Mostrar el registro sencillo del ítem

dc.contributor.advisorSandoya Villafuerte, Jose Walter
dc.contributor.authorRuiz Ibarra, Brigitte Katherine
dc.date.accessioned2020-10-13T03:25:53Z
dc.date.available2020-10-13T03:25:53Z
dc.date.issued2020
dc.identifier.urihttp://dspace.utb.edu.ec/handle/49000/8722
dc.descriptionThe purpose of this investigation is to determine the existing vulnerabilities that the municipal GAD of the Canton Caluma presents, for this reason the municipality must correct to avoid the problems that have been occurring since the previous mandate. Over the years we have been able to demonstrate and put into use wireless networks either within the home environment for a better experience of wireless connectivity and if we can have a better function of the devices that exist today within a home such as : Laptop, Smart Tv, Cell phones etc. It is worth noting that wireless networks are very effective today since they offer us great benefits and much more in an administrative area such as said institution, which is to improve data transmission and data storage. In this case study, the qualitative methodology was used, adapting the inductive method that provided to establish the operation of the networks, with the observation technique it was verified if the institution has security standards. In order to perform the vulnerability analysis, the Nessus Software was used which performs a network scan and thus subsequently shows all the ports that are vulnerable to any attack. In the same way, the Inssider tool was used to be able to detect the frequency of the network, and to observe the speed of the network, the Speedtest tool was used.es_ES
dc.descriptionThe purpose of this investigation is to determine the existing vulnerabilities that the municipal GAD of the Canton Caluma presents, for this reason the municipality must correct to avoid the problems that have been occurring since the previous mandate. Over the years we have been able to demonstrate and put into use wireless networks either within the home environment for a better experience of wireless connectivity and if we can have a better function of the devices that exist today within a home such as : Laptop, Smart Tv, Cell phones etc. It is worth noting that wireless networks are very effective today since they offer us great benefits and much more in an administrative area such as said institution, which is to improve data transmission and data storage. In this case study, the qualitative methodology was used, adapting the inductive method that provided to establish the operation of the networks, with the observation technique it was verified if the institution has security standards. In order to perform the vulnerability analysis, the Nessus Software was used which performs a network scan and thus subsequently shows all the ports that are vulnerable to any attack. In the same way, the Inssider tool was used to be able to detect the frequency of the network, and to observe the speed of the network, the Speedtest tool was used.es_ES
dc.description.abstractLa presente investigación tiene como propósito determinar las vulnerabilidades existentes que presenta el GAD municipal del Cantón Caluma, por tal razón el municipio deberá corregir para evitar los problemas que vienen ocurriendo desde el anterior mandato. Con el pasar de los años hemos podido evidenciar y poner en uso las redes inalámbricas ya sea dentro del ámbito domiciliario para una mejor experiencia de conectividad inalámbrica y si poder tener una mejor función de los dispositivos que existe hoy en día dentro de un domicilio como es: Laptop, Smart Tv, Celulares etc. Vale señalar que son muy eficaces las redes inalámbricas en la actualidad ya que nos ofrecen grandes beneficios y mucho más en un área administrativa como dicha institución que es mejorar la trasmisión de datos y almacenamientos de los mismos. En este estudio de caso se empleó la metodología cualitativa adaptando el método inductivo que proporciono establecer el funcionamiento de las redes, con la técnica de la observación se verifico si la institución cuenta son normas de seguridad. Para poder realizar el análisis de las vulnerabilidades se utilizó el Software Nessus el cual realiza un escaneo en la red y así mostrar posteriormente todos los puertos que son vulnerables para cualquier ataque. De la misma manera se utilizó la herramienta Inssider para poder detectar la frecuencia de la red, y para observar cual era la velocidad que tenía la red se usó la herramienta Speedtest.es_ES
dc.format.extent26 p.es_ES
dc.language.isoeses_ES
dc.publisherBABAHOYO: UTB, 2020es_ES
dc.rightsAtribución-NoComercial-SinDerivadas 3.0 Ecuador*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/ec/*
dc.subjectPercepciónes_ES
dc.subjectIntegridades_ES
dc.subjectBrechases_ES
dc.subjectTransgresiónes_ES
dc.titleAnálisis de las vulnerabilidades de las redes inalámbricas del GAD Municipal del cantón Calumaes_ES
dc.typebachelorThesises_ES


Ficheros en el ítem

Thumbnail
Thumbnail

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem

Atribución-NoComercial-SinDerivadas 3.0 Ecuador
Excepto si se señala otra cosa, la licencia del ítem se describe como Atribución-NoComercial-SinDerivadas 3.0 Ecuador