IDENTIFICACIÓN DE VULNERABILIDADES BASADOS EN PROGRAMACIÓN: BUENAS PRÁCTICAS DE PROGRAMACIÓN PARA SISTEMAS INFORMÁTICOS MÁS SEGUROS.

Saved in:
Bibliographic Details
Title: IDENTIFICACIÓN DE VULNERABILIDADES BASADOS EN PROGRAMACIÓN: BUENAS PRÁCTICAS DE PROGRAMACIÓN PARA SISTEMAS INFORMÁTICOS MÁS SEGUROS. (Spanish)
Alternate Title: Programming-based vulnerability identification: best programming practices for more secure computer systems. (English)
Authors: PUERTA CORREDOR, ANGIE LORENA, BARRERA LASSO, MICHAEL ALEXANDER, GARNICA, EVELYN
Source: Revista de Ingenieria, Matematicas y Ciencias de la Informacion; ene-jun2025, Vol. 12 Issue 23, p121-137, 17p
Subject Terms: CONSCIOUSNESS raising, INTERNET security
Abstract (English): This document will analyze various programming-based vulnerabilities. It will present a comprehensive analysis of the research conducted, along with concrete examples illustrating these vulnerabilities. In addition, practical recommendations will be provided for the prevention and mitigation of malicious attacks carried out by adversarial agents. The objective of this work is to raise awareness among companies about the critical importance of implementing robust cybersecurity measures. [ABSTRACT FROM AUTHOR]
Abstract (Spanish): En este documento se analizarán las diversas vulnerabilidades basados en programación. Se presentará un análisis exhaustivo de la investigación llevada a cabo, junto con ejemplos concretos que ilustran estas vulnerabilidades. Además, se proporcionarán recomendaciones prácticas para la prevención y mitigación de ataques maliciosos perpetrados por agentes adversos. El objetivo de este trabajo es concienciar a las empresas sobre la crítica importancia de implementar robustas medidas de ciberseguridad. [ABSTRACT FROM AUTHOR]
Copyright of Revista de Ingenieria, Matematicas y Ciencias de la Informacion is the property of Corporacion Universitaria Republicana and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
Database: Complementary Index
Be the first to leave a comment!
You must be logged in first