Pour Une Problématisation De La Technologie En Éducation Propositions Théoriques Pour Un Espace Pédagogique Alternatif De La Technologie

Total Page:16

File Type:pdf, Size:1020Kb

Pour Une Problématisation De La Technologie En Éducation Propositions Théoriques Pour Un Espace Pédagogique Alternatif De La Technologie Pour une problématisation de la technologie en éducation Propositions théoriques pour un espace pédagogique alternatif de la technologie Thèse Patrick Plante Doctorat en technologie éducative Philosophiae Doctor (Ph.D) Québec, Canada © Patrick Plante, 2014 Résumé Cette thèse s’intéresse à la place alternative que pourrait prendre la technologie dans la poursuite des grandes finalités éducatives qui ont pour objectif de former des citoyens qui ont le souci des autres et qui participent à relever les défis de notre temps. Proposer un rôle alternatif à la technologie en éducation, c’est d’abord critiquer son rôle actuel, c’est faire passer la technologie du statut de solution à celui de problème. Cette critique de la technologie se fonde sur une perspective issue des théories critiques qui autorise à penser la technologie au-delà de son aspect fonctionnel en y reconnaissant un aspect politique. La démarche méthodologique empruntée dans cette recherche est théorique et spéculative, interpellant les axes que sont l’interprétation, l’argumentation et le récit. Cette thèse a pour premier objectif l’appropriation de la théorie politique de la technologie d’Andrew Feenberg. Cette théorie, qui est aussi le cadre théorique de la recherche, est présentée aux côtés des principales théories de la technologie. Un deuxième objectif consiste à dresser un idéal-type du hacker. Le hacker est ce personnage de la révolution numérique qui code, décode et recode la technologie et les réseaux. C’est cet idéal-type qui est confronté à la théorie de Feenberg. Un dernier objectif consiste à formuler des propositions théoriques qui pourraient enrichir le champ d’études de la technologie éducative en intégrant d’une manière explicite la dimension politique de la technologie en vue de constituer un espace pédagogique alternatif de la technologie. La mise en parallèle de la théorie de Feenberg et de l’idéal-type du hacker nous permet de souligner l’importance de certaines adéquations. Il semble que tenir compte de la friction entre un pouvoir de normalisation et un pouvoir d’affirmation de la part de citoyens-acteurs change l’espace pédagogique traditionnel de la technologie. Cette friction, loin d’être nuisible, est plutôt la chance de comprendre le type d’humain normé qui est produit par une technologie, et de modifier ce processus par le souci de soi et des autres. Cette « pédagogie de la technologie » intègre des aspects politiques, esthétiques et éthiques sans rejeter l’aspect fonctionnel de la technique. iii Table des matières Résumé .................................................................................................................................. iii Table des matières .................................................................................................................. v Liste des tableaux ................................................................................................................... ix Liste des figures ..................................................................................................................... xi Remerciements .................................................................................................................... xiii Introduction ............................................................................................................................. 1 CHAPITRE 1 Problématique ............................................................................................. 3 1.1 Citoyenneté et technologie en éducation ...................................................................... 4 1.1.1 Nos expériences académiques et militantes de la citoyenneté ............................... 4 1.1.2 La citoyenneté comme finalité éducative ............................................................ 10 1.1.3 La technologie et la citoyenneté en éducation ..................................................... 13 1.1.4 Un système, deux modèles ................................................................................... 20 1.2 La technologie éducative et les finalités démocratiques de l’éducation ..................... 22 1.2.1 Le développement de la technologie éducative au Québec ................................. 22 1.2.2 Les paradigmes de la technologie éducative ........................................................ 26 1.2.3 Le « code » de la technologie .............................................................................. 35 1.3 Le bilan des préoccupations ........................................................................................ 38 1.4 La formulation d’un problème .................................................................................... 41 1.4.1 Le problème de recherche .................................................................................... 41 1.4.2 La question de recherche ..................................................................................... 42 1.4.3 Les objectifs de recherche .................................................................................... 43 CHAPITRE 2 Épistémologie et méthodologie ................................................................ 45 2.1 Intentionnalité, disciplines et épistémologie ............................................................... 46 2.1.1 Une recherche de type théorique ......................................................................... 46 2.1.2 Approche interdisciplinaire en technologie éducative ......................................... 51 2.1.3 Une posture épistémologique ............................................................................... 