Network vulnerabilities and threats in an educational unit
DOI:
https://doi.org/10.35381/i.p.v5i1.2640Keywords:
Evaluation procedure, tool, computer network, information unit, computer, (UNESCO thesaurus)Abstract
The main objective was the determination of procedures that identify vulnerabilities and threats of the network in the institution. According to the purpose, the investigation was deductive because it justified the problem that is the insecurity of the network of the Educational Unit, focused on the identification of vulnerabilities and threats as a deduction of existence. With the Power BI tool, reports were made, obtaining as a result that the degree of vulnerability that the data network has in the workstations that compose it is medium level, this was a product of obsolete or outdated software; to prevent the contamination of computers with viruses, Trojans, which generate intrusions. In conclusion, with the measures taken; there is the academic information of the students that rests in the Educational Unit, being protected and delivered in a timely manner, without news for the required use, by request and personal process.
Downloads
References
Barafort, B., Mesquida , A., & Mas, A. (2016). Integrating Risk Management in IT settings from ISO Standards and Management Systems Perspectives. Computer Standards & Interfaces, 38-64. doi:http://dx.doi.org/10.1016/j.csi.2016.11.010
Bernardo, D. (2015). Clear and present danger: Interventive and retaliatory approaches to cyber threats. Applied Computing and Informatics, 11(2), 144-157. doi:https://doi.org/10.1016/j.aci.2014.11.002
Gonzalez, G., Dubus, S., Motzek, A., García, J., Alvarez, E., Merialdo, M., . . . Debar, H. (2018). Dynamic risk management response system to handle cyber threats. Future Generation Computer Systems, 83, 535-552. https://n9.cl/sh24a
Iovan, S., & Ramona, M. (2018). MALWARE FOR MOBILE DEVICES AND THEIR SECURITY. Fiabilitate şi Durabilitate, 267-272. https://n9.cl/pf0crg
Martinez, J., Martinez, O., Mud-Castelló, S., Mud-Castelló, F., & Moreno, L. (2015). Análisis de la calidad y seguridad de la información de aplicaciones móviles en prevención terciaria. [Analysis of the quality and security of the information of mobile applications in tertiary prevention]. Farmaceúticos Comunitarios, 7(4), 23-27. https://n9.cl/04nz3v
Mckinnel, T., Dargahi, T., Dehghantanha, A., & Choo, K.-K. (2019). A systematic literature review and meta-analysis on artificial intelligence in penetration testing and vulnerability assessment. Computers and Electrical Engineering, 75, 175-188. https://n9.cl/xedj9
Morte, R. (2017). ¿Protección de datos/privacidad en la época del Big Data, IoT, wearables…? Sí, más que nunca. [Data protection/privacy in the era of Big Data, IoT, wearables…? yes more than ever]. Dilemata, 219-233. https://n9.cl/6sdrm
Narayan, J., & Mehtre, B. (2015). Vulnerability Assessment & Penetration Testing as a Cyber Defence Technology. Procedia Computer Science 5, 57, 710-715. https://n9.cl/95p7t
Paluch, S., & Wünderlich, N. (2016). Contrasting risk perceptions of technology-based service innovations in inter-organizational settings. Journal of business research, 2424-2431. https://n9.cl/qjk23
Pîrnău, M. (2015). General Aspects of some Causes of Web Application Vulnerabilities. Memoirs of the Scientific Sections of the Romanian Academy, 55-66. https://n9.cl/ffniy
Revay, L. (2019). From Malware Testing to Virtualization. Procedia Computer Science, 150, 751-756. https://n9.cl/pf0crg
Santiso , H., Koller, J. M., & Bisaro, M. (2016). Seguridad en entornos de educación virtual. Memoria Investigaciones en Ingeniería, 14, 67-88. https://n9.cl/6cqfz
Vega, G., & Ramos, R. (2017). Vulnerabilidades y amenazas a los servicios web de la intranet de la Universidad Técnica de Babahoyo. [Vulnerabilities and threats to the web services of the intranet of the Technical University of Babahoyo]. 3c Tecnología, 6, 53-66. https://n9.cl/89ak2
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Jorge Andrés Silva-Terán, Ariel José Romero-Fernández, Ana Lucia Sandoval-Pillajo, Jorge Lenin Acosta-Espinoza

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
CC BY-NC-SA : Esta licencia permite a los reutilizadores distribuir, remezclar, adaptar y construir sobre el material en cualquier medio o formato solo con fines no comerciales, y solo siempre y cuando se dé la atribución al creador. Si remezcla, adapta o construye sobre el material, debe licenciar el material modificado bajo términos idénticos.
OAI-PMH URL: https://fundacionkoinonia.com.ve/ojs/index.php/ingeniumetpotentia/oai





