Estudio de las Vulnerabilidades en la Red de Datos de la Unidad Educativa Zapotal

Because data networks are increasingly useful and important for any entity, it is necessary to know the threats that could be faced by the network, which because of certain vulnerabilities these threats can be concretized leaving as a result the creation of problems that could lead to malfunction of...

Volledige beschrijving

Bewaard in:
Bibliografische gegevens
Hoofdauteur: Saa Aviles, Daniela Somayra (author)
Formaat: bachelorThesis
Taal:spa
Gepubliceerd in: 2017
Onderwerpen:
Online toegang:http://dspace.utb.edu.ec/handle/49000/2514
Tags: Voeg label toe
Geen labels, Wees de eerste die dit record labelt!
_version_ 1863483814001508352
author Saa Aviles, Daniela Somayra
author_facet Saa Aviles, Daniela Somayra
author_role author
collection Repositorio Universidad Técnica de Babahoyo
dc.contributor.none.fl_str_mv Ing. Ramos Morocho, Raúl
dc.creator.none.fl_str_mv Saa Aviles, Daniela Somayra
dc.date.none.fl_str_mv 2017-09-28T22:36:23Z
2017-09-28T22:36:23Z
2017
dc.format.none.fl_str_mv 25 p.
application/pdf
dc.identifier.none.fl_str_mv http://dspace.utb.edu.ec/handle/49000/2514
dc.language.none.fl_str_mv spa
dc.publisher.none.fl_str_mv Babahoyo: UTB
dc.rights.none.fl_str_mv info:eu-repo/semantics/openAccess
dc.source.none.fl_str_mv reponame:Repositorio Universidad Técnica de Babahoyo
instname:Universidad Técnica de Babahoyo
instacron:UTB
dc.subject.none.fl_str_mv Estudio
Vulnerabilidades
Red
Datos
dc.title.none.fl_str_mv Estudio de las Vulnerabilidades en la Red de Datos de la Unidad Educativa Zapotal
dc.type.none.fl_str_mv info:eu-repo/semantics/publishedVersion
info:eu-repo/semantics/bachelorThesis
description Because data networks are increasingly useful and important for any entity, it is necessary to know the threats that could be faced by the network, which because of certain vulnerabilities these threats can be concretized leaving as a result the creation of problems that could lead to malfunction of the network. The networks tend to be very vulnerable, when referring to the amount of equipment connected to each other sharing resources, there is the possibility of attacking the entire network accessing as a first instance to one of the equipment and consecutively propagating to the rest. In a network the priority is the transmission of information, so all vulnerabilities are directly related to the possible interception of information by unauthorized persons. The preparation of this document presents real and reliable information obtained through the use of tools for research, in order to know the current situation of the data network, trying to meet the general objective set out in the development of this case, in this point is where the vulnerabilities are identified and their possible consequences that can affect the computer area and the performance of the network, in addition through the different bibliographical references it is tried to obtain relevant and updated information that helps to interpret in a more clear and concise subjects related to this project. Finally, the respective conclusions are expressed, based on the results obtained after the corresponding research, as well as revealing the bibliographic sources from which information was obtained that is part of this study.
eu_rights_str_mv openAccess
format bachelorThesis
id UTB_f525099fd24ffdab8858125e8a5c54e9
instacron_str UTB
institution UTB
instname_str Universidad Técnica de Babahoyo
language spa
network_acronym_str UTB
network_name_str Repositorio Universidad Técnica de Babahoyo
oai_identifier_str oai:dspace.utb.edu.ec:49000/2514
publishDate 2017
publisher.none.fl_str_mv Babahoyo: UTB
reponame_str Repositorio Universidad Técnica de Babahoyo
repository.mail.fl_str_mv .
repository.name.fl_str_mv Repositorio Universidad Técnica de Babahoyo - Universidad Técnica de Babahoyo
repository_id_str 0
