
handle: 10366/139650
[ES]En este cap?tulo el lector encontrar? una introducci?n a la protecci?n de los sistemas inform?ticos, caracter?stica que en los ?ltimos tiempos se ha convertido en una cuesti?n muy relevante para todos aquellos sistemas abiertos, es decir, aquellos sistemas inform?ticos que proporcionan sus servicios a trav?s de una red de comunicaciones como es, por ejemplo, Internet. En cuanto a la organizaci?n del cap?tulo, la primera secci?n de este cap?tulo introduce el panorama general de la seguridad, introduciendo las propiedades de la informaci?n que deben salvaguardarse para garantizar la seguridad, las amenazas a las que est? expuesta la informaci?n, los servicios de seguridad requeridos para contrarrestar estas amenazas, los mecanismos que implementan los servicios requeridos. Por este motivo, se recomienda su lectura con el fin de obtener una visi?n global de este ?mbito, que puede complementarse con el primer apartado de la secci?n dedicada a la criptograf?a, t?cnica que constituye la base fundamental sobre la que se basan la mayor?a de los servicios de seguridad requeridos. El resto de apartados de este cap?tulo, es decir, los centrales de la secci?n dedicada a la criptograf?a son los m?s t?cnicos, por lo que se recomienda su lectura s?lo a aquellos lectores que est?n interesados en profundizar en los fundamentos de la criptograf?a y en la descripci?n de los algoritmos criptogr?ficos m?s comunes.
[EN]In this chapter the reader will find an introduction to the protection of computer systems, a feature that has recently become a very relevant issue for all those open systems, that is, those computer systems that provide their services through a communications network such as, for example, the Inter-net. As for the organization of the chapter, the first section of this chapter introduces the general pano-rama of security, introducing the properties of the information that must be safeguarded to guarantee security, the threats to which the information is exposed, the security services required to counteract these threats, the mechanisms implemented by the services required. For this reason, it is recommended to read it in order to obtain a global vision of this area, which can be complemented with the first section of the section dedicated to cryptography, a technique that constitutes the fundamental basis on which most of the required security services are based. The rest of the sections of this chapter, i.e. the central sections dedicated to cryptography are the most technical, so it is recommended to read them only to those readers who are interested in delving deeper into the fundamentals of cryptography and the description of the most common cryptographic algorithms.
Marketing, 1203.17 Inform?tica, 5311.05 Marketing (Comercialización), 1203.17 Informática, 5311.05 Marketing (Comercializaci?n)
Marketing, 1203.17 Inform?tica, 5311.05 Marketing (Comercialización), 1203.17 Informática, 5311.05 Marketing (Comercializaci?n)
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
