SciELO - Scientific Electronic Library Online

 
vol.11 número1Moluscos de importancia agrícola en Cienfuegos, CubaAnálisis de los canales de comercialización que inciden en la captura del cangrejo rojo (Ucides Occidentalis) de la “Asociación de cangrejeros 6 de julio” del Golfo de Guayaquil índice de autoresíndice de materiabúsqueda de artículos
Home Pagelista alfabética de revistas  

Servicios Personalizados

Revista

Articulo

Indicadores

  • No hay articulos citadosCitado por SciELO

Links relacionados

  • No hay articulos similaresSimilares en SciELO

Compartir


Revista Universidad y Sociedad

versión On-line ISSN 2218-3620

Resumen

TORO FLORES, Yury A. et al. Communications management system to assess security risks. Universidad y Sociedad [online]. 2019, vol.11, n.1, pp.86-92.  Epub 02-Mar-2019. ISSN 2218-3620.

In recent years, the security problems in networks or cyber attacks are increasing exponentially in the role as theft of confidential information and trade secrets, as well as is affected the performance of some organizations by overuse of social network part of their workers. The purpose of this document is to provide a system that integrates solutions such as Suricata IDS (intrusion detection system) to detect various type attacks in real time and to take actions on them, as well as keeping the traffic generated to evaluate each time that the signatures of the IDS are updated and able to measure the impact on the organization for a certain time, this solution generates a set of logs (activity log system), which will be stored for statistical purposes, for this investigation will be used security methodology according to Benson (2001), which will detail each of its phases to mitigate risks. In the results you can see the analysis of logs generated by Suricata IDS, a summary of pictures with traffic generated in the organization over a given time period and a summary of the attacks were prosecuted or found in quarantine, waiting to be analyzed. In conclusión, it is obtained that is helpful storage traffic generated to assess security risks every time a new security flaw is discovered to establish security control and reduce the attack surface and exposure, as well as the presentation of results to the user in an understandable for help in making decisions on security policies implemented.

Palabras clave : Intrusion detection system; Security control; Logs; Attack Surface.

        · resumen en Español     · texto en Español     · Español ( pdf )