Mostrar el registro sencillo del ítem
Mecanismo para la protección de la información
dc.contributor.author | Hernández Bejarano, Miguel | |
dc.contributor.author | Baquero Rey, Luis Eduardo | |
dc.contributor.author | Rivera Lozano, Miller | |
dc.date.accessioned | 2025-10-03T17:41:22Z | |
dc.date.available | 2025-10-03T17:41:22Z | |
dc.date.issued | 2025-06 | |
dc.identifier.uri | https://hdl.handle.net/20.500.14329/1587 | |
dc.description.abstract | Las estrategias de protección de datos son fundamentales para resguardar los recursos digitales de una organización, garantizando la confidencialidad, integridad y disponibilidad de los datos. Herramientas como la autenticación multifactor y la encriptación de datos son fundamentales para evitar accesos no autorizados y proteger la privacidad de los usuarios, creando un entorno seguro para las operaciones empresariales. | spa |
dc.description.tableofcontents | 1. Introducción -- 2. Criptografía -- 2.1 Funciones HASH -- 2.2 Algoritmo de resumen del mensaje 5 -- 2.3 El SHA -- 2.4 Tiger 1283 -- 2.5 Esteganografía -- 3. Control de acceso -- 3.1 Autenticación -- 3.2 Autorización -- 4. Copias de seguridad y recuperación -- 5. Firewall -- 6. Monitoreo y auditoría de seguridad -- 7. Actividades -- 7.1 Realizar una consulta -- 7.2 Realizar una consulta -- 7.3 Realizar una consulta -- Referencias | spa |
dc.format.extent | 24 páginas | spa |
dc.format.mimetype | application/pdf | spa |
dc.language.iso | spa | spa |
dc.publisher | Escuela Tecnológica Instituto Técnico Central | spa |
dc.rights.uri | https://creativecommons.org/licenses/by-nc-sa/4.0/ | spa |
dc.subject.other | Firewalls (computing) | |
dc.title | Mecanismo para la protección de la información | spa |
dc.type | Libro | spa |
dc.rights.license | Atribución-NoComercial-CompartirIgual 4.0 Internacional (CC BY-NC-SA 4.0) | spa |
dc.rights.accessrights | info:eu-repo/semantics/closedAccess | spa |
dc.type.coar | http://purl.org/coar/resource_type/c_2f33 | spa |
dc.type.driver | info:eu-repo/semantics/book | spa |
dc.type.version | info:eu-repo/semantics/acceptedVersion | spa |
dc.publisher.place | Bogotá D.C | spa |
dc.relation.references | Abualkas, Y., & Lalitha, B. (2023). Secure Authentication and Authorization with MAC Address and Cryptography-Based Multi-Factor Algorithm. 2023 Second International Conference on Informatics (ICI), 1-5. | spa |
dc.relation.references | Allami et al. (2025). Oblivious and distributed firewall policies for securing firewalls from malicious attacks. Computers & Security, 104201. | spa |
dc.relation.references | Ambedkar, B. R., Bharti, P. K., & Husain, A. (2022). Enhancing the Performance of Hash Function Using Autonomous Initial Value Proposed Secure Hash Algorithm 256. 2022 IEEE 11th International Conference on Communication Systems and Network Technologies (CSNT), 560-565. | spa |
dc.relation.references | Atul, K., & Kalpna, G. (2024). Leveraging Machine Learning Algorithms for Threat Detection Using AI-Enhanced Cybersecurity Datasets. 2024 4th International Conference on Technological Advancements in Computational Sciences (ICTACS), 483-488. | spa |
dc.relation.references | Barracuda. (2025). Barracuda CloudGen Firewall. Retrieved from Get protection that goes beyond next-generation firewalls: https://www.barracuda.com/products/network- protection/cloudgen-firewall | spa |
dc.relation.references | Biham, R. A. (2017). Tiger: A Fast New Hash Function Fast Software Encryption 3. Cambridge. | spa |
dc.relation.references | Caballero, G. P. (2002). Introducción a la Criptografía. Madrid: RA-MA. | spa |
dc.relation.references | CHEKC POINT. (2025). Next Generation Firewalls. Retrieved from AI-Powered Security puerta de enlace: https://www.checkpoint.com/es/quantum/next-generation-firewall/ | spa |
dc.relation.references | CISCO. (2025). Cortafuegos. Retrieved from Cortafuegos seguro de Cisco ASA: https:// www.cisco.com/c/en/us/products/security/adaptive-security-appliance-asa-software/ index.html | spa |
dc.relation.references | Criptografía. (2012). Galende Díaz Juan Carlos. Madrid: Complutense. | spa |
dc.relation.references | Darío, V. M. (2016). Cordoba: Universidad Nacional de Córdoba. | spa |
