Documentos de Académico
Documentos de Profesional
Documentos de Cultura
Seguridad Activa
Seguridad Activa
4FHVSJEBEBDUJWBFOFMTJTUFNB
Y estudiaremos:
t-BTFHVSJEBEFOFMBSSBORVFZFO
QBSUJDJPOFT
t-BTBDUVBMJ[BDJPOFTZQBSDIFTEF
TFHVSJEBEFOFMTJTUFNBZFOMBT
BQMJDBDJPOFT
t-BBVUFOUJDBDJOEFVTVBSJPT
t-JTUBTEFDPOUSPMEFBDDFTP
t-BNPOJUPSJ[BDJOEFMTJTUFNB
t&MTPGUXBSFRVFWVMOFSBMBTFHVSJEBE
EFMTJTUFNB
8448171373_SI_05.indd 105
06/04/10 11:05
4FHVSJEBEBDUJWBFOFMTJTUFNB
Caso prctico 1
Definimos la clave de supervisor para proteger el acceso a la BIOS
$POFTUBQSDUJDBWBNPTBQSPUFHFSFMBDDFTPBMB#*04DPOUSBQFSTPOBTOP
BVUPSJ[BEBTZBTEJGJDVMUBSFMBDDFTPBMFRVJQPBEJDIPQFSTPOBM
1. "M FOUSBS B MB #*04
BDDFEFNPTBMBQBOUB
MMBQSJODJQBM 'JH
/PTEFTQMB[BNPTQPS
FM NFO IBTUB MB PQ
DJO Security RVF TF
NVFTUSB FO MB QBSUF
TVQFSJPSEFMBJNBHFO
'JH
Importante
1BSBFOUSBSFOMB#*04EFCFNPT
QVMTBSMBUFDMB SupPF2 BMJOJDJBS
FMPSEFOBEPS
BVORVFFTUPSFBM
NFOUFEFQFOEFEFMB#*04EFM
FRVJQP&OFMMJCSPTFIBIFDIP
VTPEFMB#*04EF7.8BSF
(Contina)
106
8448171373_SI_05.indd 106
06/04/10 11:05
4FHVSJEBEBDUJWBFOFMTJTUFNB
Caso prctico 1
(Continuacin)
-B'JHVSBNVFTUSBMBTPQDJPOFTEFTFHVSJEBERVFQP
EFNPTDPOGJHVSBSZFMFTUBEPEFMBTNJTNBT
&MJOUSVTPQPESBSFJOJDJBSFMPSEFOBEPSDPOVO$%QSP
WJTUP EF TPGUXBSF NBMJOUFODJPOBEP RVF MF QFSNJUJSB
EFTDVCSJSBMPTVTVBSJPTZMBTDPOUSBTFBTEFMFRVJQP
$POMBJOGPSNBDJODPOTFHVJEB
UFOESBBDDFTPBMPT
EBUPTDPOGJEFODJBMFTEFUPEPTMPTVTVBSJPTEFMTJTUFNB
B
$PNPQPEFNPTWFSFOEJDIBGJHVSB
MBDPOUSBTFBEF
4VQFSWJTPSFTUWBDB(Clear); DPOFTUBPQDJOQFSNJUJ
NPTMBNPEJGJDBDJOEFMB#*04BDVBMRVJFSQFSTPOB
"T
VOJOUSVTPQPESBBDDFEFSBMB#*04ZNPEJGJDBSMB
TFDVFODJBEFBSSBORVFEFMFRVJQP 1SJNFSPEFTEF$%
TFHVOEPEFTEF-"/
UFSDFSPEFTEF)%
$POFMGJOEFFWJUBSMPTQPTJCMFTJOUFOUPTEFNPEJGJDB
DJOEFMB#*04
EFGJOJNPTVOBOVFWBDPOUSBTFBQBSB
FM4VQFSWJTPS
107
8448171373_SI_05.indd 107
06/04/10 11:05
4FHVSJEBEBDUJWBFOFMTJTUFNB
Claves y consejos
4JTFUFPMWJEBMBDPOUSBTFBEF
MB#*04
UFOESTRVFBCSJSFM1$
ZRVJUBSEVSBOUFVOSBUPMBQJMB
EFMBQMBDBCBTF%FTQVTWPM
WFNPTBJOTUBMBSMBZZBUFOFNPT
SFTFUFBEBMB#*04DPOMBDPOGJ
HVSBDJOEFMGBCSJDBOUF
Caso prctico 2
Definicin de contraseas en el GRUB en modo texto
%VSBOUFFTUFQSPDFTP
WBNPTBNPEJGJDBSFMGJDIFSPRVFBMNBDFOBMBDPOGJHVSBDJO
EFMHFTUPSEFBSSBORVF (36#
QPSMPRVFFTSFDPNFOEBCMFSFBMJ[BSVOBDPQJBEF
TFHVSJEBEEFMNJTNP
QBSBQPEFSSFTUBVSBSMBFODBTPEFRVFTFQSPEVKFTFBMHO
FSSPSFOFMBSSBORVFDPNPDPOTFDVFODJBEFMBTNPEJGJDBDJPOFTSFBMJ[BEBT
Actividades
1. 6OUDOJDPEFTFHVSJEBE
JOGPSNUJDB JOFYQFSUP
UJFOFQSPUFHJEPFMBDDFTP
B MB #*04 NFEJBOUF MB
DPOUSBTFB EF 4VQFSWJ
TPS $VBOEP PUSPT VTVB
SJPT QSFUFOEFO FOUSBS FO
MB #*04 EF MPT PSEFOB
EPSFTMFTTPMJDJUBMBDMBWF
EFM 4VQFSWJTPS &TUF OP
RVJFSF DPNVOJDBS FTUB
DPOUSBTFB B MPT VTVB
SJPTEFMPTFRVJQPTFJEFB
VOBTPMVDJOQBSBTPMWFO
UBSFMQSPCMFNBEFGJOJSMB
DPOUSBTFBEFVTVBSJPFO
MB#*04*OEJDBMPTQBTPT
RVFEFCFSFBMJ[BS
1. 1
BSBFMMP
BCSJNPTVOOVFWPUFSNJOBMZUFDMFBNPTMBTJOTUSVDDJPOFTRVFBQBSFDFO
FOMB'JHVSB&TUBTJOTUSVDDJPOFTSFBMJ[BOVOBDPQJBEFTFHVSJEBEEFMGJDIFSP
menu.lst ZMBFEJDJOEFMNJTNP
2. #VTDBNPTMBMOFB#password topsecret.
3. #PSSBNPTMBBMNPIBEJMMB
FTEFDJSMFRVJUBNPTFMDPNFOUBSJPZDBNCJBNPTMB
DPOUSBTFBUPQTFDSFUQPSMBRVFOPTPUSPTRVFSBNPTFOOVFTUSPFKFNQMPIFNPT
FMFHJEPjQBUBUBx 'JH
4FHVBSEBOMPTDBNCJPTFOFMGJDIFSPmenu.lst Z
TFSFJOJDJBMBNRVJOBQBSBQSPCBSMBNPEJGJDBDJOSFBMJ[BEB
2. %FTBDUJWBMBPQDJOEFMB
#*04
FODBTPEFUFOFSMB
BDUJWBEB
RVFTJSWFQBSB
FODFOEFS FM FRVJQP EF
GPSNBSFNPUBBUSBWTEF
MBSFE
Vocabulario
&M HFTUPS EF BSSBORVF GRUB
(Grand Unifier Bootloader)QFS
NJUFTFMFDDJPOBSFOUSFMPTEJTUJO
UPTTJTUFNBTPQFSBUJWPTRVFUFO
HBNPTJOTUBMBEPTFOFMFRVJQP
&TUF HFTUPS FT FM RVF IBCJUVBM
NFOUF JOTUBMBO QPS EFGFDUP MBT
OVFWBT EJTUSJCVDJPOFT EF TJTUF
NBT(/6-JOVY
1BSBGJOBMJ[BSSFJOJDJBNPTFMFRVJQPZDPNQSPCBNPT
TJNVMBOEPTFSVOVTVBSJPRVF
OPDPOPDFMBDPOUSBTFB
RVFOPQPESFNPTNPEJGJDBSMBTPQDJPOFTEFBSSBORVF
RVFOPTNVFTUSBFMHFTUPSEFBSSBORVF
108
8448171373_SI_05.indd 108
06/04/10 11:05
4FHVSJEBEBDUJWBFOFMTJTUFNB
Caso prctico 3
Definicin de contraseas cifradas en el GRUB en modo texto
1. %FCFNPTBCSJSVOOVFWPUFSNJOBMZFTDSJCJSgrub.
2. "DPOUJOVBDJO
DPNPQPEFNPTWFSFOMB'JHVSB
FTDSJCJNPTFMTVCDPNBOEP
md5crypt RVFOPTQFSNJUJSFODSJQUBSMBDPOUSBTFBRVFRVFSBNPTQPOFS
3. &TDSJCJNPTMBDMBWFBDPEJGJDBSZFMQSPHSBNBOPTNVFTUSBFMQBTTXPSEDPEJGJ
DBEP
4. 1PSMUJNP
QBSBTBMJSEFMHSVCEFCFNPTFTDSJCJSquit TBMJS
Claves y consejos
-BTDPOUSBTFBTQBSBBDDFEFSB
MPTTJTUFNBTPQFSBUJWPTHFTUJPOB
EPT QPS FM HFTUPS EF BSSBORVF
EFCFODJGSBSTF4JOPTEFTDVCSFO
MBDMBWFRVFQFSNJUFBDDFEFSB
MB FEJDJO EFM (36# WFSBO MB
DPOUSBTFBZQPSUBOUPBDDFEF
SBOBMTJTUFNB4JQPSFMDPOUSB
SJPMBDMBWFTFFODVFOUSBDJGSBEB
WFSBOVOBDBEFOBEFDBSBDUF
SFTTJOTFOUJEP
5. 6OBWF[FODSJQUBEBMBDPOUSBTFB
EFCFSFNPTDPQJBSMBFOFMGJDIFSPmenu.lst,
DPNPQPEFNPTWFSFOMB'JHVSB'KBUFRVFMBMOFBOPFTTJNJMBSBMBEFMB
QSDUJDBBOUFSJPS
ZBRVFTFIBBBEJEPMBPQDJO--md5,RVFJOEJDBRVFMB
DPOUSBTFBFTUFODSJQUBEB
Sabas que?
1PEFNPT BCSJS VO OVFWP UFSNJ
OBM EF EJWFSTBT NBOFSBT QVM
TBOEPALTF2,RVFOPTBCSJS
VOB WFOUBOB FO MB RVF EFCF
NPTFTDSJCJSgnome-terminal
'JH
P CJFO IBDJFOEP DMJD
TPCSFAplicaciones, Accesorios
y Terminal.
8448171373_SI_05.indd 109
06/04/10 11:05
4FHVSJEBEBDUJWBFOFMTJTUFNB
Caso prctico 4
Establecer contraseas al arranque de los sistemas operativos controlados por el
GRUB
$POFTUBQSDUJDBFWJUBSFNPTFMBDDFTPBMPTTJTUFNBTPQFSBUJWPTHFTUJPOBEPTQPS
FM(36#BQFSTPOBMOPBVUPSJ[BEP
1. &EJUBNPTFMGJDIFSPEFDPOGJHVSBDJOEFM(36#
menu.lstZBMGJOBMEFMNJTNP
CVTDBNPTMBTMOFBTEPOEFTFEFGJOFFMUUVMPEFMTJTUFNBPQFSBUJWP UJUMF
ZBDPO
UJOVBDJOFTDSJCJSFNPTpassword --md5 ZMBDPOUSBTFB
Caso prctico 5
Establecer contrasea del gestor de arranque mediante la
aplicacin startupmanager en LINUX, distribucin Ubuntu
9.04, para evitar el acceso a los sistemas operativos ges-
(Contina)
110
8448171373_SI_05.indd 110
06/04/10 11:05
4FHVSJEBEBDUJWBFOFMTJTUFNB
Caso prctico 5
(Continuacin)
2. 6OBWF[JOTUBMBEP
FKFDVUBNPTFMQSPHSBNBBDDFEJFOEP
BSistemaAdministracinAdministrador de Arranque 'JH
3. )BDFNPTDMJDTPCSFMBQFTUBBEFTFHVSJEBE
BDUJWB
NPTMBPQDJOEFProteger con contrasea el cargador
de arranqueZFTDSJCJNPTMBDMBWFFMFHJEBDPNPQPEF
NPTWFSFOMB'JHVSB1BSBGJOBMJ[BSSFJOJDJBNPTMB
NRVJOBZDPNQSPCBNPTDNPBGFDUBFMDBNCJPBMB
DPOGJHVSBDJOEFMBSSBORVF
Actividades
3. )B[FM$BTPQSDUJDPFKFDVUBOEPFMQSPHSBNBEJSFD
UBNFOUFFOFMUFSNJOBM
3FDVFSEBRVFEFCFSTUFOFSQSJWJMFHJPTEFBENJOJTUSB
EPSQBSBQPEFSSFBMJ[BSMP
4. $PNQSVFCBTJFMQSPHSBNBTUBSUVQNBOBHFSFTDSJCFMBT
DPOUSBTFBTFOFMBSDIJWPmenu.lstEFM(36#DJGSBEBT
PFOUFYUPDMBSP
111
8448171373_SI_05.indd 111
06/04/10 11:05
4FHVSJEBEBDUJWBFOFMTJTUFNB
Caso prctico 6
Cifrar una particin en Windows
$PO FTUB QSDUJDB DPOTFHVJSFNPT QSPUFHFS VOB QBSUJDJO
EF8JOEPXT
MBJOGPSNBDJOOPTFSBDDFTJCMFQBSBBRVF
MMBTQFSTPOBTRVFOPDPOP[DBOMBDMBWF
1BSBSFBMJ[BSFTUBBDUJWJEBEWBNPTBVUJMJ[BSVOQSPHSBNB
EF DEJHP BCJFSUP
HSBUVJUP
%JTL$SZQUPS (http://www.diskcryptor.de/en/downloads/).
