An Information Security Approach in the Armed Forces of Ecuador

Translated title of the contribution: An Information Security Approach in the Armed Forces of Ecuador

Joseph Alexander Guaman Seis, Segundo Moises Toapanta Toapanta, Jose Antonio Orizaga Trejo

Research output: Contribution to conferencePaper

Abstract

The problems of information security in the military institutions of the Joint Command of the Armed Forces were analyzed. The objective is to carry out an information security approach in the Armed Forces of Ecuador”. The method that was used to carry out the exploratory research is the deductive. Data collection was performed through direct observation and a survey directed to the personnel of the Armed Forces according to their categories. The analysis and interpretation of the data according to the ISO/ IEC 27001: 2013 standard and the theoretical bases that supported the research resulted from this investigation. It was concluded that the Joint Command of the Armed Forces of Ecuador does not have an Information Security Management System to safeguard the information assets that the institution possesses, which makes it difficult to maintain and protect the information. At the same time, corrective measures are proposed in order to strengthen the security of the Information in this distinguished institution.
Translated title of the contributionAn Information Security Approach in the Armed Forces of Ecuador
Original languageSpanish (Ecuador)
StatePublished - 29 Nov 2017
EventIV Congreso Internacional de Ciencia, Tecnología e Innovación para la Sociedad (CITIS 2017) - EC
Duration: 29 Nov 20171 Dec 2017
https://citis.blog.ups.edu.ec/historia-del-congreso/congreso-citis-2017

Conference

ConferenceIV Congreso Internacional de Ciencia, Tecnología e Innovación para la Sociedad (CITIS 2017)
Period29/11/171/12/17
Internet address

Keywords

  • Security risks
  • Information security
  • Military security
  • Information management
  • Database security

CACES Knowledge Areas

  • 2310A Public safety

Fingerprint

Dive into the research topics of 'An Information Security Approach in the Armed Forces of Ecuador'. Together they form a unique fingerprint.

Cite this