Extensión Cañar - Ingeniería de Sistemas
URI permanente para esta colección
Examinar
Examinando Extensión Cañar - Ingeniería de Sistemas por Título
Mostrando 1 - 20 de 66
Resultados por página
Opciones de ordenación
- ÍtemSolo Metadatos“Análisis comparativo de infraestructuras de redes SDN (software defined networking) y redes tradicionales IP”(Universidad Catolica de Cuenca extension Cañar, 2022-04-18) Vega Guallpa, Alex Javier; Andrade Cardenas, Danny Patricio; 030240639-2ABSTRACT This article shows a comparative analysis of SDN network infrastructure and traditional IP networks to act out these networks and determine the advantages and performance costs of the networks. The objectives of this study were a). Conduct a theoretical study on the SDN networks architecture, management tools, protocols, and controllers, b). To design a test environment for a basic ISP and SDN network, c). Evaluate the performance of the network through the settings that allow the equipment connection. A qualitative approach was used in this research for describing the characteristics of the network equipment which involve Mikrotik Routerboard, computers, OpenFlow, Wimbox, virtual machines. They are interconnected and set up to provide internet service. The results showed the execution parameters, infrastructure, reuse, virtualization, rules applied to the basic ISP networks and SDN networks. Finally, both the obtained results and the conclusions will be discussed based on the raised objectives. Keywords: software-defined networks, virtualization, traditional network.
- ÍtemSolo MetadatosAnálisis comparativo de las plataformas de play to earn en el metaverso de las criptomonedas(Universidad Católica de Cuenca, 2023) Défaz Serpa, Juan Sebastián; Flores Urgilés, Cristhian Humberto; 030254786-4ABSTRACT Video game business model broadcasting is a technology that produces a relevant impact worldwide, especially in the growing world of video games. This study focuses on the use of the play-to-earn platform and its relationship with cryptocurrencies and metaverse by analyzing the blockchain networks where it operates and the business models’ evolution. The research objectives were: a) to perform a comparative analysis of the play-to-earn platform and the cryptocurrency metaverse by using different performance tests to determine opportunities for professional development, b) to conduct a theoretical study on cryptocurrencies, play-to-earn, and other platforms, c) to develop a comparative analysis based on the results obtained from the different platforms, d) to build a proposal for play-to-earn based on blockchain technology and NFTs. Based on these, a study on blockchain networks is conducted. It was determined that the best network for play-to-earn games is Polygon since its deals have a minimum cost, becoming more profitable. The play-to-earn platforms in different networks are also analyzed through a comparative analysis using the same indicators as in the network analyses to establish the play-to-earn games and their scalability. Keywords: blockchain networks, play-to-earn games, metaverse, cryptocurrencies.
- ÍtemAcceso AbiertoAnálisis de riesgos y amenazas de ciberseguridad en el estado ecuatoriano, utilizando la metodología Magerit(Universidad Católica de Cuenca campus Cañar, 2023) Guamán Guamán, José Manuel; Carrillo Zenteno, José Antonio; 0302382361The Ecuadorian state, due to its size, economic relevance, and vast amount of confidential information, has become an attractive target for cyber attackers. This has led to the conduct of a study focused on the analysis of cybersecurity risks and threats to the country's assets. The proposed objectives were: a) To carry out an analysis of risks and threats of cybersecurity in the Ecuadorian state, to determine the vulnerabilities to which the country is exposed, b) To conduct a theoretical study on the methodologies of analysis and risk management that can be applied to countries, c) To carry out a survey of critical information assets belonging to the Ecuadorian State, d) To analyze the risks, determine vulnerabilities, and threats of cybersecurity for the critical assets of the Ecuadorian state using the Magerit methodology. The MAGERIT methodology was applied to identify and categorize threats, vulnerabilities, and risks, classifying critical assets into areas such as government, health, and energy, and threats according to their origin, such as user errors, technical failures, deliberate attacks, and natural disasters. The study evaluated the potential impact of each threat in terms of confidentiality, integrity, and availability, and estimated the likelihood of occurrence, thus calculating the risk level to prioritize mitigation actions. The results revealed that the assets with the highest risks are the personal and financial data of citizens, medical records, and confidential governmental information. Keywords: cybersecurity, Magerit methodology, critical infrastructure, Ecuador.
