[0a8ff4e] | 1 | \select@language {spanish} |
---|
| 2 | \contentsline {part}{I\hspace {1em}Seguridad en las TIC y la Identidad Digital. Fundamentos}{7} |
---|
| 3 | \contentsline {chapter}{\numberline {1}Bases de la identidad digital}{9} |
---|
| 4 | \contentsline {section}{\numberline {1.1}Conceptos b\IeC {\'a}sicos}{9} |
---|
| 5 | \contentsline {section}{\numberline {1.2}Implicaciones}{9} |
---|
| 6 | \contentsline {section}{\numberline {1.3}Identificaci\IeC {\'o}n, autenticaci\IeC {\'o}n}{9} |
---|
| 7 | \contentsline {subsection}{\numberline {1.3.1}T\IeC {\'e}cnicas de identificaci\IeC {\'o}n y autenticaci\IeC {\'o}n}{9} |
---|
| 8 | \contentsline {subsubsection}{Contrase\IeC {\~n}as}{9} |
---|
| 9 | \contentsline {subsubsection}{Certificados electr\IeC {\'o}nicos}{9} |
---|
| 10 | \contentsline {subsubsection}{Firmas electr\IeC {\'o}nicas}{10} |
---|
| 11 | \contentsline {subsubsection}{Dispositivos de usuario}{10} |
---|
[4f42880] | 12 | \contentsline {chapter}{\numberline {2}Pol\IeC {\'\i }ticas de Seguridad}{17} |
---|
| 13 | \contentsline {section}{\numberline {2.1}Pol\IeC {\'\i }ticas de seguridad de la informaci\IeC {\'o}n. Importancia.}{17} |
---|
| 14 | \contentsline {section}{\numberline {2.2}Puestos de trabajo, centros de datos, seguridad l\IeC {\'o}gica y f\IeC {\'\i }sica}{17} |
---|
| 15 | \contentsline {section}{\numberline {2.3}Pol\IeC {\'\i }ticas de Seguridad de La Informaci\IeC {\'o}n}{17} |
---|
| 16 | \contentsline {section}{\numberline {2.4}Importancia de la Seguridad de la Informaci\IeC {\'o}n}{19} |
---|
| 17 | \contentsline {section}{\numberline {2.5}Seguridad de la Informaci\IeC {\'o}n para Software Libre}{20} |
---|
| 18 | \contentsline {section}{\numberline {2.6}Principio de Defensa en profundidad}{21} |
---|
| 19 | \contentsline {subsection}{\numberline {2.6.1}Los principios generales de la defensa en profundidad}{23} |
---|
| 20 | \contentsline {section}{\numberline {2.7}Responsabilidad}{23} |
---|
| 21 | \contentsline {section}{\numberline {2.8}Procesos para aumentar la percepci\IeC {\'o}n de seguridad de la informaci\IeC {\'o}n}{24} |
---|
| 22 | \contentsline {subsection}{\numberline {2.8.1}Identificaci\IeC {\'o}n de los riesgos}{24} |
---|
| 23 | \contentsline {subsection}{\numberline {2.8.2}Evaluaci\IeC {\'o}n de los riesgos de seguridad}{26} |
---|
| 24 | \contentsline {subsection}{\numberline {2.8.3}Selecci\IeC {\'o}n de los controles}{28} |
---|
| 25 | \contentsline {subsection}{\numberline {2.8.4}Implementar los controles seleccionados}{29} |
---|
| 26 | \contentsline {subsection}{\numberline {2.8.5}Monitorear y mejorar los controles de seguridad}{30} |
---|
| 27 | \contentsline {section}{\numberline {2.9}Grupo de seguridad de la informaci\IeC {\'o}n}{31} |
---|
| 28 | \contentsline {section}{\numberline {2.10}Gesti\IeC {\'o}n de Contrase\IeC {\~n}as}{31} |
---|
| 29 | \contentsline {subsection}{\numberline {2.10.1}Claves con menos de ocho d\IeC {\'\i }gitos}{33} |
