Sistema de seguridad perimetral para mejorar performance de una red de datos empresarial
Descripción del Articulo
In Chapter I, the introduction to the whole thesis, which is presented as problematic inter alia, objectives, variables which help us to the understanding of it is detailed._x000D_ In Chapter II, we proceed to describe the theoretical framework of the thesis which is useful to the growth and further...
Autores: | , |
---|---|
Formato: | tesis de grado |
Fecha de Publicación: | 2014 |
Institución: | Universidad Nacional de Trujillo |
Repositorio: | UNITRU-Tesis |
Lenguaje: | español |
OAI Identifier: | oai:dspace.unitru.edu.pe:20.500.14414/11303 |
Enlace del recurso: | https://hdl.handle.net/20.500.14414/11303 |
Nivel de acceso: | acceso abierto |
Materia: | Seguridad perimetral Red de datos |
Sumario: | In Chapter I, the introduction to the whole thesis, which is presented as problematic inter alia, objectives, variables which help us to the understanding of it is detailed._x000D_ In Chapter II, we proceed to describe the theoretical framework of the thesis which is useful to the growth and further development. The description of the physical and logical network equipment is performed. Within management, the way indicated as currently manages the network, showing its weaknesses, threats and risks._x000D_ In Chapter III, we proceed to describe the methodology to be developed by the thesis, since her achieve evaluate possible solutions and / or problems which are detailed, selecting samples and collecting data. In addition to the goals set by fixed security methodology._x000D_ This chapter IV, we proceed with the development of the methodology, where security policies were formulated, analysis and requirements, plus software tools for monitoring equipment and additional hardware needed to implement the management model also suggests . As well as, issues related to quality of service, disaster recovery and technical failures are taken; and patterns of how the system will overcome them is established._x000D_ As the final part of Chapter IV discusses the implications for the future management model standard that is proposed to be developed in the company, ie how this model will ensure the scalability of both the management model, and hardware and software network so that they continue to meet the standards required by the company under its technological and organizational requirements._x000D_ In the last chapter, Chapter V and VI the results, conclusions and suggestions obtained with the development of this project is elaborated |
---|
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).