52 2.2 Les axes méthodologiques .......................................................................................... 56 2.2.1 L’axe de l’interprétation ...................................................................................... 56 2.2.2 L’axe de l’argumentation ..................................................................................... 65 2.2.3 L’axe du récit ....................................................................................................... 66 2.2.4 Les critères de rigueur .......................................................................................... 67 CHAPITRE 3 Les théories de la technologie ................................................................... 71 3.1 Du déterministe à la possibilité d'action ..................................................................... 73 3.1.1 L'héritage grec: la technique comme impensée ................................................... 73 3.1.2 L'héritage moderne: la technologie, le progrès et le pouvoir ............................... 76 3.1.3 La théorie instrumentale de la technologie .......................................................... 80 3.1.4 Le déterminisme technologique ........................................................................... 83 3.1.5 Le substantialisme et l'essentialisme.................................................................... 85 3.1.6 Les théories critiques ........................................................................................... 88 3.1.7 La construction sociale de la technologie ............................................................ 93 3.2 Vers une théorie politique de la technologie ............................................................ 100 v 3.2.1 Une conception wébérienne de la modernité .................................................... 102 3.2.2 Le code technique .............................................................................................. 106 3.2.3 Des alternatives possibles .................................................................................. 108 3.2.4 Le processus de la rationalisation démocratique ............................................... 111 3.3 Une théorie politique de la technologie: la double instrumentalisation ................... 113 3.3.1 L’instrumentalisation primaire .......................................................................... 114 3.3.2 L’instrumentalisation secondaire ...................................................................... 115 3.3.3 Différenciation et concrétisation ....................................................................... 117 CHAPITRE 4 Un idéal-type du hacker ......................................................................... 119 4.1 Un contexte social .................................................................................................... 119 4.1.1 La société de contrôle : un contexte .................................................................. 120 4.1.2 La résistance : des actions ................................................................................. 125 4.2 Une histoire .............................................................................................................. 128 4.2.1 L’époque des pionniers ..................................................................................... 128 4.2.2 Le hacking matériel ........................................................................................... 136 4.2.3 La fin d’une époque ........................................................................................... 139 4.2.4 Mouvements de résistance ................................................................................ 140 4.3 Une identité .............................................................................................................. 150 4.3.1 Un glissement sémantique ................................................................................
Recommended publications
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • ABSTRACT the Rhetorical Construction of Hacktivism
    ABSTRACT The Rhetorical Construction of Hacktivism: Analyzing the Anonymous Care Package Heather Suzanne Woods, M.A. Thesis Chairperson: Leslie A. Hahner, Ph.D. This thesis uncovers the ways in which Anonymous, a non-hierarchical, decentralized online collective, maintains and alters the notion of hacktivism to recruit new participants and alter public perception. I employ a critical rhetorical lens to an Anonymous-produced and –disseminated artifact, the Anonymous Care Package, a collection of digital how-to files. After situating Anonymous within the broader narrative of hacking and activism, this thesis demonstrates how the Care Package can be used to constitute a hacktivist identity. Further, by extending hacktivism from its purely technological roots to a larger audience, the Anonymous Care Package lowers the barrier for participation and invites action on behalf of would-be members. Together, the contents of the Care Package help constitute an identity for Anonymous hacktivists who are then encouraged to take action as cyberactivists. The Rhetorical Construction of Hacktivism: Analyzing the Anonymous Care Package by Heather Suzanne Woods, B.A. A Thesis Approved by the Department of Communication David W. Schlueter, Ph.D., Chairperson Submitted to the Graduate Faculty of Baylor University in Partial Fulfillment of the Requirements for the Degree of Master of Arts Approved by the Thesis Committee Leslie A. Hahner, Ph.D., Chairperson Martin J. Medhurst, Ph.D. James M. SoRelle, Ph.D. Accepted by the Graduate School May 2013 J. Larry Lyon, Ph.D., Dean Page bearing signatures is kept on file in the Graduate School Copyright © 2013 by Heather Suzanne Woods All rights reserved TABLE OF CONTENTS LIST OF FIGURES ........................................................................................................................
