The Implementation of Information Security for the Inventory System in a Municipality of Lima-Perú

Jorge Mamani Idme (1), Jhon Luis Valenzuela García (2), Shalóm Adonai Huaraz Morales (3), Laberiano Andrade-Arenas (4)
(1) Department of Systems Engineering and Informatics, Universidad de Ciencias y Humanidades, Los Olivos, Lima, 15314, Perú
(2) Department of Systems Engineering and Informatics, Universidad de Ciencias y Humanidades, Los Olivos, Lima, 15314, Perú
(3) Department of Systems Engineering and Informatics, Universidad de Ciencias y Humanidades, Los Olivos, Lima, 15314, Perú
(4) Department of Systems Engineering and Informatics, Universidad de Ciencias y Humanidades, Los Olivos, Lima, 15314, Perú
Fulltext View | Download
How to cite (IJASEIT) :
Mamani Idme, Jorge, et al. “The Implementation of Information Security for the Inventory System in a Municipality of Lima-Perú”. International Journal on Advanced Science, Engineering and Information Technology, vol. 12, no. 1, Jan. 2022, pp. 101-13, doi:10.18517/ijaseit.12.1.13914.
In recent years, digital transformation has played an important role in all companies investing in technology. This investment greatly contributes to the daily tasks that companies carry out and can mean notable business growth. Also, it brings vulnerabilities that can be exploited by malicious people who, for any reason, seek to damage or appropriate the company's resources, thus directly or indirectly affecting business operations, which is why it is necessary to prevent these acts of vulnerability with the realization of information security. That is why the materials used to implement information security are explained in this work. The purpose of the research work is to identify, analyze, and evaluate to deal with the risks, thus better controlling the risks. This allowed us to land it in the conclusions made based on the objective and methodology used. It allowed us to have a sequence divided into three stages: initiation, planning, and execution. This helps us identify the infrastructure, times, risks, controls, policies, and information assets, in addition to evaluating and treating each risk identified in the District Municipality of Jesí¡s Marí­a. This study showed that the implementation of information security has a positive impact since it helps make decisions for the protection of information assets.

J. A. Orjuela Castro and W. Adarme Jaimes, “Dynamic impact of the structure of the supply chain of perishable foods on logistics performance and food security,” Journal of Industrial Engineering and Management, vol. 10, no. 4, pp. 687-710, Oct. 2017, DOI: 10.3926/jiem.2147. [Online]. Available: http://jiem.org/index.php/jiem/article/view/2147

I. M. Lopes, T. Guarda, and P. Oliveira, “How iso 27001 can help achieve gdpr compliance,” in 2019 14th Iberian Conference on Information Systems and Technologies (CISTI). IEEE, 2019, pp. 1-6, DOI: 10.23919/CISTI.2019.8760937.

K. J. Moncayo L Ìopez and C. A. Ortiz Lozada, “Propuesta de iso 27001 para salvaguardar los inventariosde peter pc,” B.S. thesis, Universidad de Guayaquil Facultad de Ciencias Administrativas, 2018.

M. Nieles, K. Dempsey, V. Y. Pillitteri et al., “An introduction to information security,” NIST special publication, vol. 800, p. 12, Jun. 2017, DOI: 10.6028/NIST.SP.800-12r1.

A. da Veiga and N. Martins, “Defining and identifying dominant information security cultures and subcultures,” Computers Security, vol. 70, pp. 72-94, 2017, DOI: 10.1016/j.cose.2017.05.002. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0167404817300937

Z. Tumwebaze, V. Mukyala, B. Ssekiziyivu, C. B. Tirisa, and A. Tumwebonire, “Corporate governance, internal audit function and accountability in statutory corporations,” Cogent Business & Management, vol. 5, no. 1, p. 1527054, Jan. 2018, doi = 10.1080/23311975.2018.1527054. [Online]. Available: https://doi.org/10.1080/23311975.2018.1527054

E. F. Alvarado Meza, “Propuesta para la implementación de un sistema de gestión de seguridad de la informaci Ìon aplicando la norma iso 27001 para industrias ales” PhD thesis, Universidad de Guayaquil.Facultad de Ingenierıa Industrial, 2016.

N. Sohrabi Safa, R. Von Solms, and S. Furnell, “Information security policy compliance model in organizations,” Computers Security, vol. 56, no. Complete, pp. 70-82, Feb. 2016, DOI: 10.1016/j.cose.2015.10.006. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0167404815001583

S. V. Flowerday and T. Tuyikeze, “Information security policy development and implementation: The what, how and who,” Computers Security, vol. 61, no. C, pp. 169- 183, 2016, DOI: 10.1016/j.cose.2016.06.002. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0167404816300670

V. Gil Vera and J. Gil Vera, “Seguridad informí¡tica organizacional: un modelo de simulación basado en diní¡mica de sistemas,” Scientia et Technica, vol. 22, no. 2, pp. 193- 197, Jun. 2017, DOI: 10.22517/23447214.11371. [Online]. Available: https://revistas.utp.edu.co/index.php/revistaciencia/article/view/11371

V. P. Rathod, “Project implementation of information security management system in tata chemicals ltd,” Ph.D. dissertation, Instytut Organizacji Systemow Produkcyjnych, 2019.

