dc.contributorCruz Yomayusa, Paola Andrea
dc.contributorUniversidad Santo Tomas
dc.creatorPerez Hernández, Daniel Sebastián
dc.date.accessioned2023-07-26T16:20:32Z
dc.date.accessioned2023-09-06T12:51:30Z
dc.date.available2023-07-26T16:20:32Z
dc.date.available2023-09-06T12:51:30Z
dc.date.created2023-07-26T16:20:32Z
dc.date.issued2023-07-17
dc.identifierPerez, D. (2022). Análisis de tecnologías orientadas a la protección de la información. trabajo de pregrado. Universidad Santo Tomás. Tunja
dc.identifierhttp://hdl.handle.net/11634/51456
dc.identifierreponame:Repositorio Institucional Universidad Santo Tomás
dc.identifierinstname:Universidad Santo Tomás
dc.identifierrepourl:https://repository.usta.edu.co
dc.identifier.urihttps://repositorioslatinoamericanos.uchile.cl/handle/2250/8679599
dc.description.abstractThis monograph makes a comparative analysis of the different IT security tools that allow the protection of information, preventing the vulnerabilities that an organization may suffer. By objectively evaluating the different tools used in computer security, companies will have a valuable source of information that will allow them to take preventive and effective measures to protect digital information. The proposed study seeks to provide useful information that will serve as a guide for the different sectors that need to improve their security related to information access and management, making use of the best existing tools. existing tools.
dc.languagespa
dc.publisherUniversidad Santo Tomás
dc.publisherIngeniería Informática
dc.publisherFacultad de Ingeniería de Sistemas
dc.relationÁntropos Ltda, E. (2020). Informe Tendencias Del Cibercrimen Primer Trimestre 2020.
dc.relationAtera. (2023). Atera. Recuperado de: https://www.atera.com/
dc.relationAT&T Cybersecurity. (2023). AlienVault USM. Recuperado de: https://www.att.com/
dc.relationAuvik. (2023). Auvik. Recuperado de: https://www.auvik.com/
dc.relationBeagle Security. (2023). Beagle Security. Recuperado de: https://beaglesecurity.com/
dc.relationBetterCloud. (2023). BetterCloud. Recuperado de: https://www.bettercloud.com/
dc.relationBland, J. A., Petty, M. D., Whitaker, T. S., Maxwell, K. P., & Cantrell, W. A. (2020). Machine Learning Cyberattack and Defense Strategies R. Computers & Security, 92, 101738. https://doi.org/10.1016/j.cose.2020.101738
dc.relationBlumira. (2023). Blumira Automated Detection & Response. Recuperado de: https://www.blumira.com/
dc.relationBroadcom Inc. (2023). Symantec DLP. Recuperado de: https://www.broadcom.com/
dc.relationCámara de Comercio de Bogotá. (2022). ¿Qué es una empresa? - Cámara de Comercio de Bogotá. Retrieved December 22, 2022, Recuperado de: https://www.ccb.org.co/Preguntasfrecuentes/Tramites-registrales/Que-es-una-empresa
dc.relationCasino, F., Dasaklis, T. K., Spathoulas, G. P., Anagnostopoulos, M., Ghosal, A., Borocz, I., Solanas, A., Conti, M., & Patsakis, C. (2022). Research Trends, Challenges, and Emerging Topics in Digital Forensics: A Review of Reviews. In IEEE Access (Vol. 10, pp. 25464– 25493). Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/ACCESS.2022.3154059
dc.relationCheck Point. (2023). Avanan. Recuperado de: https://www.checkpoint.com/
dc.relationCheck Point. (2023). Check Point IPS. Recuperado de: https://www.checkpoint.com/
dc.relationCisco. (2023). Cisco Secure Firewall Threat Defense Virtual. Recuperado de: https://www.cisco.com/
dc.relationCódigo Penal, C. (2009). Ley 1273 de 2009.
