Authentication, Authorization, Administration and Audit Impact on Digital Security

We can say technological security is in constant change. Security is constantly changing by the industry, because it is necessary to improve the integrity of technological security. These changes in technology come with new methods, processes, and technologies which lead to the need to be ahead in t...

Celý popis

Uloženo v:
Podrobná bibliografie
Hlavní autor: Navarro, Fauricio Alban Conejo (author)
Další autoři: García, Melvin (author), Jadán-Guerrero, Janio (author)
Médium: article
Jazyk:eng
Vydáno: 2024
On-line přístup:https://link.springer.com/chapter/10.1007/978-3-031-45642-8_18
https://hdl.handle.net/20.500.14809/6956
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
_version_ 1859049546691117056
author Navarro, Fauricio Alban Conejo
author2 García, Melvin
Jadán-Guerrero, Janio
author2_role author
author
author_facet Navarro, Fauricio Alban Conejo
García, Melvin
Jadán-Guerrero, Janio
author_role author
collection Repositorio Universidad Tecnológica Indoamérica
dc.creator.none.fl_str_mv Navarro, Fauricio Alban Conejo
García, Melvin
Jadán-Guerrero, Janio
dc.date.none.fl_str_mv 2024-07-29T20:16:13Z
2024-07-29T20:16:13Z
2024
dc.identifier.none.fl_str_mv https://link.springer.com/chapter/10.1007/978-3-031-45642-8_18
https://hdl.handle.net/20.500.14809/6956
dc.language.none.fl_str_mv eng
dc.publisher.none.fl_str_mv Lecture Notes in Networks and Systems. Volume 799 LNNS, Pages 187 - 193
dc.rights.none.fl_str_mv https://creativecommons.org/licenses/by/4.0/
info:eu-repo/semantics/openAccess
dc.source.none.fl_str_mv reponame:Repositorio Universidad Tecnológica Indoamérica
instname:Universidad Tecnológica Indoamérica
instacron:UTI
dc.title.none.fl_str_mv Authentication, Authorization, Administration and Audit Impact on Digital Security
dc.type.none.fl_str_mv info:eu-repo/semantics/publishedVersion
info:eu-repo/semantics/article
description We can say technological security is in constant change. Security is constantly changing by the industry, because it is necessary to improve the integrity of technological security. These changes in technology come with new methods, processes, and technologies which lead to the need to be ahead in the new trends. The AAAA (Authentication, Authorization, Administration, Audit) is a topic of great relevance in organizations, it is a matter for everyone. This paper attempts to evaluate the variation presented in the Access Management after implementing digital security plans. The evaluation is visualized as an accompaniment for the improvement of the effectiveness in future decisions-making processes. The result of this analysis aims to find new improvement opportunities, due to the positive impact to growth in this field. The intention is to close the gap between the financial and technological security issues. Nowadays these issues are evaluated individually, and we pretend to unify these subjects.
eu_rights_str_mv openAccess
format article
id UTI_c216e27f4d7b7f8052baedcc8172d2d7
instacron_str UTI
institution UTI
instname_str Universidad Tecnológica Indoamérica
language eng
network_acronym_str UTI
network_name_str Repositorio Universidad Tecnológica Indoamérica
oai_identifier_str oai:repositorio.uti.edu.ec:20.500.14809/6956
publishDate 2024
publisher.none.fl_str_mv Lecture Notes in Networks and Systems. Volume 799 LNNS, Pages 187 - 193
reponame_str Repositorio Universidad Tecnológica Indoamérica
repository.mail.fl_str_mv .
repository.name.fl_str_mv Repositorio Universidad Tecnológica Indoamérica - Universidad Tecnológica Indoamérica
repository_id_str 0
rights_invalid_str_mv https://creativecommons.org/licenses/by/4.0/
spelling Authentication, Authorization, Administration and Audit Impact on Digital SecurityNavarro, Fauricio Alban ConejoGarcía, MelvinJadán-Guerrero, JanioWe can say technological security is in constant change. Security is constantly changing by the industry, because it is necessary to improve the integrity of technological security. These changes in technology come with new methods, processes, and technologies which lead to the need to be ahead in the new trends. The AAAA (Authentication, Authorization, Administration, Audit) is a topic of great relevance in organizations, it is a matter for everyone. This paper attempts to evaluate the variation presented in the Access Management after implementing digital security plans. The evaluation is visualized as an accompaniment for the improvement of the effectiveness in future decisions-making processes. The result of this analysis aims to find new improvement opportunities, due to the positive impact to growth in this field. The intention is to close the gap between the financial and technological security issues. Nowadays these issues are evaluated individually, and we pretend to unify these subjects.Lecture Notes in Networks and Systems. Volume 799 LNNS, Pages 187 - 1932024-07-29T20:16:13Z2024-07-29T20:16:13Z2024info:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/articlehttps://link.springer.com/chapter/10.1007/978-3-031-45642-8_18https://hdl.handle.net/20.500.14809/6956enghttps://creativecommons.org/licenses/by/4.0/info:eu-repo/semantics/openAccessreponame:Repositorio Universidad Tecnológica Indoaméricainstname:Universidad Tecnológica Indoaméricainstacron:UTI2024-11-07T14:27:33Zoai:repositorio.uti.edu.ec:20.500.14809/6956Institucionalhttps://repositorio.uti.edu.ec/Institución privadahttps://indoamerica.edu.ec/https://repositorio.uti.edu.ec/oai.Ecuador...opendoar:02024-11-07T14:27:33Repositorio Universidad Tecnológica Indoamérica - Universidad Tecnológica Indoaméricafalse
spellingShingle Authentication, Authorization, Administration and Audit Impact on Digital Security
Navarro, Fauricio Alban Conejo
status_str publishedVersion
title Authentication, Authorization, Administration and Audit Impact on Digital Security
title_full Authentication, Authorization, Administration and Audit Impact on Digital Security
title_fullStr Authentication, Authorization, Administration and Audit Impact on Digital Security
title_full_unstemmed Authentication, Authorization, Administration and Audit Impact on Digital Security
title_short Authentication, Authorization, Administration and Audit Impact on Digital Security
title_sort Authentication, Authorization, Administration and Audit Impact on Digital Security
url https://link.springer.com/chapter/10.1007/978-3-031-45642-8_18
https://hdl.handle.net/20.500.14809/6956