
17
Tecnológico Superior Corporativo Edwards Deming – July - December Vol. 8 - 2 - 2024 https://revista-edwardsdeming.com/index.php/es
e-ISSN: 2576-0971
López, 2010). Other authors define it as a discipline that, supported by the company's
internal and external policies and regulations, is responsible for safeguarding the integrity
and privacy of the information stored in a computer system. Its objective is to prevent
any type of threat, minimizing both physical and logical risks to which the information
may be exposed (Baca Urbina, 2017)however, despite the security precautions applied
to an information system, there is always a level of inherent risk (Aguilera López, 2010).
The author Aguilera in his book indicates that in order to establish a security system, it
is crucial to understand the following aspects (Aguilera López, 2010):
The composition of the elements that make up the system, obtained through interviews
with those responsible for the organization and direct observation.
Hazards that may affect the system whether accidental or intentional, revealed through
data provided by the organization and direct testing of the system.
The measures necessary to know, prevent, impede, reduce or control potential risks,
involving the decision on the services and security mechanisms that will minimize risks.
After conducting a risk study and implementing measures, it is essential to carry out
periodic monitoring to review and update the measures taken.
The researcher and author specialized in computer security considers that a system is
secure when it complies with the properties of integrity, confidentiality and availability
of information, each of which requires the implementation of specific security services
and mechanisms. (Aguilera López, 2010). However, the COBIT enterprise not only
considers the aforementioned properties, it also adds effectiveness, efficiency,
compliance with standards, and reliability (Baca Urbina, 2017).
The aspects that IT security must address can be categorized into three fundamental
areas: users, information and infrastructure. (Romero Castro et al., 2018).
Vulnerabilities refer to weaknesses in security systems or in those that the user employs
to carry out their activities, which could allow a threat to successfully cause problems
(Romero Castro et al., 2018)..
Today, the presence of both intentional and unintentional attacks is recognized, to which
a company is always exposed to varying degrees of vulnerability. When an IT security
vulnerability is identified, it is usually the result of a flaw in the design, implementation
or operation of the system (Baca Urbina, 2017).
A computer attack implies taking advantage of any vulnerability or failure in the software,
hardware or even in the people that make up a computer environment, with the aim of
obtaining a benefit, generally of an economic nature, and generating a negative impact on
the security of the system, directly affecting the assets of the organization. (Mieres,
2009).
Mieres in his research identifies five common stages of a computer attack when it is
executed: Phase 1 Reconnaissance, Phase 2 Scanning, Phase 3 Gaining Access, Phase 4
Maintaining Access, Phase 5 Covering Tracks.
The term "ethical hacking" was initially used by professionals for the purpose of
strengthening the security and reliability of systems. A person is designated as an ethical