Non-technical summary:Almost six years have passed since the Colombian peace agreement was signed. However, the promise of a 'Stable and lasting peace' is slipping away as the transition towards peace is increasingly tainted and overshadowed with violence. The future of Colombia is at a crossroad and without international support and action taken to monitor global supply chains, these particular drivers of conflict, violence and environmental degradation will persist. We summarize the current situation and shed light on the complexities of building peace in Colombia, with a particular focus on the environmental changes that took place since the peace agreement was signed. Technical summary:The Colombian peace agreement officially ended one of the world's longest internal armed conflicts. But the transformation of land use that takes place in the wake of the peace agreement, has made the historic inequalities of access to land more visible and revealed inherent and violent struggles over resources that persist across the country. In this briefing we analyse the current status of peacebuilding in Colombia and highlight the major barriers and challenges in the current peacebuilding efforts. We show how the last years brought severe and negative repercussions for people, communities and the natural environment in Colombia as cattle ranching, 'productive agriculture' and extractive industries are increasingly encroaching into indigenous territories, protected areas and forest ecosystems, replacing diverse natural forests that support biodiversity and contribute to human well-being locally and globally. The resurging presence of numerous armed groups seeking to control the profitable drug trade and mineral deposits are a major problem and obstacle for building lasting and sustainable peace among people and with the natural environment in Colombia. We conclude
During 2015 and 2016, in Pereira (Colombia) a training project addressed to public entities officials was carried out in areas related with: law on transparency, ISO 27001 and database reporting, though theoretical and practical sessions. As a result, a local researching group developed a set of documents with relevant and updated information on each topic. So, officials can use them as implementation guides in their respective institutions. This paper describes how the training sessions was developed. Finally, the results of the project are presented in a positive way, taking as a reference both an initial scenario and final scenario of greater complexity.
Resumen-Este artículo contiene el ciclo de vida de una contraseña, que va desde la generación hasta su tiempo de expiración. Adicionalmente, se presenta una política de gestión de contraseñas que contiene las pautas necesarias para generar e implementar claves seguras para el usuario final manteniendo su usabilidad, con el objetivo de mejorar la seguridad de los sistemas de información y capacitar a estos usuarios en cuanto a la protección de los datos de la organización.Palabras clave-Clave, contraseña, ciclo de vida de las contraseñas, política de gestión de contraseñas, usuario final.Abstract-This article contains the life cycle of a password that begins since the generation until its expiration time. Additionally, It is presented a password management policy which contains the necessary guidelines to generate and implement the use of safe passwords for the end-user maintaining its usability, with the objective of improve the security of the information systems and train these users with topics related to the data protection of the organization.Key Word -cycle life of a password, End-user, password, password management policy. I. INTRODUCCIÓNLos métodos de autenticación se dividen en tres grandes categorías en función de lo que utilizan para la verificación de identidad, las cuales son: (a) algo que el usuario sabe (contraseña), (b) algo que éste posee (tarjeta inteligente), y (c) una característica física del usuario. El ciclo de vida de las contraseñas como se define en la figura 1, consta de una serie de etapas que van desde la generación hasta la terminación de la clave.El problema que se presenta es que a pesar de que actualmente se cuenta con herramientas para la generación de contraseñas como "Random Password Generator" [7] [15], centrados en la generación de contraseñas no a partir de programas ya que esto conlleva a tener problemas de seguridad por parte de los usuarios, sino a establecer el uso de políticas que permitan la generación de claves seguras y con un alto grado de usabilidad por parte de quien las va a utilizar.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.