ABSTRACT
Were analyzed different cybersecurity proposals to protect information, such as models, prototypes, approaches, frameworks, algorithms and evaluations. The problem is the lack of application of cybersecurity to electoral processes in Ecuador. The objective is to make an appropriate cybersecurity model to apply in an electoral process in Ecuador. The quantitative, descriptive, deductive reasoning was used to analyze the reference documents. It turned out a Conceptual Cybersecurity Model, a Cybersecurity Algorithm and a General Risk Formula. It was concluded that the model strengthens information security in the electoral process and asset risk assessment prioritizes the attention of vulnerabilities.
- S. M. T. Toapanta, M. A. M. Anchundia, L. E. G. Mafia, and J. A. T. Orizaga, "Biometric Systems Approach Applied to a Conceptual Model to Mitigate the Integrity of the Information," in 2018 International Conference on Computer, Information and Telecommunication Systems (CITS), 2018, pp. 1--5, DOI 10.1109/CITS.2018.8440178.Google Scholar
- R. Sabillon, J. Serra-Ruiz, V. Cavaller, and J. Cano, "A Comprehensive Cybersecurity Audit Model to Improve Cybersecurity Assurance: The CyberSecurity Audit Model (CSAM)," in 2017 International Conference on Information Systems and Computer Science (INCISCOS), 2017, vol. 2017-Novem, pp. 253--259, DOI 10.1109/INCISCOS.2017.20.Google Scholar
- G. Parekh et al., "Identifying Core Concepts of Cybersecurity: Results of Two Delphi Processes," IEEE Trans. Educ., vol. 61, no. 1, pp. 11--20, Feb. 2018, DOI 10.1109/TE.2017.2715174.Google ScholarCross Ref
- F. Sharevski, A. Trowbridge, and J. Westbrook, "Novel approach for cybersecurity workforce development: A course in secure design," in 2018 IEEE Integrated STEM Education Conference (ISEC), 2018, vol. 2018-Janua, no. c, pp. 175--180, DOI 10.1109/ISECon.2018.8340471.Google Scholar
- J. Kosseff, "Developing collaborative and cohesive cybersecurity legal principles," in 2018 10th International Conference on Cyber Conflict (CyCon), 2018, vol. 2018-May, pp. 283--298, DOI 10.23919/CYCON.2018.8405022.Google Scholar
- Alsmadi and M. Zarour, "Cybersecurity Programs in Saudi Arabia: Issues and Recommendations," in 2018 1st International Conference on Computer Applications & Information Security (ICCAIS), 2018, pp. 1--5, DOI 10.1109/CAIS.2018.8442013.Google Scholar
- S. M. T. Toapanta, I. F. M. Saá, F. G. M. Quimi, and L. E. M. Gallegos, "An Approach to Vulnerabilities, Threats and Risk in Voting Systems for Popular Elections in Latin America," Adv. Sci. Technol. Eng. Syst. J., vol. 4, no. 3, 2019, DOI 10.25046/aj040315.Google ScholarCross Ref
- S. A. Silva et al., "NEC Objectives administrative units," no. 1, pp. 8--9, 2019.Google Scholar
- P. Rathod and T. Hamalainen, "A Novel Model for Cybersecurity Economics and Analysis," in 2017 IEEE International Conference on Computer and Information Technology (CIT), 2017, pp. 274--279, DOI 10.1109/CIT.2017.65.Google Scholar
- M. Rea-Guaman, J. A. Calvo-Manzano, and T. S. Feliu, "A prototype to manage cybersecurity in small companies," in 2018 13th Iberian Conference on Information Systems and Technologies (CISTI), 2018, vol. 2018-June, pp. 1--6, DOI 10.23919/CISTI.2018.8399252.Google Scholar
- M. Toapanta, J. Mero, D. Huilcapi, M. Tandazo, A. Orizaga, and E. Mafla, "A Blockchain Approach to Mitigate Information Security in a Public Organization for Ecuador," IOP Conf. Ser. Mater. Sci. Eng., vol. 423, no. 1, p. 012164, Nov. 2018, DOI 10.1088/1757-899X/423/1/012164.Google ScholarCross Ref
- M. Mylrea, S. N. G. Gourisetti, and A. Nicholls, "An introduction to buildings cybersecurity framework," in 2017 IEEE Symposium Series on Computational Intelligence (SSCI), 2017, vol. 2018-Janua, pp. 1--7, DOI 10.1109/SSCI.2017.8285228.Google Scholar
- M. Chronopoulos, E. Panaousis, and J. Grossklags, "An Options Approach to Cybersecurity Investment," IEEE Access, vol. 6, pp. 12175--12186, 2018, DOI 10.1109/ACCESS.2017.2773366.Google ScholarCross Ref
