Logotipo del repositorio
  • English
  • Español
  • Français
  • Português
  • Iniciar sesión
    ¿Has olvidado tu contraseña?
Logotipo del repositorio
  • Comunidades
  • Listar por
  • English
  • Español
  • Français
  • Português
  • Iniciar sesión
    ¿Has olvidado tu contraseña?
  1. Inicio
  2. Examinar por materia

Examinando por Materia "REDES DE COMPUTADORES - MEDIDAS DE SEGURIDAD"

Mostrando 1 - 11 de 11
Resultados por página
Opciones de ordenación
  • No hay miniatura disponible
    Publicación
    Decodificando el ataque key reinstallation attacks (kracks) en redes wifi con wpa2
    (Universidad EAFIT, 2020) Yépez Crow, Hugo Santiago; Lalinde Pulido, Juan Guillermo
  • No hay miniatura disponible
    Publicación
    El blockchain y la propiedad intelectual en Colombia : perspectivas como medio de protección y como objeto de protección
    (Universidad EAFIT, 2022) Gómez Molina, Simón; Múnera Posada, Armando
    The purpose of this research is to study the Blockchain in Colombia as a means of protection and, secondly, as an object of intellectual property protection. In this sense, the difficulties present in the Colombian legal framework related to the use of Blockchain technology as a means of protection are discussed, with a view to seeking strategies to solve this problem. Regarding the methodology, the research is limited to a documentary-bibliographic research, in which the techniques for the collection and analysis of the data are the analysis of the normative hypothesis, the consultation to sources of legal knowledge and the review of the data obtained for the interpretation of the legal facts; thus, from the analysis and interpretation it was concluded that despite the advantages of the technology studied in intellectual protection, it is visualized that there are few institutions and professionals with sufficient knowledge to contribute ideas on this topic, so that a legal set for the use of the tool has not been consolidated.
  • No hay miniatura disponible
    Publicación
    El documento electrónico en el proceso civil colombiano, requisitos de existencia, validez y eficacia. Un análisis a la luz de los nuevos medios de comunicación
    (Universidad EAFIT, 2020) Hoyos González, Manuela; Posada Botero, José David
    Due to the new era of technology, the way the world communicates has changed. The interactions carried out today are done through social networks, which has led to some figures falling into disuse, such as titles, contracts, and even expressions of affection expressed through handwritten letters. Just as the world and technology are in constant evolution, everything around us must progress at the same pace. Human interactions have become countless messages sent through WhatsApp, Facebook, Instagram, and e-mail. With these applications, secrets are shared, relationships are created, contracts are drafted and sent, alliances are created, transactions are made, and sometimes what is communicated leads to breaches and contractual or non-contractual liabilities. This forces individuals to access justice by providing evidence of interactions and file sharing on the social networks listed, thus giving rise to the notion of an electronic document. Therefore, it aims to clarify the concept of electronic document, its regulation to show if it requires a special treatment. To this end, it analyzes the jurisprudential pronouncements on the subject and their requirements of existence, validity and effectiveness, in order to understand this figure within the Colombian civil process, and its procedural stages, as well as the assessment made by the judge. In addition, it proposes a study of comparative law, and an investigation into the legality of the electronic document, and whether its contribution to the process generates a violation of the right to privacy.
  • No hay miniatura disponible
    Ítem
    Estudio sobre la seguridad de la información en las organizaciones del área metropolitana de Medellín
    (Universidad EAFIT, 2006) Casas Jiménez, Liliana; Rincón Bermúdez, Rafael David
  • No hay miniatura disponible
    Ítem
    Fundamentos de criptografía cuántica
    (Universidad EAFIT, 2007) Ortiz Rojas, Hernán; Lalinde Pulido, Juan Guillermo
  • No hay miniatura disponible
    Publicación
    Integración de la gestión de seguridad cibernética a la gestión de riesgo empresarial
    (Universidad EAFIT, 2021) Romo Arango, Eliana Patricia; Corrales Estrada, Ana María
    With technological advances come new forms of crime associated with cyberspace, which increases the need to manage the associated cyber risks. This research pursued to delve into aspects that contribute to the integration of cybersecurity with the already well-established business risk management. To do this, a literature review about Cybersecurity Management, Cyber Risks and Business Risk Management was carried out; additionally, the case analysis method was used, with a sample composed by four companies from Financial Sector, with presence in Latin-America. It was observed that the integration largely depends on the support from senior management profiles for enabling strategies and resources; additionally, on the knowledge that companies absorb from the environment to implement good methodological and operational practices; and from behavior of people against threats and risks. It was concluded to have a proper integration between Cybersecurity Management and Business Risk Management, initiatives supported from the highest management profiles of the organization are required, which need to be implemented at all levels, including topics such as culture, knowledge, methodologies, tools, roles and responsibilities.