spelling Estudio de las Vulnerabilidades en la Red de Datos de la Unidad Educativa ZapotalSaa Aviles, Daniela SomayraEstudioVulnerabilidadesRedDatosBecause data networks are increasingly useful and important for any entity, it is necessary to know the threats that could be faced by the network, which because of certain vulnerabilities these threats can be concretized leaving as a result the creation of problems that could lead to malfunction of the network. The networks tend to be very vulnerable, when referring to the amount of equipment connected to each other sharing resources, there is the possibility of attacking the entire network accessing as a first instance to one of the equipment and consecutively propagating to the rest. In a network the priority is the transmission of information, so all vulnerabilities are directly related to the possible interception of information by unauthorized persons. The preparation of this document presents real and reliable information obtained through the use of tools for research, in order to know the current situation of the data network, trying to meet the general objective set out in the development of this case, in this point is where the vulnerabilities are identified and their possible consequences that can affect the computer area and the performance of the network, in addition through the different bibliographical references it is tried to obtain relevant and updated information that helps to interpret in a more clear and concise subjects related to this project. Finally, the respective conclusions are expressed, based on the results obtained after the corresponding research, as well as revealing the bibliographic sources from which information was obtained that is part of this study.Debido a que las redes de datos cada vez son más útiles e importantes para cualquier entidad, es necesario conocer las amenazas con las que podría enfrentarse la red, que a causa de ciertas vulnerabilidades existentes estas amenazas pueden llegar a concretarse dejando como resultado la creación de problemas que podrían ocasionar el mal funcionamiento de la red. Las redes suelen llegar a ser muy vulnerables, al referirse a la cantidad de equipos conectados entre sí compartiendo recursos, existe la posibilidad de atacar toda la red accediendo como primera instancia a uno de los equipos y consecutivamente propagarse al resto. En una red la prioridad es la transmisión de la información, así que todas las vulnerabilidades están relacionadas directamente con la posible intercepción de la información por personas no autorizadas. Mediante la elaboración de este documento se presenta información real y confiable obtenida mediante el uso de herramientas para la investigación, con el fin de conocer la situación actual de la red de datos tratando de cumplir el objetivo general planteado en el desarrollo de este caso, en este punto es donde se identifican las vulnerabilidades y sus posible consecuencias que puedan afectar el área informática y el rendimiento de la red, además mediante las diferentes referencias bibliográficas se intenta obtener información relevante y actualizada que ayude a interpretar de una manera más clara y concisa temas relacionados a este proyecto. Finalmente se expresan las respectivas conclusiones, planteadas a partir de los resultados obtenidos una vez realizada la investigación correspondiente, así como también se revelan las fuentes bibliográficas de donde se obtuvo información que forma parte de este estudio.Babahoyo: UTBIng. Ramos Morocho, Raúl2017-09-28T22:36:23Z2017-09-28T22:36:23Z2017info:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/bachelorThesis25 p.application/pdfhttp://dspace.utb.edu.ec/handle/49000/2514spainfo:eu-repo/semantics/openAccessreponame:Repositorio Universidad Técnica de Babahoyoinstname:Universidad Técnica de Babahoyoinstacron:UTB2020-04-23T19:31:07Zoai:dspace.utb.edu.ec:49000/2514Institucionalhttp://dspace.utb.edu.ec/Universidad públicahttps://utb.edu.ec/http://dspace.utb.edu.ec/oai.Ecuador...opendoar:02026-04-25T22:25:35.794783Repositorio Universidad Técnica de Babahoyo - Universidad Técnica de Babahoyotrue
spellingShingle Estudio de las Vulnerabilidades en la Red de Datos de la Unidad Educativa Zapotal
Saa Aviles, Daniela Somayra
Estudio
Vulnerabilidades
Red
Datos
status_str publishedVersion
title Estudio de las Vulnerabilidades en la Red de Datos de la Unidad Educativa Zapotal
title_full Estudio de las Vulnerabilidades en la Red de Datos de la Unidad Educativa Zapotal
title_fullStr Estudio de las Vulnerabilidades en la Red de Datos de la Unidad Educativa Zapotal
title_full_unstemmed Estudio de las Vulnerabilidades en la Red de Datos de la Unidad Educativa Zapotal
title_short Estudio de las Vulnerabilidades en la Red de Datos de la Unidad Educativa Zapotal
title_sort Estudio de las Vulnerabilidades en la Red de Datos de la Unidad Educativa Zapotal
topic Estudio
Vulnerabilidades
Red
Datos
url http://dspace.utb.edu.ec/handle/49000/2514