Estrategia para la evaluación de vulnerabilidades del sistema de notas utilizando técnicas de hacking ético en la escuela mahatma Gandhi

Develop a strategy for the evaluation of vulnerabilities of the note system using ethical hacking techniques at the Mahatma Gandhi School to carry out this analysis procedure, the following stages of ethical hacking are considered: recognize, scan, exploit and cover or erase traces , will identify s...

ver descrição completa

Na minha lista:
Detalhes bibliográficos
Autor principal: Campi Domínguez, Carlos Arath (author)
Formato: bachelorThesis
Publicado em: 2023
Assuntos:
Acesso em linha:http://dspace.utb.edu.ec/handle/49000/14968
Tags: Adicionar Tag
Sem tags, seja o primeiro a adicionar uma tag!
_version_ 1859044657216880640
author Campi Domínguez, Carlos Arath
author_facet Campi Domínguez, Carlos Arath
author_role author
collection Repositorio Universidad Técnica de Babahoyo
dc.contributor.none.fl_str_mv Ruiz Parrales, Iván Rubén
dc.creator.none.fl_str_mv Campi Domínguez, Carlos Arath
dc.date.none.fl_str_mv 2023-11-01T16:14:55Z
2023-11-01T16:14:55Z
2023
dc.format.none.fl_str_mv 57 p.
application/pdf
dc.identifier.none.fl_str_mv http://dspace.utb.edu.ec/handle/49000/14968
dc.language.none.fl_str_mv es
dc.publisher.none.fl_str_mv Babahoyo: UTB-FAFI. 2023
dc.rights.none.fl_str_mv Atribución-NoComercial-SinDerivadas 3.0 Ecuador
http://creativecommons.org/licenses/by-nc-nd/3.0/ec/
info:eu-repo/semantics/openAccess
dc.source.none.fl_str_mv reponame:Repositorio Universidad Técnica de Babahoyo
instname:Universidad Técnica de Babahoyo
instacron:UTB
dc.subject.none.fl_str_mv Estrategias
Vulnerabilidades
Scaneo
Servidores
Acceso
dc.title.none.fl_str_mv Estrategia para la evaluación de vulnerabilidades del sistema de notas utilizando técnicas de hacking ético en la escuela mahatma Gandhi
dc.type.none.fl_str_mv info:eu-repo/semantics/publishedVersion
info:eu-repo/semantics/bachelorThesis
description Develop a strategy for the evaluation of vulnerabilities of the note system using ethical hacking techniques at the Mahatma Gandhi School to carry out this analysis procedure, the following stages of ethical hacking are considered: recognize, scan, exploit and cover or erase traces , will identify security gaps that directly affect the grading system. The tools, guides and techniques on which the Owasp evaluation will be based since they establish an adequate ecosystem presenting results that serve as input to execute each stage of ethical hacking. Educational institutions have seen the need to protect the information created and processed in the academic system, for this reason, a specific guide will be developed based on the information collected. This guide will serve as a strategy to evaluate the vulnerabilities that directly affect the grading system using analytical criteria aligned with ethical hacking and the aforementioned tools. The strategy will be carried out so that it can prevent the vulnerability of the grading system since these do not present their techniques. In the Mahatma Gandhi Educational Unit, therefore, it is important to establish strategies for the evaluation of vulnerabilities of the grading system by users. Not authorized for this work, Owasp will be used, a vulnerability scanner for free use in my opinion. A strategy will be obtained after doing the vulnerability analysis in the notes system. The vulnerabilities that were located in the notes system can be carried out thanks to the study. , investigation and application of technical knowledge that will find out the failures we can trace the IP address of the target organization. The ethical hacking techniques found in the vulnerability exploitation stage turned out to be efficient, so the note system of the case study e The vulnerabilities that were found in the note system could be exploited thanks to the study, research and application of technical knowledge that identified the shortcomings of the academic application. The lack of security application in the notes system was a determining factor in successfully scanning and exploiting vulnerabilities
eu_rights_str_mv openAccess
format bachelorThesis
id UTB_0da883dc7d7051bc652eaf917bf014f0
instacron_str UTB
institution UTB
instname_str Universidad Técnica de Babahoyo
language_invalid_str_mv es
network_acronym_str UTB
network_name_str Repositorio Universidad Técnica de Babahoyo
oai_identifier_str oai:dspace.utb.edu.ec:49000/14968
publishDate 2023
publisher.none.fl_str_mv Babahoyo: UTB-FAFI. 2023
reponame_str Repositorio Universidad Técnica de Babahoyo
repository.mail.fl_str_mv .
