1 | \BOOKMARK [-1][-]{part.1}{I Seguridad en las TIC y la Identidad Digital. Fundamentos}{}% 1 |
---|
2 | \BOOKMARK [0][-]{chapter.1}{Bases de la identidad digital}{part.1}% 2 |
---|
3 | \BOOKMARK [1][-]{section.1.1}{Conceptos b\341sicos}{chapter.1}% 3 |
---|
4 | \BOOKMARK [1][-]{section.1.2}{Implicaciones}{chapter.1}% 4 |
---|
5 | \BOOKMARK [1][-]{section.1.3}{Identificaci\363n, autenticaci\363n}{chapter.1}% 5 |
---|
6 | \BOOKMARK [2][-]{subsection.1.3.1}{T\351cnicas de identificaci\363n y autenticaci\363n}{section.1.3}% 6 |
---|
7 | \BOOKMARK [0][-]{chapter.2}{Pol\355ticas de Seguridad}{part.1}% 7 |
---|
8 | \BOOKMARK [1][-]{section.2.1}{Pol\355ticas de seguridad de la informaci\363n. Importancia.}{chapter.2}% 8 |
---|
9 | \BOOKMARK [1][-]{section.2.2}{Puestos de trabajo, centros de datos, seguridad l\363gica y f\355sica}{chapter.2}% 9 |
---|
10 | \BOOKMARK [1][-]{section.2.3}{Pol\355ticas de Seguridad de La Informaci\363n}{chapter.2}% 10 |
---|
11 | \BOOKMARK [1][-]{section.2.4}{Importancia de la Seguridad de la Informaci\363n}{chapter.2}% 11 |
---|
12 | \BOOKMARK [1][-]{section.2.5}{Seguridad de la Informaci\363n para Software Libre}{chapter.2}% 12 |
---|
13 | \BOOKMARK [1][-]{section.2.6}{Principio de Defensa en profundidad}{chapter.2}% 13 |
---|
14 | \BOOKMARK [2][-]{subsection.2.6.1}{Los principios generales de la defensa en profundidad}{section.2.6}% 14 |
---|
15 | \BOOKMARK [1][-]{section.2.7}{Responsabilidad}{chapter.2}% 15 |
---|
16 | \BOOKMARK [1][-]{section.2.8}{Procesos para aumentar la percepci\363n de seguridad de la informaci\363n}{chapter.2}% 16 |
---|
17 | \BOOKMARK [2][-]{subsection.2.8.1}{Identificaci\363n de los riesgos}{section.2.8}% 17 |
---|
18 | \BOOKMARK [2][-]{subsection.2.8.2}{Evaluaci\363n de los riesgos de seguridad}{section.2.8}% 18 |
---|
19 | \BOOKMARK [2][-]{subsection.2.8.3}{Selecci\363n de los controles}{section.2.8}% 19 |
---|
20 | \BOOKMARK [2][-]{subsection.2.8.4}{Implementar los controles seleccionados}{section.2.8}% 20 |
---|
21 | \BOOKMARK [2][-]{subsection.2.8.5}{Monitorear y mejorar los controles de seguridad}{section.2.8}% 21 |
---|
22 | \BOOKMARK [1][-]{section.2.9}{Grupo de seguridad de la informaci\363n}{chapter.2}% 22 |
---|
23 | \BOOKMARK [1][-]{section.2.10}{Gesti\363n de Contrase\361as}{chapter.2}% 23 |
---|
24 | \BOOKMARK [2][-]{subsection.2.10.1}{Claves con menos de ocho d\355gitos}{section.2.10}% 24 |
---|
25 | \BOOKMARK [1][-]{section.2.11}{\277Qu\351 se entiende por puesto de trabajo?}{chapter.2}% 25 |
---|
26 | \BOOKMARK [1][-]{section.2.12}{Centro de datos}{chapter.2}% 26 |
---|
27 | \BOOKMARK [1][-]{section.2.13}{\277Que es seguridad l\363gica?}{chapter.2}% 27 |