1BSBJOTUBMBSFTUBBQMJDBDJOTMPOFDFTJUBNPT.#EF
FTQBDJPFOEJTDPEVSPZ.JDSPTPGU8JOEPXT
1. /PTEFTDBSHBNPT%JTL$SZQUPS
MPEFTDPNQSJNJNPT
ZIBDFNPTEPCMFDMJDTPCSFFMBSDIJWPEDSZQURVFTF
FODVFOUSBFOMBDBSQFUBJ 'JH
BDPOUJOVBDJO
SFTQPOEFNPTBGJSNBUJWBNFOUFBMBQSFHVOUBTPCSFMB
JOTUBMBDJOEFMDPOUSPMBEPS%JTL$SZQUPS
2. 6OBWF[JOTUBMBEPFKFDVUBNPTMBBQMJDBDJOEDSZQU
8448171373_SI_05.indd 112
06/04/10 11:06
4FHVSJEBEBDUJWBFOFMTJTUFNB
Caso prctico 6
(Continuacin)
$PNPIFNPTWJTUPFOMB'JHVSBMBBQMJDBDJOWJTVBMJ[B
MBT VOJEBEFT EF EJTDP RVF QVFEFT FODSJQUBS &O OVFTUSP
DBTP
MPRVFRVFSFNPTFODSJQUBSFTMB%
VOJEBEEFEJDBEB
BEBUPT
3. -BTFMFDDJPOBNPTZIBDFNPTDMJDTPCSFFMCPUO&ODSZQU
DJGSBS
1PTUFSJPSNFOUFEFCFSFNPTTFMFDDJPOBSFOUSFMPT
EJTUJOUPTBMHPSJUNPTEFFODSJQUBDJO "&4
5XPGJTI
4FS
QFOU
"&45XPGJTI
4FSQFOU"&4
"&45XPGJTI4FSQFOUy
ZIBDFSDMJDFOFMCPUONext TJHVJFOUF
4. &OMBTJHVJFOUFQBOUBMMB
EFCFSFNPTFTDSJCJSMBDPOUSB
TFBEFFODSJQUBDJO"EFNT
FOFTUFQBTPMBBQMJ
DBDJO OPT JOGPSNB EF MB WVMOFSBCJMJEBE EF OVFTUSB
DPOUSBTFBTFHOVOHSGJDP-BDPOUSBTFBRVFIFNPT
FTDSJUPFT/BCDC!ZFTDPOTJEFSBEBEFEJGJ
DVMUBE.FEJB1VMTBNPTOKZEFTQVTEFVOPTNJOVUPT
UFOESFNPTDJGSBEBMBVOJEBEZGVFSBEFMBMDBODFEFQFS
TPOBTRVFOPDPOP[DBOMBDMBWFEFDJGSBEP
113
8448171373_SI_05.indd 113
06/04/10 11:06
4FHVSJEBEBDUJWBFOFMTJTUFNB
Caso prctico 7
Cifrar una particin en Linux
7BNPT B BQSFOEFS B FODSJQUBS VOB VOJEBE 64# FO -JOVY
DPOFMQSPHSBNB5SVF$SZQU
BQMJDBDJOHSBUVJUBRVFOPTQP
EFNPTEFTDBSHBSEFMBQHJOB http://www.truecrypt.org.
$PO FMMP DPOTFHVJNPT RVF BRVFMMBT QFSTPOBT RVF OP DP
OP[DBOMBDMBWFOPQVFEBOBDDFEFSBMBJOGPSNBDJOBMNB
DFOBEBFOMBVOJEBE64#
1. 1BSBJOTUBMBS5SVF$SZQU
EFCFNPTEFTDBSHBSOPTMBWFS
TJOQBSBMBEJTUSJCVDJOEF(/6-JOVYEFMQSPHSBNB
FOOVFTUSPDBTP6CVOUV
EFEJDIBQHJOB
EFTDPNQSJ
NJSMPZFKFDVUBSFMQSPHSBNBEFJOTUBMBDJO
2. 5SBTJOTUBMBSMP
FKFDVUBNPTMBBQMJDBDJOZWFSFNPTVOB
WFOUBOBTJNJMBSBMB'JHVSB
&OMB'JHVSBWFNPTVOBMJTUBEFUPEBTMBTVOJEBEFTEF
5SVF$SZQU$PNPBDBCBNPTEFJOTUBMBSMP
OPUJFOFOJOHVOB
EFFMMBTBTJHOBEB
3. 1BSBDJGSBSMBVOJEBEEF64#
EFCFNPTIBDFSDMJDFOFM
CPUOCreate Volume DSFBSVOJEBE
"DPOUJOVBDJO
TF
BCSJSVOBWFOUBOB
FOMBRVFTFNVFTUSBOEPTPQDJPOFT
tCreate an encrypted file container DSFBSVOBDBSQFUB
DJGSBEB
tCreate a volumen within a partition/drive DSFBSVOB
VOJEBEQBSBVOBQBSUJDJOPEJTQPTJUJWP
-BQSJNFSBEFFMMBTFTMBRVFFMQSPHSBNBSFDPNJFOEB
QBSBFMQFSTPOBMJOFYQFSUP&OFTUFDBTPOPFTOFDFTB
SJPGPSNBUFBSMBVOJEBE
TPMPDSFBVOBDBSQFUBEPOEF
TVDPOUFOJEPTFSDJGSBEP
4. -BTFHVOEBPQDJOTFSMBRVFTFMFDDJPOBSFNPTQBSB
BMDBO[BSOVFTUSPPCKFUJWP-BBQMJDBDJOOPTBEWJFSUF
RVFBMSFBMJ[BSFTUBFMFDDJOTFGPSNBUFBSMBVOJEBEZ
DJGSBSMBQBSUJDJO"DPOUJOVBDJO
EFCFSFNPTWFSVOB
OVFWBQBOUBMMBTJNJMBSBMB'JHVSB
(Contina)
114
8448171373_SI_05.indd 114
06/04/10 11:06
4FHVSJEBEBDUJWBFOFMTJTUFNB
Caso prctico 7
(Continuacin)
5. 4FMFDDJPOBNPTMBQSJNFSBPQDJOStandard TrueCrypt
volumen DSFBSVOBVOJEBE5SVF$SZQSUOPSNBM
ZIBDF
NPTDMJDTPCSFFMCPUONext.
6. &OMBTJHVJFOUFQBOUBMMB 'JH
EFCFNPTTFMFDDJP
OBSMBVOJEBEBGPSNBUFBS)BDFNPTDMJDFOFMCPUO
Select Device TFMFDDJPOBSEJTQPTJUJWP
7. "QBSFDFVOBQBOUBMMB 'JH
DPOUPEPTMPTEJTQP
TJUJWPT EF BMNBDFOBNJFOUP RVF UFOFNPT DPOFDUBEPT
BMPSEFOBEPS4FMFDDJPOBNPTFMEJTQPTJUJWP64#SFDP
OPDJEPFOOVFTUSPDBTPDPNPEFWTECEF.#
%FQFOEJFOEPEFMBEJTUSJCVDJOEF-JOVYZEFMPTEJT
UJOUPTEJTQPTJUJWPTDPOFDUBEPTFOFMFRVJQPQVFEFTFS
SFDPOPDJEBDPOPUSPOPNCSF
9. "QBSFDFVOBOVFWBQBOUBMMB 'JH
FOMBRVFJOUSP
EVDJSFNPTMBDPOUSBTFB&OFTUFQVOUP
MBBQMJDBDJO
OPTBEWJFSUFEFMBJNQPSUBODJBEFFMFHJSVOBCVFOBDPO
USBTFBRVFOPTFBOQBMBCSBTRVFQPEBNPTFODPOUSBS
FOEJDDJPOBSJPTPDPNCJOBDJPOFTEFWBSJBT-BDMBWFOP
EFCFUFOFSJOGPSNBDJOQFSTPOBMDPNPOPNCSFPGFDIB
EF OBDJNJFOUP 6OB CVFOB DPOUSBTFB EFCF TFS VOB
VBOUPNBZPSTFBFMONFSP
NFOPTWVMOFSBCMFTFSMB
$
DPOUSBTFB
5SVF$SZQUBENJUFDPOUSBTFBTEFIBTUBDBSBDUFSFT
(Contina)
115
8448171373_SI_05.indd 115
06/04/10 11:06
4FHVSJEBEBDUJWBFOFMTJTUFNB
Caso prctico 7
(Continuacin)
TFHVJSDPOFMQSPDFTPEBOEPGPSNBUPBMEJTQPTJUJWP
&MQSPDFTPIBGJOBMJ[BEP
MBVOJEBEZBFTUQSFQBSBEB
QBSBRVFUPEPTMPTEBUPTRVFJOUSPEV[DBNPTFOFMMB
TFBODJGSBEPTBVUPNUJDBNFOUF
FTEFDJSRVFUSBCBKFEF
GPSNBUSBOTQBSFOUFQBSBFMVTVBSJP
12. "OUFT EF VUJMJ[BS MB VOJEBE 64# EFCFNPT NPOUBSMB
DPOMBBQMJDBDJO5SVF$SZQU
QBSBFMMPEFCFNPTWPMWFS
BMBQBOUBMMBJOJDJBMEFEJDIBBQMJDBDJO 'JH
Z
IBDFSDMJDTPCSFSelect Device TFMFDDJPOBSEJTQPTJUJWP
4FBCSJSVOBWFOUBOBTJNJMBSBMBEFMB'JHVSB
EPOEFFMFHJSFNPTMBVOJEBERVFIFNPTDJGSBEP"DPO
UJOVBDJO MB BQMJDBDJO TPMJDJUBS MB DPOUSBTFB 6OB
WF[RVFJOUSPEVDJNPTMBDPOUSBTFB
MBVOJEBETFNPOUB
DPNP truecrypt1 'JH
116
8448171373_SI_05.indd 116
06/04/10 11:06
4FHVSJEBEBDUJWBFOFMTJTUFNB
Vocabulario
Herramientas CAD.4POBQMJDB
DJPOFT EF %JTFP "TJTUJEP QPS
0SEFOBEPS
7FBNPTFTUPMUJNPDPOFKFNQMPT
t 4VQPOHBNPTVOBGBNJMJBEFUSFTNJFNCSPT
.BDBSFOB
'FSOBOEPZ(VTUBWP1PESB
NPTFTUBCMFDFSVOBDVPUBEFEJTDPQBSB(VTUBWPEF(#
QBSB.BDBSFOBEF(#Z
QBSB'FSOBOEPRVFTVFMFNBOFKBSQMBOPTRVFPDVQBONVDIPFTQBDJP
MFQFSNJUJNPT
VOBDVPUBEF(#&TEFDJS
DBEBVTVBSJPQVFEFUFOFSVOBDVPUBEJTUJOUBFOGVO
DJOEFTVTOFDFTJEBEFTOPUJFOFOQPSRVUFOFSUPEPTMBNJTNB
t 4VQPOHBNPTMBFNQSFTBEFDPOTUSVDDJO4J$PN
FOMBRVFMPTVTVBSJPTTFFODVFO
USBO DMBTJGJDBEPT QPS HSVQPT
$POUBCJMJEBE
"SRVJUFDUPT Z %JSFDDJO 3FQBSUJSFNPT
FMTJTUFNBEFGJDIFSPTFOUSFMPTEJWFSTPTHSVQPTFOGVODJOEFMBTOFDFTJEBEFTEF
MPTNJTNPT&MHSVQPEF$POUBCJMJEBETVFMFUSBCBKBSDPOBSDIJWPT&YDFMZ8PSE
EF
QFRVFPUBNBP
BMJHVBMRVFFMHSVQPEFEJSFDDJO
t 4VQPOHBNPTRVFFOVO1$IBZEPTQBSUJDJPOFT
VOBEFMBTQBSUJDJPOFTQPESBUFOFS
DVPUBT EF VTVBSJP NVZ SFTUSJDUJWBT Z FO MB PUSB QBSUJDJO UFOFS PUSBT DVPUBT NFOPT
MJNJUBEBTPJODMVTPOJTJRVJFSBUFOFSMBT
Importante
-BTDVPUBTEFEJTDPFO8JOEPXT
TPMP TF QVFEFO VUJMJ[BS TPCSF
WPMNFOFTDPOTJTUFNBTEFGJDIF
SPT/5'4
Claves y consejos
$VJEBEPDPOTFSFYDFTJWBNFOUF
SFTUSJDUJWPDPOMBDVPUB
1PESBNPTJNQFEJSJODMVTPFMJOJ
DJPEFTFTJOEFVOVTVBSJP
QPS
OPUFOFSTVGJDJFOUFFTQBDJPQBSB
DSFBSTVDBSQFUBFODocuments
and Settings.
