“Information Security: Proposal for a VLAN Network Model “
Descripción del Articulo
“This article consists of the implementation of a VLAN network in the Hospital Central FAP. The objective is to increase information security, as well as to improve and optimize user data, and this is achieved through the development and use of different protocols, restrictions, and methods that hel...
Autores: | , , , |
---|---|
Formato: | artículo |
Fecha de Publicación: | 2023 |
Institución: | Universidad Privada Norbert Wiener |
Repositorio: | UWIENER-Institucional |
Lenguaje: | inglés |
OAI Identifier: | oai:repositorio.uwiener.edu.pe:20.500.13053/9230 |
Enlace del recurso: | https://hdl.handle.net/20.500.13053/9230 |
Nivel de acceso: | acceso abierto |
Materia: | Atlas Ti22, Information security, Network topology, Top-down methodology, VLAN Network, VLSM. 1.02.00 -- Informática y Ciencias de la Información |
id |
UWIE_791b516004d34284ad07b1bc54dce708 |
---|---|
oai_identifier_str |
oai:repositorio.uwiener.edu.pe:20.500.13053/9230 |
network_acronym_str |
UWIE |
network_name_str |
UWIENER-Institucional |
repository_id_str |
9398 |
dc.title.es_PE.fl_str_mv |
“Information Security: Proposal for a VLAN Network Model “ |
title |
“Information Security: Proposal for a VLAN Network Model “ |
spellingShingle |
“Information Security: Proposal for a VLAN Network Model “ Rodas Cortijo, Carmen Liliana Atlas Ti22, Information security, Network topology, Top-down methodology, VLAN Network, VLSM. 1.02.00 -- Informática y Ciencias de la Información |
title_short |
“Information Security: Proposal for a VLAN Network Model “ |
title_full |
“Information Security: Proposal for a VLAN Network Model “ |
title_fullStr |
“Information Security: Proposal for a VLAN Network Model “ |
title_full_unstemmed |
“Information Security: Proposal for a VLAN Network Model “ |
title_sort |
“Information Security: Proposal for a VLAN Network Model “ |
author |
Rodas Cortijo, Carmen Liliana |
author_facet |
Rodas Cortijo, Carmen Liliana Llallahue Callañaupa, Daniel Andrade-Arenas, Laberiano CabanillasCarbonell, Michael |
author_role |
author |
author2 |
Llallahue Callañaupa, Daniel Andrade-Arenas, Laberiano CabanillasCarbonell, Michael |
author2_role |
author author author |
dc.contributor.author.fl_str_mv |
Rodas Cortijo, Carmen Liliana Llallahue Callañaupa, Daniel Andrade-Arenas, Laberiano CabanillasCarbonell, Michael |
dc.subject.es_PE.fl_str_mv |
Atlas Ti22, Information security, Network topology, Top-down methodology, VLAN Network, VLSM. |
topic |
Atlas Ti22, Information security, Network topology, Top-down methodology, VLAN Network, VLSM. 1.02.00 -- Informática y Ciencias de la Información |
dc.subject.ocde.es_PE.fl_str_mv |
1.02.00 -- Informática y Ciencias de la Información |
description |
“This article consists of the implementation of a VLAN network in the Hospital Central FAP. The objective is to increase information security, as well as to improve and optimize user data, and this is achieved through the development and use of different protocols, restrictions, and methods that helped to achieve this purpose. Likewise, the article uses the Topdown methodology, which has phases focused on analyzing, developing, and improving the different processes for designing and implementing a VLAN network topology. As a technique, an interview was conducted with the person who, through a series of questions, expressed their opinion on the hospital's problems under study. Data processing was carried out at a qualitative level using Atlas Ti22 software, which allowed the analysis of the perception of 6 people with direct knowledge of the hospital's problems. This information was used to obtain the data for the research work. The result was a high degree of deficiency and disagreement with the system they are currently using. They explained that their data were violated, generating concern among users and all the staff. In addition, the conclusion obtained was that in view of the existing problems, the experts indicated that the proposal related to the implementation of a VLAN Network would meet the desired expectations, providing security to the information, so they consider it a feasible and appropriate option that would be a great alternative for the improvement of the hospital.“ |
publishDate |
2023 |
dc.date.accessioned.none.fl_str_mv |
2023-08-29T14:42:24Z |
dc.date.available.none.fl_str_mv |
2023-08-29T14:42:24Z |
dc.date.issued.fl_str_mv |
2023-04 |
dc.type.es_PE.fl_str_mv |
info:eu-repo/semantics/article |
dc.type.version.es_PE.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
format |
article |
status_str |
publishedVersion |
dc.identifier.uri.none.fl_str_mv |
https://hdl.handle.net/20.500.13053/9230 |
dc.identifier.doi.none.fl_str_mv |
10.14445/22315381/IJETT-V71I4P204 |
url |
https://hdl.handle.net/20.500.13053/9230 |
identifier_str_mv |
10.14445/22315381/IJETT-V71I4P204 |
dc.language.iso.es_PE.fl_str_mv |
eng |
language |
eng |
