Análisis de herramientas de análisis forense y su aplicabilidad en la investigación de delitos informáticos.

Forensic information is essential in cybersecurity, especially with the rise of technology and cyberattacks. This field is dedicated to the acquisition, verification and preservation of digital information on various devices and operating systems. Forensic tools allow you to recover information, res...

पूर्ण विवरण

में बचाया:
ग्रंथसूची विवरण
मुख्य लेखक: Contreras Contreras, Julissa Mariu (author)
स्वरूप: bachelorThesis
प्रकाशित: 2024
विषय:
ऑनलाइन पहुंच:http://dspace.utb.edu.ec/handle/49000/16979
टैग: टैग जोड़ें
कोई टैग नहीं, इस रिकॉर्ड को टैग करने वाले पहले व्यक्ति बनें!
_version_ 1863483722959945728
author Contreras Contreras, Julissa Mariu
author_facet Contreras Contreras, Julissa Mariu
author_role author
collection Repositorio Universidad Técnica de Babahoyo
dc.contributor.none.fl_str_mv Ruiz Parrales, Iván Rubén
dc.creator.none.fl_str_mv Contreras Contreras, Julissa Mariu
dc.date.none.fl_str_mv 2024-08-20T20:27:28Z
2024-08-20T20:27:28Z
2024
dc.format.none.fl_str_mv 54 p.
application/pdf
dc.identifier.none.fl_str_mv http://dspace.utb.edu.ec/handle/49000/16979
dc.language.none.fl_str_mv es
dc.publisher.none.fl_str_mv Babahoyo: UTB-FAFI. 2024
dc.rights.none.fl_str_mv Atribución-NoComercial-SinDerivadas 3.0 Ecuador
http://creativecommons.org/licenses/by-nc-nd/3.0/ec/
info:eu-repo/semantics/openAccess
dc.source.none.fl_str_mv reponame:Repositorio Universidad Técnica de Babahoyo
instname:Universidad Técnica de Babahoyo
instacron:UTB
dc.subject.none.fl_str_mv Informática forense
Ciberataques
Herramientas forenses
Delitos informáticos
Seguridad informática
dc.title.none.fl_str_mv Análisis de herramientas de análisis forense y su aplicabilidad en la investigación de delitos informáticos.
dc.type.none.fl_str_mv info:eu-repo/semantics/publishedVersion
info:eu-repo/semantics/bachelorThesis
description Forensic information is essential in cybersecurity, especially with the rise of technology and cyberattacks. This field is dedicated to the acquisition, verification and preservation of digital information on various devices and operating systems. Forensic tools allow you to recover information, restore deleted files and verify specific actions, generating accurate reports for legal use. The key to computer forensics is selecting the right tool for each investigation, along with the experience of the investigator. The increase in the use of computer and telecommunications equipment with Internet access has increased computer security incidents, making computer forensics crucial to identify and analyze the perpetrators of computer crimes. Computer forensics uses techniques and methods to reconstruct the hardware or technology-based sequence of events during an incident. This work aims to demonstrate the importance and effectiveness of computer forensic tools by objectively evaluating their impact on the investigation of computer crimes.
eu_rights_str_mv openAccess
format bachelorThesis
id UTB_3d8b4795ad604dd55aa8b9cab4d184c4
instacron_str UTB
institution UTB
instname_str Universidad Técnica de Babahoyo
language_invalid_str_mv es
network_acronym_str UTB
network_name_str Repositorio Universidad Técnica de Babahoyo
oai_identifier_str oai:dspace.utb.edu.ec:49000/16979
publishDate 2024
publisher.none.fl_str_mv Babahoyo: UTB-FAFI. 2024
reponame_str Repositorio Universidad Técnica de Babahoyo
repository.mail.fl_str_mv .
repository.name.fl_str_mv Repositorio Universidad Técnica de Babahoyo - Universidad Técnica de Babahoyo
repository_id_str 0
rights_invalid_str_mv Atribución-NoComercial-SinDerivadas 3.0 Ecuador
http://creativecommons.org/licenses/by-nc-nd/3.0/ec/
spelling Análisis de herramientas de análisis forense y su aplicabilidad en la investigación de delitos informáticos.Contreras Contreras, Julissa MariuInformática forenseCiberataquesHerramientas forensesDelitos informáticosSeguridad informáticaForensic information is essential in cybersecurity, especially with the rise of technology and cyberattacks. This field is dedicated to the acquisition, verification and preservation of digital information on various devices and operating systems. Forensic tools allow you to recover information, restore deleted files and verify specific actions, generating accurate reports for legal use. The key to computer forensics is selecting the right tool for each investigation, along with the experience of the investigator. The increase in the use of computer and telecommunications equipment with Internet