8448171373_SI_05.indd 117
06/04/10 11:06
4FHVSJEBEBDUJWBFOFMTJTUFNB
Claves y consejos
1BSBFKFDVUBSFMWJTPSEFTVDF
TPTQPEFNPTFTDSJCJSeventvwr.
mscFOMBDPOTPMBPFOFMNFO
FKFDVUBSEFInicio,PJSBPanel
de Control Herramientas
Administrativas Visor de
Sucesos.
4JQPSFMDPOUSBSJPRVFSFNPTMJNJUBSFMFTQBDJPEFMTJTUFNBEFGJDIFSPTBMPTVTVBSJPT
EFCFNPTEFGJOJSMBDBQBDJEBEEFEJTDPEFMBRVFWBOBEJTQPOFSDBEBVOPEFFMMPT
BTDPNPEFMOJWFMEFBEWFSUFODJBZBDUJWBSMBPQDJOEFDenegar espacio de disco a
usuarios que excedan el lmite de cuota
Actividades
5. 1JFOTB EF RV GPSNB VO
BENJOJTUSBEPS EF VO TFS
WJEPS EF DPSSFP FMFDUS
OJDPQPESBBTJHOBS
.#EFFTQBDJPFOEJTDPB
VTVBSJPTEFQBHPZ.#
BMSFTUPEFVTVBSJPTSFHJT
USBEPT
6. $SFB VO VTVBSJP Z BTH
OBMFVOBDVPUBEFUBOTPMP
.# {1VFEFT BSSBODBS
VOBOVFWBTFTJODPOFTUF
VTVBSJP +VTUJGJDB MB SFT
QVFTUB
4JTFNBSDBOMBTEPTPQDJPOFTRVFBQBSFDFOBMGJOBMEFMB'JHVSB
FMTJTUFNBPQF
SBUJWPSFHJTUSBSBMPTFWFOUPT
IBCFSTVQFSBEPFMOJWFMEFBEWFSUFODJBPIBCFSTVQFSBEP
FMMNJUFEFDVPUB
FOFMWJTPSEFTVDFTPT
&MVTVBSJPQVFEFWFSNFEJBOUFFMWJTPSEFTVDFTPTEJDIBJOGPSNBDJO 'JHTZ
8448171373_SI_05.indd 118
06/04/10 11:06
4FHVSJEBEBDUJWBFOFMTJTUFNB
Importante
&ODBTPEFOPUFOFSJOTUBMBEPFM
QBRVFUF RVPUB QFSNJUF EFGJOJS
MBTDVPUBTEFEJTDPFO-JOVY
VTB
SFNPTMBPSEFOapt-get install quota.
"DPOUJOVBDJO
EFCFNPTFKFDVUBSMPTTJHVJFOUFTUSFTDPNBOEPTRVFBQBSFDFOFOMB'J
HVSBQBSBBBEJSMBDMBWFQCMJDB
QBSFKBEFMBQSJWBEB
DPOMBRVFTFIBGJSNBEP
FMSFQPTJUPSJP
1PSMUJNP
BDUVBMJ[BNPTFJOTUBMBNPTMBIFSSBNJFOUBXFCNJO
NFEJBOUFMBFKFDVDJOEF
MPTTJHVJFOUFTDPNBOEPT 'JHTZ
8448171373_SI_05.indd 119
16/04/10 11:47
4FHVSJEBEBDUJWBFOFMTJTUFNB
1BSB FKFDVUBS MB BQMJDBDJO UFOESFNPT RVF BCSJS VO OBWFHBEPS XFC
FO OVFTUSP DBTP
'JSFGPY
F JS B MB TJHVJFOUF EJSFDDJO IUUQTMPDBMIPTU &T NVZ QSPCBCMF RVF BM
BDDFEFSBEJDIBEJSFDDJOFMTJTUFNBOPTEFWVFMWBVOFSSPSDPNPFMRVFTFNVFTUSBFO
MB'JHVSB
1BSBTPMVDJPOBSEJDIPFSSPSEFCFNPTDSFBSVOBFYDFQDJO
"DPOUJOVBDJOBQBSFDFSVOBQHJOBDPNPMBRVFTFNVFTUSBFOMB'JHVSB
Claves y consejos
*OUSPEVDJNPTDPNPVTVBSJPBMBENJOJTUSBEPSSPPUZMBDPOUSBTFBEFMNJTNP"DPOUJOVB
DJOWFSFNPTVOBOVFWBWFOUBOBDPNPMBRVFTFNVFTUSBFOMB'JHVSB
4JOPUJFOFTVOBQBSUJDJOJOEF
QFOEJFOUFQBSB /home,QVFEFT
DSFBSVOBOVFWBQBSUJDJOZSFB
MJ[BSFMDBTPQSDUJDPTPCSFFTB
QBSUJDJO
$PNPQPEFNPTWFS
FTUFQSPHSBNBFTVOBBQMJDBDJOXFCRVFTFQVFEFVUJMJ[BSQBSB
DPOGJHVSBSNVMUJUVEEFPQDJPOFTEFMTJTUFNB
120
8448171373_SI_05.indd 120
06/04/10 11:06
4FHVSJEBEBDUJWBFOFMTJTUFNB
$PNPWFNPTFOMB'JHVSB
MBQHJOBEFFOUSBEBUJFOFVONBSDPBMBJ[RVJFSEBDPO
VONFO&TDPHFNPTMBPQDJOSystem TJTUFNB
ZEFOUSPEFFTUBMBPQDJO Disk and
Network Filesystems %JTDPZ4JTUFNBTEFBSDIJWPTFOSFE
6OBWF[SFBMJ[BEBMBTFMFD
DJO
FMNBSDPEFMBEFSFDIBTFBDUVBMJ[BWJTVBMJ[BOEPUPEPTMPTTJTUFNBTEFBSDIJWPTEF
OVFTUSPFRVJQP 'JH
%FUPEPTFMMPTOPTWBNPTBDFOUSBSFOFMEJSFDUPSJPhome,RVFFTUNPOUBEPFOVOB
QBSUJDJOJOEFQFOEJFOUFZFTMBJEOFBQBSBBDUJWBSMBTDVPUBTEFVTVBSJP
QPSTFSFO
FMMBEPOEFTFHVBSEBSOUPEPTMPTBSDIJWPTEFMPTNJTNPT&OFMNBSDPEFMBEFSFDIB
EFMBQHJOB
TFMFDDJPOBNPTDPOFMSBUOMBPQDJOhome, RVFOPTMMFWBSBVOBOVFWB
QBOUBMMB 'JH
8448171373_SI_05.indd 121
06/04/10 11:06
4FHVSJEBEBDUJWBFOFMTJTUFNB
&OFTUBOVFWBQBOUBMMBBQBSFDFOMPTTJTUFNBTEFGJDIFSPTQBSBMPTRVFTFIBZBOFTUBCMF
DJEPDVPUBTEFEJTDP
RVFDPNPTFWF
TPMPTFIBSFBMJ[BEPFOMBQBSUJDJO/home.4J
NBSDBNPTDPOFMSBUOMBPQDJO/home,JSFNPTBVOBOVFWBQBOUBMMBRVFDPOUJFOFVOB
MOFBQPSDBEBVTVBSJPEFMTJTUFNB 'JH
1PSMUJNP
TMPOPTRVFEBTFMFDDJPOBSMPTVTVBSJPTBMPTRVFRVFSFNPTBTJHOBSMFTDVPUBT
EFEJTDPZFTUBCMFDFSMBTNJTNBT1BSBFMMPTFTFMFDDJPOBSFMVTVBSJPFMFHJEP
BQBSF
DJFOEPVOBOVFWBQBOUBMMBDPNPMBRVFTFNVFTUSBFOMB'JHVSB
8448171373_SI_05.indd 122
06/04/10 11:06
4FHVSJEBEBDUJWBFOFMTJTUFNB
Actividades
7. %FGJOF VOB QPMUJDB EF
DPOUSBTFBTQBSBMBSFE
EFMBVMB%JDIBQPMUJDB
EFCFSJODMVJSMPTTJHVJFO
UFTBQBSUBEPT
t 0CKFUJWPEFMEPDVNFOUP
t NCJUPEFMBBQMJDBDJO
BRVVTVBSJPTJOGMVZF
t 'PSNBUPEFMBTDPOUSBTF
BT
t -POHJUVEEFMBTDPOUSBTF
BT
t 5JFNQPEFWJEBEFMB
DPOUSBTFB
t 'PS[BSFMIJTUPSJBMEF
DPOUSBTFBT
t *OEJDBUSBTDVOUPTJO
UFOUPTTFCMPRVFBSMB
DVFOUB
8448171373_SI_05.indd 123
06/04/10 11:06
4FHVSJEBEBDUJWBFOFMTJTUFNB
t /PEFCFNPTFTDSJCJSMBDPOUSBTFBFOOJOHOTJUJP
OJFOQBQFMOJFOEPDVNFOUPT
FMFDUSOJDPTRVFOPIBZBOTJEPFODSJQUBEPT
t /PEFCFNPTFOWJBSMBFOOJOHODPSSFPFMFDUSOJDPRVFOPTMBTPMJDJUF
t /PEFCFNPTDPNVOJDBSMBBOBEJFQPSUFMGPOP
t %FCFNPTMJNJUBSFMONFSPEFJOUFOUPTGBMMJEPT4JFYDFEFFMONFSPNYJNPEFJOUFO
UPTQFSNJUJEPT
FMVTVBSJPEFCFRVFEBSCMPRVFBEP
QPSMPRVFUFOESRVFQPOFSTFFO
DPOUBDUPDPOFMUDOJDPEFTFHVSJEBE&TMPRVFPDVSSFFOMPTDBKFSPTBVUPNUJDPT
TJ
UFFRVJWPDBTUSFTWFDFTBMJOUSPEVDJSMBDMBWF
FMDBKFSPTFRVFEBDPOMBUBSKFUB$PO
FMMPFWJUBNPTRVFTFQVFEBOTFHVJSIBDJFOEPJOUFOUPTJOEFGJOJEBNFOUFZBMGJOBMTF
EFTDVCSBFMONFSPTFDSFUP
t %FCFNPTDBNCJBSMBTDPOUSBTFBTEFBDDFTP
EBEBTQPSEFGFDUPQPSMPTGBCSJDBOUFT
EFSPVUFSTZPUSPTQFSJGSJDPT
RVFOPTQFSNJUFOFMBDDFTPBMBSFE
t /PEFCFNPTVUJMJ[BSMBNJTNBDPOUSBTFBFOMBTEJTUJOUBTNRVJOBTPTJTUFNBT
ZB
RVFTJOPTMBEFTDVCSFO
IBSBNPTWVMOFSBCMFTFMSFTUPEFFRVJQPTBMPTRVFUFOFNPT
BDDFTP
t -BTDPOUSBTFBTEFCFODBEVDBSZFYJHJSRVFTFDBNCJFODBEBDJFSUPUJFNQP
BMNF
OPTVOBWF[BMBP
t /PEFCFNPTQFSNJUJSRVFMBTBQMJDBDJPOFTSFDVFSEFOMBTDPOUSBTFBT
1PS MP UBOUP
MBT DPOUSBTFBT EFCFO TFS DBEFOBT EF DBSBDUFSFT RVF JODMVZBO UBOUP MF
USBTNBZTDVMBT
NJOTDVMBT
ONFSPTZDBSBDUFSFTFTQFDJBMFTTJOOJOHOUJQPEFMHJDB
BQBSFOUF-BMPOHJUVEEFMBNJTNBEFCFTFSTVQFSJPSBPDIPDBSBDUFSFT
BVORVFMPNT
