Repository logo
Communities & Collections
All of DSpace
  • English
  • العربية
  • বাংলা
  • Català
  • Čeština
  • Deutsch
  • Ελληνικά
  • Español
  • Suomi
  • Français
  • Gàidhlig
  • हिंदी
  • Magyar
  • Italiano
  • Қазақ
  • Latviešu
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Српски
  • Svenska
  • Türkçe
  • Yкраї́нська
  • Tiếng Việt
Log In
Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Torres Carrasco, Cecilia Elizabeth"

Filter results by typing the first few letters
Now showing 1 - 1 of 1
  • Results Per Page
  • Sort Options
  • No Thumbnail Available
    Item
    Políticas de seguridad informáticas para analizar vulnerabilidades y resguardar la información de las Unidades Administrativas de la Dirección Distrital 18D06 – Educación
    (Universidad Técnica de Ambato. Dirección de Posgrado. Maestría en Tecnologías de la Información., 2022-10-20) Torres Carrasco, Cecilia Elizabeth; Ortiz Garcés, Iván Patricio
    In recent years, computer security has made great progress in such a way that, from spending, it has come to be seen as an investment, by the leaders of institutions worldwide. That is why the purpose of the research is to carry out Computer Security Policies to analyze vulnerabilities and protect the information of the Administrative Units of the District Directorate 18D06 - Education, this will provide confidentiality, integrity and availability of information, through the use of mechanisms, to guarantee that only those authorized persons access the information resources whenever required, maintaining the accuracy and completeness of the information, for which applied research was used, so that this type research helped in the study, because computer security policies were implemented, that is, in this case the policies were established according to the problems identified and cannot be applied to another institution. Thus, due field research was also used, which during the study assisted the District to collect information through interviews, questionnaires, surveys and observations that allow analyzing the risk factors of computer security. On the other hand, the quantitative approach was also used, because in the study a checklist was used, which was evaluated by the specialists of the university, as well as the qualitative approach, which allowed asking questions and hypotheses before, during or after data collection and analysis. That is why the study worked with a sample made up of 10 Administrative Departments from District 18D06 Cevallos to Tisaleo. After carrying out the study, it was concluded that the establishment of policies helped to manage all the information in an integral, reliable and legal way, and also protect them from the risks that may arise and having security policies that will allow to have a trusted institution.

DSpace software copyright © 2002-2025 LYRASIS

  • Privacy policy
  • End User Agreement
  • Send Feedback
Repository logo COAR Notify