Estrategia para la evaluación de vulnerabilidades del sistema de notas utilizando técnicas de hacking ético en la escuela mahatma Gandhi
Develop a strategy for the evaluation of vulnerabilities of the note system using ethical hacking techniques at the Mahatma Gandhi School to carry out this analysis procedure, the following stages of ethical hacking are considered: recognize, scan, exploit and cover or erase traces , will identify s...
Saved in:
| Main Author: | |
|---|---|
| Format: | bachelorThesis |
| Published: |
2023
|
| Subjects: | |
| Online Access: | http://dspace.utb.edu.ec/handle/49000/14968 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Summary: | Develop a strategy for the evaluation of vulnerabilities of the note system using ethical hacking techniques at the Mahatma Gandhi School to carry out this analysis procedure, the following stages of ethical hacking are considered: recognize, scan, exploit and cover or erase traces , will identify security gaps that directly affect the grading system. The tools, guides and techniques on which the Owasp evaluation will be based since they establish an adequate ecosystem presenting results that serve as input to execute each stage of ethical hacking. Educational institutions have seen the need to protect the information created and processed in the academic system, for this reason, a specific guide will be developed based on the information collected. This guide will serve as a strategy to evaluate the vulnerabilities that directly affect the grading system using analytical criteria aligned with ethical hacking and the aforementioned tools. The strategy will be carried out so that it can prevent the vulnerability of the grading system since these do not present their techniques. In the Mahatma Gandhi Educational Unit, therefore, it is important to establish strategies for the evaluation of vulnerabilities of the grading system by users. Not authorized for this work, Owasp will be used, a vulnerability scanner for free use in my opinion. A strategy will be obtained after doing the vulnerability analysis in the notes system. The vulnerabilities that were located in the notes system can be carried out thanks to the study. , investigation and application of technical knowledge that will find out the failures we can trace the IP address of the target organization. The ethical hacking techniques found in the vulnerability exploitation stage turned out to be efficient, so the note system of the case study e The vulnerabilities that were found in the note system could be exploited thanks to the study, research and application of technical knowledge that identified the shortcomings of the academic application. The lack of security application in the notes system was a determining factor in successfully scanning and exploiting vulnerabilities |
|---|