medigraphic.com
SPANISH

Infodir (Revista de Información para la Dirección en Salud)

ISSN 1996-3521 (Electronic)
  • Contents
  • View Archive
  • Information
    • General Information        
    • Directory
  • Publish
    • Instructions for authors        
  • medigraphic.com
    • Home
    • Journals index            
    • Register / Login
  • Mi perfil

2016, Number 22

<< Back Next >>

INFODIR 2016; 12 (22)

Informatics and security: an important topic for managers

García PG, Vidal LMJ
Full text How to cite this article

Language: Spanish
References: 17
Page: 47-58
PDF size: 361.38 Kb.


Key words:

informatics technology, informatization, informatics security.

ABSTRACT

Introduction: The societal transformation process understood in many senses is based on technology. Nevertheless, does the use of information technology offer security?
Objective: To promote an information culture in individuals who outline policies and use technologies in organizational processes.
Methods: Arguments examination is the result of reviews, experiences and exchanges.
Results: Informatics is based on the importance of the information security in 3 aspects: confidentiality, integrality and availability which are important to leadership responsible for organizing policy and strategies for using and preserving all these information processes and technological so much-needed in decisionmaking in the field they run; to officials handling technologies as well as information contained in it; to specialists in informatics responsible for assuring a safe support where these techniques operate; to the staff in charge of security and protection assuring the implementation of policies, measures and countermeasures applied to assure the means, repositories and information itself.
Conclusion: The document emphasizes the main principles of information security, analysis and risk management, policies, measures and countermeasures and other procedures assuring the safety of the information system at institutions in the existing information process at the society.


REFERENCES

  1. Gay A. La tecnología y la historia. [Internet]. [citado 8 Dic 2015]. Disponible en: http://www.ifdcelbolson.edu.ar/mat_biblio/tecnologia/curso1/u1/05.pdf

  2. García Pierrat G. Seguridad Informática. La Habana: G.L.D; 2003.

  3. Salazar CM. Disposición frente al cambio tecnológico: Un estudio empírico [Internet]. Chillán (Chile): Universidad del Bío-Bío; 2002 [citado 8 Dic 2015]. Disponible en: http://www.panorama.utalca.cl/dentro/2004-oct/3.pdf

  4. Prensky M. Digital natives, digital immigrants. On the horizon [Internet]. 2001 [cited 18 Dec 2015]; 9(6): 1-9. Available from: https://edorigami.wikispaces.com/file/view/PRENSKY%20- %20DIGITAL%20NATIVES%20AND%20IMMIGRANTS%202.PDF/30785667/PRE NSKY%20-%20DIGITAL%20NATIVES%20AND%20IMMIGRANTS%202.PDF

  5. Piscitelli A. Nativos e inmigrantes digitales. ¿Brecha generacional, brecha cognitiva, o las dos juntas y más aún?. Rev. Mexicana de Investigación Educativa [Internet] 2006 Ene-Mar [citado 8 Dic 2015]; 11(28): 179-85. Disponible en: http://www.redalyc.org/pdf/140/14002809.pdf

  6. García Pierrat G. Ingeniería Social. Revista PuntoCU. 2003

  7. Norma cubana NC/IEEC 17799: Código de buenas prácticas para la gestión de la seguridad de la información. 2007

  8. Avogadro M. Seguridad y nuevas tecnologías: un binomio necesario [Internet] [citado 18 Dic 2015]. Disponible en: http://www.forodeseguridad.com/artic/miscel/6100.htm

  9. Vidal Ledo M, García Pierrat G. Seguridad, información y salud. Revista Cubana de Informática Médica [Internet]. 2005 Ene-Mar [citado 18 Dic 2015]; 1(5). Disponible en: http://www.cecam.sld.cu/rcim/revista_7/articulo_htm/segurinfsalud.htm

  10. García Pierrat G. La Seguridad Informática como componente de la Seguridad y Protección. La Habana: Dirección de Protección, MININT; 2001.

  11. García Pierrat G. El delito en tiempos de Internet. XI Encuentro Internacional Ciencias Penales [CD-ROM]. La Habana: Fiscalía General de la República; 2012.

  12. Oficina de Seguridad para las Redes Informáticas. Metodología para la Gestión de la seguridad informática (proyecto) [Internet]. La Habana: OSRI; 2013 [citado 19 Dic 2015]. Disponible en: http://instituciones.sld.cu/dnspminsap/files/2013/08/Metodologia-PSINUEVAProyecto. pdf

  13. Dunn MA. A Comparative Analysis of Cybersecurity Initiatives Worldwide [Internet]. Zurich: Swiss Federal Institute of Technology; 2005 [cited 18 Dec 2015]. Available from: http://www.itu.int/osg/spu/cybersecurity/docs/Background_Paper_Comparativ e_Analysis_Cybersecurity_Initiatives_Worldwide.pdf

  14. Brownlee N, Guttman E. RFC2350: Expectations for Computer Security Incident Response [Internet]. RFC; 1998 [cited 11 Dec 2015]. Available from: http://www.ietf.org/rfc/rfc2350

  15. ISO/IEC 18044: Information technology -- Security techniques -- Information security incident management [Internet] 2004 [cited 16 Dec 2015]. Available form: http://www.iso.org/iso/catalogue_detail.htm?csnumber=35396

  16. West-Brown MJ, Stikvoort D, Kossakowski KP, Killcrece G, Ruefle R, Zajicek M. Handbook for Computer Security Incident Response Teams (CSIRT´s). 2nd Ed [Internet]. Pittsburgh, PA: Carnegie Mellon University; 2003 [cited 11 Dec 2015]. Available form: ftp://ftp.sei.cmu.edu/pub/documents/98.reports/pdf/98hb001.pdf

  17. García Pierrat G. Administración de incidentes de Seguridad Informática. 2014.




2020     |     www.medigraphic.com

Mi perfil

C?MO CITAR (Vancouver)

INFODIR. 2016;12