• Mi Re-Unir
    Búsqueda Avanzada
    JavaScript is disabled for your browser. Some features of this site may not work without it.
    Ver ítem 
    •   Inicio
    • RESULTADOS DE INVESTIGACIÓN
    • Artículos Científicos WOS y SCOPUS
    • Ver ítem
    •   Inicio
    • RESULTADOS DE INVESTIGACIÓN
    • Artículos Científicos WOS y SCOPUS
    • Ver ítem

    Analysis of WEB Browsers of HSTS Security Under the MITM Management Environment

    Autor: 
    Bareño-Gutiérrez, Raúl
    ;
    López Sevillano, Alexandra María
    ;
    Díaz Piraquive, Flor Nancy (1)
    ;
    González-Crespo, Rubén (1)
    Fecha: 
    2021
    Palabra clave: 
    A hacker in the MITM environment; HSTS complement; security; WEB browsers; Scopus(2)
    Tipo de Ítem: 
    conferenceObject
    URI: 
    https://reunir.unir.net/handle/123456789/12675
    DOI: 
    https://doi.org/10.1007/978-3-030-81635-3_27
    Dirección web: 
    https://link.springer.com/chapter/10.1007/978-3-030-81635-3_27
    Resumen:
    The transactional websites and services on the cloud, have actually become the most used browsers, thanks to their portability and ease of use, with a significant increase in the development of cloud solutions, implementing digital contexts under the 4.0 web, which generated an increase of possibilities for transactions of different types. However, every time more security issues arise. Due to this problem, the computer security is a rising trend, generating new possibilities to mitigate vulnerabilities when handling the information in a transactional web site; an analysis is made of performance, weaknesses and strengths of the HSTS standard, as a security complement of the SSL/TLS protocol. Different tests scenarios are verified under a man attack in the MITM environment, to intercept or capture the traffic sent and received during web transactions. That is how we identify if the standard can prevent that intrusion, which is of vital importance for the different transactional environments actually used, such as bank entities or online purchases; vulnerabilities of the standard are verified upon making the first request to a website, which strengthens and secures transactions done from the beginning of the transaction to its ending, in an encrypted way. Browsers analyzed - Mozilla Firefox, Google Chrome and internet Explorer, under controlled corporate and personal environments; The security importance of the browser is outlined, Google Chrome being the best one in performance under an internet hacking. The other browsers present some shortcomings during the first interconnection request, during some milliseconds under the point to point model, for the initial phase of information interchange
    Mostrar el registro completo del ítem
    Este ítem aparece en la(s) siguiente(s) colección(es)
    • Artículos Científicos WOS y SCOPUS

    Estadísticas de uso

    Año
    2012
    2013
    2014
    2015
    2016
    2017
    2018
    2019
    2020
    2021
    2022
    Vistas
    0
    0
    0
    0
    0
    0
    0
    0
    0
    0
    26
    Descargas
    0
    0
    0
    0
    0
    0
    0
    0
    0
    0
    0

    Ítems relacionados

    Mostrando ítems relacionados por Título, autor o materia.

    • Analysis and characterization of project management in the Colombian enterprise context 

      Rincón-González, César; Díaz Piraquive, Flor Nancy; González-Crespo, Rubén (1) (CONIITI 2019, 2019)
      The scientific literature about Project Management highlights several research works around the performance of project management, typically from an exploratory perspective, with a limited statistical sample and developed ...
    • Analysis of Knowledge Management in the Context of Projects in Colombia: Subject Area: (Knowledge Management and Project Management) 

      Rincón-González, César; Díaz Piraquive, Flor Nancy (1); González-Crespo, Rubén (1) (Springer Science and Business Media Deutschland GmbH, 2021)
      This research work conducted a meticulous analysis about the Knowledge Management (KM) in the context of projects in Colombia, with the aim of determinate the way organizations carryout related activities and practices ...
    • Analysis and Improvement of the Management of IT Projects 

      Díaz Piraquive, Flor Nancy; González-Crespo, Rubén (1); Medina García, Víctor Hugo (IEEE Latin America Transactions, 07/2015)
      This paper shows the most usual causes on the failure cases in IT Project Management. There were evaluated different projects that finished without success. After the evaluation and the opinion of several researchers in ...

    Mi cuenta

    AccederRegistrar

    ¿necesitas ayuda?

    Manual de UsuarioAutorización TFG-M

    Listar

    todo Re-UnirComunidades y coleccionesPor fecha de publicaciónAutoresTítulosPalabras claveTipo documentoTipo de accesoEsta colecciónPor fecha de publicaciónAutoresTítulosPalabras claveTipo documentoTipo de acceso






    Aviso Legal Política de Privacidad Política de Cookies Cláusulas legales RGPD
    © UNIR - Universidad Internacional de La Rioja
     
    Aviso Legal Política de Privacidad Política de Cookies Cláusulas legales RGPD
    © UNIR - Universidad Internacional de La Rioja