Mostrando 5 resultados de: 5
Subtipo de publicación
Conference Object(5)
Publisher
Smart Innovation, Systems and Technologies(3)
Iberian Conference on Information Systems and Technologies, CISTI(2)
Cybercrime in Ecuador, an exploration, which allows to define national cybersecurity policies
Conference ObjectAbstract: The widespread use of the Internet and cyberspace has allowed the development of new criminal formsPalabras claves:CYBERCRIME, CYBERSECURITY, Organisms, Politics, securityAutores:Javier F. Díaz, Marco Bonilla, Ron M., Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusApplicability of cybersecurity standards in Ecuador - A field exploration
Conference ObjectAbstract: The evolution of information and communications technology (ICT) as well as cyberspace, walks alongPalabras claves:CYBERSECURITY, HAZARD, National policy, Risk reduction, SYSTEMAutores:Javier F. Díaz, Marco Bonilla, Ron M., Theofilos Toulkeridis, Walter FuertesFuentes:scopusNational cyber-security policies oriented to BYOD (bring your own device): Systematic review
Conference ObjectAbstract: There are some corporate policies in most of companies around the world, focus on mobile devices toPalabras claves:Bring your own devices, CYBERSECURITY, Impact of using BYOD, risks, vulnerabilitiesAutores:Andrea Vaca Herrera, Ron M., Silva-Rabadao C.Fuentes:scopusImpact of Social Engineering Attacks: A Literature Review
Conference ObjectAbstract: Social engineering is the practice, which allows attackers to obtain sensitive or confidential inforPalabras claves:impact, Phishing, Social engineering attacks, vulnerabilityAutores:CARLOS ANDRES ESTRADA VASQUEZ, Diana Arévalo, Eduardo Benavides-Astudillo, Félix Oscar Fernández-Peña, Joyce Denisse Castro, Roberto Omar Andrade, Ron M., Walter FuertesFuentes:scopusSituational status of global cybersecurity and cyber defense according to global indicators. Adaptation of a model for Ecuador
Conference ObjectAbstract: The aim of this study has been to establish a Cybersecurity and Cyber defense model in Ecuador, basePalabras claves:Cyber defense, CYBERSECURITY, GCI, ICS, ISMS, ItuAutores:Fabián Bustamante, Ron M., Theofilos Tulkebkp_redis, Walter FuertesFuentes:scopus