Changeset 8354e5d in libros for recopilacionInicial/recopilacion.toc
- Timestamp:
- Mar 31, 2014, 11:46:39 AM (10 years ago)
- Branches:
- master, revisionfinal
- Children:
- 404bc1f
- Parents:
- 9a48d1f
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
recopilacionInicial/recopilacion.toc
r9a48d1f r8354e5d 43 43 \contentsline {section}{\numberline {2.18}Identificaci\IeC {\'o}n de los riesgos a terceros}{51} 44 44 \contentsline {section}{\numberline {2.19}Seguridad l\IeC {\'o}gica en los puestos de trabajo}{52} 45 \contentsline {section}{\numberline {2.20}Seguridad l\IeC {\'o}gica en el centro de dato }{53}45 \contentsline {section}{\numberline {2.20}Seguridad l\IeC {\'o}gica en el centro de datos}{53} 46 46 \contentsline {section}{\numberline {2.21}Seguridad f\IeC {\'\i }sica en los puestos de trabajo}{54} 47 47 \contentsline {section}{\numberline {2.22}Seguridad f\IeC {\'\i }sica en el centro de dato}{55} 48 \contentsline {subsection}{\numberline {2.22.1}Servicios que presta o prestar ael centro de datos: }{55}49 \contentsline {subsection}{\numberline {2.22.2}Ubicaci\IeC {\'o}n y condici\IeC {\'o}n f\IeC {\'\i }sica del centro de dato }{56}50 \contentsline {subsection}{\numberline {2.22.3}Especificaciones t\IeC {\'e}cnicas del centro de dato }{57}51 \contentsline {subsection}{\numberline {2.22.4}Control de acceso f\IeC {\'\i }sico }{59}48 \contentsline {subsection}{\numberline {2.22.1}Servicios que presta o prestar\IeC {\'a} el centro de datos: }{55} 49 \contentsline {subsection}{\numberline {2.22.2}Ubicaci\IeC {\'o}n y condici\IeC {\'o}n f\IeC {\'\i }sica del centro de datos}{55} 50 \contentsline {subsection}{\numberline {2.22.3}Especificaciones t\IeC {\'e}cnicas del centro de datos}{56} 51 \contentsline {subsection}{\numberline {2.22.4}Control de acceso f\IeC {\'\i }sico al centro de datos}{58} 52 52 \contentsline {subsection}{\numberline {2.22.5}Aire acondicionado}{59} 53 \contentsline {subsection}{\numberline {2.22.6}Protecci\IeC {\'o}n, detecci\IeC {\'o}n y extinci\IeC {\'o}n de incendios}{ 60}54 \contentsline {section}{\numberline {2.23} Definici\IeC {\'o}n de las Pol\IeC {\'\i }ticas de seguridad de la informaci\IeC {\'o}n en el centro de datos}{60}55 \contentsline {section}{\numberline {2.24}Pol\IeC {\'\i }ticas de Respaldo y recuperaci\IeC {\'o}n}{6 2}53 \contentsline {subsection}{\numberline {2.22.6}Protecci\IeC {\'o}n, detecci\IeC {\'o}n y extinci\IeC {\'o}n de incendios}{59} 54 \contentsline {section}{\numberline {2.23}Especificaci\IeC {\'o}n de las Pol\IeC {\'\i }ticas de seguridad de la informaci\IeC {\'o}n en el centro de datos}{60} 55 \contentsline {section}{\numberline {2.24}Pol\IeC {\'\i }ticas de Respaldo y recuperaci\IeC {\'o}n}{61} 56 56 \contentsline {subsection}{\numberline {2.24.1}Normas para las pol\IeC {\'\i }ticas de respaldo y recuperaci\IeC {\'o}n}{62} 57 \contentsline {section}{\numberline {2.25}Gesti\IeC {\'o}n de Incidente de seguridad}{64}58 \contentsline {subsection}{\numberline {2.25.1}Antes del incidente de seguridad:}{6 4}59 \contentsline {subsection}{\numberline {2.25.2}Durante el incidente de seguridad:}{6 5}60 \contentsline {subsection}{\numberline {2.25.3}Despu\IeC {\'e}s del incidente de seguridad:}{6 