Control de amenazas e instrucciones informáticas en una red domestica basadas en Open Source.

Threat control: 1. Install an open-source software firewall – Install an open-source software firewall, such as pfSense, to block malicious websites from accessing your home network. 2. Establish a strong password policy: Establish a strong password policy for all devices connected to the home netwo...

Mô tả đầy đủ

Đã lưu trong:
Chi tiết về thư mục
Tác giả chính: Lema Altamirano, Dayana Esther (author)
Định dạng: bachelorThesis
Được phát hành: 2023
Những chủ đề:
Truy cập trực tuyến:http://dspace.utb.edu.ec/handle/49000/14188
Các nhãn: Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
Miêu tả
Tóm tắt:Threat control: 1. Install an open-source software firewall – Install an open-source software firewall, such as pfSense, to block malicious websites from accessing your home network. 2. Establish a strong password policy: Establish a strong password policy for all devices connected to the home network, at least 8 alphanumeric characters and at least one uppercase letter, one lowercase letter, and one number. 3. Update operating systems and software: It is important to keep operating systems and software updated to their latest version, to avoid exploiting known vulnerabilities. Home network security is a growing concern for homeowners. Due to constant technological advances, homeowners now have to pay attention to a wide variety of computer threats to their home network, including viruses, spyware, malware, denial of service attacks, and in some cases even phishing attacks. . To deal with these threats, homeowners must have a good understanding of basic computer security principles and how to implement these principles in their home network. One of the best approaches to keep your home network secure is to implement an open source-based solution. These solutions are based on code software; Threat and intrusion control in an open source-based home network is a major challenge. In most cases, configuring a firewall to block malicious traffic is a basic measure for network security. However, there are other methods that must be considered to protect the network from a variety of computer threats. These include the use of intrusion detection tools and the implementation of security policies to limit access to the network and resources. In addition, steps must be taken to ensure that operating systems and applications are up to date to prevent the exploitation of known vulnerabilities. Finally, steps should be taken to monitor network traffic to detect which.