Show simple item record

dc.contributor.advisorCevallos Monar, Carlos Alfredo
dc.contributor.authorCastro Acosta, Nereyda Brigitte
dc.date.accessioned2023-05-26T02:03:22Z
dc.date.available2023-05-26T02:03:22Z
dc.date.issued2023
dc.identifier.urihttp://dspace.utb.edu.ec/handle/49000/13970
dc.descriptionCurrently, risk management in computing is one of the main concerns of small and medium-sized companies, as they are generally called in SMEs, two common approaches to these methodologies have been made that will be very helpful to know the approach that they will have towards the companies that would be developed, that is why this comparative work is inclined to know the MEHARI methodology and the CRAMM methodology where it will allow to know the functions, advantages, disadvantages and characteristics and each one will be discussed indicating in comparative tables the differences that both systems have in which it will be much easier for SMEs when they want to implement these methodologies within a company. At the end of this comparative study, several annexes will be detailed where captures from the Google Trends application will be shown, obtaining important information on how these systems are developed, this will allow through their investigations to know during the last 4 or 5 years which is the suitable methodology. To be implemented within SMEs, a little about SMEs will also be known, why small and medium-sized companies are being called SMEs. There are companies that have a lot of problems with their information security, it is because both the MEHARI and CRAMM methodology are the ones indicated in this investigation to know them, and thus observe which is the complete methodology and that it does not have many difficulties for the owners or employees who work within these companies.es_ES
dc.descriptionCurrently, risk management in computing is one of the main concerns of small and medium-sized companies, as they are generally called in SMEs, two common approaches to these methodologies have been made that will be very helpful to know the approach that they will have towards the companies that would be developed, that is why this comparative work is inclined to know the MEHARI methodology and the CRAMM methodology where it will allow to know the functions, advantages, disadvantages and characteristics and each one will be discussed indicating in comparative tables the differences that both systems have in which it will be much easier for SMEs when they want to implement these methodologies within a company. At the end of this comparative study, several annexes will be detailed where captures from the Google Trends application will be shown, obtaining important information on how these systems are developed, this will allow through their investigations to know during the last 4 or 5 years which is the suitable methodology. To be implemented within SMEs, a little about SMEs will also be known, why small and medium-sized companies are being called SMEs. There are companies that have a lot of problems with their information security, it is because both the MEHARI and CRAMM methodology are the ones indicated in this investigation to know them, and thus observe which is the complete methodology and that it does not have many difficulties for the owners or employees who work within these companies.es_ES
dc.description.abstractEn la actualidad la gestión de riesgos en la informática es una de las principales preocupaciones de las medianas y pequeñas como en general se las denomina en las Pymes, se han realizado dos enfoques comunes de estas metodologías que servirán de mucha ayuda para conocer el enfoque que tendrán hacia las empresas que se desarrollarían, es por eso que este trabajo comparativo está inclinado en conocer la metodología de MEHARI y la metodología de CRAMM en donde permitirá conocer las funciones, ventajas, desventajas y características y se hablará de cada una indicando en tablas comparativas las diferencias que tienen ambos sistemas en la cual a las Pymes se le hará mucho más fácil a la hora de querer implementar dentro de alguna empresa estas metodologías. Al final de este estudio comparativo se detallarán varios anexos en donde se mostrarán capturas desde la aplicación de Google Trends obteniendo información importante de cómo se encuentran desarrolladas estos sistemas, esto permitirá mediante sus investigaciones conocer durante los últimos 4 o 5 años cual es la metodología apta para implementarse dentro de las Pymes, también se conocerá un poco sobre las Pymes por qué se está denominando las empresas medianas y pequeñas como Pymes. Existen empresas que tienen mucho problemas con su seguridad de información es porque tanto la metodología de MEHARI y CRAMM son las indicadas en esta investigación a conocerlas, y así observar cual es la metodología completa y que no tenga muchas dificultades para los dueños o empleados que laboran dentro de dichas empresas.es_ES
dc.format.extent30 p.es_ES
dc.language.isoeses_ES
dc.publisherBabahoyo: UTB-FAFI. 2023es_ES
dc.rightsAtribución-NoComercial-SinDerivadas 3.0 Ecuador*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/ec/*
dc.subjectMetodologíaes_ES
dc.subjectSistemases_ES
dc.subjectInformaciónes_ES
dc.subjectEmpresases_ES
dc.subjectDesarrolloes_ES
dc.titleEstudio comparativo de las metodologías Mehari y Cramm para la gestión de riesgo informático en las PYMES.es_ES
dc.typebachelorThesises_ES


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record

Atribución-NoComercial-SinDerivadas 3.0 Ecuador
Except where otherwise noted, this item's license is described as Atribución-NoComercial-SinDerivadas 3.0 Ecuador