- ÍtemAcceso AbiertoAnálisis de sentimientos en comunidades digitales utilizando técnicas de big data para Determinar patrones de comportamiento orientado a fenómenos sociales(Universidad Catolica de Cuenca extension Cañar, 2021-11-23) Llivicota Buñay, Willan Alfredo; Flores Urgiles, Cristina Mariuxi; 030290706-8ABSTRACT The prenent research work aims at analyzin the uners feeling of different digital communities, in order to extract behavior patterns of social phenomena that affect the community, determining the existence of revelant topics in this post-pandemic era, such as Covid-19 and politics. The analysis was carried out through the different phases of the CRISP-DM methodology, which were carried out in R, with the execution of the most outstanding libraries such as twitteR, rtweet, tidyverse, knitr each one of them fulfill different funtions. Data were collected from the online social networking Twiter. Next,an exploratory og the behavior data was conducted, in order to determine the percentage of positive, negative, and neutral tweets about each topic to be analyzed. Results show that text mining is a discipline that in its currents state can be useful for decision-making for both companies and individuals, nevertheless, it is susceptible to improvement in order to take advantage of the massive amount of opinios in text issued by users of the different social media sites. Keywords: CRISP-DM, feeling, digital communities, social phenomena
- ÍtemSolo MetadatosAnálisis de soluciones VPN basadas en software libre para evitar ataques en los sistemas de comunicación(Universidad Catolica de Cuenca extension Cañar, 2023) Clavijo Verdugo, Juan Marcelo; Andrade Cárdenas, Danny Patricio; 030274275-4At present, the evolution of the Internet has facilitated communication and the exchange of information among users. However, it has also raised concerns about the security and privacy of shared data. In this context, virtual private networks (VPN) have emerged as a reliable and secure solution. VPNs enable a secure local network on the Internet without needing a physical connection between members. Through a data tunnel, the information is encrypted and can only be seen by the person for whom it is intended, providing solid protection and reliability in safeguarding the information. This work is based on bibliographical research that gathers relevant information from digital databases and previous studies, aiming to support the execution of the project. The quality of the selected VPN was evaluated using the ISO/IEC 25010 standard, which provides a model with critical points to determine if the VPN meets the necessary standards of functionality, efficiency, compatibility, security, and maintainability. It is concluded that Protón VPN was identified as the most recommended option for protecting information in the theoretical review of free software VPN solutions. It offers benefits such as greater compatibility with Windows, fast and secure communication, and end-to-end data encryption through network tunnels. The configuration and tests carried out show that Protón VPN complies with security standards, with AES-256 encryption that is practically impenetrable for information theft.
- ÍtemAcceso AbiertoAnálisis de técnicas para pruebas de ethical hacking-pentesting en sitios web(Universidad Catolica de Cuenca extension Cañar, 2021-11-06) Ortiz Padilla, Gerardo Antonio; Flores Urgiles, Cristian Humberto; 030291381-9ABSTRACT The present work analyzes the techniques for the ethical hacking test, pen testing in a website, thus, it is essential to rely on the informatics system safety that uses the instructions to avoid vulnerability in the confidentiality, integrity, and availability of data, blocking out the unauthorized access. The main objective is to analyze the Ethical Hacking-Pen testing. The methodology was based on the different phases of the OWASP Ethical Hacking, which includes the planning, gathering of information, numbering and exploration of vulnerabilities, privilege lifting, and report. The population included a website that was created (DIGI shop). The developing methodology was implemented in the results, starting from the identification of the scope, resources, and metrics. Then, the architecture and the UML diagram of the security were designed. Later, the vulnerabilities were scanned in Kali Linux, where five threats were identified and the exploitation was carried out with the Metasploitable program. Finally, the comparison of ethical hacking techniques according to CVSS parameters was presented and in the last phase, an indicator was established as a measure to measure the level of solution to vulnerabilities. Concluding that the most suitable ethical hacking technique to identify vulnerabilities in the store's website is pentesting SQL injection. Keywords: ethical hacking, pen-testing, website, owasp
