Hakin9.Org Security”

Total Page:16

File Type:pdf, Size:1020Kb

Hakin9.Org Security” 05/2012 (53) PRACTICAL PROTECTION IT SECURITY MAGAZINE Dear all, Spring finally! After long and cold winter I was looking for an inspiration. I was sitting in a park on a sunny day, enjoying the wonderful weather. Suddenly dark, grey clouds showed up on the sky. This when I thought team “Let’s make an issue about Cloud Computing”. Few authors agreed with Editor in Chief: Grzegorz Tabaka me and here is what we have for you First article by Gurav Shah – “Cloud [email protected] Security”. There are a number of security issues/concerns associated Managing Editor: Marta Jabłońska with cloud computing but these issues fall into two broad categories: [email protected] Security issues faced by cloud providers and security issues faced Editorial Advisory Board: Gurav Shah, Craig S. by their customers. In most cases, the provider must ensure that their Wright, infrastructure is secure and that their clients’ data and applications are Skyler Onken, Ivan Venclova, Mohsen Mostafa Jokar, Mervyn Heng, Christopher Pedersen, Gary S. Milefsky, protected while the customer must ensure that the provider has taken the Julian Evans, David Prokop proper security measures to protect their information. The extensive use Proofreaders: Donald Iverson, Michael Munt, Elliott of virtualization in implementing cloud infrastructure brings unique security Bujan, Bob Folden, Steve Hodge, Jonathan Edwards, concerns for customers or tenants of a public cloud service. Virtualization Steven Atcheson alters the relationship between the OS and underlying hardware – be Top Betatesters: Ivan Burke, John Webb, Nick Baronian, it computing, storage or even networking. This introduces an additional Felipe Martins, Alexandre Lacan, Rodrigo Rubira Branco layer – virtualization – that itself must be properly configured, managed Special Thanks to the Beta testers and Proofreaders who helped us with this issue. Without their assistance and secured. Specific concerns include the potential to compromise the there would not be a Hakin9 magazine. virtualization software, or “hypervisor”. While these concerns are largely Senior Consultant/Publisher: Paweł Marciniak theoretical, they do exist. CEO: Ewa Dudzic Next article by Gary s. Milefsky “Hacking the Cloud. Did someone [email protected] say Swiss Chees?” What is the cloud? Is it the glorified internet? Is it an Production Director: Andrzej Kuca ISP who likes to run virtualized servers? Once we truly understand what [email protected] Cloud Computing is, then let us look at the holes in the Cloud…I argue DTP: Ireneusz Pogroszewski that yes, the cloud is like Swiss Cheese, loaded with holes and ripe for Art Director: Ireneusz Pogroszewski exploitation. By the way, who is responsible for compliance when it comes [email protected] to ‘moving’ everything to the cloud – is it the Cloud Service provider or is Publisher: Software Press Sp. z o.o. SK it you, the company providing a service to end-customers/consumers? 02-682 Warszawa, ul. Bokserska 1 Phone: 1 917 338 3631 When it comes to regulatory compliance, if your cloud provider is not www.hakin9.org/en SAS-70 audited regularly (most are NOT) then don’t expect them to be responsible for your compliance posture. If there is a breach in the cloud, the bottom line is that it’s your responsibility, if you are using Cloud Computing to host servers or services used for your outward facing Whilst every effort has been made to ensure the high business or if you store confidential customer records ‘in the cloud.’ quality of the magazine, the editors make no warranty, Christopher Pedersen in an article “Do You Have The Correct express or implied, concerning the results of content usage. Cloud? Cloud Privacy” talks about types of cloud and how to keep your All trade marks presented in the magazine were used information private. only for informative purposes. We are starting to move to IPv6 and the cloud. Right now, the uptake is minimal at best with very few early adopters for all of the hype. The All rights to trade marks presented in the magazine are reserved by the companies which own them. climate is changing. Soon, IP addresses will be on everything and even To create graphs and diagrams we used the concept of non-disclosure agreements and contracts designed to program by protect intellectual property will require that we consider the nature of the cloud and the Internet as a platform for contractual negotiation. Read in Mathematical formulas created by Design Science more in “Secure commerce in the Mist” by Craig S Wright. MathType™ We have a new section in our magazine. “Extra Articles”. We prestent there articles which are not related to the main topic of the magazine, but DISCLAIMER! are very valuable and interesting. Check them out! The techniques described in our articles Like in every issue at the beginning you will find short news from IT may only be used in private, local networks. world and also we recommend Tool Time and (Il)legal columns. The editors hold no responsibility for I wish you a very good reading! misuse of