scholarly journals La seguridad de la información: Un oscuro espacio multidimensional

Author(s):  
Humberto Días Pando ◽  
Miguel Rodriguez Veliz ◽  
Yulier Nuñez Musa ◽  
Roberto Sepúlveda Lima

This paper presents the dimentions that defines the Information Security essentials from the authors pointof view and their experience on studying Cryptography, Steganography, controls for data integrity andexecutable components, reverse engineering attacks, information systems auditing and a set of researchingrelated with solving these problems. A critical focusing is applied for expressing the perception that aconsiderable portion of computer science community has about these dimentions. Some advances relatedwith software tamper resistance and code obfuscation techniques are discussed. El artículo presenta las dimensiones que definen los elementos esenciales de la Seguridad de la Informacióndesde el punto de vista de los autores y su experiencia en el estudio de la criptografía, la esteganografía, loscontroles de integridad de datos y componentes ejecutables, ataques de ingeniería inversa, la auditoría desistemas de información y un conjunto de investigaciones relacionadas con la solución de estos problemas.Se discute con enfoque crítico la percepción que sobre estas dimensiones exhibe una parte considerablede la comunidad relacionada con el desarrollo de soluciones informáticas y se enuncian algunos avancesen la obtención de software resistente a modificaciones y a la aplicación de técnicas de ofuscación decódigos.

Author(s):  
Ángel Pisco Gómez ◽  
Yanina Holanda Campozano Pilay ◽  
Jimmy Leonardo Gutiérrez García ◽  
Mario Javier Marcillo Merino ◽  
Robards Javier Lima Pisco

La investigación realizada presenta una perspectiva de Análisis de las principales técnicas de hacking para la Universidad Estatal del Sur de Manabí. Actualmente las universidades, organizaciones y compañías están expuestas  a numerosas amenazas  que violan sus sistemas informáticos, ya que esto pone en riesgo la integridad de la información. Un  hacker es  una persona con grandes conocimientos de informática que se dedica a acceder ilegalmente a sistemas informáticos ajenos y a manipularlos. Ya que uno de los métodos para lograr mitigar eficazmente los impactos provocados por un ataque informático, es precisamente tener conocimiento de la manera como estos atacan y conocer los posibles puntos débiles de un sistema comúnmente explotados y en los cuales se debe hacer especial énfasis al momento de concentrar los esfuerzos de seguridad propensos a la prevención de los mismos. La metodología que se utilizo fue la cualitativa la cual nos ayudó a describir de forma minuciosa los hechos, situaciones, comportamientos, interacciones que se observan mediante la investigación realizada. Ya que la información representa un papel muy importante dentro de las instituciones pues es la parte más primordial y día a día se encuentra expuesta a sufrir modificaciones y en muchos casos a ser hacheada  en su totalidad y es por eso importante asegurar la integridad de la  información. Por lo tanto, es necesario determinar que herramientas utilizar, y las técnicas fundamentales para probar la vulnerabilidad de los sistemas de información y de las redes instaladas. PALABRAS CLAVE: herramientas; información; seguridad; técnicas; vulnerabilidades. ANALYSIS OF THE MAIN HACKING TECHNIQUES FOR THE SOUTHERN MANABI STATE UNIVERSITY ABSTRACT The research carried out presents an analysis perspective of the main hacking techniques for the State University of the South of Manabí. Currently universities, organizations and companies are exposed to numerous threats that violate their computer systems, as this puts the integrity of the information at risk. A hacker is a person with great knowledge of computer science that is dedicated to illegally accessing foreign computer systems and manipulating them. The methodology that was used was the qualitative one which helped us to describe in a thorough way the facts, situations, behaviors, interactions that are observed through the research carried out. Since one of the methods to achieve effectively mitigate the impacts caused by a computer attack, is precisely to have knowledge of how they attack and know the possible weaknesses of a system commonly exploited and in which special emphasis should be made at the time to concentrate security efforts prone to the prevention of them. Since the information represents a very important role within the institutions because it is the most fundamental part and day to day is exposed to undergo modifications and in many cases to be hacked in its entirety and it is therefore important to ensure the integrity of the information . Therefore, it is necessary to determine which tools to use, and the fundamental techniques to test the vulnerability of the information systems and the installed networks. KEY WORDS: techniques; tools; vulnerabilities; information; security


Author(s):  
Вадим Георгиевич Ерышов ◽  
Никита Вадимович Ерышов

В статье проведен анализ актуальных угроз информационной безопасности информационных систем, возникших при переходе сотрудников организаций на удаленный режим работы. The article analyzes the current threats to information security of information systems that occurred when employees of organizations switch to remote mode of operation.


