Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 42

EMD NATIONAL COLLEGE

“Marshal Francisco Solano López”

FRONT PAGE

ISSUE:

“KNOWLEDGE ABOUT CYBERSECURITY”

(Research work to opt for the Technical Bachelor's Degree with


emphasis on Computer Science)

AUTHORS:

Aida Noemi Areco Achar

Diego Cabllero Romero

Juan Pablo Rodríguez Fernandez

Caaguazú - Paraguay

YEAR: 2022

1
MINISTRY OF EDUCATION AND SCIENCES

EMD NATIONAL COLLEGE

“Marshal Francisco Solano López”

“KNOWLEDGE ABOUT CYBERSECURITY”

(Research Work to opt for the Technical Baccalaureate Degree in


Computer Science)

SUB COVER

AUTHORS:

Aída Noemi Areco Achar

Diego Caballero Romero

Juan Pablo Rodríguez Fernandez

TUTOR:

Eng. Ruben David Mercado Pavón

Caaguazú - Paraguay

Year 2022

2
MINISTRY OF EDUCATION AND CULTURE

EMD NATIONAL COLLEGE

“Marshal Francisco Solano López”

EVALUATION SHEET

EXAMINATION TABLE

…………………………………………

PRESIDENT

……………………………… …………………………………

Members Members

Qualification ………(……………….) Aída Noemi Areco Achar

Qualification ………(…………….) Diego Cabllero Romero

Qualification ………(…………….) Juan Pablo Rodríguez Fernandez

Date :………/………/………

3
DEDICATION

This work is directed to my parents, for having been my greatest pillars


throughout these years of sacrifice. To my friends who were accompanying us
through this very complicated stage, who were providing us with information to
solve our issue.

4
GRATITUDE

 God, for giving me health and wisdom to be able to do this project.

 To my parents for supporting me in this new challenge that this work


represents for me.

 The trainers and directors of the institution for the support and education
they constantly provide me.

To my family who always give me their unconditional support during this


time.

5
INDEX

6
INTRODUCTION

This work has been prepared. The most original approach to the
issue of cybersecurity by doctrine has occurred from the point of view of
collective security. In this context, there is consensus on the application,
difficult in any case, of the basic rules relating to the prohibition of the threat
and use of force already existing in the international order. However,
cybersecurity is a problematic issue that poses various challenges from
other legal-international aspects. After some legal clarifications on
cyberspace, this work aims to analyze cybersecurity from that more holistic
approach, focusing on the efforts that have been developed so far for
greater cooperation in this sector.

1
CHAPTER I

PROBLEM
FRAMEWORK

2
PROBLEM STATEMENT

Cybersecurity is a problem that involves governments, companies


and citizens.

The dependence that all social and economic sectors have on


information and telecommunications infrastructure has grown
extraordinarily, becoming complex and difficult to manage.

That is why it is essential to have an adequate framework to have a


rapid, orderly and effective response to incidents in which any of the
dimensions of information security (confidentiality, integrity or availability)
are compromised.

3
GENERAL OBJECTIVE

 Determine to what extent cybersecurity is known by students

SPECIFIC OBJECTIVES

 Identify the main threats when using virtual spaces


 Apply a survey to students to obtain information about cybersecurity
 Analyze the survey carried out on students about cybersecurity.

4
RESEARCH QUESTIONS

SPECIFIC QUESTIONS

 How could possible threats be identified when using virtual spaces?


 How could information be obtained about students' knowledge of
cybersecurity?
 How could the level of knowledge of students about cybersecurity be
determined?

5
THEORETIC
AL
FRAMEWOR
K

6
CHAPTER I

1. Cybersecurity
1.1. Concept

Cybersecurity is the practice of protecting systems, networks, and programs from


digital attacks. Typically, these cyberattacks aim to access, modify or destroy sensitive
information; Extort money from users or users or disrupt business continuity.

A successful cybersecurity approach has multiple layers of protection spread across


the computers, networks, programs or data one intends to keep safe. In an organization,
people, processes and technology must complement each other to create an effective
defense against cyber attacks. A unified threat management system can automate

7
integrations between select Cisco security products and accelerate key security operations
functions: detection, investigation and remediation.

