Mostrar el registro sencillo del ítem
Análisis técnico comparativo de herramientas de escaneo de puertos de redes de telecomunicaciones
dc.contributor.advisor | Jordan Cordones, Freddy Maximiliano | |
dc.contributor.author | Valencia Martínez, Geovanny Giussepe | |
dc.date.accessioned | 2023-11-07T19:47:16Z | |
dc.date.available | 2023-11-07T19:47:16Z | |
dc.date.issued | 2023 | |
dc.identifier.uri | http://dspace.utb.edu.ec/handle/49000/15074 | |
dc.description | Comparing tools such as Nmap, Netcat and Unicornscan to see which ones are the fastest and easiest to use for scanning telecommunication networks is useful, but remember, using these tools in an ethical way is very important, because ethical hacking is a legal practice that helps to find problems in computer systems, such as WiFi networks. When you do ethical hacking, you need permission from the network owner to avoid legal problems, because all these tools help us to simulate real attacks and find various security problems, because Nmap, Netcat and Unicornscan are useful because they do this in different ways. It is vital to keep your security measures up to date and secure, as computer threats change, so you need to be aware of the latest security practices and apply them in a world where attack methods are evolving rapidly and hackers are getting smarter and smarter. | es_ES |
dc.description | Comparing tools such as Nmap, Netcat and Unicornscan to see which ones are the fastest and easiest to use for scanning telecommunication networks is useful, but remember, using these tools in an ethical way is very important, because ethical hacking is a legal practice that helps to find problems in computer systems, such as WiFi networks. When you do ethical hacking, you need permission from the network owner to avoid legal problems, because all these tools help us to simulate real attacks and find various security problems, because Nmap, Netcat and Unicornscan are useful because they do this in different ways. It is vital to keep your security measures up to date and secure, as computer threats change, so you need to be aware of the latest security practices and apply them in a world where attack methods are evolving rapidly and hackers are getting smarter and smarter. | es_ES |
dc.description.abstract | Comparar herramientas como Nmap, Netcat y Unicornscan para ver cuáles son las más rápidas y fáciles de usar dentro de los escaneos en las redes de telecomunicaciones es útil, pero recuerda, usar estas herramientas de manera ética es muy importante, ya que el hacking ético es una práctica legal que ayuda a encontrar problemas en sistemas informáticos, como redes WiFi. Cuando haces hacking ético, necesitas permiso del dueño de la red para evitar problemas legales, porque todas estas herramientas para nos ayudan a poder simular ataques reales y encontrar diversos problemas de seguridad, debido a que Nmap, Netcat y Unicornscan son útiles porque hacen esto de diferentes maneras. Es vital mantener actualizadas y seguras las medidas de seguridad, ya que las amenazas informáticas cambian, por esta razón se debe estar al tanto de las últimas prácticas de seguridad y aplicarlas en un mundo donde los métodos de ataques evolucionan rápidamente y los hackers son cada vez más inteligentes | es_ES |
dc.format.extent | 41 p. | es_ES |
dc.language.iso | es | es_ES |
dc.publisher | Babahoyo: UTB-FAFI. 2023 | es_ES |
dc.rights | Atribución-NoComercial-SinDerivadas 3.0 Ecuador | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/ec/ | * |
dc.subject | Red Wifi | es_ES |
dc.subject | Vulnerabilidad | es_ES |
dc.subject | Seguridad | es_ES |
dc.subject | Hacking Ético | es_ES |
dc.title | Análisis técnico comparativo de herramientas de escaneo de puertos de redes de telecomunicaciones | es_ES |
dc.type | bachelorThesis | es_ES |