Full Text

Turn on search term navigation

© 2020. This work is published under https://creativecommons.org/licenses/by-nc-nd/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.

Abstract

Palabras-clave: seguridad, sistema, implementación, perimetral, virtual Abstract: This paper presents the implementation of a perimeter security system, maintaining the integrity, confidentiality and availability of information, protecting the systems from internal and external threats. The importance of information security, at a time when the worldwide trend in threats continues to grow and information is exposed to any entity that has sufficient resources to access it, in this context, for implementation was proposed to make a technological renewal with virtualized equipment that can expand capacity when necessary and maintain its effectiveness in controlling threats. The implemented teams apply policies in real time, working with URL filtering modules, IPS, antimalware, antivirus, sandboxing and application control, obtaining as a result an effective protection to the entire technological platform of the institution. De este modo se asegura la confidencialidad e integridad de los datos, analizando sistemas criptográficos, tratando aspectos de los certificados digitales y analizando los distintos usos del cifrado de datos, como SSH, IPSec, VPN-SSL y más.

Details

Title
Implementación de un sistema de seguridad perimetral como estrategia de seguridad de la información
Author
Morales, Flavio 1 ; Toapanta, Sergio 1 ; Toasa, Renato M 1 

 Universidad Tecnológica Israel, Quito, Ecuador 
Pages
553-565
Publication year
2020
Publication date
Mar 2020
Publisher
Associação Ibérica de Sistemas e Tecnologias de Informacao
ISSN
16469895
Source type
Scholarly Journal
Language of publication
Spanish
ProQuest document ID
2385756526
Copyright
© 2020. This work is published under https://creativecommons.org/licenses/by-nc-nd/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.