Security control for website defacement
Cyber-attacks to websites are increasing steadily affecting the integrity and availability of information, so the implementation of safeguards to mitigate or reduce to acceptable levels the risks generated are necessary. Computer incidents produce economic and reputational impacts to different organ...
- Autores:
-
Navarro Cadavid, Andrés
Oscar, Mondragón
Urcuqui, Christian
Mera Arcos, Andrés Felipe
- Tipo de recurso:
- Article of investigation
- Fecha de publicación:
- 2017
- Institución:
- Universidad ICESI
- Repositorio:
- Repositorio ICESI
- Idioma:
- spa
- OAI Identifier:
- oai:repository.icesi.edu.co:10906/82076
- Acceso en línea:
- http://www.icesi.edu.co/revistas/index.php/sistemas_telematica/article/view/2442/3090
https://hdl.handle.net/10906/82076
http://dx.doi.org/10.18046/syt.v15i41.2442
- Palabra clave:
- Aplicaciones Web
Seguridad en Internet
- Rights
- openAccess
- License
- http://creativecommons.org/licenses/by-nc-nd/4.0/
| id |
ICESI2_7b2f09cb6ff51284c6d968112ae58b77 |
|---|---|
| oai_identifier_str |
oai:repository.icesi.edu.co:10906/82076 |
| network_acronym_str |
ICESI2 |
| network_name_str |
Repositorio ICESI |
| repository_id_str |
|
| dc.title.spa.fl_str_mv |
Security control for website defacement |
| dc.title.alternative.none.fl_str_mv |
Validación y pruebas de un control de seguridad para defacement en sitios web |
| title |
Security control for website defacement |
| spellingShingle |
Security control for website defacement Aplicaciones Web Seguridad en Internet |
| title_short |
Security control for website defacement |
| title_full |
Security control for website defacement |
| title_fullStr |
Security control for website defacement |
| title_full_unstemmed |
Security control for website defacement |
| title_sort |
Security control for website defacement |
| dc.creator.fl_str_mv |
Navarro Cadavid, Andrés Oscar, Mondragón Urcuqui, Christian Mera Arcos, Andrés Felipe |
| dc.contributor.author.spa.fl_str_mv |
Navarro Cadavid, Andrés Oscar, Mondragón Urcuqui, Christian Mera Arcos, Andrés Felipe |
| dc.subject.proposal.spa.fl_str_mv |
Aplicaciones Web Seguridad en Internet |
| topic |
Aplicaciones Web Seguridad en Internet |
| description |
Cyber-attacks to websites are increasing steadily affecting the integrity and availability of information, so the implementation of safeguards to mitigate or reduce to acceptable levels the risks generated are necessary. Computer incidents produce economic and reputational impacts to different organizations. It has identified an increase in computer attacks on different organizations where one of them, and highly reputational impact, is the “Defacement” attack, which consists of unauthorized modification or alteration to the web sites, affecting the integrity of information. The result of this article proposes the development of a model for establishing a security control to perform the containment and reporting of this attack type, which currently have focused on the websites of the government entities. The development model allows online control the attack on Web sites by constant reading of certain parts of the source code making the detection and maintenance of the integrity of information. |
| publishDate |
2017 |
| dc.date.accessioned.none.fl_str_mv |
2017-10-03T15:20:38Z |
| dc.date.available.none.fl_str_mv |
2017-10-03T15:20:38Z |
| dc.date.issued.none.fl_str_mv |
2017-04-01 |
| dc.type.coar.none.fl_str_mv |
http://purl.org/coar/resource_type/c_2df8fbb1 |
| dc.type.local.spa.fl_str_mv |
Artículo |
| dc.type.version.spa.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
| dc.type.coarversion.none.fl_str_mv |
http://purl.org/coar/version/c_970fb48d4fbd8a85 |
| dc.type.driver.spa.fl_str_mv |
info:eu-repo/semantics/article |
| format |
http://purl.org/coar/resource_type/c_2df8fbb1 |
| status_str |
publishedVersion |