Users should understand and adhere to basic data security principles, such as
choosing strong passwords, being cautious with email attachments, and backing up data.
Learn more about cybersecurity basics .

In today's connected world, everyone benefits from advanced cyber defense


programs. At an individual level, a cybersecurity attack can result in everything from
identity theft to extortion attempts and the loss of important data, such as family photos.
Everyone relies on critical infrastructure, such as power plants, hospitals, and financial
services companies. Protecting these and other organizations is essential for the
functioning of society.

1.2. History

The evolution of cybersecurity provides a broader context of what the


transformation to the digital world was like and the risks that arose with this change. The
first hacker in history was Nevil Maskelyne. In 1903, he intercepted the first wireless
telegraph transmission, showing the vulnerabilities of this system developed by Marcon.
John Draper was the first cybercriminal, better known as “Captain Crunch.”
Draper discovered that the sound emitted by a whistle that was given away in “Cap'n
Crunch” cereal boxes could fool the telephone exchange signal and thus be able to make
free calls.
In the 70s the first malware in history appeared: Creeper , a program that
replicated itself. This malware displayed the message “I'm a creeper, catch me if you can!”
From there, the first antivirus called Reaper was born, whose function was to eliminate
Creeper infections.
With the passing of the years and technological advances, network information
was increasing, and with it, its value and importance for both organizations and
cybercriminals.

8
Malware increased its presence in the 80s and at the same time more efficient
antiviruses were developed. Currently, an endpoint detection and response (EDR) platform
is used to protect computers from a malware attack due to its great evolution.
At the end of this decade, Kevin Mitnick used social engineering to gain access to
personal and confidential information; This type of cyberattack, which began to be more
widely used at that time, continues to be one of the most popular methods to violate a
company's assets; however, it can be prevented and reduced with a good strategy,
employee training and security protocols. security awareness.
The regulation of the Internet is an enormous challenge due to its international
nature and the variety of its content. In the early 90s, the need to confront cyber attacks
became a topic of international discussion; the lack of knowledge about cyberspace,
security measures, jurisdiction and competition mainly affected developed countries,
where the use of Technology and user abuse affected the economy and society.
The first actions to create legal mechanisms against cybercrimes were local. In
1986, the Computer Fraud and Abuse Act was created in the United States, however, its
capacity was surpassed by technological transformation.
In 1995, a committee of cybercrime experts was formed in Europe to work on
strategies to counter attacks over the Internet. Convinced of the need to apply a criminal
policy to protect society against cybercrime and the importance of strengthening
international cooperation, in 2001 the Budapest Convention was approved and signed,
which today is made up of 56 countries.

1.3. Classification

 Hardware cybersecurity

Hardware cybersecurity is that modality that seeks to protect the integrity of the
physical support of a computer system. Hardware is the set of physical elements and
devices that represent the components or accessories of a computer. Said simply but
clearly, it is everything that you can see and touch on a computer, mobile phone, console,
tablet, etc.

Thus, computer hardware security is that which is intended to guarantee the


protection of physical equipment from a perspective of the well-being of the machine itself
through security modules, encryption, authentication, etc.

9
Software cybersecurity

Software cybersecurity is that modality that seeks to protect the integrity of the operational
support of a computer system. Software is the set of programs and collection of codes that
serve as instructions for the computer to execute its functions. Said simply but clearly, it is
everything that you cannot see or touch but that represents the “mind” of the computer,

Thus, computer software security is that which is intended to guarantee the protection of
the operating system and the programs within it, being key to protecting data, preventing
access to confidential information and guaranteeing the correct functioning of the
applications.

Network cybersecurity

Network cybersecurity is that modality that seeks to protect the integrity of the information
during the processes of issuing and receiving it between different computer systems,
preventing it from being intercepted and decrypted by a third person along the way. Thus,
computer network security is one that does not protect the hardware or software of a
system, but rather the information itself while it is transmitted between units.

Personal cybersecurity

Personal cybersecurity is that which is applied to an individual user in a private


environment. Thus, computer security guidelines affect a particular device user, with a
computer equipment having a single owner, that person. With respect to the corporate one
that we will now see, it is the most massive, since in the world there are more than 7,000
million smartphones and about 2,000 million personal computers.

