Computer security model for a public connection medium

Keywords: Model; exchange; information; computer security; VPN

Abstract

Today, organizations do everything possible to maintain control and help protect their corporate networks and their information assets from cyber threats, which is why it is necessary to guarantee data security while traveling through the public network , Faced with this situation, this research is circumscribed, having as its purpose the elaboration of a computer security model that guarantees the exchange of academic information on a means of public connection between the Pedro Ruiz Gallo National University and the Pre-University Center of the entity . The study was of an applied type, with a quantitative-explanatory scope and a non-experimental cross-sectional design. The sample consisted of a total of 29 specialists in information technology from the different offices of the University, the instrument used was the questionnaire, which was made up of 20 items divided into two dimensions: network connection and computer security. As a result, it was possible to determine that the network connection and computer security are at a low and deficient level respectively, so it is concluded that the development of a computer security model for VPN will allow the exchange of academic information in a secure way between the two sites.

Downloads

Author Biographies

Gilberto Carrión-Barco, Universidad Nacional Pedro Ruiz Gallo. Perú
Docente Auxiliar. Universidad Nacional Pedro Ruiz Gallo.  Perú.
Manuel Jesús Sánchez-Chero, Universidad Nacional de Frontera. Perú.
Docente Investigador. Universidad Nacional de Frontera.  Perú.
Consuelo Ivonne Del Castillo Castro, Universidad Nacional Pedro Ruiz Gallo. PerU.
Docente Asociado. Universidad Nacional Pedro Ruiz Gallo.  Perú.
Freddy William Campos Flores, Universidad Nacional Pedro Ruiz Gallo. Perú.
Docente Asociado. Universidad Nacional Pedro Ruiz Gallo.  Perú.
Marcos Timaná Alvarez, Universidad Nacional de Frontera. Perú.

Docente Auxiliar. Universidad Nacional de Frontera. Perú. 

References

Altamirano, M. D. L. (2019). Modelo para la gestión de la seguridad de la información y los riesgos asociados a su uso. Avances, 21 (2), 248–263. http://www.ciget.pinar.cu/ojs/index.php/publicaciones/article/view/440

Amankwa, E., Loock, M., & Kritzinger, E. (2014). A conceptual analysis of information security education, information security training and information security awareness definitions. The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014), 248–252. https://doi.org/10.1109/ICITST.2014.7038814

Aung, S. T., & Thein, T. (2020). Comparative Analysis of Site-to-Site Layer 2 Virtual Private Networks. 2020 IEEE Conference on Computer Applications(ICCA), 1–5. https://doi.org/10.1109/ICCA49400.2020.9022848

Bernal, C. A. (2010). Metodología de la Investigación. In Pearson Educación (Tercera). Pearson Educacion.

Cisco Netacad. (2012). 4.4.1.2 Topologías física y lógica. Cisco Networking Academy. http://itroque.edu.mx/cisco/cisco1/course/module4/4.4.1.2/4.4.1.2.html

De la Peña, G., & Velázquez, R. M. (2018). Algunas reflexiones sobre la teoría general de sistemas y el enfoque sistémico en las investigaciones científicas. Revista Cubana de Educación Superior, 37(2), 31–44.

Deloitte. (2016). La Evolución de la Gestión de Ciber-Riesgos y Seguridad de la Información. https://www2.deloitte.com/content/dam/Deloitte/pe/Documents/risk/Deloitte 2016 Cyber Risk Information Security Study - Latinoamérica - Resultados Generales vf (Perú).pdf

Deshmukh, D., & Iyer, B. (2017). Design of IPSec virtual private network for remote access. 2017 International Conference on Computing, Communication and Automation (ICCCA), 716–719. https://doi.org/10.1109/CCAA.2017.8229894

Esparza, D. E. I., Diaz, F. J., Echeverria, T. K. S., Hidrobo, S. R. A., Villavicencio, D. A. L., & Ordonez, A. R. (2020). Information security issues in educational institutions. 2020 15th Iberian Conference on Information Systems and Technologies (CISTI), June, 1–7. https://doi.org/10.23919/CISTI49556.2020.9141014