    [Show full text]
  • Network Culture and the Aesthetics of Dissension1
    MONOGRÁFICO Escritura e Imagen ISSN: 1885-5687 http://dx.doi.org/10.5209/esim.73038 Network culture and the aesthetics of dissension1 Juan Martín Prada2 Recibido: 25 de marzo de 2020 / Aceptado: 25 de octubre de 2020 Abstract: This article addresses the complex relationship between digital activism and Internet art, from the initial proposals in the 1990s up to the present day. The analysis focuses on those projects that have most impacted the convergence of net art and “net-activism” during this period, with a particular emphasis on the relationship between artistic practice and hacktivism. Likewise, phenomena such as virtual sit-ins, DDOS-based strategies and several others that have emerged in the new context of social networks and participatory online platforms (memes, flash mobs, etc.) are analysed, in order to reflect on the new practices of social media art and their potential for specific critical action. Keywords: Internet art; net art; hacktivism; online activism; social media art; virtual sit-in. [es] Cultura red y estéticas de la disensión Resumen: En este artículo se aborda la compleja relación entre el activismo digital y el Internet art desde los inicios de este en la década de los noventa del pasado siglo hasta la actualidad. El centro del análisis lo constituyen las propuestas que de forma más intensa han reclamado a lo largo de este periodo la confluencia entrenet art y “net-activismo”, poniendo especial énfasis en las relaciones entre práctica artística y hacktivismo. Asimismo, se analizan fenómenos como las virtual sit-ins, las estrategias basadas en DDOS, los surgidos en el nuevo contexto de las redes sociales y de las plataformas participativas en línea (memes, flash mobs, etc.) para, finalmente, abordar la capacidad de actuación crítica específica de las nuevas prácticas de social media art.
    [Show full text]
  • Chapter 4 Hacktivism and State Autonomy
    Chapter 4 Hacktivism and State Autonomy: The Transnational Politics of Policy Circumvention Introduction In the bull market of 1999, eToys stood out in the field of favored technology stocks. eToys was one of the hottest properties in online retail at that time, with a market capitalization of $8 billion in September of that year ("Toy retailing -- Trouble in toy town?" 2000). And like any big company, it wanted to protect its brand. Online, nothing is as essential to your brand as your domain name – the web address that lets people find your site (Waxer 2000; Whitman 2000). So etoys.com was concerned that 20,000 customers a day were mistakenly visiting www.etoy.com (Ziegler). etoy – singular – was the digital home of a group of Zurich-based Internet artists. These artists had been online at etoy.com since 1995 – two years before the advent of eToys the retailer (Dugan 2000). But that didn’t stop eToys from using the usual means of protecting its corporate interests: the courts. On November 29, 1999, an LA court judge issued a judgement against the etoy artists, enjoining them from using the etoy domain or name (Smithers). For the moment, it appeared that eToys had won. But the victory proved to be short-lived, as is apparent from eToys’ share price (see Figure 13: eToys share price). No sooner had eToys won its day in court, then it confronted a new kind of challenge: the challenge of anti-corporate hacktivism. Alexandra Samuel Hacktivism and the Future of Political Participation 149 Figure 13: eToys share price Source: (Grether 2000) The challenge was mounted by a coalition of performative hackers and political coders, working together to create a variety of tools aimed at hobbling the eToys web site.
    [Show full text]
  • CEH Study Guide
    CEH Study Guide Exam Code 312-50v8 Version 8 Study Guide Provided by TrainACE© The Certified Ethical Hacker Certification covers the fundamentals of hacking, footprinting and scanning. A CEH certification indicates than an individual possess the skills, knowledge and ability to effectively exploit and defend their own systems. This study guide focuses on Trojans, Linux, Servers, Networks and other forms of hacking to equip future Ethical Hackers with the tools to pass the CEHv8 exam and succeed in their field. Study Guide Provided by TrainACE© Q: Robert hopes to start a career in computer security. As a new college-level student, he has just learned the term ethical hacking, which is a key part of secure information systems. Of the below options, choose which will be key areas of expertise for Robert’s future career. Answer is complete. Select more than one answer if applicable. a. Robert needs to gain a large body of knowledge about how computers function, with special regard to networking and programming. b. Operating systems are very important to Robert’s career. Because companies utilize varying operating systems, including Windows (multiple versions), Mac (multiple versions), UNIX, and Linux, he must develop an advanced understanding of each of the major operating systems. c. Robert should gain familiarity with computing and hardware platforms, which are key to software development. d. Robert should be able to write reports related to his field and have great expertise in communication relating to computer security. Solution: All of the above are correct. Breakdown: Each of the above areas is important for Robert’s future career.
