SciELO - Scientific Electronic Library Online

 
vol.11 issue1Mollusks of agricultural importance in Cienfuegos, CubaAnalysis of commercialization channels that influence in the catch of the red crab (Ucides Occidentalis) of the “6 de julio" crabbers association in the Gulf of Guayaquil author indexsubject indexarticles search
Home Pagealphabetic serial listing  

Services on Demand

Article

Indicators

  • Have no cited articlesCited by SciELO

Related links

  • Have no similar articlesSimilars in SciELO

Share


Revista Universidad y Sociedad

On-line version ISSN 2218-3620

Abstract

TORO FLORES, Yury A. et al. Communications management system to assess security risks. Universidad y Sociedad [online]. 2019, vol.11, n.1, pp. 86-92.  Epub Mar 02, 2019. ISSN 2218-3620.

In recent years, the security problems in networks or cyber attacks are increasing exponentially in the role as theft of confidential information and trade secrets, as well as is affected the performance of some organizations by overuse of social network part of their workers. The purpose of this document is to provide a system that integrates solutions such as Suricata IDS (intrusion detection system) to detect various type attacks in real time and to take actions on them, as well as keeping the traffic generated to evaluate each time that the signatures of the IDS are updated and able to measure the impact on the organization for a certain time, this solution generates a set of logs (activity log system), which will be stored for statistical purposes, for this investigation will be used security methodology according to Benson (2001), which will detail each of its phases to mitigate risks. In the results you can see the analysis of logs generated by Suricata IDS, a summary of pictures with traffic generated in the organization over a given time period and a summary of the attacks were prosecuted or found in quarantine, waiting to be analyzed. In conclusión, it is obtained that is helpful storage traffic generated to assess security risks every time a new security flaw is discovered to establish security control and reduce the attack surface and exposure, as well as the presentation of results to the user in an understandable for help in making decisions on security policies implemented.

Keywords : Intrusion detection system; Security control; Logs; Attack Surface.

        · abstract in Spanish     · text in Spanish     · Spanish ( pdf )