Tema de Tesis - Corregida do

October 31, 2017 | Author: Blanca Lizbeth Carrasco Delgado | Category: Biometrics, Password, Authentication, Fingerprint, Computer Science
Share Embed Donate


Short Description

Download Tema de Tesis - Corregida do...

Description

c c c

Ê

             



Ê  ÊÊ Ê   c

 Ê  

    

c c   c c c  c c c c  c cccc c cccc c ccc     c c cc  Ê  c  c !"#$ c!%%$ c c & %#c'""" ( c&'""')c c     %#c$*$c +$!%c$!"c,#-'"c c c c c

   !"! c c c c

c c 1.0 DATOS INFORMATIVOS: 1.1 Titulo

|   c c c   c c   c   c 

c  c c  c   c  c c  c c

 c c  c c c

   c c c !c 1.2 Personal Investigador 1.2.1 Autores



c"  c#

c $ c$ c  cc 1.2.2 Asesor

|!c  c c%& c 1.3 Tipo de Investigación

 c 1.4 Facultad y Escuela Profesional

  c c |'c &  c c ( c )c *  c    c    c c|'c c+   !c c 1.5 Localidad e institución donde se desarrollará el proyecto

   c c c  !cc 1.6 Duración estimada del Proyecto

+c  c,c   !c 1.7 Fecha de Inicio

+ c c-./.c

c c

c c 1.8 Presentado por

c c c

c

c cccc

c"  c#

c

cccccc$ c$ c  c

|!c  c c%& c   c 1.9 Aprobado por

  c

+ c

 c

c c

c

2.0 PROBLEMÁTICA DE LA INVESTIGACIÓN 2.1 Realidad Problemática

c  c c  c c c   c c  & c c  c c 0 c c "1 c c     c 2-c 334c 1 c 5c c   c c c  

c c 5 c  c c    c  c c   ' c c   6c 7|0*|8c   c c c  c c  c    c c5 c c  ! c c

9 c c c  c   c cc 6 c  c cc c  c    c  c   c c    c c    c &  c    c c    c 5c c   c c c c & c    c c c

c c   c c c   c   c& c c c c c   c   c c c   c  c  c c c c  ccc c c    !c c

*c  c c   c 1 c  c    c c /2c c  c c /44.c  c c "6c   c c :  c c   c c c     c c c

c /;

c  

c  c c  c  c c c c   c  c c   c c c   c c c & c  c 

 c   6c c

c  c c   c c   c !c  c c

  c  c c  c   c  c

   c    c c c  c

 

cc c c c c   c  c   c ! c*c   c c   c   c c 

c c  c '  c c c 

6

c

   c c    c & c  c  c c   c

  c c   c  c  6c    c c   c c  c  

c c 

c c cc c  c c    c c  c

c c  c c c  c c Ccc  c& c cc  c c c c    c c 

c c    c  6 c c  c c  c c 5c  

c   c  c   c c c   c c    c  c 

Cc c    c c& c  c  c  c c 6c  1 !c c

*c

 c  

c c  c  c  c  c c   c c    c



c c c' c & c cc  c c 

c  cc

 c

 c c   c c    c   c & c  c c c

   c c  c  c  c c   c c   c  6 c 11 c & c  6c  

c c       c  c c c |   c  c c  c 

 c    c & c c  c  c  c

 c

 c 

c c c   c c  c    c & c c c c

c  c c c  c  c c   c c    c c 6c c   c 1  c

 c c    c  c   c c c 1 c c 6  c c *c 1 c  c  c  c c c  

c 

c    c  c c c  c  c  c c c  c 

 c   6 c c   c  c c c

6 c c c c   c

   c  c c c & c & c

 c  c  c c c c

c c   c c    c

 

c 'ccc|   c c c  c  6 c& ccc1cc 6  c c  c  c c c  c c    c   c c  c

c c

c

   c  cc c

 cc c c c   c cc  c c 6c

ccc  c c c ' c& c ! c c

2.2 Planteamiento del Problema

  c c c    c  c c  c c 6 c c 3.c   c c  c  c 6 c  

c  c  c c   c c  c c   c c  c   c c

cc c1 c c 6  c c *c  6

c c  c

c  c  c  c 'c c 'c

 

