Mostrar el registro sencillo del ítem

dc.contributor.authorHernández Bejarano, Miguel
dc.contributor.authorBaquero Rey, Luis Eduardo
dc.contributor.authorRivera Lozano, Miller
dc.date.accessioned2025-10-03T17:41:22Z
dc.date.available2025-10-03T17:41:22Z
dc.date.issued2025-06
dc.identifier.urihttps://hdl.handle.net/20.500.14329/1587
dc.description.abstractLas estrategias de protección de datos son fundamentales para resguardar los recursos digitales de una organización, garantizando la confidencialidad, integridad y disponibilidad de los datos. Herramientas como la autenticación multifactor y la encriptación de datos son fundamentales para evitar accesos no autorizados y proteger la privacidad de los usuarios, creando un entorno seguro para las operaciones empresariales.spa
dc.description.tableofcontents1. Introducción -- 2. Criptografía -- 2.1 Funciones HASH -- 2.2 Algoritmo de resumen del mensaje 5 -- 2.3 El SHA -- 2.4 Tiger 1283 -- 2.5 Esteganografía -- 3. Control de acceso -- 3.1 Autenticación -- 3.2 Autorización -- 4. Copias de seguridad y recuperación -- 5. Firewall -- 6. Monitoreo y auditoría de seguridad -- 7. Actividades -- 7.1 Realizar una consulta -- 7.2 Realizar una consulta -- 7.3 Realizar una consulta -- Referenciasspa
dc.format.extent24 páginasspa
dc.format.mimetypeapplication/pdfspa
dc.language.isospaspa
dc.publisherEscuela Tecnológica Instituto Técnico Centralspa
dc.rights.urihttps://creativecommons.org/licenses/by-nc-sa/4.0/spa
dc.subject.otherFirewalls (computing)
dc.titleMecanismo para la protección de la informaciónspa
dc.typeLibrospa
dc.rights.licenseAtribución-NoComercial-CompartirIgual 4.0 Internacional (CC BY-NC-SA 4.0)spa
dc.rights.accessrightsinfo:eu-repo/semantics/closedAccessspa
dc.type.coarhttp://purl.org/coar/resource_type/c_2f33spa
dc.type.driverinfo:eu-repo/semantics/bookspa
dc.type.versioninfo:eu-repo/semantics/acceptedVersionspa
dc.publisher.placeBogotá D.Cspa
dc.relation.referencesAbualkas, Y., & Lalitha, B. (2023). Secure Authentication and Authorization with MAC Address and Cryptography-Based Multi-Factor Algorithm. 2023 Second International Conference on Informatics (ICI), 1-5.spa
dc.relation.referencesAllami et al. (2025). Oblivious and distributed firewall policies for securing firewalls from malicious attacks. Computers & Security, 104201.spa
dc.relation.referencesAmbedkar, B. R., Bharti, P. K., & Husain, A. (2022). Enhancing the Performance of Hash Function Using Autonomous Initial Value Proposed Secure Hash Algorithm 256. 2022 IEEE 11th International Conference on Communication Systems and Network Technologies (CSNT), 560-565.spa
dc.relation.referencesAtul, K., & Kalpna, G. (2024). Leveraging Machine Learning Algorithms for Threat Detection Using AI-Enhanced Cybersecurity Datasets. 2024 4th International Conference on Technological Advancements in Computational Sciences (ICTACS), 483-488.spa
dc.relation.referencesBarracuda. (2025). Barracuda CloudGen Firewall. Retrieved from Get protection that goes beyond next-generation firewalls: https://www.barracuda.com/products/network- protection/cloudgen-firewallspa
dc.relation.referencesBiham, R. A. (2017). Tiger: A Fast New Hash Function Fast Software Encryption 3. Cambridge.spa
dc.relation.referencesCaballero, G. P. (2002). Introducción a la Criptografía. Madrid: RA-MA.spa
dc.relation.referencesCHEKC POINT. (2025). Next Generation Firewalls. Retrieved from AI-Powered Security puerta de enlace: https://www.checkpoint.com/es/quantum/next-generation-firewall/spa
dc.relation.referencesCISCO. (2025). Cortafuegos. Retrieved from Cortafuegos seguro de Cisco ASA: https:// www.cisco.com/c/en/us/products/security/adaptive-security-appliance-asa-software/ index.htmlspa
dc.relation.referencesCriptografía. (2012). Galende Díaz Juan Carlos. Madrid: Complutense.spa
dc.relation.referencesDarío, V. M. (2016). Cordoba: Universidad Nacional de Córdoba.spa
dc.relation.referencesDONGEE. (2025). La más avanzada seguridad para tu negocio. Retrieved from Cortafuegos empresarial Dongee: https://www.dongee.com/imunify360/spa