    [Show full text]
  • Building Hacker Collective Identity One Text Phile at a Time: Reading Phrack
    Media History Monographs 11:2 (2008-2009) ISSN 1940-8862 Building Hacker Collective Identity One Text Phile at a Time: Reading Phrack Brett Lunceford University of South Alabama Research concerning computer hackers generally focuses on how to stop them; far less attention is given to the texts they create. Phrack, an online hacker journal that has run almost continuously since 1985, is an important touchstone in hacker literature, widely read by both hackers and telephone and network security professionals. But beyond its instantiation as a compendium of illicit technical knowledge, Phrack was, above all, a rhetorical publication. The files in each issue of Phrack created a shared rhetorical vision concerning the place of the hacker underground within society and in relation to law enforcement officials, as well as what it means to be a hacker. This essay examines two important events in the evolution of the hacker movement through the lens of Phrack—Operation Sundevil and the arrest of Kevin Mitnick. How these events were framed in Phrack both shaped and reflected emerging shifts in hacker collective identity. ©2009 Brett Lunceford Media History Monographs 11:2 Lunceford: Reading Phrack Building Hacker Collective Identity One Text Phile at a Time: Reading Phrack Stephen Segaller describes the formation of Managers that Helps Protect Corporate Data the Internet as “one of the twentieth century’s from Assaults by the Hackers” and “The most productive accidents,” explaining that the World of Data Confronts the Joy of Hacking,” “seeds of the Internet were planted by the U.S. which begins, “The recent electronic government in the wake of nationwide concern escapades of a group of Milwaukee youths over the Soviet launch of Sputnik.”44 Hackers have brought national attention to the growing were an integral part of the construction of this problem of computer security,”47 demonstrate network.
    [Show full text]
  • Evolution of Cyber Security Invotra
    Evolution of cyber security Invotra Digital Workplace, Intranet and Extranet 700 bc Scytale used by Greece and Rome to send messages And kids ever since.. Image Source: https://commons.wikimedia.org/wiki/File:Skytale.png 1467 Alberti Cipher was impossible to break without knowledge of the method. This was because the frequency distribution of the letters was masked and frequency analysis - the only known technique for attacking ciphers at that time was no help. Image Source: https://commons.wikimedia.org/wiki/File:Alberti_cipher_disk.JPG 1797 The Jefferson disk, or wheel cypher as Thomas Jefferson named it, also known as the Bazeries Cylinder. It is a cipher system using a set of wheels or disks, each with the 26 letters of the alphabet arranged around their edge. Image Source: https://en.wikipedia.org/wiki/Jefferson_disk#/media/File:Jefferson%27s_disk_cipher.jpg 1833 Augusta Ada King-Noel, Countess of Lovelace was an English mathematician and writer, chiefly known for her work on Charles Babbage's proposed mechanical general-purpose computer, the Analytical Engine. She is widely seen as the world's first programmer Image Source: https://commons.wikimedia.org/wiki/File:Ada_Lovelace_portrait.jpg 1903 Magician and inventor Nevil Maskelyne interrupted John Ambrose Fleming's public demonstration of Marconi's purportedly secure wireless telegraphy technology. He sent insulting Morse code messages through the auditorium's projector. Image Source: https://en.wikipedia.org/wiki/Nevil_Maskelyne_(magician)#/media/File:Nevil_Maskelyne_circa_190 3.jpg 1918 The Enigma Machine. It was developed by Arthur Scherbius in 1918 and adopted by the German government and the nazi party Image Source: https://commons.wikimedia.org/wiki/File:Kriegsmarine_Enigma.png 1932 Polish cryptologists Marian Rejewski, Henryk Zygalski and Jerzy Różycki broke the Enigma machine code.
