skip to main content
10.1145/3375900.3375916acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicetmConference Proceedingsconference-collections
research-article

Design of a Prototype for IT Security Architectures in a Public Organization for Latin America

Published:07 February 2020Publication History

ABSTRACT

Public organizations in Latin America on security issues at the level of information architecture are delayed a few years, there was legislation to protect information, while in Latin America only few countries defined their strategy. We had principles of information security such as confidentiality, integrity and availability. As an objective, an analysis of the sectors of public organizations was carried out, in order to support the strategy, an information technology security architecture prototype was designed where to achieve this, architectures models and design principles aligned to good industry practices. It was used method, models were reviewed and analyzed. It was a prototype architecture that managed to protect information at different levels of organizations. It was concluded that the prototype of IT security architecture for organizations allows everyone involved in the organization to participate in it because technology is currently present at all levels of public companies.

References

  1. Toapanta, M., Nazareno, J., Tingo, R., Mendoza, F., Orizaga, A., & Mafla, E. (2018). Analysis of the Appropriate Security Models to Apply in a Distributed Architecture. IOP Conference Series: Materials Science and Engineering, 423(1). https://doi.org/10.1088/1757-899X/423/1/012165Google ScholarGoogle ScholarCross RefCross Ref
  2. "Cyber Security." [Online]. Available: https://www.sites.oas.org/cyber/Es/Paginas/default.aspx. [Accessed: 13-Sep-2019].Google ScholarGoogle Scholar
  3. BID and OEA, "OBSERVATORY OF CYBER SECURITY IN LATIN AMERICA AND THE CARIBBEAN," 2019, 2019. [Online]. Available: http://observatoriociberseguridad.com/graph/countries/ar-ec-cl-uy-br/selected/br/0/dimensions/1-2-3-4-5. [Accessed: 02-Oct-2019].Google ScholarGoogle Scholar
  4. Deloitte, "Cyber Risks and Information Security in Latin America & Caribbean Trends 2019 Report Colombia The Evolution of Information Security Management Deloitte is pleased to present the results of the Information Security Study e," 2019.Google ScholarGoogle Scholar
  5. Zuech, R., Khoshgoftaar, T. M., & Wald, R. (2015). Intrusion detection and Big Heterogeneous Data: a Survey. Journal of Big Data, 2(1). https://doi.org/10.1186/s40537-015-0013-4.Google ScholarGoogle Scholar
  6. N. Arconati, "One approach to enterprise security architecture," pp. 1--13, 2015.Google ScholarGoogle Scholar
  7. Goel, J. N., Asghar, M. H., Kumar, V., & Pandey, S. K. (2016). Ensemble based approach to increase vulnerability assessment and penetration testing accuracy. 2016 1st International Conference on Innovation and Challenges in Cyber Security, ICICCS 2016, (Iciccs), 330--335. https://doi.org/10.1109/ICICCS.2016.7542303Google ScholarGoogle ScholarCross RefCross Ref
  8. Rohela, A. (2018). Vulnerability Assessment and Penetration Testing through Artificial Intelligence. International Journal of Recent Trends in Engineering and Research, 4(1), 217--224. https://doi.org/10.23883/ijrter.2018.4028.rdd10.Google ScholarGoogle ScholarCross RefCross Ref
  9. Chatzigeorgiou, C., Toumanidis, L., Kogias, D., Patrikakis, C., & Jacksch, E. (2017). A communication gateway architecture for ensuring privacy and confidentiality in incident reporting. Proceedings - 2017 15th IEEE/ACIS International Conference on Software Engineering Research, Management and Applications, SERA 2017, 407--411. https://doi.org/10.1109/SERA.2017.7965759.Google ScholarGoogle ScholarCross RefCross Ref
  10. Ding, W., Yan, Z., & Deng, R. H. (2016). A Survey on Future Internet Security Architectures. IEEE Access, 4, 4374--4393. https://doi.org/10.1109/ACCESS.2016.2596705.Google ScholarGoogle ScholarCross RefCross Ref
  11. Meng, D., Hou, R., Shi, G., Tu, B., Yu, A., Zhu, Z., ... Liu, P. (2018). Security-first architecture: deploying physically isolated active security processors for safeguarding the future of computing. Cybersecurity, 1(1), 1--11. https://doi.org/10.1186/s42400-018-0001-z.Google ScholarGoogle ScholarCross RefCross Ref
  12. Cîrnu, C. E., Rotună, C. I., Vevera, A. V., & Boncea, R. (2018). Measures to mitigate cybersecurity risks and vulnerabilities in service-oriented architecture. Studies in Informatics and Control, 27(3), 359--368. https://doi.org/10.24846/v27i3y201811.Google ScholarGoogle ScholarCross RefCross Ref
  13. Bandar, Maytham. (2017). Enterprise Architecture Frameworks: A Critique Review from a Security Perspective. International Journal of Computer Applications. 174. 9--15. https://doi.org/10.5120/ijca2017915416.Google ScholarGoogle Scholar
  14. Jain, P., & Tripathi, P. (2013). SCADA security: a review and enhancement for DNP3 based systems. CSI Transactions on ICT, 1(4), 301--308. https://doi.org/10.1007/s40012-013-0024-2.Google ScholarGoogle ScholarCross RefCross Ref
  15. Sukumara, T., Sudarsan, S. D., Starck, J., & Vittor, T. R. (2017). Cyber security - security strategy for distribution management system and security architecture considerations. CIRED - Open Access Proceedings Journal, 2017(1), 2653--2656. https://doi.org/10.1049/oap-cired.2017.0936.Google ScholarGoogle ScholarCross RefCross Ref
  16. Barrett, M. (2018). Framework for improving critical infrastructure cybersecurity. Proceedings of the Annual ISA Analysis Division Symposium, 535, 9--25.Google ScholarGoogle Scholar

Index Terms

  1. Design of a Prototype for IT Security Architectures in a Public Organization for Latin America

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICETM '19: Proceedings of the 2019 2nd International Conference on Education Technology Management
      December 2019
      126 pages
      ISBN:9781450376297
      DOI:10.1145/3375900

      Copyright © 2019 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 7 February 2020

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader