Array Array
Array
DOI:
https://doi.org/10.33936/isrtic.v2i1.1129Keywords:
ArrayAbstract
ArrayDownloads
References
[1] M Baldeon. “Plan maestro de seguridad informática con lineamiento de la norma ISO 27002”. En: (2012).
[2] G. Morlanes. “Seguridad Informática, Matanzas, CU”. En: Revista de Arquitectura e Ingeniería 6.2 (2012), págs. 1-14.
[3] Edgar Valdés Castro. “TENDENCIAS DE LA AUDITORIA INFORMATICA”. En: Ingenium 4.8 (2009), págs. 69-98.
[4] CAES S.A. ¿Qué es un incidente informático?
[5] OSIATIS S.A. ITIL Gestión de Servicios TI: Fundamentos de la Gestión TI.
[6] Jesús Rafael Gómez Álvarez. “Implantación de los procesos de gestión de incidentes y gestión de problemas según ITIL v3. 0 en el área de tecnologías de la información de una entidad financiera”. En: (2012).
Downloads
Published
Issue
Section
License
Articles submitted to this journal for publication will be released for open access under a Creative Commons Attribution Non-Commercial No Derivative Works licence (http://creativecommons.org/licenses/by-nc-nd/4.0).
The authors retain copyright, and are therefore free to share, copy, distribute, perform and publicly communicate the work under the following conditions: Acknowledge credit for the work specified by the author and indicate if changes were made (you may do so in any reasonable way, but not in a way that suggests that the author endorses your use of his or her work. Do not use the work for commercial purposes. In case of remixing, transformation or development, the modified material may not be distributed.

