Ignore:
Timestamp:
Mar 31, 2014, 11:46:39 AM (10 years ago)
Author:
Antonio Araujo Brett <aaraujo@…>
Branches:
master, revisionfinal
Children:
404bc1f
Parents:
9a48d1f
Message:

Corregidas las observaciones del documento de políticas realizadas por rsumoza. Pendiente una revisión de redacción.

File:
1 edited

Legend:

Unmodified
Added
Removed
  • recopilacionInicial/recopilacion.toc

    r9a48d1f r8354e5d  
    4343\contentsline {section}{\numberline {2.18}Identificaci\IeC {\'o}n de los riesgos a terceros}{51}
    4444\contentsline {section}{\numberline {2.19}Seguridad l\IeC {\'o}gica en los puestos de trabajo}{52}
    45 \contentsline {section}{\numberline {2.20}Seguridad l\IeC {\'o}gica en el centro de dato}{53}
     45\contentsline {section}{\numberline {2.20}Seguridad l\IeC {\'o}gica en el centro de datos}{53}
    4646\contentsline {section}{\numberline {2.21}Seguridad f\IeC {\'\i }sica en los puestos de trabajo}{54}
    4747\contentsline {section}{\numberline {2.22}Seguridad f\IeC {\'\i }sica en el centro de dato}{55}
    48 \contentsline {subsection}{\numberline {2.22.1}Servicios que presta o prestara el centro de datos: }{55}
    49 \contentsline {subsection}{\numberline {2.22.2}Ubicaci\IeC {\'o}n y condici\IeC {\'o}n f\IeC {\'\i }sica del centro de dato}{56}
    50 \contentsline {subsection}{\numberline {2.22.3}Especificaciones t\IeC {\'e}cnicas del centro de dato}{57}
    51 \contentsline {subsection}{\numberline {2.22.4}Control de acceso f\IeC {\'\i }sico}{59}
     48\contentsline {subsection}{\numberline {2.22.1}Servicios que presta o prestar\IeC {\'a} el centro de datos: }{55}
     49\contentsline {subsection}{\numberline {2.22.2}Ubicaci\IeC {\'o}n y condici\IeC {\'o}n f\IeC {\'\i }sica del centro de datos}{55}
     50\contentsline {subsection}{\numberline {2.22.3}Especificaciones t\IeC {\'e}cnicas del centro de datos}{56}
     51\contentsline {subsection}{\numberline {2.22.4}Control de acceso f\IeC {\'\i }sico al centro de datos}{58}
    5252\contentsline {subsection}{\numberline {2.22.5}Aire acondicionado}{59}
    53 \contentsline {subsection}{\numberline {2.22.6}Protecci\IeC {\'o}n, detecci\IeC {\'o}n y extinci\IeC {\'o}n de incendios}{60}
    54 \contentsline {section}{\numberline {2.23}Definici\IeC {\'o}n de las Pol\IeC {\'\i }ticas de seguridad de la informaci\IeC {\'o}n en el centro de datos}{60}
    55 \contentsline {section}{\numberline {2.24}Pol\IeC {\'\i }ticas de Respaldo y recuperaci\IeC {\'o}n}{62}
     53\contentsline {subsection}{\numberline {2.22.6}Protecci\IeC {\'o}n, detecci\IeC {\'o}n y extinci\IeC {\'o}n de incendios}{59}
     54\contentsline {section}{\numberline {2.23}Especificaci\IeC {\'o}n de las Pol\IeC {\'\i }ticas de seguridad de la informaci\IeC {\'o}n en el centro de datos}{60}
     55\contentsline {section}{\numberline {2.24}Pol\IeC {\'\i }ticas de Respaldo y recuperaci\IeC {\'o}n}{61}
    5656\contentsline {subsection}{\numberline {2.24.1}Normas para las pol\IeC {\'\i }ticas de respaldo y recuperaci\IeC {\'o}n}{62}
    57 \contentsline {section}{\numberline {2.25}Gesti\IeC {\'o}n de Incidente de seguridad}{64}
    58 \contentsline {subsection}{\numberline {2.25.1}Antes del incidente de seguridad:}{64}
    59 \contentsline {subsection}{\numberline {2.25.2}Durante el incidente de seguridad:}{65}
    60 \contentsline {subsection}{\numberline {2.25.3}Despu\IeC {\'e}s del incidente de seguridad:}{66}
