dc.contributor.advisor | Guerrero Torres, Hugo Javier | |
dc.contributor.author | Putan Santillán, Jesús Alejandro | |
dc.date.accessioned | 2023-06-05T14:22:31Z | |
dc.date.available | 2023-06-05T14:22:31Z | |
dc.date.issued | 2023 | |
dc.identifier.uri | http://dspace.utb.edu.ec/handle/49000/14246 | |
dc.description | Information security is crucial for mobile users as the applications they use may contain sensitive personal information. Security vulnerabilities can vary depending on the platform or application, and there are concerns about possible attacks from different fronts, the use of insecure Android applications can have serious consequences for the security and privacy of the company, its productivity and reputation. The objective of this work is to carry out a vulnerability analysis of Android applications used in business management. This document was crucial and justifiable, since it is important to carry out studies on the vulnerabilities of Android applications used in the commercial management of companies. These applications represent potential risks and it is essential to analyze critical situations of mobile technologies to minimize the risks associated with their use; It was critical to develop strong security strategies and measures to protect mobile devices and encourage the use of secure and trusted applications. Regarding the methodology used, it is important to select an appropriate methodology. Common ones include case studies, interviews with experts, and document analysis. A qualitative methodology will be used to understand subjective perceptions and behaviors. This methodology focuses on the analysis of textual and visual data to identify patterns and themes. The interview instrument will be used to collect data from experts in systems and business management, compare results and discuss contributions. This document concludes that vulnerabilities in Android applications used in company management can have serious consequences for the security, productivity and business continuity of companies. Developers must implement adequate security measures to protect applications and users must take measures to protect their devices and personal data. | es_ES |
dc.description | Information security is crucial for mobile users as the applications they use may contain sensitive personal information. Security vulnerabilities can vary depending on the platform or application, and there are concerns about possible attacks from different fronts, the use of insecure Android applications can have serious consequences for the security and privacy of the company, its productivity and reputation. The objective of this work is to carry out a vulnerability analysis of Android applications used in business management. This document was crucial and justifiable, since it is important to carry out studies on the vulnerabilities of Android applications used in the commercial management of companies. These applications represent potential risks and it is essential to analyze critical situations of mobile technologies to minimize the risks associated with their use; It was critical to develop strong security strategies and measures to protect mobile devices and encourage the use of secure and trusted applications. Regarding the methodology used, it is important to select an appropriate methodology. Common ones include case studies, interviews with experts, and document analysis. A qualitative methodology will be used to understand subjective perceptions and behaviors. This methodology focuses on the analysis of textual and visual data to identify patterns and themes. The interview instrument will be used to collect data from experts in systems and business management, compare results and discuss contributions. This document concludes that vulnerabilities in Android applications used in company management can have serious consequences for the security, productivity and business continuity of companies. Developers must implement adequate security measures to protect applications and users must take measures to protect their devices and personal data. | es_ES |
dc.description.abstract | La seguridad de la información es crucial para los usuarios móviles ya que las aplicaciones que utilizan pueden contener información personal sensible. Las vulnerabilidades de seguridad pueden variar dependiendo de la plataforma o aplicación, y hay preocupaciones acerca de posibles ataques desde diferentes frentes, el uso de aplicaciones Android inseguras puede tener graves consecuencias para la seguridad y privacidad de la empresa, su productividad y reputación. El objetivo de este trabajo es realizar un análisis de vulnerabilidades de las aplicaciones Android utilizadas en gestión de empresas. Este documento fue crucial y justificable, ya que es importante realizar estudios sobre las vulnerabilidades de las aplicaciones Android utilizadas en la gestión comercial de las empresas. Estas aplicaciones representan riesgos potenciales y es fundamental analizar situaciones críticas de las tecnologías móviles para minimizar los riesgos asociados con su uso; fue fundamental desarrollar estrategias y medidas de seguridad sólidas para proteger los dispositivos móviles y fomentar el uso de aplicaciones seguras y confiables. En cuanto a la metodología usada, es importante seleccionar una metodología adecuada. Las comunes incluyen el estudio de casos, entrevistas con expertos y análisis de documentos. Una metodología cualitativa se utilizará para comprender percepciones y comportamientos subjetivos. Esta metodología se centra en el análisis de datos textuales y visuales para identificar patrones y temas. El instrumento entrevista se usará para recopilar datos de expertos en sistemas y gestión empresarial, comparar resultados y discutir contribuciones. En este documento se concluye que, las vulnerabilidades en las aplicaciones Android utilizadas en la gestión de empresas pueden tener graves consecuencias para la seguridad, la productividad y la continuidad del negocio de las empresas. Los desarrolladores deben implementar medidas de seguridad adecuadas para proteger las aplicaciones y los usuarios deben tomar medidas para proteger sus dispositivos y datos personales. | es_ES |
dc.format.extent | 30 p. | es_ES |
dc.language.iso | es | es_ES |
dc.publisher | Babahoyo: UTB-FAFI. 2023 | es_ES |
dc.rights | Atribución-NoComercial-SinDerivadas 3.0 Ecuador | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/ec/ | * |
dc.subject | Aplicaciones | es_ES |
dc.subject | Android | es_ES |
dc.subject | Vulnerabilidades | es_ES |
dc.subject | Móvil | es_ES |
dc.subject | Redes | es_ES |
dc.title | Análisis de vulnerabilidades de las aplicaciones Android utilizadas en gestión de empresas. | es_ES |
dc.type | bachelorThesis | es_ES |