- ÍtemAcceso AbiertoAnálisis de un prototipo para un aplicativo móvil que permita la geolocalización con la Utilización IoT para las unidades de transporte urbano del cantón Cañar(Universidad Catolica de Cuenca extension Cañar, 2022-06-21) Carvajal Andrade, Luis Enrique; Pinos Castillo, Luis; 030285400-5SN
- ÍtemAcceso AbiertoAnálisis del nivel de cumplimiento de las políticas de seguridad de la información de los Gad’s cantonales Cañar, El Tambo y Suscal(Universidad Católica de Cuenca campus Cañar, 2023) Zhao Yuquipa, Claudio Xavier; Flores Urgiles, Cristhian Humberto; 0302602222The purpose of this research is to assess the extent to which information security policies are implemented in the Cantonal GADs (Decentralized Autonomous Governments) of Cañar. The focus of this study is quantitative, descriptive, and explanatory. For the evaluation, the ISO 27001:2013 standard and the ISO 27002 best practices guide are applied, allowing the assessment of each domain and control objective. The theoretical framework is established through the analysis of documents related to the Information Security Management System (ISMS), ISO 27000, the Data Protection Law, the computer security regulations for public entities in Ecuador, and the information security guidelines issued by regulatory entities.To understand the current condition of the GAD's, an investigation was carried out through a survey of administrators in the information technology departments, obtaining the following results: 2 domains with high risk, 10 with medium risk, and 2 with low risk. Keywords: ISO, SGSI, GAD's, Data, Domains.
- ÍtemAcceso AbiertoAnálisis del uso de herramientas de comercio electrónico en las pymes comercializadoras del cantón Cañar.(Universidad Catolica de Cuenca extension Cañar, 2022-03-12) Ortiz Zhao, Nataly Silvana; Cardenas Muñoz, Jorge Vinicio; 030294829-4ABSTRACT E-commerce or electronic commerce, nowadays, has become the new way of doing business in society. It is considered as one of the tools that allow businesses to acquire significant-competitive advantages to get sustainable growth within the market thanks to the many benefits that such innovation encompasses. Therefore, this research work aims at analyzing the usage of e-commerce tools within the marketing pymes from the Canar Canton. Thus, the documental-field research was used, as well as, the descriptive and analytical methods, these allowed both describing such tools and analyzing the gathered data to learn the current state of the marketing pymes from the above-mentioned canton concerning the usage of such e-commerce tools within their businesses. All of the information was gathered through both surveys and direct observation. Major results show that 77% of businesspeople from the Canar Canton use e-commerce within their businesses. Social networks such as Facebook (93%), WhatsApp (74%), and Instagram (47%) are the major tools to carry out e-commerce, thru activities such as offering, the marketing of the product to the people. Products are delivered to customers thru Servientrega and local delivery services from the canton where they work that are linked to such businesses to boost the local economy. Keywords: electronic commerce, pymes, digital tools, canar canton.
- ÍtemAcceso AbiertoAnálisis y diseño de un aplicativo móvil, con la utilización de un Framework multiplataforma, para registro de incidentes para la empresa Fibermedia Telecomunicaciones(Universidad Católica de Cuenca campus Cañar, Enfermería, 2023) Cela Lazo, Franklin Oswaldo; Pinos Castillo, Luis Fernando; 030264811-8The project focuses on the analysis and design of a multiplatform mobile application for incident logging for the company Fiber Media Telecomunicaciones. A comparative analysis of multiplatform frameworks shows that Flutter is the most suitable option for developing mobile applications due to its performance, ease of learning, and multiplatform support advantages. Similarly, when comparing different agile methodologies, Mobile-D was the most suitable option for the project. This is due to its capacity to facilitate agile deliveries of functional prototypes and its adequate adaptation to the development of mobile applications. Its iterative and incremental approach played an effective role in guiding the design of the application effectively. The preliminary design of the application, following the Mobile-D methodology, successfully confirmed the adequate coverage of the initial requirements. This evidences the mobile application’s effectiveness, which allows user registration and authentication, incident logging, map location, incident assignment, and tracking. Keywords: Framework, Flutter, Mobile D, Incidents, mobile application.
