{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T17:21:13Z","timestamp":1742923273516,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031834318"},{"type":"electronic","value":"9783031834325"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-83432-5_10","type":"book-chapter","created":{"date-parts":[[2025,3,4]],"date-time":"2025-03-04T09:15:37Z","timestamp":1741079737000},"page":"143-158","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Study of Techniques and Technologies to Identify Vulnerabilities and Mitigate Risks in Computer Systems in University Institutions in Quito, Ecuador"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-6444-652X","authenticated-orcid":false,"given":"Omar","family":"Puetate-Sarzosa","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5297-6676","authenticated-orcid":false,"given":"Leticia","family":"Vaca-Cardenas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,5]]},"reference":[{"key":"10_CR1","unstructured":"Imbaquingo, D., Herrera, E., Herrera, I., Arciniega Silvia, V.G., Ortega, M.: Evaluaci\u00f3n de sistemas de seguridad inform\u00e1ticos universitarios. Caso de Estudio: Sistema de Evaluaci\u00f3n Docente. Risti-Revista Ib\u00e9rica de Sistema e Tecnologias de Informaci\u00f3n, 08(E22), 349\u2013362 (2019)"},{"key":"10_CR2","unstructured":"Chowdhury, N., Gkioulos, V.: Cybersecurity in UK Universities: mapping (or managing) threat intelligence sharing within the higher education sector. Int. J. Inf. Secur. 22(06), 1531\u20131546 (2023)"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Araujo, I., Antunes, N., Vieira, M.: Intrusion detection and tolerance for microservice applications. In: Proceedings of the 12th Latin-American Symposium on Dependable and Secure Computing, pp. 176\u2013181 (2023)","DOI":"10.1145\/3615366.3622794"},{"key":"10_CR4","unstructured":"Castro, J., Villar, H., Marin, K., Duarte, K., Giraldo, V.: An\u00e1lisis de riesgos y vulnerabilidades de seguridad inform\u00e1tica aplicando t\u00e9cnicas de inteligencia artificial orientado a instituciones de educaci\u00f3n superior. Revista modum, pp. 48\u201355 (2021)"},{"key":"10_CR5","unstructured":"Galarza, D.: Estrategia para la evaluaci\u00f3n de vulnerabilidades del sistema de notas de instituciones educativas utilizando t\u00e9cnicas de hacking \u00e9tico. caso de estudio: Instituto Tecnol\u00f3gico Quito (2020)"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Guerra, E., Neira, H., D\u00edaz, J., Pati\u00f1o, J.: Desarrollo de un sistema de gesti\u00f3n para la seguridad de la informaci\u00f3n basado en metodolog\u00eda de identificaci\u00f3n y an\u00e1lisis de riesgo en bibliotecas universitarias. Informaci\u00f3n tecnol\u00f3gica 32(05) (2021)","DOI":"10.4067\/S0718-07642021000500145"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Cerny, T., Abdelfattah, A., Bushong, V., Al Maruf, A.: Microvision: static analysis-based approach to visualizing microservices in augmented reality 2022. In: IEEE International Conference on Service-Oriented System Engineering (SOSE), pp. 49\u201358 (2022)","DOI":"10.1109\/SOSE55356.2022.00012"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Morales, P., Medina, R.: Ciberseguridad en plataformas educativas institucionales de educaci\u00f3n superior de la provincia de Tungurahua \u2013 Ecuador. Dialnet 10(02), 49\u201375 (2021)","DOI":"10.17993\/3ctic.2021.102.49-75"},{"key":"10_CR9","unstructured":"Castro, A.: Evaluaci\u00f3n de la seguridad inform\u00e1tica en la Universidad T\u00e9cnica De Babahoyo mediante el an\u00e1lisis de trafico integral en redes de \u00e1rea local (2023)"},{"key":"10_CR10","unstructured":". Cueva, J., Sig\u00fcenza, L.: An\u00e1lisis de vulnerabilidades y riesgos en la infraestructura tecnol\u00f3gica de la Universidad T\u00e9cnica Particular de Loja. Repositorio Intitucional UTPL (2023)"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":". Cajamarca, G., Ron, M., Chamorro, P., Genovez, C.: Evaluaci\u00f3n del nivel de seguridad inform\u00e1tica desplegado en las instituciones de educaci\u00f3n superior de la red RIT II. Revista Conectividad 04(01), 38\u201349 (2023)","DOI":"10.37431\/conectividad.v4i1.49"},{"key":"10_CR12","unstructured":"Zambrano, A., Guarda, T., Valenzuela, E., Qui\u00f1a, G.: Mitigation techniques for security vulnerabilities in web applications. RISTI: Revista Ib\u00e9rica de Sistemas e Tecnologias de Informa\u00e7\u00e3o (17), 299\u2013308 (2019)"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Hyder, M., Ahmed, W., Ahmed, M.: Toward deceiving the intrusion attacks in containerized cloud environment using virtual private cloud\u2010based moving target defense. Concurr. Comput. 