dc.contributor | Cruz Yomayusa, Paola Andrea | |
dc.contributor | Universidad Santo Tomas | |
dc.creator | Perez Hernández, Daniel Sebastián | |
dc.date.accessioned | 2023-07-26T16:20:32Z | |
dc.date.accessioned | 2023-09-06T12:51:30Z | |
dc.date.available | 2023-07-26T16:20:32Z | |
dc.date.available | 2023-09-06T12:51:30Z | |
dc.date.created | 2023-07-26T16:20:32Z | |
dc.date.issued | 2023-07-17 | |
dc.identifier | Perez, D. (2022). Análisis de tecnologías orientadas a la protección de la información. trabajo de pregrado. Universidad Santo Tomás. Tunja | |
dc.identifier | http://hdl.handle.net/11634/51456 | |
dc.identifier | reponame:Repositorio Institucional Universidad Santo Tomás | |
dc.identifier | instname:Universidad Santo Tomás | |
dc.identifier | repourl:https://repository.usta.edu.co | |
dc.identifier.uri | https://repositorioslatinoamericanos.uchile.cl/handle/2250/8679599 | |
dc.description.abstract | This monograph makes a comparative analysis of the different IT security tools that allow the protection of information, preventing the vulnerabilities that an organization may suffer. By objectively evaluating the different tools used in computer security, companies will have a valuable source of information that will allow them to take preventive and effective measures to protect digital information. The proposed study seeks to provide useful information that will serve as a guide for the different sectors that need to improve their security related to information access and management, making use of the best existing tools.
existing tools. | |
dc.language | spa | |
dc.publisher | Universidad Santo Tomás | |
dc.publisher | Ingeniería Informática | |
dc.publisher | Facultad de Ingeniería de Sistemas | |
dc.relation | Ántropos Ltda, E. (2020). Informe Tendencias Del Cibercrimen Primer Trimestre 2020. | |
dc.relation | Atera. (2023). Atera. Recuperado de: https://www.atera.com/ | |
dc.relation | AT&T Cybersecurity. (2023). AlienVault USM. Recuperado de: https://www.att.com/ | |
dc.relation | Auvik. (2023). Auvik. Recuperado de: https://www.auvik.com/ | |
dc.relation | Beagle Security. (2023). Beagle Security. Recuperado de: https://beaglesecurity.com/ | |
dc.relation | BetterCloud. (2023). BetterCloud. Recuperado de: https://www.bettercloud.com/ | |
dc.relation | Bland, J. A., Petty, M. D., Whitaker, T. S., Maxwell, K. P., & Cantrell, W. A. (2020). Machine Learning Cyberattack and Defense Strategies R. Computers & Security, 92, 101738. https://doi.org/10.1016/j.cose.2020.101738 | |
dc.relation | Blumira. (2023). Blumira Automated Detection & Response. Recuperado de: https://www.blumira.com/ | |
dc.relation | Broadcom Inc. (2023). Symantec DLP. Recuperado de: https://www.broadcom.com/ | |
dc.relation | Cámara de Comercio de Bogotá. (2022). ¿Qué es una empresa? - Cámara de Comercio de Bogotá. Retrieved December 22, 2022, Recuperado de: https://www.ccb.org.co/Preguntasfrecuentes/Tramites-registrales/Que-es-una-empresa | |
dc.relation | Casino, F., Dasaklis, T. K., Spathoulas, G. P., Anagnostopoulos, M., Ghosal, A., Borocz, I., Solanas, A., Conti, M., & Patsakis, C. (2022). Research Trends, Challenges, and Emerging Topics in Digital Forensics: A Review of Reviews. In IEEE Access (Vol. 10, pp. 25464– 25493). Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/ACCESS.2022.3154059 | |
dc.relation | Check Point. (2023). Avanan. Recuperado de: https://www.checkpoint.com/ | |