---|
28 | \BOOKMARK [1][-]{section.2.14}{\277Qu\351 es seguridad f\355sica?}{chapter.2}% 28 |
---|
29 | \BOOKMARK [1][-]{section.2.15}{Cuenta de usuario}{chapter.2}% 29 |
---|
30 | \BOOKMARK [2][-]{subsection.2.15.1}{Cuenta de usuario Cr\355tica}{section.2.15}% 30 |
---|
31 | \BOOKMARK [1][-]{section.2.16}{Vulnerabilidades de los sistemas de informaci\363n}{chapter.2}% 31 |
---|
32 | \BOOKMARK [2][-]{subsection.2.16.1}{Causas de las vulnerabilidades de los sistemas inform\341ticos}{section.2.16}% 32 |
---|
33 | \BOOKMARK [1][-]{section.2.17}{Herramientas para la seguridad de la informaci\363n}{chapter.2}% 33 |
---|
34 | \BOOKMARK [2][-]{subsection.2.17.1}{Cortafuego}{section.2.17}% 34 |
---|
35 | \BOOKMARK [2][-]{subsection.2.17.2}{\277Para que sirve el cortafuego?}{section.2.17}% 35 |
---|
36 | \BOOKMARK [2][-]{subsection.2.17.3}{Consideraciones para la instalaci\363n y configuraci\363n de un cortafuego}{section.2.17}% 36 |
---|
37 | \BOOKMARK [2][-]{subsection.2.17.4}{Sistemas de detecci\363n de intrusiones \(IDS\)}{section.2.17}% 37 |
---|
38 | \BOOKMARK [1][-]{section.2.18}{Identificaci\363n de los riesgos a terceros}{chapter.2}% 38 |
---|
39 | \BOOKMARK [1][-]{section.2.19}{Seguridad l\363gica en los puestos de trabajo}{chapter.2}% 39 |
---|
40 | \BOOKMARK [1][-]{section.2.20}{Seguridad l\363gica en el centro de dato}{chapter.2}% 40 |
---|
41 | \BOOKMARK [1][-]{section.2.21}{Seguridad f\355sica en los puestos de trabajo}{chapter.2}% 41 |
---|
42 | \BOOKMARK [1][-]{section.2.22}{Seguridad f\355sica en el centro de dato}{chapter.2}% 42 |
---|
43 | \BOOKMARK [2][-]{subsection.2.22.1}{Servicios que presta o prestara el centro de datos: }{section.2.22}% 43 |
---|
44 | \BOOKMARK [2][-]{subsection.2.22.2}{Ubicaci\363n y condici\363n f\355sica del centro de dato}{section.2.22}% 44 |
---|
45 | \BOOKMARK [2][-]{subsection.2.22.3}{Especificaciones t\351cnicas del centro de dato}{section.2.22}% 45 |
---|
46 | \BOOKMARK [2][-]{subsection.2.22.4}{Control de acceso f\355sico}{section.2.22}% 46 |
---|
47 | \BOOKMARK [2][-]{subsection.2.22.5}{Aire acondicionado}{section.2.22}% 47 |
---|
48 | \BOOKMARK [2][-]{subsection.2.22.6}{Protecci\363n, detecci\363n y extinci\363n de incendios}{section.2.22}% 48 |
---|
49 | \BOOKMARK [1][-]{section.2.23}{Definici\363n de las Pol\355ticas de seguridad de la informaci\363n en el centro de datos}{chapter.2}% 49 |
---|
50 | \BOOKMARK [1][-]{section.2.24}{Pol\355ticas de Respaldo y recuperaci\363n}{chapter.2}% 50 |
---|
51 | \BOOKMARK [2][-]{subsection.2.24.1}{Normas para las pol\355ticas de respaldo y recuperaci\363n}{section.2.24}% 51 |