repository.name.fl_str_mv Repositorio Universidad Técnica de Babahoyo - Universidad Técnica de Babahoyo
repository_id_str 0
rights_invalid_str_mv Atribución-NoComercial-SinDerivadas 3.0 Ecuador
http://creativecommons.org/licenses/by-nc-nd/3.0/ec/
spelling Estrategia para la evaluación de vulnerabilidades del sistema de notas utilizando técnicas de hacking ético en la escuela mahatma GandhiCampi Domínguez, Carlos ArathEstrategiasVulnerabilidadesScaneoServidoresAccesoDevelop a strategy for the evaluation of vulnerabilities of the note system using ethical hacking techniques at the Mahatma Gandhi School to carry out this analysis procedure, the following stages of ethical hacking are considered: recognize, scan, exploit and cover or erase traces , will identify security gaps that directly affect the grading system. The tools, guides and techniques on which the Owasp evaluation will be based since they establish an adequate ecosystem presenting results that serve as input to execute each stage of ethical hacking. Educational institutions have seen the need to protect the information created and processed in the academic system, for this reason, a specific guide will be developed based on the information collected. This guide will serve as a strategy to evaluate the vulnerabilities that directly affect the grading system using analytical criteria aligned with ethical hacking and the aforementioned tools. The strategy will be carried out so that it can prevent the vulnerability of the grading system since these do not present their techniques. In the Mahatma Gandhi Educational Unit, therefore, it is important to establish strategies for the evaluation of vulnerabilities of the grading system by users. Not authorized for this work, Owasp will be used, a vulnerability scanner for free use in my opinion. A strategy will be obtained after doing the vulnerability analysis in the notes system. The vulnerabilities that were located in the notes system can be carried out thanks to the study. , investigation and application of technical knowledge that will find out the failures we can trace the IP address of the target organization. The ethical hacking techniques found in the vulnerability exploitation stage turned out to be efficient, so the note system of the case study e The vulnerabilities that were found in the note system could be exploited thanks to the study, research and application of technical knowledge that identified the shortcomings of the academic application. The lack of security application in the notes system was a determining factor in successfully scanning and exploiting vulnerabilitiesDevelop a strategy for the evaluation of vulnerabilities of the note system using ethical hacking techniques at the Mahatma Gandhi School to carry out this analysis procedure, the following stages of ethical hacking are considered: recognize, scan, exploit and cover or erase traces , will identify security gaps that directly affect the grading system. The tools, guides and techniques on which the Owasp evaluation will be based since they establish an adequate ecosystem presenting results that serve as input to execute each stage of ethical hacking. Educational institutions have seen the need to protect the information created and processed in the academic system, for this reason, a specific guide will be developed based on the information collected. This guide will serve as a strategy to evaluate the vulnerabilities that directly affect the grading system using analytical criteria aligned with ethical hacking and the aforementioned tools. The strategy will be carried out so that it can prevent the vulnerability of the grading system since these do not present their techniques. In the Mahatma Gandhi Educational Unit, therefore, it is important to establish strategies for the evaluation of vulnerabilities of the grading system by users. Not authorized for this work, Owasp will be used, a vulnerability scanner for free use in my opinion. A strategy will be obtained after doing the vulnerability analysis in the notes system. The vulnerabilities that were located in the notes system can be carried out thanks to the study. , investigation and application of technical knowledge that will find out the failures we can trace the IP address of the target organization. The ethical hacking techniques found in the vulnerability exploitation stage turned out to be efficient, so the note system of the case study e The vulnerabilities that were found in the note system could be exploited thanks to the study, research