The problems of information security in public organizations in Ecuador are evident, which, as a result, have led to corruptions that are present at all levels of operational, tactical and strategic management. The objective of this chapter is to analyze the available information found in different media, written, spoken, among others. The deductive method was used for the collection of information and observation techniques. It turned out the improve in the administrative processes, prototype diagram of sequence of access of users and services, prototype of integration of technologies of security of the information for public organizations of Ecuador. It was concluded that to avoid corruption in a country change should happen at all levels: the way of thinking and culture of the inhabitants, laws, penalties to politicians without parliamentary immunity, application of information and communications technologies (ICT) in an appropriate manner, and complying with international standards in information security. To improve information security, administrative policies on information security must be changed, and technologies related to immutable security algorithms, Ledger, Hyperledger, etc., must be used.
In data handling, security and privacy are essential for database administrators and users that own their information. Information about security models or architectures was analyzed for databases that minimize Cyber Attacks. The problem is that security models deployed in databases in public organizations suffer from computer attacks due to vulnerabilities in their security management systems. Data providers often publish the information for research purposes, publishing compromises on the privacy of the data of users registered in the entities. There are many security techniques for databases based on data encryption processes in transactions, however, the techniques found compromise information. The development of the document used the deductive method and exploratory research technique that allows us to study the information in the articles presented. In this document we have proposed a Security Model Assessment Prototype for Databases, a Prototype of Security Management Architecture in Blockchain for a Database, a Database Security Algorithm, a Logical Structure of the Management System in Blockchain, and a Prototype to mitigate cyberattacks. The use of a hybrid blockchain model provides the system with the optimal security that public organizations in relation to test results performed with a 99.50% security effectiveness. The simulations presented in this document were conducted based on in-depth studies and the data were randomly placed with a range according to the study results based on real-world situations.INDEX TERMS Blockchain, cyber attacks, cyber security, data base, public organization.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.