SciELO - Scientific Electronic Library Online

 
vol.9 número1Mudando la infraestructura de TI a la nubeUn sistema experto basado en minería de datos y programación entera lineal para soporte en la asignación de materias y diseño de horarios en educación superior índice de autoresíndice de materiabúsqueda de artículos
Home Pagelista alfabética de revistas  

Servicios Personalizados

Revista

Articulo

Indicadores

Links relacionados

  • No hay articulos similaresSimilares en SciELO

Compartir


Enfoque UTE

versión On-line ISSN 1390-6542versión impresa ISSN 1390-9363

Resumen

PROANO-ESCALANTE, Rodrigo Arturo  y  GAVILANES-MOLINA, Andrés Fernando. Strategy for responding to computer incidents of insecurity set in Ecuadorian law. Enfoque UTE [online]. 2018, vol.9, n.1, pp.90-101. ISSN 1390-6542.  https://doi.org/10.29019/enfoqueute.v9n1.229.

Assurance the security of information, information systems, services and networks implies socializing, also knowing how to respond to an event where such information security has been violated and how manage the identified digital evidence. The present paper is a solution, based on international standards and complying with the current Law of Ecuador. Digital evidence will be identified at the scene of a computer incident by the authorized persons. The authorization must indicate what motivates, authorizes and limits the identification of evidence. The phase of obtaining the digital evidence identified will depend on the established internal circumstances and policies. The preservation of the objective evidence is carried out through chain of custody, the verifiable, complete and reliable results are reported. The previously described strategy was applied as a case study to the incidents of violation of logical securities. The digital evidence found in the place was recognized, extracted, preserved and informed about. Throughout the process, the chain of custody was implemented, which assurance the integrity and reliability of the data. In each phase it was recorded as, when, where and who manipulated both digital signs and digital devices.

Palabras clave : informatic security; cybercrime; computer forensics; incident; digital evidence..

        · resumen en Español     · texto en Español     · Español ( pdf )