Abstract: Currently, the use of technological resources, within public and private institutions, has become es
Palabras claves: Computer security, Computer Theft, Encrypted Algorithms, Risk management
Autores: Karen Lissette Ponce Astudillo, Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta Toapanta