{"id":12444,"date":"2019-03-10T19:10:00","date_gmt":"2019-03-10T18:10:00","guid":{"rendered":"http:\/\/serveiseducatius.xtec.cat\/tarragones\/?p=12444"},"modified":"2019-04-27T08:53:17","modified_gmt":"2019-04-27T06:53:17","slug":"trics13_mroige","status":"publish","type":"post","link":"https:\/\/serveiseducatius.xtec.cat\/tarragones\/dinamitzacio\/trics\/trics13_mroige\/","title":{"rendered":"La ciberseguretat"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-5353\" title=\"Marc Roig\u00e9 Benaiges\" src=\"https:\/\/serveiseducatius.xtec.cat\/tarragones\/wp-content\/uploads\/usu549\/2019\/03\/trics13_mroige.jpg\" alt=\"Marc Roig\u00e9 Benaiges\" width=\"150\" height=\"200\" \/><strong><span style=\"color: #808080;\"><em>T\u00edtol:\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/em><\/span><\/strong><strong>La ciberseguretat: l&#8217;altra cara de la transformaci\u00f3 digital<\/strong><br \/>\n<strong><em><span style=\"color: #808080;\">Autor\/a:\u00a0\u00a0\u00a0\u00a0<\/span><\/em><\/strong><strong> Marc Roig\u00e9 Benaiges<\/strong><br \/>\n<strong><em><span style=\"color: #808080;\">Tutor\/a:\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/span><\/em><\/strong>Joan Teixell Mart\u00ednez<br \/>\n<strong><em><span style=\"color: #808080;\">Modalitat:\u00a0\u00a0<\/span><\/em><\/strong>Ci\u00e8ncies i tecnologia: Cientificot\u00e8cnic<br \/>\n<strong><em><span style=\"color: #808080;\">\u00c0rea:\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/span><\/em><\/strong>Inform\u00e0tica i Disseny<br \/>\n<strong><em><span style=\"color: #808080;\">Centre:\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/span><\/em><\/strong>Ins Fontanelles<br \/>\n<strong><em><span style=\"color: #808080;\">Localitat:\u00a0\u00a0\u00a0<\/span><\/em><\/strong>Les Borges del Camp<\/p>\n<h6><strong>Objectius:<\/strong><\/h6>\n<ol>\n<li>M\u2019he plantejat conscienciar al m\u00e0xim als lectors\/audi\u00e8ncia sobre la perillositat d\u2019Internet i les devastadores conseq\u00fc\u00e8ncies que hi poden tenir lloc si se\u2019n fa un mal \u00fas.<\/li>\n<li>Obtenir i valorar el grau de coneixement inform\u00e0tic exterior a trav\u00e9s d&#8217;enquestes<\/li>\n<li>Mostrar al p\u00fablic tant les estrat\u00e8gies com els camins que un ciberdelinq\u00fcent pot portar a terme per a violar la nostra privacitat<\/li>\n<li>Apendre i compartir amb el p\u00fablic les opinions\/valoracions dels experts entrevistats<\/li>\n<\/ol>\n<h6><strong>El proc\u00e9s:<\/strong><\/h6>\n<p style=\"text-align: justify;\">He realitzat un \u00e0mplia recerca d&#8217;informaci\u00f3 te\u00f2rica amb la finalitat de proporcionar els coneixements necessaris als destinataris per a posteriorment poder entendre el marc aplicat. Justament en el marc pr\u00e0ctic realitzo una s\u00e8rie de pr\u00e0ctiques per a posar a prova Internet i mostrar al p\u00fablic la manera que un ciberdelinq\u00fcent pot arribar a violar la nostra privacitat i integritat a la xarxa. Finalment tamb\u00e9 vull acabar anomenant les dues entrevistes que vaig realitzar a dos experts en la branca de la ciberseguretat i l&#8217;enquesta que va ser resposta per 110 persones.<br \/>\nUna de les dificultats que hem vaig trobar va ser en l&#8217;\u00e0mbit matem\u00e0tic. En alguns punts del treball, espec\u00edficament en la criptografia, m\u2019he trobat en certes complicacions a l\u2019hora d\u2019entendre alguns algoritmes com el de l\u2019RSA o el de AES. Utilitzen mecanismes bastant complexos matem\u00e0ticament i m\u2019he trobat en que tinc una base poc s\u00f2lida d\u2019aquests tipus de coneixements. Tanmateix, he acabat entenent bona part dels algoritmes i el concepte general.