc.titleAnálisis y simulación de ataque de Malware con el uso de la Herramienta Cobalt Strike para la Empresa Pc Soluciones.es_ES
dc.typebachelorThesises_ES


Ficheros en el ítem

Thumbnail
Thumbnail

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem

Atribución-NoComercial-SinDerivadas 3.0 Ecuador
Excepto si se señala otra cosa, la licencia del ítem se describe como Atribución-NoComercial-SinDerivadas 3.0 Ecuador