---|
| 30 | \contentsline {section}{\numberline {2.11}\IeC {\textquestiondown }Qu\IeC {\'e} se entiende por puesto de trabajo?}{34} |
---|
| 31 | \contentsline {section}{\numberline {2.12}Centro de datos}{34} |
---|
| 32 | \contentsline {section}{\numberline {2.13}\IeC {\textquestiondown }Que es seguridad l\IeC {\'o}gica?}{34} |
---|
| 33 | \contentsline {section}{\numberline {2.14}\IeC {\textquestiondown }Qu\IeC {\'e} es seguridad f\IeC {\'\i }sica?}{34} |
---|
| 34 | \contentsline {section}{\numberline {2.15}Cuenta de usuario}{34} |
---|
| 35 | \contentsline {subsection}{\numberline {2.15.1}Cuenta de usuario Cr\IeC {\'\i }tica}{35} |
---|
| 36 | \contentsline {section}{\numberline {2.16}Vulnerabilidades de los sistemas de informaci\IeC {\'o}n}{35} |
---|
| 37 | \contentsline {subsection}{\numberline {2.16.1}Causas de las vulnerabilidades de los sistemas inform\IeC {\'a}ticos}{35} |
---|
| 38 | \contentsline {section}{\numberline {2.17}Herramientas para la seguridad de la informaci\IeC {\'o}n}{36} |
---|
| 39 | \contentsline {subsection}{\numberline {2.17.1}Cortafuego}{36} |
---|
| 40 | \contentsline {subsection}{\numberline {2.17.2}\IeC {\textquestiondown }Para que sirve el cortafuego?}{38} |
---|
| 41 | \contentsline {subsection}{\numberline {2.17.3}Consideraciones para la instalaci\IeC {\'o}n y configuraci\IeC {\'o}n de un cortafuego}{40} |
---|
| 42 | \contentsline {subsection}{\numberline {2.17.4}Sistemas de detecci\IeC {\'o}n de intrusiones (IDS)}{41} |
---|
| 43 | \contentsline {section}{\numberline {2.18}Identificaci\IeC {\'o}n de los riesgos a terceros}{42} |
---|
| 44 | \contentsline {section}{\numberline {2.19}Seguridad l\IeC {\'o}gica en los puestos de trabajo}{43} |
---|
| 45 | \contentsline {section}{\numberline {2.20}Seguridad l\IeC {\'o}gica en el centro de dato}{44} |
---|
| 46 | \contentsline {section}{\numberline {2.21}Seguridad f\IeC {\'\i }sica en los puestos de trabajo}{46} |
---|
| 47 | \contentsline {section}{\numberline {2.22}Seguridad f\IeC {\'\i }sica en el centro de dato}{47} |
---|
| 48 | \contentsline {subsection}{\numberline {2.22.1}Servicios que presta o prestara el centro de datos: }{47} |
---|
| 49 | \contentsline {subsection}{\numberline {2.22.2}Ubicaci\IeC {\'o}n y condici\IeC {\'o}n f\IeC {\'\i }sica del centro de dato}{47} |
---|
| 50 | \contentsline {subsection}{\numberline {2.22.3}Especificaciones t\IeC {\'e}cnicas del centro de dato}{48} |
---|
| 51 | \contentsline {subsection}{\numberline {2.22.4}Control de acceso f\IeC {\'\i }sico}{50} |
---|
| 52 | \contentsline {subsection}{\numberline {2.22.5}Aire acondicionado}{51} |
---|
| 53 | \contentsline {subsection}{\numberline {2.22.6}Protecci\IeC {\'o}n, detecci\IeC {\'o}n y extinci\IeC {\'o}n de incendios}{51} |
---|
| 54 | \contentsline {section}{\numberline {2.23}Definici\IeC {\'o}n de las Pol\IeC {\'\i }ticas de seguridad de la informaci\IeC {\'o}n en el centro de datos}{52} |
