Diseño del sistema de seguridad de la Universidad de Granma.

Authors

  • Manuel José Linares Alvaro
  • Jose Owaldo Mendoza García INTITUTO SUPERIOR UNIVERSITARIO PORTOVIEJO
  • Kenny Orlando Suasti Alcivar Instituto Superior Tecnológico Portoviejo https://orcid.org/0000-0002-0169-920X
  • Ligia Vanessa Sánchez Parrales Instituto Superior Tecnológico Portoviejo https://orcid.org/0000-0002-1719-8944

DOI:

https://doi.org/10.37117/s.v2i21.654

Keywords:

computer security, network security, network management, information technology, network administration

Abstract

The network of the University of Granma, Bayamo, Cuba, is one of the largest in the province: it covers the thirteen municipalities that make it up, since its servers provide various services to each of the university campuses (extensions) that exist in each province region. Despite the fact that it has been in service and in operation for 25 years, there has never been an event that has compromised both the security of its systems and the integrity of the information stored on its servers, and this is due to strict compliance with the security and protection measures established from the outset and, above all, to the design of a robust computer security system, which consists of the use and application of a combined strategy of different sub-systems, which has evolved over time and seeks, on the one hand, to achieve the maximum possible approximation of the service level expected (SLAs) of the network, to international standards (99.9%) and, on the other, to guarantee the integrity and availability of the information that is stored on the servers. stores. That is why this work aims to expose and share the actions that were carried out to implement the Network Security System of the University of Granma.

Downloads

Download data is not yet available.

References

Bacula.org. (2022). Documentación de Bacula. from https://www.bacula.org/documentation/

Ding, J. (2009). Advances in Network Management: CRC Press.

Gómez, D., & González, A. (2013). ARQUITECTURA PARA LA GESTIÓN DE SERVICIOS ADMINISTRADOS DE TECNOLOGÍA. (MAESTRÍA EN GESTIÓN INFORMÁTICA Y TELECOMUNICACIONES SANTIAGO DE CALI). Retrieved from https://www.google.com.cu/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&uact=8&ved=0ahUKEwjQ0Ma-tYzOAhWsyoMKHapCCbcQFggaMAA&url=https%3A%2F%2Fcore.ac.uk%2Fdownload%2Fpdf%2F41976485.pdf& usg=AFQjCNG10CEOGyucfCAewHnT26tAAtrTfA&bvm=bv.127984354,d.cWw

López, P. A. (2010). Seguridad informática: Editex.

Marrero, D., & Hernández, H. (2016). IMPLEMENTACIÓN DE UN SISTEMA DE GESTIÓN PARA LA RED NACIONAL UNIVERSITARIA. Trabajo de diploma para optar por el Título de Ingeniero en Telecomunicaciones y Electrónica), Instituto Superior Politécnico “José Antonio Echeverría.

Nagios. (2022). Documentación oficial de Nagios. from https://library.nagios.com/

Pastor, F. (2015). Propuesta de política de gestión de capacidad para una compañía de tecnologías de la información de acuerdo con los requerimientos de ITIL. 3 Ciencias, 4.

Pérez, L. (2013). ESTUDIO COMPARATIVO DE LOS SISTEMAS GESTIÓN Y MONITOREO BASADOS EN LOS REQUERIMIENTOS GENERALES DE LA RED DE UN CAMPUS UNIVERSITARIO. Master en Redes de Comunicaciones), Pontificia Universidad Católica del Ecuador.

Trujillo Alvira, J. O. (2022). Diseñar estrategias complementarias para mejorar la seguridad informática y de la información en la compañía QWERTY SA utilizando la norma ISO 27001.

Published

2022-12-31

How to Cite

Linares Alvaro, M. J., Mendoza García, J. O., Suasti Alcivar, K. O., & Sánchez Parrales, L. V. (2022). Diseño del sistema de seguridad de la Universidad de Granma. Sinapsis, 2(21). https://doi.org/10.37117/s.v2i21.654

Issue

Section

Articulo Especial. Temas Latinoamericanos
Share |

Most read articles by the same author(s)