dc.contributor.advisor | Cevallos Monar, Carlos Alfredo | |
dc.contributor.author | Castro Acosta, Nereyda Brigitte | |
dc.date.accessioned | 2023-05-26T02:03:22Z | |
dc.date.available | 2023-05-26T02:03:22Z | |
dc.date.issued | 2023 | |
dc.identifier.uri | http://dspace.utb.edu.ec/handle/49000/13970 | |
dc.description | Currently, risk management in computing is one of the main concerns of small and medium-sized companies, as they are generally called in SMEs, two common approaches to these methodologies have been made that will be very helpful to know the approach that they will have towards the companies that would be developed, that is why this comparative work is inclined to know the MEHARI methodology and the CRAMM methodology where it will allow to know the functions, advantages, disadvantages and characteristics and each one will be discussed indicating in comparative tables the differences that both systems have in which it will be much easier for SMEs when they want to implement these methodologies within a company. At the end of this comparative study, several annexes will be detailed where captures from the Google Trends application will be shown, obtaining important information on how these systems are developed, this will allow through their investigations to know during the last 4 or 5 years which is the suitable methodology. To be implemented within SMEs, a little about SMEs will also be known, why small and medium-sized companies are being called SMEs. There are companies that have a lot of problems with their information security, it is because both the MEHARI and CRAMM methodology are the ones indicated in this investigation to know them, and thus observe which is the complete methodology and that it does not have many difficulties for the owners or employees who work within these companies. | es_ES |
dc.description | Currently, risk management in computing is one of the main concerns of small and medium-sized companies, as they are generally called in SMEs, two common approaches to these methodologies have been made that will be very helpful to know the approach that they will have towards the companies that would be developed, that is why this comparative work is inclined to know the MEHARI methodology and the CRAMM methodology where it will allow to know the functions, advantages, disadvantages and characteristics and each one will be discussed indicating in comparative tables the differences that both systems have in which it will be much easier for SMEs when they want to implement these methodologies within a company. At the end of this comparative study, several annexes will be detailed where captures from the Google Trends application will be shown, obtaining important information on how these systems are developed, this will allow through their investigations to know during the last 4 or 5 years which is the suitable methodology. To be implemented within SMEs, a little about SMEs will also be known, why small and medium-sized companies are being called SMEs. There are companies that have a lot of problems with their information security, it is because both the MEHARI and CRAMM methodology are the ones indicated in this investigation to know them, and thus observe which is the complete methodology and that it does not have many difficulties for the owners or employees who work within these companies. | es_ES |
dc.description.abstract | En la actualidad la gestión de riesgos en la informática es una de las principales preocupaciones de las medianas y pequeñas como en general se las denomina en las Pymes, se han realizado dos enfoques comunes de estas metodologías que servirán de mucha ayuda para conocer el enfoque que tendrán hacia las empresas que se desarrollarían, es por eso que este trabajo comparativo está inclinado en conocer la metodología de MEHARI y la metodología de CRAMM en donde permitirá conocer las funciones, ventajas, desventajas y características y se hablará de cada una indicando en tablas comparativas las diferencias que tienen ambos sistemas en la cual a las Pymes se le hará mucho más fácil a la hora de querer implementar dentro de alguna empresa estas metodologías. Al final de este estudio comparativo se detallarán varios anexos en donde se mostrarán capturas desde la aplicación de Google Trends obteniendo información importante de cómo se encuentran desarrolladas estos sistemas, esto permitirá mediante sus investigaciones conocer durante los últimos 4 o 5 años cual es la metodología apta para implementarse dentro de las Pymes, también se conocerá un poco sobre las Pymes por qué se está denominando las empresas medianas y pequeñas como Pymes. Existen empresas que tienen mucho problemas con su seguridad de información es porque tanto la metodología de MEHARI y CRAMM son las indicadas en esta investigación a conocerlas, y así observar cual es la metodología completa y que no tenga muchas dificultades para los dueños o empleados que laboran dentro de dichas empresas. | es_ES |
dc.format.extent | 30 p. | es_ES |
dc.language.iso | es | es_ES |
dc.publisher | Babahoyo: UTB-FAFI. 2023 | es_ES |
dc.rights | Atribución-NoComercial-SinDerivadas 3.0 Ecuador | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/ec/ | * |
dc.subject | Metodología | es_ES |
dc.subject | Sistemas | es_ES |
dc.subject | Información | es_ES |
dc.subject | Empresas | es_ES |
dc.subject | Desarrollo | es_ES |
dc.title | Estudio comparativo de las metodologías Mehari y Cramm para la gestión de riesgo informático en las PYMES. | es_ES |
dc.type | bachelorThesis | es_ES |