Mostrando 6 resultados de: 6
Filtros aplicados
Subtipo de publicación
Conference Object(6)
Publisher
Iberian Conference on Information Systems and Technologies, CISTI(3)
Smart Innovation, Systems and Technologies(2)
Advances in Intelligent Systems and Computing(1)
Cybercrime in Ecuador, an exploration, which allows to define national cybersecurity policies
Conference ObjectAbstract: The widespread use of the Internet and cyberspace has allowed the development of new criminal formsPalabras claves:CYBERCRIME, CYBERSECURITY, Organisms, Politics, securityAutores:Javier F. Díaz, Marco Bonilla, Ron M., Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusCybersecurity Baseline, An Exploration, Which Permits to Delineate National Cybersecurity Strategy in Ecuador
Conference ObjectAbstract: Information and Communication Technologies entails risks inherent to their use, which must be treatePalabras claves:baseline, CYBERSECURITY, ECUADOR, organizations, POLICYAutores:Javier F. Díaz, Oswaldo Rivera, Ron M., Theofilos Toulkeridis, Walter FuertesFuentes:scopusApplicability of cybersecurity standards in Ecuador - A field exploration
Conference ObjectAbstract: The evolution of information and communications technology (ICT) as well as cyberspace, walks alongPalabras claves:CYBERSECURITY, HAZARD, National policy, Risk reduction, SYSTEMAutores:Javier F. Díaz, Marco Bonilla, Ron M., Theofilos Toulkeridis, Walter FuertesFuentes:scopusNational Cybersecurity Strategy for Developing Countries : Case study: Ecuador proposal
Conference ObjectAbstract: The use of Information and Communication Technologies maintains inherent risks that affect the procePalabras claves:CYBERSECURITY, GOOD PRACTICES, National Strategies, risksAutores:David Molina, Geovanni Ninahualpa Quiña, Javier F. Díaz, Mario Bernabe Ron Egas, Ninahuelpa G., Ron M.Fuentes:scopusNational cyber-security policies oriented to BYOD (bring your own device): Systematic review
Conference ObjectAbstract: There are some corporate policies in most of companies around the world, focus on mobile devices toPalabras claves:Bring your own devices, CYBERSECURITY, Impact of using BYOD, risks, vulnerabilitiesAutores:Andrea Vaca Herrera, Ron M., Silva-Rabadao C.Fuentes:scopusSituational status of global cybersecurity and cyber defense according to global indicators. Adaptation of a model for Ecuador
Conference ObjectAbstract: The aim of this study has been to establish a Cybersecurity and Cyber defense model in Ecuador, basePalabras claves:Cyber defense, CYBERSECURITY, GCI, ICS, ISMS, ItuAutores:Fabián Bustamante, Ron M., Theofilos Tulkebkp_redis, Walter FuertesFuentes:scopus