Bibliography
[1]
“A.2. Cifrado de llave pública | Guía de seguridad | Red Hat Enterprise Linux | 6 | Red Hat Documentation,” Redhat.com, 2025. https://docs.redhat.com/es/documentation/red_hat_enterprise_linux/6/html/security_guide/apas02 (accessed Aug. 29, 2025).
[2]
Heli Sulbaran, “01 de enero (1983) ARPANET comienza a utilizar el protocolo TCP/IP como estándar,” Blogspot.com, 2017. https://helisulbaran.blogspot.com/2014/01/01-de-enero-1983-arpanet-comienza.html (accessed Aug. 29, 2025).
[3]
admin, “Seguridad en Redes,” Campus Internacional de Ciberseguridad, Nov. 27, 2020. https://www.campusciberseguridad.com/blog/seguridad-en-redes/ (accessed Aug. 29, 2025).
[4]
K. Thompson, “Reflections on Trusting Trust,” 1984. Available: https://www.cs.cmu.edu/~rdriley/487/papers/Thompson_1984_ReflectionsonTrustingTrust.pdf
[5]
“Morris: el primer gusano para computadoras de la historia | ESET,” Eset.com, 2021. https://www.eset.com/latam/blog/cultura-y-seguridad-digital/gusano-morris-un-experimento-costoso/
[6]
GReAT, “1988,” Kaspersky.es, Mar. 26, 2015. https://encyclopedia.kaspersky.es/knowledge/year-1988/
[7]
Red Proydesa, “Los 8 virus más dañinos de la historia,” Proydesa.org, 2025. https://www.proydesa.org/portal/noticias/1285-los-8-virus-mas-daninos-de-la-historia (accessed Aug. 29, 2025).
[8]
“Sangfor Network Secure NGFW: Technologies & Use Cases | Sangfor Product Series,” Sangfor Technologies, 2022. https://www.sangfor.com/es/glossary/cybersecurity/what-is-a-firewall (accessed Aug. 29, 2025).
[9]
Fortinet, “What is PGP Encryption? Pretty Good Privacy Explained,” Fortinet, 2023. https://www.fortinet.com/resources/cyberglossary/pgp-encryption
[10]
D. Osorio, “Cuándo nacen los antivirus,” Scribd, 2025. https://www.scribd.com/document/515096032/Cuando-nacen-los-antivirus (accessed Aug. 29, 2025).
[11]
“¿Qué son los ataques de denegación de servicio (DoS)?,” Palo Alto Networks, 2015. https://www.paloaltonetworks.es/cyberpedia/what-is-a-denial-of-service-attack-dos (accessed Aug. 29, 2025).
[12]
The, “The ILOVEYOU Worm, A Global Crisis,” Purdue.edu, 2024. https://cyber.tap.purdue.edu/blog/articles/the-iloveyou-worm-a-global-crisis/
[13]
J. Lott, “Un tipo diferente de virus - EPC Lat - Spanish,” EPC Lat - Spanish, Jul. 13, 2020. https://epcglobalsolutions.lat/un-tipo-diferente-de-virus/ (accessed Aug. 29, 2025).
[14]
Euskadi.eus, 2021. https://www.euskadi.eus/contenidos/documentacion/ciberpedia_ciberamenaza_3/es_def/ (accessed Aug. 29, 2025).
[15]
“Storm Botnet,” encyclopedia.pub. https://encyclopedia.pub/entry/28904
[16]
“CSDL | IEEE Computer Society,” Computer.org, 2025. https://www.computer.org/csdl/magazine/co/2008/02/mco2008020020/13rRUypp5bk (accessed Aug. 29, 2025).
[17]
Masha, “Las 10 mayores violaciones de datos de todos los tiempos,” Termly, Jan. 07, 2025. https://termly.io/es/recursos/articulos/mayores-filtraciones-de-datos/ (accessed Aug. 29, 2025).
[18]
“Los ciberataques de la década más grandes y dañinos,” Computing, Oct. 03, 2023. https://www.computing.es/seguridad/los-10-ciberataques-mas-grandes-de-la-decada/
[19]
E. Mohn, “Stuxnet | EBSCO,” EBSCO Information Services, Inc. | www.ebsco.com, 2023. https://www.ebsco.com/research-starters/computer-science/stuxnet
[20]
“Noticias Los Expertos Opinan Los Expertos Opinan: ‘Como se produjo el ataque a la cadena de suministro de SolarWinds’, por FireEye,” Ismsforum.es, 2021. https://www.ismsforum.es/noticias/1852/los-expertos-opinan-como-se-produjo-el-ataque-a-la-cadena-de-suministro-de-solarwinds-por-fireeye/ (accessed Aug. 29, 2025).
[21]
NCSC, “Log4j vulnerability - what everyone needs to know,” www.ncsc.gov.uk, Dec. 14, 2021. https://www.ncsc.gov.uk/information/log4j-vulnerability-what-everyone-needs-to-know
[22]
IBM, “Log4Shell,” Ibm.com, Aug. 15, 2023. https://www.ibm.com/think/topics/log4shell
[23]
“What is ransomware-as-a-service (RaaS)?,” Cloudflare.com, 2021. https://www.cloudflare.com/learning/security/ransomware/ransomware-as-a-service/
[24]
Cloudflare, “What Is Web Application Security? | Web Security
| Cloudflare,” Cloudflare. Available: https://www.cloudflare.com/learning/security/what-is-web-application-security/
[25]
K. Baker, “What is Ransomware as a Service (RaaS)? | CrowdStrike,” Crowdstrike.com, Jan. 30, 2023. https://www.crowdstrike.com/en-us/cybersecurity-101/ransomware/ransomware-as-a-service-raas/
[26]
“Riesgos de la IA y la ciberseguridad | Riesgos de la inteligencia artificial,” Malwarebytes, Nov. 2024. https://www.malwarebytes.com/es/cybersecurity/basics/risks-of-ai-in-cyber-security
[27]
“Casos de uso de IoT 5G para empresas | T-Mobile Para Empresas,” T-mobile.com, 2025. https://es.t-mobile.com/business/resources/articles/5g-iot-use-cases-for-business (accessed Aug. 29, 2025).
[28]
“1970s,” encyclopedia.kaspersky.com. https://encyclopedia.kaspersky.com/knowledge/years-1970s/
[29]
“Bell LaPadula Model,” www.cs.unc.edu. https://www.cs.unc.edu/~dewan/242/f96/notes/prot/node13.html