Mostrar el registro sencillo del ítem
Fundamentos de Ciberseguridad
dc.contributor.author | Hernández Bejarano, Miguel | |
dc.contributor.author | Baquero Rey, Luis Eduardo | |
dc.date.accessioned | 2025-10-02T20:31:18Z | |
dc.date.available | 2025-10-02T20:31:18Z | |
dc.date.issued | 2025-06 | |
dc.identifier.uri | https://hdl.handle.net/20.500.14329/1581 | |
dc.description.abstract | En la era digital contemporánea, la ciberseguridad se ha consolidado como un elemento esencial para salvaguardar la información y los sistemas de las organizaciones. La seguridad de la información abarca un conjunto de prácticas y tecnologías diseñadas para salvaguardar los datos contra accesos no autorizados, alteraciones y destrucción. A medida que las empresas y los individuos hacen uso cada vez más de la tecnología, la comprensión de los principios de la ciberseguridad se vuelve esencial para mitigar riesgos y proteger activos valiosos. | spa |
dc.description.tableofcontents | Introducción -- Elementos de ciberseguridad -- Ciberseguridad -- Seguridad de la información -- Los principios de la ciberseguridad -- Tecnologías que apoyan la ciberseguridad -- Tipos de ataques -- Grupos delictivos cibernéticos -- Fraudes por computadoras -- Falsificaciones informáticas -- Actividades -- Referencias | spa |
dc.format.extent | 28 páginas | spa |
dc.format.mimetype | application/pdf | spa |
dc.language.iso | spa | spa |
dc.publisher | Escuela Tecnológica Instituto Técnico Central | spa |
dc.rights.uri | https://creativecommons.org/licenses/by-nc-sa/4.0/ | spa |
dc.subject.other | Ciberseguridad | |
dc.subject.other | Seguridad de la información | |
dc.subject.other | Seguridad en Internet | |
dc.subject.other | Fraude | |
dc.title | Fundamentos de Ciberseguridad | spa |
dc.type | Libro | spa |
dc.rights.license | Atribución-NoComercial-CompartirIgual 4.0 Internacional (CC BY-NC-SA 4.0) | spa |
dc.rights.accessrights | info:eu-repo/semantics/closedAccess | spa |
dc.type.coar | http://purl.org/coar/resource_type/c_2f33 | spa |
dc.type.driver | info:eu-repo/semantics/book | spa |
dc.type.version | info:eu-repo/semantics/acceptedVersion | spa |
dc.publisher.place | Bogotá D.C. | spa |
dc.relation.references | Abinaya E., Aishwarva K., Lordwin C. P. M., Kamatchi G. y Malarvizhi I.,”A Performance Aware Security Framework to Avoid Software Attacks on Internet of Things (IoT) Based Patient Monitoring System,” 2018 International Conference on Current Trends towards Converging Technologies (ICCTCT), Coimbatore, India, 2018, pp. 1-6, doi: 10.1109/ICCTCT.2018.8550955 | spa |
dc.relation.references | Abushgra, A. A. (2023). How Quantum Computing Impacts Cyber Security. 2023 Intelligent Methods, Systems, and Applications (IMSA), 74-79. | spa |
dc.relation.references | Adam W. A. Bin, Xuan, Tan I. Y., Lai C. S., Rahim N. T., Tham B. Y. Bin and H. Guo, “Vishing- Defender: An Advanced Vishing Defence System Against Vishing Attacks,” 2023 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI), Singapore, 2023, pp. 1-8, doi: 10.1109/SOLI60636.2023.10425272 | spa |
dc.relation.references | Agubor,C. K. Chukwudebe G. A. and Nosirl O. C.. (2015). Security challenges to telecommunication networks: An overview of threats and preventive strategies. 2015 International Conference on Cyberspace (CYBER-Abuja), 124-129. | spa |
dc.relation.references | Al-Ghamdi, N., y Alsubait, T. (2022). 2022 Fifth National Conference of Saudi Computers Colleges (NCCC). Digital Forensics and Machine Learning to Fraudulent Email Prediction, 99-106. | spa |
dc.relation.references | Arzheimer, K. (2017). Psephology and technology, or: the rise and rise of the script-Kiddie. Electoral Behaviour, 972. | spa |
dc.relation.references | Balim, C., y Gunal, E. S. (2019). Automatic Detection of Smishing Attacks by Machine Learning Methods. 2019 1st International Informatics and Software Engineering Conference (UBMYK), 1-3. | spa |
dc.relation.references | Baram, G., y Sommer, U. (2019). Covert or not Covert: National Strategies During Cyber Conflict. 2019 11th International Conference on Cyber Conflict (CyCon), 1-16. | spa |
