Análisis de los protocolos de seguridad de la información en el Departamento de Catastros de Gad en la Cuidad de Jujan
Institutions or entities, regardless of their type, manage large amounts of data regarding their functions, giving way to the preparation of contingent protocols to protect different vulnerabilities. The objective of this investigation was aimed at analyzing information threats in the Department of...
שמור ב:
| מחבר ראשי: | |
|---|---|
| פורמט: | bachelorThesis |
| יצא לאור: |
2020
|
| נושאים: | |
| גישה מקוונת: | http://dspace.utb.edu.ec/handle/49000/7693 |
| תגים: |
הוספת תג
אין תגיות, היה/י הראשונ/ה לתייג את הרשומה!
|
| _version_ | 1859044673549500416 |
|---|---|
| author | Ronquillo Huacón, María Fernanda |
| author_facet | Ronquillo Huacón, María Fernanda |
| author_role | author |
| collection | Repositorio Universidad Técnica de Babahoyo |
| dc.contributor.none.fl_str_mv | Ramos Morocho, Raúl Armando |
| dc.creator.none.fl_str_mv | Ronquillo Huacón, María Fernanda |
| dc.date.none.fl_str_mv | 2020-05-03T20:36:43Z 2020-05-03T20:36:43Z 2020 |
| dc.format.none.fl_str_mv | 28 p. application/pdf |
| dc.identifier.none.fl_str_mv | http://dspace.utb.edu.ec/handle/49000/7693 |
| dc.language.none.fl_str_mv | es |
| dc.publisher.none.fl_str_mv | Babahoyo, UTB - FAFI 2020 |
| dc.rights.none.fl_str_mv | Atribución-NoComercial-SinDerivadas 3.0 Ecuador http://creativecommons.org/licenses/by-nc-nd/3.0/ec/ info:eu-repo/semantics/openAccess |
| dc.source.none.fl_str_mv | reponame:Repositorio Universidad Técnica de Babahoyo instname:Universidad Técnica de Babahoyo instacron:UTB |
| dc.subject.none.fl_str_mv | Información Seguridad informática Amenazas Salvaguardas Controles sistemáticos |
| dc.title.none.fl_str_mv | Análisis de los protocolos de seguridad de la información en el Departamento de Catastros de Gad en la Cuidad de Jujan |
| dc.type.none.fl_str_mv | info:eu-repo/semantics/publishedVersion info:eu-repo/semantics/bachelorThesis |
| description | Institutions or entities, regardless of their type, manage large amounts of data regarding their functions, giving way to the preparation of contingent protocols to protect different vulnerabilities. The objective of this investigation was aimed at analyzing information threats in the Department of Appraisals and Cadastre of the Municipal Autonomous Decentralized Government of the Canton Alfredo Baquerizo Moreno (Jujan) to adapt the systematic controls of computer security of ISO 27002 standard supported by the magerit methodology of the Ear / Pilar application (risk analysis and management system). Given the quantitative nature of our exploration, we opted for explanatory and descriptive research in each process of collecting foundations, and the survey technique directed at administrative personnel was also used. The result determined the importance of using a web server, expanding the collection windows, acquiring filing cabinets to protect the printed documents, obtaining an electric generator, the stability of the internet service and the protection of computer systems, both hardware and software. In conclusion, it has been possible to optimize the attention of the department in terms of its users, the risk index in the treatment and care of the information improved considerably. |
| eu_rights_str_mv | openAccess |
| format | bachelorThesis |
| id | UTB_45f0c1820bc4a28ad007ee51dfbe7893 |
| instacron_str | UTB |
| institution | UTB |
| instname_str | Universidad Técnica de Babahoyo |
| language_invalid_str_mv | es |
| network_acronym_str | UTB |
| network_name_str | Repositorio Universidad Técnica de Babahoyo |
| oai_identifier_str | oai:dspace.utb.edu.ec:49000/7693 |
| publishDate | 2020 |
| publisher.none.fl_str_mv | Babahoyo, UTB - FAFI 2020 |
| reponame_str | Repositorio Universidad Técnica de Babahoyo |
| repository.mail.fl_str_mv | . |
| repository.name.fl_str_mv | Repositorio Universidad Técnica de Babahoyo - Universidad Técnica de Babahoyo |
| repository_id_str | 0 |
| rights_invalid_str_mv | Atribución-NoComercial-SinDerivadas 3.0 Ecuador http://creativecommons.org/licenses/by-nc-nd/3.0/ec/ |
| spelling | Análisis de los protocolos de seguridad de la información en el Departamento de Catastros de Gad en la Cuidad de JujanRonquillo Huacón, María FernandaInformaciónSeguridad informáticaAmenazasSalvaguardasControles sistemáticosInstitutions or entities, regardless of their type, manage large amounts of data regarding their functions, giving way to the preparation of contingent protocols to protect different vulnerabilities. The objective of this investigation was aimed at analyzing information threats in the Department of Appraisals and Cadastre of the Municipal Autonomous Decentralized Government of the Canton Alfredo Baquerizo Moreno (Jujan) to adapt the systematic controls of computer security of ISO 27002 standard supported by the magerit methodology of the Ear / Pilar application (risk analysis and management system). Given the quantitative nature of our exploration, we opted for explanatory and descriptive research in each process of collecting foundations, and the survey technique directed at administrative personnel was also