dc.contributor.author | Cano Martínez, Jeimy José | |
dc.date.accessioned | 2018-09-27T15:38:44Z | |
dc.date.available | 2018-09-27T15:38:44Z | |
dc.date.issued | 2002-05 | |
dc.identifier.citation | Revista de Ingeniería - No. 15 (May. 2002) p. 66-72 | es_CO |
dc.identifier.uri | http://hdl.handle.net/1992/6891 | |
dc.description.abstract | The continuous reports of security vulnerabilities and new ways to have acces to privileged resources of our host, notice the necessity to be prepared to face a possible attack in our computational infrastructures and communications. therefore, the organizations that would maintain high security levels, require to establish, along with the good computer security practices, computer incidet response teams, strategiees for the identificaction and harvesting of the evidence of the incident, as well as personal permanently trained in computer security. I this sense, this article offers to readers an analysis scenario to think about incident repsonse and digital evidence | es_CO |
dc.format | application/pdf | |
dc.language.iso | spa | es_CO |
dc.source | instname:Universidad de los Andes | es_CO |
dc.source | reponame:Repositorio Institucional Séneca | es_CO |
dc.title | Conceptos y retos en la atención de incidentes de seguridad y la evidencia digital | es_CO |
dc.type | article | es_CO |
dc.rights.accessRights | openAccess | |
dc.subject.keyword | Delitos por computador - Publicaciones seriadas | es_CO |
dc.subject.keyword | Redes de computadores - Medidas de seguridad - Publicaciones seriadas | es_CO |
dc.identifier.url | https://revistaing.uniandes.edu.co/index.php?idr=21&ids=15&ida=231&l=en | es_CO |
dc.journal.title | Revista de Ingeniería | es_CO |
dc.type.version | publishedVersion | |