An approach of cyberattacks with the use of social networks and communication media for public organizations of the ecuador

Segundo Moisés T. Toapanta, Dhilan Torres Tapia, Luis Enrique Mafla Gallegos

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

An analysis was carried out of several cyber-attack methods that use Social Networks and Media as their main resource, as well as their different countermeasures to mitigate the vulnerability and risk of information loss. The main objective is to propose a Model for the Management of Cybersecurity, which can be adopted by public organizations in Ecuador. The deductive method and exploratory research were used to analysis the information of the referenced articles, and also the different data published by the written and spoken press. This research resulted in a cybersecurity Management Model for analyzing the impact of cyberattacks and appropriate measures to mitigate their effect through a risk matrix. It was concluded that the model presented is a viable alternative for maintaining and improving cybersecurity and facing threats and cyberattacks, as well as the control of existing risk in the institution, that compromise information security and integrity.

Original languageEnglish
Title of host publicationICETM 2019 - Proceedings of 2019 2nd International Conference on Education Technology Management
PublisherAssociation for Computing Machinery
Pages67-72
Number of pages6
ISBN (Electronic)9781450376297
DOIs
StatePublished - 18 Dec 2019
Event2nd International Conference on Education Technology Management, ICETM 2019 - Barcelona, Spain
Duration: 18 Dec 201920 Dec 2019

Publication series

NameACM International Conference Proceeding Series

Conference

Conference2nd International Conference on Education Technology Management, ICETM 2019
Country/TerritorySpain
CityBarcelona
Period18/12/1920/12/19

Bibliographical note

Publisher Copyright:
© 2019 ACM.

Keywords

  • Cyber security
  • Security Information
  • Social Networks

Fingerprint

Dive into the research topics of 'An approach of cyberattacks with the use of social networks and communication media for public organizations of the ecuador'. Together they form a unique fingerprint.

Cite this