2016, Number 22
<< Back Next >>
INFODIR 2016; 12 (22)
Informatics and security: an important topic for managers
García PG, Vidal LMJ
Language: Spanish
References: 17
Page: 47-58
PDF size: 361.38 Kb.
ABSTRACT
Introduction: The societal transformation process understood in many senses is
based on technology. Nevertheless, does the use of information technology offer
security?
Objective: To promote an information culture in individuals who outline policies
and use technologies in organizational processes.
Methods: Arguments examination is the result of reviews, experiences and
exchanges.
Results: Informatics is based on the importance of the information security in 3 aspects:
confidentiality, integrality and
availability which are important to
leadership responsible for organizing policy and strategies for using and preserving
all these information processes and technological so much-needed in decisionmaking
in the field they run; to officials handling technologies as well as information contained in it; to specialists in informatics responsible for assuring a safe support where these techniques operate; to the staff in charge of security and protection assuring the implementation of policies, measures and countermeasures applied to assure the means, repositories and information itself.
Conclusion: The document emphasizes the main principles of information security, analysis and risk management, policies, measures and countermeasures
and other procedures assuring the safety of the information system at institutions in the existing information process at the society.
REFERENCES
Gay A. La tecnología y la historia. [Internet]. [citado 8 Dic 2015]. Disponible en: http://www.ifdcelbolson.edu.ar/mat_biblio/tecnologia/curso1/u1/05.pdf
García Pierrat G. Seguridad Informática. La Habana: G.L.D; 2003.
Salazar CM. Disposición frente al cambio tecnológico: Un estudio empírico [Internet]. Chillán (Chile): Universidad del Bío-Bío; 2002 [citado 8 Dic 2015]. Disponible en: http://www.panorama.utalca.cl/dentro/2004-oct/3.pdf
Prensky M. Digital natives, digital immigrants. On the horizon [Internet]. 2001 [cited 18 Dec 2015]; 9(6): 1-9. Available from: https://edorigami.wikispaces.com/file/view/PRENSKY%20- %20DIGITAL%20NATIVES%20AND%20IMMIGRANTS%202.PDF/30785667/PRE NSKY%20-%20DIGITAL%20NATIVES%20AND%20IMMIGRANTS%202.PDF
Piscitelli A. Nativos e inmigrantes digitales. ¿Brecha generacional, brecha cognitiva, o las dos juntas y más aún?. Rev. Mexicana de Investigación Educativa [Internet] 2006 Ene-Mar [citado 8 Dic 2015]; 11(28): 179-85. Disponible en: http://www.redalyc.org/pdf/140/14002809.pdf
García Pierrat G. Ingeniería Social. Revista PuntoCU. 2003
Norma cubana NC/IEEC 17799: Código de buenas prácticas para la gestión de la seguridad de la información. 2007
Avogadro M. Seguridad y nuevas tecnologías: un binomio necesario [Internet] [citado 18 Dic 2015]. Disponible en: http://www.forodeseguridad.com/artic/miscel/6100.htm
Vidal Ledo M, García Pierrat G. Seguridad, información y salud. Revista Cubana de Informática Médica [Internet]. 2005 Ene-Mar [citado 18 Dic 2015]; 1(5). Disponible en: http://www.cecam.sld.cu/rcim/revista_7/articulo_htm/segurinfsalud.htm
García Pierrat G. La Seguridad Informática como componente de la Seguridad y Protección. La Habana: Dirección de Protección, MININT; 2001.
García Pierrat G. El delito en tiempos de Internet. XI Encuentro Internacional Ciencias Penales [CD-ROM]. La Habana: Fiscalía General de la República; 2012.
Oficina de Seguridad para las Redes Informáticas. Metodología para la Gestión de la seguridad informática (proyecto) [Internet]. La Habana: OSRI; 2013 [citado 19 Dic 2015]. Disponible en: http://instituciones.sld.cu/dnspminsap/files/2013/08/Metodologia-PSINUEVAProyecto. pdf
Dunn MA. A Comparative Analysis of Cybersecurity Initiatives Worldwide [Internet]. Zurich: Swiss Federal Institute of Technology; 2005 [cited 18 Dec 2015]. Available from: http://www.itu.int/osg/spu/cybersecurity/docs/Background_Paper_Comparativ e_Analysis_Cybersecurity_Initiatives_Worldwide.pdf
Brownlee N, Guttman E. RFC2350: Expectations for Computer Security Incident Response [Internet]. RFC; 1998 [cited 11 Dec 2015]. Available from: http://www.ietf.org/rfc/rfc2350
ISO/IEC 18044: Information technology -- Security techniques -- Information security incident management [Internet] 2004 [cited 16 Dec 2015]. Available form: http://www.iso.org/iso/catalogue_detail.htm?csnumber=35396
West-Brown MJ, Stikvoort D, Kossakowski KP, Killcrece G, Ruefle R, Zajicek M. Handbook for Computer Security Incident Response Teams (CSIRT´s). 2nd Ed [Internet]. Pittsburgh, PA: Carnegie Mellon University; 2003 [cited 11 Dec 2015]. Available form: ftp://ftp.sei.cmu.edu/pub/documents/98.reports/pdf/98hb001.pdf
García Pierrat G. Administración de incidentes de Seguridad Informática. 2014.