dc.contributor.advisor | Esparza Cruz, Nelly Karina | |
dc.contributor.author | Lucio Troya, Andrea Estefanía | |
dc.date.accessioned | 2020-05-03T17:49:22Z | |
dc.date.available | 2020-05-03T17:49:22Z | |
dc.date.issued | 2020 | |
dc.identifier.uri | http://dspace.utb.edu.ec/handle/49000/7658 | |
dc.description | Technological advances are being presented in our environment in a very common way, which is why most organizations are implementing information technology in their facilities with the aim of automating processes to improve the quality of their services. But due to this the need arises to maintain the security of the information that is managed in the network, so that it is not violated, stolen or plagiarized. At present, the ITSB presents several problems with the network and infrastructure, since it has not implemented a correct security policy, there are conflicts with IP addresses, computer equipment failures, virus infections and little preventive maintenance of the Network infrastructure The methodology that is going to be used is the descriptive one since it allows to know the predominant situations through the exact description of the activities and processes carried out by the computer network in the ITSB. The present case study consists of three phases which are: asset identification, vulnerability detection and vulnerability analysis. The results obtained in the present study demonstrate that there are vulnerabilities of both physical and logical types within the ITSB network, where those of logical type are not more relevant if the configurations are applied in time. As for the physical ones, necessary measures must be taken because they represent a potential risk that can affect the logical and physical integrity of the institution's infrastructure and information. | es_ES |
dc.description | Technological advances are being presented in our environment in a very common way, which is why most organizations are implementing information technology in their facilities with the aim of automating processes to improve the quality of their services. But due to this the need arises to maintain the security of the information that is managed in the network, so that it is not violated, stolen or plagiarized. At present, the ITSB presents several problems with the network and infrastructure, since it has not implemented a correct security policy, there are conflicts with IP addresses, computer equipment failures, virus infections and little preventive maintenance of the Network infrastructure The methodology that is going to be used is the descriptive one since it allows to know the predominant situations through the exact description of the activities and processes carried out by the computer network in the ITSB. The present case study consists of three phases which are: asset identification, vulnerability detection and vulnerability analysis. The results obtained in the present study demonstrate that there are vulnerabilities of both physical and logical types within the ITSB network, where those of logical type are not more relevant if the configurations are applied in time. As for the physical ones, necessary measures must be taken because they represent a potential risk that can affect the logical and physical integrity of the institution's infrastructure and information. | es_ES |
dc.description.abstract | Los avances tecnológicos se están presentando en nuestro medio de forma muy común, es por eso que la mayoría de las organizaciones están implementado la informática en sus instalaciones con el objetivo de por automatizar procesos para mejorar la calidad de sus servicios. Pero debido a esto nace la necesidad de mantener la seguridad de la información que se gestiona en la red, para que esta no sea vulnerada, robada o plagiada. En la actualidad el ITSB, presenta varios problemas con la red y la infraestructura, al no tener implementada una correcta política de seguridad, existen conflictos con direcciones IP, fallas en los equipos informáticos, infecciones de virus y poco mantenimiento preventivo a la infraestructura de Red. La metodología que se va a emplear es la descriptiva ya que permite conocer las situaciones predominantes a través de la descripción exacta de las actividades y procesos que realiza la red informática en el ITSB. El presente caso de estudio está conformado por tres fases las cuales son: identificación de activos, detección de vulnerabilidades y análisis de vulnerabilidades. Los resultados obtenidos en el presente estudio demuestran que existen vulnerabilidades tanto de tipo físicas, como lógicas dentro de la red del ITSB, donde las de tipo lógico no tienen mayor relevancia si se aplican las configuraciones a tiempo. En cuanto a las físicas se deben tomar medidas necesarias porque representan un riesgo potencial que puede afectar a la integridad lógica como física de la infraestructura e información de la institución. | es_ES |
dc.format.extent | 26 p. | es_ES |
dc.language.iso | es | es_ES |
dc.publisher | Babahoyo, UTB - FAFI 2020 | es_ES |
dc.rights | Atribución-NoComercial-SinDerivadas 3.0 Ecuador | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/ec/ | * |
dc.subject | Análisis | es_ES |
dc.subject | Detectar | es_ES |
dc.subject | Vulnerabilidades | es_ES |
dc.subject | Red | es_ES |
dc.subject | Seguridad | es_ES |
dc.subject | Informática | es_ES |
dc.title | Análisis para Detectar Amenazas y Vulnerabilidades en la Red del ITSB de la ciudad de Babahoyo | es_ES |
dc.type | bachelorThesis | es_ES |