Analysis of New Technologies in Information Security to Mitigate Data Risks in a Public Organization

被引:0
作者
Toapanta Toapanta, Segundo Moises [1 ]
Mafla Gallegos, Luis Enrique [2 ]
Medina Lara, Mario Dario [1 ]
Ortiz Rojas, Javier Gonzalo [1 ]
机构
[1] Salesian Polytech Univ UPS, Dept Comp Sci, Guayaquil, Ecuador
[2] Natl Polytech Sch EPN, Fac Engn Syst, Quito, Ecuador
来源
2020 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMPUTER TECHNOLOGIES (ICICT 2020) | 2020年
关键词
New technologies; Mitigate the risks; Foreign trade; Information security;
D O I
10.1109/ICICT50521.2020.00049
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Were analyzed references on alternative technologies or new proposals to help mitigate data risks. The problem is the lack of application of new technologies that secure information and reduce risks in organizations. The objective is to perform an analysis of new technologies in information security to minimize the risks of data in a public organization. It was used deductive method and exploratory research were used to analyze the information of the referenced articles. It turned out: Mixed Conceptual Model of Information Control, Double Security Architecture for Public Organization in Educational Area, Algorithm Control of Information Security. It was concluded that blockchain is considered as a fundamental option to provide control, robustness against failures and malicious attacks, reliability, availability, immutability and security.
引用
收藏
页码:276 / 283
页数:8
相关论文
共 20 条
[1]   An Efficient Data-Driven Clustering Technique to Detect Attacks in SCADA Systems [J].
Almalawi, Abdulmohsen ;
Fahad, Adil ;
Tari, Zahir ;
Alamri, Abdullah ;
AlGhamdi, Rayed ;
Zomaya, Albert Y. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (05) :893-906
[2]   Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage [J].
Chen, Rongmao ;
Mu, Yi ;
Yang, Guomin ;
Guo, Fuchun ;
Wang, Xiaofen .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (04) :789-798
[3]  
Davies M., 2016, 2016 INT C CYB SIT A, P1
[4]  
Espinoza J., 2019, HYPERLEDGER SCHEME D
[5]   A Reliability Comparison Method for OSINT Validity Analysis [J].
Gong, Seonghyeon ;
Cho, Jaeik ;
Lee, Changhoon .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (12) :5428-5435
[6]   An Improved Information Security Risk Assessments Method for Cyber-Physical-Social Computing and Networking [J].
Li, Senyu ;
Bi, Fangming ;
Chen, Wei ;
Miao, Xuzhi ;
Liu, Jin ;
Tang, Chaogang .
IEEE ACCESS, 2018, 6 :10311-10319
[7]   A New Metric for Measuring the Security of an Environment: The Secrecy Pressure [J].
Mucchi, Lorenzo ;
Ronga, Luca ;
Zhou, Xiangyun ;
Huang, Kaibin ;
Chen, Yifan ;
Wang, Rui .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2017, 16 (05) :3416-3430
[8]   An Adaptive Wideband Delphi Method to Study State Cyber-Defence Requirements [J].
Nugraha, Yudhistira ;
Brown, Ian ;
Sastrosubroto, Ashwin Sasongko .
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2016, 4 (01) :47-59
[9]  
Patiño S, 2018, INT CONF EDEMOC EGOV, P75, DOI 10.1109/ICEDEG.2018.8372361
[10]   Channel-Aware Artificial Intersymbol Interference for Enhancing Physical Layer Security [J].
Pechetti, Sasi Vinay ;
Bose, Ranjan .
IEEE COMMUNICATIONS LETTERS, 2019, 23 (07) :1182-1185