ABSTRACT
Today, cybersecurity is very important, and Ecuador could suffer serious security problems that would compromise the information of its citizens if it does not change its laws and standards in public institutions. The objective of this article was to analyze laws and standards in depth to be able to implement them in organizations public of Ecuador. It was used the deductive and exploratory research method to analyze the information of available media and scientific articles. It resulted in improvements in cybersecurity with the use of standards such as the International Organization for Standardization (ISO) and specific laws for cybersecurity. It was concluded that Ecuador need improve the cybersecurity in public organization, because had leak of information and implementation of laws and standards can help mitigate the risks the information.
- Valenzuela, D. Á. (2018). Ciberseguridad en América Latina y ciberdefensa en Chile. Revista Chilena de Derecho y Tecnologia, 7(1), 1--2. DOI= https://doi.org/10.5354/0719-2584.2018.50416Google Scholar
- Ministerio de las Telecomunicaciones y de la sociedad de la información. [n. d.]. Ecuador ocupa sexto lugar en la región, según Índice de Ciberseguridad. https://www.telecomunicaciones.gob.ec/ecuador-ocupa-sexto-lugar-en-la-region-segun-indice-de-ciberseguridad/Google Scholar
- El comercio. [n. d.]. Ciber mafias atacaron a 17 empresas ecuatorianas. https://www.elcomercio.com/actualidad/cibermafias-ciberataque-17empresas-ecuador-seguridadinformatica.html.Google Scholar
- International Organization for Standardization. [n. d.]. ISO Survey of certifications to management system standards https://isotc.iso.org/livelink/livelink?func=ll&objId=18808772&objAction=browse&viewType=1Google Scholar
- Society, E. (2014). IEEE Standard Cybersecurity Requirements for Substation Automation, Protection, and Control Systems IEEE Power and Energy Society.Google Scholar
- Chinyemba, M. K., & Phiri, J. (2018). An investigation into information security threats from insiders and how to mitigate them: A case study of Zambian public sector. Journal of Computer Science, 14(10), 1389--1400. DOI= https://doi.org/10.3844/jcssp.2018.1389.1400Google Scholar
Cross Ref
- Carvalho, C., & Marques, E. (2019). Adapting ISO 27001 to a Public Institution. Iberian Conference on Information Systems and Technologies. (June), 19--22.Google Scholar
Cross Ref
- Municipalidad Guayaquil. [n. d.]. Reglamento de seguridad de Informática del Gobierno Autónomo Descentralizado Municipal. http://guayaquil.gob.ec/Ordenanzas/Otras%20disposiciones/2014-01-24%20Reglamento%20de%20seguridad%20de%20Inform%C3%A1tica%20del%20Gobierno%20Aut%C3%B3nomo%20Descentralizado%20Municipal.PDFGoogle Scholar
- Gobierno del Ecuador. [n. d.]. Código orgánico integral penal. https://tbinternet.ohchr.org/Treaties/CEDAW/Shared%20Documents/ECU/INT_CEDAW_ARL_ECU_18950_S.pdfGoogle Scholar
- Thackray, H., McAlaney, J., Dogan, H., Taylor, J., & Richardson, C. (2016). Social psychology: An under-used tool in cybersecurity. Proceedings of the 30th International BCS Human Computer Interaction Conference, HCI 2016, 2016-July, 1--3. DOI= https://doi.org/10.14236/ewic/HCI2016.64Google Scholar
Cross Ref
- Kosseff, J. (2018). Developing collaborative and cohesive cybersecurity legal principles. International Conference on Cyber Conflict, CYCON, 2018-May, 283--297. DOI= https://doi.org/10.23919/CYCON.2018.8405022Google Scholar
Cross Ref
- Kshetri, N. (2019). Cybercrime and Cybersecurity in Africa. Journal of Global Information Technology Management, 22(2), 77--81. DOI= https://doi.org/10.1080/1097198X.2019.1603527.Google Scholar
Cross Ref
