Mostrar el registro sencillo del ítem

dc.contributor.advisorRuiz Parrales, Iván Rubén
dc.contributor.authorContreras Contreras, Julissa Mariu
dc.date.accessioned2024-08-20T20:27:28Z
dc.date.available2024-08-20T20:27:28Z
dc.date.issued2024
dc.identifier.urihttp://dspace.utb.edu.ec/handle/49000/16979
dc.descriptionForensic information is essential in cybersecurity, especially with the rise of technology and cyberattacks. This field is dedicated to the acquisition, verification and preservation of digital information on various devices and operating systems. Forensic tools allow you to recover information, restore deleted files and verify specific actions, generating accurate reports for legal use. The key to computer forensics is selecting the right tool for each investigation, along with the experience of the investigator. The increase in the use of computer and telecommunications equipment with Internet access has increased computer security incidents, making computer forensics crucial to identify and analyze the perpetrators of computer crimes. Computer forensics uses techniques and methods to reconstruct the hardware or technology-based sequence of events during an incident. This work aims to demonstrate the importance and effectiveness of computer forensic tools by objectively evaluating their impact on the investigation of computer crimes.es_ES
dc.descriptionForensic information is essential in cybersecurity, especially with the rise of technology and cyberattacks. This field is dedicated to the acquisition, verification and preservation of digital information on various devices and operating systems. Forensic tools allow you to recover information, restore deleted files and verify specific actions, generating accurate reports for legal use. The key to computer forensics is selecting the right tool for each investigation, along with the experience of the investigator. The increase in the use of computer and telecommunications equipment with Internet access has increased computer security incidents, making computer forensics crucial to identify and analyze the perpetrators of computer crimes. Computer forensics uses techniques and methods to reconstruct the hardware or technology-based sequence of events during an incident. This work aims to demonstrate the importance and effectiveness of computer forensic tools by objectively evaluating their impact on the investigation of computer crimes.es_ES
dc.description.abstractLa información forense es esencial en la seguridad informática, especialmente con el aumento de la tecnología y los ciberataques. Este campo se dedica a la adquisición, verificación y preservación de información digital en diversos dispositivos y sistemas operativos. Las herramientas forenses permiten recuperar información, restaurar archivos eliminados y verificar acciones específicas, generando informes precisos para uso legal. La clave de la informática forense es seleccionar la herramienta adecuada para cada investigación, junto con la experiencia del investigador. El incremento en el uso de equipos informáticos y telecomunicaciones con acceso a internet ha elevado los incidentes de seguridad informática, haciendo que la informática forense sea crucial para identificar y analizar los autores de delitos informáticos. La informática forense utiliza técnicas y métodos para reconstruir la secuencia de eventos basada en hardware o tecnología durante un incidente. Este trabajo pretende demostrar la importancia y la eficacia de las herramientas informáticas forenses evaluando objetiva su impacto en la investigación de delitos informáticos.es_ES
dc.format.extent54 p.es_ES
dc.language.isoeses_ES
dc.publisherBabahoyo: UTB-FAFI. 2024es_ES
dc.rightsAtribución-NoComercial-SinDerivadas 3.0 Ecuador*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/ec/*
dc.subjectInformática forensees_ES
dc.subjectCiberataqueses_ES
dc.subjectHerramientas forenseses_ES
dc.subjectDelitos informáticoses_ES
dc.subjectSeguridad informáticaes_ES
dc.titleAnálisis de herramientas de análisis forense y su aplicabilidad en la investigación de delitos informáticos.es_ES
dc.typebachelorThesises_ES


Ficheros en el ítem

Thumbnail
Thumbnail

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem

Atribución-NoComercial-SinDerivadas 3.0 Ecuador
Excepto si se señala otra cosa, la licencia del ítem se describe como Atribución-NoComercial-SinDerivadas 3.0 Ecuador