“Information Security: Proposal for a VLAN Network Model “

Descripción del Articulo

“This article consists of the implementation of a VLAN network in the Hospital Central FAP. The objective is to increase information security, as well as to improve and optimize user data, and this is achieved through the development and use of different protocols, restrictions, and methods that hel...

Descripción completa

Detalles Bibliográficos
Autores: Rodas Cortijo, Carmen Liliana, Llallahue Callañaupa, Daniel, Andrade-Arenas, Laberiano, CabanillasCarbonell, Michael
Formato: artículo
Fecha de Publicación:2023
Institución:Universidad Privada Norbert Wiener
Repositorio:UWIENER-Institucional
Lenguaje:inglés
OAI Identifier:oai:repositorio.uwiener.edu.pe:20.500.13053/9230
Enlace del recurso:https://hdl.handle.net/20.500.13053/9230
Nivel de acceso:acceso abierto
Materia:Atlas Ti22, Information security, Network topology, Top-down methodology, VLAN Network, VLSM.
1.02.00 -- Informática y Ciencias de la Información
id UWIE_791b516004d34284ad07b1bc54dce708
oai_identifier_str oai:repositorio.uwiener.edu.pe:20.500.13053/9230
network_acronym_str UWIE
network_name_str UWIENER-Institucional
repository_id_str 9398
dc.title.es_PE.fl_str_mv “Information Security: Proposal for a VLAN Network Model “
title “Information Security: Proposal for a VLAN Network Model “
spellingShingle “Information Security: Proposal for a VLAN Network Model “
Rodas Cortijo, Carmen Liliana
Atlas Ti22, Information security, Network topology, Top-down methodology, VLAN Network, VLSM.
1.02.00 -- Informática y Ciencias de la Información
title_short “Information Security: Proposal for a VLAN Network Model “
title_full “Information Security: Proposal for a VLAN Network Model “
title_fullStr “Information Security: Proposal for a VLAN Network Model “
title_full_unstemmed “Information Security: Proposal for a VLAN Network Model “
title_sort “Information Security: Proposal for a VLAN Network Model “
author Rodas Cortijo, Carmen Liliana
author_facet Rodas Cortijo, Carmen Liliana
Llallahue Callañaupa, Daniel
Andrade-Arenas, Laberiano
CabanillasCarbonell, Michael
author_role author
author2 Llallahue Callañaupa, Daniel
Andrade-Arenas, Laberiano
CabanillasCarbonell, Michael
author2_role author
author
author
dc.contributor.author.fl_str_mv Rodas Cortijo, Carmen Liliana
Llallahue Callañaupa, Daniel
Andrade-Arenas, Laberiano
CabanillasCarbonell, Michael
dc.subject.es_PE.fl_str_mv Atlas Ti22, Information security, Network topology, Top-down methodology, VLAN Network, VLSM.
topic Atlas Ti22, Information security, Network topology, Top-down methodology, VLAN Network, VLSM.