Corporate cybersecurity

Corporate cybersecurity is that which is applied to a company in a business environment. It


is a more dangerous terrain, since failures in security systems do not only affect a user, but
the company itself and its potential clients and suppliers. This, along with the fact that
there is increased interest from cybercriminals, makes it essential that, especially the
largest ones, there are cybersecurity experts protecting the data of these corporations.

National cybersecurity

National cybersecurity is that which is applied to the computer systems that are part of a
State's network. Thus, we are not dealing with an individual or a company, but with the
entire computer network of a country. Therefore, strategies must be implemented that
protect all confidential data of the State, since a cyber attack can represent a serious crisis
for the nation.

Active cybersecurity

10
By active cybersecurity we understand all those protection strategies that are activated
when the defenses of a computer system have been attacked. An attack has occurred since
a hacker has managed to circumvent the defenses, so strategies must be initiated to combat
this cyberattack and protect or, in the worst case, recover the information that has been
stolen.

Passive cybersecurity

By passive cybersecurity, on the other hand, we understand all those protection strategies
that prevent cyber attacks. They are always active, forming solid defenses that prevent
computer attacks from occurring, anticipating these threats before they occur and
generating walls that must have the smallest possible gaps.

Physical cybersecurity

Physical cybersecurity is computer security closely related to hardware security that is


based on analog system protection. That is, it is a traditional and rudimentary security that
consists of keeping physical elements away from any physical danger related to
environmental damage such as fire, water, dust and, ultimately, any external agent that
may compromise functionality. of the device.

Logical Cybersecurity

On the other hand, logical cybersecurity is any form of security that cannot be carried out
analogically, since it involves all those active and passive cybersecurity tasks that we have
been analyzing and that were related to the protection of the software and the data and
information contained therein. in computer programs.

11
CHAPTER II

2. INTERNET

2.1 Concept

Internet is a neologism from English that means decentralized computer network


of global reach . It is a system of networks interconnected through different protocols that
offers a great diversity of services and resources, such as, for example, access to hypertext
files through the web.
Internet is an Anglicism that is formed by the abbreviation of the term International
Network of Computers , which in Spanish could be translated as 'International Computer
Network' , or also as 'Network of networks'.
In Spanish, the word internet is considered a proper noun. The Royal Spanish
Academy (RAE), in its dictionary, allows it to be written with or without an initial capital
letter. Hence, it is preferably used without an article, although if used, the feminine use (la)
is recommended, since the equivalent name in Spanish would be 'red', which is feminine.
There are two versions about the beginning of the internet. The most popular
points out its creation as a response from the US Department of Defense, who in the 60s
were looking for a way in which all the computers used within the organization would
work on a network, even if one of the computers suffered a failure. due to an enemy attack.
However, another less widespread version indicates that at that same time, at the
Information Processing Technologies Office (IPTO), a man named Robert Taylor (who
was making his debut as director of the office) had the idea of generating a system that
would allow researchers to share resources through the use of links.

12
2.2 History

The history of the Internet dates back to the development of communication


networks . The idea of a computer network created to allow general communication
between users of multiple computers is both technological developments and the fusion of
already existing network infrastructure and telecommunications systems. The first
documented description of the social interactions that could be fostered through
networking is contained in a series of memos written by J. c. R. Licklider , of the
Massachusetts Institute of Technology , in August 1962, in which Licklider discusses his
concept of the Galactic Network.

2.3 Tools

 Canva. It is an excellent tool to start designing in an accessible and simple way.


 Google Analytics.
 WordPress.
 SharePoint.
 Google Meet and Teams.
 Zoom.
 WeTransfer.
 Google Drive.

13
CHAPTER III

3. SOCIAL NETWORKS
3.1 Concept

Social networks are communities formed by different users and organizations that
interact with each other on Internet platforms.

On social networks such as Facebook, Twitter, Google +, Linkedin, Instagram or


TikTok you can form groups and share information and multimedia elements such as
images or videos. This, according to the interests of the users
Each social network has its own objectives and uses, and the content must be
adapted to each of them.
For example, Facebook is a very useful social network to contact friends, meet people with
the same interests and create company pages. The latter, to improve branding and
positioning.
On the other hand, Twitter is a microblogging platform with messages of maximum
150 characters. Thus, this network mainly serves to transmit information and opinions.