dc.relation.referencesDONGEE. (2025). Tutoriales Web. Retrieved from Cómo elegir un firewall para mi empresa: https://www.dongee.com/tutoriales/los-10-mejores-firewalls-para-tu-negocio- o-emprendimiento-digital/spa
dc.relation.referencesFeng et al. (2024). Security Risk Assessment System for Power Monitoring Systems Based on Zero Trust Architecture. 2024 4th International Conference on Computer Science, Electronic Information Engineering and Intelligent Control Technology (CEI), 2015-218.spa
dc.relation.referencesFortinet. (2025). Seguridad inigualable, rendimiento sin precedentes. Retrieved from Cortafuegos de próxima generación (NGFW): https://www.fortinet.com/products/ next-generation-firewallspa
dc.relation.referencesGupta, D., & Kumar, R. (2021). Sponge based Lightweight Cryptographic Hash Functions for IoT Applications. {2021 International Conference on Intelligent Technologies (CONIT, 1-5.spa
dc.relation.referencesHarshita K., Arora H., Joshi R., Sharma K., Mehra M., Sharma P. K,. (2025). Digital Image Security using Hybrid Model of Steganography and Cryptography. 2025 International Conference on Electronics and Renewable Systems (ICEARS), 1009-1012.spa
dc.relation.referencesIBM. (2013, 07 31). Funciones hash. Retrieved from https://www.ibm.com/support/ knowledgecenter/es/SSULQD_7.1.0/com.ibm.nz.sqltk.doc/c_sqlext_hashing.htmlspa
dc.relation.referencesINCIBE. (2019, 10 07). ¿Sabías que existen distintos tipos de cifrado para proteger la privacidad de nuestra información en Internet? Retrieved from https://www.incibe. es/ciudadania/blog/sabias-que-existen-distintos-tipos-de-cifrado-para-proteger- la-privacidadspa
dc.relation.referencesINCIBE. (2025). Copias de seguridad. Retrieved from https://www.incibe.es/ciudadania/ tematicas/copias-seguridadspa
dc.relation.referencesIrsyad R. F., Anandha, Rr, Diajeng A., D’Layla, A. W., Chanda, De La Croix N., Jean, A. T.. (2024). Image Steganography using Customized Differences between the Neighboring Pixels. 2024 7th International Conference on Informatics and Computational Sciences (ICICoS), 496-501.spa
dc.relation.referencesJhaveri, P. (2012). Dos attacks in mobile ad hoc networks:. Proceedings of the 2012 2nd International Conference on. IEEE Computer, 535–541.spa
dc.relation.referencesJianping, Z., & Hongmin, L. (2017). Research and Implementation of a Data Backup and Recovery System for Important Business Areas. 2017 9th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC), 432-437.spa
dc.relation.referencesJin, D., & Wang, Q. (2021). CDP Backup and Recovery Method for Ensuring Database Consistency. 2021 IEEE International Conference on Power Electronics, Computer Applications (ICPECA), 722-728.spa
dc.relation.referencesJuniper Networks. (2025). Juniper Networks. Retrieved from We make every connection count.: https://www.juniper.net/spa
dc.relation.referencesJunliang, Z., Dingyi, F., & Li, L. (2019). 2009 Second International Workshop on Knowledge Discovery and Data Mining. Intelligent Content Filtering Model for Network Security Audit System, 546-548.spa
dc.relation.referencesKaspersky. (2014). Qué Es Un Hash Y Cómo Funciona. Retrieved from https://latam.kaspersky. com/blog/que-es-un-hash-y-como-funciona/2806/spa
dc.relation.referencesKOHUR Jasleen, D. V. (2004). Steganography Techniques. International Journal of Emerging Research in Management and Technology ISSN 2278-9359, 5.spa
dc.relation.referencesLiu et al. (2025). Institution Attribute Mining Technology for Access Control Based on Hybrid Capsule Network. Computers, Materials and Continua, 1471-1489.spa
dc.relation.referencesMajeed, M., Sulaiman, R., Shukur, Z., Hasan, M., ., ., &. (2021). A Review on Text Steganography Techniques. Mathematics Journal, 1-28.spa
dc.relation.referencesMohammed, G., Manisha, N., & VembuSelvi, C. (2019). 2019 International Conference on Advances in Computing, Communication and Control (ICAC3). Data Leakage Prevention for Data in Transit using Artificial Intelligence and Encryption Techniques.spa
dc.relation.referencesMora, D., C. S., Castro H., O. P., & Chavarro F., A. C. (2019). SANI: Assistant for Information Security Auditing on ISO/IEC 27001. Dialnet, 324-333.spa
