Today the substantial resource to protect, is certainly THE INFORMATION. The objective of the research is to demonstrate the vulnerabilities and threats presented by WEB services in the intranet of the Technical University of Babahoyo. We determined the weaknesses and attacks present in the network; through direct observation analysis with tests of packet traffic and surveys to network users. It concludes in the lack of procedures in computer security and errors not controlled by attacks and perpetrations. Finishing with the design of an Intrusion Detection System (NDIS).Hoy en día el recurso sustancial a proteger, es sin duda la información. El objetivo de la investigación es demostrar las vulnerabilidades y amenazas que presentan los serv...
Proporcionar el conocimiento necesario para contrarrestar intrusiones en las redes de los proveedore...
In the recent years Information Technology has been under various different threats most of the thre...
se propone una metodologia pra el analaisi de vulnerabilidades utilizando software gratuito
El presente trabajo de investigación tiene por objetivo analizar las vulnerabilidades de internet de...
Dissertação (mestrado) - Universidade Federal de Santa Catarina, Centro Tecnológico. Programa de Pós...
[ES] Trabajo de final de grado de Ingeniería de Tecnologías y Servicios de Telecomunicación realizad...
RESUMEN: En el mundo actual se almacena gran cantidad de información en la nube. Mucha de ella es co...
This research called “Penetration tests for computer security to the web server of the cybersecurity...
The present technical project was developed with the aim of proposing a complementary computer secur...
El de la ciberseguridad es un campo que siempre está evolucionando. Esto hace que sea uno de los esc...
Technology has been evolving over the years, nowadays both public and private companies take the ris...
Cybersecurity incidents in ISP (Internet Service Provider) infrastructure have grown significantly a...
This study investigates web application vulnerabilities by analyzing attacks through the use of fire...
Vulnerabilidades presentes em aplicações web são amplamente utilizadas por atacantes para o roubo de...
Tese de doutoramento, Informática (Ciência da Computação), Universidade de Lisboa, Faculdade de Ciên...
Proporcionar el conocimiento necesario para contrarrestar intrusiones en las redes de los proveedore...
In the recent years Information Technology has been under various different threats most of the thre...
se propone una metodologia pra el analaisi de vulnerabilidades utilizando software gratuito
El presente trabajo de investigación tiene por objetivo analizar las vulnerabilidades de internet de...
Dissertação (mestrado) - Universidade Federal de Santa Catarina, Centro Tecnológico. Programa de Pós...
[ES] Trabajo de final de grado de Ingeniería de Tecnologías y Servicios de Telecomunicación realizad...
RESUMEN: En el mundo actual se almacena gran cantidad de información en la nube. Mucha de ella es co...
This research called “Penetration tests for computer security to the web server of the cybersecurity...
The present technical project was developed with the aim of proposing a complementary computer secur...
El de la ciberseguridad es un campo que siempre está evolucionando. Esto hace que sea uno de los esc...
Technology has been evolving over the years, nowadays both public and private companies take the ris...
Cybersecurity incidents in ISP (Internet Service Provider) infrastructure have grown significantly a...
This study investigates web application vulnerabilities by analyzing attacks through the use of fire...
Vulnerabilidades presentes em aplicações web são amplamente utilizadas por atacantes para o roubo de...
Tese de doutoramento, Informática (Ciência da Computação), Universidade de Lisboa, Faculdade de Ciên...
Proporcionar el conocimiento necesario para contrarrestar intrusiones en las redes de los proveedore...
In the recent years Information Technology has been under various different threats most of the thre...
se propone una metodologia pra el analaisi de vulnerabilidades utilizando software gratuito