Mostrar el registro sencillo del ítem
Equipos estrategicos en ciberseguridad read team & blue team
| dc.contributor.advisor | Quintero, jhon Fredy | |
| dc.coverage.spatial | cead_-_josé_celestino_mutis | |
| dc.creator | Monsalve Gualteros, Mariana Sofia | |
| dc.date.accessioned | 2024-04-11T16:27:51Z | |
| dc.date.available | 2024-04-11T16:27:51Z | |
| dc.date.created | 2024-03-07 | |
| dc.identifier.uri | https://repository.unad.edu.co/handle/10596/60682 | |
| dc.description.abstract | Este trabajo ha sido desarrollado específicamente entre las políticas de seguridad, la implementación de las normas técnicas y la implementación de herramientas de ciberseguridad, analizar las posibles vulneraciones y/o violaciones a las leyes, investigar que acuerdos se apegan a la norma y cuales no, verificar la sintaxis de si se puede o no contratar, realizar acuerdos de confidencialidad con Hackerhouse. Durante el desarrollo de este trabajo se desarrollaron varias habilidades como poder estudiar el tipo de vulnerabilidades a las cuales se esta expuesto en el dia a dia. El informe subraya la necesidad de un enfoque equilibrado que combine políticas sólidas con medidas técnicas efectivas. | |
| dc.format | ||
| dc.title | Equipos estrategicos en ciberseguridad read team & blue team | |
| dc.type | Diplomado de profundización para grado | |
| dc.subject.keywords | HackerHouse | |
| dc.subject.keywords | Implementación | |
| dc.subject.keywords | Ciberseguridad | |
| dc.subject.keywords | Equipos Blue Team | |
| dc.subject.keywords | Red Team / Purple Team | |
| dc.description.abstractenglish | In today's digital age, cybersecurity has become a fundamental pillar of risk management in the business environment. The increasing dependence on information technology and global interconnection have provided countless opportunities, but they have also exposed companies to a landscape of threats cybernetics in constant evolution. In this context, business cybersecurity has become essential to protect digital assets, maintain the confidentiality of information and guarantee the continuity of the operation. This white paper focuses on the essential interaction between security and technical implementation in the context of enterprise cybersecurity. Security policies are documents that establish guidelines and procedures governing the protection of critical information and assets of a company organization. However, these policies only come to life through the application of concrete technical measures. Enterprise cybersecurity is not simply a a question of guidelines and rules, but a synergy between policy guidance and technical action. Security policies are the regulatory framework that guides decision making regarding the protection of information and systems. These policies establish clear standards and expectations for employees and other technology users. Without However, the effectiveness of these policies ultimately depends on their technical implementation. Strong technical measures support and bring policies to life, ensuring that regulations are met and that digital assets are protected from effective way. |






















