Mostrar el registro sencillo del ítem

dc.contributor.authorDíaz Piraquive, Flor Nancy
dc.contributor.authorOrtiz-Ruiz, Emanuel
dc.contributor.authorGonzález-Aragón, Jansen Jair
dc.contributor.authorAvila-Bermeo, Harlinzo Hernan
dc.contributor.authorParada-Jaimes, Wilmer David
dc.date2021
dc.date.accessioned2022-03-17T13:36:01Z
dc.date.available2022-03-17T13:36:01Z
dc.identifier.isbn9783030816346
dc.identifier.issn1865-0929
dc.identifier.urihttps://reunir.unir.net/handle/123456789/12672
dc.description.abstractThe threats in cyberspace materialize big digital security threats for any organization. New computer incidents are permanently reported, visualizing the advanced technical skills of cybercriminals and the cybersecurity professionals’ response limitations. Most expensive digital security products are based on the treatment of known threats and are vulnerable to new threats known as zero-day attacks. Likewise, the human factor continues to be one of the main weaknesses when deploying IT security strategies and policies. In this way the tests or computer penetration tests are one of the most appropriate techniques to know and establish digital security mechanisms according to each organization. Therefore, the present work analyzes international standards to carry out computer vulnerability tests and proposes a methodology of ethical hacking under the postulates of gratuity and resources availability. Suggestions on the scalability of cybersecurity strategies are presented at the end of the document, considering that each organization is different and requires adaptability in the use of the available infrastructure to manage known and unknown digital risks. IRETE’s research is based on the management that must be carried out in the creation, distribution and appropriation of knowledge, through the methodology that guides the assurance of information through the PenTESTING phases. Likewise, it proposes a process that integrally integrates the collection of information from any operating system, indicating that IRETE generates information more simply and accurately from the inspection, track, examination, testing and exfiltration phases. IRETE presents a complete methodology to approach the knowledge management of a vulnerable system, which allows an in-depth review of the factors that affect the handling of information.es_ES
dc.language.isoenges_ES
dc.publisherSpringer Science and Business Media Deutschland GmbHes_ES
dc.relation.ispartofseries;vol. 1438
dc.relation.urihttps://link.springer.com/chapter/10.1007/978-3-030-81635-3_29es_ES
dc.rightsrestrictedAccesses_ES
dc.subjectcomputer vulnerabilitieses_ES
dc.subjectcybersecurityes_ES
dc.subjectdigital securityes_ES
dc.subjectethical hackinges_ES
dc.subjectIT security policieses_ES
dc.subjectpen-testinges_ES
dc.subjectpenetration testses_ES
dc.subjectScopus(2)es_ES
dc.titleKnowledge Management Applied in the Comparative Study of the IRETE Intrusion Methodology to Access to the Computer Systemses_ES
dc.typeconferenceObjectes_ES
reunir.tag~ARIes_ES
dc.identifier.doihttp://doi.org/10.1007/978-3-030-81635-3_29


Ficheros en el ítem

FicherosTamañoFormatoVer

No hay ficheros asociados a este ítem.

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem