Mostrar el registro sencillo del ítem

dc.contributor.advisorFernández Torres, Ana Del Rocio
dc.contributor.authorMoreno Duarte, Sammy Lorenza
dc.date.accessioned2020-05-03T18:29:06Z
dc.date.available2020-05-03T18:29:06Z
dc.date.issued2020
dc.identifier.urihttp://dspace.utb.edu.ec/handle/49000/7669
dc.descriptionThe use of computer networks is very important in organizations, because it allows sending and receiving very valuable information and optimizing the execution of processes. The present case study implements the descriptive methodology because it is possible to understand outstanding situations through the processes carried out in a computer network. The analytical-deductive method is used in a way that allows an analysis of possible vulnerabilities in the network, and the use of information collection tools. The problems found in the Pimocha GAD network are physical and logical, although they do not represent potential critical risks in information security, these must be corrected immediately, because any error can lead to irreparable losses in the security of net. Both types of security complement each other and their main function is to guarantee the reliability, integrity and availability of the information. Although it is true that Pimocha's GAD network implements computer security policies, these are not enough to keep the network 100% secure. That is why the institution must adopt the use of ISO / ICE 27002, which is a guide to good information security practices. The application of this standard allows for the creation of a secure network, the management of computer resources and users in a more optimal way, because good practice policies must be followed, which guarantee that the information handled by the institution is reliable, comprehensive and available when request it.es_ES
dc.descriptionThe use of computer networks is very important in organizations, because it allows sending and receiving very valuable information and optimizing the execution of processes. The present case study implements the descriptive methodology because it is possible to understand outstanding situations through the processes carried out in a computer network. The analytical-deductive method is used in a way that allows an analysis of possible vulnerabilities in the network, and the use of information collection tools. The problems found in the Pimocha GAD network are physical and logical, although they do not represent potential critical risks in information security, these must be corrected immediately, because any error can lead to irreparable losses in the security of net. Both types of security complement each other and their main function is to guarantee the reliability, integrity and availability of the information. Although it is true that Pimocha's GAD network implements computer security policies, these are not enough to keep the network 100% secure. That is why the institution must adopt the use of ISO / ICE 27002, which is a guide to good information security practices. The application of this standard allows for the creation of a secure network, the management of computer resources and users in a more optimal way, because good practice policies must be followed, which guarantee that the information handled by the institution is reliable, comprehensive and available when request it.es_ES
dc.description.abstractEl uso de redes informáticas es muy importante en las organizaciones, porque permite enviar y recibir información muy valiosa y optimizar la ejecución de procesos. El presente caso de estudio implementa la metodología descriptiva porque se logra entender situaciones sobresalientes a través de los procesos que se realizan en una red informática. Se emplea el método analítico-deductivo de manera que permita brindar un análisis sobre las posibles vulnerabilidades de la red, y emplear herramientas de recolección de información. Los problemas encontrados en la red del GAD de Pimocha son de tipo físicos y lógicos, aunque no representan posibles riesgos críticos en la seguridad de la información, estos deben ser corregidos de manera inmediata, porque cualquier error puede conllevar a pérdidas irreparables en la seguridad de red. Ambos tipos de seguridad se complementan y su función principal es garantizar la confiabilidad, integridad y disponibilidad de la información. Si bien es cierto en la red del GAD de Pimocha se implementan políticas de seguridad informática, estas no son suficientes para mantener la red al 100% segura. Es por eso que la institución debe adoptar el uso de la norma ISO/ICE 27002 que es una guía de buenas prácticas de seguridad de la información. La aplicación esta norma permite constituir una red segura, gestionar los recursos informáticos y a los usuarios de una manera más optima, porque se deben seguir políticas de buenas prácticas, que avalen que la información que maneja la institución sea confiable, integra y esté disponible cuando se la solicite.es_ES
dc.format.extent32 p.es_ES
dc.language.isoeses_ES
dc.publisherBabahoyo, UTB - FAFI 2020es_ES
dc.rightsAtribución-NoComercial-SinDerivadas 3.0 Ecuador*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/ec/*
dc.subjectAnálisises_ES
dc.subjectRedes_ES
dc.subjectVulnerabilidadeses_ES
dc.subjectGobiernoes_ES
dc.titleAnálisis de Vulnerabilidades de la Red LAN del gobierno Autónomo Descentralizado de la Parroquia Pimochaes_ES
dc.typebachelorThesises_ES


Ficheros en el ítem

Thumbnail
Thumbnail

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem

Atribución-NoComercial-SinDerivadas 3.0 Ecuador
Excepto si se señala otra cosa, la licencia del ítem se describe como Atribución-NoComercial-SinDerivadas 3.0 Ecuador