3.2 Utility

Some of the functions provided by social networks are of vital importance for
accounts with many followers or for brands. Because thousands of people in the world
highlight that social networks are useful, we will tell you what their main functions are.
 Create or generate new connections
 Maintain personal contacts
 Maintain professional contacts
 To be updated
 Promote products or services of a company or individual

14
 Generate web traffic
 Build an online community

3.3 Types of Networks

There are different types of social networks on the Internet, each type offers specific
services. Below, we mention the most used social networks of each type:

 Facebook : It is the most famous today and exceeds 2 billion active users per
month. In it you can create friends and share content in the form of images, videos
or statuses.
 WhatsApp : Keeps millions of users around the world in touch through mobile
phones with instant messages. Advertising on this platform is booming.
 YouTube : It is the video network par excellence. Companies use it to introduce
their advertising, with YouTubers also being key actors.
 Instagram: One of the most visual networks and most used by users today. You can
share images, stories that can only be viewed for 24 hours, and videos.
 Twitter: It is based on the microblogging format through short messages of 150
characters maximum. It is a social network widely used to stay informed or learn
about certain topics.
 Pinterest: Another visual network that includes photo boards that are shared by
users.
 Linkedin: It is a social network to exchange job offers and connect with
professional contacts.
 TikTok: This social network allows you to share short videos between users.

15
CHAPTER IV

4. Identity theft
4.1 Concept

Identity theft is a malicious activity that consists of impersonating another person for
various reasons: committing some type of fraud, illegally obtaining data, committing
cyberbullying or grooming (gaining the trust of a minor in order to sexually abuse him or
her). . The most typical example of impersonation is creating a fake profile on social
networks to be able to communicate with other people by pretending to be them.
In general, we tend to think that the only people whose identity is impersonated are
famous people, such as politicians or celebrities . This is a misconception, as any identity
of an anonymous user is at risk of being spoofed. The number of people who have reported
identity theft has grown exponentially in recent years.

4.2 Classification

 Interactivity
The main social networks such as Facebook, Twitter, Instagram and Twitter offer different
tools or applications to motivate the user to stay there. Additionally, posts on these
platforms can become interactive through reactions, retweets, likes or comments. As a
consequence, the user has the ability to show whether a publication is to their liking or not.
Which gives importance to your opinion.
 Connectivity
Currently, most social networks allow access to the platform from any mobile device. This
is because new technologies have helped thousands of people to be connected from their
16
cell phones, tablets or computers. For this reason, several social networks have configured
and are constantly updating their versions for mobile devices or PCs.
 Personalization
Social networks allow you to create a profile and configure it according to the user's
preferences. That is, the person can adapt their feed to their tastes and personality.
Likewise, they give the possibility of having direct interaction with other people who have
the same interests.
 Massivity
One characteristic that stands out about social networks is that it is possible to reach all
audiences. The platforms differ by being massive, having thousands of users around the
world. Therefore, the content created is easier to be seen. As a consequence, brands
implement marketing strategies in them.

 Virtual communities
Social networks have become virtual communities that help diversify user information. In
them, communication is a fundamental piece to form groups with similar tastes. Likewise,
it gives the possibility of sharing preferences and opinions on various topics.
 Immediacy
One of the most notable characteristics of social networks is immediacy, since through
these platforms you can obtain news or information in real time. This point is essential for
brands because when the user obtains a response at the moment it can give a good image of
the brand.
 Virality
Social networks facilitate the viralization of content. They are characterized by making the
publications have greater interaction by users, increasing their spread to become viral
publications. This is how a publication becomes relevant and can become news.

17
CHAPTER V

5. MALWARE
5.1 Concept

Malware or “malicious software” is a broad term that describes any


malicious program or code that is harmful to systems.
Hostile, intrusive and intentionally nasty malware attempts to invade,
damage or disable computers, IT systems, networks, tablets and mobile devices,
often taking partial control of a device's operations. Like the flu, it interferes with
normal functioning.
The intention of the malware is to illicitly take money from the user.
Although malware cannot damage systems hardware or network equipment—with
one known exception (see Google's Android section)—it can steal, encrypt or erase
your data, alter or hijack basic computer functions, and spy on your computer
activity without your knowledge or permission.