1.02.00 -- Informática y Ciencias de la Información
dc.subject.ocde.es_PE.fl_str_mv 1.02.00 -- Informática y Ciencias de la Información
description “This article consists of the implementation of a VLAN network in the Hospital Central FAP. The objective is to increase information security, as well as to improve and optimize user data, and this is achieved through the development and use of different protocols, restrictions, and methods that helped to achieve this purpose. Likewise, the article uses the Topdown methodology, which has phases focused on analyzing, developing, and improving the different processes for designing and implementing a VLAN network topology. As a technique, an interview was conducted with the person who, through a series of questions, expressed their opinion on the hospital's problems under study. Data processing was carried out at a qualitative level using Atlas Ti22 software, which allowed the analysis of the perception of 6 people with direct knowledge of the hospital's problems. This information was used to obtain the data for the research work. The result was a high degree of deficiency and disagreement with the system they are currently using. They explained that their data were violated, generating concern among users and all the staff. In addition, the conclusion obtained was that in view of the existing problems, the experts indicated that the proposal related to the implementation of a VLAN Network would meet the desired expectations, providing security to the information, so they consider it a feasible and appropriate option that would be a great alternative for the improvement of the hospital.“
publishDate 2023
dc.date.accessioned.none.fl_str_mv 2023-08-29T14:42:24Z
dc.date.available.none.fl_str_mv 2023-08-29T14:42:24Z
dc.date.issued.fl_str_mv 2023-04
dc.type.es_PE.fl_str_mv info:eu-repo/semantics/article
dc.type.version.es_PE.fl_str_mv info:eu-repo/semantics/publishedVersion
format article
status_str publishedVersion
dc.identifier.uri.none.fl_str_mv https://hdl.handle.net/20.500.13053/9230
dc.identifier.doi.none.fl_str_mv 10.14445/22315381/IJETT-V71I4P204
url https://hdl.handle.net/20.500.13053/9230
identifier_str_mv 10.14445/22315381/IJETT-V71I4P204
dc.language.iso.es_PE.fl_str_mv eng
language eng
dc.rights.es_PE.fl_str_mv info:eu-repo/semantics/openAccess
dc.rights.uri.es_PE.fl_str_mv https://creativecommons.org/licenses/by/4.0/
eu_rights_str_mv openAccess
rights_invalid_str_mv https://creativecommons.org/licenses/by/4.0/
dc.format.es_PE.fl_str_mv application/pdf
dc.publisher.es_PE.fl_str_mv Seventh Sense Research Group
dc.publisher.country.es_PE.fl_str_mv IND
dc.source.none.fl_str_mv reponame:UWIENER-Institucional
instname:Universidad Privada Norbert Wiener
instacron:UWIENER
instname_str Universidad Privada Norbert Wiener
instacron_str UWIENER
institution UWIENER
reponame_str UWIENER-Institucional
collection UWIENER-Institucional
bitstream.url.fl_str_mv https://dspace-uwiener.metabuscador.org/bitstreams/40d9ef49-d8b4-4e67-8be1-5a49c5fa2424/download
https://dspace-uwiener.metabuscador.org/bitstreams/a1fd8eb2-2745-439a-8ecc-394851a86621/download
