Informating risk prevention in a Cali’s city Pyme

Authors

  • Brian Andrés Medina Cerquera

DOI:

https://doi.org/10.18041/2539-3359/riid.1.5277

Keywords:

Informatics risk, Informatics crime, Safety procedures, legislation, Policies

Abstract

The present time one of the fundamental problems for you lead them and people in charge of the units of computer science of the companies are to manage to obtain resources to assure the digi-tal assets, next expose the fundamental reasons that they justify the execution of a project of con-sultancy of computer science security for the platform of any organization.  For the presentation of the information will be to some topics of the computer science security like variables of deci-sion and their corresponding situation within each organization. Instruments of information harvesting were applied where it fundamentally analyzed the conditions of security of the information in a Pymes from Santiago de Cali to the sector of out-sourcing, where they were obtained like more excellent conclusions:  1) the information is one of the most important assets for the company, 2) are not applied in our average documented alter-natives to safeguard this assets;  probably because of the cost that implies for the Pymes, to ac-quire a tool that allows to develop this activity them;  in addition to a culture - hardly born- to design and to apply policies of computer science security and 3) the education to all the personnel used or directive of this sector, with respect to the importance of the security of the information and the fulfillment of the policies of computer science security, plays a roll of vital importance during the implementation of the process of protection of the information;  besides to ensure in a high percentage the success of the same one

Downloads

Download data is not yet available.

References

ACISSI – Agé, Marion; BAUDRU, Sébastien; CROCFER, Nicolas; CROCFER Robert; EBEL, Franck; HENNECART, Jérôme; LASSON, Sébastien; PUCHE, David; RAULT, Raphaël. “Seguridad Informática” En: Ethical Hacking. 2. Edición. 2011

AGUILERA LÓPEZ. Seguridad Informática. 2011.

CANO, Jeimy. Arquitecturas de Seguridad Informática: Entre la administración y el gobierno de la Seguridad de la Información. En: seminario de actualización en seguridad informática. Documento Módulo I Seminario de Actualización en Seguridad Informática. Bucaramanga: Facultad de Ingeniería Informática, Bucaramanga: 2008, p 28.

CRUZ ACOSTA, Arafet. Libro electrónico: Virus y Antivirus Seguridad Informática. 2012.

ECHEVERRÍA. Procedimientos y Medidas de Seguridad Informática- conceptos básicos de seguridad de redes. 2011.

GARCÍA-CERVIGON, Alegre Ramos. Antivirus seguridad informática. 2011.

PORTANTIER. Seguridad Informática: Aprenda como implementar soluciones desde la visión del experto. 2013.

PRESIDENCIA DE LA REPÚBLICA DE COLOMBIA. 2009. Ley 1273 de 2009.

PRESIDENCIA DE LA REPÚBLICA DE COLOMBIA. 2012. Ley 1581 de 2012.

REVISTA ACIS 115 Seguridad informática: Colombia en la mira. XIII encuesta nacional ACIS, 2013.

Downloads

Published

2019-05-31

How to Cite

Informating risk prevention in a Cali’s city Pyme. (2019). Journal of Engineering, Innovation and Development, 1(1), 43-57. https://doi.org/10.18041/2539-3359/riid.1.5277