---|
52 | \BOOKMARK [1][-]{section.2.25}{Gesti\363n de Incidente de seguridad}{chapter.2}% 52 |
---|
53 | \BOOKMARK [2][-]{subsection.2.25.1}{Antes del incidente de seguridad:}{section.2.25}% 53 |
---|
54 | \BOOKMARK [2][-]{subsection.2.25.2}{Durante el incidente de seguridad:}{section.2.25}% 54 |
---|
55 | \BOOKMARK [2][-]{subsection.2.25.3}{Despu\351s del incidente de seguridad:}{section.2.25}% 55 |
---|
56 | \BOOKMARK [1][-]{section.2.26}{Plan de Recuperaci\363n antes Desastres}{chapter.2}% 56 |
---|
57 | \BOOKMARK [1][-]{section.2.27}{Seguridad en redes}{chapter.2}% 57 |
---|
58 | \BOOKMARK [0][-]{chapter.3}{Privacidad}{part.1}% 58 |
---|
59 | \BOOKMARK [1][-]{section.3.1}{Definici\363n y pol\355ticas de privacidad}{chapter.3}% 59 |
---|
60 | \BOOKMARK [1][-]{section.3.2}{T\351cnicas para proporcionar privacidad}{chapter.3}% 60 |
---|
61 | \BOOKMARK [2][-]{subsection.3.2.1}{Anonimato}{section.3.2}% 61 |
---|
62 | \BOOKMARK [0][-]{chapter.4}{Fundamentos Jur\355dicos}{part.1}% 62 |
---|
63 | \BOOKMARK [1][-]{section.4.1}{El ordenamiento jur\355dico venezolano y las nuevas tecnolog\355as de la informaci\363n}{chapter.4}% 63 |
---|
64 | \BOOKMARK [2][-]{subsection.4.1.1}{Ley de Mensajes de Datos y Firmas Electr\363nicas, Ley de Infogobierno, Ley de Interoperabilidad y Ley Especial Contra los Delitos Inform\341ticos}{section.4.1}% 64 |
---|
65 | \BOOKMARK [1][-]{section.4.2}{La insuficiencia de las regulaciones jur\355dicas existentes}{chapter.4}% 65 |
---|
66 | \BOOKMARK [-1][-]{part.2}{II Aportes de CENDITEL en la Seguridad vinculada a la Identidad Digital en las TIC}{}% 66 |
---|
67 | \BOOKMARK [0][-]{chapter.5}{Certificaci\363n Electr\363nica}{part.2}% 67 |
---|
68 | \BOOKMARK [1][-]{section.5.1}{Introducci\363n}{chapter.5}% 68 |
---|
69 | \BOOKMARK [1][-]{section.5.2}{Marco Te'orico}{chapter.5}% 69 |
---|
70 | \BOOKMARK [2][-]{subsection.5.2.1}{Seguridad Inform\341tica}{section.5.2}% 70 |
---|
71 | \BOOKMARK [2][-]{subsection.5.2.2}{Criptograf\355a}{section.5.2}% 71 |
---|
72 | \BOOKMARK [2][-]{subsection.5.2.3}{Certificados digitales}{section.5.2}% 72 |
---|
73 | \BOOKMARK [2][-]{subsection.5.2.4}{Est\341ndar X.509}{section.5.2}% 73 |
---|
74 | \BOOKMARK [2][-]{subsection.5.2.5}{Lenguaje Unificado de Modelado}{section.5.2}% 74 |
---|
75 | \BOOKMARK [2][-]{subsection.5.2.6}{Software Libre}{section.5.2}% 75 |
---|
76 | \BOOKMARK [1][-]{section.5.3}{Infraestructura de Clave P\372blica}{chapter.5}% 76 |
---|
77 | \BOOKMARK [2][-]{subsection.5.3.1}{Componentes de la Infraestructura de Claves P\372blica \(ICP\)}{section.5.3}% 77 |
---|
78 | \BOOKMARK [1][-]{section.5.4}{Desarrollo de la aplicaci\363n}{chapter.5}% 78 |
