Mostrando 10 resultados de: 16
Publisher
ACM International Conference Proceeding Series(5)
Proceedings of the World Conference on Smart Trends in Systems, Security and Sustainability, WS4 2020(3)
Frontiers in Artificial Intelligence and Applications(2)
Advances in Intelligent Systems and Computing(1)
Advances in Science, Technology and Engineering Systems(1)
Área temáticas
Otros problemas y servicios sociales(4)
Administración pública y ciencia militar(3)
Criminología(3)
Funcionamiento de bibliotecas y archivos(3)
Administración pública(2)
Área de conocimiento
Ciencias de la computación(7)
Administración pública(4)
Base de datos(3)
Red informática(3)
Software(2)
Origen
scopus(16)
An immutable algorithm approach to improve the information security of a process for a public organization of Ecuador
ArticleAbstract: Currently, information security is among the main characteristics that must be achieved within the sPalabras claves:ALGORITHMS, Cryptography, securityAutores:Andrés Javier Bravo Jácome, Luis Enrique Mafla Gallegos, Máximo Giovani Tandazo Espinoza, Segundo Moisés Toapanta ToapantaFuentes:scopusAnalysis of adequate security algorithms oriented to cybersecurity management for a distributed architecture
Conference ObjectAbstract: It was analyzed an environment between the references of certain security models and algorithms basePalabras claves:Access Control, CYBERSECURITY, Distributed architecture, DISTRIBUTED SYSTEMS, Security algorithmAutores:Christian Andres Orozco Bonilla, Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta ToapantaFuentes:scopusAnalysis of appropriate standards to solve cybersecurity problems in public organizations
Conference ObjectAbstract: The development of ICTs in the globalized world has forced countries to develop problems or implemenPalabras claves:Directrices de seguridad, Estándares ciberseguridad, ORGANIZACIONES PÚBLICASAutores:E. Gustavo Salomon Gaibor, Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta ToapantaFuentes:scopusAnalysis of the software most used by hackers to carry out penetration testing in public organizations
Conference ObjectAbstract: Currently, the software handled by hackers is the main one to tackle a series of empirical knowledgePalabras claves:HACKER, HACKING, Hacking tools, Malicious program, Public OrganizationsAutores:González R.F.P., Luis Enrique Mafla Gallegos, Máximo Giovani Tandazo Espinoza, Segundo Moisés Toapanta ToapantaFuentes:scopusA cyber environment approach to mitigate vulnerabilities and threats in an electoral process in ecuador
Conference ObjectAbstract: The problems of information security in the cyber environment regarding vulnerabilities and threatsPalabras claves:Computer security, Cyber environment, Threats, vulnerabilitiesAutores:Luis Enrique Mafla Gallegos, Marjorie Noemi Isanoa Sinche, Segundo Moisés Toapanta ToapantaFuentes:scopusCryptographic Algorithms to Mitigate the Risks of Database in the Management of a Smart City
Conference ObjectAbstract: It was analyzed the information of databases, encryption algorithms, and information security that aPalabras claves:Cryptographic Algorithms, Database risks, information security, Security scheme, smart cityAutores:Félix Gustavo Mendoza Quimí, Luis Enrique Mafla Gallegos, Salazar R., Segundo Moisés Toapanta ToapantaFuentes:scopusDefinition of a Prototype for Performing Computer Audits in a Public Organization of Ecuador
Conference ObjectAbstract: The development of a prototype of computer audits has become more important for the administration aPalabras claves:Audit Public, Information technology, IT, organization, PrototypeAutores:Luis Enrique Mafla Gallegos, Sandra Elizabeth Marquez Ortiz, Segundo Moisés Toapanta ToapantaFuentes:scopusDefinition of an ICT management model to mitigate cyberbullying risk in social networks
Conference ObjectAbstract: The need to analyze the risks of cyberbullying that children and adolescents face through the use ofPalabras claves:Digital Skills, management model, SOCIAL NETWORKSAutores:Arellano M.R.M.I., Luis Enrique Mafla Gallegos, Ramirez K.J.R., Segundo Moisés Toapanta ToapantaFuentes:scopusAppropriate Security Algorithms to Mitigate the Risks in a Database of the National Customs Service of Ecuador
Conference ObjectAbstract: Currently, the use of technological resources, within public and private institutions, has become esPalabras claves:Computer security, Computer Theft, Encrypted Algorithms, Risk managementAutores:Karen Lissette Ponce Astudillo, Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta ToapantaFuentes:scopusAppropriate Security Protocols to Mitigate the Risks in Electronic Money Management
Conference ObjectAbstract: Discussed in a general way, the protocols used by retailers to provide security when making online pPalabras claves:3D Secure, Electronic money, security, set, SSLAutores:Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta Toapanta, Zamora M.E.C.Fuentes:scopus