dc.contributor.author | Hernández Bejarano, Miguel | |
dc.contributor.author | Baquero Rey, Luis Eduardo | |
dc.date.accessioned | 2025-10-02T20:31:18Z | |
dc.date.available | 2025-10-02T20:31:18Z | |
dc.date.issued | 2025-06 | |
dc.identifier.uri | https://hdl.handle.net/20.500.14329/1581 | |
dc.description.abstract | En la era digital contemporánea, la ciberseguridad se ha consolidado como un elemento
esencial para salvaguardar la información y los sistemas de las organizaciones. La
seguridad de la información abarca un conjunto de prácticas y tecnologías diseñadas
para salvaguardar los datos contra accesos no autorizados, alteraciones y destrucción.
A medida que las empresas y los individuos hacen uso cada vez más de la tecnología,
la comprensión de los principios de la ciberseguridad se vuelve esencial para mitigar
riesgos y proteger activos valiosos. | spa |
dc.description.tableofcontents | Introducción -- Elementos de ciberseguridad -- Ciberseguridad -- Seguridad de la información -- Los principios de la ciberseguridad -- Tecnologías que apoyan la ciberseguridad -- Tipos de ataques -- Grupos delictivos cibernéticos -- Fraudes por computadoras -- Falsificaciones informáticas -- Actividades -- Referencias | spa |
dc.format.extent | 28 páginas | spa |
dc.format.mimetype | application/pdf | spa |
dc.language.iso | spa | spa |
dc.publisher | Escuela Tecnológica Instituto Técnico Central | spa |
dc.rights.uri | https://creativecommons.org/licenses/by-nc-sa/4.0/ | spa |
dc.subject.other | Ciberseguridad | |
dc.subject.other | Seguridad de la información | |
dc.subject.other | Seguridad en Internet | |
dc.subject.other | Fraude | |
dc.title | Fundamentos de Ciberseguridad | spa |
dc.type | Libro | spa |
dc.rights.license | Atribución-NoComercial-CompartirIgual 4.0 Internacional (CC BY-NC-SA 4.0) | spa |
dc.rights.accessrights | info:eu-repo/semantics/closedAccess | spa |
dc.type.coar | http://purl.org/coar/resource_type/c_2f33 | spa |
dc.type.driver | info:eu-repo/semantics/book | spa |
dc.type.version | info:eu-repo/semantics/acceptedVersion | spa |
dc.publisher.place | Bogotá D.C. | spa |
dc.relation.references | Abinaya E., Aishwarva K., Lordwin C. P. M., Kamatchi G. y Malarvizhi I.,”A Performance
Aware Security Framework to Avoid Software Attacks on Internet of Things (IoT)
Based Patient Monitoring System,” 2018 International Conference on Current
Trends towards Converging Technologies (ICCTCT), Coimbatore, India, 2018, pp.
1-6, doi: 10.1109/ICCTCT.2018.8550955 | spa |
dc.relation.references | Abushgra, A. A. (2023). How Quantum Computing Impacts Cyber Security. 2023 Intelligent
Methods, Systems, and Applications (IMSA), 74-79. | spa |
dc.relation.references | Adam W. A. Bin, Xuan, Tan I. Y., Lai C. S., Rahim N. T., Tham B. Y. Bin and H. Guo, “Vishing-
Defender: An Advanced Vishing Defence System Against Vishing Attacks,” 2023 IEEE International Conference on Service Operations and Logistics, and Informatics
(SOLI), Singapore, 2023, pp. 1-8, doi: 10.1109/SOLI60636.2023.10425272 | spa |
dc.relation.references | Agubor,C. K. Chukwudebe G. A. and Nosirl O. C.. (2015). Security challenges to telecommunication
networks: An overview of threats and preventive strategies. 2015
International Conference on Cyberspace (CYBER-Abuja), 124-129. | spa |
dc.relation.references | Al-Ghamdi, N., y Alsubait, T. (2022). 2022 Fifth National Conference of Saudi Computers
Colleges (NCCC). Digital Forensics and Machine Learning to Fraudulent Email Prediction,
99-106. | spa |
dc.relation.references | Arzheimer, K. (2017). Psephology and technology, or: the rise and rise of the script-Kiddie.