| dc.identifier.issn.none.fl_str_mv |
1692-5238 |
| dc.identifier.other.none.fl_str_mv |
http://www.icesi.edu.co/revistas/index.php/sistemas_telematica/article/view/2442/3090 |
| dc.identifier.uri.none.fl_str_mv |
https://hdl.handle.net/10906/82076 |
| dc.identifier.doi.none.fl_str_mv |
http://dx.doi.org/10.18046/syt.v15i41.2442 |
| dc.identifier.instname.none.fl_str_mv |
instname:Universidad Icesi |
| dc.identifier.reponame.none.fl_str_mv |
reponame:Biblioteca Digital |
| dc.identifier.repourl.none.fl_str_mv |
repourl:https://repository.icesi.edu.co/ |
| identifier_str_mv |
1692-5238 instname:Universidad Icesi reponame:Biblioteca Digital repourl:https://repository.icesi.edu.co/ |
| url |
http://www.icesi.edu.co/revistas/index.php/sistemas_telematica/article/view/2442/3090 https://hdl.handle.net/10906/82076 http://dx.doi.org/10.18046/syt.v15i41.2442 |
| dc.language.iso.spa.fl_str_mv |
spa |
| language |
spa |
| dc.relation.ispartof.none.fl_str_mv |
Sistemas y Telemática, Vol.15, No. 41 - 2017 |
| dc.relation.citationstartpage.none.fl_str_mv |
45 |
| dc.relation.citationendpage.none.fl_str_mv |
55 |
| dc.rights.uri.none.fl_str_mv |
http://creativecommons.org/licenses/by-nc-nd/4.0/ |
| dc.rights.accessrights.spa.fl_str_mv |
info:eu-repo/semantics/openAccess |
| dc.rights.license.none.fl_str_mv |
Atribución-NoComercial-SinDerivadas 4.0 Internacional (CC BY-NC-ND 4.0) |
| dc.rights.coar.none.fl_str_mv |
http://purl.org/coar/access_right/c_abf2 |
| rights_invalid_str_mv |
http://creativecommons.org/licenses/by-nc-nd/4.0/ Atribución-NoComercial-SinDerivadas 4.0 Internacional (CC BY-NC-ND 4.0) http://purl.org/coar/access_right/c_abf2 |
| eu_rights_str_mv |
openAccess |
| dc.format.extent.spa.fl_str_mv |
10 páginas |
| dc.format.medium.spa.fl_str_mv |
Digital |
| dc.coverage.spatial.spa.fl_str_mv |
Cali de Lat: 03 24 00 N degrees minutes Lat: 3.4000 decimal degrees Long: 076 30 00 W degrees minutes Long: -76.5000 decimal degrees. |
| dc.publisher.spa.fl_str_mv |
Universidad Icesi |
| dc.publisher.faculty.spa.fl_str_mv |
Facultad de Ingeniería |
| dc.publisher.program.spa.fl_str_mv |
Ingeniería Telemática |
| dc.publisher.department.spa.fl_str_mv |
Departamento Tecnologías De Información Y Comunicaciones Tic |
| dc.publisher.place.spa.fl_str_mv |
Santiago de Cali |
| institution |
Universidad ICESI |
| bitstream.url.fl_str_mv |
https://repository.icesi.edu.co/bitstreams/5f9b8cf2-8bdf-7785-e053-2cc003c84dc5/download https://repository.icesi.edu.co/bitstreams/5f9b8cf2-8be0-7785-e053-2cc003c84dc5/download https://repository.icesi.edu.co/bitstreams/5f9b8cf2-8be6-7785-e053-2cc003c84dc5/download |
| bitstream.checksum.fl_str_mv |
b2221e7466d196d9f5f3059d8fb9e642 8a4605be74aa9ea9d79846c1fba20a33 2f71a38736e7280ed14807d9783d1d22 |
| bitstream.checksumAlgorithm.fl_str_mv |
MD5 MD5 MD5 |
| repository.name.fl_str_mv |
Biblioteca Digital - Universidad Icesi |
| repository.mail.fl_str_mv |
adquisicion-bib@listas.icesi.edu.co |
| _version_ |
1841720157010919424 |
| spelling |
Navarro Cadavid, AndrésOscar, MondragónUrcuqui, ChristianMera Arcos, Andrés FelipeCali de Lat: 03 24 00 N degrees minutes Lat: 3.4000 decimal degrees Long: 076 30 00 W degrees minutes Long: -76.5000 decimal degrees.2017-10-03T15:20:38Z2017-10-03T15:20:38Z2017-04-011692-5238http://www.icesi.edu.co/revistas/index.php/sistemas_telematica/article/view/2442/3090https://hdl.handle.net/10906/82076http://dx.doi.org/10.18046/syt.v15i41.2442instname:Universidad Icesireponame:Biblioteca Digitalrepourl:https://repository.icesi.edu.co/Cyber-attacks to websites are increasing steadily affecting the integrity and availability of information, so the implementation of safeguards to mitigate or reduce to acceptable levels the risks generated are necessary. Computer incidents produce economic and reputational impacts to different organizations. It has identified an increase in computer attacks