the presented techniques or consequent data loss. Marta & Hakin9 Team 4 05/2012 �������������� ������������������������������������������������� ��������������������������������������������� ��������������� ��������������� �������������������������������������������� ���������������������������������������������� ���������������������������� ������������������������������������������������������������������������� ���������������������������������� 5 � CONTENTS IN BRIEF different way. The two primary differences are that your organization will share infrastructure resources with 8 IN BRIEF other organizations. Second, your organization trusts by Armando Romeo, eLearnSecurity and ID Theft the strength of the selected cloud vendor’s security Protect infrastructure, policies, and procedures. During the As usual specialists from companies eLearn Security selection of your organizations cloud computing services and ID Theft protect will share with us latest news from IT look in depth at the following areas and ensure that your security world. Read it to up-date yourself. selected vendor has addressed each topic and meets your organizations security policies and regulatory BASICS requirements. 10 Cloud Security 28 Do You Have The Correct Cloud? Cloud by Gurav Shah Privacy There are a number of security issues/concerns by Christopher Pedersen associated with cloud computing but these issues In both personal and business settings, clouding can be fall into two broad categories: Security issues faced a great tool. But how do you know that when you upload by cloud providers and security issues faced by their your information into the cloud it is private? Can anyone customers. In most cases, the provider must ensure that just connect to your data-store and start perusing through their infrastructure is secure and that their clients’ data your information? These are a few questions that we will and applications are protected while the customer must discuss. If you don’t know what the correct type of cloud ensure that the provider has taken the proper security is that you need, you may fail. The reason for this failure measures to protect their information. The extensive could primarily be a privacy issue. Yes, Privacy.The first use of virtualization in implementing cloud infrastructure question is, why are you using the cloud – business or brings unique security concerns for customers or personal? Most people don’t use the right type of cloud. tenants of a public cloud service. Virtualization alters the Are you launching applications, servers, or developing? relationship between the OS and underlying hardware – Are you using the correct cloud type that also delivers the be it computing, storage or even networking. correct amount of privacy? 18 Hacking the Cloud. Did someone say 32 Secure commerce in the Mist Swiss Cheese? by Craig S. Wright by Gary S. Milefsky We are starting to move to IPv6 and the cloud. Right now, What is the cloud? Is it the glorified internet? Is it an the uptake is minimal at best with very few early adopters ISP who likes to run virtualized servers? Once we truly for all of the hype. The climate is changing. Soon, IP understand what Cloud Computing is, then let us look at addresses will be on everything and even the concept the holes in the Cloud…I argue that yes, the cloud is like of non-disclosure agreements and contracts designed to Swiss Cheese, loaded with holes and ripe for exploitation. protect intellectual property will require that we consider By the way, who is responsible for compliance when it the nature of the cloud and the Internet as a platform for comes to ‘moving’ everything to the cloud – is it the Cloud contractual negotiation. Service provider or is it you, the company providing a service to end-customers/consumers? When it comes to regulatory compliance, if your cloud provider is not SAS- EXTRA ARTICLES 70 audited regularly (most are NOT) then don’t expect 36 Understanding Cyber Warfare and its them to be responsible for your compliance posture. Strategic Applications by Skyler Onken 24 A Secure Cloud? Simplicity is very important in every aspect of warfare. It by David Prokop is very difficult to coordinate such a large group of people As IT professionals we can’t look into our inboxes without to do a variety of tasks perfectly synchronized with each seeing a new whitepaper or webcast related to the cloud. other. Every level of complexity adds an exponential While usually helpful, rarely does the information address amount of time that is needed to train and rehearse the our favorite topic, security. In reality can a cloud based coordinated effort. Because of this cyber assets should system protect your data? In short, yes. Security threats keep their tasks relatively straight forward when working to a system based on cloud services are similar to a within a combined arms mission. When follow on units will traditional data center the threats just manifest in a be relying upon the efforts of a non-kinetic cyber force, it 6 05/2012 www.hakin9.org/en CONTENTS creates a large amount of “what-if” scenarios for that unit.