Electoral Behaviour, 972. | spa |
dc.relation.references | Balim, C., y Gunal, E. S. (2019). Automatic Detection of Smishing Attacks by Machine
Learning Methods. 2019 1st International Informatics and Software Engineering
Conference (UBMYK), 1-3. | spa |
dc.relation.references | Baram, G., y Sommer, U. (2019). Covert or not Covert: National Strategies During Cyber
Conflict. 2019 11th International Conference on Cyber Conflict (CyCon), 1-16. | spa |
dc.relation.references | Calvin, N. (2024). The Weaponization of Artificial Intelligence in Cybersecurity: A Systematic
Review. Procedia Computer Science, 547-555. | spa |
dc.relation.references | CN-CERT. (2017). Ciberamenazas y Tendencias. Madrid: Centro Criptologico Nacional. | spa |
dc.relation.references | W. L. Cukier, E. J. Nesselroth and S. Cody, (2007). Genre, Narrative and the “Nigerian
Letter” in Electronic Mail. 2007 40th Annual Hawaii International Conference on
System Sciences (HICSS’07), 70. | spa |
dc.relation.references | Dwivedi A., Saini G. K., Musa U. I. y Kunal (2023). Cybersecurity and Prevention in the
Quantum Era. 2023 2nd International Conference for Innovation in Technology
(INOCON), 1-6. | spa |
dc.relation.references | Fabián, R. B. (2013). Seguridad Informática. Madrid: McGraw Hill. | spa |
dc.relation.references | Farrah, D., y Dacier, M. (2021). Zero Conf Protocols and their numerous Man in the Middle
(MITM) Attacks. 2021 IEEE Security and Privacy Workshops (SPW), 410-421. | spa |
dc.relation.references | Guers K., Chowdhury M. M. y Rifat N. (2022). Card Skimming: A Cybercrime by Hackers.
2022 IEEE International Conference on Electro Information Technology (eIT), 575-
579. | spa |
dc.relation.references | Higashino M.,Kawato T., Ohmori M. y Kawamura T.. (2019). An Anti-phishing Training
System for Security Awareness and Education Considering Prevention of Information Leakage. 2019 5th International Conference on Information Management
(ICIM), 82-86. | spa |
dc.relation.references | IBM. (16 de 10 de 2022). ¿Qué es la seguridad de TI? Obtenido de https://www.ibm.
com/mx-es/topics/it-security | spa |
dc.relation.references | ISO-27000. (10 de 12 de 2023). ISO 27001. Obtenido de http://www.iso27000.es/sgsi.
html | spa |
dc.relation.references | Javier, A. B. (2012). Seguridad de la Información Redes, Informáticas y Sistemas de Información.
Madrid: Paraninfo. | spa |
dc.relation.references | Jiang M., Sakota D., Kosaka R. y Hijikata W.. (2021). Analysis of Plasma Skimming within
a Hydrodynamic Bearing Gap for Designing Spiral Groove Bearings in Rotary
Blood Pumps. 2021 43rd Annual International Conference of the IEEE Engineering
in Medicine & Biology Society (EMBC), 1213-1217. | spa |
dc.relation.references | Crnogorac J., Kovač J., Kočan E. y Vučinić M. (2019). d-Argus: a Distributed IEEE 802.15.4
Sniffer. 2019 27th Telecommunications Forum (TELFOR), 1-7. | spa |
dc.relation.references | Libre, U. (2023). Seguridad de la Información. Obtenido de http://www.unilibre.edu.co/
bogota/ul/noticias/noticias-universitarias/152-seguridad-de-la-informacion | spa |
dc.relation.references | Lubarski, P., y Morzy, M. (2012). Measuring the Importance of Users in a Social Network
Based on Email Communication Patterns. 2012 IEEE/ACM International Conference
on Advances in Social Networks Analysis and Mining, 86-90. | spa |
dc.relation.references | Lundgren, B., y Möller, N. (2019). Defining information security. Science and engineering
ethics, 419-441. | spa |
dc.relation.references | Macas, M., Wu, C., y Fuertes, W. (2022). A survey on deep learning for cybersecurity:
Progress, challenges, and opportunities. Computer Networks, 109032. | spa |
dc.relation.references | Miftari et al. (2022). Analysis of cybercriminals and where they fall on the spectrum of
crime. 2022 International Conference on Data Analytics for Business and Industry
(ICDABI), 287-291. | spa |
dc.relation.references | Mohammed Nasser A., Tariq A., Taher A., Karrar A., Rabiah A.y Mazin, A. M. (2024). Insider
threat detection in cyber-physical systems: a systematic literature review.
