International Journal on Advanced Science, Engineering and Information Technology, Vol. 12 (2022) No. 1, pages: 101-113, DOI:10.18517/ijaseit.12.1.13914

The Implementation of Information Security for the Inventory System in a Municipality of Lima-Perú

Jorge Mamani Idme, Jhon Luis Valenzuela García, Shalóm Adonai Huaraz Morales, Laberiano Andrade-Arenas

Abstract

In recent years, digital transformation has played an important role in all companies investing in technology. This investment greatly contributes to the daily tasks that companies carry out and can mean notable business growth. Also, it brings vulnerabilities that can be exploited by malicious people who, for any reason, seek to damage or appropriate the company's resources, thus directly or indirectly affecting business operations, which is why it is necessary to prevent these acts of vulnerability with the realization of information security. That is why the materials used to implement information security are explained in this work. The purpose of the research work is to identify, analyze, and evaluate to deal with the risks, thus better controlling the risks. This allowed us to land it in the conclusions made based on the objective and methodology used. It allowed us to have a sequence divided into three stages: initiation, planning, and execution. This helps us identify the infrastructure, times, risks, controls, policies, and information assets, in addition to evaluating and treating each risk identified in the District Municipality of Jesás María. This study showed that the implementation of information security has a positive impact since it helps make decisions for the protection of information assets.

Keywords:

Information security; impact; methodology; protection; vulnerability.

Viewed: 1284 times (since abstract online)

cite this paper     download