Security prototype to determine critical information and improve the management of a public organization

Segundo Moises Toapanta Toapanta, Nicole Monica Moran Maldonado, Luis Enrique Mafla Gallegos, Maximo Prado Solis

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The increase in cyber-attacks forced public institutions to design computer security mechanisms to prevent damage to equipment or loss of information, for private use. The objective is to present a security prototype that allows determining critical information and improves the management of a public organization. The deductive method and exploratory research were used. The result was a mixed information control model, a mixed security architecture with mechanisms that comprehensively protect the information, verifying the identity and correlating the risks produced with the application of Blockchain technology, the Magerit and Octave methodology, it was also It is possible to correlate the risks of the links and the data, applying an analysis to give an immediate response. It was concluded that the hybrid architecture allowed to verify the identity and correlate the risks, Blockchain provided control against malicious attacks, together with Magerit that made use of safeguards and Octave analyzed the threats to the security of the assets, used in public management.

Original languageEnglish
Title of host publication2020 Asia Conference on Computers and Communications, ACCC 2020
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages82-90
Number of pages9
ISBN (Electronic)9781728189673
DOIs
StatePublished - 18 Sep 2020
Event2020 Asia Conference on Computers and Communications, ACCC 2020 - Singapore, Singapore
Duration: 18 Sep 202020 Sep 2020

Publication series

Name2020 Asia Conference on Computers and Communications, ACCC 2020

Conference

Conference2020 Asia Conference on Computers and Communications, ACCC 2020
Country/TerritorySingapore
CitySingapore
Period18/09/2020/09/20

Bibliographical note

Publisher Copyright:
© 2020 IEEE.

Keywords

  • Computer security
  • Public management
  • Public organization
  • Security prototypes
  • Security threat

Fingerprint

Dive into the research topics of 'Security prototype to determine critical information and improve the management of a public organization'. Together they form a unique fingerprint.

Cite this