skip to main content
10.1145/3375900.3375913acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicetmConference Proceedingsconference-collections
research-article

Definition of Parameters to Perform Audit in Cybersecurity for Public one Organization of Ecuador

Published:07 February 2020Publication History

ABSTRACT

Ecuador's constant technological growth is evident in recent years, great efforts have been devoted to the development of information systems for organizations, but only for the development of systems; unfortunately, there are few security controls or maintenance that have been implemented in those already mentioned. Ecuador has been the target of constant attacks and have been the result of the vulnerability of its information security. This is the consequence of having very poor control of their systems due to the neglect of senior management, reduced costs or simply complete ignorance of the subject by the staff. Auditing helps identify weaknesses in an organization in general or in systems where security is important. Every audit process is linked to a plan, realization and results, but it is thanks to the methodology that they will give us indicators to make changes to the system, that these results have relevance; as the parameters to be evaluated from the system are presented in the system. Our goal was to find key parameters for a correct security assessment against a cyberattack. Methodologies from various sources such as books, recognized standards methodologies, standardized guidance processes, among others were adapted and used. It was concluded that using guide the parameters found in our research helps an organization to have a stable yet secure system against a cyberattack.

References

  1. 2008 Six Steps to an Effective Continuous Audit Process: https://iaonline.theiia.org/six-steps-to-an-effective-continuous-audit-process. Accessed: 2019-11-21.Google ScholarGoogle Scholar
  2. Alberto Flores Quispe, C. Tipos De Hackers. 16--18.Google ScholarGoogle Scholar
  3. Cano, J.J. 2016. Cyberattacks---The Instability of Security and Control Knowledge. ISACA Journal. 5, 1 (2016), 1--5.Google ScholarGoogle Scholar
  4. Ciberataques | Editoriales | Opinión | El Universo: 2019. https://www.eluniverso.com/opinion/2019/04/16/nota/7287779/ciberataques. Accessed: 2019-09-18.Google ScholarGoogle Scholar
  5. Coello, N.I., Naranjo, R.A., Mafla, E. and Technologies, C. 2019. Impact on Administrative Processes by Cyberattacks in a Public Organization of Ecuador. July (2019).Google ScholarGoogle Scholar
  6. Diario El Comercio 2019. Ecuador ocupa el séptimo lugar en ciberseguridad en América Latina | El Comercio. Seguridad.Google ScholarGoogle Scholar
  7. Guayaquil conocerá beneficios de la política "Ecuador Digital" -- Ministerio de Telecomunicaciones y de la Sociedad de la Información: 2019. https://www.telecomunicaciones.gob.ec/guayaquil-conocera-beneficios-de-la-politica-ecuador-digital/. Accessed: 2019-09-18.Google ScholarGoogle Scholar
  8. ITU 2017. Global Cybersecurity Index (GCI) 2017. ITU Report.Google ScholarGoogle Scholar
  9. Listado de ministros y ministerios de Ecuador: 2015. https://www.expreso.ec/actualidad/listado-de-ministros-y-ministerios-de-ecuador-DPGR_8323545. Accessed: 2019-09-18.Google ScholarGoogle Scholar
  10. Nollet, L.M.L. 2019. ISO (International Organization for Standardization). Testing and Analysis of GMO-containing Foods and Feed. 273--276.Google ScholarGoogle Scholar
  11. Probando la madurez en la ciberseguridad en las instituciones financieras: https://www2.deloitte.com/ec/es/pages/financial-services/articles/probando-la-madurez-en-la-ciberseguridad-en-las-instituciones-fi.html. Accessed: 2019-09-18.Google ScholarGoogle Scholar
  12. Sabillon, R., Serra-Ruiz, J., Cavaller, V. and Cano, J. 2018. A comprehensive cybersecurity audit model to improve cybersecurity assurance: The cybersecurity audit model (CSAM). Proceedings - 2017 International Conference on Information Systems and Computer Science, INCISCOS 2017. 2017-Novem, (2018), 253--259. DOI:https://doi.org/10.1109/INCISCOS.2017.20.Google ScholarGoogle Scholar
  13. Standars ISO ISO 9126-2.Google ScholarGoogle Scholar
  14. Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program ... - Scott Donaldson, Stanley Siegel, Chris K. Williams, Abdul Aslam - Google Libros.Google ScholarGoogle Scholar

Index Terms

  1. Definition of Parameters to Perform Audit in Cybersecurity for Public one Organization of Ecuador

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICETM '19: Proceedings of the 2019 2nd International Conference on Education Technology Management
      December 2019
      126 pages
      ISBN:9781450376297
      DOI:10.1145/3375900

      Copyright © 2019 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 7 February 2020

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)9
      • Downloads (Last 6 weeks)1

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader