**7. Conclusions**

*Fault Detection, Diagnosis and Prognosis*

the organization.

the book.

7.Define functions for a work group.

all operational, tactical, and strategic levels.

the information of public organizations is defined.

**6.3 Prototype of security technology integration**

*Prototype sequence diagram of users and services access.*

**6.2 Prototype sequence diagram of users and services access**

8.Define the steps to be taken with the respective responsibility to each officer of

9.Prepare an information technology strategic plan (ITSP) with their respective security plans, contingency, backup, etc., with the participation of official's at

10. The exposed phases are those that are suggested to be used as an alternative to define a generic methodology for public organizations in the next chapter of

A prototype of the sequence of accesses of internal/external users and services to

**Figure 4** describes the dynamic interaction of the user, administrator, verifier, interface, and auditor to perform the sequence of access to information and services.

In order to generate this prototype, the recommendations of the World Bank for Latin America and the Caribbean are taken into account, which states textifically: "In the midst of all the technological advances we are currently

**156**

**Figure 4.**

The security of information is considered strategic and the main asset of public and private organizations. In this chapter, we consider the previous analyzes carried out by the authors in the area of information and communications technologies (ICT) and information security to determine the impact it has on the incorrect management of information. The weakness in the administration of information security is taken advantage of by all officials or workers at an operational, tactical, and strategic level of the public organizations of Ecuador to generate corruption such as incorrect identification of citizens, dead voters, embezzlement in public coffers, false titles especially acquired by the politicians, for all the aforementioned it is concluded that to avoid corruption in a country at

all levels the first matter that we are the inhabitants must be changed, laws with strong sanctions to the politicians without parliamentary immunity, application of information and communications technologies (ICT) in suitable form, to fulfill international standards in administration of security of the information like ISO 27001, Cobit 5.0, definition of profiles for the selection of information and communications technologies (ICT) managers, directors or coordinators who are from the area of knowledge in undergraduate degrees, masters, and doctorates, complying with the provisions of SENESCYT and UNESCO. That planning organisms such as the National Secretariat of Planning and Development-Ecuador (Senplades) and the Ministry of Labor Relations consider the position of manager, director, general coordinator of information and communications technologies (ICT) at the same level as the main authority of the Public Organization, Change of culture in the directive civil servants who must consider that the information and communications technologies (ICT) are those that a public organization must govern to be competitive.

To improve the security of information, administrative policies must be changed in information security, using technologies related to immutable security algorithms, Ledger, Hyperledger, etc..
