| dc.contributor.advisor | Quintero, jhon Fredy | |
| dc.coverage.spatial | cead_-_josé_celestino_mutis | |
| dc.creator | Monsalve Gualteros, Mariana Sofia | |
| dc.date.accessioned | 2024-04-11T16:27:51Z | |
| dc.date.available | 2024-04-11T16:27:51Z | |
| dc.date.created | 2024-03-07 | |
| dc.identifier.uri | https://repository.unad.edu.co/handle/10596/60682 | |
| dc.description.abstract | Este trabajo ha sido desarrollado específicamente entre las políticas de seguridad, la implementación de las normas técnicas y la implementación de herramientas de ciberseguridad, analizar las posibles vulneraciones y/o violaciones a las leyes, investigar que acuerdos se apegan a la norma y cuales no, verificar la sintaxis de si se puede o no contratar, realizar acuerdos de confidencialidad con Hackerhouse. Durante el desarrollo de este trabajo se desarrollaron varias habilidades como poder estudiar el tipo de vulnerabilidades a las cuales se esta expuesto en el dia a dia. El informe subraya la necesidad de un enfoque equilibrado que combine políticas sólidas con medidas técnicas efectivas. | |
| dc.format | pdf | |
| dc.title | Equipos estrategicos en ciberseguridad read team & blue team | |
| dc.type | Diplomado de profundización para grado | |
| dc.subject.keywords | HackerHouse | |
| dc.subject.keywords | Implementación | |
| dc.subject.keywords | Ciberseguridad | |
| dc.subject.keywords | Equipos Blue Team | |
| dc.subject.keywords | Red Team / Purple Team | |
| dc.description.abstractenglish | In today's digital age, cybersecurity has become a fundamental pillar
of risk management in the business environment. The increasing dependence on
information technology and global interconnection have provided countless
opportunities, but they have also exposed companies to a landscape of threats
cybernetics in constant evolution. In this context, business cybersecurity has
become essential to protect digital assets, maintain the confidentiality of
information and guarantee the continuity of the operation.
This white paper focuses on the essential interaction between
security and technical implementation in the context of enterprise cybersecurity.
Security policies are documents that establish guidelines and
procedures governing the protection of critical information and assets of a company
organization. However, these policies only come to life through the application of
concrete technical measures. Enterprise cybersecurity is not simply a
a question of guidelines and rules, but a synergy between policy guidance and
technical action.
Security policies are the regulatory framework that guides decision making
regarding the protection of information and systems. These policies establish
clear standards and expectations for employees and other technology users. Without
However, the effectiveness of these policies ultimately depends on their
technical implementation. Strong technical measures support and bring policies to life,
ensuring that regulations are met and that digital assets are protected from
effective way. | |