c c cc c cc c c c cccc c ccccc ccc c ccc Ê c c!"#$ c!%%$ c c & %#c'""" ( c&'""')c c %#c$*$c +$!%c$!"c,#-'"c c c c c
!"! c c c c
c c 1.0 DATOS INFORMATIVOS: 1.1 Titulo
| c c c c c c c
c c c c c c c c c
c c c c c
c c c !c 1.2 Personal Investigador 1.2.1 Autores
c" c#
c $ c$ c cc 1.2.2 Asesor
|!c c c%&c 1.3 Tipo de Investigación
c 1.4 Facultad y Escuela Profesional
c c |'c &c c ( c )c * c c c c|'c c+ !c c 1.5 Localidad e institución donde se desarrollará el proyecto
c c c !cc 1.6 Duración estimada del Proyecto
+c c,c !c 1.7 Fecha de Inicio
+ c c-./.c
c c
c c 1.8 Presentado por
c c c
c
c cccc
c" c#
c
cccccc$ c$ c c
|!c c c%&c c 1.9 Aprobado por
c
+ c
c
c c
c
2.0 PROBLEMÁTICA DE LA INVESTIGACIÓN 2.1 Realidad Problemática
c c c c c c c c &c c c c 0 c c "1 c c c 2-c 334c 1 c 5c c c c c
c c 5 c c c c c c ' c c 6c 7|0*|8c c c c c c c c c5 c c ! c c
9 c cc c c cc 6 c c ccc c c c c c c c c & c c c c 5c c c c c c &c cc c
c c c c c c c&c c c c c c c c c c c c c c c ccc c c !c c
*c c c c 1 c c c c /2c c c c /44.c c c "6c c c : c c c c c c c c
c /;
c
c c c c c c c c c c c c c c c c c &c c
c 6c c
c c c c c c !c c c
c c c c c c
c c c c c
cc c c c c c c c ! c*c c c c c c
c c c ' c c c
6
c
c c c &c c c c c
c c c c 6c c c c c c
c c
c c cc c c c c c c
c c c c c c c Ccc c&c cc c c c c c c
c c c 6 c c c c c c 5c
c c c c c c c c c c
Cc c c c&c c c c c 6c 1 !c c
*c
c
c c c c c c c c c c
c c c' c &c cc cc
c cc
c
c c c c c c &c c c c
c c c c c c c c c 6 c 11 c &c 6c
c c c c c c | c c c c
c c &c c c c c
c
c
c c c c c c c &c c c c
c c c c c c c c c c c 6c c c 1 c
c c c c c c c 1 c c 6 c c *c 1 c c c c c c
c
c c c c c c c c c c c
c 6 c c c c c c
6 c c c c c
c c c c &c &c
c c c c c c
c c c c c
c 'ccc| c c c c 6 c& ccc1cc 6 c c c c c c c c c c c c
c c
c
c cc c
cc c c c c cc c c 6c
ccc c c c ' c&c ! c c
2.2 Planteamiento del Problema
c c c c c c c c 6 c c 3.c c c c c 6 c
c c c c c c c c c c c c c
ccc1 c c 6 c c *c 6
c c c
c c c c 'c c 'c
c c c c c
c Cc c
c c c cc1 c c ccc1 c c c c
c c c
c c *c c c c c c c & 'c c c
c c5c
c1c
cc c c c&cc c c 1 c c c c
c c 'c 'c c c c c c c 1 c
c c c c c c c 1 c
c c c c &c c c c c c &c c c
c c c c c c c c c c c &c 1 c c
'c c
c c&c c c cc c c
c c c 1 ccc c cc
c c c1 c c cc c cc c 6 c c cc c cc c c 'c
c c c c c c c c c c c c c 6
c 'c &c c c c c c c c c c c c c c c c 1 c c c c c c c c c c c
c 'c c c c c c c c c c 1c
c &c c c c c c c c &c c c c c cc c c cc c
c c c c c c &c 'c c c c c c c c &c c cc 1c| !c * c c c&c c cc c c ' c cc c c c c
c c c c c &c c cc c6c c
c c 6 c c ccc | c c c c
c c c c !cc c c
c &c c
c
2.3 Formulación del Problema
ö c 1 c c 6c c
c c c
cc c ccc c c c D c 2.4 Justificación e Importancia de la Investigación
c c c c c c cc c c c
c c c &c c c c
c c c c c
c c c !c 6 c c c c c c
c
c cc c c cc c cc c c !c c " c c c c c c c c c c c c c& c&c c c c c cc c c c c c c c&c c 'cc cc c cc
cc c 6 c c c 6 c c c c c c c c 6c c 1 c c c c cc c1 cc c c c !c" c c c cc 6c ccc cc cc c cc
c c !c 6 c c 6c &c c c c c c
c c c c &c 6c
c c c c c c &c c c c c c c c c c c &c 'c c
c c &c c !c c c c c c cc
c 6c c c c c ccc c cc !c c (c c c c c c c c c 1 Ec c Ec c c c c c !c # c c 1 Ec cc c c c&c c c c
c c c c ' c !c ( c c c c c c c 6c c c c c c c c
c c
c
c c c c c c c
c
c c&c&c c 6c
!cc *c c c cc c c c cc c c c c c
c c c c c c c c c
c c c ! c 2.5 Objetivos
| c c c c c c
c c c c ccc c cc c c c cc c c c !c 2.5.1 Objetivos Específicos .