5.2 History

Given the variety of malware types and the enormous number of variants that roam
freely every day, a complete history of malware would be too long a list to include here.
That said, it's more manageable to take a look at malware trends in recent decades. These
are the main trends in malware development.
1980s : The theoretical foundation for “self-replicating automata” (i.e., viruses) dates back
to a paper published in 1949, and the first viruses infected pre-PC platforms in the 1970s. .
However, the history of modern viruses begins with a program called “Elk Cloner,” which
began infecting Apple II systems in 1982. The virus, which spread via floppy disks, was
harmless on its own, but it spread to all disks connected to a system and exploded with
such virulence that it can be considered the first large-scale computer virus outbreak in
history. Note that this was before any Windows PC malware. Since then, viruses and
worms have only become more widespread.

18
1990s : The Microsoft Windows platform emerged in this decade, along with flexible
macros in its applications, which allowed malware authors to write infectious code in the
macro language of Microsoft Word and other programs. These macro viruses infected
documents and templates, not executable applications, although strictly speaking, macros
in Word documents are a type of executable code.
2002 to 2007 : Instant messaging worms (malicious code that replicates itself across an
instant messaging network) exploit network loopholes on a massive scale and infect AOL
Instant Messaging, MSN Messenger networks and Yahoo Messenger, as well as enterprise
instant messaging systems.
From 2005 to 2009 : Adware attacks proliferated, delivering unwanted advertising to
computer screens, sometimes in the form of a pop-up message or a window that users
could not close. These ads often leveraged legitimate software as a means to spread, but in
2008, software publishers began suing adware companies for fraud. The result was the
payment of millions of dollars in fines. Ultimately, this caused the adware companies to
shut down.
From 2007 to 2009 : Malware scams used social media channels such as MySpace to
distribute dishonest advertising, redirects, and offers of fake antivirus and security tools.
Their schemes were designed to trick users through social engineering tricks. Facebook
and Twitter became their preferred platforms when MySpace's popularity declined. Some
of the common tactics included presenting fake links to phishing pages and promoting
Facebook apps with malicious extensions. As this trend subsided, scammers explored other
means of stealing .
2013 : A new type of malware called ransomware launched an attack under the name
CryptoLocker, which took place from early September 2013 to late May 2014 and targeted
Windows computers. CryptoLocker managed to force its victims to pay around $27 million
in the last quarter of 2013. Furthermore, the success of this ransomware spawned other
ransomware with similar names. Using a copied variant, they pocketed more than $18
million from approximately 1,000 victims between April 2014 and June 2015.
From 2013 to 2017 : Ransomware, distributed through Trojans, exploits, and malvertising,
became the king of malware. The culmination was the large outbreaks of 2017 that
affected companies of all types. Ransomware activity involves encrypting the victim's data
and then demanding payments to release that data.

19
From 2017 to now : Cryptocurrency—and how to mine it—has gained widespread
attention and led to the creation of a new malware scam called “cryptojacking,” which is
the act of secretly using another person's device to surreptitiously mine cryptocurrency.
with the victim's resources.

5.3 Classification

These are the most common bad actors in the gallery of malware dishonesty:

 Adware is unwanted software designed to display advertisements on your screen,


usually in a browser. It usually uses a surreptitious method: either it pretends to be
legitimate, or it attaches itself to another program to trick the user and install itself
on their PC, tablet or mobile device.

 Spyware is malware that observes the user's activities on the computer secretly and
without permission, and reports them to the author of the software.

 A virus is malware that attaches itself to another program and, when executed—
usually without the user's knowledge—it replicates itself by modifying other
programs on the computer and infecting them with its own bits of code.

 Worms are a type of malware similar to viruses, which replicates themselves in


order to spread to other computers on a network, usually causing damage and
destroying data and files.

 A Trojan , or Trojan horse, is one of the most dangerous types of malware. It is


usually presented as something useful to deceive the user. Once on the system,
attackers hiding behind the Trojan gain unauthorized access to the infected
computer. From there, Trojans can be used to steal financial information or install
threats such as viruses and ransomware.

