dc.contributor.author | Hernández Bejarano, Miguel | |
dc.contributor.author | Baquero Rey, Luis Eduardo | |
dc.contributor.author | Rivera Lozano, Miller | |
dc.date.accessioned | 2025-10-03T17:41:22Z | |
dc.date.available | 2025-10-03T17:41:22Z | |
dc.date.issued | 2025-06 | |
dc.identifier.uri | https://hdl.handle.net/20.500.14329/1587 | |
dc.description.abstract | Las estrategias de protección de datos son fundamentales para resguardar los recursos
digitales de una organización, garantizando la confidencialidad, integridad y disponibilidad
de los datos. Herramientas como la autenticación multifactor y la encriptación de
datos son fundamentales para evitar accesos no autorizados y proteger la privacidad
de los usuarios, creando un entorno seguro para las operaciones empresariales. | spa |
dc.description.tableofcontents | 1. Introducción -- 2. Criptografía -- 2.1 Funciones HASH -- 2.2 Algoritmo de resumen del mensaje 5 -- 2.3 El SHA -- 2.4 Tiger 1283 -- 2.5 Esteganografía -- 3. Control de acceso -- 3.1 Autenticación -- 3.2 Autorización -- 4. Copias de seguridad y recuperación -- 5. Firewall -- 6. Monitoreo y auditoría de seguridad -- 7. Actividades -- 7.1 Realizar una consulta -- 7.2 Realizar una consulta -- 7.3 Realizar una consulta -- Referencias | spa |
dc.format.extent | 24 páginas | spa |
dc.format.mimetype | application/pdf | spa |
dc.language.iso | spa | spa |
dc.publisher | Escuela Tecnológica Instituto Técnico Central | spa |
dc.rights.uri | https://creativecommons.org/licenses/by-nc-sa/4.0/ | spa |
dc.subject.other | Firewalls (computing) | |
dc.title | Mecanismo para la protección de la información | spa |
dc.type | Libro | spa |
dc.rights.license | Atribución-NoComercial-CompartirIgual 4.0 Internacional (CC BY-NC-SA 4.0) | spa |
dc.rights.accessrights | info:eu-repo/semantics/closedAccess | spa |
dc.type.coar | http://purl.org/coar/resource_type/c_2f33 | spa |
dc.type.driver | info:eu-repo/semantics/book | spa |
dc.type.version | info:eu-repo/semantics/acceptedVersion | spa |
dc.publisher.place | Bogotá D.C | spa |
dc.relation.references | Abualkas, Y., & Lalitha, B. (2023). Secure Authentication and Authorization with MAC Address
and Cryptography-Based Multi-Factor Algorithm. 2023 Second International
Conference on Informatics (ICI), 1-5. | spa |
dc.relation.references | Allami et al. (2025). Oblivious and distributed firewall policies for securing firewalls from
malicious attacks. Computers & Security, 104201. | spa |
dc.relation.references | Ambedkar, B. R., Bharti, P. K., & Husain, A. (2022). Enhancing the Performance of Hash
Function Using Autonomous Initial Value Proposed Secure Hash Algorithm 256.
2022 IEEE 11th International Conference on Communication Systems and Network
Technologies (CSNT), 560-565. | spa |
dc.relation.references | Atul, K., & Kalpna, G. (2024). Leveraging Machine Learning Algorithms for Threat Detection
Using AI-Enhanced Cybersecurity Datasets. 2024 4th International Conference
on Technological Advancements in Computational Sciences (ICTACS), 483-488. | spa |
dc.relation.references | Barracuda. (2025). Barracuda CloudGen Firewall. Retrieved from Get protection that
goes beyond next-generation firewalls: https://www.barracuda.com/products/network-
protection/cloudgen-firewall | spa |
dc.relation.references | Biham, R. A. (2017). Tiger: A Fast New Hash Function Fast Software Encryption 3. Cambridge. | spa |
dc.relation.references | Caballero, G. P. (2002). Introducción a la Criptografía. Madrid: RA-MA. | spa |
dc.relation.references | CHEKC POINT. (2025). Next Generation Firewalls. Retrieved from AI-Powered Security
puerta de enlace: https://www.checkpoint.com/es/quantum/next-generation-firewall/ | spa |
dc.relation.references | CISCO. (2025). Cortafuegos. Retrieved from Cortafuegos seguro de Cisco ASA: https://
www.cisco.com/c/en/us/products/security/adaptive-security-appliance-asa-software/
index.html | spa |
dc.relation.references | Criptografía. (2012). Galende Díaz Juan Carlos. Madrid: Complutense. | spa |
dc.relation.references | Darío, V. M. (2016). Cordoba: Universidad Nacional de Córdoba. | spa |
dc.relation.references | DONGEE. (2025). La más avanzada seguridad para tu negocio. Retrieved from Cortafuegos
empresarial Dongee: https://www.dongee.com/imunify360/ | spa |
dc.relation.references | DONGEE. (2025). Tutoriales Web. Retrieved from Cómo elegir un firewall para mi empresa:
https://www.dongee.com/tutoriales/los-10-mejores-firewalls-para-tu-negocio-
o-emprendimiento-digital/ | spa |
