Anàlisi i detecció de vulnerabilitats mitjançant Machine Learning (ML)
View/Open
Cita com:
hdl:2117/352740
Author's e-mailannamariadiazpinedagmail.com
Document typeBachelor thesis
Date2021-09-14
Rights accessOpen Access
All rights reserved. This work is protected by the corresponding intellectual and industrial
property rights. Without prejudice to any existing legal exemptions, reproduction, distribution, public
communication or transformation of this work are prohibited without permission of the copyright holder
Abstract
According to Europol in its latest report of 2020 we are in a situation where cybercrime is steadily evolving, the resilience and creativity of attackers is constantly increasing, and they are often one step ahead of any organization trying to fight them. The pandemic has made our lives virtual, and criminals have not hesitated to take advantage of the situation. The attacks during this year have been extremely varied, from DDoS to Ransomware for the distribution of pornography. In general, an attacker has an opportunistic profile and this time they have taken advantage of two things; the lack of skilled personnel to cover cybersecurity positions and how unprepared we were for massive remote work. The increase in cloud applications means that companies are constantly connected to the Internet, and although according to the annual Accenture report, most organizations better anticipate cyberattacks, a door has been opened to indirect targets such as suppliers in the supply chain. These attacks can have an unsustainable price for this type of companies. We must keep in mind that the profitability of outsourcing is 55% so it is understandable that many companies hire third parties to meet their needs of cost reduction. Not to mention the human and economic effort that can involve doing various tasks internally. But it should be noted that when a company goes to a third party to hire a service, this third party is probably associated with a large company such as Microsoft or Google. These big players however have the most CVE associated in 2020 and therefore we end up talking about different ways to get to the same place, preventing small- and large-scale vulnerabilities
DegreeGRAU EN ENGINYERIA TELEMÀTICA (Pla 2009)
Files | Description | Size | Format | View |
---|---|---|---|---|
memoria.pdf | 1,906Mb | View/Open |