Mostrar el registro sencillo del ítem

dc.contributor.advisorEsparza Cruz, Nelly Karina
dc.contributor.authorLucio Troya, Andrea Estefanía
dc.date.accessioned2020-05-03T17:49:22Z
dc.date.available2020-05-03T17:49:22Z
dc.date.issued2020
dc.identifier.urihttp://dspace.utb.edu.ec/handle/49000/7658
dc.descriptionTechnological advances are being presented in our environment in a very common way, which is why most organizations are implementing information technology in their facilities with the aim of automating processes to improve the quality of their services. But due to this the need arises to maintain the security of the information that is managed in the network, so that it is not violated, stolen or plagiarized. At present, the ITSB presents several problems with the network and infrastructure, since it has not implemented a correct security policy, there are conflicts with IP addresses, computer equipment failures, virus infections and little preventive maintenance of the Network infrastructure The methodology that is going to be used is the descriptive one since it allows to know the predominant situations through the exact description of the activities and processes carried out by the computer network in the ITSB. The present case study consists of three phases which are: asset identification, vulnerability detection and vulnerability analysis. The results obtained in the present study demonstrate that there are vulnerabilities of both physical and logical types within the ITSB network, where those of logical type are not more relevant if the configurations are applied in time. As for the physical ones, necessary measures must be taken because they represent a potential risk that can affect the logical and physical integrity of the institution's infrastructure and information.es_ES
dc.descriptionTechnological advances are being presented in our environment in a very common way, which is why most organizations are implementing information technology in their facilities with the aim of automating processes to improve the quality of their services. But due to this the need arises to maintain the security of the information that is managed in the network, so that it is not violated, stolen or plagiarized. At present, the ITSB presents several problems with the network and infrastructure, since it has not implemented a correct security policy, there are conflicts with IP addresses, computer equipment failures, virus infections and little preventive maintenance of the Network infrastructure The methodology that is going to be used is the descriptive one since it allows to know the predominant situations through the exact description of the activities and processes carried out by the computer network in the ITSB. The present case study consists of three phases which are: asset identification, vulnerability detection and vulnerability analysis. The results obtained in the present study demonstrate that there are vulnerabilities of both physical and logical types within the ITSB network, where those of logical type are not more relevant if the configurations are applied in time. As for the physical ones, necessary measures must be taken because they represent a potential risk that can affect the logical and physical integrity of the institution's infrastructure and information.es_ES
dc.description.abstractLos avances tecnológicos se están presentando en nuestro medio de forma muy común, es por eso que la mayoría de las organizaciones están implementado la informática en sus instalaciones con el objetivo de por automatizar procesos para mejorar la calidad de sus servicios. Pero debido a esto nace la necesidad de mantener la seguridad de la información que se gestiona en la red, para que esta no sea vulnerada, robada o plagiada. En la actualidad el ITSB, presenta varios problemas con la red y la infraestructura, al no tener implementada una correcta política de seguridad, existen conflictos con direcciones IP, fallas en los equipos informáticos, infecciones de virus y poco mantenimiento preventivo a la infraestructura de Red. La metodología que se va a emplear es la descriptiva ya que permite conocer las situaciones predominantes a través de la descripción exacta de las actividades y procesos que realiza la red informática en el ITSB. El presente caso de estudio está conformado por tres fases las cuales son: identificación de activos, detección de vulnerabilidades y análisis de vulnerabilidades. Los resultados obtenidos en el presente estudio demuestran que existen vulnerabilidades tanto de tipo físicas, como lógicas dentro de la red del ITSB, donde las de tipo lógico no tienen mayor relevancia si se aplican las configuraciones a tiempo. En cuanto a las físicas se deben tomar medidas necesarias porque representan un riesgo potencial que puede afectar a la integridad lógica como física de la infraestructura e información de la institución.es_ES
dc.format.extent26 p.es_ES
dc.language.isoeses_ES
dc.publisherBabahoyo, UTB - FAFI 2020es_ES
dc.rightsAtribución-NoComercial-SinDerivadas 3.0 Ecuador*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/ec/*
dc.subjectAnálisises_ES
dc.subjectDetectares_ES
dc.subjectVulnerabilidadeses_ES
dc.subjectRedes_ES
dc.subjectSeguridades_ES
dc.subjectInformáticaes_ES
dc.titleAnálisis para Detectar Amenazas y Vulnerabilidades en la Red del ITSB de la ciudad de Babahoyoes_ES
dc.typebachelorThesises_ES


Ficheros en el ítem

Thumbnail
Thumbnail

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem

Atribución-NoComercial-SinDerivadas 3.0 Ecuador
Excepto si se señala otra cosa, la licencia del ítem se describe como Atribución-NoComercial-SinDerivadas 3.0 Ecuador