Listar por tema "cybersecurity"
Mostrando ítems 1-19 de 19
-
A Comprehensive Analysis of the Worst Cybersecurity Vulnerabilities in Latin America
(Informatics, 2023)Vulnerabilities in cyber defense in the countries of the Latin American region have favored the activities of cybercriminals from different parts of the world who have carried out a growing number of cyberattacks that ... -
Aplicación para la comparación de Shodan y ZoomEye en la búsqueda de dispositivos IoT
(09/02/2022)La cantidad de dispositivos conectados a Internet aumenta de forma vertiginosa. Este hecho aporta muchos beneficios para las personas, pero también conlleva riesgos, dado que nos hace cada vez más dependientes de servicios ... -
Ataques al protocolo de autenticación OPENID CONNECT + OAUTH2
(07/02/2022)El trabajo ha realizado un análisis en profundidad de las metodologías y patrones de ataque a los protocolos de autenticación OPENID Connect con OAUTH2 en entornos de prueba que simulan implementaciones reales, así como ... -
Cybersecurity Management in Micro, Small, and Medium Enterprises in Colombia
(Communications in Computer and Information Science, 2023)The aim of this research study is the analysis of the cybersecurity management in micro, small and medium enterprises (MSMEs or MIPYMES) in Colombia. To reach this objective, the quantitative approach methodology was used, ... -
Development of an Intelligent Classifier Model for Denial of Service Attack Detection
(International Journal of Interactive Multimedia and Artificial Intelligence, 09/2023)The prevalence of Internet of Things (IoT) systems deployment is increasing across various domains, from residential to industrial settings. These systems are typically characterized by their modest computationa requirements ... -
Domótica y Privacidad: Navegando entre la Comodidad Tecnológica y la Seguridad de los Datos
(28/02/2024)El trabajo presenta aspectos críticos de seguridad y privacidad en sistemas de domótica residencial basados en IoT, poniendo especial énfasis en los protocolos inalámbricos Z-Wave, ZigBee y Wi-Fi. Mediante una revisión ... -
Evaluación y Propuesta de una Arquitectura de Correo Electrónico Seguro Basado en Blockchain
(2022)El principal objetivo de esta investigación es el desarrollo de un protocolo de correo electrónico seguro aprovechando el potencial que nos brinda blockchain en aspectos de seguridad. En este trabajo se analiza el estado ... -
“Exploit City”: Gamificación como método de adquisición de conductas seguras en la red
(30/06/2021)“Exploit City” es una propuesta de gamificación que tiene el objetivo de dotar a preadolescentes de conocimientos y procedimientos en seguridad en la red. Los fundamentos teóricos, que sustentan su aplicación, se basan en ... -
IDS colaborativo basado en Blockchain
(19/09/2019)La ciberseguridad en las organizaciones es una clara necesidad en los tiempos actuales debido al creciente número de ciberataques en los últimos años. Este trabajo desarrolla una herramienta que proporciona un sistema ... -
Intelligent Detection and Recovery from Cyberattacks for Small and Medium-Sized Enterprises
(International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 09/2020)Cyberattacks threaten continuously computer security in companies. These attacks evolve everyday, being more and more sophisticated and robust. In addition, they take advantage of security breaches in organizations and ... -
Introduction to the special section on advances of machine learning in cybersecurity (VSI-mlsec)
(Computers and Electrical Engineering, 2022)With the rapid advancement of emerging technologies, such as Internet of Things (IoT), cloud computing, and many more, a huge amount of data is generated and processed in daily life. As these technologies are based on the ... -
Knowledge Management Applied in the Comparative Study of the IRETE Intrusion Methodology to Access to the Computer Systems
(Springer Science and Business Media Deutschland GmbH, 2021)The threats in cyberspace materialize big digital security threats for any organization. New computer incidents are permanently reported, visualizing the advanced technical skills of cybercriminals and the cybersecurity ... -
Methodology for Computer Security Incident Response Teams into IoT Strategy
(KSII transactions on internet and information systems, 2021)At present, the Colombian government shares information on threats or vulnerabilities in the area of cybersecurity and cyberdefense, from other government agencies or departments, on an ad-hoc basis but not in real time, ... -
Metodología para la Implementación Segura de Tesorería de Criptomonedas en las Organizaciones
(24/12/2022)Alrededor del mundo existen organizaciones que han decidido afrontar el reto de innovación tecnológica que implica contar con cripto activos en su tesorería. Por tal motivo, este trabajo pretende ofrecer la metodología ... -
New Validation of a Cybersecurity Model to Audit the Cybersecurity Program in a Canadian Higher Education Institution
(2023 Conference on Information Communications Technology and Society, ICTAS 2023 - Proceedings, 2023)This article presents the results of one empirical study that evaluated the validation of the CyberSecurity Audit Model (CSAM) for the second time in a different Canadian higher education institution. CSAM is utilized for ... -
Pentesting de entornos Active Directory vulnerables
(21/07/2021)Actualmente, la tecnología está experimentando un enorme crecimiento en todos los ámbitos de nuestro entorno, las organizaciones son conscientes de este crecimiento, y cada vez son más las que tratan de implantar estas ... -
Review: machine learning techniques applied to cybersecurity
(International Journal of Machine Learning and Cybernetics, 10/2019)Machine learning techniques are a set of mathematical models to solve high non-linearity problems of different topics: prediction, classification, data association, data conceptualization. In this work, the authors review ... -
Taxonomies for Reasoning About Cyber-physical Attacks in IoT-based Manufacturing Systems
(International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 03/2017)The Internet of Things (IoT) has transformed many aspects of modern manufacturing, from design to production to quality control. In particular, IoT and digital manufacturing technologies have substantially accelerated ... -
The application of blockchain algorithms to the management of education certificates
(Evolutionary Intelligence, 2023)Blockchain is a new application technology in many sectors and the same is true in the world of education. Therefore, there is an increasingly emerging need to research blockchain technology, as it is still taking its first ...