Examples of the value that can be created and captured through crowdsourcing go back to at least 1714, when the UK used crowdsourcing to solve the Longitude Problem, obtaining a solution that would enable the UK to become the dominant maritime force of its time. Today, Wikipedia uses crowds to provide entries for the world’s largest and free encyclopedia. Partly fueled by the value that can be created and captured through crowdsourcing, interest in researching the phenomenon has been remarkable. For example, the Best Paper Awards in 2012 for a record-setting three journals—the Academy of Management Review, Journal of Product Innovation Management, and Academy of Management Perspectives—were about crowdsourcing. In spite of the interest in crowdsourcing—or perhaps because of it—research on the phenomenon has been conducted in different research silos within the fields of management (from strategy to finance to operations to information systems), biology, communications, computer science, economics, political science, among others. In these silos, crowdsourcing takes names such as broadcast search, innovation tournaments, crowdfunding, community innovation, distributed innovation, collective intelligence, open source, crowdpower, and even open innovation. The book aims to assemble papers from as many of these silos as possible since the ultimate potential of crowdsourcing research is likely to be attained only by bridging them. The papers provide a systematic overview of the research on crowdsourcing from different fields based on a more encompassing definition of the concept, its difference for innovation, and its value for both the private and public sectors.


2018 ◽  
Vol 7 (1.9) ◽  
pp. 200
Author(s):  
T A.Mohanaprakash ◽  
J Andrews

Cloud computing is associate inclusive new approach on however computing services square measure made and utilized. Cloud computing is associate accomplishment of assorted styles of services that has attracted several users in today’s state of affairs. The foremost enticing service of cloud computing is information outsourcing, because of this the information homeowners will host any size of information on the cloud server and users will access the information from cloud server once needed. A dynamic outsourced auditing theme that cannot solely defend against any dishonest entity and collision, however conjointly support verifiable dynamic updates to outsourced information. The new epitome of information outsourcing conjointly faces the new security challenges. However, users might not totally trust the cloud service suppliers (CSPs) as a result of typically they may be dishonest. It's tough to work out whether or not the CSPs meet the customer’s expectations for information security. Therefore, to with success maintain the integrity of cloud information, several auditing schemes are projected. Some existing integrity ways will solely serve for statically archived information and a few auditing techniques is used for the dynamically updated information. The analyzed numerous existing information integrity auditing schemes together with their consequences.


1997 ◽  
Vol 25 (4) ◽  
pp. 38-47 ◽  
Author(s):  
Mary J. Granger ◽  
Elizabeth S. Adams ◽  
Christina Björkman ◽  
Don Gotterbarn ◽  
Diana D. Juettner ◽  
...  

2018 ◽  
Vol 7 (4.38) ◽  
pp. 82
Author(s):  
Aleksey Valentinovich Bogdanov ◽  
Igor Gennadievich Malygin

The paper considers the conceptual provisions of building a promising cognitive information security system of the museum complex on a cyber-physical basis. The stratified model of cognitive information security system of the museum complex was presented. It was shown that the key technological platform for the security of the museum complex is information and network technologies integrated (converged) with the technologies of industrial artificial intelligence. The generalized structural scheme of the cognitive cycle of the information security system of the museum complex was considered. The characteristic of the basic processes realized in a cognitive contour was given.   


2014 ◽  
Vol 701-702 ◽  
pp. 919-922
Author(s):  
Hong Fei Xu ◽  
Si Rui Pang ◽  
Jian Wen Du ◽  
Xue Mei Li

A system includes three power information security defense line is constructed, to achieve the information network, information outside the network, scheduling data network depth protection. According to the information security protection requirements, starting from the overall structure of information systems, taking into account the information system to schedule production system as the core, based on independent research and development of core information security isolation unit, set up three lines of defense in the power of information systems, electricity secondary system, information network systems, information systems outside the network partition protection.


Sign in / Sign up

Export Citation Format

Share Document