Recommended publications
  • Os X Block Application from Internet Access
    Os X Block Application From Internet Access ionopause!Photographic Cupolated Rickard fibDru some grumbled guacharos sanctimoniously. and microfilm his determent so promisingly! Overviolent and malfunctioning Pasquale never balloted his Then, using Vallum, you can set bandwidth limits for each process, independently. IE by calling this without checking the console exists first. We have strong opinions about controlling where kids use their tech. Murus makes use of anchors to separate inbound and outbound filtering rules from options rules, redirection, translation and dummynet rules. Safari says that it cannot locate the website host; it does not say I am not connected to the Internet. Managed Services views, and assigning groups to such services. Do you see anything new you could remove so you can try again? Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. An inclusive firewall does the reverse. As a quick update it seems that is you are not using an account with admin privileges, you may need supply admin credentials for the first time you download an app to install it, which may solve some of the problem. OS X Server offers options for managing this, but you can also do the same in the client version of the OS. Talk with your children so they know what is acceptable, who they are allowed to text, sites they should stay away from, for example. Then everything else is blocked. Dropbox syncing newly changed files, and so on.
    [Show full text]
  • Hostscan 4.8.01064 Antimalware and Firewall Support Charts
    HostScan 4.8.01064 Antimalware and Firewall Support Charts 10/1/19 © 2019 Cisco and/or its affiliates. All rights reserved. This document is Cisco public. Page 1 of 76 Contents HostScan Version 4.8.01064 Antimalware and Firewall Support Charts ............................................................................... 3 Antimalware and Firewall Attributes Supported by HostScan .................................................................................................. 3 OPSWAT Version Information ................................................................................................................................................. 5 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.890.0 for Windows .................................................. 5 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.890.0 for Windows ........................................................ 44 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.824.0 for macos .................................................... 65 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.824.0 for macOS ........................................................... 71 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.730.0 for Linux ...................................................... 73 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.730.0 for Linux .............................................................. 76 ©201 9 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
    [Show full text]
  • Carbon Copy Cloner Documentation: English
    Carbon Copy Cloner Documentation: English Getting started with CCC System Requirements, Installing, Updating, and Uninstalling CCC CCC License, Registration, and Trial FAQs Trouble Applying Your Registration Information? Establishing an initial backup Preparing your backup disk for a backup of Mac OS X Restoring data from your backup What's new in CCC Features of CCC specific to Lion and greater Release History Carbon Copy Cloner's Transition to a Commercial Product: Frequently Asked Questions Credits Example backup scenarios I want to clone my entire hard drive to a new hard drive or a new machine I want to backup my important data to another Macintosh on my network I want to backup multiple machines or hard drives to the same hard drive I want my backup task to run automatically on a scheduled basis Backing up to/from network volumes and other non-HFS volumes I want to back up my whole Mac to a Time Capsule or other network volume I want to defragment my hard drive Backup and archiving settings Excluding files and folders from a backup task Protecting data that is already on your destination volume Managing previous versions of your files Automated maintenance of CCC archives Advanced Settings Some files and folders are automatically excluded from a backup task The Block-Level Copy Scheduling Backup Tasks Scheduling a task and basic settings Performing actions Before and After the backup task Deferring and skipping scheduled tasks Frequently asked questions about scheduled tasks Email and Growl notifications Backing Up to Disk Images
    [Show full text]
  • Ethical Hacking and Countermeasures Version 6
    Ethical Hacking and Countermeasures Version 6 Modu le LX Firewall Technologies News Source: http://www.internetnews.com/ Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Module Objective This modu le will fam iliar ize you wihith: • Firewalls • Hardware Firewalls • Software Firewalls • Mac OS X Firewall • LINUX Firewall • Windows Firewall Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Module Flow Firewalls Mac OS X Firewall Hardware Firewalls LINUX Firewall Software Firewalls Windows Firewall Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Firewalls: Introduction A firewall is a program or hardware device that protects the resources of a private netw ork from users of other networks It is responsible for the traffic to be allowed to pass, block, or refuse Firewall also works with the proxy server It helps in the protection of the private network from the users of the different network Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Hardware Firewalls Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Hardware Firewall Har dware Firewa lls are place d in the perime ter of the networ k It employs a technique of packet filtering It reads the header of a packet to find out the source and destination address The information is then compared with the set of predefined and/orand/ or user created rules that determine whether the packet is forwarded or dropped Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Netgear Firewall Features: • ItInterne t shar ing broa dbddband router and 4-port switch • 2x the speed and 4x times the coverage of a Wireless-G router • Configurable for private networks and public hotspots • Double Firewall protection from external hackers attacks • Touchless WiFi Security makes it easy to secure your network Copyright © by EC-Council EC-Council All Rights Reserved.
