Mostrando 10 resultados de: 26
Filtros aplicados
Publisher
ACM International Conference Proceeding Series(7)
Frontiers in Artificial Intelligence and Applications(4)
Advances in Science, Technology and Engineering Systems(2)
Proceedings - 3rd International Conference on Information and Computer Technologies, ICICT 2020(2)
2020 Asia Conference on Computers and Communications, ACCC 2020(1)
Área temáticas
Dirección general(6)
Programación informática, programas, datos, seguridad(4)
Administración pública(3)
Administración pública y ciencia militar(3)
Ciencia militar(2)
An approach of cyberattacks with the use of social networks and communication media for public organizations of the ecuador
Conference ObjectAbstract: An analysis was carried out of several cyber-attack methods that use Social Networks and Media as thPalabras claves:Cyber Security, Security Information, SOCIAL NETWORKSAutores:Dhilan Torres Tapia, Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta ToapantaFuentes:scopusAn approach of models of information technologies suitable to optimize management in a public organization of Ecuador
Conference ObjectAbstract: Public institutions in Ecuador have problems to optimize the management of ICT in an appropriate andPalabras claves:Appropriate Models, Implementation of ICTs, management, Optimization of IT resources, PROCESS, Public Institutions of EcuadorAutores:Danny Wilfrido Barona Valencia, Luis Enrique Mafla Gallegos, Melania Alejandra Prado Sánchez, Segundo Moisés Toapanta ToapantaFuentes:scopusAn approach of national and international cybersecurity laws and standards to mitigate information risks in public organizations of ecuador
Conference ObjectAbstract: Today, cybersecurity is very important, and Ecuador could suffer serious security problems that woulPalabras claves:CYBERSECURITY, INFORMATION, laws, risks, security of the information, StandardsAutores:Alexander Jimenez Gurumendi, Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta ToapantaFuentes:scopusAn information security management approach for an electoral process in Ecuador
Conference ObjectAbstract: Different models in Information and Communication Technologies(TICS) were analyzed as an alternativePalabras claves:BLOCKCHAIN, Blockchain Network, digital identity, HYPERLEDGER, PUBLIC ORGANIZATIONAutores:Bertha Alice Naranjo Sanchez, Carrillo A.P.V., Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta ToapantaFuentes:scopusAnalysis for the adoption of security standards to improve the management of securities in public organizations
Conference ObjectAbstract: Public organizations have the ongoing task of properly managing the security of the information theyPalabras claves:information security, PUBLIC ORGANIZATION, Security management, Security standardsAutores:Joe Llerena-Izquierdo, Luis Enrique Mafla Gallegos, Madeleine Lilibeth Alvarado Ronquillo, Ronquillo M.L.A., Segundo Moisés Toapanta Toapanta, Zezzatti A.O.Fuentes:rraaescopusAnalysis for the evaluation and security management of a database in a public organization to mitigate cyber attacks
ArticleAbstract: In data handling, security and privacy are essential for database administrators and users that ownPalabras claves:BLOCKCHAIN, Cyber attacks, Cyber Security, Data Base, PUBLIC ORGANIZATIONAutores:Escalante Quimis O.A., Maciel Arellano M.R., Mafla Gallegos L.E., Segundo Moisés Toapanta ToapantaFuentes:scopusAnalysis of HIPAA for adopt in the information security in the civil registry of the ecuador
Conference ObjectAbstract: It was determined that institutions, public and private worldwide have problems in confidentiality,Palabras claves:algorithm, Data integrity, HIPAA, MD5, Security InformationAutores:Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta Toapanta, Stefany Joan Moran Paredes, Trejo J.A.O.Fuentes:scopusAnalysis of adequate security algorithms oriented to cybersecurity management for a distributed architecture
Conference ObjectAbstract: It was analyzed an environment between the references of certain security models and algorithms basePalabras claves:Access Control, CYBERSECURITY, Distributed architecture, DISTRIBUTED SYSTEMS, Security algorithmAutores:Christian Andres Orozco Bonilla, Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta ToapantaFuentes:scopusAnalysis of models of security to mitigate the risks, vulnerabilities and threats in a company of services of telecommunications
Conference ObjectAbstract: Different models in Information and Communication Technologies were analyzed for the creation of anPalabras claves:Matrix risks, Security Information, Security models, Telecommunications companies, vulnerabilitiesAutores:Chevez Moran M.J., Javier Gonzalo Ortiz Rojas, Mafla Gallegos L.E., Segundo Moisés Toapanta ToapantaFuentes:scopusAnalysis of new technologies in information security to mitigate data risks in a public organization
Conference ObjectAbstract: Were analyzed references on alternative technologies or new proposals to help mitigate data risks. TPalabras claves:foreign trade, information security, Mitigate the risks, New TechnologiesAutores:Javier Gonzalo Ortiz Rojas, Mafla Gallegos L.E., Medina Lara M.D., Segundo Moisés Toapanta ToapantaFuentes:googlescopus