Show simple item record

dc.contributor.authorHernández Bejarano, Miguel
dc.contributor.authorBaquero Rey, Luis Eduardo
dc.date.accessioned2025-10-02T20:31:18Z
dc.date.available2025-10-02T20:31:18Z
dc.date.issued2025-06
dc.identifier.urihttps://hdl.handle.net/20.500.14329/1581
dc.description.abstractEn la era digital contemporánea, la ciberseguridad se ha consolidado como un elemento esencial para salvaguardar la información y los sistemas de las organizaciones. La seguridad de la información abarca un conjunto de prácticas y tecnologías diseñadas para salvaguardar los datos contra accesos no autorizados, alteraciones y destrucción. A medida que las empresas y los individuos hacen uso cada vez más de la tecnología, la comprensión de los principios de la ciberseguridad se vuelve esencial para mitigar riesgos y proteger activos valiosos.spa
dc.description.tableofcontentsIntroducción -- Elementos de ciberseguridad -- Ciberseguridad -- Seguridad de la información -- Los principios de la ciberseguridad -- Tecnologías que apoyan la ciberseguridad -- Tipos de ataques -- Grupos delictivos cibernéticos -- Fraudes por computadoras -- Falsificaciones informáticas -- Actividades -- Referenciasspa
dc.format.extent28 páginasspa
dc.format.mimetypeapplication/pdfspa
dc.language.isospaspa
dc.publisherEscuela Tecnológica Instituto Técnico Centralspa
dc.rights.urihttps://creativecommons.org/licenses/by-nc-sa/4.0/spa
dc.subject.otherCiberseguridad
dc.subject.otherSeguridad de la información
dc.subject.otherSeguridad en Internet
dc.subject.otherFraude
dc.titleFundamentos de Ciberseguridadspa
dc.typeLibrospa
dc.rights.licenseAtribución-NoComercial-CompartirIgual 4.0 Internacional (CC BY-NC-SA 4.0)spa
dc.rights.accessrightsinfo:eu-repo/semantics/closedAccessspa
dc.type.coarhttp://purl.org/coar/resource_type/c_2f33spa
dc.type.driverinfo:eu-repo/semantics/bookspa
dc.type.versioninfo:eu-repo/semantics/acceptedVersionspa
dc.publisher.placeBogotá D.C.spa
dc.relation.referencesAbinaya E., Aishwarva K., Lordwin C. P. M., Kamatchi G. y Malarvizhi I.,”A Performance Aware Security Framework to Avoid Software Attacks on Internet of Things (IoT) Based Patient Monitoring System,” 2018 International Conference on Current Trends towards Converging Technologies (ICCTCT), Coimbatore, India, 2018, pp. 1-6, doi: 10.1109/ICCTCT.2018.8550955spa
dc.relation.referencesAbushgra, A. A. (2023). How Quantum Computing Impacts Cyber Security. 2023 Intelligent Methods, Systems, and Applications (IMSA), 74-79.spa
dc.relation.referencesAdam W. A. Bin, Xuan, Tan I. Y., Lai C. S., Rahim N. T., Tham B. Y. Bin and H. Guo, “Vishing- Defender: An Advanced Vishing Defence System Against Vishing Attacks,” 2023 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI), Singapore, 2023, pp. 1-8, doi: 10.1109/SOLI60636.2023.10425272spa
dc.relation.referencesAgubor,C. K. Chukwudebe G. A. and Nosirl O. C.. (2015). Security challenges to telecommunication networks: An overview of threats and preventive strategies. 2015 International Conference on Cyberspace (CYBER-Abuja), 124-129.spa
dc.relation.referencesAl-Ghamdi, N., y Alsubait, T. (2022). 2022 Fifth National Conference of Saudi Computers Colleges (NCCC). Digital Forensics and Machine Learning to Fraudulent Email Prediction, 99-106.spa
dc.relation.referencesArzheimer, K. (2017). Psephology and technology, or: the rise and rise of the script-Kiddie. Electoral Behaviour, 972.spa
dc.relation.referencesBalim, C., y Gunal, E. S. (2019). Automatic Detection of Smishing Attacks by Machine Learning Methods. 2019 1st International Informatics and Software Engineering Conference (UBMYK), 1-3.spa
dc.relation.referencesBaram, G., y Sommer, U. (2019). Covert or not Covert: National Strategies During Cyber Conflict. 2019 11th International Conference on Cyber Conflict (CyCon), 1-16.spa
dc.relation.referencesCalvin, N. (2024). The Weaponization of Artificial Intelligence in Cybersecurity: A Systematic Review. Procedia Computer Science, 547-555.spa