dc.relation.references | DONGEE. (2025). La más avanzada seguridad para tu negocio. Retrieved from Cortafuegos empresarial Dongee: https://www.dongee.com/imunify360/ | spa |
dc.relation.references | DONGEE. (2025). Tutoriales Web. Retrieved from Cómo elegir un firewall para mi empresa: https://www.dongee.com/tutoriales/los-10-mejores-firewalls-para-tu-negocio- o-emprendimiento-digital/ | spa |
dc.relation.references | Feng et al. (2024). Security Risk Assessment System for Power Monitoring Systems Based on Zero Trust Architecture. 2024 4th International Conference on Computer Science, Electronic Information Engineering and Intelligent Control Technology (CEI), 2015-218. | spa |
dc.relation.references | Fortinet. (2025). Seguridad inigualable, rendimiento sin precedentes. Retrieved from Cortafuegos de próxima generación (NGFW): https://www.fortinet.com/products/ next-generation-firewall | spa |
dc.relation.references | Gupta, D., & Kumar, R. (2021). Sponge based Lightweight Cryptographic Hash Functions for IoT Applications. {2021 International Conference on Intelligent Technologies (CONIT, 1-5. | spa |
dc.relation.references | Harshita K., Arora H., Joshi R., Sharma K., Mehra M., Sharma P. K,. (2025). Digital Image Security using Hybrid Model of Steganography and Cryptography. 2025 International Conference on Electronics and Renewable Systems (ICEARS), 1009-1012. | spa |
dc.relation.references | IBM. (2013, 07 31). Funciones hash. Retrieved from https://www.ibm.com/support/ knowledgecenter/es/SSULQD_7.1.0/com.ibm.nz.sqltk.doc/c_sqlext_hashing.html | spa |
dc.relation.references | INCIBE. (2019, 10 07). ¿Sabías que existen distintos tipos de cifrado para proteger la privacidad de nuestra información en Internet? Retrieved from https://www.incibe. es/ciudadania/blog/sabias-que-existen-distintos-tipos-de-cifrado-para-proteger- la-privacidad | spa |
dc.relation.references | INCIBE. (2025). Copias de seguridad. Retrieved from https://www.incibe.es/ciudadania/ tematicas/copias-seguridad | spa |
dc.relation.references | Irsyad R. F., Anandha, Rr, Diajeng A., D’Layla, A. W., Chanda, De La Croix N., Jean, A. T.. (2024). Image Steganography using Customized Differences between the Neighboring Pixels. 2024 7th International Conference on Informatics and Computational Sciences (ICICoS), 496-501. | spa |
dc.relation.references | Jhaveri, P. (2012). Dos attacks in mobile ad hoc networks:. Proceedings of the 2012 2nd International Conference on. IEEE Computer, 535–541. | spa |
dc.relation.references | Jianping, Z., & Hongmin, L. (2017). Research and Implementation of a Data Backup and Recovery System for Important Business Areas. 2017 9th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC), 432-437. | spa |
dc.relation.references | Jin, D., & Wang, Q. (2021). CDP Backup and Recovery Method for Ensuring Database Consistency. 2021 IEEE International Conference on Power Electronics, Computer Applications (ICPECA), 722-728. | spa |
dc.relation.references | Juniper Networks. (2025). Juniper Networks. Retrieved from We make every connection count.: https://www.juniper.net/ | spa |
dc.relation.references | Junliang, Z., Dingyi, F., & Li, L. (2019). 2009 Second International Workshop on Knowledge Discovery and Data Mining. Intelligent Content Filtering Model for Network Security Audit System, 546-548. | spa |
dc.relation.references | Kaspersky. (2014). Qué Es Un Hash Y Cómo Funciona. Retrieved from https://latam.kaspersky. com/blog/que-es-un-hash-y-como-funciona/2806/ | spa |
dc.relation.references | KOHUR Jasleen, D. V. (2004). Steganography Techniques. International Journal of Emerging Research in Management and Technology ISSN 2278-9359, 5. | spa |
dc.relation.references | Liu et al. (2025). Institution Attribute Mining Technology for Access Control Based on Hybrid Capsule Network. Computers, Materials and Continua, 1471-1489. | spa |
dc.relation.references | Majeed, M., Sulaiman, R., Shukur, Z., Hasan, M., ., ., &. (2021). A Review on Text Steganography Techniques. Mathematics Journal, 1-28. | spa |
dc.relation.references | Mohammed, G., Manisha, N., & VembuSelvi, C. (2019). 2019 International Conference on Advances in Computing, Communication and Control (ICAC3). Data Leakage Prevention for Data in Transit using Artificial Intelligence and Encryption Techniques. | spa |