https://dspace-uwiener.metabuscador.org/bitstreams/39ff8d17-ed11-4566-a49a-5637f38311e6/download
https://dspace-uwiener.metabuscador.org/bitstreams/4432dd01-3dd9-4818-8978-3ee53680ff01/download
bitstream.checksum.fl_str_mv 0ae19570011fe5dc10b059b4846588db
9a4eed61989301c9b06885d8bee9057e
553aecc4b31544ddae55bd7c10414320
8a4605be74aa9ea9d79846c1fba20a33
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
MD5
MD5
repository.name.fl_str_mv Repositorio Institucional de la Universidad de Wiener
repository.mail.fl_str_mv bdigital@metabiblioteca.com
_version_ 1835828761243680768
spelling Rodas Cortijo, Carmen LilianaLlallahue Callañaupa, DanielAndrade-Arenas, LaberianoCabanillasCarbonell, Michael2023-08-29T14:42:24Z2023-08-29T14:42:24Z2023-04https://hdl.handle.net/20.500.13053/923010.14445/22315381/IJETT-V71I4P204“This article consists of the implementation of a VLAN network in the Hospital Central FAP. The objective is to increase information security, as well as to improve and optimize user data, and this is achieved through the development and use of different protocols, restrictions, and methods that helped to achieve this purpose. Likewise, the article uses the Topdown methodology, which has phases focused on analyzing, developing, and improving the different processes for designing and implementing a VLAN network topology. As a technique, an interview was conducted with the person who, through a series of questions, expressed their opinion on the hospital's problems under study. Data processing was carried out at a qualitative level using Atlas Ti22 software, which allowed the analysis of the perception of 6 people with direct knowledge of the hospital's problems. This information was used to obtain the data for the research work. The result was a high degree of deficiency and disagreement with the system they are currently using. They explained that their data were violated, generating concern among users and all the staff. In addition, the conclusion obtained was that in view of the existing problems, the experts indicated that the proposal related to the implementation of a VLAN Network would meet the desired expectations, providing security to the information, so they consider it a feasible and appropriate option that would be a great alternative for the improvement of the hospital.“application/pdfengSeventh Sense Research GroupINDinfo:eu-repo/semantics/openAccesshttps://creativecommons.org/licenses/by/4.0/Atlas Ti22, Information security, Network topology, Top-down methodology, VLAN Network, VLSM.1.02.00 -- Informática y Ciencias de la Información“Information Security: Proposal for a VLAN Network Model “info:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionreponame:UWIENER-Institucionalinstname:Universidad Privada Norbert Wienerinstacron:UWIENERPublicationTEXTIJETT-V71I4P204.pdf.txtIJETT-V71I4P204.pdf.txtExtracted texttext/plain47946https://dspace-uwiener.metabuscador.org/bitstreams/40d9ef49-d8b4-4e67-8be1-5a49c5fa2424/download0ae19570011fe5dc10b059b4846588dbMD53THUMBNAILIJETT-V71I4P204.pdf.jpgIJETT-V71I4P204.pdf.jpgGenerated