dc.relation.referencesCN-CERT. (2017). Ciberamenazas y Tendencias. Madrid: Centro Criptologico Nacional.spa
dc.relation.referencesW. L. Cukier, E. J. Nesselroth and S. Cody, (2007). Genre, Narrative and the “Nigerian Letter” in Electronic Mail. 2007 40th Annual Hawaii International Conference on System Sciences (HICSS’07), 70.spa
dc.relation.referencesDwivedi A., Saini G. K., Musa U. I. y Kunal (2023). Cybersecurity and Prevention in the Quantum Era. 2023 2nd International Conference for Innovation in Technology (INOCON), 1-6.spa
dc.relation.referencesFabián, R. B. (2013). Seguridad Informática. Madrid: McGraw Hill.spa
dc.relation.referencesFarrah, D., y Dacier, M. (2021). Zero Conf Protocols and their numerous Man in the Middle (MITM) Attacks. 2021 IEEE Security and Privacy Workshops (SPW), 410-421.spa
dc.relation.referencesGuers K., Chowdhury M. M. y Rifat N. (2022). Card Skimming: A Cybercrime by Hackers. 2022 IEEE International Conference on Electro Information Technology (eIT), 575- 579.spa
dc.relation.referencesHigashino M.,Kawato T., Ohmori M. y Kawamura T.. (2019). An Anti-phishing Training System for Security Awareness and Education Considering Prevention of Information Leakage. 2019 5th International Conference on Information Management (ICIM), 82-86.spa
dc.relation.referencesIBM. (16 de 10 de 2022). ¿Qué es la seguridad de TI? Obtenido de https://www.ibm. com/mx-es/topics/it-securityspa
dc.relation.referencesISO-27000. (10 de 12 de 2023). ISO 27001. Obtenido de http://www.iso27000.es/sgsi. htmlspa
dc.relation.referencesJavier, A. B. (2012). Seguridad de la Información Redes, Informáticas y Sistemas de Información. Madrid: Paraninfo.spa
dc.relation.referencesJiang M., Sakota D., Kosaka R. y Hijikata W.. (2021). Analysis of Plasma Skimming within a Hydrodynamic Bearing Gap for Designing Spiral Groove Bearings in Rotary Blood Pumps. 2021 43rd Annual International Conference of the IEEE Engineering in Medicine & Biology Society (EMBC), 1213-1217.spa
dc.relation.referencesCrnogorac J., Kovač J., Kočan E. y Vučinić M. (2019). d-Argus: a Distributed IEEE 802.15.4 Sniffer. 2019 27th Telecommunications Forum (TELFOR), 1-7.spa
dc.relation.referencesLibre, U. (2023). Seguridad de la Información. Obtenido de http://www.unilibre.edu.co/ bogota/ul/noticias/noticias-universitarias/152-seguridad-de-la-informacionspa
dc.relation.referencesLubarski, P., y Morzy, M. (2012). Measuring the Importance of Users in a Social Network Based on Email Communication Patterns. 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 86-90.spa
dc.relation.referencesLundgren, B., y Möller, N. (2019). Defining information security. Science and engineering ethics, 419-441.spa
dc.relation.referencesMacas, M., Wu, C., y Fuertes, W. (2022). A survey on deep learning for cybersecurity: Progress, challenges, and opportunities. Computer Networks, 109032.spa
dc.relation.referencesMiftari et al. (2022). Analysis of cybercriminals and where they fall on the spectrum of crime. 2022 International Conference on Data Analytics for Business and Industry (ICDABI), 287-291.spa
dc.relation.referencesMohammed Nasser A., Tariq A., Taher A., Karrar A., Rabiah A.y Mazin, A. M. (2024). Insider threat detection in cyber-physical systems: a systematic literature review. Computers and Electrical Engineering, 109489.spa
dc.relation.referencesNazli, M. N., y Maghari, A. Y. (2017). Comparación entre algoritmos de detección de falsificación de imágenes. 2017 8th International Conference on Information Technology (ICIT), 442-445.spa
dc.relation.referencesOrtiz Bayona Zulima, G. P. (2016). Hacia una Taxonomía de Incidentes de Seguridad en Internet - Dialnet. Obtenido de https://dialnet.unirioja.es/descarga/articulo/ 4797163.pdfspa
dc.relation.referencesParthy, P. P., y Rajendran, G. (2019). Identification and prevention of social engineering attacks on an enterprise. 2019 International Carnahan Conference on Security Technology (ICCST), 1-5.spa
