Análisis de la distribución Kali Linux, su aplicación en la configuración de un sistema detector de intrusiones y la validación del sistema en la red de datos de la sede sur de Quito de la Universidad Politécnica Salesiana

This work highlights the importance of information security in organizations and the actions that have been developed in favor of keeping the information on the characteristics of reliability, integrity and availability, among these actions is creating Response Teams CSIRT Computer Security Incident...

Descripción completa

Autor Principal: Narváez Portillo, María Elizabeth
Formato: bachelorThesis
Idioma: spa
Publicado: 2015
Materias:
Acceso en línea: http://dspace.ups.edu.ec/handle/123456789/10179
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
Sumario: This work highlights the importance of information security in organizations and the actions that have been developed in favor of keeping the information on the characteristics of reliability, integrity and availability, among these actions is creating Response Teams CSIRT Computer Security Incident management oriented Information Security in Organizations, among its services proactive intrusion detection service is. These activities are conducted by supporting applications that contain specialized software tools, one of which is the Kali Linux distribution and analysis tools are the subject of major study, later defined the context and methodology for testing tools in the network, looking for open ports, services and vulnerabilities, as next activity to determine the severity of vulnerabilities found and these data to develop a descriptive table of vulnerabilities, severity and consequences arise. Finally an alternative HIDS (Intrusion Detection System based on Host) is raised by setting the tool in Snort Kali Linux distribution.