dc.relationCrowdSec. (2023). CrowdSec. Recuperado de: https://www.crowdsec.net/
dc.relationDatadog. (2023). Datadog. Recuperado de: https://www.datadoghq.com/
dc.relationDavid, B. (2016). REVISIÓN BIBLIOGRÁFICA DE LA NORMA ISO 27001 Y SUS COMPONENTES.
dc.relationDomotz. (2023). Domotz. Recuperado de: https://www.domotz.com/
dc.relationDynatrace. (2023). Dynatrace. Recuperado de: https://www.dynatrace.com/
dc.relationEndpoint Protector by CoSoSys. (2023). Endpoint Protector. Recuperado de: https://www.endpointprotector.com/
dc.relationEquipo TicTac. (2021). Tendencias del cibercrimen 2021-2020.
dc.relationESET Latinoamérica. (2022). Security report latinoamerica 2022.
dc.relationESET Latinoamérica. (2020). SECURITY REPORT LATINOAMÉRICA 2020.
dc.relationExtraHop. (2023). ExtraHop. Recuperado de: https://www.extrahop.com/
dc.relationFah, S., Beresford, A., Bugiel, S., Chen, H., Freemantle, P., & Viera, M. (2021). Web & Mobile Security Knowledge Area Version 1.0.1. The National Cyber Security Centre 2021. Recuperado de: http://www.nationalarchives.gov.uk/doc/open-government-licence/
dc.relationForcepoint. (2023). Forcepoint Data Loss Prevention. Recuperado de: https://www.forcepoint.com/
dc.relationFortinet. (2023). FortiGate IPS. Recuperado de: https://www.fortinet.com/
dc.relationFrontegg. (2023). Frontegg. Recuperado de: https://frontegg.com/
dc.relationGkioulos, V., & Chowdhury, N. (2021). Cyber security training for critical infrastructure protection: A literature review. In Computer Science Review (Vol. 40). Elsevier Ireland Ltd. https://doi.org/10.1016/j.cosrev.2021.100361
dc.relationG2. (2023). Grid Reporte de: Data Loss Prevention (DLP). https://www.g2.com/reports/fb7ca990-c48d-4c95-aa02-653e75d86fe2/preview
dc.relationG2. (2023). Grid Reporte de: Identity and Access Management (IAM). https://www.g2.com/reports/ea89ff9a-4193-47bd-85d7-7ebbee7ac62c/preview
dc.relationG2. (2023). Grid Reporte de: Intrusion Detection and Prevention Systems (IDPS). https://www.g2.com/reports/23c68908-2cd8-474c-bafb-4332e87edcc0/preview
dc.relationG2. (2023). Grid Reporte de: Network Monitoring. https://www.g2.com/reports/697caefe7219-4117-b64d-7f8ccc911cb8/preview
dc.relationG2. (2023). Grid Reporte de: Vulnerability Scanner. https://www.g2.com/reports/73d1a333-6947-42de-8c52-bd283a43d56a/preview
dc.relationHarán, J. M. (2020a). El 42% de las empresas no estaba preparada para teletrabajar de forma segura | WeLiveSecurity. Recuperado de: https://www.welivesecurity.com/laes/2020/06/23/teletrabajo-seguro-empresas-no-estaban-preparadas/
dc.relationHolguín, L., & Andrés Flórez Velásquez, C. (2019). INFORME FINAL DE LA PRÀCTICA EMPRESARIAL Seguridad Informática: herramientas de mantenimiento y vulnerabilidades.
dc.relationIakovakis, G., Xarhoulacos, C. G., Giovas, K., & Gritzalis, D. (2021). Analysis and Classification of Mitigation Tools against Cyberattacks in COVID-19 Era. In Security and Communication Networks (Vol. 2021). Hindawi Limited. Recuperado de: https://doi.org/10.1155/2021/3187205
dc.relationIBM. (2023). IBM Security Verify. Recuperado de: https://www.ibm.com/mx-es
dc.relationInformation Security Forum. (2023). Standard of Good Practice for Information Security 2020. Recuperado de: https://www.securityforum.org/solutions-and-insights/standard-ofgood-practice-for-information-security-2020/
dc.relationInstaSafe. (2023). Instasafe ZTAA. Recuperado de: https://instasafe.com/
dc.relationInstituto Nacional de Ciberseguridad. (2021). Glosario de términos de ciberseguridad. Incibe.
