With the advancement of time and technology, the security that was previously protected has been affected by multiple attacks, which in a certain sense were thought to be minor but, nowadays, it is necessary for the data to be controlled. These assets will be implicated by vulnerabilities and threats, which in order to defend themselves will require the question of this systematic review: Is it important to identify vulnerabilities and threats in information assets? Therefore, our research objective is to locate those vulnerabilities and threats that affect information assets along with solutions. This search was achieved thanks to the reviews of articles published in bibliographic databases such as: Scopus, Scielo, IEEE Xplore, IOPScience,...
With the implementation of new trends and the impact of digitization, mass data storage represents a...
Introduction. The Internet of Things (IoT) has drastically changed daily life because of the rapid a...
Unlike most documents that talk about cybersecurity where they show principles to follow and the eff...
The continuous reports of security vulnerabilities and new ways to have access to privileged resourc...
The information security in organizations is a problem that afflicts us all, because if it is true w...
Introduction: This article is a product of the review of the "Vulnerability of information, on the I...
Assessing and managing the risks associated with IT assets is one of the most challenging tasks faci...
Organizations today handle information that is critical for their business by using information tech...
This paper presents the dimentions that defines the Information Security essentials from the authors...
El objetivo de este trabajo de fin de grado es explicar la importancia de la seguridad informática e...
Este artigo apresenta o extrato de uma pesquisa que aborda a importância da segurança d...
Hoy en día la tecnología ha avanzado y por esta razón las organizaciones deben estar actualizadas en...
La evolución de los sistemas de información hace necesaria el surgimiento de profesionales en el áre...
se propone una metodologia pra el analaisi de vulnerabilidades utilizando software gratuito
[ES] Este trabajo de fin de grado trata de explicar y dar a entender la importancia de la cibersegur...
With the implementation of new trends and the impact of digitization, mass data storage represents a...
Introduction. The Internet of Things (IoT) has drastically changed daily life because of the rapid a...
Unlike most documents that talk about cybersecurity where they show principles to follow and the eff...
The continuous reports of security vulnerabilities and new ways to have access to privileged resourc...
The information security in organizations is a problem that afflicts us all, because if it is true w...
Introduction: This article is a product of the review of the "Vulnerability of information, on the I...
Assessing and managing the risks associated with IT assets is one of the most challenging tasks faci...
Organizations today handle information that is critical for their business by using information tech...
This paper presents the dimentions that defines the Information Security essentials from the authors...
El objetivo de este trabajo de fin de grado es explicar la importancia de la seguridad informática e...
Este artigo apresenta o extrato de uma pesquisa que aborda a importância da segurança d...
Hoy en día la tecnología ha avanzado y por esta razón las organizaciones deben estar actualizadas en...
La evolución de los sistemas de información hace necesaria el surgimiento de profesionales en el áre...
se propone una metodologia pra el analaisi de vulnerabilidades utilizando software gratuito
[ES] Este trabajo de fin de grado trata de explicar y dar a entender la importancia de la cibersegur...
With the implementation of new trends and the impact of digitization, mass data storage represents a...
Introduction. The Internet of Things (IoT) has drastically changed daily life because of the rapid a...
Unlike most documents that talk about cybersecurity where they show principles to follow and the eff...