dc.relation.referencesPrasiddha, B., Namratha, J., y Mohana, H. (2023). Cyber Security Testbed: Keyloggers and Data Visualization on Keyloggers - A Case Study. 2023 International Conference on Sustainable Communication Networks and Application (ICSCNA), 219-221.spa
dc.relation.referencesSalama Salama R., Al-Turjman F., Bhatla S. y Yadav S. P. (2023). Social engineering attack types and prevention techniques- A survey. 2023 International Conference on Computational Intelligence, Communication Technology and Networking (CICTN), 817-820.spa
dc.relation.referencesSamtani, S., y Chen, H. (2016). Using social network analysis to identify key hackers for keylogging tools in hacker forums. 2016 IEEE Conference on Intelligence and Security Informatics (ISI), 319-321.spa
dc.relation.referencesSaraswat, P., Singh, S., y Solanki, M. (2022). Phishing Detection in E-mails using Machine Learning. 2022 2nd International Conference on Technological Advancements in Computational Sciences (ICTACS), 420-424.spa
dc.relation.referencesShah, P. G., y Ayoade, J. (2023). An Empricial Study of Brute Force Attack on Wordpress Website. 2023 5th International Conference on Smart Systems and Inventive Technology (ICSSIT), 659-662.spa
dc.relation.referencesShin W., Lee J. L., Park D. H. y Chang C. H. (2014). Design of authenticity evaluation metric for Android applications. 2014 Fourth International Conference on Digital Information and Communication Technology and its Applications (DICTAP), 275-278.spa
dc.relation.referencesSingh, A. P., y Singh, V. (2018). Infringement of Prevention Technique against Keyloggers using Sift Attack. 2018 International Conference on Advanced Computation and Telecommunication (ICACAT), 1-4.spa
dc.relation.referencesSinkar, Y., y Rajabhushanam, C. (2021). GWOA Model For Data Protection. 2021 International Conference on Computer Communication and Informatics (ICCCI), 1-5.spa
dc.relation.referencesSznaier Camps G., Bohm Agostini N. and Kaeli D. (2019). 2019 18th IEEE International Conference On Machine Learning And Applications (ICMLA). Discovering Programmer Intention Behind Written Source Code, 432-437.spa
dc.relation.referencesTjada N., Cory N. y Cherie N. (2023). Web Injection and Banking Trojan Malware -A Systematic Literature Review. 2023 6th International Conference on Information and Computer Technologies (ICICT), 45-48.spa
dc.relation.referencesUNIR. (01 de 04 de 2023). Los 4 principios de la seguridad informática y su implementación. Obtenido de https://unirfp.unir.net/revista/ingenieria-y-tecnologia/principios- seguridad-informatica/spa
dc.relation.referencesUniversitat Carlemany. (25 de 02 de 2024). Qué es la seguridad informática: principios, tipos, ejemplos y más. Obtenido de https://www.universitatcarlemany.com/actualidad/ blog/seguridad-informatica-que-es/spa
dc.relation.referencesVasile, D., y Svasta, P. M. (2019). Innovative Authentication Method for IoT Devices. 2019 22nd European Microelectronics and Packaging Conference & Exhibition (EMPC), 1-6.spa
dc.relation.referencesVélez-Duarte C. P., Calva-Cabrera D. y León-AlbercaCalva T. B. the last presidential elections in Ecuador. 2022 17th Iberian Conference on Information Systems and Technologies (CISTI), 1-6.spa
dc.relation.referencesYirui Z., Yong L., Yijia C. y Mingyu Y. (2023). Risk-based contingency analysis for power systems considering a combination of different types of cyber-attacks. Applied Energy, 121551.spa
dc.relation.referencesZhenhua, Y., y Jun, K. (2024). Cue-based two factor authentication. Computers & Security, 104068.spa
dc.subject.spinesTecnología de la seguridad
dc.type.coarversionhttp://purl.org/coar/version/c_ab4af688f83e57aaspa
dc.type.contentTextspa
dc.rights.coarhttp://purl.org/coar/access_right/c_abf2spa
dc.identifier.eisbn978-628-97163-0-6spa


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

https://creativecommons.org/licenses/by-nc-sa/4.0/
Except where otherwise noted, this item's license is described as https://creativecommons.org/licenses/by-nc-sa/4.0/