dc.relationIntruder. (2023). Intruder. Recuperado de: https://www.intruder.io/
dc.relationISO/IEC. (2018). INTERNATIONAL STANDARD ISO/IEC 27000. www.iso.org
dc.relationJumpCloud. (2023). JumpCloud. Recuperado de: https://jumpcloud.com/
dc.relationKaur, J., & Ramkumar, K. R. (2022). The recent trends in cyber security: A review. In Journal of King Saud University - Computer and Information Sciences (Vol. 34, Issue 8, pp. 5766–5781). King Saud bin Abdulaziz University. https://doi.org/10.1016/j.jksuci.2021.01.018
dc.relationKumar, N., Singh, A. K., Aleem, A., & Srivastava, S. (2019). Security Attacks in Named Data Networking: A Review and Research Directions. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 34(6), 1319–1350. https://doi.org/10.1007/s11390-019
dc.relationLogicMonitor. (2023). LogicMonitor. Recuperado de: https://www.logicmonitor.com/
dc.relationLopez, A. C., Garcia, C. (RA) F. B., Guzman, L. M., & Quintero, C. A. (2019). Tendencias de Cibercrimen en Colombia (2019-2020). Recuperado de: http://www.ccit.org.cohttps://www.policia.gov.co/https://www.policia.gov.co/dijin
dc.relationMartin, A., Rashid, A., Chivers, H., Schneider, S., & Lupu, E. (2021). Introduction to CyBOK Knowledge Area Version 1.0.1. Recuperado de: http://www.nationalarchives.gov.uk/doc/open-government-licence/
dc.relationMcAfee. (2023). McAfee DLP. Recuperado de: https://www.mcafee.com/
dc.relationMendoza, M. Á. (2020). Aumentaron 141% los ataques de fuerza bruta al RDP en América Latina | WeLiveSecurity. Recuperado de: https://www.welivesecurity.com/laes/2020/11/30/aumentaron-ataques-fuerza-bruta-rdp-america-latina/
dc.relationMicrosoft. (2023). Microsoft Azure Active Directory. Recuperado de: https://www.microsoft.com/es-co/
dc.relationMintic. (2020). PLAN DE SEGURIDAD Y PRIVACIDAD DE LA INFORMACIÓN
dc.relationMirtsch, M., Kinne, J., & Blind, K. (2021). Exploring the Adoption of the International Information Security Management System Standard ISO/IEC 27001: A Web Mining-Based Analysis. IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 68(1). https://doi.org/10.1109/TEM.2020.2977815
dc.relationMontoya, C. (2022). PROPUESTA DE ESTRATEGIAS PARA EL MEJORAMIENTO EN LOS. UNIVERSIDAD SANTO TOMÁS.