<br \/>\nTamb\u00e9 vaig trobar-me en dificultats en la instal\u00b7laci\u00f3 i configuraci\u00f3 d&#8217;un tallafocs<br \/>\nVaig pensar la proposta i em va semblar molt bona idea posar-la en marxa tan aviat com va ser possible per\u00f2 a mesura que em vaig anar endinsant en la preparaci\u00f3 del tallafocs, vaig veure com tot semblava m\u00e9s dif\u00edcil del que em pensava. Primer que tot, vaig tenir problemes a casa per fer passar el tr\u00e0fic de dades per al \u201cfirewall\u201d i quan ho vaig aconseguir vaig voler provar si funcionava a l\u2019institut. Per\u00f2, clar, all\u00ed no tenia el material que jo tenia a casa i em vaig trobar amb un panorama molt diferent. Total, vaig decidir abandonar la idea per por a no poder extreure unes conclusions i em vaig endinsar en la creaci\u00f3 del \u201cransomware\u201d el qual em va tornar a pujar l\u2019estat an\u00edmic i vaig poder treure unes conclusions.<br \/>\nPer acabar, vull mencionar que vaig tindre que passar bastantes hores per a poder compendre amb total claredat llenguatge de programaci\u00f3 python.<br \/>\nDegut a la nul\u00b7la base de programaci\u00f3 que hem donat a l\u2019institut i el poc coneixement que tenia, he vist com alguns aspectes de la programaci\u00f3 del ransomware es complicaven. Tot i aix\u00ed, he pogut posar-me en contacte amb un expert i he acabat solucionant els problemes.<\/p>\n<h6><strong>Conclusions:<\/strong><\/h6>\n<p style=\"text-align: justify;\">Puc treure algunes conclusions interessants que he apr\u00e8s en el marc te\u00f2ric i he aconseguit el meu objectiu d\u2019aprenentatge i desenvolupament d\u2019aquest. Per exemple, m\u2019ha encantat la criptografia. Penso que aquesta ha tingut una import\u00e0ncia indubtable en la hist\u00f2ria de la humanitat a favor de qui l\u2019ha posse\u00eft i ha sigut totalment un repte entendre alguns dels tipus de xifrats moderns que avui en dia encara s\u2019utilitzen en el m\u00f3n tecnol\u00f2gic.<br \/>\nDespr\u00e9s, cal destacar la gran i constant evoluci\u00f3 del malware en general que mai cessa i continua adoptant noves formes i mecanismes per ser m\u00e9s efica\u00e7. \u00c9s el cas del ransomware que hem estudiat en detall durant tot el treball de recerca. Aquests tipus de virus han vingut per a quedar-se ja que en general agraden molt a la comunitat de ciberdelinq\u00fcents per l\u2019elevat benefici que extreuen i tot apunta que tardarem temps en descobrir la manera de reduir-lo definitivament.<br \/>\nFinalment, m\u2019agradaria acabar anomenant el marc pr\u00e0ctic al qual he dedicat moltes hores. Ha sigut una meravella poder dur a terme una simulaci\u00f3 d\u2019explotacions de vulnerabilitats com un cibercriminal ja que crec que he deixat en evid\u00e8ncia les vulnerabilitats m\u00e9s comunes d\u2019Internet i a m\u00e9s a m\u00e9s demostro la perillositat que hi pot tindre lloc quan un ciberdelinq\u00fcent t\u00e9 acc\u00e9s al teu equip. En addici\u00f3, m\u2019ha semblat interessant l\u2019extracci\u00f3 de dades del professor d\u2019angl\u00e8s perqu\u00e8 primerament em pensava que quan es formatejava un dispositiu no es podia recuperar de cap manera. A part d\u2019aix\u00f2, ha sigut molt bonic programar el meu propi ransomware pel simple fet de mostrar als lectors i a l\u2019audi\u00e8ncia el poder que pot tenir aquest si \u00e9s capa\u00e7 de penetrar en un sistema.<br \/>\nEn definitiva, crec que he complert amb el meu objectiu pr\u00e0ctic que em vaig proposar a l\u2019inici del treball: fer que els lectors i sobretot l\u2019audi\u00e8ncia es mirin Internet des d\u2019una altra perspectiva m\u00e9s cautelosa i preventiva.