ABSTRACT
Public organizations in Latin America on security issues at the level of information architecture are delayed a few years, there was legislation to protect information, while in Latin America only few countries defined their strategy. We had principles of information security such as confidentiality, integrity and availability. As an objective, an analysis of the sectors of public organizations was carried out, in order to support the strategy, an information technology security architecture prototype was designed where to achieve this, architectures models and design principles aligned to good industry practices. It was used method, models were reviewed and analyzed. It was a prototype architecture that managed to protect information at different levels of organizations. It was concluded that the prototype of IT security architecture for organizations allows everyone involved in the organization to participate in it because technology is currently present at all levels of public companies.
- Toapanta, M., Nazareno, J., Tingo, R., Mendoza, F., Orizaga, A., & Mafla, E. (2018). Analysis of the Appropriate Security Models to Apply in a Distributed Architecture. IOP Conference Series: Materials Science and Engineering, 423(1). https://doi.org/10.1088/1757-899X/423/1/012165Google ScholarCross Ref
- "Cyber Security." [Online]. Available: https://www.sites.oas.org/cyber/Es/Paginas/default.aspx. [Accessed: 13-Sep-2019].Google Scholar
- BID and OEA, "OBSERVATORY OF CYBER SECURITY IN LATIN AMERICA AND THE CARIBBEAN," 2019, 2019. [Online]. Available: http://observatoriociberseguridad.com/graph/countries/ar-ec-cl-uy-br/selected/br/0/dimensions/1-2-3-4-5. [Accessed: 02-Oct-2019].Google Scholar
- Deloitte, "Cyber Risks and Information Security in Latin America & Caribbean Trends 2019 Report Colombia The Evolution of Information Security Management Deloitte is pleased to present the results of the Information Security Study e," 2019.Google Scholar
- Zuech, R., Khoshgoftaar, T. M., & Wald, R. (2015). Intrusion detection and Big Heterogeneous Data: a Survey. Journal of Big Data, 2(1). https://doi.org/10.1186/s40537-015-0013-4.Google Scholar
- N. Arconati, "One approach to enterprise security architecture," pp. 1--13, 2015.Google Scholar
- Goel, J. N., Asghar, M. H., Kumar, V., & Pandey, S. K. (2016). Ensemble based approach to increase vulnerability assessment and penetration testing accuracy. 2016 1st International Conference on Innovation and Challenges in Cyber Security, ICICCS 2016, (Iciccs), 330--335. https://doi.org/10.1109/ICICCS.2016.7542303Google ScholarCross Ref
- Rohela, A. (2018). Vulnerability Assessment and Penetration Testing through Artificial Intelligence. International Journal of Recent Trends in Engineering and Research, 4(1), 217--224. https://doi.org/10.23883/ijrter.2018.4028.rdd10.Google ScholarCross Ref
- Chatzigeorgiou, C., Toumanidis, L., Kogias, D., Patrikakis, C., & Jacksch, E. (2017). A communication gateway architecture for ensuring privacy and confidentiality in incident reporting. Proceedings - 2017 15th IEEE/ACIS International Conference on Software Engineering Research, Management and Applications, SERA 2017, 407--411. https://doi.org/10.1109/SERA.2017.7965759.Google ScholarCross Ref
- Ding, W., Yan, Z., & Deng, R. H. (2016). A Survey on Future Internet Security Architectures. IEEE Access, 4, 4374--4393. https://doi.org/10.1109/ACCESS.2016.2596705.Google ScholarCross Ref
- Meng, D., Hou, R., Shi, G., Tu, B., Yu, A., Zhu, Z., ... Liu, P. (2018). Security-first architecture: deploying physically isolated active security processors for safeguarding the future of computing. Cybersecurity, 1(1), 1--11. https://doi.org/10.1186/s42400-018-0001-z.Google ScholarCross Ref
- Cîrnu, C. E., Rotună, C. I., Vevera, A. V., & Boncea, R. (2018). Measures to mitigate cybersecurity risks and vulnerabilities in service-oriented architecture. Studies in Informatics and Control, 27(3), 359--368. https://doi.org/10.24846/v27i3y201811.Google ScholarCross Ref
- Bandar, Maytham. (2017). Enterprise Architecture Frameworks: A Critique Review from a Security Perspective. International Journal of Computer Applications. 174. 9--15. https://doi.org/10.5120/ijca2017915416.Google Scholar
- Jain, P., & Tripathi, P. (2013). SCADA security: a review and enhancement for DNP3 based systems. CSI Transactions on ICT, 1(4), 301--308. https://doi.org/10.1007/s40012-013-0024-2.Google ScholarCross Ref
- Sukumara, T., Sudarsan, S. D., Starck, J., & Vittor, T. R. (2017). Cyber security - security strategy for distribution management system and security architecture considerations. CIRED - Open Access Proceedings Journal, 2017(1), 2653--2656. https://doi.org/10.1049/oap-cired.2017.0936.Google ScholarCross Ref
- Barrett, M. (2018). Framework for improving critical infrastructure cybersecurity. Proceedings of the Annual ISA Analysis Division Symposium, 535, 9--25.Google Scholar
Index Terms
- Design of a Prototype for IT Security Architectures in a Public Organization for Latin America
Recommendations
Security Model for the Integration of the Ministry of Telecommunications and the Information Society with a Public Organization of Ecuador
ICISDM '20: Proceedings of the 2020 the 4th International Conference on Information System and Data MiningInformation security is one of the most important aspects in organizations that has been constantly developing, driven by advances in Information and Communication Technologies. It should be noted that such development also entails the constant ...
Software Security
ECBS '13: Proceedings of the 20th Annual IEEE International Conference and Workshops on the Engineering of Computer Based SystemsThe importance of IT security is out of doubt. Data, computer and network security are essential for any business or organization. Software security often remains out of focus, from an organization's, a developer's and from an end-user's point of view. ...
Security Architecture of Computer Communication System Based on Internet of Things
ICASIT 2020: Proceedings of the 2020 International Conference on Aviation Safety and Information TechnologyIn large-scale service collaboration environment, security and privacy protection are the main factors affecting the development of IoT service applications. The security and privacy requirements of IoT services mainly focus on three aspects: secure ...
Comments