Security control for website defacement
Cyber-attacks to websites are increasing steadily affecting the integrity and availability of information, so the implementation of safeguards to mitigate or reduce to acceptable levels the risks generated are necessary. Computer incidents produce economic and reputational impacts to different organ...
- Autores:
-
Oscar, Mondragón
Navarro Cadavid, Andrés
Mera Arcos, Andrés Felipe
Urcuqui, Christian
- Tipo de recurso:
- Article of investigation
- Fecha de publicación:
- 2017
- Institución:
- Universidad ICESI
- Repositorio:
- Repositorio ICESI
- Idioma:
- spa
- OAI Identifier:
- oai:repository.icesi.edu.co:10906/82076
- Acceso en línea:
- http://hdl.handle.net/10906/82076
http://www.icesi.edu.co/revistas/index.php/sistemas_telematica/article/view/2442/3090
http://dx.doi.org/10.18046/syt.v15i41.2442
- Palabra clave:
- Aplicaciones Web
Seguridad en Internet
- Rights
- openAccess
- License
- https://creativecommons.org/licenses/by-nc-nd/4.0/
id |
ICESI2_7b2f09cb6ff51284c6d968112ae58b77 |
---|---|
oai_identifier_str |
oai:repository.icesi.edu.co:10906/82076 |
network_acronym_str |
ICESI2 |
network_name_str |
Repositorio ICESI |
repository_id_str |
|
dc.title.spa.fl_str_mv |
Security control for website defacement |
dc.title.alternative.none.fl_str_mv |
Validación y pruebas de un control de seguridad para defacement en sitios web |
title |
Security control for website defacement |
spellingShingle |
Security control for website defacement Aplicaciones Web Seguridad en Internet |
title_short |
Security control for website defacement |
title_full |
Security control for website defacement |
title_fullStr |
Security control for website defacement |
title_full_unstemmed |
Security control for website defacement |
title_sort |
Security control for website defacement |
dc.creator.fl_str_mv |
Oscar, Mondragón Navarro Cadavid, Andrés Mera Arcos, Andrés Felipe Urcuqui, Christian |
dc.contributor.author.spa.fl_str_mv |
Oscar, Mondragón Navarro Cadavid, Andrés Mera Arcos, Andrés Felipe Urcuqui, Christian |
dc.subject.spa.fl_str_mv |
Aplicaciones Web Seguridad en Internet |
topic |
Aplicaciones Web Seguridad en Internet |
description |
Cyber-attacks to websites are increasing steadily affecting the integrity and availability of information, so the implementation of safeguards to mitigate or reduce to acceptable levels the risks generated are necessary. Computer incidents produce economic and reputational impacts to different organizations. It has identified an increase in computer attacks on different organizations where one of them, and highly reputational impact, is the “Defacement” attack, which consists of unauthorized modification or alteration to the web sites, affecting the integrity of information. The result of this article proposes the development of a model for establishing a security control to perform the containment and reporting of this attack type, which currently have focused on the websites of the government entities. The development model allows online control the attack on Web sites by constant reading of certain parts of the source code making the detection and maintenance of the integrity of information. |
publishDate |
2017 |
dc.date.accessioned.none.fl_str_mv |
2017-10-03T15:20:38Z |
dc.date.available.none.fl_str_mv |
2017-10-03T15:20:38Z |
dc.date.issued.none.fl_str_mv |
2017-04-01 |
dc.type.spa.fl_str_mv |
info:eu-repo/semantics/article |
dc.type.coar.none.fl_str_mv |
http://purl.org/coar/resource_type/c_2df8fbb1 |
dc.type.local.spa.fl_str_mv |
Artículo |
dc.type.version.spa.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
dc.type.coarversion.none.fl_str_mv |
http://purl.org/coar/version/c_970fb48d4fbd8a85 |
format |
