Diseño de un modelo de red de zona perimetral segura para pymes del valle Jequetepeque

Descripción del Articulo

Currently the subject of computer security for small and medium businesses evolve rapidly in our country, being necessary to protect our information from attack either internal or external._x000D_ This paper proposes the design of a network model for SMEs secure perimeter zone Jequetepeque Valley, r...

Descripción completa

Detalles Bibliográficos
Autor: Sánchez Quiroz, Bertha Natalí
Formato: tesis de grado
Fecha de Publicación:2013
Institución:Universidad Nacional de Trujillo
Repositorio:UNITRU-Tesis
Lenguaje:español
OAI Identifier:oai:dspace.unitru.edu.pe:20.500.14414/8331
Enlace del recurso:https://hdl.handle.net/20.500.14414/8331
Nivel de acceso:acceso abierto
Materia:modelo de red, pymes
Descripción
Sumario:Currently the subject of computer security for small and medium businesses evolve rapidly in our country, being necessary to protect our information from attack either internal or external._x000D_ This paper proposes the design of a network model for SMEs secure perimeter zone Jequetepeque Valley, revealing a collection of the aspects most relevant security technology that SMEs currently employ to maximize the benefits Internet offers. It is noted that for safety, it is important that the infrastructure and information resources of the organization must be protected by a security scheme that reduces the levels of vulnerability._x000D_ There are a lot of methods for securing a computer network, one of the most used is the DMZ 'or demilitarized zones. A DMZ or perimeter network is a local network that sits between an organization's internal network and an external network, with the aim that the connections from the internal and external network to the DMZ are permitted, while connections from the DMZ only allow the external network. For the use of security technologies to be effective, must be reinforced by safety standard ISO 17799 and implementing security policies, to define a general framework, methods, procedures and mechanisms of how to handle security for resources, services and systems within SMEs
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).