Skip to main navigation menu Skip to main content Skip to site footer

Computer Security. Computer security applied to defense and security based on legal principles

PDF (Español (España))

Abstract

The considerable increase and incidence in the use of information and communication technologies have generated a greater link between human activities and technological elements. Indeed, within the majority of common activities, typical of people's daily lives, the presence of technological tools tending to facilitate the execution of the different processes is verified, achieving prompt and better results than those achieved through the application of traditional measures. However, the construction of computer tools has been developing alongside computer threats and attacks, which are increasingly common and complex in their detection, constituting a real danger to the security of people and institutions. In this sense, this work seeks to determine a prospective of computer and information security, in the field of defense and security.

Keywords

Computer security, information security, cyber defense, computer attacks


References

  1. Fernández, P. (24 de noviembre de 2018). Qué es la informática forense y cómo se usa para resolver casos policiales o judiciales. Obtenido de https://www.europapress.es/portaltic/sector/noticia-informatica-forense-usa-resolver-casos-policiales-judiciales-20181124112932.html
  2. Iglesias, I. (26 de enero de 2017). Introducción a la Seguridad Informática. Obtenido de https://silo.tips/download/capitulo-3-introduccion-a-la-seguridad-informatica#:~:text=La%20criptograf%C3%ADa%20es%20aquella%20rama,usando%20una%20o%20m%C3%A1s%20claves.
  3. Joyanes, L. (2012). Computación en la Nube: Notas para una estrategia española en Cloud Computing. Obtenido de Dialnet-ComputacionEnLaNube-4098278_1.pdf
  4. Pastorino, C. (6 de diciembre de 2017). Convenio de Budapest: beneficios e implicaciones para la seguridad informática. Obtenido de https://www.welivesecurity.com/la-es/2017/12/06/convenio-budapest-beneficios-implicaciones-seguridad-informatica/
  5. Presman, G. (10 de mayo de 2016). Desafíos de la Informática Forense. Obtenido de http://web9.unl.edu.ar/noticias/news/view/desaf%C3%ADos_de_la_inform%C3%A1tica_forense_1#.YBCdR15KhH0
  6. Universidad Internacional de La Rioja. (11 de diciembre de 2019). ¿Qué es la certificación ISO 27001 y para qué sirve? Obtenido de https://www.unir.net/ingenieria/revista/iso-27001/

How to Cite

Valencia Balladares, I. A., & Tapia Chichande, A. P. (2020). Computer Security. Computer security applied to defense and security based on legal principles. Alternativas, 21(2). https://doi.org/10.23878/alternativas.v21i2.335

Download Citation

Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.

Similar Articles

1 2 3 4 5 6 7 > >> 

You may also start an advanced similarity search for this article.