<br \/>\nHe apr\u00e8s tantes coses que probablement no hi cabrien en aquest formulari per\u00f2 les m\u00e9s importants s\u00f3n l&#8217;art d&#8217;apendre a emplear t\u00e8cniques estil\u00edstiques per a que el treball qued\u00e9s curi\u00f3s, millorar en la presentaci\u00f3 oral del projecte, concretar el meu futur, cr\u00e8ixer com a persona, saber fer enquestes i entrevistes, ser ambici\u00f3s i no donar res per perdut, a no llen\u00e7ar mai la tovallola&#8230;<\/p>\n<h6><strong>Bibliografia:<\/strong><\/h6>\n<ul>\n<li>Joan G\u00f3mez Urgell\u00e9s. <span style=\"color: #808080;\"><strong>Matem\u00e1ticos, esp\u00edas y piratas inform\u00e1ticos.<\/strong><\/span>. National Geographic<\/li>\n<li>Gonzalo \u00c1lvarez Mara\u00f1\u00f3n i Pedro P\u00e9rez Garc\u00eda. <span style=\"color: #808080;\"><strong>Seguridad inform\u00e1tica para empresas y particulares<\/strong><\/span>. S.A Mcgraw-Hill\/Interamericana de Espa\u00f1a<\/li>\n<\/ul>\n<h6><strong>Llocs Web:<\/strong><\/h6>\n<ul>\n<li><a href=\"https:\/\/omicrono.elespanol.com\/2017\/12\/por-que-no-debes-pagar-un-ransomware\" target=\"_blank\" rel=\"noopener noreferrer\">Por qu\u00e9 no debes pagar el rescate de un ransomware<\/a><\/li>\n<li><a href=\"https:\/\/gblogs.cisco.com\/es\/2018\/07\/la-evolucion-del-ransomware-que-ocurre-en-espana\/\" target=\"_blank\" rel=\"noopener noreferrer\">La evoluci\u00f3n del Ransomware: \u00bfqu\u00e9 ocurre en Espa\u00f1a?<\/a><\/li>\n<li><a href=\"http:\/\/www.cubadebate.cu\/opinion\/2017\/12\/22\/guerras-ciberneticas-nuevas-formas-de-guerra\/\" target=\"_blank\" rel=\"noopener noreferrer\">Guerras cibern\u00e9ticas: nuevas formas de guerra.<\/a><\/li>\n<li><a href=\"http:\/\/www.prakmatic.com\/seguridad-ti\/tipos-de-analisis-forense-para-tratar-incidentes-de-seguridad\/\" target=\"_blank\" rel=\"noopener noreferrer\">Tipos de an\u00e1lisis forense para tratar incidentes de seguridad.<\/a><\/li>\n<li><a href=\"https:\/\/www.windowslinuxymac.com\/hardware\/82-diferencias-entre-formateo-normal,-r%C3%A1pido-y-a-bajo-nivel.html\" target=\"_blank\" rel=\"noopener noreferrer\">Diferencias entre formateo normal, r\u00e1pido y a bajo nivel.<\/a><\/li>\n<li><a href=\"https:\/\/www.xataka.com\/seguridad\/que-es-una-conexion-vpn-para-que-sirve-y-que-ventajas-tiene\" target=\"_blank\" rel=\"noopener noreferrer\">\u00bfQu\u00e9 es una conexi\u00f3n VPN, para qu\u00e9 sirve y qu\u00e9 ventajas tiene?<\/a><\/li>\n<li><a href=\"https:\/\/www.redalia.es\/ssl\/protocolo-ssl\/\" target=\"_blank\" rel=\"noopener noreferrer\">Qu\u00e9 es el protocolo SSL\/TLS<\/a><\/li>\n<li><a href=\"https:\/\/www.universidadviu.es\/tres-tipos-seguridad-informatica-debes-conocer\/\" target=\"_blank\" rel=\"noopener noreferrer\">Tres tipos de seguridad inform\u00e1tica que debes conocer<\/a><\/li>\n<li><a href=\"https:\/\/blogthinkbig.com\/que-son-las-cookies\" target=\"_blank\" rel=\"noopener noreferrer\">Qu\u00e9 son las cookies de tu navegador y para qu\u00e9 sirven.<\/a><\/li>\n<li><a href=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?arnumber=4446691\" target=\"_blank\" rel=\"noopener noreferrer\">James P. Anderson, an information security pioneer.<\/a><\/li>\n<\/ul>\n<h6><strong>Presentaci\u00f3:<\/strong><\/h6>\n<p><iframe loading=\"lazy\" style=\"border: 1px solid #CCC; border-width: 1px; margin-bottom: 5px; max-width: 100%;\" src=\"\/\/www.slideshare.net\/slideshow\/embed_code\/key\/18JGo9YT12KXYf\" width=\"595\" height=\"485\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" allowfullscreen=\"allowfullscreen\"> <\/iframe><\/p>\n<h6><strong>Fotos:<\/strong><\/h6>\n<div id=\"1234\" style=\"width: 600px; height: 400px; display: none;\"><img decoding=\"async\" src=\"https:\/\/serveiseducatius.xtec.cat\/tarragones\/wp-content\/uploads\/usu549\/2019\/03\/trics13_imatge1_mroige.jpg\" data-link=\"https:\/\/serveiseducatius.xtec.cat\/tarragones\/wp-content\/uploads\/usu549\/2019\/03\/trics13_imatge1_mroige.jpg\" \/><br \/>\n<img decoding=\"async\" src=\"https:\/\/serveiseducatius.xtec.cat\/tarragones\/wp-content\/uploads\/usu549\/2019\/03\/trics13_imatge2_mroige.jpg\" data-link=\"https:\/\/serveiseducatius.xtec.cat\/tarragones\/wp-content\/uploads\/usu549\/2019\/03\/trics13_imatge2_mroige.jpg\" \/><br \/>\n<img decoding=\"async\" src=\"https:\/\/serveiseducatius.xtec.cat\/tarragones\/wp-content\/uploads\/usu549\/2019\/03\/trics13_imatge3_mroige.jpg\" data-link=\"https:\/\/serveiseducatius.xtec.cat\/tarragones\/wp-content\/uploads\/usu549\/2019\/03\/trics13_imatge3_mroige.jpg\" \/><br \/>\n<img decoding=\"async\" src=\"https:\/\/serveiseducatius.xtec.cat\/tarragones\/wp-content\/uploads\/usu549\/2019\/03\/trics13_imatge4_mroige.jpg\" data-link=\"https:\/\/serveiseducatius.xtec.cat\/tarragones\/wp-content\/uploads\/usu549\/2019\/03\/trics13_imatge4_mroige.jpg\" \/><br \/>\n<script type=\"text\/javascript\" src=\"https:\/\/cdn.jsdelivr.net\/jquery\/1.12.3\/jquery.min.js\"><\/script><br \/>\n<script>\n (MyGalleries=(typeof MyGalleries === 'undefined' ? [] : MyGalleries)).push({gallId:'#1234',autoplay:true,lightbox:true,debug:false,popupLinks:true});\n if(typeof GalleryLoaded === 'undefined'){\n  GalleryLoaded = jQuery(function(){\n   jQuery.ajax({url:'https:\/\/cdn.jsdelivr.net\/galleria\/1.4.2\/galleria.min.js',dataType:'script',cache:true}).done(function(){\n    Galleria.loadTheme('https:\/\/cdn.jsdelivr.net\/galleria\/1.4.2\/themes\/classic\/galleria.classic.js');\n    for(var n in MyGalleries){\n     Galleria.run(MyGalleries[n].gallId, MyGalleries[n]);\n     jQuery(MyGalleries[n].gallId).css('display','block');\n    }\n   });\n  });\n }\n<\/script><\/div>\n<p>&nbsp;<\/p>\n<div><sup><em>Foto 1.- Imatge de la portada del meu treball de recerca<\/em><\/sup><br \/>\n<sup><em>Foto 2.- Soldats Nazis enviant missatges encriptats a trav\u00e9s de la m\u00e0quina Enigma <\/em><\/sup><br \/>\n<sup><em>Foto 3.- Les funcions &#8220;hash&#8221;<\/em><\/sup><br \/>\n<sup><em>Foto 4.- Funcionament d&#8217;un criptovirus<\/em><\/sup><\/div>\n<h6><strong>Fitxers:<\/strong><\/h6>\n<p><script src=\"https:\/\/gist.github.com\/crptarragones\/bc09abbcd4603fd05856d9bdf792155d.js\"><\/script><br \/>\n<script src=\"https:\/\/gist.github.com\/crptarragones\/dcdba0e747d2f331bc9d55c29509cfda.js\"><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Marc Roig\u00e9 Benaiges<\/p>\n","protected":false},"author":1,"featured_media":12445,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[391,70],"tags":[335,499],"class_list":["post-12444","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciencies","category-trics","tag-informatica-i-disseny","tag-trics_ins-fontanelles"],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/serveiseducatius.xtec.cat\/tarragones\/wp-json\/wp\/v2\/posts\/12444","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/serveiseducatius.xtec.cat\/tarragones\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/serveiseducatius.xtec.cat\/tarragones\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/serveiseducatius.xtec.cat\/tarragones\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/serveiseducatius.xtec.cat\/tarragones\/wp-json\/wp\/v2\/comments?post=12444"}],"version-history":[{"count":2,"href":"https:\/\/serveiseducatius.xtec.cat\/tarragones\/wp-json\/wp\/v2\/posts\/12444\/revisions"}],"predecessor-version":[{"id":12447,"href":"https:\/\/serveiseducatius.xtec.cat\/tarragones\/wp-json\/wp\/v2\/posts\/12444\/revisions\/12447"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/serveiseducatius.xtec.cat\/tarragones\/wp-json\/wp\/v2\/media\/12445"}],"wp:attachment":[{"href":"https:\/\/serveiseducatius.xtec.cat\/tarragones\/wp-json\/wp\/v2\/media?parent=12444"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/serveiseducatius.xtec.cat\/tarragones\/wp-json\/wp\/v2\/categories?post=12444"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/serveiseducatius.xtec.cat\/tarragones\/wp-json\/wp\/v2\/tags?post=12444"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}