 Ransomware is a type of malware that blocks a user's access to their device or


encrypts their files and then forces them to pay a ransom to get them back.
Ransomware has been recognized as the preferred weapon of cybercriminals
because it demands a quick and profitable payment in cryptocurrency that is

20
difficult to track. The code underlying ransomware is easy to obtain through illegal
online marketplaces and defending against it is very difficult.

 The rootkit is a type of malware that provides the attacker with administrator
privileges on the infected system. It is also typically designed to remain hidden
from the user, other system software, and the operating system itself.

 A keylogger is malware that records all of the user's keystrokes, stores the collected
information, and sends it to the attacker, who searches for sensitive information
such as usernames, passwords, or credit card details.

 Malicious cryptocurrency mining , also known as haphazard mining or


cryptojacking , is an increasingly prevalent malware installed by a Trojan. It allows
other people to use your computer to mine cryptocurrencies such as bitcoin or
monero. Cryptocurrency mining malware uses your computer's resources but sends
the earned coins to their own accounts, not those of the computer owner. Simply
put, a malicious cryptocurrency mining program steals your resources to make
money.

 Exploits are a type of malware that takes advantage of errors and vulnerabilities in
a system so that the creator of the exploit can take control. The exploits are linked
to, among other threats, malvertising , which attacks through a legitimate site that
inadvertently downloads malicious content from a dangerous site. The harmful
content then attempts to install itself on the computer after an inadvertent
download. You don't even need to click. All you have to do is visit a good site on
the wrong day.

21
CHAPTER VI

6. INTELLIGENCE AND CYBER DEFENSE

6.1 Concept

It has been proposed to start the process of Cyber Defense through Computer
Intelligence with Cyberspace as an environment, in order to obtain the descriptor
elements that make up the identification of the scenarios and at the same time
parameterize the threats, to be able to size the risks and thus enable the design. of
defense instruments.

6.2 GLOBAL SURVEILLANCE

All countries do intelligence.


• Brazil knows perfectly well the risks of its connectivity.
• All those caught are complicit and know the capabilities they denounce.
• Cost of information obtaining processes.
• By Pass of national networks
• Big data access planning.
• Social Engineering and social networks.

6.3 CHARACTERIZATION OF THREATS

22
Threats due to origin The fact of connecting a network to an external environment
gives us the possibility that an attacker can enter it, with this, information can be stolen or
the operation of the network can be altered. However, the fact that the network is not
connected to an external environment, such as the Internet, does not guarantee its security.
According to the Computer Security Institute (CSI) of San Francisco, approximately 60 to
80 percent of network incidents are caused from within the network. Based on the origin of
the attack we can say that there are two types of threats:
External threats
Internal Threats

6.4 EXTERNAL THREATS

They originate outside the local network. By not having accurate information about
the network, an attacker has to take certain steps to know what is on it and find a way to
attack it.
The advantage in this case is that the network administrator can prevent a good part
of external attacks.
To classify it as external it must be exclusively by people outside the network, it
could be due to vulnerabilities that allow access to the network: rosettes, accessible
switches or Hubs, unprotected wireless networks, unattended equipment, etc.

23
CHAPTER VII

7. THE VULNERABILITIES
7.1 Concept

Vulnerability is the risk that a person, system or object may suffer from imminent
dangers , whether natural disasters, economic, political, social or cultural inequalities.
The word vulnerability derives from the Latin vulnerabilis . It is composed of
vulnus , meaning 'wound', and the suffix - abilis , indicating possibility; Therefore,
etymologically, vulnerability indicates a greater probability of being hurt.
Vulnerabilities take different forms, depending on the nature of the object of study, its
causes and consequences. In the face of a natural disaster such as a hurricane, for example,
poverty is a vulnerability factor that leaves victims immobilized without the ability to
respond adequately.
Some synonyms for the word vulnerability are weakness, weakness, susceptibility, risk
and threat.

7.2 PHYSICAL VULNERABILITY

In different periods of history, there are groups of people who have a high level of
vulnerability due to the threat situations and extreme disasters they experience.

