Mostrar el registro sencillo del ítem

dc.contributor.advisorQuintero, jhon Fredy
dc.coverage.spatialcead_-_josé_celestino_mutis
dc.creatorMonsalve Gualteros, Mariana Sofia
dc.date.accessioned2024-04-11T16:27:51Z
dc.date.available2024-04-11T16:27:51Z
dc.date.created2024-03-07
dc.identifier.urihttps://repository.unad.edu.co/handle/10596/60682
dc.description.abstractEste trabajo ha sido desarrollado específicamente entre las políticas de seguridad, la implementación de las normas técnicas y la implementación de herramientas de ciberseguridad, analizar las posibles vulneraciones y/o violaciones a las leyes, investigar que acuerdos se apegan a la norma y cuales no, verificar la sintaxis de si se puede o no contratar, realizar acuerdos de confidencialidad con Hackerhouse. Durante el desarrollo de este trabajo se desarrollaron varias habilidades como poder estudiar el tipo de vulnerabilidades a las cuales se esta expuesto en el dia a dia. El informe subraya la necesidad de un enfoque equilibrado que combine políticas sólidas con medidas técnicas efectivas.
dc.formatpdf
dc.titleEquipos estrategicos en ciberseguridad read team & blue team
dc.typeDiplomado de profundización para grado
dc.subject.keywordsHackerHouse
dc.subject.keywordsImplementación
dc.subject.keywordsCiberseguridad
dc.subject.keywordsEquipos Blue Team
dc.subject.keywordsRed Team / Purple Team
dc.description.abstractenglishIn today's digital age, cybersecurity has become a fundamental pillar of risk management in the business environment. The increasing dependence on information technology and global interconnection have provided countless opportunities, but they have also exposed companies to a landscape of threats cybernetics in constant evolution. In this context, business cybersecurity has become essential to protect digital assets, maintain the confidentiality of information and guarantee the continuity of the operation. This white paper focuses on the essential interaction between security and technical implementation in the context of enterprise cybersecurity. Security policies are documents that establish guidelines and procedures governing the protection of critical information and assets of a company organization. However, these policies only come to life through the application of concrete technical measures. Enterprise cybersecurity is not simply a a question of guidelines and rules, but a synergy between policy guidance and technical action. Security policies are the regulatory framework that guides decision making regarding the protection of information and systems. These policies establish clear standards and expectations for employees and other technology users. Without However, the effectiveness of these policies ultimately depends on their technical implementation. Strong technical measures support and bring policies to life, ensuring that regulations are met and that digital assets are protected from effective way.


Ficheros en el ítem

Thumbnail

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem