Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ Recolector de Cienci...arrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
versions View all 2 versions
addClaim

Seguridad en smartphones: análisis de riesgos, de vulnerabilidades y auditorías de dispositivos

Authors: García Altarejos, Carlos;

Seguridad en smartphones: análisis de riesgos, de vulnerabilidades y auditorías de dispositivos

Abstract

This project aims to develop a methodology to perform vulnerability risk analysis and device audits, which can be used to prevent and protect against these threats. The main objective is to study the tools and techniques to detect the threats and vulnerabilities that affect these devices. The methodology is structured in five stages: identification, analysis, access, results and report. These are intended to be able to carry out an analysis to identify and report failures in devices and in technological processes. Focused on the total protection of resources that are exposed to potential security threats.

Con el presente trabajo se pretende desarrollar una metodología para realizar un análisis de riesgos de vulnerabilidades y auditorias de dispositivos, que pueda servir para prevenir estas amenazas y protegerse frente a ellas. El principal objetivo se centra en el estudio de las herramientas y técnicas para detectar las amenazas y las vulnerabilidades que afectan a estos dispositivos. La metodología está estructurada en cinco fases que son: identificación, análisis, acceso, resultados e informe.

Amb el present treball es pretén desenvolupar una metodologia per realitzar una anàlisi de riscos de vulnerabilitats i auditorias de dispositius, que pugui servir per prevenir aquestes amenaces i protegir-se enfront d'elles. El principal objectiu se centra en l'estudi de les eines i tècniques per detectar les amenaces i les vulnerabilitats que afecten a aquests dispositius. La metodologia està estructurada en cinc fases que són: identificació, anàlisi, accés, resultats i informe

Country
Spain
Related Organizations
Keywords

auditoria, TIC, iOS, Seguridad informática -- TFM, Android, auditoría, telèfon intel·ligent, audit, Seguretat informàtica -- TFM, Computer security -- TFM, smartphone, teléfono inteligente

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
Green