Examinando por Materia "Vulnerabilities"
Mostrando 1 - 2 de 2
Resultados por página
Opciones de clasificación
- PublicaciónAcceso abiertoExplotando vulnerabilidades en el protocolo MODBUS TCP/IP(2016) Nava Muñoz, Carlos Davensor; Santander Peláez, Manuel HumbertoThis document is an experimental and bibliographic recompilation about SCADA systems, where the Modbus protocol is often used controlling public services systems and critical infrastructures. SCADA systems are specially designed to run on computers in production control, providing communication with field devices (autonomous controllers, PLCs, etc.) and controlling the process automatically from a computer. (Pérez, 2014) This software is designed for internal use by companies and researchers within the organization being not generic enough to be used in any type of architecture, protocol or system (Queiroz, Mahmood, & Tari, 2011), Inside the protocol communications there are automatic instruments that measures and control all actions on the action field, but the HMI is a necessary thing to have when taking full control of a process is mandatory, or to execute an action. These systems are highly critical which makes different malicious users find attractive to exploit the vulnerabilities of these systems, this in order to prove themselves or economic purposes. These vulnerabilities are basic in nature, allowing anyone with an average level of knowledge exploit it, making the risk and the attack probability much greater. Grupo de Investigación: Modelamiento y Simulación Computacional. -- Área: seguridad informática. -- Tema: sistemas SCADA.
- PublicaciónAcceso abiertoImplementación de sistema de gestión de la seguridad de la información para el aseguramiento del proceso de ingreso de notas en un portal web universitario(2021) Chaverra Barco, Jilmar; Arboleda Suaza, Carlos AndresEl This report was developed in order to offer a significant contribution on how to carry out the development and implementation of a digital computer security protocol, oriented towards the vulnerable web servers of the Technological University of Chocó, allowing the detection of possible risks, threats or vulnerabilities that are usually found daily in these portals. Thus, through a contingency plan based on an information security management system, it seeks to solve a problem that affects an entire institution, from the administrative part to the student body and faculty. This support plan had an investigative method based on the ISO-27001 Standard, which seeks to guarantee the confidentiality, integrity and availability of the information stored by this university institution.