dc.relation.references | Calvin, N. (2024). The Weaponization of Artificial Intelligence in Cybersecurity: A Systematic Review. Procedia Computer Science, 547-555. | spa |
dc.relation.references | CN-CERT. (2017). Ciberamenazas y Tendencias. Madrid: Centro Criptologico Nacional. | spa |
dc.relation.references | W. L. Cukier, E. J. Nesselroth and S. Cody, (2007). Genre, Narrative and the “Nigerian Letter” in Electronic Mail. 2007 40th Annual Hawaii International Conference on System Sciences (HICSS’07), 70. | spa |
dc.relation.references | Dwivedi A., Saini G. K., Musa U. I. y Kunal (2023). Cybersecurity and Prevention in the Quantum Era. 2023 2nd International Conference for Innovation in Technology (INOCON), 1-6. | spa |
dc.relation.references | Fabián, R. B. (2013). Seguridad Informática. Madrid: McGraw Hill. | spa |
dc.relation.references | Farrah, D., y Dacier, M. (2021). Zero Conf Protocols and their numerous Man in the Middle (MITM) Attacks. 2021 IEEE Security and Privacy Workshops (SPW), 410-421. | spa |
dc.relation.references | Guers K., Chowdhury M. M. y Rifat N. (2022). Card Skimming: A Cybercrime by Hackers. 2022 IEEE International Conference on Electro Information Technology (eIT), 575- 579. | spa |
dc.relation.references | Higashino M.,Kawato T., Ohmori M. y Kawamura T.. (2019). An Anti-phishing Training System for Security Awareness and Education Considering Prevention of Information Leakage. 2019 5th International Conference on Information Management (ICIM), 82-86. | spa |
dc.relation.references | IBM. (16 de 10 de 2022). ¿Qué es la seguridad de TI? Obtenido de https://www.ibm. com/mx-es/topics/it-security | spa |
dc.relation.references | ISO-27000. (10 de 12 de 2023). ISO 27001. Obtenido de http://www.iso27000.es/sgsi. html | spa |
dc.relation.references | Javier, A. B. (2012). Seguridad de la Información Redes, Informáticas y Sistemas de Información. Madrid: Paraninfo. | spa |
dc.relation.references | Jiang M., Sakota D., Kosaka R. y Hijikata W.. (2021). Analysis of Plasma Skimming within a Hydrodynamic Bearing Gap for Designing Spiral Groove Bearings in Rotary Blood Pumps. 2021 43rd Annual International Conference of the IEEE Engineering in Medicine & Biology Society (EMBC), 1213-1217. | spa |
dc.relation.references | Crnogorac J., Kovač J., Kočan E. y Vučinić M. (2019). d-Argus: a Distributed IEEE 802.15.4 Sniffer. 2019 27th Telecommunications Forum (TELFOR), 1-7. | spa |
dc.relation.references | Libre, U. (2023). Seguridad de la Información. Obtenido de http://www.unilibre.edu.co/ bogota/ul/noticias/noticias-universitarias/152-seguridad-de-la-informacion | spa |
dc.relation.references | Lubarski, P., y Morzy, M. (2012). Measuring the Importance of Users in a Social Network Based on Email Communication Patterns. 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 86-90. | spa |
dc.relation.references | Lundgren, B., y Möller, N. (2019). Defining information security. Science and engineering ethics, 419-441. | spa |
dc.relation.references | Macas, M., Wu, C., y Fuertes, W. (2022). A survey on deep learning for cybersecurity: Progress, challenges, and opportunities. Computer Networks, 109032. | spa |
dc.relation.references | Miftari et al. (2022). Analysis of cybercriminals and where they fall on the spectrum of crime. 2022 International Conference on Data Analytics for Business and Industry (ICDABI), 287-291. | spa |
dc.relation.references | Mohammed Nasser A., Tariq A., Taher A., Karrar A., Rabiah A.y Mazin, A. M. (2024). Insider threat detection in cyber-physical systems: a systematic literature review. Computers and Electrical Engineering, 109489. | spa |
dc.relation.references | Nazli, M. N., y Maghari, A. Y. (2017). Comparación entre algoritmos de detección de falsificación de imágenes. 2017 8th International Conference on Information Technology (ICIT), 442-445. | spa |
dc.relation.references | Ortiz Bayona Zulima, G. P. (2016). Hacia una Taxonomía de Incidentes de Seguridad en Internet - Dialnet. Obtenido de https://dialnet.unirioja.es/descarga/articulo/ 4797163.pdf | spa |
dc.relation.references | Parthy, P. P., y Rajendran, G. (2019). Identification and prevention of social engineering attacks on an enterprise. 2019 International Carnahan Conference on Security Technology (ICCST), 1-5. | spa |
