Analysis of the information by the management of security incidents in organizations

Descripción del Articulo

Security incidents in an organization are considered the main source for evaluating the correct application of security controls in public or private organizations. The investigation is based on the behavior of the incidents before the participation of information technology controls together with t...

Descripción completa

Detalles Bibliográficos
Autores: Tasa-Catanzaro, María Elena, Maquera-Quispe, Henry George, Rojas-Bujaico, John Fredy, Delgado-Rospigliosi, Marjorie Gabriela del Carmen
Formato: artículo
Fecha de Publicación:2022
Institución:Universidad Nacional Autónoma de Huanta
Repositorio:Puriq
Lenguaje:español
OAI Identifier:oai:ojs2.www.revistas.unah.edu.pe:article/196
Enlace del recurso:https://www.revistas.unah.edu.pe/index.php/puriq/article/view/196
Nivel de acceso:acceso abierto
Materia:incidente
información
seguridad
buena práctica
Good practice
incident
information
security
Boas práticas
Informações
segurança
id REVUNAH_d4594520f23e565f8b191fcf0d9796f1
oai_identifier_str oai:ojs2.www.revistas.unah.edu.pe:article/196
network_acronym_str REVUNAH
network_name_str Puriq
repository_id_str
dc.title.none.fl_str_mv Analysis of the information by the management of security incidents in organizations
Análisis de información de la gestión de incidentes de seguridad en organizaciones
Análise de informações de gerenciamento de incidentes de segurança em organizações
title Analysis of the information by the management of security incidents in organizations
spellingShingle Analysis of the information by the management of security incidents in organizations
Tasa-Catanzaro, María Elena
incidente
información
seguridad
buena práctica
Good practice
incident
information
security
Boas práticas
incidente
Informações
segurança
title_short Analysis of the information by the management of security incidents in organizations
title_full Analysis of the information by the management of security incidents in organizations
title_fullStr Analysis of the information by the management of security incidents in organizations
title_full_unstemmed Analysis of the information by the management of security incidents in organizations
title_sort Analysis of the information by the management of security incidents in organizations
dc.creator.none.fl_str_mv Tasa-Catanzaro, María Elena
Maquera-Quispe, Henry George
Rojas-Bujaico, John Fredy
Delgado-Rospigliosi, Marjorie Gabriela del Carmen
author Tasa-Catanzaro, María Elena
author_facet Tasa-Catanzaro, María Elena
Maquera-Quispe, Henry George
Rojas-Bujaico, John Fredy
Delgado-Rospigliosi, Marjorie Gabriela del Carmen
author_role author
author2 Maquera-Quispe, Henry George
Rojas-Bujaico, John Fredy
Delgado-Rospigliosi, Marjorie Gabriela del Carmen
author2_role author
author
author
dc.subject.none.fl_str_mv incidente
información
seguridad
buena práctica
Good practice
incident
information
security
Boas práticas
incidente
Informações
segurança
topic incidente
información
seguridad
buena práctica
Good practice
incident
information
security
Boas práticas
incidente
Informações
segurança
description Security incidents in an organization are considered the main source for evaluating the correct application of security controls in public or private organizations. The investigation is based on the behavior of the incidents before the participation of information technology controls together with the formal processes in the organizations. Good security practices based on the international standards ISO / IEC 27001 and ISO / IEC 27002 were used. The Magerit v3 methodology and business intelligence techniques were applied to integrate and process the information obtained through heterogeneous sources of information implemented in the organizations under study. The information obtained was established in 9 security controls common to the organizations under study applied under an experimental study. The analysis of the arrival data will establish that the constant monitoring and supervision of the application of the security controls raises the security levels in the organizations that guarantee the continuity of the services and processes.
publishDate 2022
dc.date.none.fl_str_mv 2022-01-04
dc.type.none.fl_str_mv info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
Artículo Original
format article
status_str publishedVersion
dc.identifier.none.fl_str_mv https://www.revistas.unah.edu.pe/index.php/puriq/article/view/196
10.37073/puriq.4.1.196
url https://www.revistas.unah.edu.pe/index.php/puriq/article/view/196
identifier_str_mv 10.37073/puriq.4.1.196
dc.language.none.fl_str_mv spa
language spa
dc.relation.none.fl_str_mv https://www.revistas.unah.edu.pe/index.php/puriq/article/view/196/334
https://www.revistas.unah.edu.pe/index.php/puriq/article/view/196/349
https://www.revistas.unah.edu.pe/index.php/puriq/article/view/196/374
https://www.revistas.unah.edu.pe/index.php/puriq/article/view/196/375
10.37073/puriq.4.1.196.g334
10.37073/puriq.4.1.196.g349
10.37073/puriq.4.1.196.g374
10.37073/puriq.4.1.196.g375
dc.rights.none.fl_str_mv https://creativecommons.org/licenses/by/4.0
info:eu-repo/semantics/openAccess
rights_invalid_str_mv https://creativecommons.org/licenses/by/4.0
eu_rights_str_mv openAccess
dc.format.none.fl_str_mv application/pdf
text/html
text/xml
application/zip
dc.publisher.none.fl_str_mv Universidad Nacional Autónoma de Huanta
publisher.none.fl_str_mv Universidad Nacional Autónoma de Huanta
