Knowledge Management Applied in the Comparative Study of the IRETE Intrusion Methodology to Access to the Computer Systems
Autor:
Díaz Piraquive, Flor Nancy
; Ortiz-Ruiz, Emanuel
; González-Aragón, Jansen Jair
; Avila-Bermeo, Harlinzo Hernan
; Parada-Jaimes, Wilmer David
Fecha:
2021Palabra clave:
Revista / editorial:
Springer Science and Business Media Deutschland GmbHTipo de Ítem:
conferenceObjectResumen:
The threats in cyberspace materialize big digital security threats for any organization. New computer incidents are permanently reported, visualizing the advanced technical skills of cybercriminals and the cybersecurity professionals’ response limitations. Most expensive digital security products are based on the treatment of known threats and are vulnerable to new threats known as zero-day attacks. Likewise, the human factor continues to be one of the main weaknesses when deploying IT security strategies and policies. In this way the tests or computer penetration tests are one of the most appropriate techniques to know and establish digital security mechanisms according to each organization. Therefore, the present work analyzes international standards to carry out computer vulnerability tests and proposes a methodology of ethical hacking under the postulates of gratuity and resources availability. Suggestions on the scalability of cybersecurity strategies are presented at the end of the document, considering that each organization is different and requires adaptability in the use of the available infrastructure to manage known and unknown digital risks. IRETE’s research is based on the management that must be carried out in the creation, distribution and appropriation of knowledge, through the methodology that guides the assurance of information through the PenTESTING phases. Likewise, it proposes a process that integrally integrates the collection of information from any operating system, indicating that IRETE generates information more simply and accurately from the inspection, track, examination, testing and exfiltration phases. IRETE presents a complete methodology to approach the knowledge management of a vulnerable system, which allows an in-depth review of the factors that affect the handling of information.
Este ítem aparece en la(s) siguiente(s) colección(es)
Estadísticas de uso
Año |
2012 |
2013 |
2014 |
2015 |
2016 |
2017 |
2018 |
2019 |
2020 |
2021 |
2022 |
2023 |
2024 |
Vistas |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
46 |
50 |
80 |
Descargas |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
Ítems relacionados
Mostrando ítems relacionados por Título, autor o materia.
-
Analysis and characterization of project management in the Colombian enterprise context
Rincón-González, César; Díaz Piraquive, Flor Nancy; González-Crespo, Rubén (CONIITI 2019, 2019)The scientific literature about Project Management highlights several research works around the performance of project management, typically from an exploratory perspective, with a limited statistical sample and developed ... -
Analysis of Knowledge Management in the Context of Projects in Colombia: Subject Area: (Knowledge Management and Project Management)
Rincón-González, César; Díaz Piraquive, Flor Nancy ; González-Crespo, Rubén (Springer Science and Business Media Deutschland GmbH, 2021)This research work conducted a meticulous analysis about the Knowledge Management (KM) in the context of projects in Colombia, with the aim of determinate the way organizations carryout related activities and practices ... -
Analysis and Improvement of the Management of IT Projects
Díaz Piraquive, Flor Nancy; González-Crespo, Rubén ; Medina García, Víctor Hugo (IEEE Latin America Transactions, 07/2015)This paper shows the most usual causes on the failure cases in IT Project Management. There were evaluated different projects that finished without success. After the evaluation and the opinion of several researchers in ...