Law, computing, and Corruption. An approach to the Ecuadorian reality.

  • Alberto Leonel Santillán Molina Universidad Regional Autónoma de los Andes
  • Nelly Valeria Vinueza Ochoa Universidad Regional Autónoma de los Andes
  • Cristian Fernando Benavides Salazar Universidad Regional Autónoma de los Andes
Keywords: Security in computer systems, acts of corruption, system administrator, hacking, computer crime

Abstract

Computer systems are specifically configured according to institutional needs; However, if the administrator exceeds the authorization granted by the owner by executing malicious acts that alter, manipulate or modify computer data, they incur acts of corruption sanctioned by law; therefore, the objective of the work consisted of explaining the importance of strengthening security measures, auditing and access control to automated information systems, which do not allow their violation, and preventing the execution of different illegal behaviors. Methods such as historical-logical, analytical-synthetic, and content analysis as a technique were used, justifying the need to secure computer systems with physical and logical security measures.

Published
2021-10-01