    61 \contentsline {section}{\numberline {2.26}Plan de Recuperaci\IeC {\'o}n antes Desastres}{66}
    62 \contentsline {section}{\numberline {2.27}Seguridad en redes}{68}
    63 \contentsline {chapter}{\numberline {3}Privacidad}{69}
    64 \contentsline {section}{\numberline {3.1}Definici\IeC {\'o}n y pol\IeC {\'\i }ticas de privacidad}{69}
    65 \contentsline {section}{\numberline {3.2}T\IeC {\'e}cnicas para proporcionar privacidad}{69}
    66 \contentsline {subsection}{\numberline {3.2.1}Anonimato}{69}
    67 \contentsline {subsubsection}{Redes de mezcla}{69}
    68 \contentsline {subsubsection}{Enrutamiento cebolla}{69}
    69 \contentsline {chapter}{\numberline {4}Fundamentos Jur\IeC {\'\i }dicos}{71}
    70 \contentsline {section}{\numberline {4.1}El ordenamiento jur\IeC {\'\i }dico venezolano y las nuevas tecnolog\IeC {\'\i }as de la informaci\IeC {\'o}n}{71}
    71 \contentsline {subsection}{\numberline {4.1.1}Ley de Mensajes de Datos y Firmas Electr\IeC {\'o}nicas, Ley de Infogobierno, Ley de Interoperabilidad y Ley Especial Contra los Delitos Inform\IeC {\'a}ticos}{71}
    72 \contentsline {section}{\numberline {4.2}La insuficiencia de las regulaciones jur\IeC {\'\i }dicas existentes}{71}
    73 \contentsline {part}{II\hspace {1em}Aportes de CENDITEL en la Seguridad vinculada a la Identidad Digital en las TIC}{73}
    74 \contentsline {chapter}{\numberline {5}Certificaci\IeC {\'o}n Electr\IeC {\'o}nica}{75}
    75 \contentsline {section}{\numberline {5.1}Introducci\'on}{76}
    76 \contentsline {section}{\numberline {5.2}Marco Te'orico}{77}
    77 \contentsline {subsection}{\numberline {5.2.1}Seguridad Inform\'atica}{77}
    78 \contentsline {subsection}{\numberline {5.2.2}Criptograf\'ia}{78}
    79 \contentsline {subsection}{\numberline {5.2.3}Certificados digitales}{79}
    80 \contentsline {subsection}{\numberline {5.2.4}Est\'andar X.509}{79}
    81 \contentsline {subsection}{\numberline {5.2.5}Lenguaje Unificado de Modelado}{81}
    82 \contentsline {subsection}{\numberline {5.2.6}Software Libre}{82}
    83 \contentsline {section}{\numberline {5.3}Infraestructura de Clave P\'ublica}{82}
    84 \contentsline {subsection}{\numberline {5.3.1}Componentes de la Infraestructura de Claves P\'ublica (ICP)}{83}
    85 \contentsline {section}{\numberline {5.4}Desarrollo de la aplicaci\'on}{84}
    86 \contentsline {subsection}{\numberline {5.4.1}Conceptualizaci\'on}{84}
    87 \contentsline {subsection}{\numberline {5.4.2}Dise\~no}{85}
    88 \contentsline {subsection}{\numberline {5.4.3}Implementaci\'on}{87}
    89 \contentsline {subsection}{\numberline {5.4.4}Pruebas}{89}
    90 \contentsline {subsection}{\numberline {5.4.5}Despliegue y configuraci\'on}{90}
    91 \contentsline {section}{\numberline {5.5}Conclusiones}{91}
    92 \contentsline {section}{\numberline {5.6}Glosario}{92}
    93 \contentsline {chapter}{\numberline {6}Firmas Electr\IeC {\'o}nicas}{95}
    94 \contentsline {section}{\numberline {6.1}Introducci\IeC {\'o}n}{95}
    95 \contentsline {section}{\numberline {6.2}El modelo actual de Firma Electr\IeC {\'o}nica}{96}
    96 \contentsline {section}{\numberline {6.3}Antecedentes}{98}
    97 \contentsline {section}{\numberline {6.4}Acoplamiento de la Firma Electr\IeC {\'o}nica Avanzada}{99}
    98 \contentsline {subsection}{\numberline {6.4.1}Componente de Firma Electr\IeC {\'o}nica Avanzada}{99}