  • No hay miniatura disponible
    Publicación
    La gestión de riesgos cibernéticos : la perspectiva de los tomadores de decisiones
    (Universidad EAFIT, 2020) Pabón Noreña, Gloria Cristina; Palacio Henao, Claudia Marcela; Manrique Tisnés, Horacio
  • No hay miniatura disponible
    Publicación
    Metodología de implementación blockchain para la mejora en rendimiento, seguridad y transparencia de las transacciones en el sector bancario – Caso de uso
    (Universidad EAFIT, 2024) Naranjo Marín, Juan Camilo; Lalinde Pulido, Juan Guillermo
    The present work focuses on analyzing and presenting a methodological strategy to implement blockchain technology and how this can improve the performance, security, and traceability of financial transactions in the banking sector through a use case. Blockchain technology has emerged as a promising solution to address various challenges in various sectors such as health, supply chain, among others. Helping in terms of trust and security, in which the financial sector could improve. The hypothesis raised establishes that the implementation of blockchain technology can solve these problems and further optimize operations. To address this objective, the current problems in the financial sector, specifically in financial transactions, will be identified. Subsequently, it will be analyzed how blockchain technology can solve these problems and deliver the promising results that have been obtained around the world in terms of efficiency, transparency, and security. A baseline implementation model will be proposed based on the findings obtained.
  • No hay miniatura disponible
    Publicación
    Metodología para cuantificar las pérdidas económicas y financieras de una empresa, tanto a nivel nacional o internacional, cuando es afectada por ciberataques o ataques informáticos
    (Universidad EAFIT, 2021) Atencia Urueta, Víctor Rafael; Lalinde Pulido, Juan Guillermo; Servicio Nacional de Aprendizaje – SENA; MNEMO - Csirt Financiero Colombia
    In this work, the direct financial, economic and reputational costs incurred by a company when affected by cyberattacks were examined, for which a methodology supported by international standards on cybersecurity was created or structured. The proposed methodology allows supporting companies, governments, judges and insurance companies, to quantify the economic, administrative, commercial, financial and reputational losses incurred by a company in any country, when being a victim of cyberattacks in its operations, services, infrastructure and / or reputation. The importance and relevance of this work is based on what has been occurring in cybersociety in the current times of pandemic and post-pandemic by covid-19, where online work, work at home, electronic businesses, learning on line, e-Banking, industry 4.0 services, and in general, the entire digital transformation of companies is here to stay as a necessity or mandatory requirement, in society and continue to generate value and produce in companies. This business and institutional digital transformation comes with a number of services, which facilitate the development of productive activities, but also increase vulnerability to computer attacks or cyberattacks against companies, organizations, private and governmental institutions worldwide. Such attacks greatly affect the resources, the economy, the finances and the entire value of companies and nations.
  • No hay miniatura disponible
    Ítem
    Phishing: la automatización de la ingeniería social
    (Universidad EAFIT, 2007) Salazar Aristizábal, Natalia Andrea; González Arango, Marcela; Lalinde Pulido, Juan Guillermo
    El presente trabajo contiene una recopilación de la información que presentan algunos bancos tanto nacionales como internacionales con respecto a Seguridad Informática más concretamente “Ingeniería social: Phishing”, un tema que tiene gran auge en la actualidad por la incidencia en la red y las consecuencias negativas que ha presentado sobre los usuarios de los diferentes entidades financieras -- Finalmente se presentan a los usuarios del Internet unos tips generales de cómo evitar este tipo de fraudes
  • No hay miniatura disponible
    Publicación
    Planeación de la ejecución del proyecto de ciberseguridad para la empresa Lagobo Distribuciones S. A. S.
    (Universidad EAFIT, 2025) Franco Murcia, Alexander; Tobar Guinand, José Mauricio
    This thesis focuses on planning the execution of a cybersecurity project at Lagobo Distribuciones S. A. S., following the planning framework of the PMBOK Guide. The project phases are structured sequentially, seeking to strengthen the company's resilience to cyber threats, comply with current regulations such as NTC 27001, and promote a cybersecurity-conscious organizational culture. A structured methodology will be used to conduct diagnostic, design, implementation, and continuous improvement phases. Budget structuring ensures efficient resource allocation. The proposal focuses on the growing relevance of cybersecurity in corporate contexts, ensuring the protection of critical data and assets.

Vigilada Mineducación

Universidad con Acreditación Institucional hasta 2026 - Resolución MEN 2158 de 2018

Software DSpace copyright © 2002-2025 LYRASIS

  • Configuración de cookies
  • Enviar Sugerencias