Ecuador | info:eu-repo/semantics/article
dc.creatorLópez,Gabriel R.
dc.creatorGuamán,Danny S.
dc.creatorCaiza,Julio C.
dc.date2015-09-01
dc.date.accessioned2023-09-25T15:16:52Z
dc.date.available2023-09-25T15:16:52Z
dc.identifierhttp://scielo.senescyt.gob.ec/scielo.php?script=sci_arttext&pid=S1390-65422015000300036
dc.identifier.urihttps://repositorioslatinoamericanos.uchile.cl/handle/2250/8824106
dc.descriptionAbstract: This investigation analyses the history of the vulnerabilities of the base system Windows Server 2012 highlighting the most critic vulnerabilities given every 4 months since its creation until the current date of the research. It was organized by the type of vulnerabilities based on the classification of the NIST. Next, given the official vulnerabilities of the system, the authors show how a critical vulnerability is treated by Microsoft in order to countermeasure the security flaw. Then, the authors present the recommended security approaches for Windows Server 2012, which focus on the baseline software given by Microsoft, update, patch and change management, hardening practices and the application of Active Directory Rights Management Services (AD RMS). AD RMS is considered as an important feature since it is able to protect the system even though it is compromised using access lists at a document level. Finally, the investigation of the state of the art related to the security of Windows Server 2012 shows an analysis of solutions given by third parties vendors, which offer security products to secure the base system objective of this study. The recommended solution given by the authors present the security vendor Symantec with its successful features and also characteristics that the authors considered that may have to be improved in future versions of the security solution.
dc.formattext/html
dc.languageen
dc.publisherUniversidad UTE
dc.relation10.29019/enfoqueute.v6n3.67
dc.rightsinfo:eu-repo/semantics/openAccess
dc.sourceEnfoque UTE v.6 n.3 2015
dc.subjectWindows Server 2012
dc.subjectvulnerabilities
dc.subjectCVE
dc.subjectoperating systems security.
dc.titleWindows Server 2012 vulnerabilities and security
dc.typeinfo:eu-repo/semantics/article


Este ítem pertenece a la siguiente institución