Administrative and technical solutions to protect computational resources from internal-insiders personnel
DOI:
https://doi.org/10.29105/rinn4.8-7Keywords:
Administrative Solutions, Computational Security, Culture of Security, Protection Tools, Technical SolutionsAbstract
Nowadays the organizations know that the computational security in logical, physical, environment security of hardware, software, process of business, data bases, telecommunications, butt in other, are essential not solely for the continuity of the daily operations of the businesses, but also to obtain strategic advantages. If the organization does not worry to place policies of computational security, that does not have control computational security, that does not invest in protection tools, does not update itself in the new problems of
internal attacks and that a culture in computational security does not foment, among other aspects, more likely this in a high risk of which some computational resource can be affected by internal personnel and in consequence part or all the Business can let operate. It is necessary to remember that the internal personnel of the areas of information technology or systems intentional business or not intentionally they can damage the computational resources since they have knowledge of the vulnerabilities that have the computational
resources. I am made east summary with the purpose of which the people who read it have This paper has the aim to create a TI Resources Security Culture and to present some administrative and technical elements to protect the computational resources of from internalinsiders personnel.
Downloads
References
Borghello, C. F. 2001. Tesis Seguridad Informática, Su Implicancia e Implementación www.segu-info.com.ar.2007, p.17.
CISA Review Manual. 2005. The Information Systems Audit and Control Association, p. 75.
CISM REVIEW MANUAL. 2006. CERTIFIED INFORMATION SECURITY MANAGER, CISM, Information Systems Audit and Control Association p. 27.
Ernst & Young. 2001. “Encuesta de Seguridad Informática en tecnologías 2001” Ernst & Young México, http//www.ey.com. (2001)
Swing, J., J. Falcon & K. McGrane. 2007. IT Security: Preventing The March of Madness Business Communications Review; p. 30.
INAP, Directiva Nº002-77-INAP/DNR. 1986. Normas para la Formulación de los Manuales de Procedimientos)
www.unmsm.edu.pe/ogp/ARCHIVOS/Glosario/indp.htm (1986).
ISO/IEC 1779 & ISO/IEC 27001. 2005. Information Security Management System Implantation –Student Manual. BSI Management Systems Inc.
Macleod, C. 2007.Top Hacker Secrets.; Management Services; 51, 2; p. 46.
Nakagawa, M. A. 1996. “A Closer Look at Culture”. p.22 y 23. Edit. Gránica S.A. p. 6. Citado por Girard, G. / Koch S.J., obra cit. p. 48 y 49.
Rebbapragada, N. 2006. All-in-One SECURITY, PC World; 24, 7; Computing, p. 100.
Stanley, T. L. 2007. Hire the right person SuperVision; 68,7 ; p.10.
Steele, S. & C. Wargo. 2007. An Introduction to Insider Threat Management, Information Systems Security, volume 16 Number 1-, 23- 29 -31.
Swing, J., J. Falcon & K. McGrane. 2007. p. 30. La tecnología de Redes Privadas Virtuales– Virtual Private Network (VPN).
Vadalis, S. & Z. Kazmi. 2007a. Information Systems Security, volume 16, number 1, January / february, p. 34.
Vidalis, S. & Z. Kazmi. 2007b. Security Through Deception, Information Systems Security, Jan/Feb: 16, number 1, p. 34-41.
Zyskowski, J. 2006. Thumb drives are too often the victims of convenience Federal Computer Week; Computing 20, 42; p. 41.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2017 Innovaciones de Negocios
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The InnOvaciOnes de NegOciOs magazine is a free and open access electronic magazine of a scientific-academic nature and is a publication of the Autonomous University of Nuevo León, in which the authors retain their copyright and grant the magazine the exclusive right to first publication of the work. Third parties are allowed to use the published content, as long as the authorship of the work is acknowledged and the first publication in this journal is cited.
For more information, please contact the Research Secretary (FACPyA) of the Autonomous University of Nuevo León. Telephone: (81) 1340-4430. Email: revinnova@uanl.mx