Subido por otromailgenerico

Bibliografía-Seguridad seguridad de redes

Anuncio
Curso
Introductorio
de Seguridad
Autor:
Ernesto Pérez Estévez
Bibliografía consolidada
· Introducción a Ciberseguridad, Cisco NetAcad, 2019
· Baltazar, J. et al, Diseño e implementación de un esquema de seguridad
perimetral para redes de datos. Caso práctico:
Dirección General del Colegio de Ciencias y Humanidades, Cap 2, 3, 4, 2011,
http://www.ptolomeo.unam.mx:8080/xmlui/handle/132.248.52.100/174
· Tricas, F. Curso: (30227) Seguridad Informática, Departamento de Informática
e Ingeniería de Sistemas Universidad de Zaragoza, 2016,
https://webdiis.unizar.es/~ftricas/Asignaturas/sei/Transparencias/si-tema1.pdf
· Symantec, Timeline of Major Events in Internet Security, 2006,
https://www.symantec.com/content/en/us/about/media/securityintelligence/
SSR-Timeline.pdf
· A history if Internet Security, The Washington post, 2015,
https://www.washingtonpost.com/graphics/national/security-of-the-internet/
history/
· Merkow, M. Information Security: Principles and Practices, 2nd Edition, Pearson, 2014
· R. Aquino et al, Proyecto Amparo. Manual básico de: Gestión de incidentes
de seguridad informática: http://www.proyectoamparo.net/es/manuales
Curso
Introductorio
de Seguridad
Autor:
Ernesto Pérez Estévez
· Techopedia Staff, The 7 Basic Principles of IT Security, 2017,
https://www.techopedia.com/2/27825/security/the-basic-principles-of-it-security
· PEIXINHO, Ivo de Carvalho; AMATTE, Fernando Pompeo. Introdução à
Segurança de Redes, Rio de Janeiro: Escola Superior de Redes, RNP, 2013
· Snyder, J, Six Strategies for Defense-in-Depth,
http://www.opus1.com/www/whitepapers/defense-in-depth.pdf
· Hutter, D., Physical Security and Why It Is Important, 2019,
https://www.sans.org/reading-room/whitepapers/physical/physical-securityimportant-37120
· NCES, Practical Guidelines for Electronic Education Information Security,
https://nces.ed.gov/pubs98/safetech/index.asp
· Davis, C., COMPUTER SECURITY HANDBOOK, March 2014, Wiley; 6 edition
· Mitnick, K, THE ART OF DECEPTION, 2003, Hungry Minds Inc
· LACNIC, Glosario de WARP, https://warp.lacnic.net/estadisticas/#glosario
· Garfinkel, S. et al, Practical Unix and Internet Security, 2011, O’Reilly Media,
3rd Edition
· Ortiz, A., Adictos al trabajo, Tutorial de Criptografía, 2015,
https://www.adictosaltrabajo.com/tutoriales/criptografia/
· Granados, G., Introducción a la Criptografía, 2006, Revista Universitaria,
http://files.profecd.webnode.es/200000079-90fc291f71/Introduccion%20a%20
la%20criptografia.pdf
Curso
Introductorio
de Seguridad
Autor:
Ernesto Pérez Estévez
· Silver, E, Ejemplos de claves malas, 2018,
https://it.ucsf.edu/policies/bad-passwords
· N.N., Buenas y malas claves,
http://www.tinhat.com/internet_privacy/good_password_tips.html
· Gil, P., Ejemplos de malas y buenas claves, 2019,
https://www.lifewire.com/strong-password-examples-2483118
· GNUPG cifrado y descifrado de archivos,
https://www.gnupg.org/gph/en/manual/x110.html
· Navratil, N. et al., Red Hat Enterprise Linux 7 Storage Administration Guide, 2019,
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/
pdf/storage_administration_guide/Red_Hat_Enterprise_Linux-7-Storage_
Administration_Guide-en-US.pdf
· LACIE, Libro blanco de la tecnología RAID, LACIE,
https://www.lacie.com/files/lacie-content/whitepaper/WP_RAID_es.pdf
· Samba, RSYNC Documentation, 2019, https://rsync.samba.org/documentation.html
· GNU, GNU tar: an archiver tool,
https://www.gnu.org/software/tar/manual/html_chapter/index.html
· Beal, V., RAID https://www.webopedia.com/TERM/R/RAID.html
· Ellingwood, An Introduction to RAID Terminology and Concepts, DigitalOcean,
2016, https://www.digitalocean.com/community/tutorials/an-introduction-toraid-terminology-and-concepts
Curso
Introductorio
de Seguridad
Autor:
Ernesto Pérez Estévez
· Symantec, Cómo trabaja el handshake de SSL, 2019, https://www.websecurity.
symantec.com/security-topics/how-does-ssl-handshake-work
· Historia de SSL, TLS y OKI, 2018,
https://www.feistyduck.com/ssl-tls-and-pki-history/
· GlobalSign, Como trabaja la firma digital, 2015,
https://www.globalsign.com/en/blog/how-do-digital-signatures-work/
· N.N. , Análisis de Mirai, 2017, CloudFlare, https://blog.cloudflare.com/insidemirai-the-infamous-iot-botnet-a-retrospective-analysis/
· Greenberg, A, A CRITICAL INTEL FLAW BREAKS BASIC SECURITY FOR MOST
COMPUTERS, 2018, Wired, https://www.wired.com/story/critical-intel-flawbreaks-basic-security-for-most-computers/
· Osborne, C., Lock and block: Ransomworms take over the hacking scene, 2018,
ZDNET, http://www.zdnet.com/article/lock-and-block-ransomworms-take-overthe-hacking-scene/
· Paganini, A., HiddenMiner Android Cryptocurrency miner can brick your device,
2018, https://securityaffairs.co/wordpress/70968/malware/hiddenminerandroid-miner.html
· Droz, S. et al, Incident Handling for policy makers, 2018, FIRST Training,
https://www.first.org/education/trainings
Curso
Introductorio
de Seguridad
Autor:
Ernesto Pérez Estévez
· Internet Governance Forum ”BPF on Establishing and supporting computer
security incident response teams(CSIRTs)”, 2015,
https://www.first.org/global/governance/bpf-csirt-2015-report.pdf
· Varios Autores, GFCE Global Good Practices National Computer Security
Incident Response Teams (CSIRTs), 2017, GFCE,
https://www.thegfce.com/documents/publications/2017/11/21/nationalcomputer-security-incident-response-teams-csirts
· Moira J., Handbook for Computer Security Incident Response Teams (CSIRTs), 2003,
https://resources.sei.cmu.edu/asset_files/Handbook/2003_002_001_14102.pdf
· N. Brownlee et al, RFC 2350: Expectations for Computer Security Incident
Response, 1998, https://tools.ietf.org/html/rfc2350
· ENISA, A Step-byStep approach on how to setup a CSIRT, ENISA, 2003,
https://resources.sei.cmu.edu/asset_files/Handbook/2003_002_001_14102.pdf
· CMU, CSIRT FREQUENTLY ASKED QUESTIONS (FAQ), Carnegie
Mellon University, 2017,https://resources.sei.cmu.edu/asset_files/
WhitePaper/2017_019_001_485654.pdf
· ThaiCERT, Establishing a CSIRT, 2017, ThaiCERT,
https://www.thaicert.or.th/downloads/files/Establishing_a_CSIRT_en.pdf
Descargar