6}61 \contentsline {section}{\numberline {2.26}Plan de Recuperaci\IeC {\'o}n antes Desastres}{6 6}62 \contentsline {section}{\numberline {2.27}Seguridad en redes}{6 8}63 \contentsline {chapter}{\numberline {3}Privacidad}{6 9}64 \contentsline {section}{\numberline {3.1}Definici\IeC {\'o}n y pol\IeC {\'\i }ticas de privacidad}{6 9}65 \contentsline {section}{\numberline {3.2}T\IeC {\'e}cnicas para proporcionar privacidad}{6 9}66 \contentsline {subsection}{\numberline {3.2.1}Anonimato}{6 9}67 \contentsline {subsubsection}{Redes de mezcla}{6 9}68 \contentsline {subsubsection}{Enrutamiento cebolla}{6 9}69 \contentsline {chapter}{\numberline {4}Fundamentos Jur\IeC {\'\i }dicos}{ 71}70 \contentsline {section}{\numberline {4.1}El ordenamiento jur\IeC {\'\i }dico venezolano y las nuevas tecnolog\IeC {\'\i }as de la informaci\IeC {\'o}n}{ 71}71 \contentsline {subsection}{\numberline {4.1.1}Ley de Mensajes de Datos y Firmas Electr\IeC {\'o}nicas, Ley de Infogobierno, Ley de Interoperabilidad y Ley Especial Contra los Delitos Inform\IeC {\'a}ticos}{ 71}72 \contentsline {section}{\numberline {4.2}La insuficiencia de las regulaciones jur\IeC {\'\i }dicas existentes}{ 71}73 \contentsline {part}{II\hspace {1em}Aportes de CENDITEL en la Seguridad vinculada a la Identidad Digital en las TIC}{7 3}74 \contentsline {chapter}{\numberline {5}Certificaci\IeC {\'o}n Electr\IeC {\'o}nica}{7 5}75 \contentsline {section}{\numberline {5.1}Introducci\'on}{7 6}76 \contentsline {section}{\numberline {5.2}Marco Te'orico}{7 7}77 \contentsline {subsection}{\numberline {5.2.1}Seguridad Inform\'atica}{7 7}78 \contentsline {subsection}{\numberline {5.2.2}Criptograf\'ia}{7 8}79 \contentsline {subsection}{\numberline {5.2.3}Certificados digitales}{7 9}80 \contentsline {subsection}{\numberline {5.2.4}Est\'andar X.509}{7 9}81 \contentsline {subsection}{\numberline {5.2.5}Lenguaje Unificado de Modelado}{ 81}82 \contentsline {subsection}{\numberline {5.2.6}Software Libre}{8 2}83 \contentsline {section}{\numberline {5.3}Infraestructura de Clave P\'ublica}{8 2}84 \contentsline {subsection}{\numberline {5.3.1}Componentes de la Infraestructura de Claves P\'ublica (ICP)}{8 3}85 \contentsline {section}{\numberline {5.4}Desarrollo de la aplicaci\'on}{8 4}86 \contentsline {subsection}{\numberline {5.4.1}Conceptualizaci\'on}{8 4}87 \contentsline {subsection}{\numberline {5.4.2}Dise\~no}{8 5}88 \contentsline {subsection}{\numberline {5.4.3}Implementaci\'on}{8 7}89 \contentsline {subsection}{\numberline {5.4.4}Pruebas}{8 9}90 \contentsline {subsection}{\numberline {5.4.5}Despliegue y configuraci\'on}{ 90}91 \contentsline {section}{\numberline {5.5}Conclusiones}{ 91}92 \contentsline {section}{\numberline {5.6}Glosario}{9 2}93 \contentsline {chapter}{\numberline {6}Firmas Electr\IeC {\'o}nicas}{9 5}94 \contentsline {section}{\numberline {6.1}Introducci\IeC {\'o}n}{9 5}95 \contentsline {section}{\numberline {6.2}El modelo actual de Firma Electr\IeC {\'o}nica}{9 6}96 \contentsline {section}{\numberline {6.3}Antecedentes}{9 8}97 \contentsline {section}{\numberline {6.4}Acoplamiento de la Firma Electr\IeC {\'o}nica Avanzada}{9 9}98 \contentsline {subsection}{\numberline {6.4.1}Componente de Firma Electr\IeC {\'o}nica Avanzada}{9 9}99 \contentsline {subsection}{\numberline {6.4.2}M\IeC {\'e}todo de conex\IeC {\'\i }\IeC {\'o}n}{ 101}100 \contentsline {section}{\numberline {6.5}Casos de estudio}{10 3}101 \contentsline {subsection}{\numberline {6.5.1}Caso OpenERP }{10 4}102 \contentsline {subsection}{\numberline {6.5.2}Caso SAID}{10 6}103 \contentsline {subsection}{\numberline {6.5.3}Caso Flujos de Trabajo}{10 7}104 \contentsline {section}{\numberline {6.6}Conclusiones}{10 8}105 \contentsline {chapter}{\numberline {7}Anonimato}{11 5}106 \contentsline {section}{\numberline {7.1}Modelo de protocolo para un sistema an\IeC {\'o}nimo basado en estrategias bio-inspiradas}{11 5}107 \contentsline {subsection}{\numberline {7.1.1}Introduction}{11 5}108 \contentsline {subsection}{\numberline {7.1.2}Artificial Systems Ant Colony in Anonymity}{11 6}109 \contentsline {subsection}{\numberline {7.1.3}Conclusion}{11 8}110 \contentsline {section}{\numberline {7.2}Sistema de medici\IeC {\'o}n alternativo}{1 20}111 \contentsline {subsection}{\numberline {7.2.1}Introduction}{1 20}112 \contentsline {subsection}{\numberline {7.2.2}Related work}{1 21}113 \contentsline {subsection}{\numberline {7.2.3}Proposal}{12 2}114 \contentsline {subsubsection}{Root Squared Mean Error - RSME}{12 2}115 \contentsline {subsubsection}{Jennesen-Shannon divergence}{12 2}116 \contentsline {subsubsection}{Results}{12 3}57 \contentsline {section}{\numberline {2.25}Gesti\IeC {\'o}n de Incidentes de seguridad}{63} 58 \contentsline {subsection}{\numberline {2.25.1}Antes del incidente de seguridad:}{63} 59 \contentsline {subsection}{\numberline {2.25.2}Durante el incidente de seguridad:}{64} 60 \contentsline {subsection}{\numberline {2.25.3}Despu\IeC {\'e}s del incidente de seguridad:}{65} 61 \contentsline {section}{\numberline {2.26}Plan de Recuperaci\IeC {\'o}n antes Desastres}{65} 62 \contentsline {section}{\numberline {2.27}Seguridad en redes}{66} 63 \contentsline {chapter}{\numberline {3}Privacidad}{67} 64 \contentsline {section}{\numberline {3.1}Definici\IeC {\'o}n y pol\IeC {\'\i }ticas de privacidad}{67} 65 \contentsline {section}{\numberline {3.2}T\IeC {\'e}cnicas para proporcionar privacidad}{67} 66 \contentsline {subsection}{\numberline {3.2.1}Anonimato}{67} 67 \contentsline {subsubsection}{Redes de mezcla}{67} 68 \contentsline {subsubsection}{Enrutamiento cebolla}{67} 69 \contentsline {chapter}{\numberline {4}Fundamentos Jur\IeC {\'\i }dicos}{69} 70 \contentsline {section}{\numberline {4.1}El ordenamiento jur\IeC {\'\i }dico venezolano y las nuevas tecnolog\IeC {\'\i }as de la informaci\IeC {\'o}n}{69} 71 \contentsline {subsection}{\numberline {4.1.1}Ley de Mensajes de Datos y Firmas Electr\IeC {\'o}nicas, Ley de Infogobierno, Ley de Interoperabilidad y Ley Especial Contra los Delitos Inform\IeC {\'a}ticos}{69} 72 \contentsline {section}{\numberline {4.2}La insuficiencia de las regulaciones jur\IeC {\'\i }dicas existentes}{69} 73 \contentsline {part}{II\hspace {1em}Aportes de CENDITEL en la Seguridad vinculada a la Identidad Digital en las TIC}{71} 74 \contentsline {chapter}{\numberline {5}Certificaci\IeC {\'o}n Electr\IeC {\'o}nica}{73} 75 \contentsline {section}{\numberline {5.1}Introducci\'on}{74} 