c c  c  c c

c  Cc   c  

c c c    cc1 c c ccc1 c c  c  c

c c  c

 c c *c  c c  c   c c    c &  'c c c

 c c5c

c1c  

cc c  c   c& cc c   c 1  c c    c    c 

c c 'c  'c c    c c   c  c c 1  c   

c c c   c c c c 1  c  

c c   c c & c c  c  c c  c & c  c  c

c  c c  c c  c  c c   c c c & c 1 c c

'c c

c c& c c c cc c c 

c c c 1 ccc    c cc

c c c1  c c   cc c  cc c  6 c c c c c  cc c c 'c

 c c  c c   c c c  c  c c    c c   c 6

c  'c & c c  c c  c c   c c  c c  c c c    c c   c 1 c   c c  c c   c c  c c c  c 

c  'c  c  c c  c  c c c   c   c 1c   

c & c  c  c  c      c  c c   c & c c c  c   c c c c c   cc c  

c c  c  c c  c & c  'c c c    c   c c  c    c & c c cc 1c|   !c * c c  c& c c  cc c  c  ' c  cc c    c c    c 

c c   c c    c & c  c   cc c6c c 

c c 6 c    c ccc |   c  c c  c 

 c c   c c !cc c c

  c & c   c

c

2.3 Formulación del Problema

ö c 1 c   c  6c c

   c c c

   cc c ccc   c c c D c 2.4 Justificación e Importancia de la Investigación

c  c c c  c c   cc  c c   c

c   c   c & c  c  c c

 c c  c c c

   c  c c   !c   6 c c  c  c c  c

 c 

c cc   c c  cc c  cc   c c   !c c " c  c  c    c c   c   c c c  c   c c   c&  c& c c   c c  c  cc c     c c c c c  c& c c 'cc cc   c c c

cc  c  6 c c c 6 c  c c c   c c  c  c  6c c 1  c c   c c   cc  c1  cc c c c   !c" c c   c cc  6c cc c  cc   cc   c  cc 

c c   !c   6 c c  6c  & c  c c   c c   c 

c  c c c & c 6c  

c c  c  c c c & c c  c  c  c  c c    c c c   c & c  'c c  

c c  & c   c  !c  c    c c    c  c cc  

c 6c c c   c c ccc  c cc !c c (c   c   c c c   c c    c  c 1 Ec  c Ec   c c c   c c     !c # c c 1 Ec c c c c   c& c c c    c 

c c c c ' c   !c ( c c  c c    c c  c 6c   c c c c  c  c c

c c

c

     c   c c  c c  c   c



c

 

c c& c& c c 6c 

!cc *c   c c    cc c  c  c c c  c c  c c   c

 c  c   c c   c c  c c c

   c  c c  ! c 2.5 Objetivos

|  c c   c c   c   c 

c  c  c  c  c cc    c cc   c c c cc   c c c !c 2.5.1 Objetivos Específicos .

!c #  cc   c   cc c c !c !c #  c c&  c c   c c 

cc c&   !c !c #  c c c c  c   ccc  c c !c

!c #  cc Ec& c cc  c c ! c !c #  cc Ec& c cc  c c  c c1 Ec   c cc   c c ! c !c # c c     'c    c c c   c c   c   !c !c ?c  cc    c c   ! c 1!c * cc  c  c c  cc  c c   !c c c c c c c c

c

3.0 MARCO TEÓRICO 3.1 Antecedentes de la Investigación 3.1.1 A Nivel Internacional A. ³Diseño de un sistema de pagos de planilla con autenticación biométrica en entidades bancarias ´c7/8!cc

>c  c  c #  c c   c c  c c c  c   c  c c     c  c & c  c  cc c c  c c  cc6 ! c * c  c  c& Bc c c   c  c  c c   c

6 c  c c c

  ccc c c  c  

c 

c  c   c 

c  'c   c c  c c    c c  c  

c  c   c    c & c c   c c c  c1 c  !c c  c c  c c c c c    c   !c * c   c c  c & c c   c & c    c  6c   c c  c 1  c c c  ' c  c  c cc cc   c c !c B.cc³Análisis, diseño e implementación de una planilla de pago ´ (2).

