Análisis de vulnerabilidades de las aplicaciones Android utilizadas en gestión de empresas.

Information security is crucial for mobile users as the applications they use may contain sensitive personal information. Security vulnerabilities can vary depending on the platform or application, and there are concerns about possible attacks from different fronts, the use of insecure Android appli...

Fuld beskrivelse

Saved in:
Bibliografiske detaljer
Hovedforfatter: Putan Santillán, Jesús Alejandro (author)
Format: bachelorThesis
Udgivet: 2023
Fag:
Online adgang:http://dspace.utb.edu.ec/handle/49000/14246
Tags: Tilføj Tag
Ingen Tags, Vær først til at tagge denne postø!
_version_ 1858410357979086848
author Putan Santillán, Jesús Alejandro
author_facet Putan Santillán, Jesús Alejandro
author_role author
collection Repositorio Universidad Técnica de Babahoyo
dc.contributor.none.fl_str_mv Guerrero Torres, Hugo Javier
dc.creator.none.fl_str_mv Putan Santillán, Jesús Alejandro
dc.date.none.fl_str_mv 2023-06-05T14:22:31Z
2023-06-05T14:22:31Z
2023
dc.format.none.fl_str_mv 30 p.
application/pdf
dc.identifier.none.fl_str_mv http://dspace.utb.edu.ec/handle/49000/14246
dc.language.none.fl_str_mv es
dc.publisher.none.fl_str_mv Babahoyo: UTB-FAFI. 2023
dc.rights.none.fl_str_mv Atribución-NoComercial-SinDerivadas 3.0 Ecuador
http://creativecommons.org/licenses/by-nc-nd/3.0/ec/
info:eu-repo/semantics/openAccess
dc.source.none.fl_str_mv reponame:Repositorio Universidad Técnica de Babahoyo
instname:Universidad Técnica de Babahoyo
instacron:UTB
dc.subject.none.fl_str_mv Aplicaciones
Android
Vulnerabilidades
Móvil
Redes
dc.title.none.fl_str_mv Análisis de vulnerabilidades de las aplicaciones Android utilizadas en gestión de empresas.
dc.type.none.fl_str_mv info:eu-repo/semantics/publishedVersion
info:eu-repo/semantics/bachelorThesis
description Information security is crucial for mobile users as the applications they use may contain sensitive personal information. Security vulnerabilities can vary depending on the platform or application, and there are concerns about possible attacks from different fronts, the use of insecure Android applications can have serious consequences for the security and privacy of the company, its productivity and reputation. The objective of this work is to carry out a vulnerability analysis of Android applications used in business management. This document was crucial and justifiable, since it is important to carry out studies on the vulnerabilities of Android applications used in the commercial management of companies. These applications represent potential risks and it is essential to analyze critical situations of mobile technologies to minimize the risks associated with their use; It was critical to develop strong security strategies and measures to protect mobile devices and encourage the use of secure and trusted applications. Regarding the methodology used, it is important to select an appropriate methodology. Common ones include case studies, interviews with experts, and document analysis. A qualitative methodology will be used to understand subjective perceptions and behaviors. This methodology focuses on the analysis of textual and visual data to identify patterns and themes. The interview instrument will be used to collect data from experts in systems and business management, compare results and discuss contributions. This document concludes that vulnerabilities in Android applications used in company management can have serious consequences for the security, productivity and business continuity of companies. Developers must implement adequate security measures to protect applications and users must take measures to protect their devices and personal data.
eu_rights_str_mv openAccess
format bachelorThesis
id UTB_d7bad2c0d0eedd1f1f20abcd64da47c8
instacron_str UTB
institution UTB
instname_str Universidad Técnica de Babahoyo
language_invalid_str_mv es
network_acronym_str UTB
network_name_str Repositorio Universidad Técnica de Babahoyo
oai_identifier_str oai:dspace.utb.edu.ec:49000/14246
publishDate 2023
publisher.none.fl_str_mv Babahoyo: UTB-FAFI. 2023
reponame_str Repositorio Universidad Técnica de Babahoyo
repository.mail.fl_str_mv .
repository.name.fl_str_mv Repositorio Universidad Técnica de Babahoyo - Universidad Técnica de Babahoyo
repository_id_str 0
rights_invalid_str_mv Atribución-NoComercial-SinDerivadas 3.0 Ecuador
http://creativecommons.org/licenses/by-nc-nd/3.0/ec/
spelling Análisis de vulnerabilidades de las aplicaciones Android utilizadas en gestión de empresas.Putan Santillán, Jesús AlejandroAplicacionesAndroidVulnerabilidadesMóvilRedesInformation security is crucial for mobile users as the applications they use may contain sensitive personal information. Security vulnerabilities can vary depending on the platform or application, and there are concerns about possible attacks from different fronts, the use of insecure Android applications can have serious consequences for the security and privacy of the company, its productivity and reputation. The objective of this work is to carry out a vulnerability analysis of Android applications used in business management. This document was crucial and justifiable, since it is important to carry out studies on the vulnerabilities of Android applications used in the commercial management of companies. These applications represent potential risks and it is essential to analyze critical situations of mobile technologies to minimize the risks associated with their use; It was critical to develop strong security strategies and measures to protect mobile devices and encourage the use of secure and trusted applications. Regarding the methodology used, it is important to select an appropriate methodology. Common ones include case studies, interviews with experts, and document analysis. A qualitative methodology will be used to understand subjective perceptions and behaviors. This methodology focuses on the analysis of textual and visual data to identify patterns and themes. The interview instrument will be used to collect data from