Aplicación de hacking ético para identificar amenazas, riesgos y vulnerabilidades en la red Wifi.

Ethical hacking is a legitimate and legal practice that allows to identify threats, risks and vulnerabilities in computer systems and networks. When applied to WiFi network analysis, it can help uncover vulnerabilities and potential security weaknesses. The following are four key points to keep in m...

ver descrição completa

Na minha lista:
Detalhes bibliográficos
Autor principal: Vivar Franco, Itaty Andreina (author)
Formato: bachelorThesis
Publicado em: 2023
Assuntos:
Acesso em linha:http://dspace.utb.edu.ec/handle/49000/14258
Tags: Adicionar Tag
Sem tags, seja o primeiro a adicionar uma tag!
_version_ 1859044537657196544
author Vivar Franco, Itaty Andreina
author_facet Vivar Franco, Itaty Andreina
author_role author
collection Repositorio Universidad Técnica de Babahoyo
dc.contributor.none.fl_str_mv Diaz Chong, Migdalia Teresa
dc.creator.none.fl_str_mv Vivar Franco, Itaty Andreina
dc.date.none.fl_str_mv 2023-06-05T16:54:26Z
2023-06-05T16:54:26Z
2023
dc.format.none.fl_str_mv 42 p.
application/pdf
dc.identifier.none.fl_str_mv http://dspace.utb.edu.ec/handle/49000/14258
dc.language.none.fl_str_mv es
dc.publisher.none.fl_str_mv Babahoyo: UTB-FAFI. 2023
dc.rights.none.fl_str_mv Atribución-NoComercial-SinDerivadas 3.0 Ecuador
http://creativecommons.org/licenses/by-nc-nd/3.0/ec/
info:eu-repo/semantics/openAccess
dc.source.none.fl_str_mv reponame:Repositorio Universidad Técnica de Babahoyo
instname:Universidad Técnica de Babahoyo
instacron:UTB
dc.subject.none.fl_str_mv Red Wifi
Vulnerabilidad
Seguridad
Hacking ético
dc.title.none.fl_str_mv Aplicación de hacking ético para identificar amenazas, riesgos y vulnerabilidades en la red Wifi.
dc.type.none.fl_str_mv info:eu-repo/semantics/publishedVersion
info:eu-repo/semantics/bachelorThesis
description Ethical hacking is a legitimate and legal practice that allows to identify threats, risks and vulnerabilities in computer systems and networks. When applied to WiFi network analysis, it can help uncover vulnerabilities and potential security weaknesses. The following are four key points to keep in mind when applying ethical hacking to identify threats and risks on the Wi-Fi network. First, express permission must be obtained from the WiFi network owner before conducting any ethical hacking tests. Second, ethical hacking tools and techniques should be used to simulate a real attack, in order to identify all possible vulnerabilities. Third, once vulnerabilities are found, specific recommendations for addressing them should be documented and presented in order to improve WiFi network security. Fourth, WiFi network security must be continuously updated and strengthened, as threats and vulnerabilities are always evolving and changing. Applying ethical hacking to identify threats, risks, and vulnerabilities in the WiFi network can help improve network security and ensure that user information and data are protected. It is important that this activity is carried out in a careful, ethical and legal manner to ensure the confidentiality and privacy of user data.
eu_rights_str_mv openAccess
format bachelorThesis
id UTB_9ddb0cb4ef741d1bf70d42ed6e9f74de
instacron_str UTB
institution UTB
instname_str Universidad Técnica de Babahoyo
language_invalid_str_mv es
network_acronym_str UTB
network_name_str Repositorio Universidad Técnica de Babahoyo
oai_identifier_str oai:dspace.utb.edu.ec:49000/14258
publishDate 2023
publisher.none.fl_str_mv Babahoyo: UTB-FAFI. 2023
reponame_str Repositorio Universidad Técnica de Babahoyo
repository.mail.fl_str_mv .
repository.name.fl_str_mv Repositorio Universidad Técnica de Babahoyo - Universidad Técnica de Babahoyo
repository_id_str 0
rights_invalid_str_mv Atribución-NoComercial-SinDerivadas 3.0 Ecuador
http://creativecommons.org/licenses/by-nc-nd/3.0/ec/
spelling Aplicación de hacking ético para identificar amenazas, riesgos y vulnerabilidades en la red Wifi.Vivar Franco, Itaty AndreinaRed WifiVulnerabilidadSeguridadHacking éticoEthical hacking is a legitimate and legal practice that allows to identify threats, risks and vulnerabilities in computer systems and networks. When applied to WiFi network analysis, it can help uncover vulnerabilities and potential security weaknesses. The following are four key points to keep in mind when applying ethical hacking to identify threats and risks on the Wi-Fi network. First, express permission must be obtained from the WiFi network owner before conducting any ethical hacking tests. Second, ethical hacking tools and techniques should be used to simulate a real attack, in order to identify all possible vulnerabilities. Third, once vulnerabilities are found, specific recommendations for addressing them should be documented and presented in order to improve WiFi network security. Fourth, WiFi network