    99 \contentsline {subsection}{\numberline {6.4.2}M\IeC {\'e}todo de conex\IeC {\'\i }\IeC {\'o}n}{101}
    100 \contentsline {section}{\numberline {6.5}Casos de estudio}{103}
    101 \contentsline {subsection}{\numberline {6.5.1}Caso OpenERP }{104}
    102 \contentsline {subsection}{\numberline {6.5.2}Caso SAID}{106}
    103 \contentsline {subsection}{\numberline {6.5.3}Caso Flujos de Trabajo}{107}
    104 \contentsline {section}{\numberline {6.6}Conclusiones}{108}
    105 \contentsline {chapter}{\numberline {7}Anonimato}{115}
    106 \contentsline {section}{\numberline {7.1}Modelo de protocolo para un sistema an\IeC {\'o}nimo basado en estrategias bio-inspiradas}{115}
    107 \contentsline {subsection}{\numberline {7.1.1}Introduction}{115}
    108 \contentsline {subsection}{\numberline {7.1.2}Artificial Systems Ant Colony in Anonymity}{116}
    109 \contentsline {subsection}{\numberline {7.1.3}Conclusion}{118}
    110 \contentsline {section}{\numberline {7.2}Sistema de medici\IeC {\'o}n alternativo}{120}
    111 \contentsline {subsection}{\numberline {7.2.1}Introduction}{120}
    112 \contentsline {subsection}{\numberline {7.2.2}Related work}{121}
    113 \contentsline {subsection}{\numberline {7.2.3}Proposal}{122}
    114 \contentsline {subsubsection}{Root Squared Mean Error - RSME}{122}
    115 \contentsline {subsubsection}{Jennesen-Shannon divergence}{122}
    116 \contentsline {subsubsection}{Results}{123}
     57\contentsline {section}{\numberline {2.25}Gesti\IeC {\'o}n de Incidentes de seguridad}{63}
     58\contentsline {subsection}{\numberline {2.25.1}Antes del incidente de seguridad:}{63}
     59\contentsline {subsection}{\numberline {2.25.2}Durante el incidente de seguridad:}{64}
     60\contentsline {subsection}{\numberline {2.25.3}Despu\IeC {\'e}s del incidente de seguridad:}{65}
     61\contentsline {section}{\numberline {2.26}Plan de Recuperaci\IeC {\'o}n antes Desastres}{65}
     62\contentsline {section}{\numberline {2.27}Seguridad en redes}{66}
     63\contentsline {chapter}{\numberline {3}Privacidad}{67}
     64\contentsline {section}{\numberline {3.1}Definici\IeC {\'o}n y pol\IeC {\'\i }ticas de privacidad}{67}
     65\contentsline {section}{\numberline {3.2}T\IeC {\'e}cnicas para proporcionar privacidad}{67}
     66\contentsline {subsection}{\numberline {3.2.1}Anonimato}{67}
     67\contentsline {subsubsection}{Redes de mezcla}{67}
     68\contentsline {subsubsection}{Enrutamiento cebolla}{67}
     69\contentsline {chapter}{\numberline {4}Fundamentos Jur\IeC {\'\i }dicos}{69}
     70\contentsline {section}{\numberline {4.1}El ordenamiento jur\IeC {\'\i }dico venezolano y las nuevas tecnolog\IeC {\'\i }as de la informaci\IeC {\'o}n}{69}
     71\contentsline {subsection}{\numberline {4.1.1}Ley de Mensajes de Datos y Firmas Electr\IeC {\'o}nicas, Ley de Infogobierno, Ley de Interoperabilidad y Ley Especial Contra los Delitos Inform\IeC {\'a}ticos}{69}
     72\contentsline {section}{\numberline {4.2}La insuficiencia de las regulaciones jur\IeC {\'\i }dicas existentes}{69}
     73\contentsline {part}{II\hspace {1em}Aportes de CENDITEL en la Seguridad vinculada a la Identidad Digital en las TIC}{71}
     74\contentsline {chapter}{\numberline {5}Certificaci\IeC {\'o}n Electr\IeC {\'o}nica}{73}
     75\contentsline {section}{\numberline {5.1}Introducci\'on}{74}
