Seguridad en Internet de las Cosas

Mena Cabanillas, David (2019). Seguridad en Internet de las Cosas. Proyecto Fin de Carrera / Trabajo Fin de Grado, E.T.S.I. de Sistemas Informáticos (UPM), Madrid.

Description

Title: Seguridad en Internet de las Cosas
Author/s:
  • Mena Cabanillas, David
Contributor/s:
  • García Alcántara, Vicente A.
  • Altares López, Sergio
Item Type: Final Project
Degree: Grado en Ingeniería del Software
Date: July 2019
Subjects:
Freetext Keywords: Seguridad informática
Faculty: E.T.S.I. de Sistemas Informáticos (UPM)
Department: Sistemas Informáticos
Creative Commons Licenses: Recognition - No derivative works - Non commercial

Full text

[img] PDF - Requires a PDF viewer, such as GSview, Xpdf or Adobe Acrobat Reader
Download (3MB)

Abstract

La tecnología avanza de forma exponencial y esto se refleja con la gran cantidad de nuevos dispositivos que salen a diario. Internet de las Cosas esta en auge. Lo cual, conlleva que se estén implantando nuevos dispositivos en la mayoría de los ámbitos (calles, parques, colegios, incluso en casa) con lo que hay que extremar las precauciones, ya que no se puede olvidar que al fin y al cabo, se trabaja con datos, tanto públicos como privados. Toda esta situación hace que se genere un gran volumen de datos, la mayoría con información sensible, que usada de mala manera por parte de un tercero, podría llegar a ser perjudicial para el usuario. En este proyecto se van a conocer cuales son los principales problemas que podrían ocurrir y se van a tratar de resolver a través de soluciones de software libre, basados en arquitecturas de entornos de Seguridad Perimetral, la cual, debería ser usada por cualquier individuo para asegurar lo máximo posible, la confidencialidad de sus datos más relevantes. Para ello, se definirá un sistema muy automatizado, de forma que cualquier persona pueda tener la tranquilidad de que la información que gestiona, se encuentre de la forma más segura posible para evitar su robo y un uso fraudulento por parte de terceros. Abstract: In this project, a study has been carried out on how to secure a computer environment, so that you can take advantage of technology without limits and at the same time feel that the privacy is guaranteed as much as possible. For that purpose, the project has been broken down into two parts. The first part is a theoretical base where the most important safety elements are shown, while in the second part, the infrastructure necessary to carry it out is deployed and a series of tests will be carried out to ensure its correct functioning. The first sub-objective consists of a study of the main elements of a Perimeter Security environment such as firewalls, proxies, IDS... and explains how they are used and how they work. It has also been seen how to ensure the security of each computer in the organization (bastioning) and other techniques such as redundancy or a good backup policy. As a second sub-objective, a study is made of which are the best software solutions to achieve our objectives once we know about the resources available to proceed to its installation and configuration. Afterwards, we will install the solutions that we think that are the most appropriate for our infrastructure. It explains each step to follow, from where to download the software, how to install it and once installed, what configurations we have to make to carry out our purpose. The following section will show the planning that has been followed since the beginning of the project, the study of the problem, possible solutions that can be carried out , the budget of the project including the cost of the components and of the man hours invested to develop it. Finally, it documents the errors that have appeared throughout the project and studies the possible improvements that could be made in the future to optimize these resources.

More information

Item ID: 56154
DC Identifier: http://oa.upm.es/56154/
OAI Identifier: oai:oa.upm.es:56154
Deposited by: Biblioteca Universitaria Campus Sur
Deposited on: 09 Aug 2019 10:30
Last Modified: 09 Aug 2019 10:30
  • Logo InvestigaM (UPM)
  • Logo GEOUP4
  • Logo Open Access
  • Open Access
  • Logo Sherpa/Romeo
    Check whether the anglo-saxon journal in which you have published an article allows you to also publish it under open access.
  • Logo Dulcinea
    Check whether the spanish journal in which you have published an article allows you to also publish it under open access.
  • Logo de Recolecta
  • Logo del Observatorio I+D+i UPM
  • Logo de OpenCourseWare UPM