Abstract
The computer audits that are carried out in organizations with or without profit, public or private, must use an adequate methodology and according to their objectives to solve the different problems that arise. For this reason, in this work comparisons are made between the methodologies for Risk Analysis, Data Mining, Reference Frameworks - Standards and International Standardization Norms, with the purpose of obtaining results and specific cases that allow the selection of an appropriate methodology against the problem to be solved in the organizations, or against what the organization wants to obtain as a result. All that, through the help of techniques or quantitative and qualitative comparison methods, established in the second part of the investigation; this will depend on which methodology can stand out against another. In the comparative tables, general and specific characteristics were analyzed, finding in the first part, the affinity that the methodologies have compared to their general phases and, when analyzing the specific characteristics, information was obtained that allowed each methodology to be distinguished and, in this way, find the distinctive results for each methodology.
Publisher
Universidad Autonoma de Bucaramanga
Reference30 articles.
1. Alemán, H. (2015). Metodología para la implementación de un SGSI en la fundación universitaria Juan de Castellanos, bajo la norma ISO 27001:2005. Revista UNIR. https://www.unir.net/ingenieria/revista/auditoria-seguridad-informatica/
2. Alemán Novoa, H., & Rodríguez Barrera, C. (2015). Metodologías para el análisis de riesgos en los sgsi. Publicaciones e Investigación, 9, 73. https://doi.org/10.22490/25394088.1435
3. Arias & Caycedo Casas, X. (2017). Auditoría informática: un enfoque efectivo. Dominio de Las Ciencias, 3, 157–173. https://dialnet.unirioja.es/servlet/articulo?codigo=6102836
4. Arévalo, M., Cedillo, P., & Moscoso, S. (2017). Metodología Ágil para la Gestión de Riesgos Informáticos. Revista Killkana Técnica, 31–42. https://www.researchgate.net/publication/321176840_Metodologia_Agil_para_la_Gestion_de_Riesgos_Informaticos
5. Berger, D., Shashidhar, N., & Varol, C. (2020). Using ITIL 4 in Security Management. 8th International Symposium on Digital Forensics and Security (ISDFS).