SciELO - Scientific Electronic Library Online

 
vol.9 número1Mudando la infraestructura de TI a la nubeUn sistema experto basado en minería de datos y programación entera lineal para soporte en la asignación de materias y diseño de horarios en educación superior índice de autoresíndice de assuntospesquisa de artigos
Home Pagelista alfabética de periódicos  

Serviços Personalizados

Journal

Artigo

Indicadores

Links relacionados

  • Não possue artigos similaresSimilares em SciELO

Compartilhar


Enfoque UTE

versão On-line ISSN 1390-6542versão impressa ISSN 1390-9363

Resumo

PROANO-ESCALANTE, Rodrigo Arturo  e  GAVILANES-MOLINA, Andrés Fernando. Strategy for responding to computer incidents of insecurity set in Ecuadorian law. Enfoque UTE [online]. 2018, vol.9, n.1, pp.90-101. ISSN 1390-6542.  https://doi.org/10.29019/enfoqueute.v9n1.229.

Assurance the security of information, information systems, services and networks implies socializing, also knowing how to respond to an event where such information security has been violated and how manage the identified digital evidence. The present paper is a solution, based on international standards and complying with the current Law of Ecuador. Digital evidence will be identified at the scene of a computer incident by the authorized persons. The authorization must indicate what motivates, authorizes and limits the identification of evidence. The phase of obtaining the digital evidence identified will depend on the established internal circumstances and policies. The preservation of the objective evidence is carried out through chain of custody, the verifiable, complete and reliable results are reported. The previously described strategy was applied as a case study to the incidents of violation of logical securities. The digital evidence found in the place was recognized, extracted, preserved and informed about. Throughout the process, the chain of custody was implemented, which assurance the integrity and reliability of the data. In each phase it was recorded as, when, where and who manipulated both digital signs and digital devices.

Palavras-chave : informatic security; cybercrime; computer forensics; incident; digital evidence..

        · resumo em Espanhol     · texto em Espanhol     · Espanhol ( pdf )