on different organizations where one of them, and highly reputational impact, is the “Defacement” attack, which consists of unauthorized modification or alteration to the web sites, affecting the integrity of information. The result of this article proposes the development of a model for establishing a security control to perform the containment and reporting of this attack type, which currently have focused on the websites of the government entities. The development model allows online control the attack on Web sites by constant reading of certain parts of the source code making the detection and maintenance of the integrity of information.Los ataques cibernéticos a sitios web constantemente afectan la integridad y disponibilidad de la información, esto hace necesaria la implementación de salvaguardas capaces de mitigar o reducir a niveles aceptables los riesgos generados. Los incidentes informáticos producen impactos económicos y de reputación para diferentes organizaciones. Se ha identificado un aumento en los ataques informáticos en diferentes organizaciones, uno de ellos con impacto altamente reputacional, el ataque defacement, que consiste en la modificación no autorizada o alteración de los sitios web, lo cual afecta la integridad de la información.10 páginasDigitalspaUniversidad IcesiFacultad de IngenieríaIngeniería TelemáticaDepartamento Tecnologías De Información Y Comunicaciones TicSantiago de CaliSistemas y Telemática, Vol.15, No. 41 - 20174555EL AUTOR, expresa que la obra objeto de la presente autorización es original y la elaboró sin quebrantar ni suplantar los derechos de autor de terceros, y de tal forma, la obra es de su exclusiva autoría y tiene la titularidad sobre éste. PARÁGRAFO: en caso de queja o acción por parte de un tercero referente a los derechos de autor sobre el artículo, folleto o libro en cuestión, EL AUTOR, asumirá la responsabilidad total, y saldrá en defensa de los derechos aquí autorizados; para todos los efectos, la Universidad Icesi actúa como un tercero de buena fe. Esta autorización, permite a la Universidad Icesi, de forma indefinida, para que en los términos establecidos en la Ley 23 de 1982, la Ley 44 de 1993, leyes y jurisprudencia vigente al respecto, haga publicación de este con fines educativos. Toda persona que consulte ya sea la biblioteca o en medio electrónico podrá copiar apartes del texto citando siempre las fuentes, es decir el título del trabajo y el autor.http://creativecommons.org/licenses/by-nc-nd/4.0/info:eu-repo/semantics/openAccessAtribución-NoComercial-SinDerivadas 4.0 Internacional (CC BY-NC-ND 4.0)http://purl.org/coar/access_right/c_abf2Security control for website defacementValidación y pruebas de un control de seguridad para defacement en sitios webComunidad Universidad Icesi - Investigadores1541Aplicaciones WebSeguridad en Internethttp://purl.org/coar/resource_type/c_2df8fbb1Artículoinfo:eu-repo/semantics/publishedVersionhttp://purl.org/coar/version/c_970fb48d4fbd8a85info:eu-repo/semantics/articleORIGINALdocumento.htmldocumento.htmltext/html379https://repository.icesi.edu.co/bitstreams/5f9b8cf2-8bdf-7785-e053-2cc003c84dc5/downloadb2221e7466d196d9f5f3059d8fb9e642MD51LICENSElicense.txtlicense.txttext/plain1748https://repository.icesi.edu.co/bitstreams/5f9b8cf2-8be0-7785-e053-2cc003c84dc5/download8a4605be74aa9ea9d79846c1fba20a33MD52TEXTdocumento.html.txtdocumento.html.txttext/plain73https://repository.icesi.edu.co/bitstreams/5f9b8cf2-8be6-7785-e053-2cc003c84dc5/download2f71a38736e7280ed14807d9783d1d22MD5310906/82076oai:repository.icesi.edu.co:10906/820762025-03-13 14:19:30.042http://creativecommons.org/licenses/by-nc-nd/4.0/Atribución-NoComercial-SinDerivadas 4.0 Internacional (CC BY-NC-ND 4.0)open.accesshttps://repository.icesi.edu.coBiblioteca Digital - Universidad Icesiadquisicion-bib@listas.icesi.edu.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 |
