Mostrar el registro sencillo del ítem

dc.contributor.advisorAlcoser Cantuña, Fabian Eduardo
dc.contributor.authorCaiza Cedeño, Bryan Leonel
dc.date.accessioned2020-05-21T16:11:22Z
dc.date.available2020-05-21T16:11:22Z
dc.date.issued2020
dc.identifier.urihttp://dspace.utb.edu.ec/handle/49000/7943
dc.descriptionNetwork security in a company is an important aspect since its smooth and smooth development depends on it. In small and medium-sized companies these security measures are not very applied since they are taken in a little useful and unnecessary way. Despite being the ones that do not apply security measures, they are not the only ones that have attacks, since these attacks are directed with a purpose, they usually have a specific objective, these can be lucrative, people who have hatred or malice towards the company or a representative of it, in this way seeking to cause harm. In this case study, we seek to analyze the different attacks that a company may receive when it does not have a security system, we will also provide optimal solutions for security policies and standards which serve to govern its proper operation. Among the attacks that can be received, it is sought that its effect spreads as little as possible. In an attack, the person who carries it out can steal or falsify any type of information that transits the network, normally an attack exploits vulnerabilities in the network to infiltrate it.es_ES
dc.descriptionNetwork security in a company is an important aspect since its smooth and smooth development depends on it. In small and medium-sized companies these security measures are not very applied since they are taken in a little useful and unnecessary way. Despite being the ones that do not apply security measures, they are not the only ones that have attacks, since these attacks are directed with a purpose, they usually have a specific objective, these can be lucrative, people who have hatred or malice towards the company or a representative of it, in this way seeking to cause harm. In this case study, we seek to analyze the different attacks that a company may receive when it does not have a security system, we will also provide optimal solutions for security policies and standards which serve to govern its proper operation. Among the attacks that can be received, it is sought that its effect spreads as little as possible. In an attack, the person who carries it out can steal or falsify any type of information that transits the network, normally an attack exploits vulnerabilities in the network to infiltrate it.es_ES
dc.description.abstractLa seguridad en redes en una empresa es un aspecto importante ya que de esta depende su desarrollo fluido y sin malestares. En empresas pequeñas y medianas estas medidas de seguridad no son muy aplicadas ya que son tomadas de una forma poco útil e innecesarias. Pese a ser estas las que no aplican medidas de seguridad, no son las únicas que tienen ataques, ya que estos ataques son dirigidos con un cometido, normalmente tienen un objetivo específico, estos pueden ser lucrativos, personas que tienen un odio o malicia hacia la empresa o un represéntate de ella, de esta forma buscando causar daño. Este caso de estudio buscamos analizar los diferentes ataques que puede recibir una empresa al no contar con un sistema de seguridad, también daremos soluciones optimas de políticas y estándares de seguridad los cuales sirven para regir un buen funcionamiento. Dentro de los ataques que se pueden recibir se busca que el efecto de este se propague lo menos posible. En un ataque la persona que lo realice puede robar o falsificar cualquier tipo de información que transite en la red, normalmente un ataque aprovecha vulnerabilidades de la red para poder infiltrarse.es_ES
dc.format.extent23 p.es_ES
dc.language.isoeses_ES
dc.publisherBabahoyo, UTB - FAFI 2020es_ES
dc.rightsAtribución-NoComercial-SinDerivadas 3.0 Ecuador*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/ec/*
dc.subjectHateres_ES
dc.subjectSeguridades_ES
dc.subjectEmpresaes_ES
dc.subjectRepresentantees_ES
dc.subjectAtaquees_ES
dc.subjectVulnerabilidadeses_ES
dc.titleAnálisis de amenazas y vulnerabilidades en la red inalámbrica del Estudio Jurídico "Cedeño y Asociados" de la ciudad de Milagroes_ES
dc.typebachelorThesises_ES


Ficheros en el ítem

Thumbnail
Thumbnail

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem

Atribución-NoComercial-SinDerivadas 3.0 Ecuador
Excepto si se señala otra cosa, la licencia del ítem se describe como Atribución-NoComercial-SinDerivadas 3.0 Ecuador