Curso Introductorio de Seguridad Autor: Ernesto Pérez Estévez Bibliografía consolidada · Introducción a Ciberseguridad, Cisco NetAcad, 2019 · Baltazar, J. et al, Diseño e implementación de un esquema de seguridad perimetral para redes de datos. Caso práctico: Dirección General del Colegio de Ciencias y Humanidades, Cap 2, 3, 4, 2011, http://www.ptolomeo.unam.mx:8080/xmlui/handle/132.248.52.100/174 · Tricas, F. Curso: (30227) Seguridad Informática, Departamento de Informática e Ingeniería de Sistemas Universidad de Zaragoza, 2016, https://webdiis.unizar.es/~ftricas/Asignaturas/sei/Transparencias/si-tema1.pdf · Symantec, Timeline of Major Events in Internet Security, 2006, https://www.symantec.com/content/en/us/about/media/securityintelligence/ SSR-Timeline.pdf · A history if Internet Security, The Washington post, 2015, https://www.washingtonpost.com/graphics/national/security-of-the-internet/ history/ · Merkow, M. Information Security: Principles and Practices, 2nd Edition, Pearson, 2014 · R. Aquino et al, Proyecto Amparo. Manual básico de: Gestión de incidentes de seguridad informática: http://www.proyectoamparo.net/es/manuales Curso Introductorio de Seguridad Autor: Ernesto Pérez Estévez · Techopedia Staff, The 7 Basic Principles of IT Security, 2017, https://www.techopedia.com/2/27825/security/the-basic-principles-of-it-security · PEIXINHO, Ivo de Carvalho; AMATTE, Fernando Pompeo. Introdução à Segurança de Redes, Rio de Janeiro: Escola Superior de Redes, RNP, 2013 · Snyder, J, Six Strategies for Defense-in-Depth, http://www.opus1.com/www/whitepapers/defense-in-depth.pdf · Hutter, D., Physical Security and Why It Is Important, 2019, https://www.sans.org/reading-room/whitepapers/physical/physical-securityimportant-37120 · NCES, Practical Guidelines for Electronic Education Information Security, https://nces.ed.gov/pubs98/safetech/index.asp · Davis, C., COMPUTER SECURITY HANDBOOK, March 2014, Wiley; 6 edition · Mitnick, K, THE ART OF DECEPTION, 2003, Hungry Minds Inc · LACNIC, Glosario de WARP, https://warp.lacnic.net/estadisticas/#glosario · Garfinkel, S. et al, Practical Unix and Internet Security, 2011, O’Reilly Media, 3rd Edition · Ortiz, A., Adictos al trabajo, Tutorial de Criptografía, 2015, https://www.adictosaltrabajo.com/tutoriales/criptografia/ · Granados, G., Introducción a la Criptografía, 2006, Revista Universitaria, http://files.profecd.webnode.es/200000079-90fc291f71/Introduccion%20a%20 la%20criptografia.pdf Curso Introductorio de Seguridad Autor: Ernesto Pérez Estévez · Silver, E, Ejemplos de claves malas, 2018, https://it.ucsf.edu/policies/bad-passwords · N.N., Buenas y malas claves, http://www.tinhat.com/internet_privacy/good_password_tips.html · Gil, P., Ejemplos de malas y buenas claves, 2019, https://www.lifewire.com/strong-password-examples-2483118 · GNUPG cifrado y descifrado de archivos, https://www.gnupg.org/gph/en/manual/x110.html · Navratil, N. et al., Red Hat Enterprise Linux 7 Storage Administration Guide, 2019, https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/ pdf/storage_administration_guide/Red_Hat_Enterprise_Linux-7-Storage_ Administration_Guide-en-US.pdf · LACIE, Libro blanco de la tecnología RAID, LACIE, https://www.lacie.com/files/lacie-content/whitepaper/WP_RAID_es.pdf · Samba, RSYNC Documentation, 2019, https://rsync.samba.org/documentation.html · GNU, GNU tar: an archiver tool, https://www.gnu.org/software/tar/manual/html_chapter/index.html · Beal, V., RAID https://www.webopedia.com/TERM/R/RAID.html · Ellingwood, An Introduction to RAID Terminology and Concepts, DigitalOcean, 2016, https://www.digitalocean.com/community/tutorials/an-introduction-toraid-terminology-and-concepts Curso Introductorio de Seguridad Autor: Ernesto Pérez Estévez · Symantec, Cómo trabaja el handshake de SSL, 2019, https://www.websecurity. symantec.com/security-topics/how-does-ssl-handshake-work · Historia de SSL, TLS y OKI, 2018, https://www.feistyduck.com/ssl-tls-and-pki-history/ · GlobalSign, Como trabaja la firma digital, 2015, https://www.globalsign.com/en/blog/how-do-digital-signatures-work/ · N.N. , Análisis de Mirai, 2017, CloudFlare, https://blog.cloudflare.com/insidemirai-the-infamous-iot-botnet-a-retrospective-analysis/ · Greenberg, A, A CRITICAL INTEL FLAW BREAKS BASIC SECURITY FOR MOST COMPUTERS, 2018, Wired, https://www.wired.com/story/critical-intel-flawbreaks-basic-security-for-most-computers/ · Osborne, C., Lock and block: Ransomworms take over the hacking scene, 2018, ZDNET, http://www.zdnet.com/article/lock-and-block-ransomworms-take-overthe-hacking-scene/ · Paganini, A., HiddenMiner Android Cryptocurrency miner can brick your device, 2018, https://securityaffairs.co/wordpress/70968/malware/hiddenminerandroid-miner.html · Droz, S. et al, Incident Handling for policy makers, 2018, FIRST Training, https://www.first.org/education/trainings Curso Introductorio de Seguridad Autor: Ernesto Pérez Estévez · Internet Governance Forum ”BPF on Establishing and supporting computer security incident response teams(CSIRTs)”, 2015, https://www.first.org/global/governance/bpf-csirt-2015-report.pdf · Varios Autores, GFCE Global Good Practices National Computer Security Incident Response Teams (CSIRTs), 2017, GFCE, https://www.thegfce.com/documents/publications/2017/11/21/nationalcomputer-security-incident-response-teams-csirts · Moira J., Handbook for Computer Security Incident Response Teams (CSIRTs), 2003, https://resources.sei.cmu.edu/asset_files/Handbook/2003_002_001_14102.pdf · N. Brownlee et al, RFC 2350: Expectations for Computer Security Incident Response, 1998, https://tools.ietf.org/html/rfc2350 · ENISA, A Step-byStep approach on how to setup a CSIRT, ENISA, 2003, https://resources.sei.cmu.edu/asset_files/Handbook/2003_002_001_14102.pdf · CMU, CSIRT FREQUENTLY ASKED QUESTIONS (FAQ), Carnegie Mellon University, 2017,https://resources.sei.cmu.edu/asset_files/ WhitePaper/2017_019_001_485654.pdf · ThaiCERT, Establishing a CSIRT, 2017, ThaiCERT, https://www.thaicert.or.th/downloads/files/Establishing_a_CSIRT_en.pdf