- Martin Horák, Václav Stupka, and Martin Husák. 2019. GDPR Compliance in Cybersecurity Software: A Case Study of DPIA in Information Sharing Platform. In Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019) (ARES '19), August 26--29, 2019, Canterbury, United Kingdom. ACM, New York, NY, USA, 8 pages. https://doi.org/10.1145/3339252.3340516Google Scholar
Digital Library
- Toapanta, M., Mero, J., Huilcapi, D., Tandazo, M., Orizaga, A., & Mafla, E. (2018). A Blockchain Approach to Mitigate Information Security in a Public Organization for Ecuador. IOP Conference Series: Materials Science and Engineering, 423(1). https://doi.org/10.1088/1757-899X/423/1/012164Google Scholar
Cross Ref
- Toapanta, S. M. T., Gallegos, L. E. M., & Trejo, J. A. O. (2016). Security analysis of civil registry database of Ecuador. International Conference on Electrical, Electronics, and Optimization Techniques, ICEEOT 2016, 1024--1029. DOI= https://doi.org/10.1109/ICEEOT.2016.7754841Google Scholar
Cross Ref
- Sen, R. (2018). Challenges to cybersecurity: Current state of affairs. Communications of the Association for Information Systems, 43(1), 22--44. DOI= https://doi.org/10.17705/1CAIS.04302.Google Scholar
Cross Ref
- Thomas Schaberreiter, Veronika Kupfersberger, Konstantinos Rantos, Arnolnt Spyros, Alexandros Papanikolaou, Christos Ilioudis, and Gerald Quirchmayr. 2019. A Quantitative Evaluation of Trust in the Quality of Cyber Threat Intelligence Sources. In Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019) (ARES '19), August 26--29, 2019, Canterbury, United Kingdom. ACM, New York, NY, USA, 10 pages. https://doi.org/10.1145/3339252.3342112Google Scholar
Digital Library
- Albertivan, D., Limantara, H., Rachmadiati, R. A., Pamungkas, A. W., & Surantha, N. (2019). IT risk identification and evaluation: A case study on XYZ University. International Journal on Advanced Science, Engineering and Information Technology, 9(1), 250--257. https://doi.org/10.18517/ijaseit.9.1.2739Google Scholar
Cross Ref
- Tom Cuchta, Brian Blackwood, Thomas R. Devine, Robert J. Niichel, Kristina M. Daniels, Caleb H. Lutjens, Sydney Maibach, and Ryan J. Stephenson. 2019. Human Risk Factors in Cybersecurity. In The 20th Annual Conference on Information Technology Education (SIGITE '19), October 3--5, 2019, Tacoma, WA, USA. ACM, New York, NY, USA, 6 pages. https://doi.org/10. 1145/3349266.3351407Google Scholar
- Chatfield, A. T., & Reddick, C. G. (2017). Cybersecurity innovation in government: A case study of U.S. pentagon's vulnerability reward program. ACM International Conference Proceeding Series, Part F128275, 64--73. https://doi.org/10.1145/3085228.3085233.Google Scholar
Digital Library
Index Terms
An Approach of National and International Cybersecurity Laws and Standards to Mitigate Information Risks in Public Organizations of Ecuador
Recommendations
Definition of Parameters to Perform Audit in Cybersecurity for Public one Organization of Ecuador
Ecuador's constant technological growth is evident in recent years, great efforts have been devoted to the development of information systems for organizations, but only for the development of systems; unfortunately, there are few security controls or ...
An Approach of Security Model to Mitigate Risk of Cyberattacks on Public Institutions in Ecuador
Security problems due to cyberattacks were analyzed, checked security models designed to protect and preserve databases of information from these institutions, using all the parameters of information security. It is planted propose a prototype of a ...
india.gov.in -- The National Portal of India: India's answer to single entry national portals
The use of Information and Communication Technologies (ICTs) to enhance sustainable development needs no introduction. E-governance can make governance more efficient and more effective by improving governmental processes (e-administration), connecting ...






Comments