dc.relation | Check Point. (2023). Check Point IPS. Recuperado de: https://www.checkpoint.com/ | |
dc.relation | Cisco. (2023). Cisco Secure Firewall Threat Defense Virtual. Recuperado de: https://www.cisco.com/ | |
dc.relation | Código Penal, C. (2009). Ley 1273 de 2009. | |
dc.relation | CrowdSec. (2023). CrowdSec. Recuperado de: https://www.crowdsec.net/ | |
dc.relation | Datadog. (2023). Datadog. Recuperado de: https://www.datadoghq.com/ | |
dc.relation | David, B. (2016). REVISIÓN BIBLIOGRÁFICA DE LA NORMA ISO 27001 Y SUS COMPONENTES. | |
dc.relation | Domotz. (2023). Domotz. Recuperado de: https://www.domotz.com/ | |
dc.relation | Dynatrace. (2023). Dynatrace. Recuperado de: https://www.dynatrace.com/ | |
dc.relation | Endpoint Protector by CoSoSys. (2023). Endpoint Protector. Recuperado de: https://www.endpointprotector.com/ | |
dc.relation | Equipo TicTac. (2021). Tendencias del cibercrimen 2021-2020. | |
dc.relation | ESET Latinoamérica. (2022). Security report latinoamerica 2022. | |
dc.relation | ESET Latinoamérica. (2020). SECURITY REPORT LATINOAMÉRICA 2020. | |
dc.relation | ExtraHop. (2023). ExtraHop. Recuperado de: https://www.extrahop.com/ | |
dc.relation | Fah, S., Beresford, A., Bugiel, S., Chen, H., Freemantle, P., & Viera, M. (2021). Web & Mobile Security Knowledge Area Version 1.0.1. The National Cyber Security Centre 2021. Recuperado de: http://www.nationalarchives.gov.uk/doc/open-government-licence/ | |
dc.relation | Forcepoint. (2023). Forcepoint Data Loss Prevention. Recuperado de: https://www.forcepoint.com/ | |
dc.relation | Fortinet. (2023). FortiGate IPS. Recuperado de: https://www.fortinet.com/ | |
dc.relation | Frontegg. (2023). Frontegg. Recuperado de: https://frontegg.com/ | |
dc.relation | Gkioulos, V., & Chowdhury, N. (2021). Cyber security training for critical infrastructure protection: A literature review. In Computer Science Review (Vol. 40). Elsevier Ireland Ltd. https://doi.org/10.1016/j.cosrev.2021.100361 | |
dc.relation | G2. (2023). Grid Reporte de: Data Loss Prevention (DLP). https://www.g2.com/reports/fb7ca990-c48d-4c95-aa02-653e75d86fe2/preview | |
dc.relation | G2. (2023). Grid Reporte de: Identity and Access Management (IAM). https://www.g2.com/reports/ea89ff9a-4193-47bd-85d7-7ebbee7ac62c/preview | |
dc.relation | G2. (2023). Grid Reporte de: Intrusion Detection and Prevention Systems (IDPS). https://www.g2.com/reports/23c68908-2cd8-474c-bafb-4332e87edcc0/preview | |
dc.relation | G2. (2023). Grid Reporte de: Network Monitoring. https://www.g2.com/reports/697caefe7219-4117-b64d-7f8ccc911cb8/preview | |
dc.relation | G2. (2023). Grid Reporte de: Vulnerability Scanner. https://www.g2.com/reports/73d1a333-6947-42de-8c52-bd283a43d56a/preview | |
dc.relation | Harán, J. M. (2020a). El 42% de las empresas no estaba preparada para teletrabajar de forma segura | WeLiveSecurity. Recuperado de: https://www.welivesecurity.com/laes/2020/06/23/teletrabajo-seguro-empresas-no-estaban-preparadas/ | |
dc.relation | Holguín, L., & Andrés Flórez Velásquez, C. (2019). INFORME FINAL DE LA PRÀCTICA EMPRESARIAL Seguridad Informática: herramientas de mantenimiento y vulnerabilidades. | |
dc.relation | Iakovakis, G., Xarhoulacos, C. G., Giovas, K., & Gritzalis, D. (2021). Analysis and Classification of Mitigation Tools against Cyberattacks in COVID-19 Era. In Security and Communication Networks (Vol. 2021). Hindawi Limited. Recuperado de: https://doi.org/10.1155/2021/3187205 | |
dc.relation | IBM. (2023). IBM Security Verify. Recuperado de: https://www.ibm.com/mx-es | |