In this aspect, many of these people are examples of resilience, that is, the ability to
overcome extreme adversity.

7.3 LOGICAL VULNERABILITY

Logical threats comprise a series of programs that can damage the computer system. And
these programs have been created: intentionally to do harm: malicious software or malware
(malicious software).

24
7.4 TYPES OF VULNERABILITY

 Social vulnerability : defenselessness in the face of threats, risks, traumas and


pressures due to the social conditions presented by the person or group.
 Computer vulnerability : refers to the weak points of a computer system where its
computer security does not have necessary defenses in the event of an attack.
 Environmental vulnerability : endemic species, for example, are vulnerable to
changes in the natural conditions of their habitat, therefore they are at risk of
extinction.
 Economic vulnerability : framed within the social, it is associated with poverty
and the inability to generate more economic resources due to the particular social
situation.
 Food vulnerability : in the event of natural disasters, war, military conflicts or
serious political crises, for example, it may be difficult to find drinking water or
uncontaminated food.
 Physical vulnerability : indicates the vulnerability of the population to structures
not prepared for natural disasters, such as a hurricane or an earthquake.
 Job vulnerability : the instability or precariousness of an individual's job.

25
CHAPTER III

METHODOLOGIC

AL FRAMEWORK

26
III- 1.2. Kind of investigation
 According to its nature: it is mixed type because information from nature is
preferably used. Qualitative, and in its application it does not exclude
information from nature. Quantitative, to complement and enrich the
information provided.
 According to its object: it is a non-experimental research because it only
studies the reality situation of the chosen topic in its natural environment
without conditioning it in any way but rather observing the real situation in
which it is found.
 According to its period and sequence: the research is transversal, because
the variables are studied simultaneously at a certain moment, making a cut
in time, according to the time of occurrence of the facts and research
records, it is a retrospective work because they are recorded the events
that occurred focused on the present, making a description focused on the
reality experienced in the aforementioned educational institution, depending
on the level, it belongs to a descriptive exploratory research.

27
Research Level
Technical Methods:
The methods used are three:
 The Deductive Method : because it started from general theories found in
secondary or bibliographic sources and then confronted with the reality
experienced in the place of research.
 The Analytical Method : because the facts were analyzed in their
constituent parts, that is, their contents from the sources as well as the
results of the application of the techniques and instruments were examined
and a conclusion was reached.
 Synthetic Method : the techniques and instruments used in the research
were: the survey and the analysis of the document with their respective
instruments. The closed-type questionnaire and the bibliography.

28
III-1.3. Design of the investigation
Processing of Collected Data.
Once the data was collected, the processing was carried out through the use of
statistical tools with the support of the computer, we used specific programs, the
frequency table and graphing were formulated, that is, the dispersed, disordered,
individual data were processed. obtained during field work, it has to generate
results (data grouped and generated from which the analysis and interpretation
of the data are carried out according to the objectives or research questions
asked.

Temporal Delimitation
The research is carried out from June to September 2022.

Space
The investigation is carried out in the Centenario neighborhood of this city

Data collection techniques and instruments.


For data collection. Surveys and non-participatory observation were used.

29
CHAPTER IV

RESULTS AND

ANALYSIS

30
Chapter V

Conclusion

31
Conclusion

32
recommendations

33
Bibliography

https://www.significados.com/internet

Cyberdefensa, CIbersecurity (2013) retrieved on 06/27/2022, available at:


https://www.cari.org.ar/pdf/ciberdefensa_riesgos_amenazas.

http://www.cisco.com/c/es_mx/products/security/what-is-cybersecurity.html

http://economipedia.com//definiciones/redes-sociales.html

http://protecciondatos-lopd.com/empresas/suplantacion-de-identidad/

http://es.malwarebytes.com/malware/

http://cari.org.ar/pdf/ciberdefensa-riesgos-amenazas .

http://www.significados.com/vulneribilidad/

34
Exhibit

35
MINISTRY OF EDUCATION AND SCIENCES

MARISCAL FRANCISCO SOLANO LÓPEZ NATIONAL SCHOOL OF


DIVERSIFIED MIDDLE EDUCATION

QUESTIONNAIRE

36

You might also like