Prototype to Optimize the Management of Information Security Used by Internal Users in a Public Organization of Ecuador

被引:0
|
作者
Toapanta Toapanta, Segundo Moises [1 ]
Castro De La Rosa, Francisco Xavier [1 ]
Navarrete Fernandez, Eduardo Michael [1 ]
Trivino Trivino, Fabrizio Dario [1 ]
Mafla Gallegos, Luis Enrique [2 ]
机构
[1] Univ Politecn Slesiana UPS, Dept Comp Sci, Guayaquil, Ecuador
[2] Escuela Politecn Nacl EPN, Fac Engn Syst, Quito, Ecuador
来源
PROCEEDING OF THE 2019 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (IEEE CITS 2019) | 2019年
关键词
Information systems; Processes; Information Security; public organizations; Security prototypes;
D O I
10.1109/cits.2019.8862103
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security with respect to the information systems causes a constant discussion problem due to the vulnerabilities that the processes of the public organizations face, for this reason, the prototypes that offer a certain degree of security are taken into account: loss of information, attacks cybernetics, damage to high performance equipment, among others. The objective is to analyze and determine the conclusions of each one of the security prototypes that evaluate their characteristics, functionalities, usability, etc. To analyze the information of the articles mentioned in this document, the deductive method was used. It turned out that prototypes oriented to information security for users in organizations, social networks, networks. The stages of the processes of the information systems, the power to determine the type of service that is presented and, in this way, take the appropriate measures to counteract it. It was concluded that security prototypes are an alternative that provide in one way or another security when running information systems processes, but nothing guarantees that they are 100% reliable, which would cause the loss of information or computer attacks in public organizations in Ecuador. We can also conclude that the prototype PMI (interactive maturity prototype) offers optimal security in terms of information systems for internal users in public organizations.
引用
收藏
页码:71 / 75
页数:5
相关论文
共 50 条
  • [1] A Blockchain Approach to Mitigate Information Security in a Public Organization for Ecuador
    Toapanta, Moises
    Mero, Jose
    Huilcapi, Dario
    Tandazo, Maximo
    Orizaga, Antonio
    Mafla, Enrique
    4TH INTERNATIONAL CONFERENCE ON APPLIED MATERIALS AND MANUFACTURING TECHNOLOGY, 2018, 423
  • [2] Methodology to Ensure Information Security in a Distributed Architecture for a Public Organization of Ecuador
    Toapanta Toapanta, Segundo Moises
    Mendoza Quimi, Felix Gustavo
    Ortiz Pazmino, Kevin Eduardo
    Maciel Arrellano, Rocio
    Mafla Gallegos, Luis Enrique
    FUZZY SYSTEMS AND DATA MINING V (FSDM 2019), 2019, 320 : 933 - 944
  • [3] Analysis of the Information Security of Public Organizations in Ecuador
    Romero Izurieta, Richard
    Caucha Morales, Luis Jhony
    Toapanta Toapanta, Segundo Moises
    Mafla Gallegos, Luis Enrique
    Orizaga Trejo, Jose Antonio
    2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI 2021), 2021, : 823 - 829
  • [4] Study of the Maturity of Information Security in Public Organizations of Ecuador
    Patino, Susana
    Yoo, Sang Guun
    TECHNOLOGIES AND INNOVATION (CITI 2018), 2018, 883 : 99 - 109
  • [5] An Information Security Management Approach for an Electoral Process in Ecuador
    Toapanta Toapanta, Segundo Moises
    Valero Carrillo, Andrea Paola
    Naranjo Sanchez, Bertha Alice
    Mafia Gallegos, Luis Enrique
    FUZZY SYSTEMS AND DATA MINING V (FSDM 2019), 2019, 320 : 921 - 932
  • [6] Cybersecurity Mechanisms for Information Security in Patients of Public Hospitals in Ecuador
    Quimiz-Moreira, Mauricio
    Zambrano-Romero, Walter
    Moreira-Zambrano, Cesar
    Mendoza-Zambrano, Maritza
    Cedeno-Palma, Emilio
    TRENDS IN ARTIFICIAL INTELLIGENCE AND COMPUTER ENGINEERING (ICAETT 2021), 2022, 407 : 211 - 224
  • [7] A framework for the governance of information security: Can it be used in an organization
    Antoniou, George S.
    IEEE SOUTHEASTCON 2018, 2018,
  • [8] Perceived information security of internal users in Indian IT services industry
    N. R. Mukundan
    L. Prakash Sai
    Information Technology and Management, 2014, 15 : 1 - 8
  • [9] Perceived information security of internal users in Indian IT services industry
    Mukundan, N. R.
    Sai, L. Prakash
    INFORMATION TECHNOLOGY & MANAGEMENT, 2014, 15 (01): : 1 - 8
  • [10] Smartphone security: understanding smartphone users' trust in information security management
    Jang, Yu-Teng
    Chang, Shuchih Ernest
    Tsai, Yi-Jey
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (09) : 1313 - 1321