Modelo proactivo de threat hunting basado en mitre atta&ck para instituciones educativas superiores en el Perú
Average rating
Cast your vote
You can rate an item by clicking the amount of stars they wish to award to this item.
When enough users have cast their vote on this item, the average rating will also be shown.
Star rating
Your vote was cast
Thank you for your feedback
Thank you for your feedback
Issue Date
2022-04-25Keywords
Modelo proactivoMadurez tecnológica
Redes y comunicaciones
Proactive model
Technological maturity
Communication & Networking
Metadata
Show full item recordAbstract
La presente tesis tiene como objetivo brindar un modelo proactivo de Threat Hunting basado en Mitre Atta&ck para instituciones educativas superiores en el Perú. Este trabajo demostrará que con un enfoque tradicional de red no es suficiente para garantizar la seguridad de la red de la institución educativa. En los últimos años y más aun con los trabajos remotos por la cuarentena ha incrementado los ataques avanzados persistentes, llegando afectar a más de una institución educativa. En el presente trabajo se expone el nivel de madurez de Threat Hunting de algunas de las instituciones educativas peruanas y demuestra que al tener una hipótesis bien formulada podríamos alcanzar una caza exitosa y gracias al framework de Mitre Att&ck. Finalmente, podemos determinar acciones de mitigación sobre las vulnerabilidades encontradas para que el atacante no logre cumplir su cometido y alimentar nuestra base de conocimiento.The present thesis aims to provide a proactive Threat Hunting model based on Miter Atta & ck for higher educational institutions in Peru. This work will demonstrate that a traditional network approach is not enough to guarantee the security of the educational institution's network. In recent years and even more so with remote quarantine work has increased persistent advanced attacks, affecting an educational institution. In the present work, the level of maturity of Threat Hunting of some of the Peruvian educational institutions is exposed and it shows that by having a well formulated hypothesis we could achieve a successful hunting and thanks to the Miter Att & ck framework. Finally, we can determine mitigation actions on the vulnerabilities found so that the attacker cannot fulfill his mission and feed our knowledge base.
Type
info:eu-repo/semantics/bachelorThesisRights
info:eu-repo/semantics/openAccessAttribution-NonCommercial-ShareAlike 4.0 International
Language
spaCollections
The following license files are associated with this item:
- Creative Commons