Firewall for network security laboratories. Bolivar State University, Ecuador

Authors

DOI:

https://doi.org/10.35381/i.p.v5i9.2622

Keywords:

Security, computing, echnicians, students, software, (UNESCO thesaurus)

Abstract

The objective of the research was to present a proposal to improve network security in the laboratories of the State University of Bolívar. The research was quantitative and descriptive approach. In the results, the mechanisms of both hardware and software that the Laboratory of Systems Engineering currently has in terms of computer security were analyzed and studied, reaching the conclusion that they do not use an adequate firewall with information security policies. It can be concluded that with the surveys carried out, it can be established that the majority of students are completely unaware of their computer security, the technicians do not carry out security updates on the equipment and they do not verify the HTTP certificates on the pages they frequent. The proposed security policies take into account a wide range of services that will be available to internal and external students by improving computer security.

Downloads

Download data is not yet available.

References

López C., R. (2016). Diseño de un cortafuegos para bloquear sistemas de evasión de censura de internet basados en proxy. [Design of a firewall to block proxy-based Internet censorship circumvention systems]. Revista de Investigaciones Altoandinas(18), 1-10.

Martínez, T. (2017). Diferencias entre UTM y NGFW, las hay? Obtenido de Telequismo Blog personal: Recuperado de: http://www.telequismo.com/2017/07/utm-ngfw.html/

Miranda, Jezreel Mejia, & Ramirez, Heltton. (2016). Estableciendo controles y perímetro de seguridad para una página web de un CSIRT. RISTI - Revista Ibérica de Sistemas e Tecnologias de Informação, (17), 01-15. https://doi.org/10.17013/risti.17.1-15

North, J. and Pascoe, R. (2016). Cyber security and resilence - it's all about governance. Governance Directions, 68 , 146-151.

Plasencia Moreno, L. &. (2017). Referencial architecture of Big Data for the management of telecommunications. Revista chilena de ingeniería, 566-577.

Roque,R. (2018). Concientización y capacitación para incrementar la seguridad informática en estudiantes universitarios. [Awareness and training to increase computer security in university students]. Revista de tecnología y sociedad PAAKAT, 8(14). Obtenido de http://dx.doi.org/10.32870/Pk.a8n14

Solano, O., Pérez, D., & Bernal, J. (2016). El sistema de información y los mecanismos de seguridad informática en la Pyme. [The information system and computer security mechanisms in SMEs]. Revista Punto de Vista, 7(11), 77-98. https://dialnet.unirioja.es/descarga/articulo/6121657.pdf

Stallings, W., & Brown, L. (2014). Seguranca de computadores: principios e práticas. [Computer security: principles and practices ]. Río de Janeiro: Elsevier Editorial.

Urbina, G. (2016). Introducción a la seguridad informática. [Introduction to computer security ]. México: Grupo Editorial Patria.

Villalón, J. (2013). Firewalls transparentes. [transparent firewalls ].https://n9.cl/1dcz6

Published

2023-07-31

How to Cite

Mullo-Pilamunga, X. E., Romero-Fernández, A. J., Fernández-Villacres, G. E., & Díaz-Vásquez, R. A. (2023). Firewall for network security laboratories. Bolivar State University, Ecuador. Ingenium Et Potentia, 5(9), 111–123. https://doi.org/10.35381/i.p.v5i9.2622

Issue

Section

De Investigación

Most read articles by the same author(s)

1 2 3 4 5 6 7 8 9 10 > >>