Análisis de herramientas de análisis forense y su aplicabilidad en la investigación de delitos informáticos.
Forensic information is essential in cybersecurity, especially with the rise of technology and cyberattacks. This field is dedicated to the acquisition, verification and preservation of digital information on various devices and operating systems. Forensic tools allow you to recover information, res...
Gardado en:
| Autor Principal: | |
|---|---|
| Formato: | bachelorThesis |
| Publicado: |
2024
|
| Subjects: | |
| Acceso en liña: | http://dspace.utb.edu.ec/handle/49000/16979 |
| Tags: |
Engadir etiqueta
Sen Etiquetas, Sexa o primeiro en etiquetar este rexistro!
|
| _version_ | 1863483722959945728 |
|---|---|
| author | Contreras Contreras, Julissa Mariu |
| author_facet | Contreras Contreras, Julissa Mariu |
| author_role | author |
| collection | Repositorio Universidad Técnica de Babahoyo |
| dc.contributor.none.fl_str_mv | Ruiz Parrales, Iván Rubén |
| dc.creator.none.fl_str_mv | Contreras Contreras, Julissa Mariu |
| dc.date.none.fl_str_mv | 2024-08-20T20:27:28Z 2024-08-20T20:27:28Z 2024 |
| dc.format.none.fl_str_mv | 54 p. application/pdf |
| dc.identifier.none.fl_str_mv | http://dspace.utb.edu.ec/handle/49000/16979 |
| dc.language.none.fl_str_mv | es |
| dc.publisher.none.fl_str_mv | Babahoyo: UTB-FAFI. 2024 |
| dc.rights.none.fl_str_mv | Atribución-NoComercial-SinDerivadas 3.0 Ecuador http://creativecommons.org/licenses/by-nc-nd/3.0/ec/ info:eu-repo/semantics/openAccess |
| dc.source.none.fl_str_mv | reponame:Repositorio Universidad Técnica de Babahoyo instname:Universidad Técnica de Babahoyo instacron:UTB |
| dc.subject.none.fl_str_mv | Informática forense Ciberataques Herramientas forenses Delitos informáticos Seguridad informática |
| dc.title.none.fl_str_mv | Análisis de herramientas de análisis forense y su aplicabilidad en la investigación de delitos informáticos. |
| dc.type.none.fl_str_mv | info:eu-repo/semantics/publishedVersion info:eu-repo/semantics/bachelorThesis |
| description | Forensic information is essential in cybersecurity, especially with the rise of technology and cyberattacks. This field is dedicated to the acquisition, verification and preservation of digital information on various devices and operating systems. Forensic tools allow you to recover information, restore deleted files and verify specific actions, generating accurate reports for legal use. The key to computer forensics is selecting the right tool for each investigation, along with the experience of the investigator. The increase in the use of computer and telecommunications equipment with Internet access has increased computer security incidents, making computer forensics crucial to identify and analyze the perpetrators of computer crimes. Computer forensics uses techniques and methods to reconstruct the hardware or technology-based sequence of events during an incident. This work aims to demonstrate the importance and effectiveness of computer forensic tools by objectively evaluating their impact on the investigation of computer crimes. |
| eu_rights_str_mv | openAccess |
| format | bachelorThesis |
| id | UTB_3d8b4795ad604dd55aa8b9cab4d184c4 |
| instacron_str | UTB |
| institution | UTB |
| instname_str | Universidad Técnica de Babahoyo |
| language_invalid_str_mv | es |
| network_acronym_str | UTB |
| network_name_str | Repositorio Universidad Técnica de Babahoyo |
| oai_identifier_str | oai:dspace.utb.edu.ec:49000/16979 |
| publishDate | 2024 |
| publisher.none.fl_str_mv | Babahoyo: UTB-FAFI. 2024 |
| reponame_str | Repositorio Universidad Técnica de Babahoyo |
| repository.mail.fl_str_mv | . |
| repository.name.fl_str_mv | Repositorio Universidad Técnica de Babahoyo - Universidad Técnica de Babahoyo |
| repository_id_str | 0 |
| rights_invalid_str_mv | Atribución-NoComercial-SinDerivadas 3.0 Ecuador http://creativecommons.org/licenses/by-nc-nd/3.0/ec/ |
| spelling | Análisis de herramientas de análisis forense y su aplicabilidad en la investigación de delitos informáticos.Contreras Contreras, Julissa MariuInformática forenseCiberataquesHerramientas forensesDelitos informáticosSeguridad informáticaForensic information is essential in cybersecurity, especially with the rise of technology and cyberattacks. This field is dedicated to the acquisition, verification and preservation of digital information on various devices and operating systems. Forensic tools allow you to recover information, restore deleted files and verify specific actions, generating accurate reports for legal use. The key to computer forensics is selecting the right tool for each investigation, along with the experience of the investigator. The increase