dc.relation.references | Mora, D., C. S., Castro H., O. P., & Chavarro F., A. C. (2019). SANI: Assistant for Information Security Auditing on ISO/IEC 27001. Dialnet, 324-333. | spa |
dc.relation.references | NIST. (2018, 01 31). Hash Functions. Retrieved from https://csrc.nist.gov/Projects/ Hash-Functions | spa |
dc.relation.references | NIST. (2018, 01 31). Hash Functions. Retrieved from https://csrc.nist.gov/Projects/ Hash-Functions | spa |
dc.relation.references | NIST. (2018, 09 15). List of current FIPS publications. Retrieved from https://www.ietf. org/rfc/rfc3174.txt | spa |
dc.relation.references | Om et al. (2023). Cloud-Based Data Protection and Secure Backup Solutions: A Comprehensive Review of Ensuring Business Continuity. 2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC), 821-826. | spa |
dc.relation.references | Paloalto. (2025). Paloalto Networks has been named a leader in enterprise firewalls. Retrieved from https://www.paloaltonetworks.com/network-security/next-generation- firewall | spa |
dc.relation.references | Phat T., Minh Q. P, Ha X. S., Dat L.T., Minh B., Khiem L. T., Loc C.P., Kiet T. L. f, Khanh H. V., Ngan N.T., Triet M. N., Anh T.. (2025). A systematic review of multi-factor authentication in digital payment systems: NIST standards alignment and industry implementation analysis. Journal of Systems Architecture, 103402. | spa |
dc.relation.references | Rajeshwaran, K., & Anil, K. K. (2019). Cellular Automata Based Hashing Algorithm (CABHA) for Strong Cryptographic Hash Function. 2019 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT). | spa |
dc.relation.references | SARANGPURE V, T. R. (2014). Audio-Video Steganography Using. International Journal of Research (IJR) Volume 1 ISSN 2348-6848., 9. | spa |
dc.relation.references | SenthilKumar, P., & Muthukumar, M. (2018). A Study on Firewall System, Scheduling and Routing using pfsense Scheme. 2018 International Conference on Intelligent Computing and Communication for Smart World (I2C2SW), 14-17. | spa |
dc.relation.references | Shashi, R., Pavithra, G., & Manjunath, T. C. (2022). Developing a novel steganography concept of audio data into audio streams. 2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT), 229-233. | spa |
dc.relation.references | Sheketa V., Pasieka M., Serman T., and Pasieka N., and Chupakhina S., and Krul L.. (2021). 2021 IEEE 16th International Conference on Computer Sciences and Information Technologies (CSIT). System Analysis and Example of Using SHA-512 Hash Functions to Protect Students' Personal Data on Educational Platforms, 132-136. | spa |
dc.relation.references | SONICWALL. (2025). Cortafuegos de seguridad de red. Retrieved from https://www.sonicwall. com/products/firewalls | spa |
dc.relation.references | Stefan Katzenbeisser, F. P. (2000). Information Hiding Techniques for Steganography and Digital. London: Artech house, inc. | spa |
dc.relation.references | Usha N. C., Suad S., Noven G. R., Erik Z., Minnie M., Lemuel C. V.. (2024). Access control solutions in electronic health record systems: A systematic review. Informatics in Medicine Unlocked, 101552. | spa |
dc.relation.references | Wafaa, A., & Abdelkader, O. (2017). The importance of human dynamics in the future user authentication. 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE), 1-5. | spa |
dc.relation.references | Lin, Yanhong, Huang Shiguo, Hong, Minglin, Chen, Shiting, Li Xiaolin, Lin, Dakun. (2019). MD5 Encryption Algorithm Enhanced Competitive Swarm Optimizer for Feature Selection. 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom. | spa |
dc.relation.references | Zhiqing, S., Yan, L., & Weiyan, Z. (2019). Research on the Development Trend and Auditing Mode of High Security Enterprise Intranet Security Audit. 2019 IEEE 11th International Conference on Advanced Infocomm Technology (ICAIT), 153-156. | spa |
dc.subject.spines | Criptografía | |
dc.subject.spines | Protección de datos | |
dc.subject.spines | Codificación | |
dc.type.coarversion | http://purl.org/coar/version/c_ab4af688f83e57aa | spa |
dc.type.content | Text | spa |
dc.rights.coar | http://purl.org/coar/access_right/c_abf2 | spa |
dc.identifier.eisbn | 978-628-97163-1-3 | spa |
Ficheros en el ítem
Este ítem aparece en la(s) siguiente(s) colección(ones)
-
FA. Cuadernos ETITC [38]