Mostrar el registro sencillo del ítem

dc.contributor.advisorMontecé Moreno, Omar Rodrigo
dc.contributor.authorContreras Olea, Gissela Annabel
dc.date.accessioned2022-09-26T02:24:08Z
dc.date.available2022-09-26T02:24:08Z
dc.date.issued2022
dc.identifier.urihttp://dspace.utb.edu.ec/handle/49000/12551
dc.descriptionOn a daily basis, companies are trying to counteract the effects of constant technological advances and access to large amounts of data, many organizations experience numerous types of computer attacks, data manipulation and information loss. That is why the study of this research was carried out in a comparative analysis between the risk management methodologies of the information security management systems (ISMS): MAGERIT and OCTAVE, which allows identifying which methodology provides the best decision making regarding information assets. In this sense, the main objective was raised: To carry out a comparative analysis between the risk management methodologies: Magerit and Octave. The inquiry was based on bibliographic research, referenced in theses, university repositories, indexed databases and journal articles, consecutively, the analytical method was chosen and in turn the type of descriptive research. Therefore, the comparative study was carried out based on the general criteria of each of the chosen methodologies, that is, Magerit and Octave, from the bases of their concepts and their phases, as well as their main characteristics, strengths and weaknesses. The foregoing led to the formulation of the conclusions, which were considered that given the comparisons of the methodologies in question, unlike OCTAVE, MAGERIT takes safer processes in its execution, due to the fact that its risk analysis is more complete. Although the two methodologies have their scope of application, due to the fact that an organization uses them more than others, both of them can be used in companies, both public and private.es_ES
dc.descriptionOn a daily basis, companies are trying to counteract the effects of constant technological advances and access to large amounts of data, many organizations experience numerous types of computer attacks, data manipulation and information loss. That is why the study of this research was carried out in a comparative analysis between the risk management methodologies of the information security management systems (ISMS): MAGERIT and OCTAVE, which allows identifying which methodology provides the best decision making regarding information assets. In this sense, the main objective was raised: To carry out a comparative analysis between the risk management methodologies: Magerit and Octave. The inquiry was based on bibliographic research, referenced in theses, university repositories, indexed databases and journal articles, consecutively, the analytical method was chosen and in turn the type of descriptive research. Therefore, the comparative study was carried out based on the general criteria of each of the chosen methodologies, that is, Magerit and Octave, from the bases of their concepts and their phases, as well as their main characteristics, strengths and weaknesses. The foregoing led to the formulation of the conclusions, which were considered that given the comparisons of the methodologies in question, unlike OCTAVE, MAGERIT takes safer processes in its execution, due to the fact that its risk analysis is more complete. Although the two methodologies have their scope of application, due to the fact that an organization uses them more than others, both of them can be used in companies, both public and private.es_ES
dc.description.abstractDiariamente, las empresas están tratando de contrarrestar los efectos que implican los constantes avances tecnológicos y el acceso a grandes cantidades de datos, muchas organizaciones experimentan numerosos tipos de ataques informáticos, manipulación de datos y pérdida de información. Es por ello, que el estudio de esta investigación, se efectuó en un análisis comparativo entre las metodologías de gestión de riesgos de los sistemas de gestión de seguridad de la información (SGSI): MAGERIT y OCTAVE, que permita identificar que metodología proporciona la mejor toma de decisiones en cuanto a los activos de información. En tal sentido, se planteó el objetivo principal: Realizar un análisis comparativo entre las metodologías de gestión de riesgos: Magerit y Octave. La indagación se basó en la investigación bibliográfica, referenciada en tesis, repositorios universitarios, bases de datos indexadas y artículos de revistas, consecutivamente, se optó el método analítico y a su vez el tipo de investigación descriptiva. Por consiguiente, se realizó el estudio comparativo con base a los criterios generales de cada una de las metodologías escogidas, es decir, Magerit y Octave, desde las bases de sus conceptos y sus fases, además sus características principales, fortalezas y debilidades. Lo anterior propició a la formulación de las conclusiones, las cuales se consideró que dada las comparaciones de las metodologías en cuestión, MAGERIT a diferencia de OCTAVE, toma procesos más seguros en su ejecución, debido a que su análisis de riesgos es más completo. A pesar de que las dos metodologías tienen su ámbito de aplicación, debido a que una organización las utiliza más que otras, todas dos pueden ser empleadas en empresas, tanto públicas como privadas.es_ES
dc.format.extent27 p.es_ES
dc.language.isoeses_ES
dc.publisherBabahoyo: UTB-FAFI. 2022es_ES
dc.rightsAtribución-NoComercial-SinDerivadas 3.0 Ecuador*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/ec/*
dc.subjectSeguridad de la informaciónes_ES
dc.subjectMetodologíases_ES
dc.subjectGestión de riesgoses_ES
dc.subjectMagerites_ES
dc.subjectOctavees_ES
dc.titleAnálisis comparativo entre las metodologías de gestión de riesgos de los Sistemas de Gestión de Seguridad de la Información (SGSI): Magerit y Octave.es_ES
dc.typebachelorThesises_ES


Ficheros en el ítem

Thumbnail
Thumbnail

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem

Atribución-NoComercial-SinDerivadas 3.0 Ecuador
Excepto si se señala otra cosa, la licencia del ítem se describe como Atribución-NoComercial-SinDerivadas 3.0 Ecuador