Mostrando 10 resultados de: 12
Filtros aplicados
Subtipo de publicación
Conference Object(12)
Publisher
Iberian Conference on Information Systems and Technologies, CISTI(3)
Smart Innovation, Systems and Technologies(3)
Advances in Intelligent Systems and Computing(2)
2016 3rd International Conference on eDemocracy and eGovernment, ICEDEG 2016(1)
25th World Multi-Conference on Systemics, Cybernetics and Informatics, WMSCI 2021(1)
Área temáticas
Programación informática, programas, datos, seguridad(5)
Relaciones internacionales(4)
Ciencia militar(3)
Criminología(3)
Funcionamiento de bibliotecas y archivos(3)
Área de conocimiento
Ciencias de la computación(4)
Política pública(3)
Ciencia política(1)
Relaciones internacionales(1)
Origen
google(2)
Cybercrime in Ecuador, an exploration, which allows to define national cybersecurity policies
Conference ObjectAbstract: The widespread use of the Internet and cyberspace has allowed the development of new criminal formsPalabras claves:CYBERCRIME, CYBERSECURITY, Organisms, Politics, securityAutores:Javier F. Díaz, Marco Bonilla, Ron M., Theofilos Toulkeridis, Walter Fuertes, Walter Marcelo Fuertes-DíazFuentes:googlescopusCybersecurity Baseline, An Exploration, Which Permits to Delineate National Cybersecurity Strategy in Ecuador
Conference ObjectAbstract: Information and Communication Technologies entails risks inherent to their use, which must be treatePalabras claves:baseline, CYBERSECURITY, ECUADOR, organizations, POLICYAutores:Javier F. Díaz, Oswaldo Rivera, Ron M., Theofilos Toulkeridis, Walter FuertesFuentes:scopusApplicability of cybersecurity standards in Ecuador - A field exploration
Conference ObjectAbstract: The evolution of information and communications technology (ICT) as well as cyberspace, walks alongPalabras claves:CYBERSECURITY, HAZARD, National policy, Risk reduction, SYSTEMAutores:Javier F. Díaz, Marco Bonilla, Ron M., Theofilos Toulkeridis, Walter FuertesFuentes:scopusDesign of an Academic CSIRT – A Proposal Based on Strategic Planning Principles
Conference ObjectAbstract: This work aims to design and implement an organizational model that supports the macro processes ofPalabras claves:Academic CSIRT, cert, Strategic planning processAutores:Daniel Nu˜nez-Agurto, Henry O. Cruz, Luis Recalde, Ricardo Carrera, Ron M., Tapia Freddy, Walter FuertesFuentes:scopusNational Cybersecurity Strategy for Developing Countries : Case study: Ecuador proposal
Conference ObjectAbstract: The use of Information and Communication Technologies maintains inherent risks that affect the procePalabras claves:CYBERSECURITY, GOOD PRACTICES, National Strategies, risksAutores:David Molina, Geovanni Ninahualpa Quiña, Javier F. Díaz, Mario Bernabe Ron Egas, Ninahuelpa G., Ron M.Fuentes:scopusNational cyber-security policies oriented to BYOD (bring your own device): Systematic review
Conference ObjectAbstract: There are some corporate policies in most of companies around the world, focus on mobile devices toPalabras claves:Bring your own devices, CYBERSECURITY, Impact of using BYOD, risks, vulnerabilitiesAutores:Andrea Vaca Herrera, Ron M., Silva-Rabadao C.Fuentes:scopusHow to develop a national cybersecurity strategy for developing countries. Ecuador case
Conference ObjectAbstract: The increase use of Information and Communication Technologies entails associated risks, which mustPalabras claves:GOOD PRACTICES, Methodological guide, Methodology, National Cybersecurity StrategyAutores:David Molina, Geovanni Ninahualpa Quiña, Javier F. Díaz, Ron M.Fuentes:scopusImpact of Social Engineering Attacks: A Literature Review
Conference ObjectAbstract: Social engineering is the practice, which allows attackers to obtain sensitive or confidential inforPalabras claves:impact, Phishing, Social engineering attacks, vulnerabilityAutores:CARLOS ANDRES ESTRADA VASQUEZ, Diana Arévalo, Eduardo Benavides-Astudillo, Félix Oscar Fernández-Peña, Joyce Denisse Castro, Roberto Omar Andrade, Ron M., Walter FuertesFuentes:scopusTowards a strategic resilience of applications through the NIST cybersecurity framework and the strategic alignment model (SAM)
Conference ObjectAbstract: The applications deployed to serve the users, are the result of the organizations strategic decisionPalabras claves:alignment, availability, NIST, SAMAutores:Alberto Belalcázar, Javier F. Díaz, Molinari L., Ron M.Fuentes:scopusPublic collaborative legislation: A case study of the ingenios act
Conference ObjectAbstract: Collaborative working environments have commonly been used by companies which also use information aPalabras claves:Collaborative Legislation, Collaborative Working Environments, eCollaboration, eDemocracy, eParticipation, Wiki LegislationAutores:Luis Terán, Ramírez R., Rina Pazos, Ron M., Spicher N.Fuentes:googlescopus