     76\contentsline {section}{\numberline {5.2}Marco Te'orico}{75}
     77\contentsline {subsection}{\numberline {5.2.1}Seguridad Inform\'atica}{75}
     78\contentsline {subsection}{\numberline {5.2.2}Criptograf\'ia}{76}
     79\contentsline {subsection}{\numberline {5.2.3}Certificados digitales}{77}
     80\contentsline {subsection}{\numberline {5.2.4}Est\'andar X.509}{77}
     81\contentsline {subsection}{\numberline {5.2.5}Lenguaje Unificado de Modelado}{79}
     82\contentsline {subsection}{\numberline {5.2.6}Software Libre}{80}
     83\contentsline {section}{\numberline {5.3}Infraestructura de Clave P\'ublica}{80}
     84\contentsline {subsection}{\numberline {5.3.1}Componentes de la Infraestructura de Claves P\'ublica (ICP)}{81}
     85\contentsline {section}{\numberline {5.4}Desarrollo de la aplicaci\'on}{82}
     86\contentsline {subsection}{\numberline {5.4.1}Conceptualizaci\'on}{82}
     87\contentsline {subsection}{\numberline {5.4.2}Dise\~no}{83}
     88\contentsline {subsection}{\numberline {5.4.3}Implementaci\'on}{85}
     89\contentsline {subsection}{\numberline {5.4.4}Pruebas}{87}
     90\contentsline {subsection}{\numberline {5.4.5}Despliegue y configuraci\'on}{88}
     91\contentsline {section}{\numberline {5.5}Conclusiones}{89}
     92\contentsline {section}{\numberline {5.6}Glosario}{90}
     93\contentsline {chapter}{\numberline {6}Firmas Electr\IeC {\'o}nicas}{93}
     94\contentsline {section}{\numberline {6.1}Introducci\IeC {\'o}n}{93}
     95\contentsline {section}{\numberline {6.2}El modelo actual de Firma Electr\IeC {\'o}nica}{94}
     96\contentsline {section}{\numberline {6.3}Antecedentes}{96}
     97\contentsline {section}{\numberline {6.4}Acoplamiento de la Firma Electr\IeC {\'o}nica Avanzada}{97}
     98\contentsline {subsection}{\numberline {6.4.1}Componente de Firma Electr\IeC {\'o}nica Avanzada}{97}
     99\contentsline {subsection}{\numberline {6.4.2}M\IeC {\'e}todo de conex\IeC {\'\i }\IeC {\'o}n}{99}
     100\contentsline {section}{\numberline {6.5}Casos de estudio}{101}
     101\contentsline {subsection}{\numberline {6.5.1}Caso OpenERP }{102}
     102\contentsline {subsection}{\numberline {6.5.2}Caso SAID}{104}
     103\contentsline {subsection}{\numberline {6.5.3}Caso Flujos de Trabajo}{105}
     104\contentsline {section}{\numberline {6.6}Conclusiones}{106}
     105\contentsline {chapter}{\numberline {7}Anonimato}{113}
     106\contentsline {section}{\numberline {7.1}Modelo de protocolo para un sistema an\IeC {\'o}nimo basado en estrategias bio-inspiradas}{113}
     107\contentsline {subsection}{\numberline {7.1.1}Introduction}{113}
     108\contentsline {subsection}{\numberline {7.1.2}Artificial Systems Ant Colony in Anonymity}{114}
     109\contentsline {subsection}{\numberline {7.1.3}Conclusion}{116}
     110\contentsline {section}{\numberline {7.2}Sistema de medici\IeC {\'o}n alternativo}{118}
     111\contentsline {subsection}{\numberline {7.2.1}Introduction}{118}
     112\contentsline {subsection}{\numberline {7.2.2}Related work}{119}
     113\contentsline {subsection}{\numberline {7.2.3}Proposal}{120}
     114\contentsline {subsubsection}{Root Squared Mean Error - RSME}{120}
     115\contentsline {subsubsection}{Jennesen-Shannon divergence}{120}
     116\contentsline {subsubsection}{Results}{121}
Note: See TracChangeset for help on using the changeset viewer.