Análisis de la interconectividad y seguridad de datos de la red del GAD Parroquial Caracol

This research case deals with the interconnectivity of the network in conjunction with information security in the Autonomous Decentralized Government of the “Caracol” Parish, the same one that maintains the investigation sub-line; Intelligent software and hardware technologies and networks, because...

Бүрэн тодорхойлолт

-д хадгалсан:
Номзүйн дэлгэрэнгүй
Үндсэн зохиолч: Brunis Briones, Carlos Daniel (author)
Формат: bachelorThesis
Хэвлэсэн: 2020
Нөхцлүүд:
Онлайн хандалт:http://dspace.utb.edu.ec/handle/49000/8611
Шошгууд: Шошго нэмэх
Шошго байхгүй, Энэхүү баримтыг шошголох эхний хүн болох!
Тодорхойлолт
Тойм:This research case deals with the interconnectivity of the network in conjunction with information security in the Autonomous Decentralized Government of the “Caracol” Parish, the same one that maintains the investigation sub-line; Intelligent software and hardware technologies and networks, because the object factors are directly related to information and communication systems, entrepreneurship and innovation. The institution's network presented inconveniences such as; malfunctions in network links, this is due to poorly structured cabling. The main characteristic of the infrastructure that he sent and received the information packets without presenting problems such as loss or incomplete information. Its main objective is to improve your network infrastructure to provide a good interconnectivity service to your departments while preserving data security. In the research that was carried out in the GADP of “Caracol” when applying the inductive methodology and instruments such as questionnaires applied to the officials, and the monitoring with wireshark and zenmap allowed to establish the current security diagnosis of the network, it was obtained as a result that The institution does not have the technological devices that ensure the performance of the network. In addition, it does not have the necessary tools to analyze data traffic, therefore, the institution does not apply the rules for information security and its wiring. Finally, and according to the results of the analysis, it is concluded that the continuous monitoring and scanning of data traffic allows an adequate evaluation in real time of the behavior of the institution's network.