---|
| 55 | \contentsline {section}{\numberline {2.24}Pol\IeC {\'\i }ticas de Respaldo y recuperaci\IeC {\'o}n}{53} |
---|
| 56 | \contentsline {subsection}{\numberline {2.24.1}Normas para las pol\IeC {\'\i }ticas de respaldo y recuperaci\IeC {\'o}n}{54} |
---|
| 57 | \contentsline {section}{\numberline {2.25}Gesti\IeC {\'o}n de Incidente de seguridad}{55} |
---|
| 58 | \contentsline {subsection}{\numberline {2.25.1}Antes del incidente de seguridad:}{55} |
---|
| 59 | \contentsline {subsection}{\numberline {2.25.2}Durante el incidente de seguridad:}{56} |
---|
| 60 | \contentsline {subsection}{\numberline {2.25.3}Despu\IeC {\'e}s del incidente de seguridad:}{57} |
---|
| 61 | \contentsline {section}{\numberline {2.26}Plan de Recuperaci\IeC {\'o}n antes Desastres}{58} |
---|
| 62 | \contentsline {section}{\numberline {2.27}Seguridad en redes}{59} |
---|
| 63 | \contentsline {chapter}{\numberline {3}Privacidad}{61} |
---|
| 64 | \contentsline {section}{\numberline {3.1}Definici\IeC {\'o}n y pol\IeC {\'\i }ticas de privacidad}{61} |
---|
| 65 | \contentsline {section}{\numberline {3.2}T\IeC {\'e}cnicas para proporcionar privacidad}{61} |
---|
| 66 | \contentsline {subsection}{\numberline {3.2.1}Anonimato}{61} |
---|
| 67 | \contentsline {subsubsection}{Redes de mezcla}{61} |
---|
| 68 | \contentsline {subsubsection}{Enrutamiento cebolla}{61} |
---|
| 69 | \contentsline {chapter}{\numberline {4}Fundamentos Jur\IeC {\'\i }dicos}{63} |
---|
| 70 | \contentsline {section}{\numberline {4.1}El ordenamiento jur\IeC {\'\i }dico venezolano y las nuevas tecnolog\IeC {\'\i }as de la informaci\IeC {\'o}n}{63} |
---|
| 71 | \contentsline {subsection}{\numberline {4.1.1}Ley de Mensajes de Datos y Firmas Electr\IeC {\'o}nicas, Ley de Infogobierno, Ley de Interoperabilidad y Ley Especial Contra los Delitos Inform\IeC {\'a}ticos}{63} |
---|
| 72 | \contentsline {section}{\numberline {4.2}La insuficiencia de las regulaciones jur\IeC {\'\i }dicas existentes}{63} |
---|
| 73 | \contentsline {part}{II\hspace {1em}Aportes de CENDITEL en la Seguridad vinculada a la Identidad Digital en las TIC}{65} |
---|
| 74 | \contentsline {chapter}{\numberline {5}Certificaci\IeC {\'o}n Electr\IeC {\'o}nica}{67} |
---|
| 75 | \contentsline {section}{\numberline {5.1}Introducci\'on}{68} |
---|
| 76 | \contentsline {section}{\numberline {5.2}Marco Te'orico}{69} |
---|
| 77 | \contentsline {subsection}{\numberline {5.2.1}Seguridad Inform\'atica}{69} |
---|
| 78 | \contentsline {subsection}{\numberline {5.2.2}Criptograf\'ia}{70} |
---|
| 79 | \contentsline {subsection}{\numberline {5.2.3}Certificados digitales}{71} |
---|
| 80 | \contentsline {subsection}{\numberline {5.2.4}Est\'andar X.509}{71} |
---|
| 81 | \contentsline {subsection}{\numberline {5.2.5}Lenguaje Unificado de Modelado}{73} |
---|
| 82 | \contentsline {subsection}{\numberline {5.2.6}Software Libre}{74} |
---|
| 83 | \contentsline {section}{\numberline {5.3}Infraestructura de Clave P\'ublica}{74} |