dc.relation | Information Security Forum. (2023). Standard of Good Practice for Information Security 2020. Recuperado de: https://www.securityforum.org/solutions-and-insights/standard-ofgood-practice-for-information-security-2020/ | |
dc.relation | InstaSafe. (2023). Instasafe ZTAA. Recuperado de: https://instasafe.com/ | |
dc.relation | Instituto Nacional de Ciberseguridad. (2021). Glosario de términos de ciberseguridad. Incibe. | |
dc.relation | Intruder. (2023). Intruder. Recuperado de: https://www.intruder.io/ | |
dc.relation | ISO/IEC. (2018). INTERNATIONAL STANDARD ISO/IEC 27000. www.iso.org | |
dc.relation | JumpCloud. (2023). JumpCloud. Recuperado de: https://jumpcloud.com/ | |
dc.relation | Kaur, J., & Ramkumar, K. R. (2022). The recent trends in cyber security: A review. In Journal of King Saud University - Computer and Information Sciences (Vol. 34, Issue 8, pp. 5766–5781). King Saud bin Abdulaziz University. https://doi.org/10.1016/j.jksuci.2021.01.018 | |
dc.relation | Kumar, N., Singh, A. K., Aleem, A., & Srivastava, S. (2019). Security Attacks in Named Data Networking: A Review and Research Directions. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 34(6), 1319–1350. https://doi.org/10.1007/s11390-019 | |
dc.relation | LogicMonitor. (2023). LogicMonitor. Recuperado de: https://www.logicmonitor.com/ | |
dc.relation | Lopez, A. C., Garcia, C. (RA) F. B., Guzman, L. M., & Quintero, C. A. (2019). Tendencias de Cibercrimen en Colombia (2019-2020). Recuperado de: http://www.ccit.org.cohttps://www.policia.gov.co/https://www.policia.gov.co/dijin | |
dc.relation | Martin, A., Rashid, A., Chivers, H., Schneider, S., & Lupu, E. (2021). Introduction to CyBOK Knowledge Area Version 1.0.1. Recuperado de: http://www.nationalarchives.gov.uk/doc/open-government-licence/ | |
dc.relation | McAfee. (2023). McAfee DLP. Recuperado de: https://www.mcafee.com/ | |
dc.relation | Mendoza, M. Á. (2020). Aumentaron 141% los ataques de fuerza bruta al RDP en América Latina | WeLiveSecurity. Recuperado de: https://www.welivesecurity.com/laes/2020/11/30/aumentaron-ataques-fuerza-bruta-rdp-america-latina/ | |
dc.relation | Microsoft. (2023). Microsoft Azure Active Directory. Recuperado de: https://www.microsoft.com/es-co/ | |
dc.relation | Mintic. (2020). PLAN DE SEGURIDAD Y PRIVACIDAD DE LA INFORMACIÓN | |
dc.relation | Mirtsch, M., Kinne, J., & Blind, K. (2021). Exploring the Adoption of the International Information Security Management System Standard ISO/IEC 27001: A Web Mining-Based Analysis. IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 68(1). https://doi.org/10.1109/TEM.2020.2977815 | |
dc.relation | Montoya, C. (2022). PROPUESTA DE ESTRATEGIAS PARA EL MEJORAMIENTO EN LOS. UNIVERSIDAD SANTO TOMÁS. | |
dc.relation | Nightfall. (2023). Nightfall. Recuperado de: https://www.nightfall.ai/ | |
dc.relation | NinjaOne. (2023). NinjaOne. Recuperado de: https://www.ninjaone.com/ | |
dc.relation | Okta. (2023). Okta. Recuperado de: https://www.okta.com/ | |
dc.relation | OneLogin. (2023). OneLogin. Recuperado de: https://www.onelogin.com/ | |
dc.relation | Orca Security. (2023). Orca Security. Recuperado de: https://orca.security/ | |
dc.relation | Pandora FMS. (2023). Pandora FMS. Recuperado de: https://pandorafms.com/en/ | |
dc.relation | Piessens, F., Bodden, E., Chapman, R., Hicks, M., Klein, J., & Sablefeld, A. (2021). Software Security Knowledge Area Version 1.0.1. Recuperado de: http://www.nationalarchives.gov.uk/doc/open-government-licence/ | |
