2 research outputs found
Análisis de técnicas de aislamiento de procesos (Sandbox) en Linux.
En el presente, la seguridad informatica es uno de los principales problemas a los que se enfrenta toda
la sociedad. La seguridad de los sistemas informáticos es muy importante debido a que diariamente
aumenta el número de ataques que se realizan. En este trabajo nos centraremos en una de los principales
amenazas a las que nos enfrentamos, que es la ejecución de software malicioso.
Con el fin de mitigar el daño que provocan estas amenazas, se estudia en este trabajo la tecnologÃa
Sandbox. Esta tecnologÃa nos permite ejecutar dicho software malicioso en un entorno aislado, con el
fin de comprobar sà dicho software trata de dañar nuestro equipo. A lo largo de este trabajo, se estudian
los fundamentos de esta tecnologÃa, asà como diferentes herramientas que permiten la implementación
de un Sandbox. Estas herramientas han sido probadas mediante el uso de una conjunto de pruebas, que
simulan acciones maliciosas realizadas por cualquier malware, con el objetivo de comprobar el
funcionamiento de las herramientas, en función de sus caracterÃsticas.At present, computer security is one of the main problems facing society as a whole. The security of
computer systems is very important because the number of attacks carried out increases daily. In this
work we will focus on one of the main threats we face, which is the execution of malicious software.
In order to mitigate the damage caused by these threats, the Sandbox technology is studied in this
project. This technology allows us to run the malicious software in an isolated environment, in order
to see if the software is trying to damage our computer. Throughout this project, we study the
fundamentals of this technology, as well as different tools that allow the implementation of a Sandbox.
The deployment of these tools have been tested using a set of tests, which simulate malicious actions
by any malware, in order to check the operation of the tools, depending on their characteristics.Universidad de Sevilla. Grado en IngenierÃa de las TecnologÃas de Telecomunicació
Air Power’s Cyber Risk: How Operational Causes will have Strategic Consequences
This thesis argues that air power's cyber risk which has emerged from operational causes will create profound strategic consequences. Through a comprehensive
examination of existing literature, it challenges prevailing perspectives by highlighting a critical gap in knowledge: a failure to map the link between operational causes and strategic consequences of air power’s cyber risk which,
when realised, will threaten the roles and, in extremis, survival of states. While acknowledging the risks emergent nature and situational specificity with not all
states reliant on air power and size inverse to severity, the thesis asserts that the realisation of these strategic consequences is a matter of 'when', not 'if'. Developed within a risk management framework, supported by literature reviews and case studies, and leading to observations and recommendations, the thesis responds by offering a pathway for further research which can mitigate air power’s cyber risk. If embraced, an opportunity exists for academia and practitioners to act in synergy, fill the identified gap in knowledge and address the risk proactively. Conversely, if ignored and the pathway is not followed, the implications will, the thesis predicts, result in the unmitigated strategic
consequences of air power’s cyber risk reshaping the geopolitical landscape of the 21st century