Download PDFOpen PDF in browser

Analysis of the Technical and Corporate Strategies Implemented to Combat Punishable Conducts That Have Affected the Cybersecurity of Personal Data in Financial and Telecommunications Organizations in Colombia During 2020

EasyChair Preprint 13433

9 pagesDate: May 24, 2024

Abstract

Information security seeks to reduce, minimize and mitigate risks to an acceptable level of operation. This consists of avoiding latent threats or computer breaches that allow the commission of criminal conduct,  and takes into account the complex surveillance necessary to provide users with an optimal level pf security with the aim of avoiding in its minimum cybercrime events and alien incursions that are every day risks in internet networks. In this era we cannot downplay that information is the most valuable asset for organizations and individuals, considered the oil of the future; information data is found in various forms: physical, digital, analog, verbal, written and transcribed: therefore, all kinds of thoughts or ideas have great value. Considering the value of the resources, the necessary security measures must be implemented to safeguard data and keep it secure in form and application.Information security seeks to reduce, minimize and mitigate risks to an acceptable level of operation. This consists of avoiding latent threats or computer breaches that allow the commission of criminal conduct,  and takes into account the complex surveillance necessary to provide users with an optimal level pf security with the aim of avoiding in its minimum cybercrime events and alien incursions that are every day risks in internet networks. In this era we cannot downplay that information is the most valuable asset for organizations and individuals, considered the oil of the future; information data is found in various forms: physical, digital, analog, verbal, written and transcribed: therefore, all kinds of thoughts or ideas have great value. Considering the value of the resources, the necessary security measures must be implemented to safeguard data and keep it secure in form and application.

Keyphrases: Cybercrime, Cybersecurity, Technology, information, information technologies

BibTeX entry
BibTeX does not have the right entry for preprints. This is a hack for producing the correct reference:
@booklet{EasyChair:13433,
  author    = {Wilson Pinzón Soler and Carlos Alberto Hurtado Martínez and Johemir Jesús Pérez Pertuz and Néstor Raúl Quiroz Cespedes},
  title     = {Analysis of the Technical and Corporate Strategies Implemented to Combat Punishable Conducts That Have Affected the Cybersecurity of Personal Data in Financial and Telecommunications Organizations in Colombia During 2020},
  howpublished = {EasyChair Preprint 13433},
  year      = {EasyChair, 2024}}
Download PDFOpen PDF in browser