security must be continuously updated and strengthened, as threats and vulnerabilities are always evolving and changing. Applying ethical hacking to identify threats, risks, and vulnerabilities in the WiFi network can help improve network security and ensure that user information and data are protected. It is important that this activity is carried out in a careful, ethical and legal manner to ensure the confidentiality and privacy of user data.Ethical hacking is a legitimate and legal practice that allows to identify threats, risks and vulnerabilities in computer systems and networks. When applied to WiFi network analysis, it can help uncover vulnerabilities and potential security weaknesses. The following are four key points to keep in mind when applying ethical hacking to identify threats and risks on the Wi-Fi network. First, express permission must be obtained from the WiFi network owner before conducting any ethical hacking tests. Second, ethical hacking tools and techniques should be used to simulate a real attack, in order to identify all possible vulnerabilities. Third, once vulnerabilities are found, specific recommendations for addressing them should be documented and presented in order to improve WiFi network security. Fourth, WiFi network security must be continuously updated and strengthened, as threats and vulnerabilities are always evolving and changing. Applying ethical hacking to identify threats, risks, and vulnerabilities in the WiFi network can help improve network security and ensure that user information and data are protected. It is important that this activity is carried out in a careful, ethical and legal manner to ensure the confidentiality and privacy of user data.El hacking ético es una práctica legítima y legal que permite identificar amenazas, riesgos y vulnerabilidades en sistemas informáticos y de redes. Cuando se aplica al análisis de la red WiFi, puede ayudar a descubrir vulnerabilidades y posibles debilidades en la seguridad. Los siguientes son cuatro puntos clave que se deben tener en cuenta al aplicar hacking ético para identificar amenazas y riesgos en la red Wi-Fi. Primero, se debe obtener el permiso expreso del propietario de la red WiFi antes de realizar cualquier prueba de hacking ético. Segundo, se debe usar herramientas y técnicas de hacking ético para simular un ataque real, con el fin de identificar todas las vulnerabilidades posibles. Tercero, una vez encontradas las vulnerabilidades, se deben documentar y presentar recomendaciones específicas para solucionarlas a fin de mejorar la seguridad de la red WiFi. En cuarto lugar, se debe actualizar y reforzar continuamente la seguridad de la red WiFi, ya que las amenazas y vulnerabilidades siempre están en constante evolución y cambio. Aplicar hacking ético para identificar amenazas, riesgos y vulnerabilidades en la red WiFi puede ayudar a mejorar la seguridad de la red y garantizar que la información y los datos de los usuarios estén protegidos. Es importante que esta actividad se realice de manera cuidadosa, ética y legal para garantizar la confidencialidad y privacidad de los datos de los usuarios.Babahoyo: UTB-FAFI. 2023Diaz Chong, Migdalia Teresa2023-06-05T16:54:26Z2023-06-05T16:54:26Z2023info:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/bachelorThesis42 p.application/pdfhttp://dspace.utb.edu.ec/handle/49000/14258esAtribución-NoComercial-SinDerivadas 3.0 Ecuadorhttp://creativecommons.org/licenses/by-nc-nd/3.0/ec/info:eu-repo/semantics/openAccessreponame:Repositorio Universidad Técnica de Babahoyoinstname:Universidad Técnica de Babahoyoinstacron:UTB2023-06-06T08:01:25Zoai:dspace.utb.edu.ec:49000/14258Institucionalhttp://dspace.utb.edu.ec/Universidad públicahttps://utb.edu.ec/http://dspace.utb.edu.ec/oai.Ecuador...opendoar:02026-03-07T22:20:22.285436Repositorio Universidad Técnica de Babahoyo - Universidad Técnica de Babahoyotrue
spellingShingle Aplicación de hacking ético para identificar amenazas, riesgos y vulnerabilidades en la red Wifi.
Vivar Franco, Itaty Andreina
Red Wifi
Vulnerabilidad
Seguridad
Hacking ético
status_str publishedVersion
title Aplicación de hacking ético para identificar amenazas, riesgos y vulnerabilidades en la red Wifi.
title_full Aplicación de hacking ético para identificar amenazas, riesgos y vulnerabilidades en la red Wifi.
title_fullStr Aplicación de hacking ético para identificar amenazas, riesgos y vulnerabilidades en la red Wifi.
title_full_unstemmed Aplicación de hacking ético para identificar amenazas, riesgos y vulnerabilidades en la red Wifi.
title_short Aplicación de hacking ético para identificar amenazas, riesgos y vulnerabilidades en la red Wifi.
title_sort Aplicación de hacking ético para identificar amenazas, riesgos y vulnerabilidades en la red Wifi.
topic Red Wifi
Vulnerabilidad
Seguridad
Hacking ético
url http://dspace.utb.edu.ec/handle/49000/14258