Projecte llegit
Títol: Anàlisi i detecció de vulnerabilitats mitjançant Machine Learning
Estudiants que han llegit aquest projecte:
- DÍAZ PINEDA, ANA MARÍA (data lectura: 14-09-2021)
- Cerca aquest projecte a Bibliotècnica
Director/a: LEÓN ABARCA, OLGA
Departament: ENTEL
Títol: Anàlisi i detecció de vulnerabilitats mitjançant Machine Learning
Data inici oferta: 04-02-2021 Data finalització oferta: 04-10-2021
Estudis d'assignació del projecte:
- GR ENG TELEMÀTICA
Tipus: Individual | |
Lloc de realització: EETAC | |
Paraules clau: | |
Cybsersecurity, Machine Learning | |
Descripció del contingut i pla d'activitats: | |
Overview (resum en anglès): | |
According to Europol in its latest report of 2020 we are in a situation where cybercrime is steadily evolving, the resilience and creativity of attackers is constantly increasing, and they are often one step ahead of any organization trying to fight them. The pandemic has made our lives virtual, and criminals have not hesitated to take advantage of the situation. The attacks during this year have been extremely varied, from DDoS to Ransomware for the distribution of pornography. In general, an attacker has an opportunistic profile and this time they have taken advantage of two things; the lack of skilled personnel to cover cybersecurity positions and how unprepared we were for massive remote work. The increase in cloud applications means that companies are constantly connected to the Internet, and although according to the annual Accenture report, most organizations better anticipate cyberattacks, a door has been opened to indirect targets such as suppliers in the supply chain. These attacks can have an unsustainable price for this type of companies. We must keep in mind that the profitability of outsourcing is 55% so it is understandable that many companies hire third parties to meet their needs of cost reduction. Not to mention the human and economic effort that can involve doing various tasks internally. But it should be noted that when a company goes to a third party to hire a service, this third party is probably associated with a large company such as Microsoft or Google. These big players however have the most CVE associated in 2020 and therefore we end up talking about different ways to get to the same place, preventing small- and large-scale vulnerabilities |