Implementación de un modelo de la seguridad de la información basados en ITIL v3 para una Pyme de TI
Microsoft Word 2007
Cast your vote
You can rate an item by clicking the amount of stars they wish to award to this item.
When enough users have cast their vote on this item, the average rating will also be shown.
Your vote was cast
Thank you for your feedback
Thank you for your feedback
KeywordsSeguridad de la información
Sistemas de información administrativa
Tecnología de la información
Pequeñas y medianas empresas
Ingeniería de Sistemas de Información
MetadataShow full item record
AbstractThe purpose of this project is to propose a model for the Management of Information Security by applying ITIL v3, to be implemented in the Small and Medium Enterprises, as in any organization is necessary to minimize the risks and threats that arise. To achieve this, it is essential to have adequate safety management to ensure business continuity. In this situation, the Project Management Information Security for Small Business IT, which has the following phases, arises: The relevant research in the corresponding information security under ITIL V3, which is the framework that is used during the development of the project. The research covers process groups that are applicable for small and medium enterprises. In addition, analysis of the current state of an SME IT in order to model and implement processes Management Information Security based on ITIL V3 applicable to these businesses was obtained. It should be noted that ITIL V3 and best practices are applicable to any organization of different economic activity. In the second phase of the project, a pilot was deployed in a free software tool which supports the processes, controls that are defined for the company. To implement taken to the virtual company UPC: IT-Expert and IT services it manages as part of its processes. Finally, the project aims to define the management processes of information security in SMEs based IT ITIL V3. In the case of the virtual enterprise: IT-Expert by the management model of information security developed, the standard of quality and operability of IT services within the company improved.
Showing items related by title, author, creator and subject.
Implementación del modelo de gestión de continuidad de servicios ti basado en Itil v3Díaz Amaya, Edgar; Kong Ramos, Carlos Jesús Fernando; Egúsquiza Cáceres, Hernán Favio (Universidad Peruana de Ciencias Aplicadas (UPC), 2017-12-01)The main objective of the project is to implement a IT Service Continuity Management model, based on good practices of ITIL V3, in the IT Expert company. The proposed model helps the company to recover the continuity of its IT services in the event of a disaster that affects their continuity. For the development of the project, an investigation was carried out on the management of IT services using as a guide the good practices detailed in ITIL V3 and its numerous success stories around the world. As well as, the use of SCAMPI-C to take control of the numerous work products elaborated in the model implemented. In the first part of the project, the information gathering and elaboration of the processes that IT Expert manages to offer its services to the projects of the other virtual companies is carried out. In addition, all the business analysis is made it use the good practices of ITIL for the realization of the assets of Continuity Management. In the second part of the project, the continuity management model is implemented along with the development of the indicators and pilot tests of the disaster recovery plans are carried out; for these tests, controlled simulations of disasters were carried out. For this project, the following deliverables are considered: a continuity management model for IT services based on the services provided by IT Expert and an article on its implementation.Acceso abierto
Wearable ComputingPérez Pichis, Roy; Gómez Junco, Miluska Alicia; Venegas Ataca, Alessandra Amparo (Universidad Peruana de Ciencias Aplicadas (UPC), 2018-07-01)El proyecto de tesis consiste en la propuesta de una arquitectura lógica y una física que cubre los cinco alcances de Quantified Self y es utilizada como base en el desarrollo de soluciones enfocadas en la medición de parámetros fisiológicos del cuerpo humano soportada por dispositivos Wearable. Las arquitecturas están sustentadas en el análisis de la tecnología wearable, los rubros de negocio en los que se aplica e impacto de dispositivos Wearable, Smartphone, Cloud en la implementación de soluciones que utilizadas en los alcances de Quantified Self. La propuesta consta de las arquitecturas lógica y física que cubre los alcances de Quantified Self: "Physical activity & sports", "Food & Drinks", "Sleep & rest", “Stress” y "Social Interaction". La arquitectura física representa la comunicación y dependencia entre hardware y software, mientras la arquitectura lógica representa la relación entre componentes software de una solución Quantified Self. La necesidad por la cual nace el proyecto es que las arquitecturas lógica y física existentes para implementar una solución que utilice la Tecnología Wearable para la medición de parámetros fisiológicos del cuerpo humano no cubren todos los alcances definidos por Quantified Self. El proyecto plantea una cartera de propuestas de proyectos de implementación de soluciones Quantified Self soportadas por dispositivos wearable utilizando como base las arquitecturas propuestas para su desarrollo, estos proyectos tienen como fin ayudar a combatir problemas sociales como el bullying y las consecuencias provocadas por persona que son susceptibles a desmayarse con facilidad.Acceso abierto
Implementación de la gestión de configuración para la empresa virtual It Expert basado en Itil V3Conislla Murguia, Fernando; Durand Peña, Marcos (Universidad Peruana de Ciencias Aplicadas (UPC), 2016-10-01)The IT Expert Company lacks an optimal process configuration that meets the needs of the company and with the control of the life-cycle of IT assets. For this reason, the project Implementation of Configuration Management for the company IT Expert based on ITIL v3, aims to optimize the configuration process existing in the company, also to plan and control adequately the needs of configuration. In this way, it ensures the availability of all the services provided by the company, so the project is responsible for minimizing the risks with the proposal of a new design processes and a new model data that allows to manage optimally and aligned to good practices in the configurations of the assets of the company. The lack of a proper management of the configuration may have as a result services are vulnerable or not aligned to the needs of the enterprise, causing the breakdown of these. For a proper configuration management and in order to benefit the business, there are good practices that help optimize the configuration process, such as is the case with ITIL v3. ITIL provides a set of good practices to follow and implement, a CMBD that supports the rapid and integrated response of all components of the infrastructure of the company. To follow these good practices, the organization could be more efficient and agile with respect to the configurations that are required to implement in the company. To apply the guide to good practices recommended by ITIL v3, in the process of configuration management, it is necessary to redesign the procedures AS-IS configuration of the IT Expert Company. In addition, the completion of the documentation and processes is an important aspect for keeping the balance between the execution of the configuration and delivery of the service, in order not to affect the users. When the configuration process of ITIL is running interacts with other processes, which are part of this guide of good practices, such as; change management, problem management and incident management. All the processes mentioned above are part of a good configuration management for IT services, as they help to support and ensure the quality of all the services.Acceso abierto