Mostrando 8 resultados de: 8
Subtipo de publicación
Conference Object(8)
Área temáticas
Programación informática, programas, datos, seguridad(4)
Instrumentos de precisión y otros dispositivos(3)
Funcionamiento de bibliotecas y archivos(2)
Física aplicada(2)
Métodos informáticos especiales(2)
Cybercrime in Ecuador, an exploration, which allows to define national cybersecurity policies
Conference ObjectAbstract: The widespread use of the Internet and cyberspace has allowed the development of new criminal formsPalabras claves:CYBERCRIME, CYBERSECURITY, Organisms, Politics, securityAutores:Javier F. Díaz, Marco Bonilla, Ron M., Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusData restoration and file carving
Conference ObjectAbstract: This document proposes to make a contribution to the conceptualization and implementation of data rePalabras claves:File Carving, Incidence factor, Metadata, Methodology, restorationAutores:Geovanni Ninahualpa Quiña, Javier F. Díaz, Piccirilli D., Sang Guun YooFuentes:googlescopusEvaluation model of computer audit methodologies based on inherent risk
Conference ObjectAbstract: Computer auditing has become a fundamental piece to ensure the success and use of computer systems iPalabras claves:Computer audit, computer auditing methodologies, inherent riskAutores:Daisy E. Imbaquingo-Esparza, Freddy Alexander Cajas Sinchiguano, Javier F. Díaz, Mario Bernabe Ron Egas, Roger Andres Luje MisacangoFuentes:scopusNational Cybersecurity Strategy for Developing Countries : Case study: Ecuador proposal
Conference ObjectAbstract: The use of Information and Communication Technologies maintains inherent risks that affect the procePalabras claves:CYBERSECURITY, GOOD PRACTICES, National Strategies, risksAutores:David Molina, Geovanni Ninahualpa Quiña, Javier F. Díaz, Mario Bernabe Ron Egas, Ninahuelpa G., Ron M.Fuentes:scopusInformation security issues in educational institutions
Conference ObjectAbstract: The information is currently constituted as an asset within the institutions, whether public or privPalabras claves:Higher education institutions, information security; higher education institutions, Organizational culture, organizational culture, information securityAutores:Adrian Robayo Ordonez, Daisy E. Imbaquingo-Esparza, Diego León Villavicencio, Javier F. Díaz, Silvia R. Arciniega, Tatyana Katherine Saltos EcheverriaFuentes:scopusMi Universidad mobile application: An accessible door to educative services of the University
Conference ObjectAbstract: This article describes an accessible mobile application called Mi Universidad that allows students oPalabras claves:accessibility, android, API, mobile development, MOODLE, Open SourceAutores:Amadeo P., Harari I., Javier F. Díaz, Osorio M.A., Schiavoni M.A.Fuentes:scopusRestoring data in solid state devices damaged by crushing and falling, using file carving technique
Conference ObjectAbstract: This document proposes to analyze the contribution of File Carving techniques in the recovery of datPalabras claves:Fragment recovery carving, linear regression, METRICS, Semantic carving, Solid state devicesAutores:Carolina Perez, Geovanni Ninahualpa Quiña, Javier F. Díaz, Piccirilli D., Sang Guun Yoo, Teresa GuardaFuentes:scopusProtocol of information recovery in solid hard drives - SSD using file carving techniques
Conference ObjectAbstract: This paper proposes protocol of information recovery in solid hard disks - SSD by means of the use oPalabras claves:Affectation scenario, Carver, File Carving, Methodology, ProtocolAutores:Geovanni Ninahualpa Quiña, Javier F. Díaz, Piccirilli D., Sang Guun Yoo, Teresa GuardaFuentes:scopus