1 (2022)","DOI":"10.1002\/cpe.7549"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Chondamrongkul, N., Sun, J., Warren, I.: Formal security analysis for software architecture design. In: An Expressive Framework to Emerging Architectural Styles, vol. 102631, p. 206 (2021)","DOI":"10.1016\/j.scico.2021.102631"},{"key":"10_CR15","unstructured":"Guam\u00e1n, V.: Evaluaci\u00f3n de seguridad de la informaci\u00f3n aplicado al sistema de evaluaci\u00f3n de docentes de la Universidad T\u00e9cnica del Norte basado en la ISO 27002. REPOSITORIO INSTITUCIONAL \/ TESIS DE GRADA UNIVERSIDAD TECNICA DEL NORTE, vol. 03, no. 01 (2017)"},{"key":"10_CR16","unstructured":"Sol\u00eds, B., Valderrama, H., De Le\u00f3n, E., V\u00e1squez, D.: Seguridad de los Sistemas Inform\u00e1ticos Universitarios. Retos Pendientes. REICIT, vol. 02, n\u00ba 02 (2023)"},{"key":"10_CR17","unstructured":"Guzm\u00e1n, S.: Dise\u00f1o de un Sistema de Gesti\u00f3n de la Seguridad de la Informaci\u00f3n para el Departamento de Desarrollo Tecnol\u00f3gico e Inform\u00e1tico de la Universidad T\u00e9cnica del Norte basado en la Norma ISO\/IEC 27001. Repositorio Institucional UTN, vol. 03 (2017)"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":". Goenka, R., Chawla, M., Tiwari, N.: A comprehensive survey of phishing: mediums, intended targets, attack and defence techniques and a novel taxonomy. Int. J. Inf. Secur. 1 (2023)","DOI":"10.1007\/s10207-023-00768-x"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Page, M., McKenzie, J., Bossuyt, P.: The PRISMA 2020 statement: an updated guideline for reporting systematic reviews. Syst. Rev. 10, 1\u20135 (2021)","DOI":"10.1186\/s13643-021-01626-4"},{"key":"10_CR20","unstructured":"Arias, J., Covinos, M.: Dise\u00f1o y metodolog\u00eda de la investigaci\u00f3n. Metodolog\u00eda de la investigaci\u00f3n (2021)"},{"key":"10_CR21","unstructured":"Avello, R., Palmero, D., S\u00e1nchez, S., Quintana, M.: Validaci\u00f3n de instrumentos como garant\u00eda de la credibilidad en las investigaciones cient\u00edficas. Revista Cubana de Medicina Militar 48(01), 441\u2013450 (2019)"},{"key":"10_CR22","doi-asserted-by":"crossref","unstructured":"Alexei, A.: Cyber security strategies for higher education institutions. Electron. Comput. Sci. Comput. Inf. Technol. XXVIII, 74\u201392 (2021)","DOI":"10.52326\/jes.utm.2021.28(4).07"},{"key":"10_CR23","unstructured":"P\u00e1ez, J., P\u00e1ez, M.: An\u00e1lisis de vulnerabilidades y riesgos en la infraestructura tecnol\u00f3gica de la Universidad Central del Ecuador. Repositorio Institucional UCE. [Tesis de Grado, Universidad Central del Ecuador] (2016)"},{"key":"10_CR24","unstructured":"Coursera: Investigador de informatica forense. Guia professional (2023)"},{"key":"10_CR25","unstructured":"Hern\u00e1ndez, R.: Metodolog\u00eda de la investigaci\u00f3n, vol. 5, n\u00ba 05. Mc Graw Hill, New York (2010)"}],"container-title":["Communications in Computer and Information Science","Advanced Research in Technologies, Information, Innovation and Sustainability"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-83432-5_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,4]],"date-time":"2025-03-04T09:15:57Z","timestamp":1741079757000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-83432-5_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031834318","9783031834325"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-83432-5_10","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"5 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ARTIIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Research in Technologies, Information, Innovation and Sustainability","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Santiago de Chile","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chile","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"artiis2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.artiis.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}