Analysis of the information by the management of security incidents in organizations
Descripción del Articulo
Security incidents in an organization are considered the main source for evaluating the correct application of security controls in public or private organizations. The investigation is based on the behavior of the incidents before the participation of information technology controls together with t...
Autores: | , , , |
---|---|
Formato: | artículo |
Fecha de Publicación: | 2022 |
Institución: | Universidad Nacional Autónoma de Huanta |
Repositorio: | Puriq |
Lenguaje: | español |
OAI Identifier: | oai:ojs2.www.revistas.unah.edu.pe:article/196 |
Enlace del recurso: | https://www.revistas.unah.edu.pe/index.php/puriq/article/view/196 |
Nivel de acceso: | acceso abierto |
Materia: | incidente información seguridad buena práctica Good practice incident information security Boas práticas Informações segurança |
id |
REVUNAH_d4594520f23e565f8b191fcf0d9796f1 |
---|---|
oai_identifier_str |
oai:ojs2.www.revistas.unah.edu.pe:article/196 |
network_acronym_str |
REVUNAH |
network_name_str |
Puriq |
repository_id_str |
|
dc.title.none.fl_str_mv |
Analysis of the information by the management of security incidents in organizations Análisis de información de la gestión de incidentes de seguridad en organizaciones Análise de informações de gerenciamento de incidentes de segurança em organizações |
title |
Analysis of the information by the management of security incidents in organizations |
spellingShingle |
Analysis of the information by the management of security incidents in organizations Tasa-Catanzaro, María Elena incidente información seguridad buena práctica Good practice incident information security Boas práticas incidente Informações segurança |
title_short |
Analysis of the information by the management of security incidents in organizations |
title_full |
Analysis of the information by the management of security incidents in organizations |
title_fullStr |
Analysis of the information by the management of security incidents in organizations |
title_full_unstemmed |
Analysis of the information by the management of security incidents in organizations |
title_sort |
Analysis of the information by the management of security incidents in organizations |
dc.creator.none.fl_str_mv |
Tasa-Catanzaro, María Elena Maquera-Quispe, Henry George Rojas-Bujaico, John Fredy Delgado-Rospigliosi, Marjorie Gabriela del Carmen |
author |
Tasa-Catanzaro, María Elena |
author_facet |
Tasa-Catanzaro, María Elena Maquera-Quispe, Henry George Rojas-Bujaico, John Fredy Delgado-Rospigliosi, Marjorie Gabriela del Carmen |
author_role |
author |
author2 |
Maquera-Quispe, Henry George Rojas-Bujaico, John Fredy Delgado-Rospigliosi, Marjorie Gabriela del Carmen |
author2_role |
author author author |
dc.subject.none.fl_str_mv |
incidente información seguridad buena práctica Good practice incident information security Boas práticas incidente Informações segurança |
topic |
incidente información seguridad buena práctica Good practice incident information security Boas práticas incidente Informações segurança |
description |
Security incidents in an organization are considered the main source for evaluating the correct application of security controls in public or private organizations. The investigation is based on the behavior of the incidents before the participation of information technology controls together with the formal processes in the organizations. Good security practices based on the international standards ISO / IEC 27001 and ISO / IEC 27002 were used. The Magerit v3 methodology and business intelligence techniques were applied to integrate and process the information obtained through heterogeneous sources of information implemented in the organizations under study. The information obtained was established in 9 security controls common to the organizations under study applied under an experimental study. The analysis of the arrival data will establish that the constant monitoring and supervision of the application of the security controls raises the security levels in the organizations that guarantee the continuity of the services and processes. |
publishDate |
2022 |
dc.date.none.fl_str_mv |
2022-01-04 |
dc.type.none.fl_str_mv |
info:eu-repo/semantics/article info:eu-repo/semantics/publishedVersion Artículo Original |
format |
article |
status_str |
publishedVersion |
dc.identifier.none.fl_str_mv |
https://www.revistas.unah.edu.pe/index.php/puriq/article/view/196 10.37073/puriq.4.1.196 |
url |
https://www.revistas.unah.edu.pe/index.php/puriq/article/view/196 |
identifier_str_mv |
10.37073/puriq.4.1.196 |
dc.language.none.fl_str_mv |
spa |
language |
spa |
dc.relation.none.fl_str_mv |
https://www.revistas.unah.edu.pe/index.php/puriq/article/view/196/334 https://www.revistas.unah.edu.pe/index.php/puriq/article/view/196/349 https://www.revistas.unah.edu.pe/index.php/puriq/article/view/196/374 https://www.revistas.unah.edu.pe/index.php/puriq/article/view/196/375 10.37073/puriq.4.1.196.g334 10.37073/puriq.4.1.196.g349 10.37073/puriq.4.1.196.g374 10.37073/puriq.4.1.196.g375 |
dc.rights.none.fl_str_mv |
https://creativecommons.org/licenses/by/4.0 info:eu-repo/semantics/openAccess |
rights_invalid_str_mv |
https://creativecommons.org/licenses/by/4.0 |
eu_rights_str_mv |
openAccess |
dc.format.none.fl_str_mv |
application/pdf text/html text/xml application/zip |
dc.publisher.none.fl_str_mv |
Universidad Nacional Autónoma de Huanta |
publisher.none.fl_str_mv |
Universidad Nacional Autónoma de Huanta |
