Mostrar el registro sencillo del ítem

dc.contributor.advisorRuiz Parrales, Iván Rubén
dc.contributor.authorCampi Domínguez, Carlos Arath
dc.date.accessioned2023-11-01T16:14:55Z
dc.date.available2023-11-01T16:14:55Z
dc.date.issued2023
dc.identifier.urihttp://dspace.utb.edu.ec/handle/49000/14968
dc.descriptionDevelop a strategy for the evaluation of vulnerabilities of the note system using ethical hacking techniques at the Mahatma Gandhi School to carry out this analysis procedure, the following stages of ethical hacking are considered: recognize, scan, exploit and cover or erase traces , will identify security gaps that directly affect the grading system. The tools, guides and techniques on which the Owasp evaluation will be based since they establish an adequate ecosystem presenting results that serve as input to execute each stage of ethical hacking. Educational institutions have seen the need to protect the information created and processed in the academic system, for this reason, a specific guide will be developed based on the information collected. This guide will serve as a strategy to evaluate the vulnerabilities that directly affect the grading system using analytical criteria aligned with ethical hacking and the aforementioned tools. The strategy will be carried out so that it can prevent the vulnerability of the grading system since these do not present their techniques. In the Mahatma Gandhi Educational Unit, therefore, it is important to establish strategies for the evaluation of vulnerabilities of the grading system by users. Not authorized for this work, Owasp will be used, a vulnerability scanner for free use in my opinion. A strategy will be obtained after doing the vulnerability analysis in the notes system. The vulnerabilities that were located in the notes system can be carried out thanks to the study. , investigation and application of technical knowledge that will find out the failures we can trace the IP address of the target organization. The ethical hacking techniques found in the vulnerability exploitation stage turned out to be efficient, so the note system of the case study e The vulnerabilities that were found in the note system could be exploited thanks to the study, research and application of technical knowledge that identified the shortcomings of the academic application. The lack of security application in the notes system was a determining factor in successfully scanning and exploiting vulnerabilitieses_ES
dc.descriptionDevelop a strategy for the evaluation of vulnerabilities of the note system using ethical hacking techniques at the Mahatma Gandhi School to carry out this analysis procedure, the following stages of ethical hacking are considered: recognize, scan, exploit and cover or erase traces , will identify security gaps that directly affect the grading system. The tools, guides and techniques on which the Owasp evaluation will be based since they establish an adequate ecosystem presenting results that serve as input to execute each stage of ethical hacking. Educational institutions have seen the need to protect the information created and processed in the academic system, for this reason, a specific guide will be developed based on the information collected. This guide will serve as a strategy to evaluate the vulnerabilities that directly affect the grading system using analytical criteria aligned with ethical hacking and the aforementioned tools. The strategy will be carried out so that it can prevent the vulnerability of the grading system since these do not present their techniques. In the Mahatma Gandhi Educational Unit, therefore, it is important to establish strategies for the evaluation of vulnerabilities of the grading system by users. Not authorized for this work, Owasp will be used, a vulnerability scanner for free use in my opinion. A strategy will be obtained after doing the vulnerability analysis in the notes system. The vulnerabilities that were located in the notes system can be carried out thanks to the study. , investigation and application of technical knowledge that will find out the failures we can trace the IP address of the target organization. The ethical hacking techniques found in the vulnerability exploitation stage turned out to be efficient, so the note system of the case study e The vulnerabilities that were found in the note system could be exploited thanks to the study, research and application of technical knowledge that identified the shortcomings of the academic application. The lack of security application in the notes system was a determining factor in successfully scanning and exploiting vulnerabilitieses_ES
dc.description.abstractDesarrollar una estrategia para la evaluación de vulnerabilidades del sistema de notas utilizando técnicas de hacking ético en la escuela mahatma Gandhi para llevar a cabo este procedimiento de análisis, se consideran las siguientes etapas de hacking ético: reconocer, escanear, explotar y cubrir o borrar huellas, identificara las brechas de seguridad que afectan directamente al sistema de notas. Las herramientas, guías y técnicas en las cuales se basará la evaluación Owasp ya que establecen un ecosistema adecuado presentando resultados que sirven de insumo para ejecutar cada etapa del hacking ético. Las instituciones educativas han visto la necesidad de proteger la información creada y procesada en el sistema académico, por tal motivo, se desarrollará una guía específica en base a la información recopilada. Esta guía valdrá de estrategia para evaluar las vulnerabilidades que afectan directamente al sistema de notas utilizando el criterio analítico alineado al hacking ético y las herramientas antes mencionadas. Se realizara la estrategia para que pueda impedir tener la vulnerabilidad del sistema de notas ya que estas no presentan sus técnicas En la Unidad Educativa Mahatma Gandhi, Por lo tanto, es importante establecer estrategias para la evaluación de vulnerabilidades del sistema de notas por parte de usuarios no autorizado para este trabajo se utilizará Owasp, un escáner de vulnerabilidades de uso libre en mi criterio Se obtendrá estrategia después de hacer el análisis de vulnerabilidades en el sistema de notas las vulnerabilidades que se localizaron en el sistema de notas se pueden realizar gracias al estudio, investigación y aplicación de conocimientos técnicos que averiguara las fallas podemos rastrear la dirección IP de la organización objetivo. Las técnicas de hacking ético que se encuentra en la etapa de explotación de vulnerabilidades resultasen ser eficientes por lo que el sistema de notas del caso de estudio e Las vulnerabilidades que se encontraron en el sistema de notas se pudieron explotar gracias al estudio, investigación y aplicación de conocimientos técnicos que identificaron las falencias del aplicativo académico. La falta de aplicación de seguridad en el sistema de notas fue un factor determinante para lograr escanear y explotar vulnerabilidades con éxito,es_ES
dc.format.extent57 p.es_ES
dc.language.isoeses_ES
dc.publisherBabahoyo: UTB-FAFI. 2023es_ES
dc.rightsAtribución-NoComercial-SinDerivadas 3.0 Ecuador*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/ec/*
dc.subjectEstrategiases_ES
dc.subjectVulnerabilidadeses_ES
dc.subjectScaneoes_ES
dc.subjectServidoreses_ES
dc.subjectAccesoes_ES
dc.titleEstrategia para la evaluación de vulnerabilidades del sistema de notas utilizando técnicas de hacking ético en la escuela mahatma Gandhies_ES
dc.typebachelorThesises_ES


Ficheros en el ítem

Thumbnail
Thumbnail

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem

Atribución-NoComercial-SinDerivadas 3.0 Ecuador
Excepto si se señala otra cosa, la licencia del ítem se describe como Atribución-NoComercial-SinDerivadas 3.0 Ecuador