dc.relation.referencesNIST. (2018, 01 31). Hash Functions. Retrieved from https://csrc.nist.gov/Projects/ Hash-Functionsspa
dc.relation.referencesNIST. (2018, 01 31). Hash Functions. Retrieved from https://csrc.nist.gov/Projects/ Hash-Functionsspa
dc.relation.referencesNIST. (2018, 09 15). List of current FIPS publications. Retrieved from https://www.ietf. org/rfc/rfc3174.txtspa
dc.relation.referencesOm et al. (2023). Cloud-Based Data Protection and Secure Backup Solutions: A Comprehensive Review of Ensuring Business Continuity. 2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC), 821-826.spa
dc.relation.referencesPaloalto. (2025). Paloalto Networks has been named a leader in enterprise firewalls. Retrieved from https://www.paloaltonetworks.com/network-security/next-generation- firewallspa
dc.relation.referencesPhat T., Minh Q. P, Ha X. S., Dat L.T., Minh B., Khiem L. T., Loc C.P., Kiet T. L. f, Khanh H. V., Ngan N.T., Triet M. N., Anh T.. (2025). A systematic review of multi-factor authentication in digital payment systems: NIST standards alignment and industry implementation analysis. Journal of Systems Architecture, 103402.spa
dc.relation.referencesRajeshwaran, K., & Anil, K. K. (2019). Cellular Automata Based Hashing Algorithm (CABHA) for Strong Cryptographic Hash Function. 2019 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT).spa
dc.relation.referencesSARANGPURE V, T. R. (2014). Audio-Video Steganography Using. International Journal of Research (IJR) Volume 1 ISSN 2348-6848., 9.spa
dc.relation.referencesSenthilKumar, P., & Muthukumar, M. (2018). A Study on Firewall System, Scheduling and Routing using pfsense Scheme. 2018 International Conference on Intelligent Computing and Communication for Smart World (I2C2SW), 14-17.spa
dc.relation.referencesShashi, R., Pavithra, G., & Manjunath, T. C. (2022). Developing a novel steganography concept of audio data into audio streams. 2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT), 229-233.spa
dc.relation.referencesSheketa V., Pasieka M., Serman T., and Pasieka N., and Chupakhina S., and Krul L.. (2021). 2021 IEEE 16th International Conference on Computer Sciences and Information Technologies (CSIT). System Analysis and Example of Using SHA-512 Hash Functions to Protect Students' Personal Data on Educational Platforms, 132-136.spa
dc.relation.referencesSONICWALL. (2025). Cortafuegos de seguridad de red. Retrieved from https://www.sonicwall. com/products/firewallsspa
dc.relation.referencesStefan Katzenbeisser, F. P. (2000). Information Hiding Techniques for Steganography and Digital. London: Artech house, inc.spa
dc.relation.referencesUsha N. C., Suad S., Noven G. R., Erik Z., Minnie M., Lemuel C. V.. (2024). Access control solutions in electronic health record systems: A systematic review. Informatics in Medicine Unlocked, 101552.spa
dc.relation.referencesWafaa, A., & Abdelkader, O. (2017). The importance of human dynamics in the future user authentication. 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE), 1-5.spa
dc.relation.referencesLin, Yanhong, Huang Shiguo, Hong, Minglin, Chen, Shiting, Li Xiaolin, Lin, Dakun. (2019). MD5 Encryption Algorithm Enhanced Competitive Swarm Optimizer for Feature Selection. 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom.spa
dc.relation.referencesZhiqing, S., Yan, L., & Weiyan, Z. (2019). Research on the Development Trend and Auditing Mode of High Security Enterprise Intranet Security Audit. 2019 IEEE 11th International Conference on Advanced Infocomm Technology (ICAIT), 153-156.spa
dc.subject.spinesCriptografía
dc.subject.spinesProtección de datos
dc.subject.spinesCodificación
dc.type.coarversionhttp://purl.org/coar/version/c_ab4af688f83e57aaspa
dc.type.contentTextspa
dc.rights.coarhttp://purl.org/coar/access_right/c_abf2spa
dc.identifier.eisbn978-628-97163-1-3spa


Ficheros en el ítem

Sin portada

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem

https://creativecommons.org/licenses/by-nc-sa/4.0/
Excepto si se señala otra cosa, la licencia del ítem se describe como https://creativecommons.org/licenses/by-nc-sa/4.0/