*6.1.3 Phases that must be considered to improve the security of information*

Consider the results obtained in the different articles published on the public organizations of Ecuador, to consider as an alternative with the objective of improving the security of information [7–33].


#### **6.2 Prototype sequence diagram of users and services access**

A prototype of the sequence of accesses of internal/external users and services to the information of public organizations is defined.

**Figure 4.**

*Prototype sequence diagram of users and services access.*

**Figure 4** describes the dynamic interaction of the user, administrator, verifier, interface, and auditor to perform the sequence of access to information and services.

#### **6.3 Prototype of security technology integration**

In order to generate this prototype, the recommendations of the World Bank for Latin America and the Caribbean are taken into account, which states textifically: "In the midst of all the technological advances we are currently

**157**

**7. Conclusions**

*Prototype integration of security technologies.*

**Figure 5.**

*An Approach to Optimize the Management of Information Security in Public Organizations…*

experiencing, Blockchain, or chain of blocks, has the power to alter current models economic and business, and become a particularly valuable asset for emerging economies. According to the experts, it could also be very useful as a method to fight corruption, especially in Latin America and the Caribbean, where the penetration of mobile telephony can facilitate technological adoptions" [5], the application of Hyperledger Fabric technology with intelligent contracts, provides a starting point to understand a chain of Hyperledger Fabric blocks to consult and update with a Ledger to generate X.509 certificates that are used by applications

**Figure 5** describes how the Hyperledger Fabric, which is a set of functions, uses the Ledger to initiate the status information and the read/write requests through the

The security of information is considered strategic and the main asset of public and private organizations. In this chapter, we consider the previous analyzes carried out by the authors in the area of information and communications technologies (ICT) and information security to determine the impact it has on the incorrect management of information. The weakness in the administration of information security is taken advantage of by all officials or workers at an operational, tactical, and strategic level of the public organizations of Ecuador to generate corruption such as incorrect identification of citizens, dead voters, embezzlement in public coffers, false titles especially acquired by the politicians, for all the aforementioned it is concluded that to avoid corruption in a country at

*DOI: http://dx.doi.org/10.5772/intechopen.88931*

that interact with a blockchain authorized [47].

connections.

*An Approach to Optimize the Management of Information Security in Public Organizations… DOI: http://dx.doi.org/10.5772/intechopen.88931*

experiencing, Blockchain, or chain of blocks, has the power to alter current models economic and business, and become a particularly valuable asset for emerging economies. According to the experts, it could also be very useful as a method to fight corruption, especially in Latin America and the Caribbean, where the penetration of mobile telephony can facilitate technological adoptions" [5], the application of Hyperledger Fabric technology with intelligent contracts, provides a starting point to understand a chain of Hyperledger Fabric blocks to consult and update with a Ledger to generate X.509 certificates that are used by applications that interact with a blockchain authorized [47].

**Figure 5** describes how the Hyperledger Fabric, which is a set of functions, uses the Ledger to initiate the status information and the read/write requests through the connections.

**Figure 5.** *Prototype integration of security technologies.*
