Importance of computer security policies according to ISO 27001 for small and medium-sized companies in Ecuador
Abstract
This article presents the importance of executing good IT practices through the use of ISO 27001 standards in small and medium-sized companies in Ecuador, incorporating good ICT management, minimizing the risks and threats to business information, as well as its assets. IT. The maturity levels for the management of information systems must be developed by internal and external clients, allowing them to increase their prestige and profitability with the improvement of business processes, guaranteeing the optimal operation of computer services to meet business objectives. of public and private companies and SMEs. To measure computer vulnerabilities, the information technology risk analysis matrix was used, allowing threats and risks to be identified. These will be solved with the development of computer security policies to guarantee the reliability, integrity, availability of information and computer resources.
Downloads
References
Iván Salvadori, “Los delitos contra la confidencialidad, la disponibilidad y la integridad de los datos y sistemas informát,” 2011. Accessed: Dec. 07, 2020. [Online]. Available: http://www.
L. Y. B. Moreno, K. M. Tamara, and B. E. S. Carvajalino, “Creación de un manual de políticas de seguridad de la información para la dependencia secretaria de la institución educativa nuestra señora de belen de cúcuta,” 2017. Accessed: Dec. 07, 2020. [Online]. Available: http://repositorio.ufpso.edu.co:8080/dspaceufpso/handle/123456789/1688.
ICA, “Manual del Sistema de Gestión de Seguridad de la Información SGSI AGOSTO 2018 El presente Manual es parte integral del Manual del Sistema de Gestión Oficina Tecnologías de la Información,” Colombia, Aug. 2018. Accessed: Aug. 12, 2020. [Online]. Available: https://www.ica.gov.co/getattachment/Modelo-de-P-y-G/Eficiencia-Administrativa/Procesos-y-Procedimientos/ManualSGSI-Agosto-2018.pdf.aspx?lang=es-CO.
F. N. J. Solarte Solarte, E. R. Enriquez Rosero, and M. del C. Benavides Ruano, “Metodología de análisis y evaluación de riesgos aplicados a la seguridad informática y de información bajo la norma ISO/IEC 27001,” Tecnológica ESPOL–RTE , vol. 28, pp. 1–16, Dec. 2015, Accessed: Sep. 03, 2020. [Online]. Available: http://www.rte.espol.edu.ec/index.php/tecnologica/article/view/456/321.
M. I. Romero Castro et al., “Introducción a la seguridad informática y el análisis de vulnerabilidades,” Manabí, 2018. Accessed: Jun. 05, 2020. [Online]. Available: https://www.3ciencias.com/wp-content/uploads/2018/10/Seguridad-informática.pdf.
J. E. Guanoluisa Huertas and I. F. Maldonado Soliz, “ANÁLISIS DE RIESGOS Y DISEÑO DE UN PLAN DE SEGURIDAD DE LA INFORMACIÓN PARA EL CONSEJO NACIONAL DE IGUALDAD DE DISCAPACIDADES ‘CONADIS’.,” Quito, May 2015. Accessed: Jun. 07, 2020. [Online]. Available: https://bibdigital.epn.edu.ec/bitstream/15000/10499/1/CD-6217.pdf.
K. E. López Carranza, “Diseño de un plan de mitigación de riesgos empresariales identificando los riesgos internos y externos de comercial novedades leydi en el cantón la troncal del año 2014.,” 2015. Accessed: Sep. 07, 2020. [Online]. Available: http://186.5.103.99/handle/reducacue/7293.
Yi Min Shum, “Matriz de evaluación de factores internos (Matriz EFI - MEFI),” 2018. https://yiminshum.com/matriz-evaluacion-factores-internos-mefi/ (accessed Sep. 07, 2020).
K. Cárdenas Posada, J. D. Fernández Vásquez, and L. Hernández Aros, “Matriz de riesgos en el desarrollo del encargo,” p. 22, 2018, Accessed: Sep. 06, 2020. [Online]. Available: https://repository.ucc.edu.co/bitstream/20.500.12494/5166/1/Matriz de riesgo en el desarrollo del encargo %282%29.pdf.
Copyright (c) 2022 Ciencias de la Ingeniería y Aplicadas
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
The authors who publish in this journal agree to the following terms:
- Creative Commons Attribution-NonCommercial-NoDerivatives License allows others to share the work with acknowledgment of authorship of the work and initial publication in this journal.
- Authors may separately establish additional agreements for the non-exclusive distribution of the version of the work published in the journal (for example, placing it in an institutional repository or publishing it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to disseminate their work electronically (for example, in institutional repositories or on their own website) before and during the submission process, as it can lead to productive exchanges, as well as further citation. earliest and largest of published works (See The Effect of Open Access) (in English).