Information systems as well as information itself are the main asset of organizations today, making them aware of the importance of carrying out a risk management process to identify which are the main vulnerabilities of their information assets and what threats might exploit such vulnerabilities. There is a wide range of pos sible methodologies to carry out this process, which is essential to review and compare to find out the one that best suits the needs and the initial objective set by the organization in the scope of the project. Furthermore , it is possible to consult a la rge series of standards that offer good practices guide lines and facilitate their adaptation to each methodology as well as to those entities that choose to follow...
The purpose of this study was to diagnose the degree of risks suffered by the information and assets...
The purpose of this study was to diagnose the degree of risks suffered by the information and assets...
This paper seeks to explain how companies can apply risk management from an operational approach and...
Information systems as well as information itself are the main asset of organizations today, making ...
El propósito de este artículo consiste en ofrecer un conjunto de reflexiones conceptuales sobre la s...
Information and Communication Technologies (ICT) have become fundamental tools to support business p...
The information has become a valuable asset for organizations, and computer systems, is subject to v...
El presente trabajo de grado tiene como objetivo presentar un análisis de gestión de riesgos de la i...
This document provides guidelines for the development of an IT Contingency Plan. An IT Contingency P...
The management system of informational security is a part of the management system of an organizatio...
An organization that works with any information must have a security system capable of protecting th...
El trabajo se orienta hacia el análisis de los activos informáticos de la empresa REMGING, con el co...
In the business world, exist a great concern for the control of the activities and the management of...
Actualmente, toda empresa debería tener el conocimiento de qué tan importante es y cómo debe tratars...
To implement a security model on corporate organizations, there are some essential steps that need t...
The purpose of this study was to diagnose the degree of risks suffered by the information and assets...
The purpose of this study was to diagnose the degree of risks suffered by the information and assets...
This paper seeks to explain how companies can apply risk management from an operational approach and...
Information systems as well as information itself are the main asset of organizations today, making ...
El propósito de este artículo consiste en ofrecer un conjunto de reflexiones conceptuales sobre la s...
Information and Communication Technologies (ICT) have become fundamental tools to support business p...
The information has become a valuable asset for organizations, and computer systems, is subject to v...
El presente trabajo de grado tiene como objetivo presentar un análisis de gestión de riesgos de la i...
This document provides guidelines for the development of an IT Contingency Plan. An IT Contingency P...
The management system of informational security is a part of the management system of an organizatio...
An organization that works with any information must have a security system capable of protecting th...
El trabajo se orienta hacia el análisis de los activos informáticos de la empresa REMGING, con el co...
In the business world, exist a great concern for the control of the activities and the management of...
Actualmente, toda empresa debería tener el conocimiento de qué tan importante es y cómo debe tratars...
To implement a security model on corporate organizations, there are some essential steps that need t...
The purpose of this study was to diagnose the degree of risks suffered by the information and assets...
The purpose of this study was to diagnose the degree of risks suffered by the information and assets...
This paper seeks to explain how companies can apply risk management from an operational approach and...