Análisis comparativo sobre las herramientas de Seguridad Informática Open Source: Nessus y Snort.
Currently, there are many companies that have a lot of information stored in computer systems or in clouds (clouds), hence the need for the company to protect databases and equipment from attacks or intruders, which is relevant both for the activity of this, as for its reputation. And that is why th...
Saved in:
Main Author: | |
---|---|
Format: | bachelorThesis |
Published: |
2022
|
Subjects: | |
Online Access: | http://dspace.utb.edu.ec/handle/49000/11622 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Currently, there are many companies that have a lot of information stored in computer systems or in clouds (clouds), hence the need for the company to protect databases and equipment from attacks or intruders, which is relevant both for the activity of this, as for its reputation. And that is why they pay attention to computer security or cybersecurity. Computer security activates different mechanisms in order to solve a problem that arises before computer equipment due to intrusions or misuse by the person who handles it, either involuntarily or intentionally. Cyber attacks are a huge problem for businesses, putting their sensitive information at risk and forcing them to spend millions of dollars to regain control of their systems and data. Generating a computer security plan is essential for any organization. This will allow companies to detect vulnerabilities in their systems and establish measures to prevent attacks. The goal is to help protect critical business data and systems. Working to reinforce the computer security of a business becomes one of the fundamental processes for companies to guarantee its good performance. For this, it is important to know in depth the main computer security tools and, above all, to know which are those that are most recommended and in shape throughout the current period. |
---|