dc.contributor.advisor | Ramos Morocho, Raúl Armando | |
dc.contributor.author | Ronquillo Huacón, María Fernanda | |
dc.date.accessioned | 2020-05-03T20:36:43Z | |
dc.date.available | 2020-05-03T20:36:43Z | |
dc.date.issued | 2020 | |
dc.identifier.uri | http://dspace.utb.edu.ec/handle/49000/7693 | |
dc.description | Institutions or entities, regardless of their type, manage large amounts of data regarding their functions, giving way to the preparation of contingent protocols to protect different vulnerabilities. The objective of this investigation was aimed at analyzing information threats in the Department of Appraisals and Cadastre of the Municipal Autonomous Decentralized Government of the Canton Alfredo Baquerizo Moreno (Jujan) to adapt the systematic controls of computer security of ISO 27002 standard supported by the magerit methodology of the Ear / Pilar application (risk analysis and management system). Given the quantitative nature of our exploration, we opted for explanatory and descriptive research in each process of collecting foundations, and the survey technique directed at administrative personnel was also used. The result determined the importance of using a web server, expanding the collection windows, acquiring filing cabinets to protect the printed documents, obtaining an electric generator, the stability of the internet service and the protection of computer systems, both hardware and software. In conclusion, it has been possible to optimize the attention of the department in terms of its users, the risk index in the treatment and care of the information improved considerably. | es_ES |
dc.description | Institutions or entities, regardless of their type, manage large amounts of data regarding their functions, giving way to the preparation of contingent protocols to protect different vulnerabilities. The objective of this investigation was aimed at analyzing information threats in the Department of Appraisals and Cadastre of the Municipal Autonomous Decentralized Government of the Canton Alfredo Baquerizo Moreno (Jujan) to adapt the systematic controls of computer security of ISO 27002 standard supported by the magerit methodology of the Ear / Pilar application (risk analysis and management system). Given the quantitative nature of our exploration, we opted for explanatory and descriptive research in each process of collecting foundations, and the survey technique directed at administrative personnel was also used. The result determined the importance of using a web server, expanding the collection windows, acquiring filing cabinets to protect the printed documents, obtaining an electric generator, the stability of the internet service and the protection of computer systems, both hardware and software. In conclusion, it has been possible to optimize the attention of the department in terms of its users, the risk index in the treatment and care of the information improved considerably. | es_ES |
dc.description.abstract | Las instituciones o entidades sin importar su tipo gestionan grandes cantidades de datos referentes a sus funciones, dando paso a la elaboración de protocolos contingentes en protección a las diferentes vulnerabilidades. El objetivo de esta indagación estuvo encaminada en analizar las amenazas de la información en el Departamento de la Avalúos y Catastro del Gobierno Autónomo Descentralizado Municipal del Cantón Alfredo Baquerizo Moreno (Jujan) para adaptar los controles sistemáticos de seguridad informática de la norma ISO 27002 sustentados en la metodología magerit de la aplicación Ear/Pilar (sistema de análisis y gestión de riesgos). Dada la naturaleza cuantitativa de nuestra exploración, optamos por la investigación explicativa y descriptiva en cada proceso de recolección de fundamentos, además se utilizó la técnica de encuesta dirigida al personal administrativo. En el resultado se determinaron la importancia de usar un servidor web, ampliar las ventanillas de recaudación, adquirir archivadores para precautelar los documentos impresos, obtener un generador eléctrico, la estabilidad del servicio de internet y la protección de los sistemas de cómputo tanto de hardware como software. En conclusión se ha alcanzado optimizar la atención del departamento en cuanto a sus usuarios, el índice de riesgo en el tratamiento y cuidado de la información mejoro de manera considerable. | es_ES |
dc.format.extent | 28 p. | es_ES |
dc.language.iso | es | es_ES |
dc.publisher | Babahoyo, UTB - FAFI 2020 | es_ES |
dc.rights | Atribución-NoComercial-SinDerivadas 3.0 Ecuador | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/ec/ | * |
dc.subject | Información | es_ES |
dc.subject | Seguridad informática | es_ES |
dc.subject | Amenazas | es_ES |
dc.subject | Salvaguardas | es_ES |
dc.subject | Controles sistemáticos | es_ES |
dc.title | Análisis de los protocolos de seguridad de la información en el Departamento de Catastros de Gad en la Cuidad de Jujan | es_ES |
dc.type | bachelorThesis | es_ES |