dc.relationNightfall. (2023). Nightfall. Recuperado de: https://www.nightfall.ai/
dc.relationNinjaOne. (2023). NinjaOne. Recuperado de: https://www.ninjaone.com/
dc.relationOkta. (2023). Okta. Recuperado de: https://www.okta.com/
dc.relationOneLogin. (2023). OneLogin. Recuperado de: https://www.onelogin.com/
dc.relationOrca Security. (2023). Orca Security. Recuperado de: https://orca.security/
dc.relationPandora FMS. (2023). Pandora FMS. Recuperado de: https://pandorafms.com/en/
dc.relationPiessens, F., Bodden, E., Chapman, R., Hicks, M., Klein, J., & Sablefeld, A. (2021). Software Security Knowledge Area Version 1.0.1. Recuperado de: http://www.nationalarchives.gov.uk/doc/open-government-licence/
dc.relationPing Identity. (2023). Ping Identity. Recuperado de: https://www.pingidentity.com/en.html
dc.relationPingSafe. (2023). PingSafe. Recuperado de: https://www.pingsafe.com/
dc.relationPortSwigger. (2023). Burp Suite. Recuperado de: https://portswigger.net/
dc.relationProgress. (2023). Progress WhatsUp Gold. Recuperado de: https://www.progress.com/
dc.relationProofpoint. (2023). Proofpoint Enterprise Data Loss Prevención. Recuperado de: https://www.proofpoint.com/us/resources/data-sheets/enterprise-data-loss-prevention
dc.relationQualys. (2023). Qualys. Recuperado de: https://www.qualys.com/
dc.relationRapid7. (2023). Nexpose. Recuperado de: https://www.rapid7.com/
dc.relationSafetica. (2023). Safetica. Recuperado de: https://www.safetica.com/
dc.relationSamaniego, E. A., Jéssica, M., & Ponce Ordóñez, A. (2021). Fundamentos de seguridad informática.
dc.relationSnort. (2023). Snort. Recuperado de: https://www.snort.org/
dc.relationSnyk. (2023). Snyk. Recuperado de: https://snyk.io/
dc.relationSolarWinds. (2023). SolarWinds Network Performance Monitor. Recuperado de: https://www.solarwinds.com/
dc.relationStrongDM. (2023). StrongDM. Recuperado de: https://www.strongdm.com/
dc.relationTenable. (2023). Nessus. Recuperado de: https://www.tenable.com/
dc.relationTeramind. (2023). Teramind. Recuperado de: https://www.teramind.co/
dc.relationThreatBlockr. (2023). ThreatBlockr. Recuperado de: https://www.threatblockr.com/
dc.relationTrend Micro. (2023). Trend Micro Hybrid Cloud Security. Recuperado de: https://www.trendmicro.com/es_mx/business.html
dc.relationUrbina, G. B. (2016). Introducción a la Seguridad Informática.
dc.relationVijayalakshmi, M., Mercy Shalinie, S., Yang, M. H., & Raja Meenakshi, U. (2020). Web phishing detection techniques: A survey on the state-of-the-art, taxonomy and future directions. In IET Networks (Vol. 9, Issue 5, pp. 235–246). Institution of Engineering and Technology. https://doi.org/10.1049/iet-net.2020.0078
dc.relationWilliams, L., Rod Chapman Altran, R. U., & McGraw Synopsys, G. (2021). Secure Software Lifecycle Knowledge Area Version 1.0.1. Recuperado de: http://www.nationalarchives.gov.uk/doc/open-government-licence/
dc.relationWiz. (2023). Wiz. Recuperado de: https://www.wiz.io/
dc.relationWSO2. (2023). WSO2 Identity Server. Recuperado de: https://wso2.com
dc.relationHarán, J. M. (2020b). Solo el 33% de las empresas de América Latina cuenta con un plan de continuidad de negocio | WeLiveSecurity. Recuperado de: https://www.welivesecurity.com/la-es/2020/08/13/un-tercio-empresas-america-latina-tieneplan-continuidad-negocio/
dc.relationRomero, M. I., Grace, C., Figueroa, L., Denisse, M., Vera, S., José, N., Álava, E., Galo, C., Parrales, R., Christian, A., Álava, J., Ángel, M., Murillo Quimiz, L., Adriana, M., & Merino, C. (2018). INTRODUCCIÓN A LA SEGURIDAD INFORMÁTICA Y EL ANÁLISIS DE VULNERABILIDADES.
dc.rightshttp://creativecommons.org/licenses/by-nc-nd/2.5/co/
dc.rightsAbierto (Texto Completo)
dc.rightsinfo:eu-repo/semantics/openAccess
dc.rightshttp://purl.org/coar/access_right/c_abf2
dc.rightsAtribución-NoComercial-SinDerivadas 2.5 Colombia
dc.titleAnálisis de tecnologías orientadas a la protección de la información.


Este ítem pertenece a la siguiente institución