© 2017 IEEE. It was analyzed the most frequent security algorithms used for information security to mitigate the integrity, confidentiality and availability of the information. The objective is to have an approach on security algorithms and define a quantitative algorithm using flowchart techniques for a process of Ecuador civil registry database. The deductive method was used to analyze the information of the references and to identify the trends of the security algorithms; which allow mitigation of the security of a database under a distributed environment. Turned out the prototype of a process applying the technique of flowchart algorithms. It was concluded that to mitigate information vulnerabilities and risks with integrity, confidentiality and availability; it is necessary to have an identity management model, to identify a model of threats and risks, to select operational, tactical and strategic security policies, to define mechanisms for compliance with policies, to develop encryption algorithms using the flow diagram technique.
|Translated title of the contribution||Un enfoque de algoritmos de seguridad para aplicar a la base de datos del registro civil del Ecuador|
|Number of pages||4|
|State||Published - 12 Sep 2017|
|Event||IEEE CITS 2017 - 2017 International Conference on Computer, Information and Telecommunication Systems - |
Duration: 12 Sep 2017 → …
|Conference||IEEE CITS 2017 - 2017 International Conference on Computer, Information and Telecommunication Systems|
|Period||12/09/17 → …|