Information Security: Proposal for a VLAN Network Model
Ver/
Descargar
(application/pdf: 1.662Mb)
(application/pdf: 1.662Mb)
Fecha
2023-04-25Autor(es)
Rodas Cortijo, Carmen Liliana
Llallahue Callañaupa, Daniel
Andrade Arenas, Laberiano
Cabanillas Carbonell, Michael
Metadatos
Mostrar el registro completo del ítemResumen
This article consists of the implementation of a VLAN network in the Hospital Central FAP. The objective is to increase information security, as well as to improve and optimize user data, and this is achieved through the development and use of different protocols, restrictions, and methods that helped to achieve this purpose. Likewise, the article uses the Topdown methodology, which has phases focused on analyzing, developing, and improving the different processes for designing and implementing a VLAN network topology. As a technique, an interview was conducted with the person who, through a series of questions, expressed their opinion on the hospital's problems under study. Data processing was carried out at a qualitative level using Atlas Ti22 software, which allowed the analysis of the perception of 6 people with direct knowledge of the hospital's problems. This information was used to obtain the data for the research work. The result was a high degree of deficiency and disagreement with the system they are currently using. They explained that their data were violated, generating concern among users and all the staff. In addition, the conclusion obtained was that in view of the existing problems, the experts indicated that the proposal related to the implementation of a VLAN Network would meet the desired expectations, providing security to the information, so they consider it a feasible and appropriate option that would be a great alternative for the improvement of the hospital.
Mostrar más
Cita bibliográfica
Rodas, C. L., Llallahue, D., Andrade, L., & Cabanillas, M. (2023). Information Security: Proposal for a VLAN Network Model. International Journal of Engineering Trends and Technology, 71, 209-46. https://doi.org/10.14445/22315381/IJETT-V71I4P204
Colecciones
El ítem tiene asociados los siguientes ficheros de licencia:
Excepto si se señala otra cosa, la licencia del ítem se describe como info:eu-repo/semantics/openAccess
Ítems relacionados
Mostrando ítems relacionados por Título, autor o materia.
-
Neural network based single index evaluation for SQL injection attack detection in health care data
Nagabhooshanam, N.; Sundara Ganapathy, N. Bala; Ravindra Murthy, C.; Al Ansari, Mohammed Saleh; Cosio Borda, Ricardo Fernando (Elsevier Ltd., 2023-05-24)Acceso abiertoIn recent years, there are a lot of security risks in the network, and there is the combination intersection between the computer network security problems and security evaluation. The scale of computer network is very ... -
Repercusión de la gestión de las historias clínicas en la seguridad de la información del Hospital Regional Cajamarca, marzo - agosto 2015
Cruz Malca, Manuel Leoncio (Universidad Privada del Norte, 2015-12-11)Acceso cerradoRESUMEN La finalidad de la gestión de la historia clínica es la adecuada elaboración y administración de una historia clínica, la cual es un documento médico legal en el que se registran los datos de identificación y ... -
Aplicación de auditoría Penetration Testing para contribuir con la seguridad de la información en los sistemas informáticos de la empresa Data Business S.A.C., Trujillo
Cruz Saavedra, Walter Gonzalo (Universidad Privada del Norte, 2014-06-02)Acceso abiertoRESUMEN Debido a la creciente necesidad de utilización de poderosas computadoras conectadas en red para poder mantener una empresa en funcionamiento, y para poder realizar seguimientos de nuestra información personal, ...