Mostrando 10 resultados de: 15
Filtros aplicados
Subtipo de publicación
Conference Object(15)
Área temáticas
Funcionamiento de bibliotecas y archivos(7)
Programación informática, programas, datos, seguridad(5)
Administración pública(4)
Administración pública y ciencia militar(2)
Ciencias de la computación(2)
Área de conocimiento
Administración pública(5)
Ciencias de la computación(4)
Política pública(3)
Auditoría(2)
Base de datos(1)
Origen
scopus(15)
An approach of cyberattacks with the use of social networks and communication media for public organizations of the ecuador
Conference ObjectAbstract: An analysis was carried out of several cyber-attack methods that use Social Networks and Media as thPalabras claves:Cyber Security, Security Information, SOCIAL NETWORKSAutores:Dhilan Torres Tapia, Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta ToapantaFuentes:scopusAn approach of national and international cybersecurity laws and standards to mitigate information risks in public organizations of ecuador
Conference ObjectAbstract: Today, cybersecurity is very important, and Ecuador could suffer serious security problems that woulPalabras claves:CYBERSECURITY, INFORMATION, laws, risks, security of the information, StandardsAutores:Alexander Jimenez Gurumendi, Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta ToapantaFuentes:scopusAnalysis of appropriate standards to solve cybersecurity problems in public organizations
Conference ObjectAbstract: The development of ICTs in the globalized world has forced countries to develop problems or implemenPalabras claves:Directrices de seguridad, Estándares ciberseguridad, ORGANIZACIONES PÚBLICASAutores:E. Gustavo Salomon Gaibor, Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta ToapantaFuentes:scopusAnalysis of cybersecurity models suitable to apply in an electoral process in ecuador
Conference ObjectAbstract: Were analyzed different cybersecurity proposals to protect information, such as models, prototypes,Palabras claves:cyberattack, Cybersecurity Models, Electoral Process, Security Information, Threat modelAutores:Luis Enrique Mafla Gallegos, Manuel Agustin Aycart Armijos, Segundo Moisés Toapanta ToapantaFuentes:scopusA cyber environment approach to mitigate vulnerabilities and threats in an electoral process in ecuador
Conference ObjectAbstract: The problems of information security in the cyber environment regarding vulnerabilities and threatsPalabras claves:Computer security, Cyber environment, Threats, vulnerabilitiesAutores:Luis Enrique Mafla Gallegos, Marjorie Noemi Isanoa Sinche, Segundo Moisés Toapanta ToapantaFuentes:scopusCybersecurity analysis to determine the impact on the social area in Latin America and the caribbean
Conference ObjectAbstract: This document presents an introduction to the events that occurred in Latin America and the CaribbeaPalabras claves:Caribbean, Cyber threats, Cyber-attacks, Cyber-resilience, CYBERSECURITY, Latin AmericaAutores:Jorge Mario Estrella Jaramillo, Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta ToapantaFuentes:scopusDefinition of a Prototype for Performing Computer Audits in a Public Organization of Ecuador
Conference ObjectAbstract: The development of a prototype of computer audits has become more important for the administration aPalabras claves:Audit Public, Information technology, IT, organization, PrototypeAutores:Luis Enrique Mafla Gallegos, Sandra Elizabeth Marquez Ortiz, Segundo Moisés Toapanta ToapantaFuentes:scopusDefinition of parameters to perform audit in cybersecurity for public one organization of ecuador
Conference ObjectAbstract: Ecuador's constant technological growth is evident in recent years, great efforts have been devotedPalabras claves:Auditorium, cyberattack, CYBERSECURITY, Entities, Evaluation, measures, risksAutores:Luis Enrique Mafla Gallegos, Nahim Alexander Peralta, Segundo Moisés Toapanta ToapantaFuentes:scopusAppropriate Security Algorithms to Mitigate the Risks in a Database of the National Customs Service of Ecuador
Conference ObjectAbstract: Currently, the use of technological resources, within public and private institutions, has become esPalabras claves:Computer security, Computer Theft, Encrypted Algorithms, Risk managementAutores:Karen Lissette Ponce Astudillo, Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta ToapantaFuentes:scopusAn Approach of Security Model to Mitigate Risk of Cyberattacks on Public Institutions in Ecuador
Conference ObjectAbstract: Security problems due to cyberattacks were analyzed, checked security models designed to protect andPalabras claves:Cyber-attacks, Information risk, Public institutions, Risk mitigation, security of the informationAutores:Dario Dario Fernando Huilcapi, Luis Enrique Mafla Gallegos, Peter S.Muñoz Campuzano, Segundo Moisés Toapanta ToapantaFuentes:scopus