!c # cc c cc c c !c !c # cc&c c c c
cc c& !c !c # cc c c c ccc c c !c
!c # cc Ec&c cc c c ! c !c # cc Ec&c cc c c c c1 Ec c cc c c ! c !c # c c 'c c c c c c c !c !c ?c cc c c ! c 1!c *cc c c c cc c c !c c c c c c c c
c
3.0 MARCO TEÓRICO 3.1 Antecedentes de la Investigación 3.1.1 A Nivel Internacional A. ³Diseño de un sistema de pagos de planilla con autenticación biométrica en entidades bancarias ´c7/8!cc
>c c c # c c c c c c c c c c c c c &c c cc c c c c cc6 ! c * c c c&Bc c c c c c c c
6 c c c c
ccc c c c
c
c c c
c 'c c c c c c c c
c c c c &c c c c c c1c !c c c c c c c c c c !c * c c c c &c c c &c c 6c c c c 1 c c c ' c c c cc cc c c !c B.cc³Análisis, diseño e implementación de una planilla de pago ´ (2).
>c c c| cc c cc c !c * c c c&B c " c c c c c c c c c 16c c 'c c c 1 c c c c 6 c c c c
c c
c
c c c c
c
cc c 1c 6 c !c l
!
" " # $ % m
l& '()* )+ "
! (,$" " # $
" -+ % m .//000 - /-/123 -
c c
c
c c c c c c c c c >|"c c c c c !c * c c c c &c c c &c c 6c
cc c 1 c c c ' c c c
cccc c c ! c C. ³Análisis de seguridad en comunicaciones USB ´ (3).
>c c c * c &c c c c c c
c cc c c c c c c ! c * c c c&B c "&c c c &c c c c c & c
c c c c c c c c c c c cc cc !c c c c&c ccc6 c c cc c c c c &c c c c c c c c ccc c c c c6 ! c D. ³Sistema de Control de personal y planillas de pago ´ (4).
>c c c| cc c c c c cc c c c &c c
c
c c c
c Cc 6 c c c c c c c c c c c c
c c
c
6 c 6 c c
c
c c ccc c c !c * c c c&B c c c c Ec &c c c c c c c c c c c 6c c
c 6 c c c c
c c c c c c c c c c cc c c ! c l145) 67 )+ 4 ! ### ( *
$ " # $ % + m
!
"#$%& '( l276 7# '7 % 4 ! ! (%)"#-+ " %
m
) ! ! *
c c
c
c c&c ccc c6 c cc c c c c c
c c c c 7 c 8c c c
c7 8c
c cc c c c&c c cc c
c Ec !c c 3.1.2 Nivel Nacional A. ³| c c c c c c c c c
ccc c ! Fc748!c >c c cG cc c 6c
c 'c c&c c c cc
c c c cc
c c c c c c c c c
c 'c c c c c c c c
c
c
c c c c 6 c c c c c c
c
cc c * c c c&Bc c c
c c c c 1c c c c c c c c c !c +c c c c c c c c c c c c &c c 1c
c 1c c c
c c c c c c c c 'cc c cc c c cc 'c c c c 6c c c c c c c c &c &c c c c c c 6 c c c c c &c c c c c c 6
c c cc c c cc
c c
c ccc c ccc cc1 !c c l8 7) '9 # - % : 5 !
