dc.contributor.advisor | León Acurio, Joffre Vicente | |
dc.contributor.author | Yanez Fajardo, Romario Aldair | |
dc.date.accessioned | 2021-06-07T03:27:45Z | |
dc.date.available | 2021-06-07T03:27:45Z | |
dc.date.issued | 2021 | |
dc.identifier.uri | http://dspace.utb.edu.ec/handle/49000/9518 | |
dc.description | The current document presents a methodology based on risk management based on analyzing data with respect to ISO / 27005, Consider these instructions “what” is required Regarding risk management, they did not indicate “how” could be implemented Given the increase in technological risks, a method for technological risks has been developed
The use of information technology can reach breakpoints o for this reason, it has security loopholes in its use. A guarantee and control of the infrastructure (physical level), Information system (logical level) and organizational measures (technology factor). the second part, Methods to integrate the methodology in the management of business continuity. As support for business impact analysis and strategy formulation. On technology-based processes. | es_ES |
dc.description | The current document presents a methodology based on risk management based on analyzing data with respect to ISO / 27005, Consider these instructions “what” is required Regarding risk management, they did not indicate “how” could be implemented Given the increase in technological risks, a method for technological risks has been developed
The use of information technology can reach breakpoints o for this reason, it has security loopholes in its use. A guarantee and control of the infrastructure (physical level), Information system (logical level) and organizational measures (technology factor). the second part, Methods to integrate the methodology in the management of business continuity. As support for business impact analysis and strategy formulation. On technology-based processes. | es_ES |
dc.description.abstract | El actual documento presenta una metodología basada en la gestión de riesgos basada en analizar datos con respecto a la norma ISO/27005, Considere estas instrucciones “qué" se requiere En cuanto a la gestión de riesgos, no indicaron “cómo” se podría implementar la gestión. Ante el incremento de los riesgos tecnológicos, se ha desarrollado un método para riesgos tecnológicos
El uso de la tecnología de la información puede alcanzar puntos de ruptura o Por esta razón, tiene lagunas de seguridad en su uso. Una garantía y control de la infraestructura (nivel físico), Sistema de información (nivel lógico) y medidas organizativas (factor tecnología). la segunda parte, Métodos para integrar la metodología en la gestión de la continuidad del negocio. Como soporte para el análisis de impacto empresarial y la formulación de estrategias. Sobre procesos basados en tecnología. | es_ES |
dc.format.extent | 23 p. | es_ES |
dc.language.iso | es | es_ES |
dc.publisher | BABAHOYO: UTB, 2021 | es_ES |
dc.rights | Atribución-NoComercial-SinDerivadas 3.0 Ecuador | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/ec/ | * |
dc.subject | ISO 27005 | es_ES |
dc.subject | Volumen de información | es_ES |
dc.subject | Gestión de riesgos de seguridad | es_ES |
dc.subject | Disponibilidad | es_ES |
dc.title | Análisis de los sistemas informáticos aplicando la norma ISO 27005 en la Unidad de Tránsito Municipal del cantón Puebloviejo | es_ES |
dc.type | bachelorThesis | es_ES |