Análisis de la influencia de los ciberataques para la generación de políticas públicas en el Ecuador en el ámbito de la gobernanza del Internet.

In Ecuador, according to the Constitution of the Republic in article 313 it considers telecommunications as part of the strategic sector and as such, the state has the right to administer, regulate, control, and manage said sector. Also, it was determinate that access to information is a right of ci...

全面介绍

Saved in:
书目详细资料
主要作者: Ernesto Acaro, Hugo Gallegos (author)
格式: masterThesis
语言:spa
出版: 2023
主题:
在线阅读:https://dspace.unl.edu.ec/jspui/handle/123456789/27124
标签: 添加标签
没有标签, 成为第一个标记此记录!
实物特征
总结:In Ecuador, according to the Constitution of the Republic in article 313 it considers telecommunications as part of the strategic sector and as such, the state has the right to administer, regulate, control, and manage said sector. Also, it was determinate that access to information is a right of citizens, however, access to information through the Internet implies that special care must be taken with all data due to the digital footprint that we leave in cyberspace. This is important because our personal data is a very valuable resource and we must take all precautionary measures to protect it. Since information today is exposed and relatively easy to access through the Internet, various legal tools are required to protect citizens and ensure their security against cyber-attacks. These attacks are constantly evolving and improving along with technology, so it has been determined that legal instruments must adapt to these changes to significantly mitigate attacks and protect citizens. For this purpose, laws written in our country regarding the protection of users will be examined, such as the Organic Law of Telecomunications, the Organic Law of Protection of Personal Data and the National Cyber security strategy of Ecuador. This will make it possible to generate public policies in the field of Internet governance, which will result in proposals to improve the national security strategy. Keywords: Cyber-attacks, Internet governance, cybersecurity, public policies, multistake-holder model, cyberspace.