Skip to main navigation menu Skip to main content Skip to site footer
Submitted January 30, 2023
Published 2023-01-31

Artículos

Vol. 2 No. 2 (2023): REICIT

Security of University Computer Systems: : Pending Challenges


Cover image

Citación:
DOI: ND

Published: 2023-01-31

How to Cite

Solís Tejedor, B. G., Valderrama Castrellón, H., Tejedor De León, E. and Vásquez de Ayala, D. (2023) “ Security of University Computer Systems: : Pending Challenges”, REICIT, 2(2), pp. 113–142. Available at: https://revistas.up.ac.pa/index.php/REICIT/article/view/3585 (Accessed: 18 August 2024).

Abstract

The objective of this article is to analyze the security challenges of university computer systems. Methodologically, this article is descriptive and documentary and was based on the drafting of a series of security challenges for university computer systems. For the development of this article, a search was carried out in the Google Scholar database, in addition, the "specific interval" filter was indicated in this search engine, which corresponded to the period between 2018 and 2022, ordered by relevance. Specified by search string, language, and document type were subsequently dropped, certain books.

Papers from a period of five years with respect to the date of completion of this research (2022) were included: journal articles (indexed), conference reports, book chapters, books and end-of-degree, master's and doctoral theses. The search was based on three criteria: title, abstract and keywords (the most used were: computer systems, university, computer security, computer security policies, among others). It is concluded that the security challenges of computer systems are: computer security management, establishment of computer security policies, application of standards, adoption of methodologies for the incorporation of computer security elements according to the university reality. , the establishment of legal frameworks, the establishment of a university government of technology, the training and training of collaborators, analysis of computer security vulnerabilities and finally, the need for the University to carry out external audits of its computer system.

Downloads

Download data is not yet available.

Most read articles by the same author(s)