---|
| 84 | \contentsline {subsection}{\numberline {5.3.1}Componentes de la Infraestructura de Claves P\'ublica (ICP)}{75} |
---|
| 85 | \contentsline {section}{\numberline {5.4}Desarrollo de la aplicaci\'on}{76} |
---|
| 86 | \contentsline {subsection}{\numberline {5.4.1}Conceptualizaci\'on}{76} |
---|
| 87 | \contentsline {subsection}{\numberline {5.4.2}Dise\~no}{77} |
---|
| 88 | \contentsline {subsection}{\numberline {5.4.3}Implementaci\'on}{79} |
---|
| 89 | \contentsline {subsection}{\numberline {5.4.4}Pruebas}{81} |
---|
| 90 | \contentsline {subsection}{\numberline {5.4.5}Despliegue y configuraci\'on}{82} |
---|
| 91 | \contentsline {section}{\numberline {5.5}Conclusiones}{83} |
---|
| 92 | \contentsline {section}{\numberline {5.6}Glosario}{84} |
---|
| 93 | \contentsline {chapter}{\numberline {6}Firmas Electr\IeC {\'o}nicas}{87} |
---|
| 94 | \contentsline {section}{\numberline {6.1}Introducci\IeC {\'o}n}{87} |
---|
| 95 | \contentsline {section}{\numberline {6.2}El modelo actual de Firma Electr\IeC {\'o}nica}{88} |
---|
| 96 | \contentsline {section}{\numberline {6.3}Antecedentes}{90} |
---|
| 97 | \contentsline {section}{\numberline {6.4}Acoplamiento de la Firma Electr\IeC {\'o}nica Avanzada}{91} |
---|
| 98 | \contentsline {subsection}{\numberline {6.4.1}Componente de Firma Electr\IeC {\'o}nica Avanzada}{91} |
---|
| 99 | \contentsline {subsection}{\numberline {6.4.2}M\IeC {\'e}todo de conex\IeC {\'\i }\IeC {\'o}n}{93} |
---|
| 100 | \contentsline {section}{\numberline {6.5}Casos de estudio}{95} |
---|
| 101 | \contentsline {subsection}{\numberline {6.5.1}Caso OpenERP }{96} |
---|
| 102 | \contentsline {subsection}{\numberline {6.5.2}Caso SAID}{98} |
---|
| 103 | \contentsline {subsection}{\numberline {6.5.3}Caso Flujos de Trabajo}{99} |
---|
| 104 | \contentsline {section}{\numberline {6.6}Conclusiones}{100} |
---|
| 105 | \contentsline {chapter}{\numberline {7}Anonimato}{107} |
---|
| 106 | \contentsline {section}{\numberline {7.1}Modelo de protocolo para un sistema an\IeC {\'o}nimo basado en estrategias bio-inspiradas}{107} |
---|
| 107 | \contentsline {subsection}{\numberline {7.1.1}Introduction}{107} |
---|
| 108 | \contentsline {subsection}{\numberline {7.1.2}Artificial Systems Ant Colony in Anonymity}{108} |
---|
| 109 | \contentsline {subsection}{\numberline {7.1.3}Conclusion}{110} |
---|
| 110 | \contentsline {section}{\numberline {7.2}Sistema de medici\IeC {\'o}n alternativo}{112} |
---|
| 111 | \contentsline {subsection}{\numberline {7.2.1}Introduction}{112} |
---|
| 112 | \contentsline {subsection}{\numberline {7.2.2}Related work}{113} |
---|
| 113 | \contentsline {subsection}{\numberline {7.2.3}Proposal}{114} |
---|
| 114 | \contentsline {subsubsection}{Root Squared Mean Error - RSME}{114} |
---|
| 115 | \contentsline {subsubsection}{Jennesen-Shannon divergence}{114} |
---|
| 116 | \contentsline {subsubsection}{Results}{115} |
---|