TY - JOUR AU - Proaño, Rodrigo Arturo AU - Gavilanes Molina, Andrés Fernando PY - 2018/03/30 Y2 - 2024/03/29 TI - Strategy for responding to computer incidents of insecurity set in Ecuadorian law JF - Enfoque UTE JA - Enfoque UTE VL - 9 IS - 1 SE - DO - 10.29019/enfoqueute.v9n1.229 UR - https://ingenieria.ute.edu.ec/enfoqueute/index.php/revista/article/view/229 SP - pp. 90 -101 AB - <p>Assurance the security of information, information systems, services and networks implies socializing, also knowing how to respond to an event where such information security has been violated and how manage the identified digital evidence. The present paper is a solution, based on international standards and complying with the current Law of Ecuador. Digital evidence will be identified at the scene of a computer incident by the authorized persons. The authorization must indicate what motivates, authorizes and limits the identification of evidence. The phase of obtaining the digital evidence identified will depend on the established internal circumstances and policies. The preservation of the objective evidence is carried out through chain of custody, the verifiable, complete and reliable results are reported. The previously described strategy was applied as a case study to the incidents of violation of logical securities. The digital evidence found in the place was recognized, extracted, preserved and informed about. Throughout the process, the chain of custody was implemented, which assurance the integrity and reliability of the data. In each phase it was recorded as, when, where and who manipulated both digital signs and digital devices.</p> ER -