>c c  c|  c c   c cc c !c * c  c  c& B c " c c    c c   c c c c  c 16c c   'c c   c 1  c c c   c   6 c c c c

 c c 

c 

c   c  c c

c

  cc c 1c 6 c  !c l                        



  !    

"  " # $     %   m  

           



l& '()* )+  "           





  !     (,$"  " # $ 

 " -+  %        m   .//000   -  /-/123 -

c c





c

c  c c  c c c c c  c >|"c c  c  c c  !c * c   c c  c & c c   c & c    c  6c

 cc  c 1  c c c  ' c  c  c

cccc   c c ! c C. ³Análisis de seguridad en comunicaciones USB ´ (3).

>c  c  c * c & c   c c c c c 

c cc  c c c c c c    ! c * c  c  c& B c " & c  c c & c  c  c  c c &    c

  c  c   c c c c  c  c c    c c     cc  cc !c c c c& c c cc6  c c cc  c c  c   c & c c  c c c  c c c   ccc c  c c  c6 ! c D. ³Sistema de Control de personal y planillas de pago ´ (4).

>c c  c|  c c   c c  c c cc c c  c & c   c

 c  

c  c c

  c   Cc   6 c  c c    c c  c c  c c   c c  c

  c c

c

6 c 6 c c

c 

c  c    ccc  c c    !c * c  c  c& B c c   c c Ec & c  c c   c  c  c c  c c  c c  6c c

c 6 c  c   c c

  c c  c c  c c  c   c c     c  cc  c c ! c l145) 67 )+          4   !   ###  (   *      



$  " # $       % +  m   

        ! 



"#$%& '(  l276 7# '7       %     4 !   !  (%   ) " #-+ "    % 







m  

         ) ! !  * 

c c

c

c c& c c cc c6  c cc  c c c c  c

c  c c   c 7  c   8c c c

 c7 8c

 c cc  c c c& c c   cc  c 

c Ec !c c 3.1.2 Nivel Nacional A. ³|  c c   c  c c     c c c c

 ccc    c  ! Fc748!c >c c  cG c c   c  6c 

c  'c  c& c c   c cc

c c c    cc

 c c   c c   c c  c    c c

c  'c  c  c  c  c    c c  c

 c

c  

c c  c c   6 c   c c c c  c

 c

 

cc c * c  c  c& Bc  c    c  

c c     c c 1 c c c  c  c c   c  c  c   !c +c   c c c c  c c   c   c c  c  c & c c 1c  

c 1c c c 

c c    c  c  c  c c    c 'cc c cc c c cc   'c  c c c  6c c c c c  c c    c & c & c c  c c c    c   6 c c c c  c & c   c    c c   c    c   6

c   c cc    c c cc

c c

c   ccc    c cc c cc1  !c c l8 7) '9 # -             %           :  5   !   



(%   ( " # $    m    

 +++ ,   -     . /   ,           ( -   ( 0 ,/   

c c c





c

3.1.3 A Nivel Local

c c

(+>c

3.2 Base Teórica 3.2.1 Sistemas Biométricos c

c 'c  c c c c c cHc= =c c cHc =   =!cG 'c c cc cc c c  ' c  c c c c   c  c c  c  c 1  !c  & c c   'c  c c  c c c   c c  c    c cc 6 c  c c c    c   c

c   c c  c c  c c  c c  c    !c  1 c c  c    c & c c  'c  c c  c c  c

   c & c c  c c  c    c   c c   c c  c)cc  c c   B c A. Las contraseñas débiles: c  c  c c   

 c c c

 ccc c c6c c c c    c c& c c c   c

 c  c  c   c +   c & c  c   c

c  c  c c c  c  c   

c c c  

 c c   !c*  c 'c  cc c c c    ccc  c c  c  c c 

c c c !c+cc   c c cc   c   c/-2@43c/-2c c c&E !c B. Credenciales compartidas: c *c  c  c   c c

&  c c   c c



c ' c c  c  c  Bc (c

 c  c c  

c c c    c  c  c  c & c & c c  c )c c  c c & c c c

 'c c  c

  c 7Ic c 1 c  c    c  c c    c c    8c   c  6c  1

c   c  ' !c c c  c  c 6c     cc cc c c& c c c c   c  c c  c c  c c  'c c  c c    c  !c c c

c

C. Pérdida de tarjetas clave: c  1 c  c c    c  c

1 c  

c  c & c c  c   c  c c  c     c c  c   !c c 

c c c  c c  c

 c c  c  'c & c  c  c  c c c  c c

 c c c  c & c   c c  c & c  c   c c  

c  c c c1  c c   c'  c c c7;8!c c

c

l; &       , "  ',1 $2341 $233"