(% ( " # $ m
+++ , - . / , ( - ( 0 ,/
c c c
c
3.1.3 A Nivel Local
c c
(+>c
3.2 Base Teórica 3.2.1 Sistemas Biométricos c
c 'c c c c c ccHc= =c c cHc = =!cG 'c c cc cc c c ' c c c c c c c c c c 1 !c &c c 'c c c c c c c c c ccc 6 c c c c c c
c c c c c c c c c c !c 1 c c c c &c c 'c c c c c c
c &c c c c c c c c c c c)cc c c B c A. Las contraseñas débiles: c c c c
c c c
ccc c c6c c c c c c&c c c c
c c c c + c &c c c
c c c c c c c
c c c
c c !c* c 'c ccc c c ccc c c c c c
c cc !c+cc c c cc c c/-2@43c/-2c c c&E !c B. Credenciales compartidas: c *c c c c c
& c c c c
c ' c c c c Bc (c
c c c
c c c c c c c &c &c c c )c c c c &c c c
'c c c
c 7Ic c 1 c c c c c c c 8c c 6c 1
c c ' !c c c c c 6c cc ccc c&c c c c c c c c c c c 'c c c c c !c c c
c
C. Pérdida de tarjetas clave: c 1 c c c c c
1 c
c c &c c c c c c c c c c !c c
c c c c c c
c c c 'c &c c c c c c c c
c c c c &c c c c &c c c c
c cc c1 c c c' c c c7;8!c c
c
l; & , " ',1 $2341 $233"
5 4 3 " 6 , " 27$
' "' ' ' ' ' "
m
c l3m
+++ -
3.2.2 TÉCNICAS DE AUTENTICACIÓN
c c &c c c c c c c c c c c
c c c c c c
6 c c c
c c c
c c !c c c c c c 6 c c c ' c c
& c &c c c c
c c c c c 5 c &c &c c c
c cc ccc c cc c&c c
!c c c * c c c &c c c c c c c 6 c c c c c c c c c 71 c
c c5 c c cc cc 'cccc5 cc
cc c c c c c c 8c c 6c c c !c c c *c c c c&c c c c Bcc c6c
c c cc c c' c6c c ! c c c c c c6 cc c cc c c !c * c c c 6 c c c c Bc c c J c &c c c FcJ c&cc cFccJ c&cc c F! c c c c c c c c c c c c c c c 'c c J c c &c c cc c c Fc c c c ++$:?#!c c c c c c c c c c c c c c c c J c &c c c F!cc c1c cc ccc c cF c&cc c F! c c c
c
c c J c &c c c FBc c &c c c c cc c c c c c !cc* c c c c c c cc c|cccc c !c (cc c&cc cc c&cc c cc c c c c c 1c c c c c
c c !c c c c * c c c c c c c &c c
c c c c c c
c c c c c c !ccc*c c c cc c cc c cc &c c c1 c c c cc c c c c c 1c &c &c c c c c c c c!c * c c c c c c
c c J c &c c c Fc c
c c c c c c c cc c c !c *c c c c c c 'c c c c
cc ccc ! c ccJ c&cc cFBc c&cc c c c c c &c c c c c c c c
c c 7c c cc cc cc!8cc&cc cccc !cc+cc c c c c c c c c c c c c c !ccc c cc c&cc c c ccJ c c F! c c c J c &c c c Fc c c c c c ' c c c ' c c !c c c c c c c c Bc c 1 c c c c c c c c + c c c c c c
c #0c cc
6 c ' c c c &c c
c c 1 c 6 c ccc c c c c c cc !c +c c c c c c c c c c c c c c c c c c c c c c !c c c +c c c c
c c
c
c c cc c 6c1
c cc c c cc6cc c c c !c * cc c c c c
c c c c c c c
c c c
c c &c !c c +c c c c c c c c c c c &c c &c c cc c c !c +c cc c c c c c cc11 c
c &c 6c c c c c
c c !c c % c c
c c c 6c
c cc c c c c c 6 c c c c cc c c !c 3.2.3 COMBINANDO TÉCNICAS
cc c cc c 1 c c c c c !cc c c c c 6 !cc&'cc c c c c c cF c&cc cFccc c c&cc c c c c 6 c c c c |0c J c &c c c F!c * c 5c c&cc c cc c cc
c c c c c c !c &'c c c c c c J c &c c c Fc c c c F c c &c c c c c c Fcc
cc cc cc cccccc c ! c c+c c c c c c c c c c c c cc c cccc cc cccc cccc ' c c c c c c c c c c !c c *c c c c c c cJ c&cc c Fc cJ c&c c c Fc7/.8!c c l
Thank you for interesting in our services. We are a non-profit group that run this website to share documents. We need your help to maintenance this website.