in the use of computer and telecommunications equipment with Internet access has increased computer security incidents, making computer forensics crucial to identify and analyze the perpetrators of computer crimes. Computer forensics uses techniques and methods to reconstruct the hardware or technology-based sequence of events during an incident. This work aims to demonstrate the importance and effectiveness of computer forensic tools by objectively evaluating their impact on the investigation of computer crimes.Forensic information is essential in cybersecurity, especially with the rise of technology and cyberattacks. This field is dedicated to the acquisition, verification and preservation of digital information on various devices and operating systems. Forensic tools allow you to recover information, restore deleted files and verify specific actions, generating accurate reports for legal use. The key to computer forensics is selecting the right tool for each investigation, along with the experience of the investigator. The increase in the use of computer and telecommunications equipment with Internet access has increased computer security incidents, making computer forensics crucial to identify and analyze the perpetrators of computer crimes. Computer forensics uses techniques and methods to reconstruct the hardware or technology-based sequence of events during an incident. This work aims to demonstrate the importance and effectiveness of computer forensic tools by objectively evaluating their impact on the investigation of computer crimes.La información forense es esencial en la seguridad informática, especialmente con el aumento de la tecnología y los ciberataques. Este campo se dedica a la adquisición, verificación y preservación de información digital en diversos dispositivos y sistemas operativos. Las herramientas forenses permiten recuperar información, restaurar archivos eliminados y verificar acciones específicas, generando informes precisos para uso legal. La clave de la informática forense es seleccionar la herramienta adecuada para cada investigación, junto con la experiencia del investigador. El incremento en el uso de equipos informáticos y telecomunicaciones con acceso a internet ha elevado los incidentes de seguridad informática, haciendo que la informática forense sea crucial para identificar y analizar los autores de delitos informáticos. La informática forense utiliza técnicas y métodos para reconstruir la secuencia de eventos basada en hardware o tecnología durante un incidente. Este trabajo pretende demostrar la importancia y la eficacia de las herramientas informáticas forenses evaluando objetiva su impacto en la investigación de delitos informáticos.Babahoyo: UTB-FAFI. 2024Ruiz Parrales, Iván Rubén2024-08-20T20:27:28Z2024-08-20T20:27:28Z2024info:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/bachelorThesis54 p.application/pdfhttp://dspace.utb.edu.ec/handle/49000/16979esAtribución-NoComercial-SinDerivadas 3.0 Ecuadorhttp://creativecommons.org/licenses/by-nc-nd/3.0/ec/info:eu-repo/semantics/openAccessreponame:Repositorio Universidad Técnica de Babahoyoinstname:Universidad Técnica de Babahoyoinstacron:UTB2024-08-21T08:08:14Zoai:dspace.utb.edu.ec:49000/16979Institucionalhttp://dspace.utb.edu.ec/Universidad públicahttps://utb.edu.ec/http://dspace.utb.edu.ec/oai.Ecuador...opendoar:02026-04-25T22:21:19.331747Repositorio Universidad Técnica de Babahoyo - Universidad Técnica de Babahoyotrue |
| spellingShingle | Análisis de herramientas de análisis forense y su aplicabilidad en la investigación de delitos informáticos. Contreras Contreras, Julissa Mariu Informática forense Ciberataques Herramientas forenses Delitos informáticos Seguridad informática |
| status_str | publishedVersion |
| title | Análisis de herramientas de análisis forense y su aplicabilidad en la investigación de delitos informáticos. |
| title_full | Análisis de herramientas de análisis forense y su aplicabilidad en la investigación de delitos informáticos. |
| title_fullStr | Análisis de herramientas de análisis forense y su aplicabilidad en la investigación de delitos informáticos. |
| title_full_unstemmed | Análisis de herramientas de análisis forense y su aplicabilidad en la investigación de delitos informáticos. |
| title_short | Análisis de herramientas de análisis forense y su aplicabilidad en la investigación de delitos informáticos. |
| title_sort | Análisis de herramientas de análisis forense y su aplicabilidad en la investigación de delitos informáticos. |
| topic | Informática forense Ciberataques Herramientas forenses Delitos informáticos Seguridad informática |
| url | http://dspace.utb.edu.ec/handle/49000/16979 |