dc.relation.references | Feng et al. (2024). Security Risk Assessment System for Power Monitoring Systems Based
on Zero Trust Architecture. 2024 4th International Conference on Computer
Science, Electronic Information Engineering and Intelligent Control Technology
(CEI), 2015-218. | spa |
dc.relation.references | Fortinet. (2025). Seguridad inigualable, rendimiento sin precedentes. Retrieved from
Cortafuegos de próxima generación (NGFW): https://www.fortinet.com/products/
next-generation-firewall | spa |
dc.relation.references | Gupta, D., & Kumar, R. (2021). Sponge based Lightweight Cryptographic Hash Functions
for IoT Applications. {2021 International Conference on Intelligent Technologies
(CONIT, 1-5. | spa |
dc.relation.references | Harshita K., Arora H., Joshi R., Sharma K., Mehra M., Sharma P. K,. (2025). Digital Image
Security using Hybrid Model of Steganography and Cryptography. 2025 International
Conference on Electronics and Renewable Systems (ICEARS), 1009-1012. | spa |
dc.relation.references | IBM. (2013, 07 31). Funciones hash. Retrieved from https://www.ibm.com/support/
knowledgecenter/es/SSULQD_7.1.0/com.ibm.nz.sqltk.doc/c_sqlext_hashing.html | spa |
dc.relation.references | INCIBE. (2019, 10 07). ¿Sabías que existen distintos tipos de cifrado para proteger la
privacidad de nuestra información en Internet? Retrieved from https://www.incibe.
es/ciudadania/blog/sabias-que-existen-distintos-tipos-de-cifrado-para-proteger-
la-privacidad | spa |
dc.relation.references | INCIBE. (2025). Copias de seguridad. Retrieved from https://www.incibe.es/ciudadania/
tematicas/copias-seguridad | spa |
dc.relation.references | Irsyad R. F., Anandha, Rr, Diajeng A., D’Layla, A. W., Chanda, De La Croix N., Jean, A. T..
(2024). Image Steganography using Customized Differences between the Neighboring
Pixels. 2024 7th International Conference on Informatics and Computational
Sciences (ICICoS), 496-501. | spa |
dc.relation.references | Jhaveri, P. (2012). Dos attacks in mobile ad hoc networks:. Proceedings of the 2012 2nd
International Conference on. IEEE Computer, 535–541. | spa |
dc.relation.references | Jianping, Z., & Hongmin, L. (2017). Research and Implementation of a Data Backup and
Recovery System for Important Business Areas. 2017 9th International Conference
on Intelligent Human-Machine Systems and Cybernetics (IHMSC), 432-437. | spa |
dc.relation.references | Jin, D., & Wang, Q. (2021). CDP Backup and Recovery Method for Ensuring Database
Consistency. 2021 IEEE International Conference on Power Electronics, Computer
Applications (ICPECA), 722-728. | spa |
dc.relation.references | Juniper Networks. (2025). Juniper Networks. Retrieved from We make every connection
count.: https://www.juniper.net/ | spa |
dc.relation.references | Junliang, Z., Dingyi, F., & Li, L. (2019). 2009 Second International Workshop on Knowledge
Discovery and Data Mining. Intelligent Content Filtering Model for Network
Security Audit System, 546-548. | spa |
dc.relation.references | Kaspersky. (2014). Qué Es Un Hash Y Cómo Funciona. Retrieved from https://latam.kaspersky.
com/blog/que-es-un-hash-y-como-funciona/2806/ | spa |
dc.relation.references | KOHUR Jasleen, D. V. (2004). Steganography Techniques. International Journal of Emerging
Research in Management and Technology ISSN 2278-9359, 5. | spa |
dc.relation.references | Liu et al. (2025). Institution Attribute Mining Technology for Access Control Based on
Hybrid Capsule Network. Computers, Materials and Continua, 1471-1489. | spa |
dc.relation.references | Majeed, M., Sulaiman, R., Shukur, Z., Hasan, M., ., ., &. (2021). A Review on Text
Steganography Techniques. Mathematics Journal, 1-28. | spa |
dc.relation.references | Mohammed, G., Manisha, N., & VembuSelvi, C. (2019). 2019 International Conference
on Advances in Computing, Communication and Control (ICAC3). Data Leakage
Prevention for Data in Transit using Artificial Intelligence and Encryption Techniques. | spa |
dc.relation.references | Mora, D., C. S., Castro H., O. P., & Chavarro F., A. C. (2019). SANI: Assistant for Information
Security Auditing on ISO/IEC 27001. Dialnet, 324-333. | spa |
dc.relation.references | NIST. (2018, 01 31). Hash Functions. Retrieved from https://csrc.nist.gov/Projects/
Hash-Functions | spa |
dc.relation.references | NIST. (2018, 01 31). Hash Functions. Retrieved from https://csrc.nist.gov/Projects/
Hash-Functions | spa |
dc.relation.references | NIST. (2018, 09 15). List of current FIPS publications. Retrieved from https://www.ietf.
