SciELO - Scientific Electronic Library Online

 
vol.11 número1Moluscos de importancia agrícola en Cienfuegos, CubaAnálisis de los canales de comercialización que inciden en la captura del cangrejo rojo (Ucides Occidentalis) de la “Asociación de cangrejeros 6 de julio” del Golfo de Guayaquil índice de autoresíndice de assuntospesquisa de artigos
Home Pagelista alfabética de periódicos  

Serviços Personalizados

Artigo

Indicadores

  • Não possue artigos citadosCitado por SciELO

Links relacionados

  • Não possue artigos similaresSimilares em SciELO

Compartilhar


Revista Universidad y Sociedad

versão On-line ISSN 2218-3620

Resumo

TORO FLORES, Yury A. et al. Communications management system to assess security risks. Universidad y Sociedad [online]. 2019, vol.11, n.1, pp. 86-92.  Epub 02-Mar-2019. ISSN 2218-3620.

In recent years, the security problems in networks or cyber attacks are increasing exponentially in the role as theft of confidential information and trade secrets, as well as is affected the performance of some organizations by overuse of social network part of their workers. The purpose of this document is to provide a system that integrates solutions such as Suricata IDS (intrusion detection system) to detect various type attacks in real time and to take actions on them, as well as keeping the traffic generated to evaluate each time that the signatures of the IDS are updated and able to measure the impact on the organization for a certain time, this solution generates a set of logs (activity log system), which will be stored for statistical purposes, for this investigation will be used security methodology according to Benson (2001), which will detail each of its phases to mitigate risks. In the results you can see the analysis of logs generated by Suricata IDS, a summary of pictures with traffic generated in the organization over a given time period and a summary of the attacks were prosecuted or found in quarantine, waiting to be analyzed. In conclusión, it is obtained that is helpful storage traffic generated to assess security risks every time a new security flaw is discovered to establish security control and reduce the attack surface and exposure, as well as the presentation of results to the user in an understandable for help in making decisions on security policies implemented.

Palavras-chave : Intrusion detection system; Security control; Logs; Attack Surface.

        · resumo em Espanhol     · texto em Espanhol     · Espanhol ( pdf )