Full Text

Turn on search term navigation

© 2019. This work is published under https://creativecommons.org/licenses/by-nc-nd/4.0 (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.

Abstract

Palabras-clave: gestor de base de datos; control de acceso; vulnerabilidades en base de datos; ISO 27002; ISO 27001 Abstract: in this study, the analysis of the vulnerabilities of the Database Management process of two institutions was conducted based on the access control domain of the international standard ISO 27002 and the maturity model of the information security administration (ISM3). 14 questions organized in 4 categories were established: business requirements for access control, access control to systems and applications, user responsibility and user access management. [...]the security mechanisms that are used to mitigate the vulnerabilities of the database management process are presented. PostgreSQL, MySQL, SQL Server y Oracle. 3.Dominio Control de Acceso aplicado a la gestión de Base de Datos La información es el activo más importante en las empresas debido a su uso para la ejecución normal de las actividades del personal y la fuente para la toma de decisiones críticas de los stakeholders.

Details

Title
Modelo de evaluación del Dominio Control de Acceso de la norma ISO 27002 aplicado al proceso de Gestión de Bases de Datos
Author
Patiño, Susana; Caicedo, Alexander; Guaña, Erika Reina
Pages
230-241
Publication year
2019
Publication date
Aug 2019
Publisher
Associação Ibérica de Sistemas e Tecnologias de Informacao
ISSN
16469895
Source type
Scholarly Journal
Language of publication
Spanish
ProQuest document ID
2317841707
Copyright
© 2019. This work is published under https://creativecommons.org/licenses/by-nc-nd/4.0 (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.