Diagnóstico de las vulnerabilidades en redes inalámbricas en el Ecuador
Main Article Content
Abstract
A The objective of the research is to diagnose vulnerabilities in wireless networks in Ecuador, in order to help and provide IT professionals with a resource for the improvement of security in wireless networks in public or private companies. This study will be carried out at the SEK International University with the collaboration of La Casa del Cable S.A and Bigexpert Cía. Ltda. Quito Ecuador.
The descriptive and synthetic-analytical method, accompanied by techniques specifically interviews and surveys applied to IT professionals helped in the study process, the results of this investigation reflect that there is a high interest regarding security in wireless networks, as Many companies seek to provide different ways of accessing data through the use of new technologies, as long as this does not affect the integrity, confidentiality and availability of information.
Keywords: wireless network, information and comunications technology, security.
Downloads
Article Details
COPYRIGHT NOTICE
Authors who publish in the INNOVA Research Journal keeps copyright and guarantee the journal the right to be the first publication of the work under the Creative Commons License, Attribution-Non-Commercial 4.0 International (CC BY-NC 4.0). They can be copied, used, disseminated, transmitted and publicly exhibited, provided that: a) the authorship and original source of their publication (magazine, publisher, URL and DOI of the work) is cited; b) are not used for commercial purposes; c) the existence and specifications of this license of use are mentioned.
References
Aguirre, G., Ordóñez, A., & Ureta, L. (2005). Seguridad En Redes Inalámbricas. Tesis, 118. Retrieved from http://tesis.pucp.edu.pe/repositorio/bitstream/handle/123456789/1445/LAZO_GARCI A_NUTTSY_SERVIDORES_AAA.pdf?sequence=1&isAllowed=y.
Barajas, S. (2003). Protocolos de seguridad en redes inalámbricas. Recuperado de http://www.saulo.net/pub/ inv/SegWiFi-art.htm.
Cisco. (2017). Informe anual sobre ciberseguridad 2017.
DeKok, A. L., & Lior, A. (2013). Remote Authentication Dial-In User Service (RADIUS) Protocol Extensions. RFC 6929. Recuperado de https://tools.ietf.org/html/ rfc6929.
Freier, A., Karlton, P., & P. Kocher. (2011). The Secure Sockets Layer (SSL) Protocol Version 3.0. RFC 6101. Recuperado de https://tools.ietf.org/html/rfc6101.
García, R. R. (2011). Arquitectura para el Control de Acceso de la Red inalámbrica local de la Universidad Central “Marta Abreu” de Las Villas. Santa Clara: Universidad Central “Marta Abreu” de Las Villas.
Hernández Sampieri. (2003). Metodología de la investigación. (McGraw-Hill, Ed.). Mexico. J Lopez. (2007). Wireless Networks LAN, 1–80.
Lahora.com.ec. (2010). Internet: vía libre a delitos : Economía : La Hora Noticias de Ecuador, sus provincias y el mundo. Retrieved February 3, 2018, from https://lahora.com.ec/noticia/1020547/internet-vc3ada-libre-a-delitos.
Machado, D. V. (2012). Propuesta Metodológica para Asegurar Redes Inalámbricas y su Aplicación en la ESPOCH. Retrieved from http://dspace.espoch.edu.ec/handle/123456789/1480.
P Baptista, Hernandez, & Juan Hernandez. (2010). Metodología de la investigación.
Rumale, A.S., & Chaudhari, D. N. (2011). IEEE 802.11x, and WEP, EAP,WPA / WPA2.
United State of América. University of California. (2015). WEP FAQ. Recuperado de www.isaac.cs.berkeley. edu/isaac/wep-faq.html.
Veizaga, W. J. B. (2013). Ethical Hacking: Hacking de Red Inalámbrica Wifi. Carrera de Informática, pp. 2-3.