Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ Recolector de Cienci...arrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
Biblos-e Archivo
Master thesis . 2014
Data sources: Biblos-e Archivo
versions View all 2 versions
addClaim

Estudio de procedimientos de autenticación multicanal basados en dispositivos móviles con sistema operativo android

Authors: Mertanen Cuní, Nicolás;

Estudio de procedimientos de autenticación multicanal basados en dispositivos móviles con sistema operativo android

Abstract

La evolución de las tecnologías conlleva el aumento de las capacidades de cómputo y procesamiento, ofreciendo, hoy en día, equipos que hace sólo unos años habrían quedado reservados a los grandes centros de investigación. Al igual que se puede dar un gran uso a dichos equipos, su utilización con fines destructivos puede suponer un grave riesgo para el objetivo de dichos ataques. Es por ello que, conforme evoluciona la tecnología, deben evolucionar también los mecanismos de seguridad implantados en los sistemas. De la misma forma, supone un riesgo igualmente grande la extensión a nuevos usuarios de las herramientas y los mecanismos para llevar a cabo un ataque. La publicación de suites donde se ofrece un compilado de software orientado a la perpetración de ataques no hace sino facilitar su utilización a usuarios menos experimentados. Uno de los principales objetivos perseguidos por un atacante es eludir los sistemas de control de acceso. El sistema más simple y extendido se corresponde con la asociación de una contraseña para cada uno de los usuarios, pero en el contexto tecnológico actual no resulta seguro hacer uso únicamente de dicho sistema. Actualmente, se recomienda hacer uso de mecanismos de control de acceso estrictos combinados con sistemas de autenticación de varios factores. En el actual documento se realiza un estudio sobre un sistema al que se quiere dotar de un nivel elevado de seguridad, empleando un sistema multicanal y aplicando un protocolo de autenticación de dos factores para operaciones potencialmente peligrosas.

The evolution of technologies in the last decades has implied an increasing of the computational and processing capabilities. This makes possible that the general public can easily access to resources that were restricted to research centers just a few years ago. However, these systems can be used legitimately, but in other cases they are means exploited by malicious users. This is why security mechanisms implemented on these systems must evolve in correspondence to technology improvements. In the same way, the extension to new users of the tools and mechanisms to carry out an attack represents also a great risk. The publication of suites of software tools endow even lessexperienced users with mechanisms to attack computers and information systems. One of the main goal of attackers is to elude access control schemes. The simplest and more extended access control scheme is defined by assigning secret passwords to each user. In the current technological context is not secure to build up access control just by means of pairs username-secret password. Certainly, strong access control systems should be deployed combining several authentication factors. In the current document it is performed a study on a system that will be provided with a high level security by using a two-factor authentication protocol to protect critical operations.

Máster Universitario en Ingeniería Informática

Country
Spain
Related Organizations
Keywords

Informática, Android (Sistema operativo de ordenador) - Seguridad, Sistemas de, Teléfonos inteligentes, Seguridad informática

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
Green