Different models and standards of information security were analyzed, to adopt a model that mitigates vulnerabilities, risks and threats in the quota allocation process for the State University in Ecuador. The main objective is defining a prototype for the management of processes and information security in this type of organization. It was used the deductive and exploratory research method to analyze the information in the references. In this work, the characteristics of the attacks were analyzed. It turned out a model performs the detection and defense of attacks based on the differences in data and time between them and the browsing behavior of normal users. It was concluded that the prototypes presented as results are an alternative to improve the security of the processes and the flow of information and that these can be used as a reference in this type of organization.
|Número de páginas||10|
|Publicación||Advances in Science, Technology and Engineering Systems|
|Estado||Publicada - abr. 2020|
Nota bibliográficaPublisher Copyright:
© 2020 ASTES Publishers. All rights reserved.
Copyright 2020 Elsevier B.V., All rights reserved.