    [Show full text]
  • Hacking Windows-Specific Services
    Hacking / Hacking Exposed Windows Server 2003: Windows Security Secrets & Solutions / Scambray, McClure / 223061-4 / Chapter 5 CHAPTER 5 Hacking Windows-Specific Services Footprint Scan Enumerate Penetrate Applications Escalate Services: IIS, SQL, TS Get interactive CIFS/SMB Presented by: Pillage Internet clients Expand influence Physical attacks Cleanup 117 118 Hacking Exposed Windows Server 2003: Windows Security Secrets & Solutions o far in our assault on Windows Server 2003, we’ve identified targets and running services, and we have connected to certain services to enumerate system data. Now Scomes the moment you’ve all been waiting for: the break-in. As discussed in Chapter 2, the primary goal of remote Windows Server 2003 system penetration is to authenticate to the remote host. We can do this by ▼ Guessing username/password combinations ■ Eavesdropping on or subverting the authentication process ■ Exploiting a vulnerable network service or client ▲ Gaining physical access to the system This chapter will discuss the first three items on this list, while the last one will be dis- cussed in Part IV of this book. IIS, SQL Server, and Terminal Server will be discussed individually in Chapters 10, 11, and 12, respectively, due to the vast attention malicious hackers have historically paid to those services. As we saw in Chapter 2, the core of the NT family authentication system includes the LAN Manager (LM) and Windows NT LAN Manager (NTLM) protocols (including NTLM version 2). These protocols were designed primarily for a protected internal envi- ronment. With Windows 2000, Microsoft adopted the widely used standard Kerberos version 5 protocol as an alternative to LM and NTLM in an attempt to broaden the scope of its authentication paradigm, and also in part to blunt longstanding criticism of security weaknesses in the proprietary LM/NTLM suite.
    [Show full text]
  • Nonkilling Geography
    Nonkilling Geography Edited by James Tyner and Joshua Inwood Center for Global Nonkilling CREATIVE COMMONS LICENCE Attribution-Noncommercial-No Derivative Works 3.0 You are free to share, copy, distribute and transmit this work* Under the following conditions: Attribution. You must attribute this work in the manner specified by the author/licensor (but not in any way that suggests that they endorse you or your use of the work). Noncommercial. You may not use this work for commercial purposes. No Derivative Works. You may not alter, transform or build upon this work. * For any reuse or distribution, you must make clear to others the license terms of this work. * Any of the above conditions can be waived if you gain permission from the copyright holders. Nothing in this license impairs or restricts the Authors’ moral and legal rights. Parts of this volume have been released under GFDL and Creative Commons Attribution-Share Alike 3.0 as part of Wikiversity’s School of Nonkilling Studies (http://en.wikiversity.org/wiki/School:Nonkilling_studies). The Center for Global Nonkilling does not necessarily endorse the views expressed by the authors. Also available for free download at: http://www.nonkilling.org © The Authors, 2011 © Center for Global Nonkilling, 2011 (this edition) First Edition: June 2011 ISBN-13 978-0-9822983-9-8 ISBN-10 0-9822983-9-0 ____________________________________________________ Cataloging in Publication Data (CIP) Nonkilling Geography / Edited by James Tyner and Joshua Inwood ISBN 978-0-9822983-9-8 1. Nonkilling 2. Peace. 3. Pacifism – Nonviolence. I. Title. II. Tyner, James, ed. lit. III. Inwood, Joshua, ed.
    [Show full text]
  • Capítulo Quinto El Hacktivismo Como Estrategia De Comunicación: De
    Capítulo quinto El hacktivismo como estrategia de comunicación: de Anonymous al cibercalifato Manuel R. Torres Soriano Resumen El propósito de este capítulo es analizar cómo el hacktivismo ha sido emplea- do por individuos y organizaciones como una eficaz estrategia de comunica- ción. Se presta una especial atención a dos manifestaciones particulares: el hacktivismo yihadista y el antisistema. El propósito de ambos estudios de caso es analizar las dinámicas organizativas de estos movimientos. Se parte de la tesis de que el principal reto al que tiene que enfrentarse el hacktivis- mo (particularmente el de carácter delictivo) no es tanto la viabilidad de sus operaciones sino cómo conciliar su vertiente colectiva con la individualidad de sus miembros. Palabras clave Internet, ciberseguridad, medios de comunicación, privacidad, propaganda. Abstract The purpose of this chapter is to analyze how hacktivism has been used by in- dividuals and organizations as an effective communication strategy. Particu- lar attention is paid to two particular manifestations: Jihadist and anti-system hacktivism. The purpose of both case studies is to analyze the organizational 197 Manuel R. Torres Soriano dynamics of these movements. The starting point is the thesis that the main challenge facing hacktivism (particularly that of a criminal nature) is not so much the viability of its operations, but how to reconcile its collective side with the individuality of its members. Keywords Internet, cybersecurity, media, privacy, propaganda. 198 El hacktivismo como estrategia de comunicación: de ... Introducción A comienzos de 2010, la secretaria de Estado norteamericana Hillary Clinton presentó la Internet Freedom1 como uno de los ejes de la política exterior de su país.