SFDPNFOEBCMFFTRVFTVQFSFMPTRVJODF
"MHVOPTDPOTFKPTQBSBQPEFSSFDPSEBSMBDPOUSBTFB
ZBRVFDPNPIFNPTDPNFOUBEP
BOUFSJPSNFOUFOPQPESFNPTFTDSJCJSMBFOOJOHOTJUJP
TFSBFMFHJSQBMBCSBTTJOTFOUJEP
QFSPRVFTFBOQSPOVODJBCMFT
PCJFOFMFHJSMBQSJNFSBMFUSBEFVOBGSBTFRVFSFDPSEFNPT
QPSTFSQBSUFEFVOBDBODJORVFOPTHVTUB
PEFBMHOSFDVFSEP
QPSFKFNQMPj/BD
FMEFKVOJPEFMFO.BESJEDFSDBEFMBTEFMBNBESVHBEBx
/FE+EF.DEMEMN
QBSBDPNQMJDBSMB
TFQVFEFQPOFSBMHOTNCPMPFTQFDJBMFOVOBQPTJDJORVFQPEBNPT
SFDPSEBS
4J DVNQMJNPT DPO UPEBT MBT SFDPNFOEBDJPOFT FYQVFTUBT BOUFSJPSNFOUF
IBSFNPT RVF
DVBMRVJFSJOUSVTPRVFJOUFOUFEFTDVCSJSMBDMBWFEFBDDFTPNFEJBOUFQSPHSBNBTEFGVFS
[BCSVUB
DPNP+PIOUIF3JQQFSPTJNJMBSFT
UFOHBRVFQFSEFSNVDIPUJFNQPZEFTJTUB
EFMQSPDFTP
3FDPSEBE
VOBDPOUSBTFBNBMFMFHJEBPNBMQSPUFHJEBQVFEFTVQPOFSVOJNQPSUBOUF
BHVKFSPFOMBTFHVSJEBEEFMTJTUFNB
1BSBBRVFMMPT EFWPTPUSPT RVF OPUFOHJTNVDIBJNBHJOBDJOQBSBDSFBSDMBWFT
IBZ
NVMUJUVEEFQSPHSBNBTRVFPTQFSNJUFOHFOFSBSDPOUSBTFBTDPOMBTDBSBDUFSTUJDBTRVF
WPTPUSPTRVFSJT&KFNQMPTEFFTPTQSPHSBNBTTPO.BY1BTTXPSEZ1BTTXPSE(FOFSBUPS
Actividades
8. %FTDBSHBPTMBBQMJDBDJO+PIOUIF3JQQFS(www.openwall.com)ZDPNQSPCBE
MPTUJFNQPTRVFUBSEBFOEFTDVCSJSDPOUSBTFBT
t ' PSNBEBTQPSVOBQBMBCSBRVFQPEJTFODPOUSBSFOFMEJDDJPOBSJP
QPSFKFN
QMPQBUBUB
t 'PSNBEBTTPMPQPSONFSPT
t 'PSNBEBTQPSQBMBCSBTJOWFSUJEBT
QPSFKFNQMPQBUBUBBMSFWT
BUBUBQ
t 'PSNBEBTQPSQBMBCSBTFOPUSPTJEJPNBT
DPNQVUFS
t 'PSNBEBQPSVODPOKVOUPEFDBSBDUFSFTTJOTFOUJEP"I6OC\
124
8448171373_SI_05.indd 124
06/04/10 11:06
4FHVSJEBEBDUJWBFOFMTJTUFNB
Rasgos
Extraccin
patrn
Lectura
sensores
Mdulo de inscripcin
BD
Rasgos
Lectura
sensores
Extraccin
patrn
Comparacin
patrn
Mdulo de identificacin
-PTUJQPTEFTJTUFNBTCJPNUSJDPTNTQPQVMBSFTTPO
t 7FSJGJDBDJPOFTBOBUNJDBT
o.BOPIVFMMBTEBDUJMBSFT
HFPNFUSB
WFOBT
o3PTUSPHFPNFUSB
o1BUSPOFTPDVMBSFTSFUJOB
JSJT
t 7FSJGJDBDJOEFMDPNQPSUBNJFOUP
o5JNCSFEFMBWP[
o&TDSJUVSBVTPEFMUFDMBEP
FTDSJUVSBNBOVBMEFVOUFYUPQSFEFGJOJEP
GJSNBEFMVTVBSJP
o-POHJUVEZDBEFODJBEFMQBTP
125
8448171373_SI_05.indd 125
06/04/10 11:07
4FHVSJEBEBDUJWBFOFMTJTUFNB
Caso prctico 8
Definir listas de control de acceso en Ubuntu 9.04 para restringir el acceso a los archivos
1. 1BSBQPEFSIBDFSVTPEFMBTMJTUBTEFDPOUSPMEFBDDFTP
EFCFNPT DPNVOJDBSMF BM TJTUFNB FO RV QBSUJDJPOFT
WBNPTBRVFSFSVTBSMBT1BSBFMMP
OFDFTJUBNPTDPOGJHV
SBSFMGJDIFSP/etc/fstab.
-PTTJTUFNBTEFGJDIFSPTNPOUBEPTDPO"$-
UFOESO
MBQBMBCSBDMBWFjBDMxFOMBTPQDJPOFTEFNPOUBKFEF
EJDIPGJDIFSP
2. &O OVFTUSP DBTP
BEFNT EF MBT QBSUJDJPOFT EF SPPU
ZTXBQ
UFOFNPTVOBUFSDFSBEFEJDBEBBMBMNBDFOB
NJFOUP EF EBUPT FO FTUB MUJNB
WBNPT B DPOGJHVSBS
MBMJTUBEFDPOUSPMEFBDDFTPQBSBFMMPNPEJGJDBNPTFM
GJDIFSPfstab 'JH
BBEJFOEPMBMOFBDPSSFT
QPOEJFOUFBEJDIBQBSUJDJO 'JH
Claves y consejos
1BSBDPNQSPCBSRVFMBEJTUSJCV
DJOEF-*/69TPCSFMBRVFWBT
BUSBCBKBSTPQPSUB"$-
EFCFT
VUJMJ[BSFMDPNBOEPgrep,DPNP
TFNVFTUSBFOMBJNBHFO
Importante
1BSBDPOGJHVSBSMBTMJTUBTEFDPO
USPM EF BDDFTP "$-
EFCFNPT
SFBMJ[BSMPCBKPFMQFSGJMEFBENJ
OJTUSBEPS
Actividades
9. {2V EJGFSFODJBT IBZ
FOUSFFMVTPEFMBT"$-Z
FMEFMBPSEFOchmod
126
8448171373_SI_05.indd 126
06/04/10 11:07
4FHVSJEBEBDUJWBFOFMTJTUFNB
Caso prctico 8
(Continuacin)
1BSBSFBMJ[BSFMFKFNQMP
SPPUIBDSFBEPVOGJDIFSPMMB
NBEPQSVFCB
127
8448171373_SI_05.indd 127
06/04/10 11:07
4FHVSJEBEBDUJWBFOFMTJTUFNB
Caso prctico 9
Definir listas de control de acceso en Windows utilizando el comando cacls
para evitar el acceso a los ficheros a usuarios no autorizados
1. 1BSBMBSFBMJ[BDJOEFFTUBBDUJWJEBEEFCFNPTUFOFSDSFBEPTBMNFOPTEPTVTVB
SJPT6TVBSJPZ6TVBSJP
2. &OMBDBSQFUBMis DocumentosEFM6TVBSJP
DSFBSFNPTPUSPTEPTEJSFDUPSJPT
$POGJEFODJBMZ%BUPTDPNQBSUJEPT
3. &M6TVBSJPRVJFSFQFSNJUJSRVF6TVBSJPQVFEBMFFSEPDVNFOUPTRVFIBZBMNB
DFOBEPTFO%BUPTDPNQBSUJEPT&OFTUPTNPNFOUPTFTPFTJNQPTJCMF
FM6TVB
SJP OP UJFOF QFSNJTPT QBSB BDDFEFS B %BUPT DPNQBSUJEPT {2V QPEFNPT
IBDFS .PEJGJDBSMBMJTUBEFDPOUSPMEFBDDFTPQBSBQFSNJUJSMFFOUSBSBMBDBSQFUB
%BUPTDPNQBSUJEPT"EFNT
EFCFNPTQFSNJUJSFMBDDFTPBMBDBSQFUB6TVBSJP
EFDocuments and SettingsZBMEJSFDUPSJPMis Documentos.
1BSBFMMPEFCFNPTFKFDVUBSMBJOTUSVDDJOcacls,DVZBTJOUBYJTFT
Cacls fichero /parmetros
-PTQBSNFUSPTTPO
U$BNCJBMBT"$-4EFMPTBSDIJWPTFTQFDJGJDBEPTFOFMEJSFDUPSJPBDUVBMZFO
UPEPTTVTTVCEJSFDUPSJPT
F.PEJGJDBMB"$-FOWF[EFSFFNQMB[BSMB&TUFQBSNFUSPFTNVZJNQPSUBOUF
TVQPOHBNPTRVFRVFSFNPTEBSMFQFSNJTPTBM6TVBSJPZOPVUJMJ[BNPTFTUF
NPEJGJDBEPSFOUPODFTTFSFFNQMB[BMB"$-BOUJHVBQPSMBOVFWB
OPQFSNJ
UJFOEPBM6TVBSJPBDDFEFSBTVJOGPSNBDJO
D'VFS[BMBNPEJGJDBDJOBVORVFFODVFOUSFFSSPSFT
HVTVBSJPQFSNJTPT3 MFDUVSB
& FTDSJUVSB
$ DBNCJBS
Z' DPOUSPMUPUBM
$PODFEFEFSFDIPTEFBDDFTPBMVTVBSJP
3VTVBSJP4VTQFOEFMPTEFSFDIPTBMVTVBSJP
QVTVBSJPQFSN4VTUJUVZFMPTEFSFDIPTEFMVTVBSJPFTQFDJGJDBEP
EVTVBSJP%FOJFHBFMBDDFTPBMVTVBSJPFTQFDJGJDBEP
-BJOTUSVDDJOcacls QFSNJUFNPEJGJDBSMBTMJTUBTEFDPOUSPMEFBDDFTPBMPTGJDIFSPT
4FHOMBTJOUBYJTBOUFSJPS
EFCFNPTFKFDVUBSFMDPNBOEPRVFBQBSFDFFOMB
'JHVSB
&MSFTVMUBEPFTRVFFM6TVBSJPQVFEFFOUSBSBUPEPTMPTEJSFDUPSJPTZGJDIFSPT
RVFDVFMHVFOEFMEJSFDUPSJP6TVBSJP
PMPRVFFTMPNJTNP
QVFEFWJTVBMJ[BS
DVBMRVJFSEPDVNFOUPEFEJDIPVTVBSJP
$PNPUPEBMBJOGPSNBDJOEFM6TVBSJPFTUBMNBDFOBEBFOEPTDBSQFUBT
$PO
GJEFODJBMZ%BUPT$PNQBSUJEPT
QBSBRVFOPUFOHBBDDFTPFM6TVBSJPBMEJSFD
UPSJP$POGJEFODJBMEFM6TVBSJP
EFCFNPTFKFDVUBSMBPSEFOEFMB'JHVSB
8448171373_SI_05.indd 128
06/04/10 11:07
4FHVSJEBEBDUJWBFOFMTJTUFNB
Sabas que?
