Network vulnerabilities and threats in an educational unit

Authors

DOI:

https://doi.org/10.35381/i.p.v5i1.2640

Keywords:

Evaluation procedure, tool, computer network, information unit, computer, (UNESCO thesaurus)

Abstract

The main objective was the determination of procedures that identify vulnerabilities and threats of the network in the institution. According to the purpose, the investigation was deductive because it justified the problem that is the insecurity of the network of the Educational Unit, focused on the identification of vulnerabilities and threats as a deduction of existence. With the Power BI tool, reports were made, obtaining as a result that the degree of vulnerability that the data network has in the workstations that compose it is medium level, this was a product of obsolete or outdated software; to prevent the contamination of computers with viruses, Trojans, which generate intrusions. In conclusion, with the measures taken; there is the academic information of the students that rests in the Educational Unit, being protected and delivered in a timely manner, without news for the required use, by request and personal process.

Downloads

Download data is not yet available.

References

Barafort, B., Mesquida , A., & Mas, A. (2016). Integrating Risk Management in IT settings from ISO Standards and Management Systems Perspectives. Computer Standards & Interfaces, 38-64. doi:http://dx.doi.org/10.1016/j.csi.2016.11.010

Bernardo, D. (2015). Clear and present danger: Interventive and retaliatory approaches to cyber threats. Applied Computing and Informatics, 11(2), 144-157. doi:https://doi.org/10.1016/j.aci.2014.11.002

Gonzalez, G., Dubus, S., Motzek, A., García, J., Alvarez, E., Merialdo, M., . . . Debar, H. (2018). Dynamic risk management response system to handle cyber threats. Future Generation Computer Systems, 83, 535-552. https://n9.cl/sh24a

Iovan, S., & Ramona, M. (2018). MALWARE FOR MOBILE DEVICES AND THEIR SECURITY. Fiabilitate şi Durabilitate, 267-272. https://n9.cl/pf0crg

Martinez, J., Martinez, O., Mud-Castelló, S., Mud-Castelló, F., & Moreno, L. (2015). Análisis de la calidad y seguridad de la información de aplicaciones móviles en prevención terciaria. [Analysis of the quality and security of the information of mobile applications in tertiary prevention]. Farmaceúticos Comunitarios, 7(4), 23-27. https://n9.cl/04nz3v

Mckinnel, T., Dargahi, T., Dehghantanha, A., & Choo, K.-K. (2019). A systematic literature review and meta-analysis on artificial intelligence in penetration testing and vulnerability assessment. Computers and Electrical Engineering, 75, 175-188. https://n9.cl/xedj9

Morte, R. (2017). ¿Protección de datos/privacidad en la época del Big Data, IoT, wearables…? Sí, más que nunca. [Data protection/privacy in the era of Big Data, IoT, wearables…? yes more than ever]. Dilemata, 219-233. https://n9.cl/6sdrm

Narayan, J., & Mehtre, B. (2015). Vulnerability Assessment & Penetration Testing as a Cyber Defence Technology. Procedia Computer Science 5, 57, 710-715. https://n9.cl/95p7t

Paluch, S., & Wünderlich, N. (2016). Contrasting risk perceptions of technology-based service innovations in inter-organizational settings. Journal of business research, 2424-2431. https://n9.cl/qjk23

Pîrnău, M. (2015). General Aspects of some Causes of Web Application Vulnerabilities. Memoirs of the Scientific Sections of the Romanian Academy, 55-66. https://n9.cl/ffniy

Revay, L. (2019). From Malware Testing to Virtualization. Procedia Computer Science, 150, 751-756. https://n9.cl/pf0crg

Santiso , H., Koller, J. M., & Bisaro, M. (2016). Seguridad en entornos de educación virtual. Memoria Investigaciones en Ingeniería, 14, 67-88. https://n9.cl/6cqfz

Vega, G., & Ramos, R. (2017). Vulnerabilidades y amenazas a los servicios web de la intranet de la Universidad Técnica de Babahoyo. [Vulnerabilities and threats to the web services of the intranet of the Technical University of Babahoyo]. 3c Tecnología, 6, 53-66. https://n9.cl/89ak2

Published

2023-05-01

How to Cite

Silva-Terán, J. A., Romero-Fernández, A. J., Sandoval-Pillajo, A. L., & Acosta-Espinoza, J. L. (2023). Network vulnerabilities and threats in an educational unit. Ingenium Et Potentia, 5(1), 133–148. https://doi.org/10.35381/i.p.v5i1.2640

Issue

Section

De Investigación

Most read articles by the same author(s)

1 2 3 4 5 6 7 8 9 10 > >>