W. M. Contero Ramos, “Diseño de una polıtica deseguridad de la información basada en la norma iso27002: 2013, para el sistema de botones de seguridaddel ministerio del interior,” 2019.

F. Cabrera and R. Isidro, “Aní¡lisis del riesgo de las ticsen el laboratorio de computo de la unidad educativapueblo nuevo mediante la aplicaci Ìon de la norma iso27005.,” B.S. thesis, Babahoyo, UTB-FAFI 2020, 2020.

J. J. Santacruz Espinoza, C. R. Vega Abad, L. F. Pinos Castillo, and O. E. Cardenas Villavicencio, “Sistema cobit en los procesos de auditorí­as de los de sistemas informí¡ticos,” Journal of Science and Research: Revista Ciencia e Investigacion. ISSN 2528-8083 ´ , vol. 2, no. 8, pp. 65-68, Dic. 2017, DOI: 10.26910/issn.2528-8083vol2iss8.2017pp65-68. [Online]. Available: https://revistas.utb.edu.ec/index.php/sr/article/view/342

A. D. D. Quintana, “Relación entre los virus informí¡ticos (malware) y ataques en paí­ses vulnerables de seguridad en informí¡tica utilizando aní¡lisis de componentes principales (acp),” Logos, vol. 6, no. 1, 2016, DOI: 10.21503/log.v6i1.1316.

T. Nathezhtha, D. Sangeetha, and V. Vaidehi, “Wc-pad: Web crawling based phishing attack detection,” in 2019 International Carnahan Conference on Security Technology (ICCST). IEEE, 2019, pp. 1-6, DOI: 10.1109/CCST.2019.8888416.

J. S. Aidan, H. K. Verma, and L. K. Awasthi, “Comprehensive survey on petya ransomware attack,” in 2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS), IEEE. Los Alamitos, CA, USA: IEEE Computer Society, Dec. 2017, pp. 122-125, DOI: 10.1109/ICNGCIS.2017.30.

F. M. Arevalo Moscoso, I. P. Cedillo Orellana, and S. A. ´ Moscoso Bernal, “Metodologí­a ígil para la gestión de riesgos informí¡ticos,” Killkana Tí©cnica, vol. 1, no. 2, pp. 31-42, ago. 2017, DOI: 10.26871/killkanatecnica.v1i2.81.[Online].Available : https : //killkana.ucacue.edu.ec/index.php/killkanatecnico/article/view/81

E. A. Morales Quispe, “Validación metodologıa pmbok en gestión de riesgos del proceso de desarrollo de software empresa sector educación,” 2018.

H. C. y Marcelo Mendoza-Vinces y Christian Vera Alava, “Importancia de la auditorí­a interna para el perfeccionamiento de los niveles eficiencia y calidad en las empresas,” Dominio de las Ciencias, vol. 3, no. 2, pp. 908-920, 2017, DOI: 10.23857/dc.v3i2.457. [Online]. Available: https://www.dominiodelasciencias.com/ojs/index.php/es/article/view/457

S. Sirvent Asensi, V. Gisbert Soler, and E. Perez Bernabeu, “Los 7 principios de gestión de la calidad en iso 9001,” 3C Empresa. Investigación y pensamiento crí­tico, no. 1, pp. 10-18, dic. 2017, DOI: 10.17993/3cemp.2017.especial.10-18. [Online]. Available: http://ojs.3ciencias.com/index.php/3c-empresa/article/view/572

V. B. Somawarad and J. Rashmi, “Planning and scheduling multi storeyed residential building using microsoft project and application of material management technique,” Planning, vol. 6, no. 07, 2019.

A. Merlos, “Polıticas de seguridad y defensa en la erade la posverdad,”Cuadernos de estrategia, no. 197,pp. 83-106, 2018.

A. Nechai, E. Pavlova, T. Batova, and V. Petrov, “Implementation of information security system in service and trade,” IOP Conference Series: Materials Science and Engineering, vol. 940, p. 012048, Oct. 2020, DOI: 10.1088/1757-899x/940/1/012048. [Online]. Available: https://doi.org/10.1088/1757-899x/940/1/012048

Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.

Authors who publish with this journal agree to the following terms:

    1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
    2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
    3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).