Full text
![]() |
PDF
- Requires a PDF viewer, such as GSview, Xpdf or Adobe Acrobat Reader
Download (3MB) |
Mena Cabanillas, David (2019). Seguridad en Internet de las Cosas. Proyecto Fin de Carrera / Trabajo Fin de Grado, E.T.S.I. de Sistemas Informáticos (UPM), Madrid.
Title: | Seguridad en Internet de las Cosas |
---|---|
Author/s: |
|
Contributor/s: |
|
Item Type: | Final Project |
Degree: | Grado en Ingeniería de Computadores |
Date: | July 2019 |
Subjects: | |
Freetext Keywords: | Seguridad informática |
Faculty: | E.T.S.I. de Sistemas Informáticos (UPM) |
Department: | Sistemas Informáticos |
Creative Commons Licenses: | Recognition - No derivative works - Non commercial |
![]() |
PDF
- Requires a PDF viewer, such as GSview, Xpdf or Adobe Acrobat Reader
Download (3MB) |
La tecnología avanza de forma exponencial y esto se refleja con la gran cantidad de nuevos dispositivos que salen a diario. Internet de las Cosas esta en auge. Lo cual, conlleva que se estén implantando nuevos dispositivos en la mayoría de los ámbitos (calles, parques, colegios, incluso en casa) con lo que hay que extremar las precauciones, ya que no se puede olvidar que al fin y al cabo, se trabaja con datos, tanto públicos como privados. Toda esta situación hace que se genere un gran volumen de datos, la mayoría con información sensible, que usada de mala manera por parte de un tercero, podría llegar a ser perjudicial para el usuario. En este proyecto se van a conocer cuales son los principales problemas que podrían ocurrir y se van a tratar de resolver a través de soluciones de software libre, basados en arquitecturas de entornos de Seguridad Perimetral, la cual, debería ser usada por cualquier individuo para asegurar lo máximo posible, la confidencialidad de sus datos más relevantes. Para ello, se definirá un sistema muy automatizado, de forma que cualquier persona pueda tener la tranquilidad de que la información que gestiona, se encuentre de la forma más segura posible para evitar su robo y un uso fraudulento por parte de terceros. Abstract: In this project, a study has been carried out on how to secure a computer environment, so that you can take advantage of technology without limits and at the same time feel that the privacy is guaranteed as much as possible. For that purpose, the project has been broken down into two parts. The first part is a theoretical base where the most important safety elements are shown, while in the second part, the infrastructure necessary to carry it out is deployed and a series of tests will be carried out to ensure its correct functioning. The first sub-objective consists of a study of the main elements of a Perimeter Security environment such as firewalls, proxies, IDS... and explains how they are used and how they work. It has also been seen how to ensure the security of each computer in the organization (bastioning) and other techniques such as redundancy or a good backup policy. As a second sub-objective, a study is made of which are the best software solutions to achieve our objectives once we know about the resources available to proceed to its installation and configuration. Afterwards, we will install the solutions that we think that are the most appropriate for our infrastructure. It explains each step to follow, from where to download the software, how to install it and once installed, what configurations we have to make to carry out our purpose. The following section will show the planning that has been followed since the beginning of the project, the study of the problem, possible solutions that can be carried out , the budget of the project including the cost of the components and of the man hours invested to develop it. Finally, it documents the errors that have appeared throughout the project and studies the possible improvements that could be made in the future to optimize these resources.
Item ID: | 56154 |
---|---|
DC Identifier: | https://oa.upm.es/56154/ |
OAI Identifier: | oai:oa.upm.es:56154 |
Deposited by: | Biblioteca Universitaria Campus Sur |
Deposited on: | 09 Aug 2019 10:30 |
Last Modified: | 03 Feb 2020 12:12 |