- ÍtemAcceso AbiertoAnalítica descriptiva para la comprensión del estado actual del fenómeno delincuencial en el Ecuador(Universidad Católica de Cuenca campus Cañar, 2023) Yupa Morocho, Alex Juan; Flores Urgiles, Cristhian Humberto; 0350031035This study carries out a practical application of data analysis techniques to generate intelligence that supports informed decision-making on public safety and crime prevention in Ecuador. The stated objectives were: a) To conduct a theoretical study on descriptive analytics and its related concepts, b) To analyze the INEC database related to crime in Ecuador, c) To develop descriptive analytics models that allow the analysis of the crime phenomenon in Ecuador. The study applies the agile MAMBO methodology for the analytical processing of a dataset on arrests and police apprehensions in Ecuador. It uses 79,609 records with 23 fields covering demographic, geographic, and types of crime information. The inductive approach enables insights generation from the data to support decision-making in citizen security. Techniques include descriptive statistics, data visualization, ARIMA time series modeling, and aggregation algorithms. Data cleaning, integration, and transformation are applied; then, dashboards with indicators about the demographic profile of offenders, geographic comparisons, temporal evolution, and patterns by hours are generated. The results reveal a predominance of young repeat male offenders. Guayas, Pichincha, and Manabí have the highest criminal activity, identifying crime peaks during nighttime. A trend forecasting model is also constructed, suggesting stability with slight fluctuations. Thus, the study demonstrates the value of Big Data analytics in comprehensively characterizing the crime phenomenon Keywords: descriptive analytics, crime, MAMBO.
- ÍtemSolo MetadatosAplicación web para la administración de recaudación y generación de reportes de consumo de agua para la junta del sistema de riego Zapata de la parroquia del cantón Girón(Universidad Católica de Cuenca extensión Cañar, 2023) Suquilanda Saeteros, Milton Franklin; Pinos Castillo, Luis Fernando; 030297678-2In this project, a web application is being developed for the administration of collection and generation of water consumption reports for the Board of the Zapata Irrigation System of the Parish of Canton Girón based on the needs of the organization's directors and members. The purpose is to automate the administrative procedures of the organization's members. This prototype allows the organization's administrator to perform tasks such as creating, updating, deleting, searching, emailing, and viewing member records. As a software architectural pattern, the application has been developed using the Model-View-Controller (MVC) pattern. Extreme Programming (XP) was employed as the methodology for developing the web application. The technological resources used include Microsoft Visual Studio Community as the development environment, C# as the programming language, and the Internet Information Services (IS) server as the hosting platform for the prototype. The SQL Server database complements the prototype to store the information. It is important to highlight that the project was executed according to the organization's expectations and requirements, and user and programmer instruction guides were created.
- ÍtemAcceso AbiertoAplicativo móvil para la guía de padres de familia hacia el aprendizaje de motricidad fina y gruesa en niños(Universidad Católica de Cuenca extensión Cañar, 2023) Naula Andrade, Freddy Mauricio; Pinos Castillo, Luis Fernando; 030297890-3This project aims to develop a mobile application to guide teachers and parents towards learning fine and gross motor skills in children and offer a detailed guide on the stages of motor development, subdivided into several categories based on developmental stages and the specific skills to be acquired. For this, the Exploration, Initiation, Product, Stabilization, and Testing phase of the Mobile-D methodology was used, which allowed flexibility in the implementation by providing a framework that defines roles, artifacts, and events, incorporating various techniques and processes in addition to using tools such as Android Studio and Java for programming. In conclusion, this research paper seeks to fill a gap in early childhood education by providing parents with a practical and easy-to-use technological tool. This application will not only simplify parents’ support for their children’s motor development but also promote interactive and enjoyable learning for children.