    [Show full text]
  • Unorthodox Hacking: Addressing Sexism in Hacktivist Communities to Expand Options for Electronic Civil Disobedience
    Unorthodox Hacking: Addressing Sexism in Hacktivist Communities to Expand Options for Electronic Civil Disobedience Giulia Curcelli Honors Thesis Curriculum in Peace, War, and Defense University of North Carolina at Chapel Hill Spring 2017 Approved: _____________________________________ Sara Bush Castro Advisor Curriculum in Peace, War, and Defense _____________________________________ Kenneth Andrews Reader Department of Sociology Table of Contents Introduction .........................................................................................................................3 Literature Review ...................................................................................................................... 14 Case 1: Mr. Robot Season 1 ..............................................................................................24 Case 2: Aaron Swartz and Freedom of Information .........................................................48 Case 3: The Transborder Immigrant Tool ........................................................................71 Conclusion: A Future Direction for Electronic Civil Disobedience .................................94 Appendix One: Graph of DDoS Attack ............................................................................99 Appendix Two: The Political Compass ..........................................................................100 Appendix Three: Diagram of Research Aims .................................................................101 Bibliography ...................................................................................................................102
    [Show full text]
  • Tesis Seguridad En Redes De Datos
    UNIVERSIDAD DON BOSCO FACULTAD DE INGENIERÍA ESCUELA DE ELECTRÓNICA SEGURIDAD EN REDES DE DATOS TRABAJO DE GRADUACIÓN PARA OPTAR AL GRADO DE INGENIERO EN ELECTRÓNICA PRESENTADO POR: LUIS ALBERTO ORELLANA BENAVIDES RAFAEL CRISTÓBAL HERNÁNDEZ VÁSQUEZ ASESOR: ING. CARLOS GIOVANNI VÁSQUEZ CUCHILLA SOYAPANGO, CIUDADELA DON BOSCO, OCTUBRE DEL 2003. UNIVERSIDAD DON BOSCO FACULTAD DE INGENIERÍA ESCUELA DE ELECTRÓNICA TRABAJO DE GRADUACIÓN SEGURIDAD EN REDES DE DATOS COMITÉ EVALUADOR: ING. CARLOS GIOVANNI VÁSQUEZ CUCHILLA ASESOR ING. EDGARDO CRUZ ZELEDÓN ING. ÁNGEL ERNESTO SORIANO JURADO JURADO ING. JUAN CARLOS CASTRO JURADO UNIVERSIDAD DON BOSCO FACULTAD DE INGENIERÍA ESCUELA DE ELECTRÓNICA RECTOR: ING. FEDERICO MIGUEL HUGUET RIVERA SECRETARIO GENERAL: LIC. MARIO OLMOS VICERRECTOR ACADÉMICO: LIC. VÍCTOR MANUEL BERMÚDEZ DECANO DE LA FACULTAD DE INGENIERÍA: ING. CARLOS BRAN ASESOR: ING. CARLOS GIOVANNI VÁSQUEZ CUCHILLA JURADOS EVALUADORES: ING. EDGARDO CRUZ ZELEDÓN ING. ÁNGEL ERNESTO SORIANO ING. JUAN CARLOS CASTRO DEDICATORIA A mi familia y amigos, especialmente a mis Padres y hermanos, a mi esposa Karla y a mis hijos Luis y Samuel. Luis Alberto Orellana Benavides. AGRADECIMIENTOS A Dios todo poderoso por haberme ayudado en toda mi carrera, a nuestro asesor, Ing. Giovanni Vásquez, mi compañero de Tesis y a Sergio Díaz por toda su ayuda recibida. Luis Alberto Orellana Benavides. DEDICATORIA A toda mi familia: Padres Ricardo y Emma de Hernández, mis hermanos: Ricardo, Mercedes, Gilberto y Claudia, Mi Abuela: María Antonia Calderón Vda. de Vásquez (Q.D.D.G), mi tía Concepción Sosa Romero y demás familiares quienes saben lo difícil y sacrificado que ha sido mi carrera, pero que en todo momento siempre confiaron en mi, no importando los sacrificios que esto implicare, a toda mi familia en general a quienes Amo y llevo en mi corazón, a todos ellos les dedico en muestra de mi agradecimiento este trabajo de graduación.
    [Show full text]