Abstract
This document provides an overview of the main characteristics of ethical hacking processes as a computer security tool applying artificial intelligence (AI), taking into account that the adoption of information protection strategies in organizations is no longer a luxury that only some adopt, but practically a requirement that takes into account the need to counteract risks in local networks and the Internet. AI is a technological paradigm that is increasingly used in industry and organizations to support their processes and has become so relevant that refusing to use it will imply significant difficulties in the medium term to keep up with the demands and not stay relegated from the future. The structure of the document is made up of several sections, first the definition and the historical origin of hacking and ethical hacking are presented, then the concept of artificial intelligence and its relationship with ethical hacking, its most used algorithms and its advantages and disadvantages. Disadvantages The current context of ethical hacking at global and local level, as well as its regulatory framework, is detailed below; then the main vulnerabilities detected in ethical hacking are mentioned, brief recommendations are presented and finally the most relevant conclusions are shown.
References
:2012, I. T. (2012, 12). ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection. 18. Retrieved from http://www.iso.org/iso/home/store/catalogue_tc/catalogue_detail.htm?csnumber=43755
Andes, U. d. (2019). Inteligencia artificial. Contacto, 6.
Asobancaria. (2018, 08 06). Retos de Colombia en ciberseguridad a proposito de la adhesión al "Convenio de Budapest". Semana Económica 2018(1148), 1,2,5,6. Retrieved 06 20, 2020
BBC. (2015, 10 11). BBC.COM. Retrieved from https://www.bbc.com/mundo/noticias/2015/10/151007_iwonder_finde_tecnologia_virus_stuxnet
Blum, R. (2007, Marzo 25). Course Hero. Retrieved Junio 04, 2020, from Course Hero: https://www.coursehero.com/file/29043414/BT-INS-IT-Industry-Survey-Ethical-Hackingpdf/
Blum, R. (2007, 03 27). ETHICAL HACKING.
Chas, A. (2019). AURA PORTAL.
Chas, A. (2020, Mayo 15). AURO PORTAL. Retrieved Junio 08, 2020, from AURO PORTAL: https://www.auraportal.com/es/que-es-la-inteligencia-artificial/
Floridi, L. y. (2016). ¿Qué es la ética de los datos? Transacciones filosóficas de la Royal Society A: Ciencias Matemáticas, Físicas e Ingeniería(374(2083)). Retrieved 06 06, 2020, from https: //doi.org/10.1098/ rsta.2016.0360
González, R. C. (2019). eHack. Retrieved 06 29, 2020, from Las fases del Hacking Ético: https://ehack.info/las-fases-del-hacking-etico/
Grupo Funcional de Seguridad Informática, U. (2018, 07 27). Nueva modalidad de delitos informáticos en Colombia. Retrieved 06 29, 2020, from Nueva modalidad de delitos informáticos en Colombia: https://noticias.unad.edu.co/index.php/gidt/2333-nueva-modalidad-de-delitos-informaticos-en-colombia
Integra, N. (2020, 01 17). NEXUSINTEGRA. Retrieved from https://nexusintegra.io/es/blog/ventajas-y-desventajas-de-la-inteligencia-artificial/
Integra, N. (2020, Enero 17). Nexusintegra.io. Retrieved Junio 10, 2020, from Nexusintegra.io: https://nexusintegra.io/es/blog/ventajas-y-desventajas-de-la-inteligencia-artificial/
luz, S. d. (2015, 09 17). REDES ZONE. Retrieved from https://www.redeszone.net/2015/09/17/descubren-varios-routers-cisco-infectados-por-synful-knock-un-malware-oculto/
M., J. E. (2019, 10 16). IMPACTO TIC. Retrieved from https://impactotic.co/hacking-etico-y-ciberdelincuentes/
MinTic. (2019, 10). Ministerio de Tecnologías de la Información y las Comunicaciones . Retrieved from Estándares de la Industria: https://www.mintic.gov.co/arquitecturati/630/propertyvalues-8158_descargable_2.pdf
MOYA, R. (2016, Marzo 25). Jarroba. Retrieved Junio 10, 2020, from Jarroba: https://jarroba.com/que-es-el-clustering/
Moya, R. (2016, 03 25). Jarroba.com.
Orozco, F. J. (2016, 11 12). Prezi.com. Retrieved from https://prezi.com/yg8sd8sbe-jm/historia-de-hacking/
Osorio, F. V. (2016, Noviembre 12). Prezi. Retrieved Junio 09, 2020, from Prezi: https://prezi.com/yg8sd8sbe-jm/historia-de-hacking/
P., R. S. (2019, 07 20). SEGURIDAD DIGITAL EL MERCURIO. Retrieved Junio 08, 2020, from https://seguridaddigital.emol.com/noticias/hacking-etico/la-inteligencia-artificial-y-la-automatizacion-del-hacker/
Parraga, A. C. (2017). ANÁLISIS DE LOS DELITOS INFORMÁTICOS EN EL ACTUAL SISTEMA. Retrieved 06 20, 2020, from https://repository.unilibre.edu.co/bitstream/handle/10901/11041/AN%C3%81LISIS%20DE%20LOS%20DELITOS%20INFORM%C3%81TICOS%20EN%20EL%20ACTUAL%20SISTEMA%20PENAL%20COLOMBIANO%20revisado%20NHJ%20OK.pdf?sequence=3&isAllowed=y
Rouse, M. (2017, Abril 27). TechTarget. Retrieved Junio 10, 2020, from TechTarget: https://searchdatacenter.techtarget.com/es/definicion/Inteligencia-artificial-o-AI
Rouse, M. (2017, 04). TechTarget 20.
Solís, S. M. (2018, Abril 24). ICEMD. Retrieved Junio 09, 2020, from ICEMD: https://www.icemd.com/digital-knowledge/articulos/que-es-hacking-etico-en-que-marco-legal-se-mueve/
Solís, S. M. (2018, 04 24). ICEMD ESIC. Retrieved from https://www.icemd.com/digital-knowledge/articulos/que-es-hacking-etico-en-que-marco-legal-se-mueve/
Taddeo, M. (2014b). La lucha entre libertades y autoridades en la era de la información. Ciencia y Etíca de la Ingenieria. Retrieved 06 14, 2020, from https://doi.org/10.1007/s11948-014-9586-0
Taddeo, M. (2017a). Los límites de la teoría de la disuasión en el ciberespacio. Filosofía y Tecnología. Retrieved 6 6, 2020, from https://doi.org/10.1007/s13347-017-0290-2
Taddeo, M. y. (2018b). Cómo la IA puede ser una fuerza para el bien. Ciencia(361(6404)), 751-752. Retrieved 06 14, 2020, from Ciencia: https://doi.org/10.1126/science.aat5991
Yucatan. (2018, 05 19). Yucatan.com.mx. Retrieved from https://www.yucatan.com.mx/tecnologia/ventajas-desventajas-la-inteligencia-artificial
Yucatan, D. (2018, Mayo 19). yucatan.com.mx. Retrieved Junio 10, 2020, from yucatan.com.mx: https://www.yucatan.com.mx/tecnologia/ventajas-desventajas-la-inteligencia-artificial

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Copyright (c) 2020 Revista RETO




