Mostrando 10 resultados de: 40
Filtros aplicados
Publisher
Proceedings - 3rd International Conference on Information and Computer Technologies, ICICT 2020(8)
ACM International Conference Proceeding Series(7)
Advances in Science, Technology and Engineering Systems(4)
Frontiers in Artificial Intelligence and Applications(4)
Proceedings of the World Conference on Smart Trends in Systems, Security and Sustainability, WS4 2020(4)
Área temáticas
Programación informática, programas, datos, seguridad(19)
Dirección general(11)
Funcionamiento de bibliotecas y archivos(11)
Criminología(6)
Administración pública(5)
Blockchain analysis applied to a process for the national public data system for Ecuador
Conference ObjectAbstract: Were analyzed the implementation of a Blockchain model for the national public data system. The probPalabras claves:BLOCKCHAIN, ETHEREUM, HYPERLEDGER, National system, Public dataAutores:Fabrizio Triviño, Mafla Gallegos L.E., Ordonez Baldeon P., Segundo Moisés Toapanta Toapanta, Trivino Trivino F.D.Fuentes:googlescopusAnalysis for the adoption of security standards to improve the management of securities in public organizations
Conference ObjectAbstract: Public organizations have the ongoing task of properly managing the security of the information theyPalabras claves:information security, PUBLIC ORGANIZATION, Security management, Security standardsAutores:Joe Llerena-Izquierdo, Luis Enrique Mafla Gallegos, Madeleine Lilibeth Alvarado Ronquillo, Ronquillo M.L.A., Segundo Moisés Toapanta Toapanta, Zezzatti A.O.Fuentes:rraaescopusAnalysis for the evaluation and security management of a database in a public organization to mitigate cyber attacks
ArticleAbstract: In data handling, security and privacy are essential for database administrators and users that ownPalabras claves:BLOCKCHAIN, Cyber attacks, Cyber Security, Data Base, PUBLIC ORGANIZATIONAutores:Escalante Quimis O.A., Maciel Arellano M.R., Mafla Gallegos L.E., Segundo Moisés Toapanta ToapantaFuentes:scopusAnalysis of Adequate Bandwidths to Guarantee an Electoral Process in Ecuador
Conference ObjectAbstract: The analysis of the appropriate bandwidths was made based on the electoral processes in countries wiPalabras claves:bandwidth, Electoral Process, Electoral processes, Protocols security, Security InformationAutores:Johan Eduardo Aguilar Piguave, Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta ToapantaFuentes:scopusAnalysis of adequate security algorithms oriented to cybersecurity management for a distributed architecture
Conference ObjectAbstract: It was analyzed an environment between the references of certain security models and algorithms basePalabras claves:Access Control, CYBERSECURITY, Distributed architecture, DISTRIBUTED SYSTEMS, Security algorithmAutores:Christian Andres Orozco Bonilla, Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta ToapantaFuentes:scopusAnalysis of appropriate standards to solve cybersecurity problems in public organizations
Conference ObjectAbstract: The development of ICTs in the globalized world has forced countries to develop problems or implemenPalabras claves:Directrices de seguridad, Estándares ciberseguridad, ORGANIZACIONES PÚBLICASAutores:E. Gustavo Salomon Gaibor, Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta ToapantaFuentes:scopusAnalysis of cyberattacks in public organizations in Latin America
ArticleAbstract: It was analyzed certain information about cyberattacks in Latin America and methods to counteract thPalabras claves:cyberattack, CYBERSECURITY, Denial of Service, Minimize he attack, PUBLIC ORGANIZATIONAutores:José David López Cobeña, Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta ToapantaFuentes:scopusAnalysis of models of security to mitigate the risks, vulnerabilities and threats in a company of services of telecommunications
Conference ObjectAbstract: Different models in Information and Communication Technologies were analyzed for the creation of anPalabras claves:Matrix risks, Security Information, Security models, Telecommunications companies, vulnerabilitiesAutores:Chevez Moran M.J., Javier Gonzalo Ortiz Rojas, Mafla Gallegos L.E., Segundo Moisés Toapanta ToapantaFuentes:scopusAnalysis of new technologies in information security to mitigate data risks in a public organization
Conference ObjectAbstract: Were analyzed references on alternative technologies or new proposals to help mitigate data risks. TPalabras claves:foreign trade, information security, Mitigate the risks, New TechnologiesAutores:Javier Gonzalo Ortiz Rojas, Mafla Gallegos L.E., Medina Lara M.D., Segundo Moisés Toapanta ToapantaFuentes:googlescopusAnalysis of security mechanisms to mitigate hacker attacks to improve e-commerce management in Ecuador
Conference ObjectAbstract: The problem that was chosen for the elaboration of this scientific article, is the distrust on the pPalabras claves:Cyber attacks, electronic commerce, ETHICAL HACKING, Multi-factor authentication, vulnerabilityAutores:Bertha Alice Naranjo Sanchez, Bertha Naranjo Sanchez, Mafla Gallegos L.E., Mera Caicedo H.A., Segundo Moisés Toapanta ToapantaFuentes:googlescopus