2 research outputs found

    Análisis de técnicas de aislamiento de procesos (Sandbox) en Linux.

    Get PDF
    En el presente, la seguridad informatica es uno de los principales problemas a los que se enfrenta toda la sociedad. La seguridad de los sistemas informáticos es muy importante debido a que diariamente aumenta el número de ataques que se realizan. En este trabajo nos centraremos en una de los principales amenazas a las que nos enfrentamos, que es la ejecución de software malicioso. Con el fin de mitigar el daño que provocan estas amenazas, se estudia en este trabajo la tecnología Sandbox. Esta tecnología nos permite ejecutar dicho software malicioso en un entorno aislado, con el fin de comprobar sí dicho software trata de dañar nuestro equipo. A lo largo de este trabajo, se estudian los fundamentos de esta tecnología, así como diferentes herramientas que permiten la implementación de un Sandbox. Estas herramientas han sido probadas mediante el uso de una conjunto de pruebas, que simulan acciones maliciosas realizadas por cualquier malware, con el objetivo de comprobar el funcionamiento de las herramientas, en función de sus características.At present, computer security is one of the main problems facing society as a whole. The security of computer systems is very important because the number of attacks carried out increases daily. In this work we will focus on one of the main threats we face, which is the execution of malicious software. In order to mitigate the damage caused by these threats, the Sandbox technology is studied in this project. This technology allows us to run the malicious software in an isolated environment, in order to see if the software is trying to damage our computer. Throughout this project, we study the fundamentals of this technology, as well as different tools that allow the implementation of a Sandbox. The deployment of these tools have been tested using a set of tests, which simulate malicious actions by any malware, in order to check the operation of the tools, depending on their characteristics.Universidad de Sevilla. Grado en Ingeniería de las Tecnologías de Telecomunicació

    Air Power’s Cyber Risk: How Operational Causes will have Strategic Consequences

    Get PDF
    This thesis argues that air power's cyber risk which has emerged from operational causes will create profound strategic consequences. Through a comprehensive examination of existing literature, it challenges prevailing perspectives by highlighting a critical gap in knowledge: a failure to map the link between operational causes and strategic consequences of air power’s cyber risk which, when realised, will threaten the roles and, in extremis, survival of states. While acknowledging the risks emergent nature and situational specificity with not all states reliant on air power and size inverse to severity, the thesis asserts that the realisation of these strategic consequences is a matter of 'when', not 'if'. Developed within a risk management framework, supported by literature reviews and case studies, and leading to observations and recommendations, the thesis responds by offering a pathway for further research which can mitigate air power’s cyber risk. If embraced, an opportunity exists for academia and practitioners to act in synergy, fill the identified gap in knowledge and address the risk proactively. Conversely, if ignored and the pathway is not followed, the implications will, the thesis predicts, result in the unmitigated strategic consequences of air power’s cyber risk reshaping the geopolitical landscape of the 21st century
    corecore