Seguridad ipp
1
Prof.: Juan D. Velásquez Silva
jvelasqu@dcc.uchile.cl
6HJXULGDGDSOLFDGDD5HGHV
7&3,3$VSHFWRVWpFQLFRV\
PHWRGROyJLFRVGHODVHJXULGDG
Seguridad aplicada a Redes TCP/IP
z/DSROtWLFDGHVHJXULGDG
z8VRGHODFULSWRJUDItD
z)LUHZDOOV
z(OSURWRFROR7&3,3
z7LSRVGHDWDTXHV
z¢3RUTXpVHJXUL]DU"
7HPDULR
2
Seguridadaplicada a Redes TCP/IP
&DStWXOR
¢3RUTXpVHJXUL]DU"
3
Seguridad aplicada a Redes TCP/IP
4
SXHGHQFRQHFWDUDPLUHG
z /RGHORVKDFNHUV¢HVVyORXQLQYHQWR"
z (OGHDJRVWRGHHOVLWLRZHEGHOGSWR
GH-XVWLFLDGHORV((88
KWWSZZZXVGRMJRYVHOOHQyGHIRWRJUDItDV
REVFHQDVHVYiVWLFDVHWF
z /DLQIRUPDFLyQDKtFRQWHQLGDQRHUDPX\LPSRUWDQWHSHURVHSHUGLyFUHGLELOLGDG
z &RQHFWDUVHDRWUDVUHGHVLPSOLFDTXHRWURVVH
,QWURGXFFLyQ
Seguridad aplicada a Redes TCP/IP
WLHQHPXFKDVYHQWDMDV
z (OFRPHUFLRHOHFWUyQLFRHVXQDGHODV
SULQFLSDOHV
z 6LWHQJRDFFHVRDODUHGHQWRQFHVRWUDV
SHUVRQDVWLHQHQDFFHVRDPLUHG
z ¢6RQYDOLRVRVPLVGDWRV"
z (VWDUFRQHFWDGRDXQDUHGS~EOLFDGHGDWRV
¢3RUTXpVHJXUL]DU"
5
Seguridadaplicada a Redes TCP/IP
6
UHGS~EOLFD\PHHYLWRJDVWRVGHVHJXULGDG
z (OGHORVDWDTXHVDXQDUHGSURYLHQHQGH
SHUVRQDVLQWHUQDVDODRUJDQL]DFLyQ
z ¢4XpWDQFRVWRVRSXHGHVHUWHQHUXQDUHG
VHJXUD"
z ´PLFRPSXWDGRUHVWDQVHJXURTXHQRSXHGR
WUDEDMDUHQpOµ
z 6LHVWDQULHVJRVRHQWRQFHVQRPHFRQHFWRDXQD
¢3RUTXpVHJXUL]DU"
Seguridad aplicada a Redes TCP/IP
,QWUXVLyQ
1HJDFLyQ GHO VHUYLFLR
5RER GH LQIRUPDFLyQ
´+RPEUH HQ HO FDPLQRµ
'H UHSOLFDFLyQ
)DOODV \ HUURUHV GH SURJUDPDFLyQ
DGtDVHFUHDQRWUDVQXHYDVSHURDPRGRGH
FODVLILFDFLyQ
7
z ([LVWHQPXFKDVIRUPDVGHDWDFDUDXQVLVWHPD\GtD
7LSRVGHDWDTXHV
Seguridad aplicada a Redes TCP/IP
(QJDxR GH ,3 6SRRILQJ
+XVPHDU OD UHG 6QLIILQJ
1HJDFLyQ GH VHUYLFLRV8
z 6RQPXFKDV\WRGRVORVGtDVDSDUHFHQQXHYDV
z 'HQWURGHODVPiVFRQRFLGDVHVWiQ
7pFQLFDVGH$WDTXH
Seguridad aplicada a Redes TCP/IP
9
WUDQVPLVRUHVFXFKDORVSDTXHWH
z (QUHGHVGHPHGLRFRPSDUWLGRFRPR(WKHUQHW
ODVWDUMHWDVGHUHGWLHQHQXQVHJPHQWRGH
KDUGZDUHHQFDUJDGRGHDFFHGHUDWRGRVORV
GDWRVTXHYLDMDQSRUHOPHGLR
z¢4XpSDVDVLSRUODUHGYLDMDQODVSDVVZRUGVLQ
HQFULSWDFLyQ"
z 8QDPiTXLQDLQWHUPHGLDHQWUHUHFHSWRU\
7pFQLFDVGHDWDTXH(MHPSOR
Seguridad aplicada a Redes TCP/IP
ORVHVIXHU]RVHQODVHJXUL]DFLyQ
z 6HGHILQHQXQFRQMXQWRGHQLYHOHVGH
VHJXULGDGFRPRLQWHQWRGHHVWDQGDUL]DFLyQ
10
z /DSDUDQRLDWLHQHVXSUHFLR
z ¢3XHGRVHJXUL]DUPLUHG"
z ([LVWHQFULWHULRV\PHWRGRORJtDVTXHRULHQWDQ+DVWDGRQGHVHJXUL]DU
Seguridad aplicada a Redes TCP/IP
11
´VHJXUyPHWURµ
z (O´OLEURQDUDQMDµHVWiQGDUGHVHJXULGDGGH
FRPSXWDGRUDVGHVDUUROODGRSRUHO
'HSDUWDPHQWRGH'HIHQVDGHORV((88
z ([LVWHQYDULRVWLSRVGHQLYHOHVGHVHJXULGDG
z ¢&XDQGRVHTXHPLUHGHVWiVHJXUD"
z 6HUHTXLHUHGHDOJ~QHVWiQGDUXQ
$QiOLVLVGHORVQLYHOHVGH
VHJXULGDG
Seguridad aplicada a Redes TCP/IP
12HPSUHVDµ
z ´1RKD\XQDPHWRGRORJtDGLIXQGLGDGHFyPR
HQIUHQWDUHOSUREOHPDµ
z +D\GHPDVLDGRVPLWRVVREUHFyPRVHJXUL]DU\
VREUHTXpVHJXUL]DU
z 1RH[LVWHXQDFODUDHVWDQGDUL]DFLyQ
z ´1RH[LVWHFXOWXUDGHVHJXULGDGHQOD
(QIUHQWDQGRHOSUREOHPD
Seguridad aplicada a Redes TCP/IP
$QiOLVLV GH ULHVJRV \ YXOQHUDELOLGDG
'HILQLFLyQ GH OR TXH VH YD D SURWHJHU
&RQWUDPHGLGDV DRFXSDU
(O ´SODQ %µ
'HILQLFLyQ GH QRUPDV
+DFLD OD FXOWXUD GH VHJXUL]DFLyQ GH OD UHG
VHEDVHHQ
13
z 6HGHEHGHILQLUXQDSROtWLFDGHVHJXULGDGTXH
/DVROXFLyQ
Seguridad aplicada a Redes TCP/IP
14
PLQLPL]DHOULHVJRSHURQRORKDFHFHURORV
KDFNHUVHYROXFLRQDQ
z 3RWHQFLDUDXQDRUJDQL]DFLyQSDUDTXHDGTXLHUDXQD
FXOWXUDGHVHJXULGDGHVXQSURFHVRODUJRH...
Regístrate para leer el documento completo.