Repository logo
Communities & Collections
All of DSpace
  • English
  • العربية
  • বাংলা
  • Català
  • Čeština
  • Deutsch
  • Ελληνικά
  • Español
  • Suomi
  • Français
  • Gàidhlig
  • हिंदी
  • Magyar
  • Italiano
  • Қазақ
  • Latviešu
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Српски
  • Svenska
  • Türkçe
  • Yкраї́нська
  • Tiếng Việt
Log In
Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Velasco Trujillo, Marcelo David"

Filter results by typing the first few letters
Now showing 1 - 1 of 1
  • Results Per Page
  • Sort Options
  • No Thumbnail Available
    Item
    Análisis de riesgos informáticos aplicando la metodología OSSTMM para la Fundación Cultural y Educativa Ambato (Unidad Educativa Atenas)
    (Universidad Técnica de Ambato. Facultad de Ingeniería en Sistemas, Electrónica e Industrial. Carrera de Ingeniería en Sistemas Computacionales e Informáticos, 2020-10) Velasco Trujillo, Marcelo David; Guevara Aulestia, David Omar
    ABSTRACT The purpose of this degree project is to perform an analysis of computer risks by applying the OSTTMM methodology for the Ambato Cultural and Educational Foundation (Athens Education Unit), which aims to prevent the dissemination of information and detect possible vulnerabilities involved in a system computer science which are affected by challenges and attacks. The ignorance of the elements that can harm a computer system, can avoid giving the necessary importance to the computer security that must be taken into account when staff work directly with a computer or with the information it manages. As a result of the information obtained with the techniques used we could observe that the institution did not have a methodology that helps to detect vulnerabilities, in this way, through the study and the use of test methods and computer security analysis, it was determined that the OSSTMM methodology has phases and modules which make it possible to carry out this work, social engineering was also applied which is focused on violating the human factor, all this to determine the vulnerabilities exist and in this way to be able to carry out a plan of computer security which helps to reduce the risks encountered in a considerable way.

DSpace software copyright © 2002-2025 LYRASIS

  • Privacy policy
  • End User Agreement
  • Send Feedback
Repository logo COAR Notify