8JOEPXTQVCMJDBMBTBDUVBMJ[B
DJPOFTMPTTFHVOEPTNBSUFTEF
DBEBNFT
DPOPDJEPDPNP1BUDI
5VFTEBZ NBSUFT EF DPSSFDDJP
OFT
BOPTFSRVFTFBVOBBDUVB
MJ[BDJODSUJDB
FOFTFDBTPTF
QVCMJDBTFHOTFUFSNJOF
1BSBFWJUBSMBTWVMOFSBCJMJEBEFTFO8JOEPXT
EFCFNPTNBOUFOFSFMTJTUFNBBDUVBMJ[BEP
DPOMPTMUJNPTQBSDIFT&TUPMPQPEFNPTSFBMJ[BSEFEJTUJOUBTNBOFSBT
8JOEPXTQSPQPSDJPOBVOTFSWJDJPEFBDUVBMJ[BDJPOFTBVUPNUJDBTBUSBWTEFMB8FC
EFOPNJOBEP 8JOEPXT 6QEBUF
VCJDBEP FO XJOEPXTVQEBUFNJDSPTPGUDPN 4J OPT DP
OFDUBNPTBFTUBQHJOB
FMTFSWJDJPBOBMJ[BFMTJTUFNBPQFSBUJWPZEFUFSNJOBMBTBDUVBMJ
[BDJPOFTRVFFTOFDFTBSJPEFTDBSHBS
0USBNBOFSBFTDPOGJHVSBSFMTJTUFNBPQFSBUJWPQBSBRVFSFBMJDFMBTEFTDBSHBTEFMBT
BDUVBMJ[BDJPOFTBVUPNUJDBNFOUF1BSBFMMPEFCFNPTQVMTBSFMCPUO*OJDJPEF8JOEPXT
7JTUB
IBDFSDMJDTPCSFFMPanel de ControlZTFMFDDJPOBSMBPQDJOEFWindows Update
'JH
"DPOUJOVBDJO TFBCSFVOBOVFWBWFOUBOBTJNJMBSBMBRVFTFNVFTUSBFOMB'JHVSB
8448171373_SI_05.indd 129
06/04/10 11:07
4FHVSJEBEBDUJWBFOFMTJTUFNB
&O FTB WFOUBOB QPEFNPT CVTDBS BDUVBMJ[BDJPOFT
DBNCJBS MB DPOGJHVSBDJO
DPOTVMUBS
FMIJTUPSJBMEFBDUVBMJ[BDJPOFT
SFTUBVSBSBDUVBMJ[BDJPOFTPDVMUBTZWFSMBTQSFHVOUBTGSF
DVFOUFTTPCSFFMQSPDFTPEFBDUVBMJ[BSFMTJTUFNB
$PNP FTUBNPT JOUFOUBOEP DPOGJHVSBS MBT BDUVBMJ[BDJPOFT BVUPNUJDBNFOUF
EFCFNPT
IBDFSDMJDFOMBPQDJOCambiar configuracin
RVFTFNVFTUSBFOFMNBSDPJ[RVJFSEP
EFMB'JHVSB
&OMBOVFWBWFOUBOB 'JH
TFMFDDJPOBNPTMBQSJNFSBPQDJO
Instalar actualizaciones automticamente (recomendado),EFGJOJFOEPDVOEPRVFSFNPTRVFTFJOTUBMFOMBT
OVFWBTBDUVBMJ[BDJPOFT$PNPTBCFNPTRVF8JOEPXTTVFMFQVCMJDBSMBTBDUVBMJ[BDJPOFT
MPTNBSUFT
MPQPEFNPTDPOGJHVSBSQBSBRVFTFJOTUBMFOMPTWJFSOFTBMBTIPSBT
EFFTUBNBOFSB
OPTBTFHVSBNPTRVFOPIBOEBEPQSPCMFNBTMPTQBSDIFTQVCMJDBEPT
0USBPQDJORVFQPEFNPTTFMFDDJPOBSFOMBNJTNBWFOUBOBFTDescargar actualizaciones, pero permitirme elegir si deseo instalarlas;DPNPTVOPNCSFJOEJDBTFEFTDBSHBOMBT
BDUVBMJ[BDJPOFT
QFSPOPTPOJOTUBMBEBTIBTUBRVFOPEFNPTMBPQPSUVOBPSEFO
0USB TFMFDDJO QPTJCMF FT Buscar las actualizaciones, pero permitirme elegir si deseo
descargarlas e instalarlas;EFFTUBNBOFSB
OPTFEFTDBSHBOMBTBDUVBMJ[BDJPOFT
PDV
QBOEPFTQBDJPFOFMEJTDPEVSPIBTUBFMNPNFOUPFORVFMBTJOTUBMBNPT
1PS MUJNP
QPEFNPT PQUBS QPS OP CVTDBS MBT BDUVBMJ[BDJPOFT FO FTF DBTP TPNPT MPT
SFTQPOTBCMFTEFBDDFEFSBMBQHJOBEF8JOEPXT6QEBUFZEFUFSNJOBSMBTBDUVBMJ[B
DJPOFTRVFOFDFTJUBNPTQBSBNBOUFOFSOVFTUSPFRVJQPTJOWVMOFSBCJMJEBEFT
%F MB NJTNB NBOFSB RVF NBOUFOFNPT BDUVBMJ[BEP FM TJTUFNB PQFSBUJWP
EFCFNPT
NBOUFOFS BDUVBMJ[BEP MPT QSPHSBNBT RVF UFOFNPT JOTUBMBEPT Z
QPS TVQVFTUP
FM GJS
NXBSFEFMPTEJTUJOUPTQFSJGSJDPTRVFDPOFDUBNPTBMFRVJQPSPVUFS
TXJUDI
FUD
$PNPQFSEFSBNPTNVDIPUJFNQPDPOTVMUBOEPMBQHJOBEFDBEBGBCSJDBOUFQBSBWFSTJ
IBOQVCMJDBEPOVFWBTBDUVBMJ[BDJPOFTEFMBTBQMJDBDJPOFTJOTUBMBEBT
QPEFNPTVUJMJ[BS
BMHVOPTEFMPTOVNFSPTPTQSPHSBNBTHSBUVJUPTRVFFYJTUFO&TUPTTFDPOFDUBOB*OUFSOFU
ZOPTJOGPSNBOEFTJIBZOVFWBTBDUVBMJ[BDJPOFTQVCMJDBEBTRVFBOOPUFOHBNPTJOT
UBMBEBT
"MHVOPT FKFNQMPT EF EJDIPT QSPHSBNBT TPO "11(&5
46.0
-0(*$*&*."$$0.
"11'3&4)
61%"5&/05*'*&3(http://cleansofts.org),FUD
130
8448171373_SI_05.indd 130
06/04/10 11:07
4FHVSJEBEBDUJWBFOFMTJTUFNB
&TUBJOGPSNBDJOFTHVBSEBEBFOMPTBSDIJWPT"QQ&WFOU&WU
4FD&WFOU&WUZ4ZT&WFOU&WU
VCJDBEPTUPEPTFMMPTFOFMEJSFDUPSJP4ZTUFN3PPU=TZTUFN=DPOGJH
&T NVZ JNQPSUBOUF DPOGJHVSBS DPSSFDUBNFOUF FM UBNBP Z FM BDDFTP B MPT NJTNPT &M
UBNBPEFCFTFSMPTVGJDJFOUFNFOUFHSBOEFQBSBBMCFSHBSMPTTVDFTPTQSPEVDJEPTFOFM
TJTUFNBIBTUBRVFMPBVEJUFNPT:DPNPFTMHJDP
QBSBFWJUBSRVFMPTJOUSVTPTCPSSFO
TVTIVFMMBTTMPEFCFSOUFOFSQFSNJTPTEFDPOUSPMUPUBMFMUDOJDPPUDOJDPTFODBSHBEPT
EFMBTFHVSJEBEEFMTJTUFNB
8448171373_SI_05.indd 131
06/04/10 11:07
4FHVSJEBEBDUJWBFOFMTJTUFNB
Sabas que?
#MPHWJFOFEFXF#-0(
Fig. 5.57. Ubicacin logs de Linux.
"DPOUJOVBDJO WBNPTBWFSVOPTFKFNQMPTEFMPTDPNBOEPTWJTUPTBOUFSJPSNFOUF
8448171373_SI_05.indd 132
06/04/10 11:07
4FHVSJEBEBDUJWBFOFMTJTUFNB
Sabas que?
Luser FTFMUSNJOPRVFVUJMJ[BO
MPT BUBDBOUFT QBSB SFGFSJSTF BM
VTVBSJP RVF WB B TFS BUBDBEP
&TMBBCSFWJBUVSBEF-PDBM64&3
Sabas que?
-BQBMBCSBhackerIBTJEPVUJMJ
[BEBFSSOFBNFOUFQPSMBQSFO
TBQBSBSFGFSJSTFBBRVFMMBTQFS
TPOBTJOWPMVDSBEBTFODVBMRVJFS
BDUP RVF BUBRVF MB TFHVSJEBE
JOGPSNUJDB
TJOUFOFSFODVFOUB
FMGJOEFMNJTNP
t Phreakers:TPOFYQFSUPTFOUFMFGPOB4PODPOPDJEPTDPNPMPTQIPOFDSBDLFST
MPT
DSBDLFSTEFMBUFMFGPOB
CVTDBOVOCFOFGJDJPFDPONJDPTBCPUFBOEPMBTSFEFTUFMF
GOJDBTQBSBSFBMJ[BSMMBNBEBTHSBUVJUBT
t Ciberterroristas: TPOFYQFSUPTFOJOGPSNUJDBZFOJOUSVTJTNPFOMBSFE
RVFQPOFOTVT
DPOPDJNJFOUPTBMTFSWJDJPEFQBTFTZPSHBOJ[BDJPOFTQBSBFMFTQJPOBKFPTBCPUBKF
JOGPSNUJDP
t Programadores de virus:TPOFYQFSUPTFOQSPHSBNBDJO
FOTJTUFNBTZFOSFEFT
RVF
DSFBOQFRVFPTQSPHSBNBTEBJOPT
RVFQPSVOPVPUSPNPUJWPMMFHBOBMBSFEZ
TFEJTUSJCVZFODPOSBQJEF[PDBTJPOBOEPEBPTFOMPTTJTUFNBTPFOMBJOGPSNBDJO
BMNBDFOBEBFOMPTNJTNPT
t Carders:BUBDBOMPTTJTUFNBTEFUBSKFUBT
FTQFDJBMNFOUFMPTDBKFSPTBVUPNUJDPT
t Sniffers:MPQPESBNPTUSBEVDJSDPNPcotilla,TPOMBTQFSTPOBTRVFTFEFEJDBOBFT
DVDIBSFMUSGJDPEFMBSFE
QBSBJOUFOUBSSFDPNQPOFSZEFTDJGSBSMPTNFOTBKFTRVF
DJSDVMBOQPSMBNJTNB
t Lammers: UBNCJO DPOPDJEPT DPNP wannabes P script-kiddies P click-kiddies, TPO
DIJDPTKWFOFTRVFTJOHSBOEFTDPOPDJNJFOUPTJOGPSNUJDPT
TFDSFFOWFSEBEFSPTIBD
LFSTZTFMPIBDFODSFFSBMPTNJFNCSPTEFTVTQBOEJMMBT&TUPTTMPTFIBOEFTDBS
HBEPIFSSBNJFOUBTPQSPHSBNBTEF*OUFSOFUQBSBSFBMJ[BSBUBRVFTJOGPSNUJDPTZMPT
IBOQVFTUPFONBSDIBTJOTBCFSDNPGVODJPOBO-PTWFSEBEFSPTIBDLFSTNVFTUSBO
VOBHSBOSFQVMTBIBDJBMPTMBNNFST
t Newbie:TPOMPTIBDLFSTOPWBUPT
FNQJF[BOBBQSFOEFSZWBOTVQFSBOEPMPTQSJNF
SPTSFUPTQBSBMMFHBSBTFSWFSEBEFSPTIBDLFST
133
8448171373_SI_05.indd 133
06/04/10 11:07
4FHVSJEBEBDUJWBFOFMTJTUFNB
*OUFSSVQDJO
t Intercepcin,BUBDBMBDPOGJEFODJBMJEBE6OJOUSVTPBDDFEFBJOGPSNBDJOBMNBDFOB
EBFOOVFTUSPTJTUFNBPBMRVFIFNPTUSBTNJUJEPQPSMBSFE
FTEFDJS
MBJOGPSNBDJO
IBDBEPFONBOPTEFQFSTPOBMOPBVUPSJ[BEP&KFNQMPT
DBQUVSBEFJOGPSNBDJOFO
MBSFEPDPQJBEFBSDIJWPTOPBVUPSJ[BEB
*OUFSDFQDJO
t Modificacin,BUBDBFMPCKFUJWPEFJOUFHSJEBE-PTEBUPTIBOTJEPNBOJQVMBEPTQPS
QFSTPOBMOPBVUPSJ[BEPFOBMHONPNFOUPFOUSFTVDSFBDJOZTVMMFHBEBBMEFTUJOB
UBSJP-BJOGPSNBDJORVFTFEJTQPOFEFTQVTEFVOBUBRVFEFFTUBTDBSBDUFSTUJDBT
OP FT WMJEB OJ DPOTJTUFOUF &KFNQMPT
MBT NPEJGJDBDJPOFT EF QSPHSBNBT QBSB RVF
SFBMJDFOBDDJPOFTEJGFSFOUFTBMBTQSPQVFTUBTPSJHJOBMNFOUF
NPEJGJDBSVONFOTBKF
USBOTNJUJEPQPSMBSFE
%/4TQPPGJOH
y
.PEJGJDBDJO
t Fabricacin,FTUFUJQPEFBUBRVFWVMOFSBMBBVUFOUJDJEBE4FUSBUBEFNPEJGJDBDJPOFT
EFTUJOBEBTBDPOTFHVJSRVFFMQSPEVDUPGJOBMTFBTJNJMBSBMBUBDBEPEFGPSNBRVF
TFBEJGDJMEJTUJOHVJSMPEFMPSJHJOBM1PSFKFNQMP
FMQIJTJOH
'BCSJDBDJO
Fig. 5.64. Fabricacin.