Estatuto UNPRG. (2017). Estatuto Universidad Nacional Pedro Ruiz Gallo. In Universidad Nacional Pedro Ruiz Gallo. Universidad Nacional Pedro Ruiz Gallo. http://www.unprg.edu.pe/univ/portal/documentos_s/7. ESTATUTO ACTUALIZADO 2019 DE LA UNPRG.pdf

Hashiyana, V., Haiduwa, T., Suresh, N., & Bratha, A. (2020). Design and Implementation of an IPSec Virtual Private Network : A Case Study at the University of Namibia. 2020 IST-Africa Conference (IST-Africa), 1–6. https://www.researchgate.net/profile/Valerianus_Hashiyana/publication/344542951_Design_and_Implementation_of_an_IPSec_Virtual_Private_Network_A_Case_Study_at_the_University_of_Namibia/links/5f7f097ba6fdccfd7b4f9bd2/Design-and-Implementation-of-an-IPSec-Virtual-Private-Network-A-Case-Study-at-the-University-of-Namibia.pdf

Hernández-Sampieri, R., Fernández, C., & Baptista, P. (2018). Metodología de la Investigación. In Mc Graw Hill (Sexta). Mc Graw Hill.

Jing, S., Qi, Q., Sun, R., & Li, Q. (2016). Study on VPN Solution Based on Multi-campus Network. 2016 8th International Conference on Information Technology in Medicine and Education (ITME), 777–780. https://doi.org/10.1109/ITME.2016.0180

Joshi, C., & Singh, U. K. (2017). Information security risks management framework – A step towards mitigating security risks in university network. Journal of Information Security and Applications, 35, 128–137. https://doi.org/10.1016/j.jisa.2017.06.006

Li yong. (2015). Analysis of network connectivity probability on damage probability. 2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), 1056–1059. https://doi.org/10.1109/IAEAC.2015.7428719

Ponemon Institute. (2018). 2018 State of Cybersecurity in Small & Medium Size Businesses. November, 46. https://www.keepersecurity.com/assets/pdf/Keeper-2018-Ponemon-Report.pdf

Sohrabi Safa, N., Von Solms, R., & Furnell, S. (2016). Information security policy compliance model in organizations. Computers and Security, 56, 1–13. https://doi.org/10.1016/j.cose.2015.10.006

Solarte, F. N. J., Enriquez, E. R., & Benavides, M. del C. (2015). Metodología de análisis y evaluación de riesgos aplicados a la seguridad informática y de información bajo la norma ISO/IEC 27001. Revista Tecnológica - ESPOL, 28(5), 497–498. http://www.rte.espol.edu.ec/index.php/tecnologica/article/view/456/321

Tang, M., Li, M., & Zhang, T. (2016). The impacts of organizational culture on information security culture: a case study. Information Technology and Management, 17(2), 179–186. https://doi.org/10.1007/s10799-015-0252-2

Wu, Z., & Xiao, M. (2019). Performance Evaluation of VPN with Different Network Topologies. 2019 IEEE 2nd International Conference on Electronics Technology (ICET), 51–55.

https://doi.org/10.1109/ELTECH.2019.8839611

Zhiyong, L., Bo, Y., Jian, W., & Zhongnan, Z. (2014). Application of VPN Technology in Multi-campus Adult Education Platform. 2014 7th International Conference on Control and Automation, 33–36. https://doi.org/10.1109/CA.2014.15

Published
2021-01-13
How to Cite
Carrión-Barco, G., Sánchez-Chero, M. J., Del Castillo Castro, C. I., Campos Flores, F. W., & Timaná Alvarez, M. (2021). Computer security model for a public connection medium. Journal of the University of Zulia , 12(32), 344-357. https://doi.org/10.46925//rdluz.32.21

Most read articles by the same author(s)