Authentication, Authorization, Administration and Audit Impact on Digital Security
We can say technological security is in constant change. Security is constantly changing by the industry, because it is necessary to improve the integrity of technological security. These changes in technology come with new methods, processes, and technologies which lead to the need to be ahead in t...
Uloženo v:
| Hlavní autor: | |
|---|---|
| Další autoři: | , |
| Médium: | article |
| Jazyk: | eng |
| Vydáno: |
2024
|
| On-line přístup: | https://link.springer.com/chapter/10.1007/978-3-031-45642-8_18 https://hdl.handle.net/20.500.14809/6956 |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| _version_ | 1859049546691117056 |
|---|---|
| author | Navarro, Fauricio Alban Conejo |
| author2 | García, Melvin Jadán-Guerrero, Janio |
| author2_role | author author |
| author_facet | Navarro, Fauricio Alban Conejo García, Melvin Jadán-Guerrero, Janio |
| author_role | author |
| collection | Repositorio Universidad Tecnológica Indoamérica |
| dc.creator.none.fl_str_mv | Navarro, Fauricio Alban Conejo García, Melvin Jadán-Guerrero, Janio |
| dc.date.none.fl_str_mv | 2024-07-29T20:16:13Z 2024-07-29T20:16:13Z 2024 |
| dc.identifier.none.fl_str_mv | https://link.springer.com/chapter/10.1007/978-3-031-45642-8_18 https://hdl.handle.net/20.500.14809/6956 |
| dc.language.none.fl_str_mv | eng |
| dc.publisher.none.fl_str_mv | Lecture Notes in Networks and Systems. Volume 799 LNNS, Pages 187 - 193 |
| dc.rights.none.fl_str_mv | https://creativecommons.org/licenses/by/4.0/ info:eu-repo/semantics/openAccess |
| dc.source.none.fl_str_mv | reponame:Repositorio Universidad Tecnológica Indoamérica instname:Universidad Tecnológica Indoamérica instacron:UTI |
| dc.title.none.fl_str_mv | Authentication, Authorization, Administration and Audit Impact on Digital Security |
| dc.type.none.fl_str_mv | info:eu-repo/semantics/publishedVersion info:eu-repo/semantics/article |
| description | We can say technological security is in constant change. Security is constantly changing by the industry, because it is necessary to improve the integrity of technological security. These changes in technology come with new methods, processes, and technologies which lead to the need to be ahead in the new trends. The AAAA (Authentication, Authorization, Administration, Audit) is a topic of great relevance in organizations, it is a matter for everyone. This paper attempts to evaluate the variation presented in the Access Management after implementing digital security plans. The evaluation is visualized as an accompaniment for the improvement of the effectiveness in future decisions-making processes. The result of this analysis aims to find new improvement opportunities, due to the positive impact to growth in this field. The intention is to close the gap between the financial and technological security issues. Nowadays these issues are evaluated individually, and we pretend to unify these subjects. |
| eu_rights_str_mv | openAccess |
| format | article |
| id | UTI_c216e27f4d7b7f8052baedcc8172d2d7 |
| instacron_str | UTI |
| institution | UTI |
| instname_str | Universidad Tecnológica Indoamérica |
| language | eng |
| network_acronym_str | UTI |
| network_name_str | Repositorio Universidad Tecnológica Indoamérica |
| oai_identifier_str | oai:repositorio.uti.edu.ec:20.500.14809/6956 |
| publishDate | 2024 |
| publisher.none.fl_str_mv | Lecture Notes in Networks and Systems. Volume 799 LNNS, Pages 187 - 193 |
| reponame_str | Repositorio Universidad Tecnológica Indoamérica |
| repository.mail.fl_str_mv | . |
| repository.name.fl_str_mv | Repositorio Universidad Tecnológica Indoamérica - Universidad Tecnológica Indoamérica |
| repository_id_str | 0 |
| rights_invalid_str_mv | https://creativecommons.org/licenses/by/4.0/ |
| spelling | Authentication, Authorization, Administration and Audit Impact on Digital SecurityNavarro, Fauricio Alban ConejoGarcía, MelvinJadán-Guerrero, JanioWe can say technological security is in constant change. Security is constantly changing by the industry, because it is necessary to improve the integrity of technological security. These changes in technology come with new methods, processes, and technologies which lead to the need to be ahead in the new trends. The AAAA (Authentication, Authorization, Administration, Audit) is a topic of great relevance in organizations, it is a matter for everyone. This paper attempts to evaluate the variation presented in the Access Management after implementing digital security plans. The evaluation is visualized as an accompaniment for the improvement of the effectiveness in future decisions-making processes. The result of this analysis aims to find new improvement opportunities, due to the positive impact to growth in this field. The intention is to close the gap between the financial and technological security issues. Nowadays these issues are evaluated individually, and we pretend to unify these subjects.Lecture Notes in Networks and Systems. Volume 799 LNNS, Pages 187 - 1932024-07-29T20:16:13Z2024-07-29T20:16:13Z2024info:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/articlehttps://link.springer.com/chapter/10.1007/978-3-031-45642-8_18https://hdl.handle.net/20.500.14809/6956enghttps://creativecommons.org/licenses/by/4.0/info:eu-repo/semantics/openAccessreponame:Repositorio Universidad Tecnológica Indoaméricainstname:Universidad Tecnológica Indoaméricainstacron:UTI2024-11-07T14:27:33Zoai:repositorio.uti.edu.ec:20.500.14809/6956Institucionalhttps://repositorio.uti.edu.ec/Institución privadahttps://indoamerica.edu.ec/https://repositorio.uti.edu.ec/oai.Ecuador...opendoar:02024-11-07T14:27:33Repositorio Universidad Tecnológica Indoamérica - Universidad Tecnológica Indoaméricafalse |
| spellingShingle | Authentication, Authorization, Administration and Audit Impact on Digital Security Navarro, Fauricio Alban Conejo |
| status_str | publishedVersion |
| title | Authentication, Authorization, Administration and Audit Impact on Digital Security |
| title_full | Authentication, Authorization, Administration and Audit Impact on Digital Security |
| title_fullStr | Authentication, Authorization, Administration and Audit Impact on Digital Security |
| title_full_unstemmed | Authentication, Authorization, Administration and Audit Impact on Digital Security |
| title_short | Authentication, Authorization, Administration and Audit Impact on Digital Security |
| title_sort | Authentication, Authorization, Administration and Audit Impact on Digital Security |
| url | https://link.springer.com/chapter/10.1007/978-3-031-45642-8_18 https://hdl.handle.net/20.500.14809/6956 |