- ÍtemAcceso AbiertoAuditoría de la seguridad física y lógica de los servicios tecnológicos en el Gadipcs Suscal, usando como referencia la norma ISO/IEC 27002:2016(Universidad Católica de Cuenca campus Cañar, 2023) Zamora Pomaquiza, Diana Jakeline; Andrade Cárdenas, Danny Patricio; 030286774-2As part of the project, it is proposed to conduct a security audit covering both physical and logical aspects of the Autonomous Decentralized Intercultural and Participative Decentralized Government of the Suscal canton (GADIPCS by its Spanish acronym) technological systems. The primary purpose is to identify vulnerabilities that compromise the robustness of institutional technological services. The project began by establishing a theoretical framework with the items related to the research topic. Subsequently, the audit phases were defined and executed. In order to diagnose the current security posture of the municipality, an interview and a compliance test (Checklist) aligned to the ISO 27002 standard were applied. The checklist was used to assess adherence to security controls or policies. Based on the checklist, a risk matrix was developed to discern the levels of exposure resulting from the lack of implementation of specific controls. At the end of the assessment, an evaluation report was generated, specifying the observations identified and their corresponding suggestions for improvement. Keywords: ISO 27002 standard, risk matrix, security audit, vulnerabilities, audit phases.
- ÍtemAcceso AbiertoConstrucción de una solución de business intelligence en la empresa mega market Calle & hijos cía. ltda.(Universidad Catolica de Cuenca extension Cañar, 2022-08-17) Iglesias Saeteros, José Eduardo; Flores Urgiles, Cristian Humberto; 035008233-5ABSTRACT Nowadays, business intelligence usage in companies and organizations is booming in order to change its strategies and have access to information in real time. This research states a BI solution in the Mega Market Calle & Hijos company. To do this, a survey to analyze information accessibility problems and executive reports completion were carried out to contribute the decision making. Giving this problem, a business intelligence solution design has been determined to facilitate the accessibility to decision making in a timely manner. That is why, the Ralph Kimball methodology was carried out to minimize possible errors and meet each of its phases. Several tools such as Excel, DbVisualizer, Knime, Power BI were also used to allow the sales, products, categories, sales in COVID-19 times, etc. reports as these tools are free and easy to use. Keywords: business intelligence, ralph kimball, decision making, enterprise, reporting.
- ÍtemAcceso AbiertoCumplimiento de las políticas de seguridad de información en las cooperativas de ahorro y crédito del cantón Cañar.(Universidad Catolica de Cuenca extension Cañar, 2022-07-14) Guamán Zaruma, Luis Antonio; Cardenas Muñoz, Jorge Vinicio; 030238992-9ABSTRACT This study aims at determining the compliance degree of the information security policies at the savings and credit cooperatives section 3 in the Canar Canton, the methodology used has a quantitative approach of descriptive and explanatory nature, the ISO 27001:2013 standard and the ISO 27002 good practice guide were used to evaluate each of its domains and control objectives. Theoretical support is carried out by analyzing documents that explain the Information Security Management System (ISMS), ISO 27000, Popular and Solidarity Economy Organic Law (PSEOL), and the regulations issued by control agencies regarding the information systems security. To determine the current situation of the organizations, a survey was directed to the information technology department heads to evaluate each of the domains. It was proved in the results that there are two areas with low risk, six with medium risk and six with high risk. Keywords: security, iso standards, areas, risk
- ÍtemAcceso AbiertoDesarrollo de sistema de información web para la gestión de frecuencias de turnos de la cooperativa Rutas Cañaris(Universidad Católica de Cuenca campus Cañar, Enfermería, 2023) Cuesta Falconi, Bryan Fabian; Pinos Castillo, Luis Fernando; 0302548565The purpose of this article is to develop a Web System for the Management of Shift Frequencies of the Cañaris Routes cooperative, with the goal of presenting an adaptable and secure system that meets the needs of the cooperative. For this, the Adaptive Software Development (ASD) methodology was used, which enables to confront changes and make necessary adjustments in the process. Java, SQL server, and Bootstrap are among the tools used. In conclusion, using the previously mentioned tools and methodologies has been fundamental to developing an efficient and secure computer system for the management of the cooperative. The combination of Java, Bootstrap, the TDE procedure, and the SQL Server database has provided a complete and effective solution to address the specific requirements of the cooperative. Implementing the ASD methodology has permitted proximate collaboration and optimal adaptability throughout the development process. Likewise, using Azure DB for the cloud database has ensured a safe and expandable management of the cooperative's data. Overall, these choices have led to the project’s success and have significantly improved the cooperative’s management. Keywords: Web System, Adaptable Software Development, SQL Server
