Examinando por Materia "vulnerabilidades"
Mostrando 1 - 2 de 2
Resultados por página
Opciones de ordenación
Publicación Restringido Estado del arte de la seguridad en las redes definidas por software de acuerdo a vulnerabilidades y ataques comunes(Universidad Católica de Pereira, 2017-06-16) Escobar Zapata, XimenaCon la expansión de las nuevas tecnologías, la información se ha convertido en un activo fundamental para las organizaciones a nivel mundial, de ahí la necesidad de que las redes por las que viaja sean seguras. Sin embargo, los servicios de red surgidos en los últimos tiempos, están haciendo que las redes tradicionales lleguen a su límite. Como respuesta a dicha necesidad surgen las Redes Definidas por Software (SDN), las cuales a pesar de que constan de una arquitectura de red con un alto dinamismo, manejabilidad y adaptabilidad, tienen a su vez diferentes vulnerabilidades y por ende, también están expuestas a sufrir ataques. El presente trabajo pretende realizar un estudio acerca de la seguridad en las redes definidas por software teniendo en cuenta sus principales ataques y vulnerabilidades con el fin de que sirva como referente teórico a futuras investigaciones.\ Abstract: With the expansion of new technologies, information has become a fundamental asset for organizations worldwide, hence the need for secure travel networks. However, the network services that have emerged in recent times, are causing traditional networks to reach their limit. In response to this need arise Software Defined Networks (SDN), which, although they consist of a network architecture with a high dynamism, manageability and adaptability, have different vulnerabilities and are therefore exposed to Suffer attacks. The present work intends to carry out a study on the security in the networks defined by software taking into account its main attacks and vulnerabilities in order that it serves as theoretical reference to future investigations.Publicación Sólo datos Protocolo de políticas de seguridad informática para las universidades de Risaralda(2013-08-05) Galeano Villa, Jorge Luis; Álzate Castañeda, Cristian CamiloThe bad computer security practices and the lack of importance, implementation and dissemination given to it in universities, boost us to propose a security protocol. For that reason, the aim of this work is to carry out a security protocol that marks clear guidelines at moment to implement security in higher education institutions, that provide them guidance and recommendations in tools choice . In that way , we conducted a study based on students surveys of different universities and programs, along with a series of interviews carried out at area managers of systems; so we chose the sample size according to need, using statistical not random. In addition there were a series of surveys and interviews in the most important universities in the city, both in administrative and academic side, as a result of that, there is not a safe computer security practices implemented, little knowledge and lack of importance on security as much for academic and administrative side. As a conclusion, information security plays a very important role in universities, so it is important to make a good security practices in order to maintain a high standard of information protection.