http://purl.org/coar/resource_type/c_2df8fbb1 |
status_str |
publishedVersion |
dc.identifier.issn.none.fl_str_mv |
1692-5238 |
dc.identifier.other.none.fl_str_mv |
http://hdl.handle.net/10906/82076 |
dc.identifier.uri.none.fl_str_mv |
http://www.icesi.edu.co/revistas/index.php/sistemas_telematica/article/view/2442/3090 |
dc.identifier.doi.none.fl_str_mv |
http://dx.doi.org/10.18046/syt.v15i41.2442 |
dc.identifier.instname.none.fl_str_mv |
instname: Universidad Icesi |
dc.identifier.reponame.none.fl_str_mv |
reponame: Biblioteca Digital |
dc.identifier.repourl.none.fl_str_mv |
repourl: https://repository.icesi.edu.co/ |
identifier_str_mv |
1692-5238 instname: Universidad Icesi reponame: Biblioteca Digital repourl: https://repository.icesi.edu.co/ |
url |
http://hdl.handle.net/10906/82076 http://www.icesi.edu.co/revistas/index.php/sistemas_telematica/article/view/2442/3090 http://dx.doi.org/10.18046/syt.v15i41.2442 |
dc.language.iso.spa.fl_str_mv |
spa |
language |
spa |
dc.relation.ispartof.none.fl_str_mv |
Sistemas y Telemática, Vol.15, No. 41 - 2017 |
dc.rights.uri.none.fl_str_mv |
https://creativecommons.org/licenses/by-nc-nd/4.0/ |
dc.rights.accessrights.spa.fl_str_mv |
info:eu-repo/semantics/openAccess |
dc.rights.license.none.fl_str_mv |
Atribución-NoComercial-SinDerivadas 4.0 Internacional (CC BY-NC-ND 4.0) |
dc.rights.coar.none.fl_str_mv |
http://purl.org/coar/access_right/c_abf2 |
rights_invalid_str_mv |
https://creativecommons.org/licenses/by-nc-nd/4.0/ Atribución-NoComercial-SinDerivadas 4.0 Internacional (CC BY-NC-ND 4.0) http://purl.org/coar/access_right/c_abf2 |
eu_rights_str_mv |
openAccess |
dc.format.extent.spa.fl_str_mv |
10 páginas |
dc.format.medium.spa.fl_str_mv |
Digital |
dc.coverage.spatial.spa.fl_str_mv |
Cali de Lat: 03 24 00 N degrees minutes Lat: 3.4000 decimal degrees Long: 076 30 00 W degrees minutes Long: -76.5000 decimal degrees. |
dc.publisher.spa.fl_str_mv |
Universidad Icesi |
dc.publisher.faculty.spa.fl_str_mv |
Facultad de Ingeniería |
dc.publisher.program.spa.fl_str_mv |
Ingeniería Telemática |
dc.publisher.department.spa.fl_str_mv |
Departamento Tecnologías De Información Y Comunicaciones Tic |
dc.publisher.place.spa.fl_str_mv |
Santiago de Cali |
institution |
Universidad ICESI |
bitstream.url.fl_str_mv |
http://repository.icesi.edu.co/biblioteca_digital/bitstream/10906/82076/3/documento.html.txt http://repository.icesi.edu.co/biblioteca_digital/bitstream/10906/82076/2/license.txt http://repository.icesi.edu.co/biblioteca_digital/bitstream/10906/82076/1/documento.html |
bitstream.checksum.fl_str_mv |
2f71a38736e7280ed14807d9783d1d22 8a4605be74aa9ea9d79846c1fba20a33 b2221e7466d196d9f5f3059d8fb9e642 |
bitstream.checksumAlgorithm.fl_str_mv |
MD5 MD5 MD5 |
repository.name.fl_str_mv |
Biblioteca Digital - Universidad icesi |
repository.mail.fl_str_mv |
cdcriollo@icesi.edu.co |
_version_ |
1814094877533667328 |
spelling |
Oscar, MondragónNavarro Cadavid, AndrésMera Arcos, Andrés FelipeUrcuqui, ChristianCali de Lat: 03 24 00 N degrees minutes Lat: 3.4000 decimal degrees Long: 076 30 00 W degrees minutes Long: -76.5000 decimal degrees.2017-10-03T15:20:38Z2017-10-03T15:20:38Z2017-04-011692-5238http://hdl.handle.net/10906/82076http://www.icesi.edu.co/revistas/index.php/sistemas_telematica/article/view/2442/3090http://dx.doi.org/10.18046/syt.v15i41.2442instname: Universidad Icesireponame: Biblioteca Digitalrepourl: https://repository.icesi.edu.co/Cyber-attacks to websites are increasing steadily affecting the integrity and availability of information, so the implementation of safeguards to mitigate or reduce to acceptable levels the risks generated are necessary. Computer incidents produce economic and reputational impacts to different organizations. It has identified