    [Show full text]
  • 4. Offensive and Defensive Network Security Cryptoworks21 • July 15, 2021
    Fundamentals of Network Security 4. Offensive and defensive network security CryptoWorks21 • July 15, 2021 Dr Douglas Stebila https://www.douglas.stebila.ca/teaching/cryptoworks21 Fundamentals of Network Security • Basics of Information Security – Security architecture and infrastructure; security goals (confidentiality, integrity, availability, and authenticity); threats/vulnerabilities/attacks; risk management • Cryptographic Building Blocks – Symmetric crypto: ciphers (stream, block), hash functions, message authentication codes, pseudorandom functions – Public key crypto: public key encryption, digital signatures, key agreement • Network Security Protocols & Standards – Overview of networking and PKI – Transport Layer Security (TLS) protocol – Overview: SSH, IPsec, Wireless (Tool: Wireshark) • Offensive and defensive network security – Offensive: Pen-tester/attack sequence: reconnaissance; gaining access; maintaining access (Tool: nmap) • Supplemental material: denial of service attacks – Defensive: Firewalls and intrusion detection • Access Control & Authentication; Web Application Security – Access control: discretionary/mandatory/role-based; phases – Authentication: something you know/have/are/somewhere you are – Web security: cookies, SQL injection – Supplemental material: Passwords 3 Assignment 2 2a) Offensive network 2b) Defensive network security security • Use nmap to scan • Set up firewall rules in services running on your Kali to prevent your computer certain types of – Will be scanning from outbound traffic (egress guest
    [Show full text]
  • Cehv6 Program Guide.Indd
    Page 1 Ethical Hacking and Countermeasures http://www.eccouncil.orghttp://www.eccouncil.org EC-CouncilEC-Council TM Page 2 CEH Certified Ethical Hacker http://www.eccouncil.org EC-Council Table of Contents Page 3 What is New in CEHv6? .............................................. Page 4 CEHv6 Fact Sheet ........................................................ Page 5 CEH Training Program ................................................ Page 9 Course Outline ............................................................ Page 10 Classroom Lecture Hours ............................................ Page 159 CEHv6 Labs ............................................................... Page 162 Module Briefi ng .......................................................... Page 178 CEHv6 Exam Objectives ............................................ Page 193 http://www.eccouncil.org EC-Council Lets’ Stop the Hackers Menace. Master the Hacking Technologies. Become a CEH. Page 4 http://www.eccouncil.org EC-Council CEH v6 Fact Sheet Page 5 1. What is the nature of the course change? CEHv6 has been updated with tons of new hacking tools, new hacking techniques and methodologies. The fl ow of the content is the same except each module is refreshed with more content. There are advanced modules added to the curriculum like Writing Windows Exploits, Reverse Engineering, Covert Hacking and Advanced Virus Writing Skills. The slides are updated to make them more presentable. There are over 67 modules in CEHv6. 2. Are there accompanying certifi cation changes? The CEHv6 exam will be available at Prometric Prime, Prometric APTC and VUC Centers on November 5th 2008. The old CEHv5 exam will still be available until June 3rd 2009. 3. How much will the new exam cost? The updated CEH v6 will cost USD 250. 4. What is the duration of the exam? The exam will be 4 hours with 150 questions. The passing score is 70% 5.
