Firewall for network security laboratories. Bolivar State University, Ecuador
DOI:
https://doi.org/10.35381/i.p.v5i9.2622Keywords:
Security, computing, echnicians, students, software, (UNESCO thesaurus)Abstract
The objective of the research was to present a proposal to improve network security in the laboratories of the State University of Bolívar. The research was quantitative and descriptive approach. In the results, the mechanisms of both hardware and software that the Laboratory of Systems Engineering currently has in terms of computer security were analyzed and studied, reaching the conclusion that they do not use an adequate firewall with information security policies. It can be concluded that with the surveys carried out, it can be established that the majority of students are completely unaware of their computer security, the technicians do not carry out security updates on the equipment and they do not verify the HTTP certificates on the pages they frequent. The proposed security policies take into account a wide range of services that will be available to internal and external students by improving computer security.
Downloads
References
López C., R. (2016). Diseño de un cortafuegos para bloquear sistemas de evasión de censura de internet basados en proxy. [Design of a firewall to block proxy-based Internet censorship circumvention systems]. Revista de Investigaciones Altoandinas(18), 1-10.
Martínez, T. (2017). Diferencias entre UTM y NGFW, las hay? Obtenido de Telequismo Blog personal: Recuperado de: http://www.telequismo.com/2017/07/utm-ngfw.html/
Miranda, Jezreel Mejia, & Ramirez, Heltton. (2016). Estableciendo controles y perímetro de seguridad para una página web de un CSIRT. RISTI - Revista Ibérica de Sistemas e Tecnologias de Informação, (17), 01-15. https://doi.org/10.17013/risti.17.1-15
North, J. and Pascoe, R. (2016). Cyber security and resilence - it's all about governance. Governance Directions, 68 , 146-151.
Plasencia Moreno, L. &. (2017). Referencial architecture of Big Data for the management of telecommunications. Revista chilena de ingeniería, 566-577.
Roque,R. (2018). Concientización y capacitación para incrementar la seguridad informática en estudiantes universitarios. [Awareness and training to increase computer security in university students]. Revista de tecnología y sociedad PAAKAT, 8(14). Obtenido de http://dx.doi.org/10.32870/Pk.a8n14
Solano, O., Pérez, D., & Bernal, J. (2016). El sistema de información y los mecanismos de seguridad informática en la Pyme. [The information system and computer security mechanisms in SMEs]. Revista Punto de Vista, 7(11), 77-98. https://dialnet.unirioja.es/descarga/articulo/6121657.pdf
Stallings, W., & Brown, L. (2014). Seguranca de computadores: principios e práticas. [Computer security: principles and practices ]. Río de Janeiro: Elsevier Editorial.
Urbina, G. (2016). Introducción a la seguridad informática. [Introduction to computer security ]. México: Grupo Editorial Patria.
Villalón, J. (2013). Firewalls transparentes. [transparent firewalls ].https://n9.cl/1dcz6
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Xavier Efraín Mullo-Pilamunga, Ariel José Romero-Fernández, Gustavo Eduardo Fernández-Villacres, Rita Azucena Díaz-Vásquez

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
CC BY-NC-SA : Esta licencia permite a los reutilizadores distribuir, remezclar, adaptar y construir sobre el material en cualquier medio o formato solo con fines no comerciales, y solo siempre y cuando se dé la atribución al creador. Si remezcla, adapta o construye sobre el material, debe licenciar el material modificado bajo términos idénticos.
OAI-PMH URL: https://fundacionkoinonia.com.ve/ojs/index.php/ingeniumetpotentia/oai