76 \contentsline {section}{\numberline {5.2}Marco Te'orico}{75} 77 \contentsline {subsection}{\numberline {5.2.1}Seguridad Inform\'atica}{75} 78 \contentsline {subsection}{\numberline {5.2.2}Criptograf\'ia}{76} 79 \contentsline {subsection}{\numberline {5.2.3}Certificados digitales}{77} 80 \contentsline {subsection}{\numberline {5.2.4}Est\'andar X.509}{77} 81 \contentsline {subsection}{\numberline {5.2.5}Lenguaje Unificado de Modelado}{79} 82 \contentsline {subsection}{\numberline {5.2.6}Software Libre}{80} 83 \contentsline {section}{\numberline {5.3}Infraestructura de Clave P\'ublica}{80} 84 \contentsline {subsection}{\numberline {5.3.1}Componentes de la Infraestructura de Claves P\'ublica (ICP)}{81} 85 \contentsline {section}{\numberline {5.4}Desarrollo de la aplicaci\'on}{82} 86 \contentsline {subsection}{\numberline {5.4.1}Conceptualizaci\'on}{82} 87 \contentsline {subsection}{\numberline {5.4.2}Dise\~no}{83} 88 \contentsline {subsection}{\numberline {5.4.3}Implementaci\'on}{85} 89 \contentsline {subsection}{\numberline {5.4.4}Pruebas}{87} 90 \contentsline {subsection}{\numberline {5.4.5}Despliegue y configuraci\'on}{88} 91 \contentsline {section}{\numberline {5.5}Conclusiones}{89} 92 \contentsline {section}{\numberline {5.6}Glosario}{90} 93 \contentsline {chapter}{\numberline {6}Firmas Electr\IeC {\'o}nicas}{93} 94 \contentsline {section}{\numberline {6.1}Introducci\IeC {\'o}n}{93} 95 \contentsline {section}{\numberline {6.2}El modelo actual de Firma Electr\IeC {\'o}nica}{94} 96 \contentsline {section}{\numberline {6.3}Antecedentes}{96} 97 \contentsline {section}{\numberline {6.4}Acoplamiento de la Firma Electr\IeC {\'o}nica Avanzada}{97} 98 \contentsline {subsection}{\numberline {6.4.1}Componente de Firma Electr\IeC {\'o}nica Avanzada}{97} 99 \contentsline {subsection}{\numberline {6.4.2}M\IeC {\'e}todo de conex\IeC {\'\i }\IeC {\'o}n}{99} 100 \contentsline {section}{\numberline {6.5}Casos de estudio}{101} 101 \contentsline {subsection}{\numberline {6.5.1}Caso OpenERP }{102} 102 \contentsline {subsection}{\numberline {6.5.2}Caso SAID}{104} 103 \contentsline {subsection}{\numberline {6.5.3}Caso Flujos de Trabajo}{105} 104 \contentsline {section}{\numberline {6.6}Conclusiones}{106} 105 \contentsline {chapter}{\numberline {7}Anonimato}{113} 106 \contentsline {section}{\numberline {7.1}Modelo de protocolo para un sistema an\IeC {\'o}nimo basado en estrategias bio-inspiradas}{113} 107 \contentsline {subsection}{\numberline {7.1.1}Introduction}{113} 108 \contentsline {subsection}{\numberline {7.1.2}Artificial Systems Ant Colony in Anonymity}{114} 109 \contentsline {subsection}{\numberline {7.1.3}Conclusion}{116} 110 \contentsline {section}{\numberline {7.2}Sistema de medici\IeC {\'o}n alternativo}{118} 111 \contentsline {subsection}{\numberline {7.2.1}Introduction}{118} 112 \contentsline {subsection}{\numberline {7.2.2}Related work}{119} 113 \contentsline {subsection}{\numberline {7.2.3}Proposal}{120} 114 \contentsline {subsubsection}{Root Squared Mean Error - RSME}{120} 115 \contentsline {subsubsection}{Jennesen-Shannon divergence}{120} 116 \contentsline {subsubsection}{Results}{121}
Note: See TracChangeset
for help on using the changeset viewer.