- ÍtemAcceso AbiertoDesarrollo de software de análisis de riesgos y gestión de seguridad basado en ISO 27001, Cañar- Ecuador.(Universidad Catolica de Cuenca extension Cañar, 2021-11-16) Muñoz Muñoz, Juan Fernando; Flores Urgiles, Cristian Humberto; 030271231-0Abstract The present paper involves the development of software for the security risk analyses, which allows defining the necessary controls to compile with all protective requirements of an organization`s essets. In order to develop this research project, a software-development methodology was defined, in accordance with the project`s necessities. Once the methodology was defined. A software that allows the use of the MAGERIT methodology was designed and developed, to effectively and efficiently analyze the risks, showing the norm ISO/IEC27001 controls, such system allows to conduct an informatics-risk analysis thru the essessment of assets, impact, probability, identifying the threat index and the risk level of the assets. Finally, the software was tested by entering the essets, and providing it with the respective mark, some threats to such assets were identified,the impact and probability were marked to obtain the risk level, if the level is high, the necessary controls are presented for each threat to mitigate the risk. Keywords: MAGERIT, risk management, controls, ISO/IEC27001
- ÍtemAcceso AbiertoDesarrollo de un aplicativo móvil para difusión de servicios de ayuda para mascotas de La fundación narices frías del cantón Cañar(Universidad Catolica de Cuenca extension Cañar, 2021-12-01) Fernández Ortiz, Juan Diego; Andrade Cardenas, Danny Patricio; 030290706-9ABSTRACT This research project aims to develop a mobile app to help the broadcasting services provided by the Cold Noses Foundation of Cañar canton for the animals` welfare which are under vulnerable conditions. To do this, a comparative analysis between the different IDEs has been made, where the most important aspects such as open-source platforms, allowing the free creation of projects, accessibility without restrictions, different devices compatibility, support for programming languages, security, etc. have been collected. The android studio IDE has been selected based on these criteria and the study that was carried out since it meets the points already mentioned, enables modeling, desing of both native and hybrid apps. In same way, a comparison between different methodologies for the use of an agile development methodology has been made since each one of them has very different priorities, requirements, and technologies. In addition, the importance of acquiring quality software, minimizing the risks, and personalized participation for teamwork must be emphasized. Based on this comparison, a RUP is selected, which is a methodology that allows organizing projects through phases with one or more iterations, besides having documentation as support for future reference systems. Finally, the mobile app is done as a result which is made up of different sections such as news, adoption, complaints and emergencies, donations, and user profile. Keywords: mobile app, RUP, foundation, programming language.
- ÍtemAcceso AbiertoDesarrollo de un manual de procesos para el departamento de ti basado en cobit 5. en el municipio del cantón el Tambo(Universidad Catolica de Cuenca extension Cañar, 2022-05-24) Velasquez Zhau, Victor Manuel; Flores Urgiles, Cristian Humberto; 030279077-9ABSTRACT The present thesis work entails the design of an automated irrigation system prototype, which helps to maintain the balance of soil moisture causing water to be used efficiently, along with the use of an Arduino microcontroller and humidity and environment sensors. To design such a prototype, it must have two sensors one, that measures the soil moisture, and the other, that measures the humidity of the environment. These sensors will transfer the information to the Arduino microcontroller, which then will decide according to both the parameters and conditions imposed on the script, whether it is necessary to activate the automatic irrigation resulting in turning on the water pump. Consequently, the soil humidity is controlled, helping to avoid an excess or deficit of humidity in the orchard. To validate it, tests were carried out in different soil moisture environments giving optimum results according to the conditions imposed on the operation of the prototype. Keywords: automation, automatic irrigation, arduino, sensors, microcontroller