---|
79 | \BOOKMARK [2][-]{subsection.5.4.1}{Conceptualizaci\363n}{section.5.4}% 79 |
---|
80 | \BOOKMARK [2][-]{subsection.5.4.2}{Dise\361o}{section.5.4}% 80 |
---|
81 | \BOOKMARK [2][-]{subsection.5.4.3}{Implementaci\363n}{section.5.4}% 81 |
---|
82 | \BOOKMARK [2][-]{subsection.5.4.4}{Pruebas}{section.5.4}% 82 |
---|
83 | \BOOKMARK [2][-]{subsection.5.4.5}{Despliegue y configuraci\363n}{section.5.4}% 83 |
---|
84 | \BOOKMARK [1][-]{section.5.5}{Conclusiones}{chapter.5}% 84 |
---|
85 | \BOOKMARK [1][-]{section.5.6}{Glosario}{chapter.5}% 85 |
---|
86 | \BOOKMARK [0][-]{chapter.6}{Firmas Electr\363nicas}{part.2}% 86 |
---|
87 | \BOOKMARK [1][-]{section.6.1}{Introducci\363n}{chapter.6}% 87 |
---|
88 | \BOOKMARK [1][-]{section.6.2}{El modelo actual de Firma Electr\363nica}{chapter.6}% 88 |
---|
89 | \BOOKMARK [1][-]{section.6.3}{Antecedentes}{chapter.6}% 89 |
---|
90 | \BOOKMARK [1][-]{section.6.4}{Acoplamiento de la Firma Electr\363nica Avanzada}{chapter.6}% 90 |
---|
91 | \BOOKMARK [2][-]{subsection.6.4.1}{Componente de Firma Electr\363nica Avanzada}{section.6.4}% 91 |
---|
92 | \BOOKMARK [2][-]{subsection.6.4.2}{M\351todo de conex\355\363n}{section.6.4}% 92 |
---|
93 | \BOOKMARK [1][-]{section.6.5}{Casos de estudio}{chapter.6}% 93 |
---|
94 | \BOOKMARK [2][-]{subsection.6.5.1}{Caso OpenERP }{section.6.5}% 94 |
---|
95 | \BOOKMARK [2][-]{subsection.6.5.2}{Caso SAID}{section.6.5}% 95 |
---|
96 | \BOOKMARK [2][-]{subsection.6.5.3}{Caso Flujos de Trabajo}{section.6.5}% 96 |
---|
97 | \BOOKMARK [1][-]{section.6.6}{Conclusiones}{chapter.6}% 97 |
---|
98 | \BOOKMARK [0][-]{chapter.7}{Anonimato}{part.2}% 98 |
---|
99 | \BOOKMARK [1][-]{section.7.1}{Modelo de protocolo para un sistema an\363nimo basado en estrategias bio-inspiradas}{chapter.7}% 99 |
---|
100 | \BOOKMARK [1][-]{section.7.2}{Introduction}{chapter.7}% 100 |
---|
101 | \BOOKMARK [1][-]{section.7.3}{Artificial Systems Ant Colony in Anonymity}{chapter.7}% 101 |
---|
102 | \BOOKMARK [1][-]{section.7.4}{Conclusion}{chapter.7}% 102 |
---|
103 | \BOOKMARK [1][-]{section.7.5}{Sistema de medici\363n alternativo}{chapter.7}% 103 |
---|
104 | \BOOKMARK [1][-]{section.7.6}{Introduction}{chapter.7}% 104 |
---|
105 | \BOOKMARK [1][-]{section.7.7}{Related work}{chapter.7}% 105 |
---|
106 | \BOOKMARK [1][-]{section.7.8}{Proposal}{chapter.7}% 106 |
---|
107 | \BOOKMARK [2][-]{subsection.7.8.1}{Root Squared Mean Error - RSME}{section.7.8}% 107 |
---|
108 | \BOOKMARK [2][-]{subsection.7.8.2}{Jennesen-Shannon divergence}{section.7.8}% 108 |
---|
109 | \BOOKMARK [2][-]{subsection.7.8.3}{Results}{section.7.8}% 109 |
---|