Mostrando 2 resultados de: 2
Filtros aplicados
Publisher
Lecture Notes in Networks and Systems(1)
RISTI - Revista Iberica de Sistemas e Tecnologias de Informacao(1)
Comparative analysis between different methodologies for performing computer security audits, applying the hierarchical analytical process (Ahp).
ArticleAbstract: Due to the threats and risks to which IT assets are exposed in organizations, it becomes very importPalabras claves:AHP, availability, Confidentiality, Integrity, Methodology, OsstmmAutores:Jorge Herrera-Tapia, Juan Carlos Sendón-Varela, Leonardo Chancay-García, Lytyet Fernández-Capestany, Marely Del Rosario Cruz-Felipe, Washington Xavier Garcia-QuilachaminFuentes:scopusSecurity Mechanisms and Log Correlation Systems
Conference ObjectAbstract: This study proposes several security measures to protect the integrity of the information and avoidPalabras claves:CYBERSECURITY, Cybersecurity strategy, Cyberspace, log, SIEMAutores:Cesar Moreira-Zambrano, Jose Villacreses-Chancay, Josselyn Pita-Valencia, Josselyn Stefania Pita Valencia, Leonardo Chancay-García, Mora-Cruzatty A.Fuentes:googlescopus