134
8448171373_SI_05.indd 134
06/04/10 11:07
4FHVSJEBEBDUJWBFOFMTJTUFNB
0USP UJQP EF DMBTJGJDBDJO TF QVFEF SFBMJ[BS en funcin de la forma de actuar EF MPT
BUBRVFT
t Spoofing o suplantacin de la identidad: MBUDOJDBEFTQPPGJOH FOHBPPGBMTFB
NJFOUP
TFVTBFOSFEFTFUIFSOFUDPONVUBEBT
FTEFDJS
FOSFEFTRVFIBDFOVTPEF
TXJUDIDPNPFMFNFOUPEFJOUFSDPOFYJOFOUSFMPTEJGFSFOUFT1$
&TUFBUBRVFDPOTJTUFFOGBMTFBSBMHOEBUPEFVO1$BUBDBEP&YJTUFOEJTUJOUPTUJQPT
EFTQPPGJOH
DPNPQVFEFTFSFMBSQTQPPGJOHPBSQQPJTPOJOH
RVFDPOTJTUFFOFO
HBBSBMBUBCMBBSQRVFMPTFRVJQPTHVBSEBOFONFNPSJB
UBCMBRVFTJNQMFNFOUF
BTPDJBVOBEJSFDDJOGTJDBPNBDEFVOBUBSKFUBEFSFEDPOTV*1 'JH
Ten cuidado
&M DPNBOEP "31 QFSNJUF WFS
P NPEJGJDBS MBT FOUSBEBT EF MB
UBCMBEF*1."$
$POFTUBUDOJDBEFFOHBPQPEFNPTIBDFSDSFFSBVO1$BUBDBEPRVFMBEJSFDDJO
GTJDBEFPUSP1$
UBNCJOBUBDBEPEFMBSFE
FTMBEFM1$EFMBUBDBOUF
DPOTJHVJFOEP
DPOFMMPRVFUPEPFMUSGJDPEFSFEFOUSFMPTEPT1$BUBDBEPTQBTFQPSFM1$EFMBUBDBOUF
'JH
FTMPRVFTFDPOPDFDPNPman in the middle IPNCSFFONFEJP
&O MB 'JHVSB QPEFNPT WFS DPNP MB ."$ EF MB EJSFDDJO EFM 1$ BUBDBEP
IBTJEPNPEJGJDBEBDPOMBEJSFDDJOGTJDB GFBF
RVFFT
MBEJSFDDJOGTJDBEFMBUBDBOUF
0USBWFSTJOEFFTUFUJQPEFBUBRVFTFTFM%/4TQPPGJOHPFOHBPEF%/4
RVFDPOTJT
UFFOGBMTFBSMBSFTQVFTUBEFMTFSWJEPS%/4TPCSFVOBQFUJDJOZEBSMFVOBEJSFDDJO*1
EJGFSFOUFBMBSFBM&TEFDJS
RVFDVBOEPVO1$BUBDBEPQJEFQPSFKFNQMPMB*1EFXXX
NJCBODPFTBTVTFSWJEPS%/4
FMFRVJQPBUBDBOUFGBMTFBSFMQBRVFUFEFEBUPTEFMPT
%/4DPOMBSFTQVFTUBZMFQVFEFFOHBBSEOEPMFMB*1EFPUSPFRVJQPDVBMRVJFSB"T
FOWF[EFDPOFDUBSTFBTVCBODPTFDPOFDUBSBBPUSP1$EJGFSFOUFQVEJFOEPGBMTFBSMB
QBHJOBEFFOUSBEBEFTVCBODBFMFDUSOJDBZDBQUVSBOEPTVTDMBWFTEFBDDFTPBMBNJTNB
7FBNPTFTUBTEPTUDOJDBTNFEJBOUFVOBQSDUJDBSFBMJ[BEBDPOFMQSPHSBNB$"*/RVF
UFQVFEFTEFTDBSHBSEFMBQHJOBhttp://www.oxld.it/cain.html.
135
8448171373_SI_05.indd 135
06/04/10 11:07
4FHVSJEBEBDUJWBFOFMTJTUFNB
Caso prctico 10
ARP spoofing y DNS spoofing
&O FTUB QSDUJDB
WBNPT B IBDFS RVF DVBOEP VO VTVBSJP EFTEF VO 1$ BUBDBEP
SFTVFMWBMB*1BTPDJBEBBMOPNCSFXXXHPPHMFDPN
FOWF[EFDPOUFTUBSMFDPOMB
EJSFDDJOSFBM
PCUFOESDPNPSFQVFTUBMB*1EFVOFRVJQPEFOVFTUSBSFE
"OUFT EF IBDFS FM %/4 TQPPGJOH UFOESFNPT RVF SFBMJ[BS VO FOWFOFOBNJFOUP EF
MBUBCMB"31
QBSBBTDBNCJBSMBTUBCMBT*1."$EFM1$BUBDBEPZEFMSPVUFSZ
SFEJSJHJSUPEPFMUSGJDPRVFWBEFTEFFM1$BUBDBEPIBDJBFMSPVUFSBUSBWTEFM1$
EFMBUBDBOUF
$PNPWFNPTFOMB'JHVSBBOUFTEFMBUBRVF
FM%/4SFTVFMWFMBEJSFDDJOEF
(PPHMFDPOTVEJSFDDJO*1SFBM
%FTQVTEFMBUBRVF
FMBUBDBOUFNPEJGJDBMBEJSFDDJOEFWVFMUBQPSFM%/4QPSVOB
EJSFDDJORVFFMBUBDBOUFDPOGJHVSBBUSBWTEFMBBQMJDBDJO$"*/1BSBSFBMJ[BS
FTUBQSDUJDBEFCFNPTTFHVJSEPTTFODJMMPTQBTPT
1. &MQSJNFSP
DSFBSVOBFOUSBEBEFFOWFOFOBNJFOUP"31 'JH
$POFTUPDPO
TFHVJSFNPTRVFUPEPFMUSGJDPFOUSF1$BUBDBEPZFMSPVUFSTFBSFEJSFDDJPOBEP
BM1$EFMBUBDBOUF
8448171373_SI_05.indd 136
06/04/10 11:07
4FHVSJEBEBDUJWBFOFMTJTUFNB
Caso prctico 10
(Continuacin)
Vocabulario
MAC. .FEJB "DDFTT $POUSPM
FT VO ONFSP EF CJUT RVF
HFOFSBMNFOUFTFFYQSFTBDPNP
EHJUPTIFYBEFDJNBMFT
ZRVF
JEFOUJGJDBEFGPSNBOJDBBDBEB
UBSKFUBEFSFEFUIFSOFU
$PNPTFQVFEFWFSFOMBTJHVJFOUFJNBHFO
DVBOEPIBDFNPTVOQJOHB(PPHMF
EFTEF FM FRVJQP BUBDBEP EFWVFMWF MB EJSFDDJO RVF IB DPOGJHVSBEP FM BUBDBOUF
$PNP FT MHJDP QFOTBS
FTUB UDOJDB TF QVFEF VUJMJ[BS QBSB DPNFUFS GSBVEFT FO
JOUSBOFUTPSFEFTDPSQPSBUJWBTSFFOWJBOEPBMBUBDBEPBVOBQHJOBNVZTJNJMBSB
MBPSJHJOBM
QFSPGBMTB
QPSMPRVFFMJOUSVTPQPESWFSTVTDMBWFT
$POUSBFTUFUJQPEFBUBRVFTQPEFNPTMVDIBSDSFBOEPMBTUBCMBT"31EFMPTFRVJQPT
FYQVFTUPTEFGPSNBFTUUJDBNFEJBOUFFMDPNBOEP"31
8448171373_SI_05.indd 137
06/04/10 11:07
4FHVSJEBEBDUJWBFOFMTJTUFNB
Caso prctico 11
Comprometer una sesin telnet entre dos equipos atacados
1BSB MB SFBMJ[BDJO EF FTUB QSDUJDB IFNPT VUJMJ[BEP USFT
FRVJQPT DPOFDUBEPT B MB NJTNB SFE NFEJBOUF VO TXJUDI
7PMWFSFNPTBVUJMJ[BSMBNJTNBBQMJDBDJORVFFOFMDBTP
QSDUJDP BOUFSJPS
$"*/
DPO MB RVF FOWFOFOBSFNPT NF
EJBOUFMBUDOJDBEFM"31TQPPGJOHFMUSGJDPHFOFSBEPFO
USFMPTEPT1$BUBDBEPTDPOTJHVJFOEPWJTVBMJ[BSFMDPOUFOJ
EPEFMBTFTJOUFMOFUFOUSFMPTNJTNPT
1. $PNPQVFEFTWFSFOMBTJHVJFOUFJNBHFO 'JH
TFFTUFOWFOFOBOEPFMUSGJDPFOUSFEPT1$VOPDPO
MBEJSFDDJO*1
RVFTFSFMRVFJOJDJFMB
TFTJOUFMOFU
ZPUSPDPOEJSFDDJO*1RVF
FTRVJFOUJFOFFOFKFDVDJOVOTFSWJEPSUFMOFU
2. &OFMTJHVJFOUFQBTP
WBNPTBWFSDPNPFMTOJGGFSFTDV
DIB FM USGJDP HFOFSBEP FOUSF MPT EPT 1$ BUBDBEPT
EVSBOUFVOBTFTJOEFBDDFTPSFNPUP
&OQSJNFSMVHBS&NJMJPJOJDJBVOBTFTJOUFMOFUBVUFOUJDOEP
TFNFEJBOUFTVOPNCSFZVTBOEPDPNPDPOUSBTFBQBUBUB
'JH
&OMBTJHVJFOUFJNBHFO
WFNPTDPNPFMTOJGGFSNFEJBOUFMB
BQMJDBDJO$"*/IBTJEPDBQB[EFDPNQSPNFUFSOVFTUSB
TFTJOUFMOFU 'JH
&MJOUSVTPWFFMOPNCSFEFVTVBSJP
Z MB DPOUSBTFB VUJMJ[BEPT QBSB MB DPOFYJO Z QPTUFSJPS
NFOUFMBFKFDVDJOEFMDPNBOEPdirSFBMJ[BEBEVSBOUFMB
TFTJOQPSFMBUBDBEP
138
8448171373_SI_05.indd 138
06/04/10 11:07
4FHVSJEBEBDUJWBFOFMTJTUFNB
5
Software
1VFEFTEFTDBSHBSUFVOBWFSTJO
EFNP EF EBT EFM BOUJWJSVT
&4&5 FO http://demos.eset.es/.