org/rfc/rfc3174.txt | spa |
dc.relation.references | Om et al. (2023). Cloud-Based Data Protection and Secure Backup Solutions: A Comprehensive
Review of Ensuring Business Continuity. 2023 Third International Conference
on Secure Cyber Computing and Communication (ICSCCC), 821-826. | spa |
dc.relation.references | Paloalto. (2025). Paloalto Networks has been named a leader in enterprise firewalls.
Retrieved from https://www.paloaltonetworks.com/network-security/next-generation-
firewall | spa |
dc.relation.references | Phat T., Minh Q. P, Ha X. S., Dat L.T., Minh B., Khiem L. T., Loc C.P., Kiet T. L. f, Khanh H.
V., Ngan N.T., Triet M. N., Anh T.. (2025). A systematic review of multi-factor authentication in digital payment systems: NIST standards alignment and industry
implementation analysis. Journal of Systems Architecture, 103402. | spa |
dc.relation.references | Rajeshwaran, K., & Anil, K. K. (2019). Cellular Automata Based Hashing Algorithm (CABHA)
for Strong Cryptographic Hash Function. 2019 IEEE International Conference
on Electrical, Computer and Communication Technologies (ICECCT). | spa |
dc.relation.references | SARANGPURE V, T. R. (2014). Audio-Video Steganography Using. International Journal of
Research (IJR) Volume 1 ISSN 2348-6848., 9. | spa |
dc.relation.references | SenthilKumar, P., & Muthukumar, M. (2018). A Study on Firewall System, Scheduling
and Routing using pfsense Scheme. 2018 International Conference on Intelligent
Computing and Communication for Smart World (I2C2SW), 14-17. | spa |
dc.relation.references | Shashi, R., Pavithra, G., & Manjunath, T. C. (2022). Developing a novel steganography
concept of audio data into audio streams. 2022 4th International Conference on
Smart Systems and Inventive Technology (ICSSIT), 229-233. | spa |
dc.relation.references | Sheketa V., Pasieka M., Serman T., and Pasieka N., and Chupakhina S., and Krul L..
(2021). 2021 IEEE 16th International Conference on Computer Sciences and Information
Technologies (CSIT). System Analysis and Example of Using SHA-512 Hash
Functions to Protect Students' Personal Data on Educational Platforms,
132-136. | spa |
dc.relation.references | SONICWALL. (2025). Cortafuegos de seguridad de red. Retrieved from https://www.sonicwall.
com/products/firewalls | spa |
dc.relation.references | Stefan Katzenbeisser, F. P. (2000). Information Hiding Techniques for Steganography
and Digital. London: Artech house, inc. | spa |
dc.relation.references | Usha N. C., Suad S., Noven G. R., Erik Z., Minnie M., Lemuel C. V.. (2024). Access control
solutions in electronic health record systems: A systematic review. Informatics in
Medicine Unlocked, 101552. | spa |
dc.relation.references | Wafaa, A., & Abdelkader, O. (2017). The importance of human dynamics in the future
user authentication. 2017 IEEE 30th Canadian Conference on Electrical and Computer
Engineering (CCECE), 1-5. | spa |
dc.relation.references | Lin, Yanhong, Huang Shiguo, Hong, Minglin, Chen, Shiting, Li Xiaolin, Lin, Dakun. (2019).
MD5 Encryption Algorithm Enhanced Competitive Swarm Optimizer for Feature
Selection. 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications,
Big Data & Cloud Computing, Sustainable Computing & Communications,
Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom. | spa |
dc.relation.references | Zhiqing, S., Yan, L., & Weiyan, Z. (2019). Research on the Development Trend and Auditing
Mode of High Security Enterprise Intranet Security Audit. 2019 IEEE 11th
International Conference on Advanced Infocomm Technology (ICAIT), 153-156. | spa |
dc.subject.spines | Criptografía | |
dc.subject.spines | Protección de datos | |
dc.subject.spines | Codificación | |
dc.type.coarversion | http://purl.org/coar/version/c_ab4af688f83e57aa | spa |
dc.type.content | Text | spa |
dc.rights.coar | http://purl.org/coar/access_right/c_abf2 | spa |
dc.identifier.eisbn | 978-628-97163-1-3 | spa |