Appropriate Security Algorithms to Mitigate the Risks in a Database of the National Customs Service of Ecuador

Segundo Moisés T. Toapanta, Karen Lissette Ponce Astudillo, Luis Enrique Mafla Gallegos

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

Currently, the use of technological resources, within public and private institutions, has become essential, due to the need to modernize processes, high commercial needs and mandatory continuous improvement. A problem has been observed at the national level, in relation to the ease with which the databases of natural or legal persons are accessed, which has motivated them to provide the respective security measures. For this reason, a study has been carried out on the security measures of the database of the National Customs Service of Ecuador, with a quantitative methodology which allowed to know, objectively, what are the different security measures that must be implemented to improve the operations with the utmost care. In addition, a qualitative analysis of the revised texts was carried out to minimize the threats and vulnerabilities present in security systems. The objective of this study was to establish adequate security algorithms to mitigate risks in a database of the National Customs Service of Ecuador, which has been working, since 2007, on risk management, training personnel, following strategies international and implementing technological aspects to systematize the processes that until then were mainly carried out physically. The need for the institution to take care of its database was evident, applying HASH computer security measures that reduce or eliminate computer thefts, with encrypted algorithms, training of personnel throughout the process and articles of the law that allow the use of adequate mechanisms for the care and protection of information, as appropriate.

Original languageEnglish
Title of host publicationProceedings of the 2020 4th International Conference on Information System and Data Mining, ICISDM 2020
PublisherAssociation for Computing Machinery
Pages89-95
Number of pages7
ISBN (Electronic)9781450377652
DOIs
StatePublished - 15 May 2020
Event4th International Conference on Information System and Data Mining, ICISDM 2020 - Hilo, United States
Duration: 15 May 202017 May 2020

Publication series

NameACM International Conference Proceeding Series

Conference

Conference4th International Conference on Information System and Data Mining, ICISDM 2020
Country/TerritoryUnited States
CityHilo
Period15/05/2017/05/20

Bibliographical note

Publisher Copyright:
© 2020 ACM.

Copyright:
Copyright 2020 Elsevier B.V., All rights reserved.

Keywords

  • Computer Security
  • Computer Theft
  • Encrypted Algorithms
  • Risk Management

Fingerprint

Dive into the research topics of 'Appropriate Security Algorithms to Mitigate the Risks in a Database of the National Customs Service of Ecuador'. Together they form a unique fingerprint.

Cite this