 5  4 3  "    6 , " 27$ 

' "'      '  '   ' ' "



m    



c l3 m   

 +++           -



3.2.2 TÉCNICAS DE AUTENTICACIÓN

c   c & c  c c  c c    c c c  c c c   

c  c c c  c     c

6 c    c c

   c c  c   

 c c   !c c  c   c  c  c   6 c c   c ' c c

&  c & c  c c c

 c    c c  c c 5  c & c & c c c

 c c c   c cc c cc c& c  c  

!c c c * c c   c & c c  c c c  c c   6 c c c c  c c c   c   c 71 c

c  c5  c c  cc cc 'cccc5  cc

cc  c c c c   c c   8c c 6c c c   !c c c *c   c c c& c  c  c c  Bc c    c6c

c  c c c c c' c6c c ! c c  c c  c c6  c c  c c c c c    !c * c  c  c 6  c c c   c Bc c c J c & c c  c FcJ c& cc  cFccJ c& cc  c F! c  c c   c c c c  c c     c c c c c c  'c c J c c & c c cc  c c Fc c  c   c ++$:?#!c c c  c  c c   c c  c   c c c c   c c  c J c & c c  c F!cc c1 c cc ccc c   cF c& cc  c F! c c c

c

c   c J c & c c  c FBc  c & c  c c  c  c c   c c c  c c !cc* c c c   c c c  cc  c|cccc c !c (cc c& cc cc c& c c   c   cc    c c  c c c 1c  c  c  c  c  

c c    !c c c c * c    c c   c c    c c & c  c

  c c  c c  c   c  

c c c   c c c    !ccc*c  c c cc  c cc c cc & c c  c1  c c c  cc  c  c c  c  c 1c & c  & c c   c  c     c  c   c  c !c * c   c c  c c    c  

c c J c & c c  c Fc  c 

c c c   c c  c c c c  c c  !c *c    c  c  c c  c 'c  c c    c 

cc   ccc  ! c ccJ c& cc   cFBc  c& cc  c c c c  c & c c c c c c    c c  

c c 7c c cc   cc  cc!8cc& cc c ccc   !cc+c c c c    c c c  c  c  c  c c   c  c c  !ccc  c  c c  c& cc c c ccJ  c c  F! c c c J c & c c  c  Fc c c   c c  c ' c   c c ' c c  !c c c   c  c c c  c   Bc  c 1  c  c c  c c  c c c +   c c  c  c c c

 c #0c cc

6 c ' c c  c & c  c

  c c 1 c 6 c  ccc  c  c c  c c c c  !c +c   c   c  c  c  c c c   c   c c     c   c c    c  c  c c   c  c  c  c   !c c c +c   c  c    c

c c

c

  c c    cc   c 6c1

c cc  c  c c c6c c  c c c    !c * c c  c c    c  c

c c c c c  c c 

c  c  c

 c c & c    !c c +c   c  c    c c  c   c c  c c  c & c c & c    c cc  c c    !c +c  c c  c c c    c  c cc11 c

c & c  6c  c c c c

c c  !c c % c c

c c c 6c 

c cc  c c c    c  c 6 c   c c  c cc c c !c 3.2.3 COMBINANDO TÉCNICAS

cc c cc    c 1 c    c c c c   !cc c  c c c  6 !cc& 'cc  c c   c c c cF c& cc  cFccc  c c& cc   c c   c  c 6 c c  c c |0c J c & c c  c F!c * c 5c c& cc c cc c  cc 

c c c  c c    c  !c & 'c c   c  c  c  c J c & c c  c  Fc c c c F c c & c c c c  c c  Fcc 

cc cc cc  cc cccc c ! c c+c c  c c   c c c  c c   c c   c  c c  c  cccc  cc cccc   cc cc ' c c  c c  c   c c  c c c  !c c *c  c   c c c c cJ c& cc  c Fc cJ c& c c  c Fc7/.8!c c l
View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF