Ecuador's constant technological growth is evident in recent years, great efforts have been devoted to the development of information systems for organizations, but only for the development of systems; unfortunately, there are few security controls or maintenance that have been implemented in those already mentioned. Ecuador has been the target of constant attacks and have been the result of the vulnerability of its information security. This is the consequence of having very poor control of their systems due to the neglect of senior management, reduced costs or simply complete ignorance of the subject by the staff. Auditing helps identify weaknesses in an organization in general or in systems where security is important. Every audit process is linked to a plan, realization and results, but it is thanks to the methodology that they will give us indicators to make changes to the system, that these results have relevance; as the parameters to be evaluated from the system are presented in the system. Our goal was to find key parameters for a correct security assessment against a cyberattack. Methodologies from various sources such as books, recognized standards methodologies, standardized guidance processes, among others were adapted and used. It was concluded that using guide the parameters found in our research helps an organization to have a stable yet secure system against a cyberattack.
|Title of host publication||ICETM 2019 - Proceedings of 2019 2nd International Conference on Education Technology Management|
|Publisher||Association for Computing Machinery|
|Number of pages||6|
|State||Published - 18 Dec 2019|
|Event||2nd International Conference on Education Technology Management, ICETM 2019 - Barcelona, Spain|
Duration: 18 Dec 2019 → 20 Dec 2019
|Name||ACM International Conference Proceeding Series|
|Conference||2nd International Conference on Education Technology Management, ICETM 2019|
|Period||18/12/19 → 20/12/19|
Bibliographical notePublisher Copyright:
© 2019 ACM.