dc.source.none.fl_str_mv |
Puriq; Vol. 4 (2022): january-december: continuous publication; e196 Puriq; Vol. 4 (2022): enero-diciembre: publicación continua; e196 Puriq; v. 4 (2022): Janeiro-Dezembro: publicação contínua; e196 2707-3602 2664-4029 10.37073/puriq.4.1.2022 reponame:Puriq instname:Universidad Nacional Autónoma de Huanta instacron:UNAH |
instname_str |
Universidad Nacional Autónoma de Huanta |
instacron_str |
UNAH |
institution |
UNAH |
reponame_str |
Puriq |
collection |
Puriq |
repository.name.fl_str_mv |
|
repository.mail.fl_str_mv |
|
_version_ |
1844344777699491840 |
spelling |
Analysis of the information by the management of security incidents in organizationsAnálisis de información de la gestión de incidentes de seguridad en organizacionesAnálise de informações de gerenciamento de incidentes de segurança em organizaçõesTasa-Catanzaro, María ElenaMaquera-Quispe, Henry GeorgeRojas-Bujaico, John FredyDelgado-Rospigliosi, Marjorie Gabriela del Carmenincidenteinformaciónseguridadbuena prácticaGood practiceincidentinformationsecurityBoas práticasincidenteInformaçõessegurançaSecurity incidents in an organization are considered the main source for evaluating the correct application of security controls in public or private organizations. The investigation is based on the behavior of the incidents before the participation of information technology controls together with the formal processes in the organizations. Good security practices based on the international standards ISO / IEC 27001 and ISO / IEC 27002 were used. The Magerit v3 methodology and business intelligence techniques were applied to integrate and process the information obtained through heterogeneous sources of information implemented in the organizations under study. The information obtained was established in 9 security controls common to the organizations under study applied under an experimental study. The analysis of the arrival data will establish that the constant monitoring and supervision of the application of the security controls raises the security levels in the organizations that guarantee the continuity of the services and processes.Los incidentes de seguridad en una organización se consideran como la fuente principal para evaluar la correcta aplicación de los controles de seguridad en organizaciones públicas o privadas. La investigación está basada en el comportamiento de los incidentes ante la participación de controles de tecnologías de información conjuntamente con los procesos formales en las organizaciones. Se utilizaron buenas prácticas de seguridad basadas en las normas internacionales ISO/IEC 27001 e ISO/IEC 27002. Se aplicó la metodología Magerit v3 y técnicas de inteligencia de negocios para integrar y procesar la información obtenida a través de fuentes heterogéneas de información implementadas en las organizaciones bajo estudio. La información obtenida se estableció en 9 controles de seguridad comunes a las organizaciones en estudio aplicados bajo un estudio experimental. El análisis de los datos permitió establecer que el constante monitoreo y supervisión de la aplicación de los controles de seguridad eleva los niveles de seguridad en las organizaciones garantizando la continuidad de los servicios y procesos.Os incidentes de segurança em uma organização são considerados como a principal fonte para avaliar a aplicação correta dos controles de segurança em organizações públicas ou privadas. A pesquisa baseia-se no comportamento de incidentes envolvendo controles de TI em conjunto com processos formais nas organizações. Foram utilizadas boas práticas de segurança baseadas nas normas internacionais ISO/IEC 27001 e ISO/IEC 27002. A metodologia Magerit v3 e as técnicas de business intelligence foram aplicadas para integrar e processar as informações obtidas de fontes heterogêneas de informações implementadas nas organizações em estudo. As informações obtidas foram estabelecidas em 9 controles de segurança comuns às organizações em estudo, aplicados em um estudo experimental. A análise dos dados permitiu estabelecer que o monitoramento e a supervisão constantes da aplicação dos controles de segurança elevam os níveis de segurança nas organizações, garantindo a continuidade dos serviços e processos.Universidad Nacional Autónoma de Huanta2022-01-04info:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionArtículo Originalapplication/pdftext/htmltext/xmlapplication/ziphttps://www.revistas.unah.edu.pe/index.php/puriq/article/view/19610.37073/puriq.4.1.196Puriq; Vol. 4 (2022): january-december: continuous publication; e196Puriq; Vol. 4 (2022): enero-diciembre: publicación continua; e196Puriq; v. 4 (2022): Janeiro-Dezembro: publicação contínua; e1962707-36022664-402910.37073/puriq.4.1.2022reponame:Puriqinstname:Universidad Nacional Autónoma de Huantainstacron:UNAHspahttps://www.revistas.unah.edu.pe/index.php/puriq/article/view/196/334https://www.revistas.unah.edu.pe/index.php/puriq/article/view/196/349https://www.revistas.unah.edu.pe/index.php/puriq/article/view/196/374https://www.revistas.unah.edu.pe/index.php/puriq/article/view/196/37510.37073/puriq.4.1.196.g33410.37073/puriq.4.1.196.g34910.37073/puriq.4.1.196.g37410.37073/puriq.4.1.196.g375Derechos de autor 2022 María Elena Tasa Catanzaro, Henry George Maquera Quispe, John Fredy Rojas Bujaico, Marjorie Gabriela del Carmen Delgado Rospigliosihttps://creativecommons.org/licenses/by/4.0info:eu-repo/semantics/openAccessoai:ojs2.www.revistas.unah.edu.pe:article/1962024-08-16T17:55:27Z |
score |
12.798383 |
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).