Show simple item record

dc.contributor.advisorArévalo Herrera, Juliana Alejandra
dc.creatorBallesteros Rumbo, German Eduardo
dc.date.accessioned2020-04-23T20:29:52Z
dc.date.available2020-04-23T20:29:52Z
dc.date.created2020-04-21
dc.identifier.citationBallesteros Rumbo, G. (2020). Procedimiento para implementar un sistema de Políticas de Seguridad Unificada (USP) en clientes de la empresa ETEK con la herramienta Tufin. Universidad Santo Tomás.spa
dc.identifier.urihttp://hdl.handle.net/11634/22809
dc.descriptionEl siguiente documento consta de una serie de pasos para implementar un sistema de Políticas de Seguridad Unificada (USP) en los clientes pertenecientes a la empresa ETEK en la herramienta Tufin. Además, se incluyen pruebas realizadas en ambiente de laboratorios de los casos probables a evidenciar en la ejecución de dicha matriz.spa
dc.description.abstractThis document include a step-by-step procedure to implement a Unified Security Policy (USP) system on ETEK's clients on Tufin tool. Besides this, the document includes some laboratory tests which includes cases the administrator implements in the USP matrix.spa
dc.format.mimetypeapplication/pdfspa
dc.language.isospaspa
dc.publisherUniversidad Santo Tomásspa
dc.rightsAtribución-NoComercial-CompartirIgual 2.5 Colombia*
dc.rightsAtribución-NoComercial-CompartirIgual 2.5 Colombia*
dc.rightsAtribución-NoComercial-CompartirIgual 2.5 Colombia*
dc.rightsAtribución-NoComercial-CompartirIgual 2.5 Colombia*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/2.5/co/*
dc.sourceinstname:Universidad Santo Tomásspa
dc.sourcereponame:Repositorio Institucional Universidad Santo Tomásspa
dc.subjectTufinspa
dc.subjectUSPspa
dc.subjectPermisividadspa
dc.subjectReglas de Accesospa
dc.subjectISO 27001spa
dc.subjectPCI DSSspa
dc.subjectNERC CIPspa
dc.subjectFirewallspa
dc.titleProcedimiento para implementar un sistema de Políticas de Seguridad Unificada (USP) en clientes de la empresa ETEK con la herramienta Tufinspa
dc.typeFormación de Recurso Humano para la Ctel: Trabajo de grado de Pregradospa
dc.creator.degreeIngeniero de Telecomunicacionesspa
dc.publisher.programPregrado Ingeniería de Telecomunicacionesspa
dc.publisher.departmentFacultad de Ingeniería de Telecomunicacionesspa
dc.subject.keywordInformation Securityspa
dc.subject.keywordTufinspa
dc.subject.keywordUnified Security Policyspa
dc.subject.keywordAccess Rulesspa
dc.subject.keywordUSPspa
dc.subject.keywordISO 27001spa
dc.subject.keywordPCI DSSspa
dc.subject.keywordNERC CIPspa
dc.subject.keywordFirewallspa
dc.subject.lembSeguridad de la informaciónspa
dc.type.spaTrabajo de gradospa
dc.rights.accesoAbierto (Texto Completo)spa
dc.type.hasVersioninfo:eu-repo/semantics/acceptedVersionspa
dc.description.sedeCRAI-USTA Bogotáspa
dc.description.GoogleScholarhttps://scholar.google.es/citations?user=oIEZNgUAAAAJ&hl=esspa
dc.description.cvlachttps://scienti.minciencias.gov.co/cvlac/visualizador/generarCurriculoCv.do?cod_rh=0000759813spa
dc.description.dominiohttp://unidadinvestigacion.usta.edu.cospa
dc.source.bibliographicCitationAndress, J. (2014). The basics of information security: understanding the fundamentals of InfoSec in theory and practice. Syngress.spa
dc.source.bibliographicCitationCalder, A. (2013). ISO27001/ISO27002 A Pocket Guide. IT Governance Publishing.spa
dc.source.bibliographicCitationCISCO. (2020). ¿Qué es un firewall? Retrieved from https://www.cisco.com/c/es_mx/products/security/firewalls/what-is-a-firewall.htmlspa