- M. Toapanta, J. Nazareno, R. Tingo, F. Mendoza, A. Orizaga, and E. Mafla, "Analysis of the Appropriate Security Models to Apply in a Distributed Architecture," IOP Conf. Ser. Mater. Sci. Eng., vol. 423, no. 1, p. 012165, Nov. 2018, DOI 10.1088/1757-899X/423/1/012165.Google ScholarCross Ref
- N. Gupta Gourisetti, M. Mylrea, and H. Patangia, "Application of Rank-Weight Methods to Blockchain Cybersecurity Vulnerability Assessment Framework," in 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), 2019, pp. 0206--0213, DOI 10.1109/CCWC.2019.8666518.Google Scholar
- Strielkina, O. Illiashenko, M. Zhydenko, and D. Uzun, "Cybersecurity of healthcare IoT-based systems: Regulation and case-oriented assessment," in 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT), 2018, pp. 67--73, DOI 10.1109/DESSERT.2018.8409101.Google Scholar
- R. de Bruin and S. H. von Solms, "Humanitarian perspective of cybersecurity and cybersecurity governance," in 2017 IST-Africa Week Conference (IST-Africa), 2017, pp. 1--10, DOI 10.23919/ISTAFRICA.2017.8102388.Google Scholar
- Mulyadi and D. Rahayu, "Indonesia National Cybersecurity Review: Before and After Establishment National Cyber and Crypto Agency (BSSN)," in 2018 6th International Conference on Cyber and IT Service Management (CITSM), 2018, no. Citsm, pp. 1--6, DOI 10.1109/CITSM.2018.8674265.Google Scholar
- R. M. Savola, "Current level of cybersecurity competence and future development," in Proceedings of the 11th European Conference on Software Architecture Companion Proceedings - ECSA '17, 2017, vol. Part F1305, pp. 121--124, DOI 10.1145/3129790.3129804.Google Scholar
- B. Nussbaum and S. Park, "A tough decision made easy?," in Proceedings of the 19th Annual International Conference on Digital Government Research Governance in the Data Age - dgo '18, 2018, pp. 1--9, DOI 10.1145/3209281.3209368.Google Scholar
- L. Fichtner, W. Pieters, and A. Teixeira, "Cybersecurity as a Politikum," in Proceedings of the 2016 New Security Paradigms Workshop on - NSPW, 2016, vol. 26-29-Sept, pp. 36--48, DOI 10.1145/3011883.3011887.Google Scholar
- M. Kikuchi and T. Okubo, "Cyber Governance Complex in Firms," in Proceedings of the 2nd International Conference on Control and Computer Vision - ICCCV 2019, 2019, pp. 116--120, DOI 10.1145/3341016.3341037.Google Scholar
- W. Burke, T. Oseni, A. Jolfaei, and I. Gondal, "Cybersecurity Indexes for eHealth," in Proceedings of the Australasian Computer Science Week Multiconference on - ACSW 2019, 2019, pp. 1--8, DOI 10.1145/3290688.3290721.Google Scholar
- T. Chen, J. Hammer, and L. Dabbish, "Self-Efficacy-Based Game Design to Encourage Security Behavior Online," in Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems - CHI EA '19, 2019, pp. 1--6, DOI 10.1145/3290607.3312935.Google Scholar
- Nacional, "Ley-electoral-CodigoDemocria-Ecuador.pdf."Google Scholar
Index Terms
- Analysis of Cybersecurity Models Suitable to Apply in an Electoral Process in Ecuador
Recommendations
An Approach of Cyberattacks with the Use of Social Networks and Communication Media for Public Organizations of the Ecuador
ICETM '19: Proceedings of the 2019 2nd International Conference on Education Technology ManagementAn analysis was carried out of several cyber-attack methods that use Social Networks and Media as their main resource, as well as their different countermeasures to mitigate the vulnerability and risk of information loss. The main objective is to ...
A Cyber Environment Approach to Mitigate Vulnerabilities and Threats in an Electoral Process in Ecuador
ICETM '19: Proceedings of the 2019 2nd International Conference on Education Technology ManagementThe problems of information security in the cyber environment regarding vulnerabilities and threats in an electoral process is persistent; the use of technology in political activities for popular elections, through electronic or digital voting, ...
About the cybersecurity of automated process control systems
AbstractRecently, the number of hacker attacks on industrial production facilities has increased significantly. That growth is associated with the rapid development of information technologies for the control systems. The increase in the number of ...
Comments