Computers and Electrical Engineering, 109489. | spa |
dc.relation.references | Nazli, M. N., y Maghari, A. Y. (2017). Comparación entre algoritmos de detección de
falsificación de imágenes. 2017 8th International Conference on Information Technology
(ICIT), 442-445. | spa |
dc.relation.references | Ortiz Bayona Zulima, G. P. (2016). Hacia una Taxonomía de Incidentes de Seguridad
en Internet - Dialnet. Obtenido de https://dialnet.unirioja.es/descarga/articulo/
4797163.pdf | spa |
dc.relation.references | Parthy, P. P., y Rajendran, G. (2019). Identification and prevention of social engineering
attacks on an enterprise. 2019 International Carnahan Conference on Security Technology
(ICCST), 1-5. | spa |
dc.relation.references | Prasiddha, B., Namratha, J., y Mohana, H. (2023). Cyber Security Testbed: Keyloggers
and Data Visualization on Keyloggers - A Case Study. 2023 International Conference
on Sustainable Communication Networks and Application (ICSCNA), 219-221. | spa |
dc.relation.references | Salama Salama R., Al-Turjman F., Bhatla S. y Yadav S. P. (2023). Social engineering attack
types and prevention techniques- A survey. 2023 International Conference on
Computational Intelligence, Communication Technology and Networking (CICTN),
817-820. | spa |
dc.relation.references | Samtani, S., y Chen, H. (2016). Using social network analysis to identify key hackers for
keylogging tools in hacker forums. 2016 IEEE Conference on Intelligence and Security
Informatics (ISI), 319-321. | spa |
dc.relation.references | Saraswat, P., Singh, S., y Solanki, M. (2022). Phishing Detection in E-mails using Machine
Learning. 2022 2nd International Conference on Technological Advancements in
Computational Sciences (ICTACS), 420-424. | spa |
dc.relation.references | Shah, P. G., y Ayoade, J. (2023). An Empricial Study of Brute Force Attack on Wordpress
Website. 2023 5th International Conference on Smart Systems and Inventive Technology
(ICSSIT), 659-662. | spa |
dc.relation.references | Shin W., Lee J. L., Park D. H. y Chang C. H. (2014). Design of authenticity evaluation metric
for Android applications. 2014 Fourth International Conference on Digital Information
and Communication Technology and its Applications (DICTAP), 275-278. | spa |
dc.relation.references | Singh, A. P., y Singh, V. (2018). Infringement of Prevention Technique against Keyloggers
using Sift Attack. 2018 International Conference on Advanced Computation
and Telecommunication (ICACAT), 1-4. | spa |
dc.relation.references | Sinkar, Y., y Rajabhushanam, C. (2021). GWOA Model For Data Protection. 2021 International
Conference on Computer Communication and Informatics (ICCCI), 1-5. | spa |
dc.relation.references | Sznaier Camps G., Bohm Agostini N. and Kaeli D. (2019). 2019 18th IEEE International
Conference On Machine Learning And Applications (ICMLA). Discovering Programmer
Intention Behind Written Source Code, 432-437. | spa |
dc.relation.references | Tjada N., Cory N. y Cherie N. (2023). Web Injection and Banking Trojan Malware -A Systematic
Literature Review. 2023 6th International Conference on Information and
Computer Technologies (ICICT), 45-48. | spa |
dc.relation.references | UNIR. (01 de 04 de 2023). Los 4 principios de la seguridad informática y su implementación.
Obtenido de https://unirfp.unir.net/revista/ingenieria-y-tecnologia/principios-
seguridad-informatica/ | spa |
dc.relation.references | Universitat Carlemany. (25 de 02 de 2024). Qué es la seguridad informática: principios,
tipos, ejemplos y más. Obtenido de https://www.universitatcarlemany.com/actualidad/
blog/seguridad-informatica-que-es/ | spa |
dc.relation.references | Vasile, D., y Svasta, P. M. (2019). Innovative Authentication Method for IoT Devices.
2019 22nd European Microelectronics and Packaging Conference & Exhibition
(EMPC), 1-6. | spa |
dc.relation.references | Vélez-Duarte C. P., Calva-Cabrera D. y León-AlbercaCalva T. B. the last presidential elections
in Ecuador. 2022 17th Iberian Conference on Information Systems and Technologies
(CISTI), 1-6. | spa |
dc.relation.references | Yirui Z., Yong L., Yijia C. y Mingyu Y. (2023). Risk-based contingency analysis for power
systems considering a combination of different types of cyber-attacks. Applied
Energy, 121551. | spa |
dc.relation.references | Zhenhua, Y., y Jun, K. (2024). Cue-based two factor authentication. Computers & Security,
104068. | spa |
dc.subject.spines | Tecnología de la seguridad | |
dc.type.coarversion | http://purl.org/coar/version/c_ab4af688f83e57aa | spa |
dc.type.content | Text | spa |
dc.rights.coar | http://purl.org/coar/access_right/c_abf2 | spa |
dc.identifier.eisbn | 978-628-97163-0-6 | spa |