    [Show full text]
  • Macos Hardening Guide
    Appendix - Mac OS Security Hardening Guide A MacOS Hardening Guide The default configuration of MacOS remains quite permissive, but it's generally simple to enforce in MacOS a hardened level of security approaching (but still not quite as strong as) that of iOS. Any security hardening may impact performance and usability across the system. It's highly recommended to try these recommendations out gradually on a test system before applying them fully in any production environment. There are many approaches to hardening, and quite a few guides (such as CIS Apple OSX Security Benchmark), including automated tools (e.g. osx-config-check) exist. Most, however, go a little bit overboard in some recommendations (e.g. disabling Javascript in the browser which - while greatly improving security - propels the innocent user into the nostalgic WWW of the 1990s). The recommendations presented here try to greatly enhance the overall security posture, while minimizing user pain and suffering as much as possible. There are also some recommendations here which are overlooked by other common documents. I also tried to focus on "built-in" and "out of box" functions and settings, and stayed away from pointing out Anti- Virus, Anti-Malware, or in general third party products, save from pointing out they exist, where applicable. Because approaches do differ, I originally did not think of adding such a guide to my book. Following a question by Sebastien Volpe, however, I realized it would be a good addition as somewhat of an informal "conclusion" to the book,
    [Show full text]
  • Topnet: a Network-Aware Top(1) Antonis Theocharides, Demetres Antoniades, Michalis Polychronakis, Elias Athanasopoulos, and Evangelos P
    Topnet: A Network-Aware top(1) Antonis Theocharides, Demetres Antoniades, Michalis Polychronakis, Elias Athanasopoulos, and Evangelos P. Markatos – Foundation for Research and Technology; Hellas, Greece1 ABSTRACT System administrators regularly use the top utility for understanding the resource consumption of the processes running on UNIX computers. Top provides an accurate and real-time display of the computing and memory capacity of the system among the running processes, but it provides no information about the network traffic sent and received by the processes running on the system. Although we’ve seen a proliferation of network monitoring tools that help system ad- ministrators understand the traffic flowing through their networks, most of these tools have been designed for network deployment and can not easily, if at all, provide real-time attribution of network resources to individual processes running on end hosts. In this paper, we describe the design and implementation of Topnet, an extension of the top UNIX utility that provides a process-centric approach to traffic monitoring. Topnet presents users with an intuitive real-time attribution of network resources to individual processes. Our evaluation suggests that Topnet through (i) the familiar user interface of top and (ii) a reasonable performance overhead, provides an accurate way to attribute network traffic to individual processes, enabling users to have a more comprehensive process-aware understanding of network resource con- sumption in their systems. Introduction directly using the application, Skype may still con- sume processor and network resources to relay other The UNIX top utility [34] is used daily by users and system administrators for real time monitoring of users’ traffic and keep the overlay network well con- system and process information.
    [Show full text]
  • Maintainname Vendorname Productname Product Version
    Product MaintainName VendorName ProductName Version (For Mac) BitDefender (1.x) SOFTWIN BitDefender 1.x (For Mac) ESET NOD32 Antivirus (4.x) Eset Software ESET NOD32 Antivirus 4.x Computer Associates (For Mac) eTrust ITM Agent (8.x) eTrust ITM Agent 8.x International, Inc. (For Mac) iAntiVirus (1.x) PC Tools Software iAntiVirus 1.x (For Mac) McAfee Security (1.x) McAfee, Inc. McAfee Security 1.x (For Mac) McAfee VirusScan for Mac 9.0 McAfee, Inc. McAfee Security 1.x (For Mac) Norton AntiVirus (9.x) Symantec Corp. Norton AntiVirus 9.x (For Mac) Norton AntiVirus (10.x) Symantec Corp. Norton AntiVirus 10.x (For Mac) Norton AntiVirus (11.x) Symantec Corp. Norton AntiVirus 11.x (For Mac) Trend Micro Security for Trend Micro, Inc. Trend Micro Security for Macintosh 1.x Macintosh (1.x) (For Mac) Trend Micro Security for Trend Micro, Inc. Trend Micro Security for Macintosh 3.x Macintosh (3.x) (For Mac) VirusScan (8.5.x) McAfee, Inc. VirusScan 8.5.x (For Mac) VirusScan (8.6.x) McAfee, Inc. VirusScan 8.6.x (360Safe.com) 360 Antivirus (1.x) 360Safe.com 360 Antivirus 1.x (360Safe.com) 360杀毒 360Safe.com 360 Antivirus 1.x (360Safe.com) 360杀毒 (1.x) 360Safe.com 360杀毒 1.x (360Safe.com) 360 Antivirus 360Safe.com 360杀毒 1.x (360Safe.com) 360杀毒 (2.x) 360Safe.com 360杀毒 2.x (360Safe.com) 360 Antivirus 360Safe.com 360杀毒 2.x (AEC, spol. s r.o.) TrustPort Antivirus (2.x) AEC, spol. s r.o. TrustPort Antivirus 2.x (Agnitum Ltd.) Outpost Antivirus Pro (7.x) Agnitum Ltd.
