2020 15th Iberian Conference on Information Systems and Technologies (CISTI) 2020
DOI: 10.23919/cisti49556.2020.9141014
|View full text |Cite
|
Sign up to set email alerts
|

Information security issues in educational institutions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
2
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 34 publications
0
2
0
1
Order By: Relevance
“…The ISO27001 standard is organized into 14 sections, 35 objectives and 114 security controls [11]. For HEIs it is recommended to use at least 8 sections: asset management, human resources management, physical controls, access control, communications control, operational control, incident management, information system control and business continuity [1], [18]. Not all sections of the standard are applicable in HEIs, as the ISO27001 standard is aimed at non-academic and commercial organizations [10].…”
Section: Fig 1 Plan-do-check-actmentioning
confidence: 99%
See 1 more Smart Citation
“…The ISO27001 standard is organized into 14 sections, 35 objectives and 114 security controls [11]. For HEIs it is recommended to use at least 8 sections: asset management, human resources management, physical controls, access control, communications control, operational control, incident management, information system control and business continuity [1], [18]. Not all sections of the standard are applicable in HEIs, as the ISO27001 standard is aimed at non-academic and commercial organizations [10].…”
Section: Fig 1 Plan-do-check-actmentioning
confidence: 99%
“…Information security in HEIs (Higher Education Institutions) has been increasingly affected in recent years [1]- [3]. Thus, the latest reports prepared by large companies in the field, such as: Microsoft, Kaspersky [4], Barracuda Networks [5], IBM & Ponemon Institute [6], attest to a considerable increase in cyber threats to university networks.…”
Section: Introductionmentioning
confidence: 99%
“…; se busca proteger, por ejemplo, al centro de procesamiento de datos. Además, Imbaquingo et al (2020) mencionan que existen diversas amenazas de seguridad de la información relacionadas con el hardware, y para eso es necesario la implementación de un monitoreo continuo. A partir de este punto se puede señalar la importancia no solo de las medidas preventivas digitales, sino de proteger el entorno sobre el cuál se soportan los programas.…”
Section: Introductionunclassified
“…Los centros superiores de estudio afrontan una problemática relacionada con las medidas de seguridad de la información, mientras que por un lado se denota un bajo compromiso en 347 mejorar la seguridad, por otra parte se dificulta implementar políticas y controles para garantizar la protección de los datos; existen razones para que se produzca lo antes mencionado: falta de capacitación al personal, inadecuada aplicación de políticas de seguridad, desconocimiento de vulnerabilidades y compromiso de la organización con la seguridad informática (Esparza et al, 2020).…”
unclassified