Guevara-Vega, E. M. D et al.
13 Rev. Cient. Sist. Inform. 3(1): e461; (Ene-Jun, 2023). e-ISSN: 2709-992X
REFERENCIAS BIBLIOGRÁFICAS
Abunadi, I., & Kumar, R. L. (2021). Blockchain and Business Process Management in Health Care,
Especially for COVID-19 Cases. Security and Communication Networks, 2021, 1–16.
https://doi.org/10.1155/2021/2245808
Alonge, C. Y., Arogundade, O. T., Adesemowo, K., Ibrahalu, F. T., Adeniran, O. J., & Mustapha, A. M. (2020).
Information Asset Classification and Labelling Model Using Fuzzy Approach for Effective Security
Risk Assessment. 2020 International Conference in Mathematics, Computer Engineering and
Computer Science (ICMCECS), 1–7. https://doi.org/10.1109/ICMCECS47690.2020.240911
Angraini, Megawati, & Haris, L. (2018). Risk Assessment on Information Asset an academic Application
Using ISO 27001. 2018 6th International Conference on Cyber and IT Service Management (CITSM), 1–
4. https://doi.org/10.1109/CITSM.2018.8674294
Asgarkhani, M., Correia, E., & Sarkar, A. (2017). An overview of information security governance. 2017
International Conference on Algorithms, Methodology, Models and Applications in Emerging
Technologies (ICAMMAET), 1–4. https://doi.org/10.1109/ICAMMAET.2017.8186666
Bélen Gallego, A., & Palomo Zurdo, R. J. (2020). Blockchain: un reto del siglo XXI para la Economía Social.
XVIII Congreso Internacional de Investigadores en Economía Social y Cooperativa.
http://ciriec.es/wp-content/uploads/2020/09/COMUN-046-T11-GALLEGO-PALOMO-ok.pdf
Benishti, E. (2020). 50,000+ Fake Login Pages Spoofing Over 200 Brands Worldwide. IronScale Safer
Together. https://ironscales.com/blog/fake-login-pages-spoof-prominent-brands-phishing-attacks/
Erb, M. (2014). Gestión de Riesgo. https://protejete.wordpress.com/gdr_principal/
Estrada-Esponda, R. D., Unás-Gómez, J. L., & Flórez-Rincón, O. E. (2021). Prácticas de seguridad de la
información en tiempos de pandemia. Caso Universidad del Valle, sede Tuluá. Revista Logos, Ciencia
& Tecnología, 13(3). https://doi.org/10.22335/rlct.v13i3.1446
Evans, N., & Price, J. (2020). Development of a holistic model for the management of an enterprise’s
information assets. International Journal of Information Management, 54, 102193.
https://doi.org/10.1016/j.ijinfomgt.2020.102193
Faruki, P., Bharmal, A., Laxmi, V., Ganmoor, V., Gaur, M. S., Conti, M., & Rajarajan, M. (2015). Android
Security: A Survey of Issues, Malware Penetration, and Defenses. IEEE Communications Surveys &
Tutorials, 17(2), 998–1022. https://doi.org/10.1109/COMST.2014.2386139
Firdaus, N., & Suprapto, S. (2017). Evaluasi Manajemen Risiko Teknologi Informasi Menggunakan COBIT 5
IT Risk (Studi Kasus : PT. Petrokimia Gresik). Jurnal Pengembangan Teknologi Informasi Dan Ilmu
Komputer, 2(1), 91–100. https://j-ptiik.ub.ac.id/index.php/j-ptiik/article/view/702
Goodin, D. (2009). Pro-Palestine vandals deface Army, NATO sites. The Register.
https://www.theregister.com/2009/01/10/army_nato_sites_defaced/
Guerra, E., Neira, H., Díaz, J. L., & Patiño, J. (2021). Desarrollo de un sistema de gestión para la seguridad
de la información basado en metodología de identificación y análisis de riesgo en bibliotecas
universitarias. Información Tecnológica, 32(5), 145–156. https://doi.org/10.4067/S0718-
07642021000500145
Irwin, L. (2021). What is a DoS (denial-of-service) attack? IT Governance UK.
https://www.itgovernance.co.uk/blog/what-is-a-dos-denial-of-service-attack
Kativu, K. T., & Pottas, D. (2019). Leveraging intrinsic resources for the protection of health information
assets. South African Computer Journal, 31(2). https://doi.org/10.18489/sacj.v31i2.536