Evaluación del nivel de seguridad informática del hospital iii Iquitos de essalud Loreto - 2022
Date
2022-08-01
Journal Title
Journal ISSN
Volume Title
Publisher
Universidad Científica del Perú
Abstract
En el presente trabajo de suficiencia profesional titulada “Evaluación del Nivel de Seguridad Informática del Hospital III Iquitos de Essalud Loreto – 2022”, se realiza un examen de las vulnerabilidades y amenazas existentes en la Unidad de Soporte Informático, se utilizó la metodología cuantitativa en donde se describe los criterios técnicos que determinan el mal o buen funcionamiento y calidad de los servicios que presta la mencionada unidad hacia los usuarios internos y externos, tomando en consideración los principios básicos de la información como es la Disponibilidad, Integridad y Confidencialidad, en este trabajo se tuvo como objetivo general evaluar los niveles de seguridad de la Información del Hospital III Iquitos Essalud, se logró establecer que no existen los protocolos y mecanismos necesarios para garantizar la exactitud de la información en su procesamiento, transporte y almacenamiento, no existen los criterios seguros y fiables para el acceso oportuno a los sistemas informáticos y por ultimo no existen los criterios y mecanismos de seguridad para garantizar la accesibilidad y control de ingreso autorizado a los sistemas informáticos de las personas que cuenten con las credenciales o autorización para el procesamiento de la información por parte del área usuaria, por lo tanto a la brevedad posible se debe implementar un Sistema de gestión de Seguridad Informática, en este caso en nuestro trabajo de suficiencia se recomienda la implementación de la “NTP ISO/IEC 27001:2014.
In the present work of professional sufficiency entitled "Evaluation of the Level of Computer Security of the Hospital III Iquitos de Essalud Loreto - 2022", an examination of the vulnerabilities and threats existing in the Computer Support Unit is carried out, the quantitative methodology was used where The technical criteria that determine the poor or good functioning and quality of the services provided by the aforementioned unit to internal and external users are described, taking into consideration the basic principles of information such as Availability, Integrity and Confidentiality, in this work. The general objective was to evaluate the security levels of the Information of Hospital III Iquitos Essalud, it was possible to establish that there are no protocols and mechanisms necessary to guarantee the accuracy of the information in its processing, transport and storage, there are no safe criteria. and reliable for timely access to information systems and finally, there are no criteria and security mechanisms to guarantee accessibility and control of authorized entry to the computer systems of people who have the credentials or authorization for the processing of information by the user area, therefore As soon as possible, an Information Security Management System should be implemented, in this case, in our sufficiency work, the implementation of the “NTP ISO/IEC 27001:2014.
In the present work of professional sufficiency entitled "Evaluation of the Level of Computer Security of the Hospital III Iquitos de Essalud Loreto - 2022", an examination of the vulnerabilities and threats existing in the Computer Support Unit is carried out, the quantitative methodology was used where The technical criteria that determine the poor or good functioning and quality of the services provided by the aforementioned unit to internal and external users are described, taking into consideration the basic principles of information such as Availability, Integrity and Confidentiality, in this work. The general objective was to evaluate the security levels of the Information of Hospital III Iquitos Essalud, it was possible to establish that there are no protocols and mechanisms necessary to guarantee the accuracy of the information in its processing, transport and storage, there are no safe criteria. and reliable for timely access to information systems and finally, there are no criteria and security mechanisms to guarantee accessibility and control of authorized entry to the computer systems of people who have the credentials or authorization for the processing of information by the user area, therefore As soon as possible, an Information Security Management System should be implemented, in this case, in our sufficiency work, the implementation of the “NTP ISO/IEC 27001:2014.
Description
Keywords
Seguridad Informática, Vulnerabilidad, Amenazas, Hospital, Computer Security, Vulnerability, Threats, Hospital
Citation
Collections
Endorsement
Review
Supplemented By
Referenced By
Creative Commons license
Except where otherwised noted, this item's license is described as info:eu-repo/semantics/openAccess