|
|
Please use this identifier to cite or link to this item:
https://repositorio.utn.edu.ec/handle/123456789/18071Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Imbaquingo Esparza, Daisy Elizabeth | - |
| dc.contributor.author | Herrera Granda, Erick Patricio. | - |
| dc.contributor.author | Herrera Granda, Israel David | - |
| dc.contributor.author | Arciniega Hidrobo, Silvia Rosario | - |
| dc.contributor.author | Guamán, Verónica L. | - |
| dc.contributor.author | Ortega Bustamante, Cosme MacArthur | - |
| dc.date.accessioned | 2025-11-28T21:57:56Z | - |
| dc.date.available | 2025-11-28T21:57:56Z | - |
| dc.date.created | 2019-08-19 | - |
| dc.date.issued | 2025-11-28 | - |
| dc.identifier.issn | 1646-9895 | - |
| dc.identifier.uri | https://repositorio.utn.edu.ec/handle/123456789/18071 | - |
| dc.description.abstract | El presente trabajo detalla el proceso de evaluación de seguridad del Sistema de Evaluación Docente de la Universidad Técnica del Norte, para establecer objetivos y controles que permitan minimizar las vulnerabilidades del sistema de gestión. Se recolectó información mediante encuestas, entrevistas y reuniones de trabajo, posteriormente se aplicó la metodología Magerit mediante el software PILAR, que permitió el levantamiento de información y activos como hardware, software, y activo humano, para luego realizar una valoración de acuerdo con su incidencia en la integridad, confidencialidad, disponibilidad, autenticidad y trazabilidad. La estructura factorial de la encuesta se diseñó mediante análisis factorial exploratorio y los resultados se validaron empleando análisis factorial confirmatorio. Además, se realizó una revisión de la ISO/IEC2001:2013 y la evaluación de cumplimiento basada en la Norma ISO/IEC 2700:2017. Para detectar la seguridad a este sistema se hizo pruebas de penetración en las vulnerabilidades detectadas mediante herramientas de SQLmap y Nmap. | es_EC |
| dc.language.iso | spa | es_EC |
| dc.rights | openAccess | es_EC |
| dc.rights | Atribución-NoComercial-CompartirIgual 3.0 Ecuador | * |
| dc.rights.uri | http://creativecommons.org/licenses/by-nc-sa/3.0/ec/ | * |
| dc.subject | SISTEMAS INFORMÁTICOS | es_EC |
| dc.subject | ANÁLISIS FACTORIAL | es_EC |
| dc.subject | VALIDEZ | es_EC |
| dc.subject | FIABILIDAD | es_EC |
| dc.title | Evaluación de sistemas de seguridad informáticos universitarios Caso de Estudio: Sistema de Evaluación Docente | es_EC |
| dc.type | Article | es_EC |
| dc.description.degree | N/A | es_EC |
| dc.coverage | Ibarra. Ecuador | es_EC |
| dc.contributor.orcid | https://orcid.org/0000-0002-6412-6257 | es_EC |
| dc.contributor.orcid | https://orcid.org/0000-0002-4465-9419 | es_EC |
| dc.contributor.orcid | https://orcid.org/0000-0003-1437-0785 | es_EC |
| dc.contributor.orcid | https://orcid.org/0000-0003-3061-9595 | es_EC |
| dc.title.en | Evaluation of University Informatic Security Systems: Teacher Evaluation System a case study | es_EC |
| dc.subject.en | INFORMATIC SECURITY SYSTEM EVALUATION | es_EC |
| dc.subject.en | FACTORIAL EXPLORATORY ANALYSIS | es_EC |
| dc.subject.en | VALIDITY | es_EC |
| dc.subject.en | FIABILITY | es_EC |
| dc.description.abstract-en | This work details the security evaluation process of Técnica del Norte University teacher evaluation system, in order to establish objectives and controls that minimize the vulnerabilities of the management system. Information was collected through surveys, interviews and work meetings. Next, the Magerit methodology was applied through the PILAR software, which allowed information and assets collection, such as hardware, software, and human assets, and then, an assessment according to its incidence in integrity, confidentiality, availability, authenticity and traceability, was made. The factorial structure of the survey was designed using exploratory factor analysis and the results were validated by means of confirmatory factor analysis. In addition, a review of ISO / IEC2001: 2013 and an evaluation of compliance based on ISO / IEC 2700: 2017 was performed. To detect the security of this system, penetration tests were made on the detected vulnerabilities, by means of SQLmap and Nmap tools. | es_EC |
| dc.identifier.doi | https://www.researchgate.net/publication/338050855_ | es_EC |
| Appears in Collections: | Artículos | |
Files in This Item:
There are no files associated with this item.
This item is protected by original copyright |
This item is licensed under a Creative Commons License