dc.source.none.fl_str_mv Puriq; Vol. 4 (2022): january-december: continuous publication; e196
Puriq; Vol. 4 (2022): enero-diciembre: publicación continua; e196
Puriq; v. 4 (2022): Janeiro-Dezembro: publicação contínua; e196
2707-3602
2664-4029
10.37073/puriq.4.1.2022
reponame:Puriq
instname:Universidad Nacional Autónoma de Huanta
instacron:UNAH
instname_str Universidad Nacional Autónoma de Huanta
instacron_str UNAH
institution UNAH
reponame_str Puriq
collection Puriq
repository.name.fl_str_mv
repository.mail.fl_str_mv
_version_ 1844344777699491840
spelling Analysis of the information by the management of security incidents in organizationsAnálisis de información de la gestión de incidentes de seguridad en organizacionesAnálise de informações de gerenciamento de incidentes de segurança em organizaçõesTasa-Catanzaro, María ElenaMaquera-Quispe, Henry GeorgeRojas-Bujaico, John FredyDelgado-Rospigliosi, Marjorie Gabriela del Carmenincidenteinformaciónseguridadbuena prácticaGood practiceincidentinformationsecurityBoas práticasincidenteInformaçõessegurançaSecurity incidents in an organization are considered the main source for evaluating the correct application of security controls in public or private organizations. The investigation is based on the behavior of the incidents before the participation of information technology controls together with the formal processes in the organizations. Good security practices based on the international standards ISO / IEC 27001 and ISO / IEC 27002 were used. The Magerit v3 methodology and business intelligence techniques were applied to integrate and process the information obtained through heterogeneous sources of information implemented in the organizations under study. The information obtained was established in 9 security controls common to the organizations under study applied under an experimental study. The analysis of the arrival data will establish that the constant monitoring and supervision of the application of the security controls raises the security levels in the organizations that guarantee the continuity of the services and processes.Los incidentes de seguridad en una organización se consideran como la fuente principal para evaluar la correcta aplicación de los controles de seguridad en organizaciones públicas o privadas. La investigación está basada en el comportamiento de los incidentes ante la participación de controles de tecnologías de información conjuntamente con los procesos formales en las organizaciones. Se utilizaron buenas prácticas de seguridad basadas en las normas internacionales ISO/IEC 27001 e ISO/IEC 27002. Se aplicó la metodología Magerit v3 y técnicas de inteligencia de negocios para integrar y procesar la información obtenida a través de fuentes heterogéneas de información implementadas en las organizaciones bajo estudio. La información obtenida se estableció en 9 controles de seguridad comunes a las organizaciones en estudio aplicados bajo un estudio experimental. El análisis de los datos permitió establecer que el constante monitoreo y supervisión de la aplicación de los controles de seguridad eleva los niveles de seguridad en las organizaciones garantizando la continuidad de los servicios y procesos.Os incidentes de segurança em uma organização são considerados como a principal fonte para avaliar a aplicação correta dos controles de segurança em organizações públicas ou privadas. A pesquisa baseia-se no comportamento de incidentes envolvendo controles de TI em conjunto com processos formais nas organizações. Foram utilizadas boas práticas de segurança baseadas nas normas internacionais ISO/IEC 27001 e ISO/IEC 27002. A metodologia Magerit v3 e as técnicas de business intelligence foram aplicadas para integrar e processar as informações obtidas de fontes heterogêneas de informações implementadas nas organizações em estudo. As informações obtidas foram estabelecidas em 9 controles de segurança comuns às organizações em estudo, aplicados em um estudo experimental. A análise dos dados permitiu estabelecer que o monitoramento e a supervisão constantes da aplicação dos controles de segurança elevam os níveis de segurança nas organizações, garantindo a continuidade dos serviços e processos.Universidad Nacional Autónoma de Huanta2022-01-04info:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionArtículo Originalapplication/pdftext/htmltext/xmlapplication/ziphttps://www.revistas.unah.edu.pe/index.php/puriq/article/view/19610.37073/puriq.4.1.196Puriq; Vol. 4 (2022): january-december: continuous publication; e196Puriq; Vol. 4 (2022): enero-diciembre: publicación continua; e196Puriq; v. 4 (2022): Janeiro-Dezembro: publicação contínua; e1962707-36022664-402910.37073/puriq.4.1.2022reponame:Puriqinstname:Universidad Nacional Autónoma de Huantainstacron:UNAHspahttps://www.revistas.unah.edu.pe/index.php/puriq/article/view/196/334https://www.revistas.unah.edu.pe/index.php/puriq/article/view/196/349https://www.revistas.unah.edu.pe/index.php/puriq/article/view/196/374https://www.revistas.unah.edu.pe/index.php/puriq/article/view/196/37510.37073/puriq.4.1.196.g33410.37073/puriq.4.1.196.g34910.37073/puriq.4.1.196.g37410.37073/puriq.4.1.196.g375Derechos de autor 2022 María Elena Tasa Catanzaro, Henry George Maquera Quispe, John Fredy Rojas Bujaico, Marjorie Gabriela del Carmen Delgado Rospigliosihttps://creativecommons.org/licenses/by/4.0info:eu-repo/semantics/openAccessoai:ojs2.www.revistas.unah.edu.pe:article/1962024-08-16T17:55:27Z
score 12.798383
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).