Thumbnailimage/jpeg4541https://dspace-uwiener.metabuscador.org/bitstreams/a1fd8eb2-2745-439a-8ecc-394851a86621/download9a4eed61989301c9b06885d8bee9057eMD54ORIGINALIJETT-V71I4P204.pdfIJETT-V71I4P204.pdfapplication/pdf1994350https://dspace-uwiener.metabuscador.org/bitstreams/39ff8d17-ed11-4566-a49a-5637f38311e6/download553aecc4b31544ddae55bd7c10414320MD51LICENSElicense.txtlicense.txttext/plain; charset=utf-81748https://dspace-uwiener.metabuscador.org/bitstreams/4432dd01-3dd9-4818-8978-3ee53680ff01/download8a4605be74aa9ea9d79846c1fba20a33MD5220.500.13053/9230oai:dspace-uwiener.metabuscador.org:20.500.13053/92302024-12-13 11:43:35.706https://creativecommons.org/licenses/by/4.0/info:eu-repo/semantics/openAccessopen.accesshttps://dspace-uwiener.metabuscador.orgRepositorio Institucional de la Universidad de Wienerbdigital@metabiblioteca.comTk9URTogUExBQ0UgWU9VUiBPV04gTElDRU5TRSBIRVJFClRoaXMgc2FtcGxlIGxpY2Vuc2UgaXMgcHJvdmlkZWQgZm9yIGluZm9ybWF0aW9uYWwgcHVycG9zZXMgb25seS4KCk5PTi1FWENMVVNJVkUgRElTVFJJQlVUSU9OIExJQ0VOU0UKCkJ5IHNpZ25pbmcgYW5kIHN1Ym1pdHRpbmcgdGhpcyBsaWNlbnNlLCB5b3UgKHRoZSBhdXRob3Iocykgb3IgY29weXJpZ2h0Cm93bmVyKSBncmFudHMgdG8gRFNwYWNlIFVuaXZlcnNpdHkgKERTVSkgdGhlIG5vbi1leGNsdXNpdmUgcmlnaHQgdG8gcmVwcm9kdWNlLAp0cmFuc2xhdGUgKGFzIGRlZmluZWQgYmVsb3cpLCBhbmQvb3IgZGlzdHJpYnV0ZSB5b3VyIHN1Ym1pc3Npb24gKGluY2x1ZGluZwp0aGUgYWJzdHJhY3QpIHdvcmxkd2lkZSBpbiBwcmludCBhbmQgZWxlY3Ryb25pYyBmb3JtYXQgYW5kIGluIGFueSBtZWRpdW0sCmluY2x1ZGluZyBidXQgbm90IGxpbWl0ZWQgdG8gYXVkaW8gb3IgdmlkZW8uCgpZb3UgYWdyZWUgdGhhdCBEU1UgbWF5LCB3aXRob3V0IGNoYW5naW5nIHRoZSBjb250ZW50LCB0cmFuc2xhdGUgdGhlCnN1Ym1pc3Npb24gdG8gYW55IG1lZGl1bSBvciBmb3JtYXQgZm9yIHRoZSBwdXJwb3NlIG9mIHByZXNlcnZhdGlvbi4KCllvdSBhbHNvIGFncmVlIHRoYXQgRFNVIG1heSBrZWVwIG1vcmUgdGhhbiBvbmUgY29weSBvZiB0aGlzIHN1Ym1pc3Npb24gZm9yCnB1cnBvc2VzIG9mIHNlY3VyaXR5LCBiYWNrLXVwIGFuZCBwcmVzZXJ2YXRpb24uCgpZb3UgcmVwcmVzZW50IHRoYXQgdGhlIHN1Ym1pc3Npb24gaXMgeW91ciBvcmlnaW5hbCB3b3JrLCBhbmQgdGhhdCB5b3UgaGF2ZQp0aGUgcmlnaHQgdG8gZ3JhbnQgdGhlIHJpZ2h0cyBjb250YWluZWQgaW4gdGhpcyBsaWNlbnNlLiBZb3UgYWxzbyByZXByZXNlbnQKdGhhdCB5b3VyIHN1Ym1pc3Npb24gZG9lcyBub3QsIHRvIHRoZSBiZXN0IG9mIHlvdXIga25vd2xlZGdlLCBpbmZyaW5nZSB1cG9uCmFueW9uZSdzIGNvcHlyaWdodC4KCklmIHRoZSBzdWJtaXNzaW9uIGNvbnRhaW5zIG1hdGVyaWFsIGZvciB3aGljaCB5b3UgZG8gbm90IGhvbGQgY29weXJpZ2h0LAp5b3UgcmVwcmVzZW50IHRoYXQgeW91IGhhdmUgb2J0YWluZWQgdGhlIHVucmVzdHJpY3RlZCBwZXJtaXNzaW9uIG9mIHRoZQpjb3B5cmlnaHQgb3duZXIgdG8gZ3JhbnQgRFNVIHRoZSByaWdodHMgcmVxdWlyZWQgYnkgdGhpcyBsaWNlbnNlLCBhbmQgdGhhdApzdWNoIHRoaXJkLXBhcnR5IG93bmVkIG1hdGVyaWFsIGlzIGNsZWFybHkgaWRlbnRpZmllZCBhbmQgYWNrbm93bGVkZ2VkCndpdGhpbiB0aGUgdGV4dCBvciBjb250ZW50IG9mIHRoZSBzdWJtaXNzaW9uLgoKSUYgVEhFIFNVQk1JU1NJT04gSVMgQkFTRUQgVVBPTiBXT1JLIFRIQVQgSEFTIEJFRU4gU1BPTlNPUkVEIE9SIFNVUFBPUlRFRApCWSBBTiBBR0VOQ1kgT1IgT1JHQU5JWkFUSU9OIE9USEVSIFRIQU4gRFNVLCBZT1UgUkVQUkVTRU5UIFRIQVQgWU9VIEhBVkUKRlVMRklMTEVEIEFOWSBSSUdIVCBPRiBSRVZJRVcgT1IgT1RIRVIgT0JMSUdBVElPTlMgUkVRVUlSRUQgQlkgU1VDSApDT05UUkFDVCBPUiBBR1JFRU1FTlQuCgpEU1Ugd2lsbCBjbGVhcmx5IGlkZW50aWZ5IHlvdXIgbmFtZShzKSBhcyB0aGUgYXV0aG9yKHMpIG9yIG93bmVyKHMpIG9mIHRoZQpzdWJtaXNzaW9uLCBhbmQgd2lsbCBub3QgbWFrZSBhbnkgYWx0ZXJhdGlvbiwgb3RoZXIgdGhhbiBhcyBhbGxvd2VkIGJ5IHRoaXMKbGljZW5zZSwgdG8geW91ciBzdWJtaXNzaW9uLgo=
score 13.919782
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).