Repository logo
Communities & Collections
All of DSpace
  • English
  • العربية
  • বাংলা
  • Català
  • Čeština
  • Deutsch
  • Ελληνικά
  • Español
  • Suomi
  • Français
  • Gàidhlig
  • हिंदी
  • Magyar
  • Italiano
  • Қазақ
  • Latviešu
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Српски
  • Svenska
  • Türkçe
  • Yкраї́нська
  • Tiếng Việt
Log In
Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Sánchez Paredes, Vanessa Michelle"

Filter results by typing the first few letters
Now showing 1 - 1 of 1
  • Results Per Page
  • Sort Options
  • No Thumbnail Available
    Item
    Políticas de seguridad informática y vulnerabilidades en el sistema para generar citas y pagos de facturación del concesionario Ambacar
    (Universidad Técnica de Ambato. Facultad de Ingeniería en Sistemas, Electrónica e Industrial. Carrera de Ingeniería en Sistemas Computacionales e Informáticos, 2022-03) Sánchez Paredes, Vanessa Michelle; Chicaiza Castillo, Dennis
    The focus of this investigative work is the need to propose a plan to improve the computer security of the system to generate appointments and logistics, in order to later create and improve more robust and secure systems for the users of the AMBACAR dealership, since it is an entity that has been recognized in the automotive market and hopes to improve such software. The distribution of the research on the proposed plan to improve computer security is as follows: Chapter I, "Problems," describes the problems to be investigated and includes justifications and objective statements. Chapter II, "Theoretical framework", contains the background of the research that will support the research project and suggestions for solutions to the problems raised. Chapter III, "Methodology", describes the implementation of the project and demonstrates the use and preparation of the qualitative-quantitative research methodology. Chapter IV, "Proposal Formulation", uses the methods described in the previous chapter to detail each step to be followed in the research and development process. In addition, a document with the results obtained and a security improvement plan will be prepared. Chapter V, "Conclusions and Recommendations", presents the conclusions of the survey results and the detailed recommendations of a document with an enhanced IT security plan developed in the previous chapter.

DSpace software copyright © 2002-2025 LYRASIS

  • Privacy policy
  • End User Agreement
  • Send Feedback
Repository logo COAR Notify