Repository logo
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Yкраї́нська
  • Log In
    New user? Click here to register.Have you forgotten your password?
Repository logo
  • Communities & Collections
  • All of DSpace
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Yкраї́нська
  • Log In
    New user? Click here to register.Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Erika Belén Ávila Caguana"

Now showing 1 - 1 of 1
Results Per Page
Sort Options
  • No Thumbnail Available
    Item
    Análisis de riesgo de seguridad de la información para la infraestructura de la empresa Four Points by Sheraton Cuenca
    (Instituto Tecnológico Superior Sudamericano, 2019) Erika Belén Ávila Caguana
    This work aims to develop a risk analysis for the Four Points by Sheraton Cuenca Company based on the MAGERIT methodology allowing to provide an adequate security solution for the most important assets, focusing on creating preventive measures to reduce the probability of incidents and contributing with the education of the employees that handle sensitive information in the company. The project is made up of six chapters, with the following content: The first chapter presents the problem to be solved by asking questions to establish a start in the development of the project, the scope and limitations are defined. In the second chapter there is the elaboration of the theoretical-conceptual framework to define the theoretical foundation of the project and to establish the bases of its development specifying the most relevant concepts. The third chapter presents the methodologies chosen for the development of the risk analysis and the justification of the choice based on the requirements of the organization. In the fourth chapter there is the analysis and interpretation of the results that were made known through the development of the project, the analysis of the results of the survey and the safety shortcomings found in the risk analysis. In the last chapter, the stages and phases used for the development of the proposal are presented in detail, proposing the solution of risk mitigation and the creation of a manual of good practices aimed at employees who handle confidential company information. Finally, the schedule of activities, conclusions, commendations, bibliography and annexes are found that show the results of the project application.

DSpace software copyright © 2002-2025 LYRASIS

  • Cookie settings
  • Privacy policy
  • End User Agreement
  • Send Feedback