Академический Документы
Профессиональный Документы
Культура Документы
1 1) ……………………………………………
……
2) ……………………………………………
……
5 2
3) ……………………………………………
……
4) ……………………………………………
……
5) ……………………………………………
……
4 3
Describa las siguientes tecnologías de defensa y tipos de ciberataques.
WAF: .........................................................................................................................
..................................................................................................................................
FIREWALL: .................................................................................................................
..................................................................................................................................
VPN: ..........................................................................................................................
..................................................................................................................................
PHISHING: .................................................................................................................
..................................................................................................................................
RANSOMWARE: .........................................................................................................
..................................................................................................................................
SIEM: .........................................................................................................................
..................................................................................................................................
IDS: ...........................................................................................................................
..................................................................................................................................
IPS: ............................................................................................................................
..................................................................................................................................
DDoS: ........................................................................................................................
..................................................................................................................................
IESTP CIBERTEC 1
Ingeniería Social: .......................................................................................................
..................................................................................................................................
Identifique el OWASP Top Ten 2017 RC2 de acuerdo a la enumeración de los controles.
IESTP CIBERTEC 2