&O FM TJUJP QPEST FMFHJS FOUSF
&4&5 /0% "OUJWJSVT P &4&5
4NBSU4FDVSJUZ1VFEFTTPMJDJUBS
NTJOGPSNBDJOBUVQSPGFTPS
o-PTvirusTPOQSPHSBNBTRVFTFQSPQBHBOFOUSFMPTFRVJQPT4VDEJHPTFBEKVO
UBBMEFPUSPQSPHSBNBFYJTUFOUFFOFMTJTUFNBQBSBGBDJMJUBSMBQSPQBHBDJOEFM
NJTNP Z DBVTBS MPT EBPT QBSB MPT RVF IBO TJEP EJTFBEPT QPS FM DSFBEPS -B
DBSBDUFSTUJDBQSJODJQBMFTRVFTVDEJHPIBTJEPFTDSJUPDPOMBJOUFODJOEFRVFTF
WBZBSFQMJDBOEPQBSBBTJOGFDUBSFMNBZPSONFSPEFFRVJQPTQPTJCMFT&KFNQMPT
GBNPTPTEFWJSVTTPO#BSSPUFT
7JFSOFTy
o-PTgusanosTPOEJTFBEPTDPOFMNJTNPGJORVFMPTWJSVT
RVFTFQSPQBHVFOQPS
MBSFE4FEJGFSFODJBOFORVFTUPTOPOFDFTJUBOMBJOUFSWFODJOEFMVTVBSJP
ZB
RVFOPTFBEKVOUBOBOJOHOPUSPQSPHSBNB
TJOPRVFTPOEJTUSJCVJEPTEFNBOFSB
DPNQMFUBQPSMBSFEDPOTVNJFOEPFOMBHSBONBZPSBEFMPTDBTPTVOHSBOBODIP
EF CBOEB EF MB SFE P QVFEFO MMFHBS B CMPRVFBS FM FRVJQP JOGFDUBEP "MHVOPT
FKFNQMPTGBNPTPTEFFTUFUJQPEFQSPHSBNBTTPO4BTTFSZ#MBTUFS
o-PTtroyanosTPOBQMJDBDJPOFTBQBSFOUFNFOUFJOPGFOTJWBTRVFGBDJMJUBOFOMBNBZP
SBEFMPTDBTPTFMBDDFTPSFNPUPBMPTFRVJQPTJOGFDUBEPT&TUBTBQMJDBDJPOFTTF
QVFEFOFTDPOEFSFOBSDIJWPTBEKVOUPTFOMPTNFOTBKFTRVFFOWJBNPTQPSMBSFE
&TUPTEBPTWBSBOEFTEFBRVFMMPTRVFOPSFBMJ[BOOJOHOQFSKVJDJPBMFRVJQPJOGFDUBEP
IBTUBPUSPTRVFSFBMJ[BOWFSEBEFSPTEFTUSP[PTJSSFWFSTJCMFTFOOVFTUSPTJTUFNB
1BSBFWJUBSFMBUBRVFEFFTUFUJQPEFQSPHSBNBTTFIBODPNFSDJBMJ[BEPBQMJDBDJPOFTEF
OPNJOBEBTBOUJWJSVTRVFNBOUJFOFOBDUVBMJ[BEBTTVTGJDIFSPTEFGJSNBTQBSBEFUFDUBSZ
FMJNJOBSMPTQSPHSBNBTDPODEJHPNBMJDJPTP&KFNQMPTEFBOUJWJSVTTPO1BOEB
/PSUPO
"7(
FUD5PEPTFMMPTUJFOFOBOUJWJSVT on-line FOMOFB
RVFFOMBNBZPSBEFMPTDBTPT
TMPQFSNJUFOEFUFDUBSTJOVFTUSBNRVJOBFTUJOGFDUBEB
&TBDPOTFKBCMFUFOFSJOTUBMBEPVOBOUJWJSVT
UFOJFOEPFODVFOUBRVFUPEPTFMMPTSBMFOUJ[BO
UBOUPFMBSSBORVFDPNPFMOPSNBMGVODJPOBNJFOUPEFMFRVJQPQPSDPOTVNJSSFDVSTPTEFM
FRVJQP
Importante
%FCFTDBNCJBSMBTDPOUSBTFBT
RVFQPOFOQPSEFGFDUPMPTGBCSJ
DBOUFTBMPTEJTUJOUPTQFSJGSJDPT
RVFOPTQFSNJUFOMBDPOFYJOB
*OUFSOFUQBSBFWJUBSDPOFYJPOFT
OPBVUPSJ[BEBTBMPTNJTNPT
Sabas que?
"MHVOPTWJSVTGBNPTPT
t&MWJSVT'03.IBDFTPOBSMPT
EBTEFDBEBNFTVOQJUJEP
QPSDBEBUFDMBQVMTBEB&TUP
TJNQMFNFOUF TF QVFEF DPOTJ
EFSBSVOBCSPNBNTPNFOPT
JODNPEB
t&MWJSVT7*&3/&4CPSSBMPT
QSPHSBNBTVUJMJ[BEPTFOEJDIP
EBBGFDUBOEPFYDMVTJWBNFOUF
BMPTBSDIJWPTFKFDVUBCMFT
t( FOFSJD #BDLEPPS
QFSNJ
UF B MPT JOUSVTPT BDDFEFS EF
NBOFSBSFNPUBBMPSEFOBEPS
BGFDUBEP
QPSMPRVFDPNQSP
NFUFMBDPOGJEFODJBMJEBEEFMB
JOGPSNBDJOBMNBDFOBEBFOFM
FRVJQP
t4 BTTFS
FT VO HVTBOP RVF
BQSPWFDIBOEPVOBWVMOFSBCJ
MJEBEEF8JOEPXT
BQBHBCB
FMFRVJQP
t&ML $MPOFS
QSPHSBNBEP QPS
3JDI 4LSFOUB B MPT RVJODF
BPTEFFEBE
FTDPOTJEFSB
EPFMQSJNFSWJSVTEFTBSSPMMB
EP Z FYQBOEJEP QPS MB SFE
"GFDUBCB B MPT FRVJQPT DPO
TJTUFNBT."$JOTUBMBEP
139
8448171373_SI_05.indd 139
16/04/10 11:49
4FHVSJEBEBDUJWBFOFMTJTUFNB
Caso prctico 12
Configurar el anlisis en busca de virus y otras amenazas
del Antivirus Panda
$PNPIFNPTDPNFOUBEPBOUFSJPSNFOUF
MPTBOUJWJSVTSBMFO
UJ[BOFMBSSBORVFEFMPTFRVJQPTEFCJEPBMBOMJTJTFOCVT
DBEFNBMXBSFRVFSFBMJ[BOFODBEBVOPEFMPTBSSBORVFT
2. &OFMNBSDPEFSFDIPEFMB'JHVSBIBDFNPTDMJDFO
Programar la ejecucin de anlisis. "QBSFDFVOBOVFWB
WFOUBOB 'JH
FOMBRVFTFOPTNVFTUSBOEPTCPUP
OFTFMQSJNFSPEFFMMPTQFSNJUFHFOFSBSVOOVFWPBOMJ
TJTZFMTFHVOEPQFSNJUFNPEJGJDBSMBDPOGJHVSBDJOEFM
BOMJTJTQSPHSBNBEP&OOVFTUSPDBTPRVFSFNPTNPEJGJ
DBSMBQFSJPEJDJEBEEFMBOMJTJT
QPSMPEFCFNPTIBDFS
DMJDFOFMCPUOConfigurar anlisis
1PSFMMPWBNPTBDBNCJBSMBDPOGJHVSBDJOEFMBOMJTJTQBSB
RVFOPTFSFBMJDFFOUPEPTMPTBSSBORVFTTJOPTMPMPTWJFS
OFT
1. 6OB WF[ BSSBODBEP FM BOUJWJSVT EFCFNPT IBDFS DMJD
TPCSFMBQFTUBBAnalizar 'JH
3. &OMBTJHVJFOUFQBOUBMMB 'JH
IBDFNPTDMJDTPCSF
FMCPUOPlanificacin.
4. "QBSFDFVOBOVFWBWFOUBOBFOMBRVFQPEFNPTEFGJOJS
DVOEPRVFSFNPTRVFTFIBHBFMBOMJTJT$PNPRVFSF
NPTRVFTFSFBMJDFUPEPTMPTWJFSOFTEFCFNPTIBDFSDMJD
TPCSFMBMUJNBPQDJO
TFMFDDJPOBOEPFOFMEFTQMFHB
CMFFMEB FOOVFTUSPDBTP7JFSOFT
FOFMRVFRVFSFNPT
RVFTFIBHBMBDPNQSPCBDJO 'JH
140
8448171373_SI_05.indd 140
06/04/10 11:08
4FHVSJEBEBDUJWBFOFMTJTUFNB
Vocabulario
Zombie. 0SEFOBEPS FO FM RVF
VO IBDLFS EF TPNCSFSP OFHSP
IBDPOTFHVJEPJOTUBMBSTPGUXBSF
NBMJDJPTP QBSB IBDFSTF DPO FM
DPOUSPMEFMNJTNP
Spam.5BNCJODPOPDJEPDPNP
DPSSFPCBTVSB$PSSFPIBCJUVBM
NFOUFEFQVCMJDJEBERVFOPIB
TJEPTPMJDJUBEP
o-BNBZPSBEFMPTBUBRVFTEFEFOFHBDJOEFTFSWJDJPTTPOSFBMJ[BEPTBMVOTPOP
EFTEFNMUJQMFTNRVJOBTRVFIBOTJEPDPOWFSUJEBTFO[PNCJFTQPSDSBDLFSTEF
MBSFE
MMBNOEPTFFOFTUFDBTP%%P4
BUBRVFEF%FOFHBDJOEF4FSWJDJP%JTUSJ
CVJEP
o1JOH EF MB NVFSUF
DPOTJTUF FO FOWJBS NVMUJUVE EF QJOHT B VO PSEFOBEPS DPO VO
UBNBPEFCZUFTNVZHSBOEF
MPRVFCMPRVFBCBMBTDPOFYJPOFTFOMPTBOUJHVPT
TJTUFNBTPQFSBUJWPTFOMPTBDUVBMFTFTUFUJQPEFBUBRVFFTUTVCTBOBEPZQPSUBOUP
TFQVFEFDPOTJEFSBSDPNPIJTUPSJB
t Inundacin de peticiones SYN: NTDPOPDJEPQPS4:/'MPPE
DPOTJTUFFOIBDFSVOB
QFUJDJOEFFTUBCMFDJNJFOUPEFDPOFYJOBVOTFSWJEPSZOPSFTQPOEFSBTVBDFQ
UBDJOEFDPOFYJO
CJFOTFBQPSRVFTFGBMTFFMQBRVFUFEFQFUJDJODPOVOB*1
GBMTBPQPSBMHVOBPUSBDBVTB&TUFUJQPEFBUBRVFQSPWPDBVOBTBUVSBDJOFOMBT
DPOFYJPOFTBCJFSUBTEFMTFSWJEPS
EFUBMGPSNBRVFTJFTUBTTPONVZFMFWBEBTQVFEFO
MMFHBSBQSPEVDJSVODPMBQTPEFMTFSWJDJPPGSFDJEPDPOMBDPOTJHVJFOUFEFOFHBDJO
EFTFSWJDJP.FEJBOUFFMTJNQMFVTPEFMDPNBOEPnetstat DPNBOEPRVFOPTQFS
NJUFWFSFMFTUBEPEFMBTDPOFYJPOFT
TFQVFEFWFSTJFTUBNPTTJFOEPWDUJNBTEFVO
BUBRVFEFFTUFUJQPZQBSBDPNCBUJSMPTFSFDPNJFOEBFMVTPEFGJMUSPTFOMPTSPVUFST
RVFQBSFOFMUSGJDPEF*1RVFQVFEBOTFSGBMTFBEBT
t Dialers: UBNCJODPOPDJEPTDPNPNBSDBEPSFTUFMFGOJDPT
TFIJDJFSPONVZGBNPTPT
B QSJODJQJPT EF MPT BPT OPWFOUB DVBOEP MB NBZPSB EF MB HFOUF TF DPOFDUBCB B
*OUFSOFUNFEJBOUFNEFN
4POQSPHSBNBTEFDPOFYJOB*OUFSOFUNFEJBOUFNEFN
RVFSFBMJ[BOVOBMMBNBEB
B VO UFMGPOP DPO UBSJGJDBDJO FTQFDJBM
DPNP BRVFMMPT RVF FNQF[BCBO QPS
&TUPTQSPHSBNBTBDUVBCBOTJOMBJOUFSWFODJOZTJOFMDPOTFOUJNJFOUPEFMVTVBSJPQSP
WPDBOEPVOBGBDUVSBUFMFGOJDBEFTPSCJUBEB)PZFOEBDPOMBTDPOFYJPOFT"%4-
MPTEJBMFSTDBTJIBOEFTBQBSFDJEPFOMBNBZPSBEFMPTIPHBSFT
t Ingeniera social: FT VO BUBRVF RVF BGFDUB BM PCKFUJWP EF DPOGJEFODJBMJEBE EF MB
TFHVSJEBEJOGPSNUJDB&TUBUDOJDBDPOTJTUFFOPCUFOFSJOGPSNBDJOTFDSFUBEFVOB
QFSTPOBVPSHBOJTNPQBSBVUJMJ[BSMBQPTUFSJPSNFOUFDPOGJOFTNBMJDJPTPT)BCJUVBM
NFOUF MPT JOHFOJFSPT TPDJBMFT VUJMJ[BO FM DPSSFP FMFDUSOJDP
QHJOBT 8FCT GBMTBT
FMDPSSFPPSEJOBSJPPFMUFMGPOPQBSBMMFWBSBDBCPTVTQMBOFT-PTFKFNQMPTNT
MMBNBUJWPTEFFTUPTBUBRVFTTPOFMQIJTJOHZFMVTPEFVOBNRVJOBBUBDBEBQBSB
MBFOWPEFTQBN
141
8448171373_SI_05.indd 141
06/04/10 11:08
4FHVSJEBEBDUJWBFOFMTJTUFNB
t Phishing: FT VOB UDOJDB EF FOHBP BM VTVBSJP
RVF JOUFOUB BERVJSJS JOGPSNBDJO
DPOGJEFODJBMEFMNJTNPTVQMBOUBOEPMBJEFOUJEBEEFPUSBTQFSTPOBT
PSHBOJTNPTP
QHJOBT8&#EF*OUFSOFU6OPEFMPTNUPEPTEF1IJTIJOHNTVUJMJ[BEPTIPZFO
EBDPOTJTUFFODPMHBSFO*OUFSOFUVOBQHJOBRVFFTDPQJBJEOUJDBEFBMHVOBPUSB
DPNPQVFEFTFSMBEFBMHVOBFOUJEBEGJOBODJFSBPCBODP
Actividades
10. &MOBWFHBEPS*OUFSOFU&Y
QMPSFSBQBSUJSEFMBWFS
TJO JODMVZF MB GVODJP
OBMJEBEfiltro de suplantacin de identidad.