used. The result determined the importance of using a web server, expanding the collection windows, acquiring filing cabinets to protect the printed documents, obtaining an electric generator, the stability of the internet service and the protection of computer systems, both hardware and software. In conclusion, it has been possible to optimize the attention of the department in terms of its users, the risk index in the treatment and care of the information improved considerably.Institutions or entities, regardless of their type, manage large amounts of data regarding their functions, giving way to the preparation of contingent protocols to protect different vulnerabilities. The objective of this investigation was aimed at analyzing information threats in the Department of Appraisals and Cadastre of the Municipal Autonomous Decentralized Government of the Canton Alfredo Baquerizo Moreno (Jujan) to adapt the systematic controls of computer security of ISO 27002 standard supported by the magerit methodology of the Ear / Pilar application (risk analysis and management system). Given the quantitative nature of our exploration, we opted for explanatory and descriptive research in each process of collecting foundations, and the survey technique directed at administrative personnel was also used. The result determined the importance of using a web server, expanding the collection windows, acquiring filing cabinets to protect the printed documents, obtaining an electric generator, the stability of the internet service and the protection of computer systems, both hardware and software. In conclusion, it has been possible to optimize the attention of the department in terms of its users, the risk index in the treatment and care of the information improved considerably.Las instituciones o entidades sin importar su tipo gestionan grandes cantidades de datos referentes a sus funciones, dando paso a la elaboración de protocolos contingentes en protección a las diferentes vulnerabilidades. El objetivo de esta indagación estuvo encaminada en analizar las amenazas de la información en el Departamento de la Avalúos y Catastro del Gobierno Autónomo Descentralizado Municipal del Cantón Alfredo Baquerizo Moreno (Jujan) para adaptar los controles sistemáticos de seguridad informática de la norma ISO 27002 sustentados en la metodología magerit de la aplicación Ear/Pilar (sistema de análisis y gestión de riesgos). Dada la naturaleza cuantitativa de nuestra exploración, optamos por la investigación explicativa y descriptiva en cada proceso de recolección de fundamentos, además se utilizó la técnica de encuesta dirigida al personal administrativo. En el resultado se determinaron la importancia de usar un servidor web, ampliar las ventanillas de recaudación, adquirir archivadores para precautelar los documentos impresos, obtener un generador eléctrico, la estabilidad del servicio de internet y la protección de los sistemas de cómputo tanto de hardware como software. En conclusión se ha alcanzado optimizar la atención del departamento en cuanto a sus usuarios, el índice de riesgo en el tratamiento y cuidado de la información mejoro de manera considerable.Babahoyo, UTB - FAFI 2020Ramos Morocho, Raúl Armando2020-05-03T20:36:43Z2020-05-03T20:36:43Z2020info:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/bachelorThesis28 p.application/pdfhttp://dspace.utb.edu.ec/handle/49000/7693esAtribución-NoComercial-SinDerivadas 3.0 Ecuadorhttp://creativecommons.org/licenses/by-nc-nd/3.0/ec/info:eu-repo/semantics/openAccessreponame:Repositorio Universidad Técnica de Babahoyoinstname:Universidad Técnica de Babahoyoinstacron:UTB2022-02-08T08:01:40Zoai:dspace.utb.edu.ec:49000/7693Institucionalhttp://dspace.utb.edu.ec/Universidad públicahttps://utb.edu.ec/http://dspace.utb.edu.ec/oai.Ecuador...opendoar:02026-03-07T22:26:35.887424Repositorio Universidad Técnica de Babahoyo - Universidad Técnica de Babahoyotrue |
| spellingShingle | Análisis de los protocolos de seguridad de la información en el Departamento de Catastros de Gad en la Cuidad de Jujan Ronquillo Huacón, María Fernanda Información Seguridad informática Amenazas Salvaguardas Controles sistemáticos |
| status_str | publishedVersion |
| title | Análisis de los protocolos de seguridad de la información en el Departamento de Catastros de Gad en la Cuidad de Jujan |
| title_full | Análisis de los protocolos de seguridad de la información en el Departamento de Catastros de Gad en la Cuidad de Jujan |
| title_fullStr | Análisis de los protocolos de seguridad de la información en el Departamento de Catastros de Gad en la Cuidad de Jujan |
| title_full_unstemmed | Análisis de los protocolos de seguridad de la información en el Departamento de Catastros de Gad en la Cuidad de Jujan |
| title_short | Análisis de los protocolos de seguridad de la información en el Departamento de Catastros de Gad en la Cuidad de Jujan |
| title_sort | Análisis de los protocolos de seguridad de la información en el Departamento de Catastros de Gad en la Cuidad de Jujan |
| topic | Información Seguridad informática Amenazas Salvaguardas Controles sistemáticos |
| url | http://dspace.utb.edu.ec/handle/49000/7693 |