dc.source.bibliographicCitationIBM. (2012, Agosto). Network Intrusion Prevention System User Guide. Retrieved from https://www.ibm.com/support/knowledgecenter/SSB2MG_4.6.0/com.ibm.ips.doc/ pdfs/IBMSecurityNIPS_User_Guide_4_5.pdfspa
dc.source.bibliographicCitationIskandar, A., Virma, E., & Ahmar, A. S. (2018). Implementing DMZ in Improving Network Security of Web. International Journal of Engineering & Technology, 99-104.spa
dc.source.bibliographicCitationISO - International Standards Organization. (2018). Information technology -- Security techniques -- Information security management systems -- Overview and vocabulary.spa
dc.source.bibliographicCitationISO. (2018). Risk management — Guidelines. Retrieved from https://www.iso.org/obp/ui#iso:std:iso:31000:ed-2:v1:esspa
dc.source.bibliographicCitationMaintaining PCI DSS Compliance Special Interest Group. (2019, Enero). Best Practices for Maintaining PCI DSS Compliance. Retrieved from PCI Security Standards Council: https://www.pcisecuritystandards.org/documents/PCI_DSS_V2.0_Best_Practices _for_Maintaining_PCI_DSS_Compliance.pdfspa
dc.source.bibliographicCitationManzuik, S. P. (2006). Network Security Assessment : From Vulnerability to Patch. Elsevier Science & Technology Books. Retrieved from https://ebookcentral.proquest.comspa
dc.source.bibliographicCitationNERC. (2017). NERC North American Electric Reliability Corporation. Retrieved from https://www.nerc.com/AboutNERC/Pages/default.aspxspa
dc.source.bibliographicCitationPCI Security Standards Council. (2020). PCI SECURITY. Retrieved from https://www.pcisecuritystandards.org/pci_security/spa
dc.source.bibliographicCitationRaggar, B. (2010). Information security management : Concepts and practice. Auerbach.spa
dc.source.bibliographicCitationReal Academia Española. (2020). Diccionario de la Lengua Española. Retrieved from https://dle.rae.es/permisividad?m=formspa
dc.source.bibliographicCitationTufin Software Technologies. (2019, Octubre 13). Secure Change Overview. Retrieved from https://forum.tufin.com/support/kc/latest/index.htm#Suite/856.htmspa
dc.source.bibliographicCitationVinson&Elkins. (2014). Summary of CIP Version 5 Standards. Retrieved from https://www.velaw.com/uploadedfiles/vesite/resources/summarycipversion5stand ards2014.pdfspa
dc.source.bibliographicCitationYulianto, S., Lim, C., & Soewito, B. (2016). Information security maturity model: A best practice driven approach to PCI DSS compliance. 2016 IEEE Region 10 Symposium (TENSYMP), (pp. 65-70). Bali.spa
dc.source.bibliographicCitationTufin Software Technologies. (2019, Octubre 13). Secure Track Overview. Retrieved from https://forum.tufin.com/support/kc/latest/index.htm#Suite/307.htmspa
dc.source.bibliographicCitationTufin Software Technologies. (2019, Octubre 13). Tufin Orchestation Suite. Retrieved from https://forum.tufin.com/support/kc/latest/index.htm#Suite/3692.htmspa
dc.source.bibliographicCitationTufin Software Technologies. (2019, Octubre 13). Unified Security Policy. Retrieved from https://forum.tufin.com/support/kc/latest/index.htm#Suite/configure_security_polic y.htmspa


Files in this item

Thumbnail
Thumbnail
Thumbnail
Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record

Atribución-NoComercial-CompartirIgual 2.5 Colombia
Except where otherwise noted, this item's license is described as Atribución-NoComercial-CompartirIgual 2.5 Colombia