an increase in computer attacks on different organizations where one of them, and highly reputational impact, is the “Defacement” attack, which consists of unauthorized modification or alteration to the web sites, affecting the integrity of information. The result of this article proposes the development of a model for establishing a security control to perform the containment and reporting of this attack type, which currently have focused on the websites of the government entities. The development model allows online control the attack on Web sites by constant reading of certain parts of the source code making the detection and maintenance of the integrity of information.Los ataques cibernéticos a sitios web constantemente afectan la integridad y disponibilidad de la información, esto hace necesaria la implementación de salvaguardas capaces de mitigar o reducir a niveles aceptables los riesgos generados. Los incidentes informáticos producen impactos económicos y de reputación para diferentes organizaciones. Se ha identificado un aumento en los ataques informáticos en diferentes organizaciones, uno de ellos con impacto altamente reputacional, el ataque defacement, que consiste en la modificación no autorizada o alteración de los sitios web, lo cual afecta la integridad de la información.10 páginasDigitalspaUniversidad IcesiFacultad de IngenieríaIngeniería TelemáticaDepartamento Tecnologías De Información Y Comunicaciones TicSantiago de CaliSistemas y Telemática, Vol.15, No. 41 - 2017EL AUTOR, expresa que la obra objeto de la presente autorización es original y la elaboró sin quebrantar ni suplantar los derechos de autor de terceros, y de tal forma, la obra es de su exclusiva autoría y tiene la titularidad sobre éste. PARÁGRAFO: en caso de queja o acción por parte de un tercero referente a los derechos de autor sobre el artículo, folleto o libro en cuestión, EL AUTOR, asumirá la responsabilidad total, y saldrá en defensa de los derechos aquí autorizados; para todos los efectos, la Universidad Icesi actúa como un tercero de buena fe. Esta autorización, permite a la Universidad Icesi, de forma indefinida, para que en los términos establecidos en la Ley 23 de 1982, la Ley 44 de 1993, leyes y jurisprudencia vigente al respecto, haga publicación de este con fines educativos. Toda persona que consulte ya sea la biblioteca o en medio electrónico podrá copiar apartes del texto citando siempre las fuentes, es decir el título del trabajo y el autor.https://creativecommons.org/licenses/by-nc-nd/4.0/info:eu-repo/semantics/openAccessAtribución-NoComercial-SinDerivadas 4.0 Internacional (CC BY-NC-ND 4.0)http://purl.org/coar/access_right/c_abf2Aplicaciones WebSeguridad en InternetSecurity control for website defacementValidación y pruebas de un control de seguridad para defacement en sitios webinfo:eu-repo/semantics/articlehttp://purl.org/coar/resource_type/c_2df8fbb1Artículoinfo:eu-repo/semantics/publishedVersionhttp://purl.org/coar/version/c_970fb48d4fbd8a85Comunidad Universidad Icesi - Investigadores15414555TEXTdocumento.html.txtdocumento.html.txttext/plain73http://repository.icesi.edu.co/biblioteca_digital/bitstream/10906/82076/3/documento.html.txt2f71a38736e7280ed14807d9783d1d22MD53LICENSElicense.txtlicense.txttext/plain1748http://repository.icesi.edu.co/biblioteca_digital/bitstream/10906/82076/2/license.txt8a4605be74aa9ea9d79846c1fba20a33MD52ORIGINALdocumento.htmldocumento.htmltext/html379http://repository.icesi.edu.co/biblioteca_digital/bitstream/10906/82076/1/documento.htmlb2221e7466d196d9f5f3059d8fb9e642MD5110906/82076oai:repository.icesi.edu.co:10906/820762020-05-14 12:30:41.959Biblioteca Digital - Universidad icesicdcriollo@icesi.edu.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 |