experts in systems and business management, compare results and discuss contributions. This document concludes that vulnerabilities in Android applications used in company management can have serious consequences for the security, productivity and business continuity of companies. Developers must implement adequate security measures to protect applications and users must take measures to protect their devices and personal data.Information security is crucial for mobile users as the applications they use may contain sensitive personal information. Security vulnerabilities can vary depending on the platform or application, and there are concerns about possible attacks from different fronts, the use of insecure Android applications can have serious consequences for the security and privacy of the company, its productivity and reputation. The objective of this work is to carry out a vulnerability analysis of Android applications used in business management. This document was crucial and justifiable, since it is important to carry out studies on the vulnerabilities of Android applications used in the commercial management of companies. These applications represent potential risks and it is essential to analyze critical situations of mobile technologies to minimize the risks associated with their use; It was critical to develop strong security strategies and measures to protect mobile devices and encourage the use of secure and trusted applications. Regarding the methodology used, it is important to select an appropriate methodology. Common ones include case studies, interviews with experts, and document analysis. A qualitative methodology will be used to understand subjective perceptions and behaviors. This methodology focuses on the analysis of textual and visual data to identify patterns and themes. The interview instrument will be used to collect data from experts in systems and business management, compare results and discuss contributions. This document concludes that vulnerabilities in Android applications used in company management can have serious consequences for the security, productivity and business continuity of companies. Developers must implement adequate security measures to protect applications and users must take measures to protect their devices and personal data.La seguridad de la información es crucial para los usuarios móviles ya que las aplicaciones que utilizan pueden contener información personal sensible. Las vulnerabilidades de seguridad pueden variar dependiendo de la plataforma o aplicación, y hay preocupaciones acerca de posibles ataques desde diferentes frentes, el uso de aplicaciones Android inseguras puede tener graves consecuencias para la seguridad y privacidad de la empresa, su productividad y reputación. El objetivo de este trabajo es realizar un análisis de vulnerabilidades de las aplicaciones Android utilizadas en gestión de empresas. Este documento fue crucial y justificable, ya que es importante realizar estudios sobre las vulnerabilidades de las aplicaciones Android utilizadas en la gestión comercial de las empresas. Estas aplicaciones representan riesgos potenciales y es fundamental analizar situaciones críticas de las tecnologías móviles para minimizar los riesgos asociados con su uso; fue fundamental desarrollar estrategias y medidas de seguridad sólidas para proteger los dispositivos móviles y fomentar el uso de aplicaciones seguras y confiables. En cuanto a la metodología usada, es importante seleccionar una metodología adecuada. Las comunes incluyen el estudio de casos, entrevistas con expertos y análisis de documentos. Una metodología cualitativa se utilizará para comprender percepciones y comportamientos subjetivos. Esta metodología se centra en el análisis de datos textuales y visuales para identificar patrones y temas. El instrumento entrevista se usará para recopilar datos de expertos en sistemas y gestión empresarial, comparar resultados y discutir contribuciones. En este documento se concluye que, las vulnerabilidades en las aplicaciones Android utilizadas en la gestión de empresas pueden tener graves consecuencias para la seguridad, la productividad y la continuidad del negocio de las empresas. Los desarrolladores deben implementar medidas de seguridad adecuadas para proteger las aplicaciones y los usuarios deben tomar medidas para proteger sus dispositivos y datos personales.Babahoyo: UTB-FAFI. 2023Guerrero Torres, Hugo Javier2023-06-05T14:22:31Z2023-06-05T14:22:31Z2023info:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/bachelorThesis30 p.application/pdfhttp://dspace.utb.edu.ec/handle/49000/14246esAtribución-NoComercial-SinDerivadas 3.0 Ecuadorhttp://creativecommons.org/licenses/by-nc-nd/3.0/ec/info:eu-repo/semantics/openAccessreponame:Repositorio Universidad Técnica de Babahoyoinstname:Universidad Técnica de Babahoyoinstacron:UTB2023-06-06T08:01:20Zoai:dspace.utb.edu.ec:49000/14246Institucionalhttp://dspace.utb.edu.ec/Universidad públicahttps://utb.edu.ec/http://dspace.utb.edu.ec/oai.Ecuador...opendoar:02026-02-28T22:21:28.524914Repositorio Universidad Técnica de Babahoyo - Universidad Técnica de Babahoyotrue
spellingShingle Análisis de vulnerabilidades de las aplicaciones Android utilizadas en gestión de empresas.
Putan Santillán, Jesús Alejandro
Aplicaciones
Android
Vulnerabilidades
Móvil
Redes
status_str publishedVersion
title Análisis de vulnerabilidades de las aplicaciones Android utilizadas en gestión de empresas.
title_full Análisis de vulnerabilidades de las aplicaciones Android utilizadas en gestión de empresas.
title_fullStr Análisis de vulnerabilidades de las aplicaciones Android utilizadas en gestión de empresas.
title_full_unstemmed Análisis de vulnerabilidades de las aplicaciones Android utilizadas en gestión de empresas.
title_short Análisis de vulnerabilidades de las aplicaciones Android utilizadas en gestión de empresas.
title_sort Análisis de vulnerabilidades de las aplicaciones Android utilizadas en gestión de empresas.
topic Aplicaciones
Android
Vulnerabilidades
Móvil
Redes
url http://dspace.utb.edu.ec/handle/49000/14246