1BSB DPOGJHVSBSMP EFCF
NPTBDDFEFSBMBTOpciones avanzadasEFMNFO
EFHerramientas (Opciones de Internet).
&OMBGJDIBEF Opciones
avanzadas QPESFNPTBDUJ
WBSMBDPNQSPCBDJOBVUP
NUJDBEFTJUJPTXFCFOFM
BQBSUBEP EF TFHVSJEBE
%F FTUB NBOFSB TJFNQSF
RVF BDDFEBNPT B VOB
QHJOB DPNQSPCBS TV
BVUFOUJDJEBE JONFEJBUB
NFOUF
&MFOHBPDPOTJTUFFORVFTJBMHVJFODPOGVOEFFTUBQHJOBGBMTBDPOMBPSJHJOBM
FJOUSPEVDFFOFMMBTVTEBUPTQFSTPOBMFTDPNPQVFEBOTFSFMONFSPEFUBSKFUB
PFM1*/EFMBNJTNB
FTUPTONFSPTTFMFTNBOEBEJSFDUBNFOUFBMPTDSFBEPSFT
EFMBFTUBGB
RVFDPOTJHVFOBTUFOFSFOTVQPEFSJOGPSNBDJORVFQVFEFDPN
QSPNFUFSOPT
-BNBOFSBEFOPDBFSFOFTUBTFTUBGBTFTUFOFSFODVFOUBRVFOVODBMPTCBODPTOJ
PSHBOJTNPTPGJDJBMFTQJEFOBUSBWTEFDPSSFPTFMFDUSOJDPTEBUPTDPOGJEFODJBMFT
5BNCJOEFCFNPTNJSBSDPODBVUFMBMBTEJSFDDJPOFT63-EFMBTQHJOBTWJTJUBEBT
QVFTTVDFEFBNFOVEPRVFTJMBEJSFDDJOSFBMFTQPSFKFNQMPXXXNJCBODBFT
MBEJSFDDJORVFVUJMJ[BOFTUFUJQPEFEFMJODVFOUFTQBSBEJTFDDJPOBSMBQHJOBTFS
BMHPBTDPNPXXXNJCBODPFTPXXXNJTCBODBFT&TEFDJS
MB63-UJFOFVOB
QFRVFBEJGFSFODJBRVFBQSJNFSBWJTUBOPTFOPUBSQFSPRVFPCMJHBUPSJBNFOUF
IBEFUFOFS
)BTUBIBDFQPDPUJFNQP
FTUFUJQPEFBUBRVFTTPMPBGFDUBCBBFOUJEBEFTGJOBODJFSBT
QFSPBDUVBMNFOUFFTUPTBUBRVFTIBOBGFDUBEPBPUSPTPSHBOJTNPT
DPNPFM*/&.
$NBSBTEF$PNFSDJPTEFEJGFSFOUFTDJVEBEFTZMUJNBNFOUFBMB"HFODJB5SJCVUBSJB
'JH
&OFTUFMUJNPDBTP
FMBUBRVFDPOTJTUFFOMBSFNJTJOEFVODPSSFPFMFDUSOJDPRVF
JOGPSNB RVF FM SFDFQUPS EFM NFOTBKF UJFOF EFSFDIP B VO SFFNCPMTP EF JNQVFTUPT
JOFYJTUFOUFT1FSPQBSBQPEFSEJTQPOFSEFMEJOFSP
FMSFDFQUPSEFCFFOWJBSMPTONF
SPTEFDVFOUBTCBODBSJBTZUBSKFUBTEFDSEJUP
8448171373_SI_05.indd 142
06/04/10 11:08
4FHVSJEBEBDUJWBFOFMTJTUFNB
Comprueba t u aprendizaje
Aplicar mecanismos de seguridad activa describiendo sus
caractersticas y relacionndolas con las necesidades de
uso del sistema informtico
6. &OVOQFRVFPDPMFHJPFTOFDFTBSJPRVFMPTBMVNOPT
DPNQBSUBOMPTFRVJQPTEFVOBVMBEFJOGPSNUJDB-PT
QFSGJMFTEFMPTBMVNOPTRVFDPNQBSUFOFMBVMBTPO
1. &ONVMUJUVEEFOPUJDJBTQPEFNPTMFFSRVFFMEFTQFDIP
EFMPTFNQMFBEPTEJTQBSBFMSPCPEFJOGPSNBDJOFOMBT
FNQSFTBT&MEFMBTVTUSBDDJOEFJOGPSNBDJOTF
QSPEVDFBUSBWTEFMBTNFNPSJBTFYUFSOBT64#1BSB
FWJUBSEJDIPTSPCPTQPEFNPTEFTIBCJMJUBSFTUPTBUSBWT
EFMB#*04
"DDFEF B MB #*04 Z EFTBDUJWB MPT EJTQPTJUJWPT 64#
0USBGPSNBEFQSPUFHFSOPTDPOUSBEJDIPTSPCPTFTEFT
BDUJWBOEPEJDIPTEJTQPTJUJWPT64#BUSBWTEFMTJTUFNB
PQFSBUJWP&OVNFSBMPTQBTPTRVFIBTSFBMJ[BEPQBSB
EFTBDUJWBSEJDIPTEJTQPTJUJWPTBUSBWTEFM4JTUFNB0QF
SBUJWP
2. 4QPPG(VBSEFTVOBIFSSBNJFOUBRVFOPTBZVEBBEJT
DFSOJSTJFTUBNPTTJFOEPWDUJNBTEFVOBUBRVFNBMJO
UFODJPOBEP EF TQPPGJOH P EF QIJTJOH &TUB BQMJDB
DJOBBEFVOTFNGPSPFOMBCBSSBEFIFSSBNJFOUBT
EFM OBWFHBEPS RVF OPT JOEJDB MB QFMJHSPTJEBE EF MB
QHJOB
%FTDBSHB FM QSPHSBNB EF MB QHJOB http://crypto.
stanford.edu/SpoofGuard/,JOTUMBMPZDPNQSVFCBRVF
EFQFOEJFOEPEFMBMV[EFMTFNGPSPMBQHJOBRVFWJTJ
UBTOPIBTJEPBUBDBEBPQPSFMDPOUSBSJPFTVOBQPTJ
CMFQHJOBXFCGSBVEVMFOUB
3. .PEJGJDB FM GJDIFSP EF DPOGJHVSBDJO EFM HFTUPS EF
BSSBORVF (36#
menu.lst, QBSB RVF CMPRVFF FM
BSSBORVFEFMUFTUEFNFNPSJB
*OEJDBMPTQBTPTRVFIBTSFBMJ[BEPQBSBBMDBO[BSFM
PCKFUJWP
4. %FTDBSHB MB EFNP EF MB BQMJDBDJO #JPQBTTXPSE EF
http://smartadvisors.net/biopassword/demo.php, JOT
UMBMB
DPOGJHSBMBZDPNQSVFCBRVFTJFTDSJCFPUSBQFS
TPOBEJGFSFOUFBMBRVFIBSFBMJ[BEPFMNEVMPEFJOT
DSJQDJOMPSFDPOPDFZQSPEVDFVOFSSPSEJDJFOEPRVF
UVGPSNBEFFTDSJCJSOPTFDPSSFTQPOEFDPOFMQBUSO
SFHJTUSBEP
5. %FTDBSHBFMBOUJWJSVT"7(EFhttp://free.avg.com/,JOT
UMBMPZIB[VOBDPNQSPCBDJOEFMFTUBEPEFUVTEJTQP
TJUJWPTEFBMNBDFOBNJFOUP
Asegurar la privacidad de la informacin transmitida en
redes informticas describiendo vulnerabilidades e instalando software especfico
t "
MVNOPTEFHFTUJOBENJOJTUSBUJWB&TUPTVUJMJ[BOMPT
FRVJQPTQBSBBQSFOEFSNFDBOPHSBGBZFMQBRVFUF
PGJNUJDPEF.JDSPTPGU
t "
MVNOPTEFDPOTUSVDDJORVFVUJMJ[BO"VUPDBEQBSB
MBSFBMJ[BDJOEFQMBOPTZ13&450QBSBFMDMDVMP
EFQSFTVQVFTUPT
t "
MVNOPTEFVODVSTPEF+"7"
MPTDVBMFTVUJMJ[BOVO
DPNQJMBEPSEFEJDIPQSPHSBNB
4FIBPCTFSWBEPRVFMPTBMVNOPTEFMDVSTPEF+"7"
TFEFEJDBOBJOTUBMBSKVFHPTFOMPTFRVJQPTEFNBOFSB
JOEJTDSJNJOBEB
QPSMPRVFTFFTUOWJFOEPQFSKVEJDB
EPTTVTDPNQBFSPT
{$NPQPEFNPTTPMWFOUBSMBTJUVBDJO {2VNFEJEBT
UPNBSBT
7. &TUBBDUJWJEBETFEFCFSSFBMJ[BSFOHSVQP%FTDBSHB
EFMBQHJOBXFChttp://www.effetech.com/download/
FMQSPHSBNB.4/TOJGGFSFJOTUMBMPFOVOPEFMPTFRVJ
QPTEFMBSFE
0USPTEPTDPNQBFSPTEFCFOIBDFSVTPEFM.FTTFOHFS
NBOUFOJFOEPVOBDPOWFSTBDJOFOUSFFMMPT
{1VFEFT WFS MB DPOWFSTBDJO NBOUFOJEB EFTEF UV
FRVJQP
&ODBTPEFRVFMBSFTQVFTUBTFBOFHBUJWB{1PSRVOP
QVFEFTWJTVBMJ[BSMB {$NPQPESBTMMFHBSBWJTVBMJ[BS
MBDPOWFSTBDJO
8. %FTDBSHB &GGF5FDI )551 4OJGGFS EF MB QHJOB 8FC
http://www.effetech.com/download/FJOTUMBMPFOVOP
EFMPTFRVJQPTEFMBSFE
0USPDPNQBFSPEFCFWJTJUBSEJTUJOUBTQHJOBT8FC
{1VFEFTWFSMBTQHJOBTRVFWJTJUBUVDPNQBFSP &O
DBTPEFRVFMBSFTQVFTUBTFBOFHBUJWB
{QPSRVOP
QVFEFTWJTVBMJ[BSMBT {$NPQPESBTMMFHBSBWJTVBMJ[BS
MBTQHJOBTRVFWJTJUBUVDPNQBFSP
9. $BQUVSBMBTDPOUSBTFBTEFJOJDJPEFTFTJOEFPUSPT
VTVBSJPTEFUVSFEZFOWBMBTBMDSBDLFBEPSEFDPOUSBTF
BTQBSBNTUBSEFJOUFOUBSBWFSJHVBSMBT
{2VNUPEPVUJMJ[BTQBSBBWFSJHVBSMBT {'VFS[BCSVUB
EJDDJPOBSJPP3BJOCPXUBCMFT
143
8448171373_SI_05.indd 143
06/04/10 11:08
4FHVSJEBEBDUJWBFOFMTJTUFNB
Snt esis
&WJUBSBDDFTPB#*04
4FHVSJEBEFOFMBDDFTP
BMPSEFOBEPS
1SPUFHFSFMHFTUPS
EFBSSBORVF(36#
$JGSBEPEFMBTQBSUJDJPOFT
$VPUBTEFEJTDP
Seguridad activa en el sistema
1PMUJDBTEFDPOUSBTFBT
"VUFOUJDBDJOEFMPTVTVBSJPT
4JTUFNBTCJPNUSJDPT
-JTUBTEFDPOUSPMEFBDDFTP
.POJUPSJ[BDJOEFMTJTUFNB
5JQPTEFBUBDBOUFT
5JQPTEFBUBRVFT
4PGUXBSFQBSBFWJUBSBUBRVFT
144
8448171373_SI_05.indd 144
06/04/10 11:08