    [Show full text]
  • Cisco Anyconnect ISE Posture Mac OSX Support Charts for Compliance Module V4.2.1019.0
    Cisco AnyConnect ISE Posture Mac OSX Support Charts for Compliance Module v4.2.1019.0 August 23, 2017 © 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco public. Page 1 of 9 Contents Anti-Malware ............................................................................................................................................................................... 3 Patch Management..................................................................................................................................................................... 6 Disk Encryption .......................................................................................................................................................................... 7 Firewall ........................................................................................................................................................................................ 8 ©2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 9 This document lists the Mac OSX anti-malware, patch management, disk encryption, and firewall products that are supported by the ISE Posture Agent. The Mac OSX compliance modules are version 4.2.1019.0. Anti-Malware Definition State Application Application Min. Compliance Product Name Product Version Live Update Application Kill Check Running Check Uninstall Module Version Kaspersky Lab Kaspersky Internet Security 15.x yes yes yes - yes 4.2.701.0 Kaspersky Internet Security 10.x yes yes
    [Show full text]
  • Block Outgoing Connections Mac Without Little Snitch Crack ->>->>->> DOWNLOAD
    Block Outgoing Connections Mac Without Little Snitch Crack ->>->>->> DOWNLOAD 1 / 5 2 / 5 Little Snitch reports outgoing connections from . I believe IPTables would have no such trouble in blocking . Can using Little Snitch make my mac Less Secure .4 Best Apple Firewall Apps For macOS X Web Application . Firewall for incoming connections. Little Snitch not only reveals any outgoing network connection .Little Snitch 2017 Mac utility allows you to block traffic in different applications. With the help of Little Snitch you can in real time to monitor any outgoing .Little Snitch gives you control over your private outgoing . future connection attempts. Little Snitch runs . Alerts you about outgoing network connections .Little Snitch alerts you to outgoing network connections. A firewall protects your computer against unwanted guests from the Internet. But who protects your private .. used to block Internet connections, Little Snitch 3 . incoming and outgoing connection traffic such as block . Little Snitch v3.6.4352 Cracked Mac .block Internet connections. Little Snitch 3.6 Build 4352 + Serial Mac OSX September 29th, 2015. Little Snitch . and outgoing connection traffic such as block . Protects your privacy and prevents your private data from being sent our tot the Internet without . network connections based . Little Snitch offers a free .. control of your outgoing data. Little snitch 3.7.4 crack allows or . them to connect with . without any control. Little Snitch Mac Crack stops .. control of your outgoing data. Little snitch 3.7.4 crack allows or . them to connect with . without any control. Little Snitch Mac Crack stops .Is there a better way to block incoming/outgoing connections than the .
    [Show full text]
  • 4. Implementación De La Red Privada Virtual
    FACULTAD DE INGENIERÍA MAESTRÍA EN TECNOLOGÍAS DE LA INFORMACIÓN MENCIÓN REDES DE COMUNICACIONES TRABAJO DE TITULACIÓN PREVIO A LA OBTENCIÓN DEL TÍTULO DE MASTER EN TECNOLOGÍAS DE LA INFORMACIÓN MENCIÓN REDES DE COMUNICACIONES Título: ESTUDIO PARA LA IMPLEMENTACIÓN DE UNA RED PRIVADA VIRTUAL(VPN) UTILIZANDO HERRAMIENTAS DE SOFTWARE LIBRE. Caso de estudio “COMISION FULBRIGHT DEL ECUADOR” AUTOR: LUIS MARCELO QUISHPE IZA DIRECTOR: GUILLERMO ALFONSO GALLEGOS ARIAS QUITO, 2021 – MARZO ESTUDIO PARA LA IMPLEMENTACIÓN DE UNA RED PRIVADA VIRTUAL(VPN) UTILIZANDO HERRAMIENTAS DE SOFTWARE LIBRE. Caso de estudio “COMISION FULBRIGHT DEL ECUADOR” DEDICATORIA Quiero dedicar este trabajo a mi familia, mi amada esposa Mirian por toda su ayuda y con quien he pasado un sin número de momentos y varias etapas de mi vida durante 24 años, a mis hijos Cristian y Valeria quienes son los que me dan la fuerza para levantarme cada día y son quienes han llenado toda mi vida de alegrías. I Autor: Quishpe Iza Luis Marcelo ESTUDIO PARA LA IMPLEMENTACIÓN DE UNA RED PRIVADA VIRTUAL(VPN) UTILIZANDO HERRAMIENTAS DE SOFTWARE LIBRE. Caso de estudio “COMISION FULBRIGHT DEL ECUADOR” AGRADECIMIENTO Agradezco a Dios, quien nos permite ser seres inteligentes que aprenden día con día y pueden elegir el camino a su futuro y mientras él me lo permita, seguiré intentando mejorar tanto como ser humano, así como profesional. Agradezco también a mi madre quien no pudo ayudarme con mis primeros deberes cuando era niño y no porque no quería, sino porque sus conocimientos no le permitieron, con quien llore muchas noches por no poder terminar dichos deberes, pero me enseñó a ser una persona responsable, amable, luchadora y nunca decir no puedo, en otras palabras, me enseñó a ser una persona de bien.
    [Show full text]