dc.relation.references | Prasiddha, B., Namratha, J., y Mohana, H. (2023). Cyber Security Testbed: Keyloggers and Data Visualization on Keyloggers - A Case Study. 2023 International Conference on Sustainable Communication Networks and Application (ICSCNA), 219-221. | spa |
dc.relation.references | Salama Salama R., Al-Turjman F., Bhatla S. y Yadav S. P. (2023). Social engineering attack types and prevention techniques- A survey. 2023 International Conference on Computational Intelligence, Communication Technology and Networking (CICTN), 817-820. | spa |
dc.relation.references | Samtani, S., y Chen, H. (2016). Using social network analysis to identify key hackers for keylogging tools in hacker forums. 2016 IEEE Conference on Intelligence and Security Informatics (ISI), 319-321. | spa |
dc.relation.references | Saraswat, P., Singh, S., y Solanki, M. (2022). Phishing Detection in E-mails using Machine Learning. 2022 2nd International Conference on Technological Advancements in Computational Sciences (ICTACS), 420-424. | spa |
dc.relation.references | Shah, P. G., y Ayoade, J. (2023). An Empricial Study of Brute Force Attack on Wordpress Website. 2023 5th International Conference on Smart Systems and Inventive Technology (ICSSIT), 659-662. | spa |
dc.relation.references | Shin W., Lee J. L., Park D. H. y Chang C. H. (2014). Design of authenticity evaluation metric for Android applications. 2014 Fourth International Conference on Digital Information and Communication Technology and its Applications (DICTAP), 275-278. | spa |
dc.relation.references | Singh, A. P., y Singh, V. (2018). Infringement of Prevention Technique against Keyloggers using Sift Attack. 2018 International Conference on Advanced Computation and Telecommunication (ICACAT), 1-4. | spa |
dc.relation.references | Sinkar, Y., y Rajabhushanam, C. (2021). GWOA Model For Data Protection. 2021 International Conference on Computer Communication and Informatics (ICCCI), 1-5. | spa |
dc.relation.references | Sznaier Camps G., Bohm Agostini N. and Kaeli D. (2019). 2019 18th IEEE International Conference On Machine Learning And Applications (ICMLA). Discovering Programmer Intention Behind Written Source Code, 432-437. | spa |
dc.relation.references | Tjada N., Cory N. y Cherie N. (2023). Web Injection and Banking Trojan Malware -A Systematic Literature Review. 2023 6th International Conference on Information and Computer Technologies (ICICT), 45-48. | spa |
dc.relation.references | UNIR. (01 de 04 de 2023). Los 4 principios de la seguridad informática y su implementación. Obtenido de https://unirfp.unir.net/revista/ingenieria-y-tecnologia/principios- seguridad-informatica/ | spa |
dc.relation.references | Universitat Carlemany. (25 de 02 de 2024). Qué es la seguridad informática: principios, tipos, ejemplos y más. Obtenido de https://www.universitatcarlemany.com/actualidad/ blog/seguridad-informatica-que-es/ | spa |
dc.relation.references | Vasile, D., y Svasta, P. M. (2019). Innovative Authentication Method for IoT Devices. 2019 22nd European Microelectronics and Packaging Conference & Exhibition (EMPC), 1-6. | spa |
dc.relation.references | Vélez-Duarte C. P., Calva-Cabrera D. y León-AlbercaCalva T. B. the last presidential elections in Ecuador. 2022 17th Iberian Conference on Information Systems and Technologies (CISTI), 1-6. | spa |
dc.relation.references | Yirui Z., Yong L., Yijia C. y Mingyu Y. (2023). Risk-based contingency analysis for power systems considering a combination of different types of cyber-attacks. Applied Energy, 121551. | spa |
dc.relation.references | Zhenhua, Y., y Jun, K. (2024). Cue-based two factor authentication. Computers & Security, 104068. | spa |
dc.subject.spines | Tecnología de la seguridad | |
dc.type.coarversion | http://purl.org/coar/version/c_ab4af688f83e57aa | spa |
dc.type.content | Text | spa |
dc.rights.coar | http://purl.org/coar/access_right/c_abf2 | spa |
dc.identifier.eisbn | 978-628-97163-0-6 | spa |
Ficheros en el ítem
Este ítem aparece en la(s) siguiente(s) colección(ones)
-
FA. Cuadernos ETITC [38]