and application of technical knowledge that identified the shortcomings of the academic application. The lack of security application in the notes system was a determining factor in successfully scanning and exploiting vulnerabilitiesDesarrollar una estrategia para la evaluación de vulnerabilidades del sistema de notas utilizando técnicas de hacking ético en la escuela mahatma Gandhi para llevar a cabo este procedimiento de análisis, se consideran las siguientes etapas de hacking ético: reconocer, escanear, explotar y cubrir o borrar huellas, identificara las brechas de seguridad que afectan directamente al sistema de notas. Las herramientas, guías y técnicas en las cuales se basará la evaluación Owasp ya que establecen un ecosistema adecuado presentando resultados que sirven de insumo para ejecutar cada etapa del hacking ético. Las instituciones educativas han visto la necesidad de proteger la información creada y procesada en el sistema académico, por tal motivo, se desarrollará una guía específica en base a la información recopilada. Esta guía valdrá de estrategia para evaluar las vulnerabilidades que afectan directamente al sistema de notas utilizando el criterio analítico alineado al hacking ético y las herramientas antes mencionadas. Se realizara la estrategia para que pueda impedir tener la vulnerabilidad del sistema de notas ya que estas no presentan sus técnicas En la Unidad Educativa Mahatma Gandhi, Por lo tanto, es importante establecer estrategias para la evaluación de vulnerabilidades del sistema de notas por parte de usuarios no autorizado para este trabajo se utilizará Owasp, un escáner de vulnerabilidades de uso libre en mi criterio Se obtendrá estrategia después de hacer el análisis de vulnerabilidades en el sistema de notas las vulnerabilidades que se localizaron en el sistema de notas se pueden realizar gracias al estudio, investigación y aplicación de conocimientos técnicos que averiguara las fallas podemos rastrear la dirección IP de la organización objetivo. Las técnicas de hacking ético que se encuentra en la etapa de explotación de vulnerabilidades resultasen ser eficientes por lo que el sistema de notas del caso de estudio e Las vulnerabilidades que se encontraron en el sistema de notas se pudieron explotar gracias al estudio, investigación y aplicación de conocimientos técnicos que identificaron las falencias del aplicativo académico. La falta de aplicación de seguridad en el sistema de notas fue un factor determinante para lograr escanear y explotar vulnerabilidades con éxito,Babahoyo: UTB-FAFI. 2023Ruiz Parrales, Iván Rubén2023-11-01T16:14:55Z2023-11-01T16:14:55Z2023info:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/bachelorThesis57 p.application/pdfhttp://dspace.utb.edu.ec/handle/49000/14968esAtribución-NoComercial-SinDerivadas 3.0 Ecuadorhttp://creativecommons.org/licenses/by-nc-nd/3.0/ec/info:eu-repo/semantics/openAccessreponame:Repositorio Universidad Técnica de Babahoyoinstname:Universidad Técnica de Babahoyoinstacron:UTB2023-11-02T08:01:24Zoai:dspace.utb.edu.ec:49000/14968Institucionalhttp://dspace.utb.edu.ec/Universidad públicahttps://utb.edu.ec/http://dspace.utb.edu.ec/oai.Ecuador...opendoar:02026-03-07T22:25:49.190224Repositorio Universidad Técnica de Babahoyo - Universidad Técnica de Babahoyotrue
spellingShingle Estrategia para la evaluación de vulnerabilidades del sistema de notas utilizando técnicas de hacking ético en la escuela mahatma Gandhi
Campi Domínguez, Carlos Arath
Estrategias
Vulnerabilidades
Scaneo
Servidores
Acceso
status_str publishedVersion
title Estrategia para la evaluación de vulnerabilidades del sistema de notas utilizando técnicas de hacking ético en la escuela mahatma Gandhi
title_full Estrategia para la evaluación de vulnerabilidades del sistema de notas utilizando técnicas de hacking ético en la escuela mahatma Gandhi
title_fullStr Estrategia para la evaluación de vulnerabilidades del sistema de notas utilizando técnicas de hacking ético en la escuela mahatma Gandhi
title_full_unstemmed Estrategia para la evaluación de vulnerabilidades del sistema de notas utilizando técnicas de hacking ético en la escuela mahatma Gandhi
title_short Estrategia para la evaluación de vulnerabilidades del sistema de notas utilizando técnicas de hacking ético en la escuela mahatma Gandhi
title_sort Estrategia para la evaluación de vulnerabilidades del sistema de notas utilizando técnicas de hacking ético en la escuela mahatma Gandhi
topic Estrategias
Vulnerabilidades
Scaneo
Servidores
Acceso
url http://dspace.utb.edu.ec/handle/49000/14968