access has increased computer security incidents, making computer forensics crucial to identify and analyze the perpetrators of computer crimes. Computer forensics uses techniques and methods to reconstruct the hardware or technology-based sequence of events during an incident. This work aims to demonstrate the importance and effectiveness of computer forensic tools by objectively evaluating their impact on the investigation of computer crimes.Forensic information is essential in cybersecurity, especially with the rise of technology and cyberattacks. This field is dedicated to the acquisition, verification and preservation of digital information on various devices and operating systems. Forensic tools allow you to recover information, restore deleted files and verify specific actions, generating accurate reports for legal use. The key to computer forensics is selecting the right tool for each investigation, along with the experience of the investigator. The increase in the use of computer and telecommunications equipment with Internet access has increased computer security incidents, making computer forensics crucial to identify and analyze the perpetrators of computer crimes. Computer forensics uses techniques and methods to reconstruct the hardware or technology-based sequence of events during an incident. This work aims to demonstrate the importance and effectiveness of computer forensic tools by objectively evaluating their impact on the investigation of computer crimes.La información forense es esencial en la seguridad informática, especialmente con el aumento de la tecnología y los ciberataques. Este campo se dedica a la adquisición, verificación y preservación de información digital en diversos dispositivos y sistemas operativos. Las herramientas forenses permiten recuperar información, restaurar archivos eliminados y verificar acciones específicas, generando informes precisos para uso legal. La clave de la informática forense es seleccionar la herramienta adecuada para cada investigación, junto con la experiencia del investigador. El incremento en el uso de equipos informáticos y telecomunicaciones con acceso a internet ha elevado los incidentes de seguridad informática, haciendo que la informática forense sea crucial para identificar y analizar los autores de delitos informáticos. La informática forense utiliza técnicas y métodos para reconstruir la secuencia de eventos basada en hardware o tecnología durante un incidente. Este trabajo pretende demostrar la importancia y la eficacia de las herramientas informáticas forenses evaluando objetiva su impacto en la investigación de delitos informáticos.Babahoyo: UTB-FAFI. 2024Ruiz Parrales, Iván Rubén2024-08-20T20:27:28Z2024-08-20T20:27:28Z2024info:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/bachelorThesis54 p.application/pdfhttp://dspace.utb.edu.ec/handle/49000/16979esAtribución-NoComercial-SinDerivadas 3.0 Ecuadorhttp://creativecommons.org/licenses/by-nc-nd/3.0/ec/info:eu-repo/semantics/openAccessreponame:Repositorio Universidad Técnica de Babahoyoinstname:Universidad Técnica de Babahoyoinstacron:UTB2024-08-21T08:08:14Zoai:dspace.utb.edu.ec:49000/16979Institucionalhttp://dspace.utb.edu.ec/Universidad públicahttps://utb.edu.ec/http://dspace.utb.edu.ec/oai.Ecuador...opendoar:02026-04-25T22:21:19.331747Repositorio Universidad Técnica de Babahoyo - Universidad Técnica de Babahoyotrue
spellingShingle Análisis de herramientas de análisis forense y su aplicabilidad en la investigación de delitos informáticos.
Contreras Contreras, Julissa Mariu
Informática forense
Ciberataques
Herramientas forenses
Delitos informáticos
Seguridad informática
status_str publishedVersion
title Análisis de herramientas de análisis forense y su aplicabilidad en la investigación de delitos informáticos.
title_full Análisis de herramientas de análisis forense y su aplicabilidad en la investigación de delitos informáticos.
title_fullStr Análisis de herramientas de análisis forense y su aplicabilidad en la investigación de delitos informáticos.
title_full_unstemmed Análisis de herramientas de análisis forense y su aplicabilidad en la investigación de delitos informáticos.
title_short Análisis de herramientas de análisis forense y su aplicabilidad en la investigación de delitos informáticos.
title_sort Análisis de herramientas de análisis forense y su aplicabilidad en la investigación de delitos informáticos.
topic Informática forense
Ciberataques
Herramientas forenses
Delitos informáticos
Seguridad informática
url http://dspace.utb.edu.ec/handle/49000/16979