Analysis of cybersecurity models suitable to apply in an electoral process in ecuador

Segundo Moisés T. Toapanta, Manuel Agustin Aycart Armijos, Luis Enrique Mafla Gallegos

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Were analyzed different cybersecurity proposals to protect information, such as models, prototypes, approaches, frameworks, algorithms and evaluations. The problem is the lack of application of cybersecurity to electoral processes in Ecuador. The objective is to make an appropriate cybersecurity model to apply in an electoral process in Ecuador. The quantitative, descriptive, deductive reasoning was used to analyze the reference documents. It turned out a Conceptual Cybersecurity Model, a Cybersecurity Algorithm and a General Risk Formula. It was concluded that the model strengthens information security in the electoral process and asset risk assessment prioritizes the attention of vulnerabilities.

Original languageEnglish
Title of host publicationICETM 2019 - Proceedings of 2019 2nd International Conference on Education Technology Management
PublisherAssociation for Computing Machinery
Pages84-90
Number of pages7
ISBN (Electronic)9781450376297
DOIs
StatePublished - 18 Dec 2019
Event2nd International Conference on Education Technology Management, ICETM 2019 - Barcelona, Spain
Duration: 18 Dec 201920 Dec 2019

Publication series

NameACM International Conference Proceeding Series

Conference

Conference2nd International Conference on Education Technology Management, ICETM 2019
Country/TerritorySpain
CityBarcelona
Period18/12/1920/12/19

Bibliographical note

Publisher Copyright:
© 2019 ACM.

Keywords

  • Cyberattack
  • Cybersecurity Models
  • Electoral Process
  • Security Information
  • Threat Model

Fingerprint

Dive into the research topics of 'Analysis of cybersecurity models suitable to apply in an electoral process in ecuador'. Together they form a unique fingerprint.

Cite this