Computer security model for a public connection medium
Abstract
Today, organizations do everything possible to maintain control and help protect their corporate networks and their information assets from cyber threats, which is why it is necessary to guarantee data security while traveling through the public network , Faced with this situation, this research is circumscribed, having as its purpose the elaboration of a computer security model that guarantees the exchange of academic information on a means of public connection between the Pedro Ruiz Gallo National University and the Pre-University Center of the entity . The study was of an applied type, with a quantitative-explanatory scope and a non-experimental cross-sectional design. The sample consisted of a total of 29 specialists in information technology from the different offices of the University, the instrument used was the questionnaire, which was made up of 20 items divided into two dimensions: network connection and computer security. As a result, it was possible to determine that the network connection and computer security are at a low and deficient level respectively, so it is concluded that the development of a computer security model for VPN will allow the exchange of academic information in a secure way between the two sites.
Downloads
References
Altamirano, M. D. L. (2019). Modelo para la gestión de la seguridad de la información y los riesgos asociados a su uso. Avances, 21 (2), 248–263. http://www.ciget.pinar.cu/ojs/index.php/publicaciones/article/view/440
Amankwa, E., Loock, M., & Kritzinger, E. (2014). A conceptual analysis of information security education, information security training and information security awareness definitions. The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014), 248–252. https://doi.org/10.1109/ICITST.2014.7038814
Aung, S. T., & Thein, T. (2020). Comparative Analysis of Site-to-Site Layer 2 Virtual Private Networks. 2020 IEEE Conference on Computer Applications(ICCA), 1–5. https://doi.org/10.1109/ICCA49400.2020.9022848
Bernal, C. A. (2010). Metodología de la Investigación. In Pearson Educación (Tercera). Pearson Educacion.
Cisco Netacad. (2012). 4.4.1.2 Topologías física y lógica. Cisco Networking Academy. http://itroque.edu.mx/cisco/cisco1/course/module4/4.4.1.2/4.4.1.2.html
De la Peña, G., & Velázquez, R. M. (2018). Algunas reflexiones sobre la teoría general de sistemas y el enfoque sistémico en las investigaciones científicas. Revista Cubana de Educación Superior, 37(2), 31–44.
Deloitte. (2016). La Evolución de la Gestión de Ciber-Riesgos y Seguridad de la Información. https://www2.deloitte.com/content/dam/Deloitte/pe/Documents/risk/Deloitte 2016 Cyber Risk Information Security Study - Latinoamérica - Resultados Generales vf (Perú).pdf
Deshmukh, D., & Iyer, B. (2017). Design of IPSec virtual private network for remote access. 2017 International Conference on Computing, Communication and Automation (ICCCA), 716–719. https://doi.org/10.1109/CCAA.2017.8229894
Esparza, D. E. I., Diaz, F. J., Echeverria, T. K. S., Hidrobo, S. R. A., Villavicencio, D. A. L., & Ordonez, A. R. (2020). Information security issues in educational institutions. 2020 15th Iberian Conference on Information Systems and Technologies (CISTI), June, 1–7. https://doi.org/10.23919/CISTI49556.2020.9141014
Estatuto UNPRG. (2017). Estatuto Universidad Nacional Pedro Ruiz Gallo. In Universidad Nacional Pedro Ruiz Gallo. Universidad Nacional Pedro Ruiz Gallo. http://www.unprg.edu.pe/univ/portal/documentos_s/7. ESTATUTO ACTUALIZADO 2019 DE LA UNPRG.pdf
Hashiyana, V., Haiduwa, T., Suresh, N., & Bratha, A. (2020). Design and Implementation of an IPSec Virtual Private Network : A Case Study at the University of Namibia. 2020 IST-Africa Conference (IST-Africa), 1–6. https://www.researchgate.net/profile/Valerianus_Hashiyana/publication/344542951_Design_and_Implementation_of_an_IPSec_Virtual_Private_Network_A_Case_Study_at_the_University_of_Namibia/links/5f7f097ba6fdccfd7b4f9bd2/Design-and-Implementation-of-an-IPSec-Virtual-Private-Network-A-Case-Study-at-the-University-of-Namibia.pdf
Hernández-Sampieri, R., Fernández, C., & Baptista, P. (2018). Metodología de la Investigación. In Mc Graw Hill (Sexta). Mc Graw Hill.
Jing, S., Qi, Q., Sun, R., & Li, Q. (2016). Study on VPN Solution Based on Multi-campus Network. 2016 8th International Conference on Information Technology in Medicine and Education (ITME), 777–780. https://doi.org/10.1109/ITME.2016.0180
Joshi, C., & Singh, U. K. (2017). Information security risks management framework – A step towards mitigating security risks in university network. Journal of Information Security and Applications, 35, 128–137. https://doi.org/10.1016/j.jisa.2017.06.006
Li yong. (2015). Analysis of network connectivity probability on damage probability. 2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), 1056–1059. https://doi.org/10.1109/IAEAC.2015.7428719
Ponemon Institute. (2018). 2018 State of Cybersecurity in Small & Medium Size Businesses. November, 46. https://www.keepersecurity.com/assets/pdf/Keeper-2018-Ponemon-Report.pdf
Sohrabi Safa, N., Von Solms, R., & Furnell, S. (2016). Information security policy compliance model in organizations. Computers and Security, 56, 1–13. https://doi.org/10.1016/j.cose.2015.10.006
Solarte, F. N. J., Enriquez, E. R., & Benavides, M. del C. (2015). Metodología de análisis y evaluación de riesgos aplicados a la seguridad informática y de información bajo la norma ISO/IEC 27001. Revista Tecnológica - ESPOL, 28(5), 497–498. http://www.rte.espol.edu.ec/index.php/tecnologica/article/view/456/321
Tang, M., Li, M., & Zhang, T. (2016). The impacts of organizational culture on information security culture: a case study. Information Technology and Management, 17(2), 179–186. https://doi.org/10.1007/s10799-015-0252-2
Wu, Z., & Xiao, M. (2019). Performance Evaluation of VPN with Different Network Topologies. 2019 IEEE 2nd International Conference on Electronics Technology (ICET), 51–55.
https://doi.org/10.1109/ELTECH.2019.8839611
Zhiyong, L., Bo, Y., Jian, W., & Zhongnan, Z. (2014). Application of VPN Technology in Multi-campus Adult Education Platform. 2014 7th International Conference on Control and Automation, 33–36. https://doi.org/10.1109/CA.2014.15
Copyright
The Revista de la Universidad del Zulia declares that it recognizes the rights of the authors of the original works published in it; these works are the intellectual property of their authors. The authors preserve their copyright and share without commercial purposes, according to the license adopted by the journal..
This work is under license:
Creative Commons Reconocimiento-NoComercial-CompartirIgual 4.0 Internacional (CC BY-NC-SA 4.0)