**3.2 General summary of articles published by segments**


**151**

done in phases.

**Table 1.**

munication technologies.

which can be applied appropriately [38].

*An Approach to Optimize the Management of Information Security in Public Organizations…*

 National directorate of the civil registry of Ecuador x National electoral council x National directorate of public data x National council of the judiciary x National assembly x General comptroller of the state x Joint command of the armed forces x Secretaria de gestión de riesgos x

**Low Half High**

x

**Odr. Public organization name Priority**

• The security of information in the joint command of the armed forces of

 Central bank of Ecuador x National secretary of planning and development, Ecuador x Ministry of communications and the information society x Superintendency of banks x Internal revenue services of Ecuador among others x

**3.3 Priority of Ecuador's public organizations for the analysis**

9 National secretary of higher education science, technology and

*Main organizations of Ecuador that should be evaluated in the first phase.*

**4. Models, security technologies, and good practices**

Ecuador is important to analyze because it guarantees the internal and external

It defines public institutions that have problems in the management of information and communications technologies (ICT) and information security [1]. For this analysis, public organizations with the highest priority for the evaluation of information security management are considered; the same that in the medium term should be analyzed [7–8]. We must mention that all public organizations in Ecuador must improve the management of information security, but it should be

In **Table 1**, the public organizations that should be in the first phase are detailed,

considering that they have a high priority for the interrelation they have in state processes, to reduce corruption with the use of appropriate information and com-

To apply the models, security technologies, and good practices, the mission, vision, and strategic objectives of each organization must be analyzed; it is not appropriate to apply the same to everyone, given that each organization will have its priorities for the application of confidentiality, integrity, and availability of information. Each model, technologies, and good practices have different strengths,

*DOI: http://dx.doi.org/10.5772/intechopen.88931*

sovereignty of the country [37].

innovation (SENESCYT)

*An Approach to Optimize the Management of Information Security in Public Organizations… DOI: http://dx.doi.org/10.5772/intechopen.88931*


#### **Table 1.**

*Fault Detection, Diagnosis and Prognosis*

security protocols adopt in a conceptual model in identity management for the civil registry of Ecuador [13], analysis of model Clark Wilson to adopt to the database of the civil registry of Ecuador [14], mitigating the security of the database by applying a conceptual model of integrity for the civil registry of Ecuador [15], a security algorithms approach to apply to the civil registry database of the Ecuador [16], conceptual model for identity management to mitigate the database security of the registry civil of Ecuador [17], adoption of the Hash algorithm in a conceptual model for the civil registry of Ecuador [18], an approach of efficient security algorithms for distribute architectures [19], biometric systems approach applied to a conceptual model to mitigate the integrity of the information [20], algorithms for efficient biometric systems to mitigate the integrity of a distributed database [21], analysis of efficient processes for optimization in a distributed database [22], analysis of HIPAA for adopt in the information security in the civil registry of the Ecuador [23], a blockchain approach to mitigate information security in a public organization for Ecuador [24], analysis of the appropriate security models to apply in a distributed architecture [25], optimization of an electronic signature scheme in a voting system in a distributed architecture [26], ensuring the blind signature for the electoral system in a distributed environment [27], analysis cryptographic for electronic votes in systems of distributed architectures [28], an approach to the efficient security algorithms used in voting scanning in an electoral process [29], a homomorphic encryption approach in a voting system in a distributed architecture [30], analysis of security algorithms for a distributed database [31], a Hyperledger scheme for the deployment of smart contracts in a public organization of Ecuador [32], analysis of adequate bandwidths to guarantee an electoral process in Ecuador [33], appropriate security protocols to mitigate the risks in electronic money management [34], cryptographic algorithms to mitigate the risks of database in the management of a smart city [35], impact on the information security management due to the use of social networks in a public organization in Ecuador [36], an information security approach in the armed forces of Ecuador [37].

**3.2 General summary of articles published by segments**

among others, for the civil registry of Ecuador 10–25].

organizations using electronic money [34].

tion that will be delivered from the electoral processes [26–33].

considered strategic [7–9].

Cuenca, among others [35].

disclosed without control [36].

• The management of information and communications technologies (ICT), Models of Indicators, allows to visualize all the processes and activities in general form of public institutions that must be analyzed with priority to be

• The analysis of information security regarding models, technologies, conceptual models, security protocols, prototypes, and cryptographic algorithms,

• They support the analysis, design, models, and prototypes of security for the National Electoral Council to mitigate the risks in the integrity of the informa-

• Analysis of appropriate security protocols to guarantee the cash flow of public

• Impact of social networks on information security in public organizations, as it affects both internal and external users to prevent the information from being

• Cryptographic analysis that allows improving the security of data in smart cities that involve the main cities of Ecuador such as Quito, Guayaquil, and

**150**

*Main organizations of Ecuador that should be evaluated in the first phase.*

• The security of information in the joint command of the armed forces of Ecuador is important to analyze because it guarantees the internal and external sovereignty of the country [37].

#### **3.3 Priority of Ecuador's public organizations for the analysis**

It defines public institutions that have problems in the management of information and communications technologies (ICT) and information security [1]. For this analysis, public organizations with the highest priority for the evaluation of information security management are considered; the same that in the medium term should be analyzed [7–8]. We must mention that all public organizations in Ecuador must improve the management of information security, but it should be done in phases.

In **Table 1**, the public organizations that should be in the first phase are detailed, considering that they have a high priority for the interrelation they have in state processes, to reduce corruption with the use of appropriate information and communication technologies.

### **4. Models, security technologies, and good practices**

To apply the models, security technologies, and good practices, the mission, vision, and strategic objectives of each organization must be analyzed; it is not appropriate to apply the same to everyone, given that each organization will have its priorities for the application of confidentiality, integrity, and availability of information. Each model, technologies, and good practices have different strengths, which can be applied appropriately [38].