dc.relation | Ping Identity. (2023). Ping Identity. Recuperado de: https://www.pingidentity.com/en.html | |
dc.relation | PingSafe. (2023). PingSafe. Recuperado de: https://www.pingsafe.com/ | |
dc.relation | PortSwigger. (2023). Burp Suite. Recuperado de: https://portswigger.net/ | |
dc.relation | Progress. (2023). Progress WhatsUp Gold. Recuperado de: https://www.progress.com/ | |
dc.relation | Proofpoint. (2023). Proofpoint Enterprise Data Loss Prevención. Recuperado de: https://www.proofpoint.com/us/resources/data-sheets/enterprise-data-loss-prevention | |
dc.relation | Qualys. (2023). Qualys. Recuperado de: https://www.qualys.com/ | |
dc.relation | Rapid7. (2023). Nexpose. Recuperado de: https://www.rapid7.com/ | |
dc.relation | Safetica. (2023). Safetica. Recuperado de: https://www.safetica.com/ | |
dc.relation | Samaniego, E. A., Jéssica, M., & Ponce Ordóñez, A. (2021). Fundamentos de seguridad informática. | |
dc.relation | Snort. (2023). Snort. Recuperado de: https://www.snort.org/ | |
dc.relation | Snyk. (2023). Snyk. Recuperado de: https://snyk.io/ | |
dc.relation | SolarWinds. (2023). SolarWinds Network Performance Monitor. Recuperado de: https://www.solarwinds.com/ | |
dc.relation | StrongDM. (2023). StrongDM. Recuperado de: https://www.strongdm.com/ | |
dc.relation | Tenable. (2023). Nessus. Recuperado de: https://www.tenable.com/ | |
dc.relation | Teramind. (2023). Teramind. Recuperado de: https://www.teramind.co/ | |
dc.relation | ThreatBlockr. (2023). ThreatBlockr. Recuperado de: https://www.threatblockr.com/ | |
dc.relation | Trend Micro. (2023). Trend Micro Hybrid Cloud Security. Recuperado de: https://www.trendmicro.com/es_mx/business.html | |
dc.relation | Urbina, G. B. (2016). Introducción a la Seguridad Informática. | |
dc.relation | Vijayalakshmi, M., Mercy Shalinie, S., Yang, M. H., & Raja Meenakshi, U. (2020). Web phishing detection techniques: A survey on the state-of-the-art, taxonomy and future directions. In IET Networks (Vol. 9, Issue 5, pp. 235–246). Institution of Engineering and Technology. https://doi.org/10.1049/iet-net.2020.0078 | |
dc.relation | Williams, L., Rod Chapman Altran, R. U., & McGraw Synopsys, G. (2021). Secure Software Lifecycle Knowledge Area Version 1.0.1. Recuperado de: http://www.nationalarchives.gov.uk/doc/open-government-licence/ | |
dc.relation | Wiz. (2023). Wiz. Recuperado de: https://www.wiz.io/ | |
dc.relation | WSO2. (2023). WSO2 Identity Server. Recuperado de: https://wso2.com | |
dc.relation | Harán, J. M. (2020b). Solo el 33% de las empresas de América Latina cuenta con un plan de continuidad de negocio | WeLiveSecurity. Recuperado de: https://www.welivesecurity.com/la-es/2020/08/13/un-tercio-empresas-america-latina-tieneplan-continuidad-negocio/ | |
dc.relation | Romero, M. I., Grace, C., Figueroa, L., Denisse, M., Vera, S., José, N., Álava, E., Galo, C., Parrales, R., Christian, A., Álava, J., Ángel, M., Murillo Quimiz, L., Adriana, M., & Merino, C. (2018). INTRODUCCIÓN A LA SEGURIDAD INFORMÁTICA Y EL ANÁLISIS DE VULNERABILIDADES. | |
dc.rights | http://creativecommons.org/licenses/by-nc-nd/2.5/co/ | |
dc.rights | Abierto (Texto Completo) | |
dc.rights | info:eu-repo/semantics/openAccess | |
dc.rights | http://purl.org/coar/access_right/c_abf2 | |
dc.rights | Atribución-NoComercial-SinDerivadas 2.5 Colombia | |
dc.title | Análisis de tecnologías orientadas a la protección de la información. | |