Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ Recolector de Cienci...arrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
Recolector de Ciencia Abierta, RECOLECTA
Part of book or chapter of book . 2019
License: CC BY NC ND
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
Recolector de Ciencia Abierta, RECOLECTA
Part of book or chapter of book . 2019
License: CC BY NC ND
GREDOS
Book . 2019
License: CC BY NC ND
Data sources: GREDOS
versions View all 2 versions
addClaim

Seguridad

Authors: Díaz Gómez, Fernando;
Abstract

[ES]En este cap?tulo el lector encontrar? una introducci?n a la protecci?n de los sistemas inform?ticos, caracter?stica que en los ?ltimos tiempos se ha convertido en una cuesti?n muy relevante para todos aquellos sistemas abiertos, es decir, aquellos sistemas inform?ticos que proporcionan sus servicios a trav?s de una red de comunicaciones como es, por ejemplo, Internet. En cuanto a la organizaci?n del cap?tulo, la primera secci?n de este cap?tulo introduce el panorama general de la seguridad, introduciendo las propiedades de la informaci?n que deben salvaguardarse para garantizar la seguridad, las amenazas a las que est? expuesta la informaci?n, los servicios de seguridad requeridos para contrarrestar estas amenazas, los mecanismos que implementan los servicios requeridos. Por este motivo, se recomienda su lectura con el fin de obtener una visi?n global de este ?mbito, que puede complementarse con el primer apartado de la secci?n dedicada a la criptograf?a, t?cnica que constituye la base fundamental sobre la que se basan la mayor?a de los servicios de seguridad requeridos. El resto de apartados de este cap?tulo, es decir, los centrales de la secci?n dedicada a la criptograf?a son los m?s t?cnicos, por lo que se recomienda su lectura s?lo a aquellos lectores que est?n interesados en profundizar en los fundamentos de la criptograf?a y en la descripci?n de los algoritmos criptogr?ficos m?s comunes.

[EN]In this chapter the reader will find an introduction to the protection of computer systems, a feature that has recently become a very relevant issue for all those open systems, that is, those computer systems that provide their services through a communications network such as, for example, the Inter-net. As for the organization of the chapter, the first section of this chapter introduces the general pano-rama of security, introducing the properties of the information that must be safeguarded to guarantee security, the threats to which the information is exposed, the security services required to counteract these threats, the mechanisms implemented by the services required. For this reason, it is recommended to read it in order to obtain a global vision of this area, which can be complemented with the first section of the section dedicated to cryptography, a technique that constitutes the fundamental basis on which most of the required security services are based. The rest of the sections of this chapter, i.e. the central sections dedicated to cryptography are the most technical, so it is recommended to read them only to those readers who are interested in delving deeper into the fundamentals of cryptography and the description of the most common cryptographic algorithms.

Country
Spain
Related Organizations
Keywords

Marketing, 1203.17 Inform?tica, 5311.05 Marketing (Comercialización), 1203.17 Informática, 5311.05 Marketing (Comercializaci?n)

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
Green