CYBERCRIME AND THE INSECURITY OF AUTOMATED INFORMATION SYSTEMS DUE TO THE LACK OF DETECTION AND CONTROL OF COMPUTER INCIDENTS

Main Article Content

SANTILLÁN MOLINA ALBERTO LEONEL, VINUEZA OCHOA NELLY VALERIA, BENAVIDES SALAZAR CRISTIAN FERNANDO, SANTILLÁN OJEDA SALVATORE JOEL

Abstract

In 2019, Ecuador was the victim of a computer attack in which the personal data of the vast majority of Ecuadorian citizens were obtained. In the year 2021, the public company Corporación Nacional de Telecomunicaciones CNT, was the victim of a cyberattack using a computer virus called ransomware, hijacking the information of this company, denoting that the problem lay in the lack of public policies and technological infrastructure that allow a government that reduces the vulnerability of automated information systems in Ecuador. In this virtue, it was proposed as a research objective, to establish how the lack of detection and control of computer incidents influences the insecurity of automated information systems that allow the commission of cybercrimes. Within the qualitative research, the following methods were used: Historical-logical and analytical-synthetic, which was applied to the different definitions determined to frame the use of Information and Communication Technologies in cybercrime, as well as the state obligation to a government. secure email. Concluding that since cybersecurity is a set of tools that safeguards information through the use of guidelines, methods and practices to protect information, it is of paramount importance to design a strategic plan for the formation of an entity for the detection and control of computer incidents, to so that the violation of automated information systems can be significantly reduced.

Article Details

Section
Articles
Author Biography

SANTILLÁN MOLINA ALBERTO LEONEL, VINUEZA OCHOA NELLY VALERIA, BENAVIDES SALAZAR CRISTIAN FERNANDO, SANTILLÁN OJEDA SALVATORE JOEL

SANTILLÁN MOLINA ALBERTO LEONEL1, VINUEZA OCHOA NELLY VALERIA2, BENAVIDES SALAZAR CRISTIAN FERNANDO3, SANTILLÁN OJEDA SALVATORE JOEL4

Universidad Regional Autónoma de Los Andes Santo Domingo. Ecuador.

References

Aboso, G. (2017). Cyber Criminal Law. Cybercrime and criminal law in the modern information society and communication technology. Buenos Aires: Editorial BdeF. Ltda.,.

Bremmer, I. (November-december de 2010). What information technology can and Cannot Do, Foreign Affairs. Democracy in Cyberspace:, 89(6), 86-91.

Caro, M. J. (2011). Scope and scope of National Security in Cyberspace. Revista Cuadernos de Estrategia, 49-82. Retrieved from https://dialnet.unirioja.es/servlet/revista?codigo=7646

Carranca & Trujillo, R., & & Carranca & Rivas, R. (1991). Mexican Criminal Law. Mexico: Temis.

ECLAC. (2013). Pathways to an Information Society in Latin America and the Caribbean. Economic Commission for Latin America and the Caribbean., 27.

Cobo Romani, J. (2009). The concept of information technologies. Benchmarking on the definitions of ICT in the knowledge society. Zer Magazine, 312.

World Summit on the Information Society. (2005). World Summit on the Information Society. Geneva: World Summit Geneva 2003-Tunis 2005,. Retrieved from http://www.itu.int/net/wsis/documents/doc_multi.asp?lang=es&id=1161|0

Desongles Corrales, J. y. (2006). Basic Computer Skills. Seville : Editorial MAD, .

European Union Agency for Cybersecurity, (. (January 20, 2019). European Agency for Cyber Security. Obtained from ENISA: https://www.enisa.europa.eu/events/botnets

Hilbert, M. (2009). The information society in Latin America and the Caribbean. Development of technologies and technologies for development. Santiago, Chile: Ediciones ECLAC, Economic Commission for Latin America and the Caribbean.

Jescheck, H.-H. y. (2002). Treatise on Criminal Law, General Part,. Granada: Editorial Comares S.L.,.

Ministry of the Interior of the Republic of Ecuador . (April 02, 2020). National Plan for Citizen Security. Obtained from the National Citizen Security Plan: https://www.ministeriodegobierno.gob.ec/wp-content/uploads/2019/08/PLAN-NACIONAL-DE-SEGURIDAD-CIUDADANA-Y-CONVIVENCIA-SOCIAL-PACI%CC%81FICA-2019-2030-1_compressed.pdf

Morgan, L. H. (1877). Ancient Society. New York: H. Holt and company. .

National Cyber Security Centre. (25 de enero de 2018). The Cyber theart to UK business, London 2018. Obtenido de National Crimen Agency: https://www.nationalcrimeagency.gov.uk/who-we-are/publications/178-the-cyber-threat-to-uk-business-2017-18/file

United Nations Development Programme. (2002). Report on Human Rights in Venezuela 2002. Information and Communication Technologies at the service of development. Caracas: UNDP.

Roxin, C. (2013). Criminal law. General part. Fundamentals. The Structure of Crime Theory. Madrid: Thomsom-Civitas.

Santillán Molina, A. (2015). Computer Law, a civil, criminal and commercial approach. Quito: Editorial Jurídica del Ecuador.

Suarez, A. (2016). Manual of computer crime in Colombia. Dogmatic analysis of Law 1273 of 2009,. Bogotá: Universidad Externado de Colombia,.