dc.rights.es_PE.fl_str_mv |
info:eu-repo/semantics/openAccess |
dc.rights.uri.es_PE.fl_str_mv |
https://creativecommons.org/licenses/by/4.0/ |
eu_rights_str_mv |
openAccess |
rights_invalid_str_mv |
https://creativecommons.org/licenses/by/4.0/ |
dc.format.es_PE.fl_str_mv |
application/pdf |
dc.publisher.es_PE.fl_str_mv |
Seventh Sense Research Group |
dc.publisher.country.es_PE.fl_str_mv |
IND |
dc.source.none.fl_str_mv |
reponame:UWIENER-Institucional instname:Universidad Privada Norbert Wiener instacron:UWIENER |
instname_str |
Universidad Privada Norbert Wiener |
instacron_str |
UWIENER |
institution |
UWIENER |
reponame_str |
UWIENER-Institucional |
collection |
UWIENER-Institucional |
bitstream.url.fl_str_mv |
https://dspace-uwiener.metabuscador.org/bitstreams/40d9ef49-d8b4-4e67-8be1-5a49c5fa2424/download https://dspace-uwiener.metabuscador.org/bitstreams/a1fd8eb2-2745-439a-8ecc-394851a86621/download https://dspace-uwiener.metabuscador.org/bitstreams/39ff8d17-ed11-4566-a49a-5637f38311e6/download https://dspace-uwiener.metabuscador.org/bitstreams/4432dd01-3dd9-4818-8978-3ee53680ff01/download |
bitstream.checksum.fl_str_mv |
0ae19570011fe5dc10b059b4846588db 9a4eed61989301c9b06885d8bee9057e 553aecc4b31544ddae55bd7c10414320 8a4605be74aa9ea9d79846c1fba20a33 |
bitstream.checksumAlgorithm.fl_str_mv |
MD5 MD5 MD5 MD5 |
repository.name.fl_str_mv |
Repositorio Institucional de la Universidad de Wiener |
repository.mail.fl_str_mv |
bdigital@metabiblioteca.com |
_version_ |
1835828761243680768 |
spelling |
Rodas Cortijo, Carmen LilianaLlallahue Callañaupa, DanielAndrade-Arenas, LaberianoCabanillasCarbonell, Michael2023-08-29T14:42:24Z2023-08-29T14:42:24Z2023-04https://hdl.handle.net/20.500.13053/923010.14445/22315381/IJETT-V71I4P204“This article consists of the implementation of a VLAN network in the Hospital Central FAP. The objective is to increase information security, as well as to improve and optimize user data, and this is achieved through the development and use of different protocols, restrictions, and methods that helped to achieve this purpose. Likewise, the article uses the Topdown methodology, which has phases focused on analyzing, developing, and improving the different processes for designing and implementing a VLAN network topology. As a technique, an interview was conducted with the person who, through a series of questions, expressed their opinion on the hospital's problems under study. Data processing was carried out at a qualitative level using Atlas Ti22 software, which allowed the analysis of the perception of 6 people with direct knowledge of the hospital's problems. This information was used to obtain the data for the research work. The result was a high degree of deficiency and disagreement with the system they are currently using. They explained that their data were violated, generating concern among users and all the staff. In addition, the conclusion obtained was that in view of the existing problems, the experts indicated that the proposal related to the implementation of a VLAN Network would meet the desired expectations, providing security to the information, so they consider it a feasible and appropriate option that would be a great alternative for the improvement of the hospital.“application/pdfengSeventh Sense Research GroupINDinfo:eu-repo/semantics/openAccesshttps://creativecommons.org/licenses/by/4.0/Atlas Ti22, Information security, Network topology, Top-down methodology, VLAN Network, VLSM.1.02.00 -- Informática y Ciencias de la Información“Information Security: Proposal for a VLAN Network Model “info:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionreponame:UWIENER-Institucionalinstname:Universidad Privada Norbert Wienerinstacron:UWIENERPublicationTEXTIJETT-V71I4P204.pdf.txtIJETT-V71I4P204.pdf.txtExtracted texttext/plain47946https://dspace-uwiener.metabuscador.org/bitstreams/40d9ef49-d8b4-4e67-8be1-5a49c5fa2424/download0ae19570011fe5dc10b059b4846588dbMD53THUMBNAILIJETT-V71I4P204.pdf.jpgIJETT-V71I4P204.pdf.jpgGenerated Thumbnailimage/jpeg4541https://dspace-uwiener.metabuscador.org/bitstreams/a1fd8eb2-2745-439a-8ecc-394851a86621/download9a4eed61989301c9b06885d8bee9057eMD54ORIGINALIJETT-V71I4P204.pdfIJETT-V71I4P204.pdfapplication/pdf1994350https://dspace-uwiener.metabuscador.org/bitstreams/39ff8d17-ed11-4566-a49a-5637f38311e6/download553aecc4b31544ddae55bd7c10414320MD51LICENSElicense.txtlicense.txttext/plain; charset=utf-81748https://dspace-uwiener.metabuscador.org/bitstreams/4432dd01-3dd9-4818-8978-3ee53680ff01/download8a4605be74aa9ea9d79846c1fba20a33MD5220.500.13053/9230oai:dspace-uwiener.metabuscador.org:20.500.13053/92302024-12-13 11:43:35.706https://creativecommons.org/licenses/by/4.0/info:eu-repo/semantics/openAccessopen.accesshttps://dspace-uwiener.metabuscador.orgRepositorio Institucional de la Universidad de Wienerbdigital@metabiblioteca.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 |
score |
13.919782 |
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).