REVISTA DE LA UNIVERSIDAD DEL ZULIA. 3ª época. Año 12 N° 32, 2021
Gilberto Carrión-Barco et al. // Modelo de seguridad informática sobre un medio de conexión pública, 344-357
DOI: http://dx.doi.org/10.46925//rdluz.32.21
356
Deloitte. (2016). La Evolución de la Gestión de Ciber-Riesgos y Seguridad de la Información.
https://www2.deloitte.com/content/dam/Deloitte/pe/Documents/risk/Deloitte 2016 Cyber
Risk Information Security Study - Latinoamérica - Resultados Generales vf (Perú).pdf
Deshmukh, D., & Iyer, B. (2017). Design of IPSec virtual private network for remote access. 2017
International Conference on Computing, Communication and Automation (ICCCA), 716–719.
https://doi.org/10.1109/CCAA.2017.8229894
Esparza, D. E. I., Diaz, F. J., Echeverria, T. K. S., Hidrobo, S. R. A., Villavicencio, D. A. L., &
Ordonez, A. R. (2020). Information security issues in educational institutions. 2020 15th Iberian
Conference on Information Systems and Technologies (CISTI), June, 1–7.
https://doi.org/10.23919/CISTI49556.2020.9141014
Estatuto UNPRG. (2017). Estatuto Universidad Nacional Pedro Ruiz Gallo. In Universidad
Nacional Pedro Ruiz Gallo. Universidad Nacional Pedro Ruiz Gallo.
http://www.unprg.edu.pe/univ/portal/documentos_s/7. ESTATUTO ACTUALIZADO 2019 DE
LA UNPRG.pdf
Hashiyana, V., Haiduwa, T., Suresh, N., & Bratha, A. (2020). Design and Implementation of an
IPSec Virtual Private Network : A Case Study at the University of Namibia. 2020 IST-Africa
Conference (IST-Africa), 1–6.
https://www.researchgate.net/profile/Valerianus_Hashiyana/publication/344542951_Design_a
nd_Implementation_of_an_IPSec_Virtual_Private_Network_A_Case_Study_at_the_University_o
f_Namibia/links/5f7f097ba6fdccfd7b4f9bd2/Design-and-Implementation-of-an-IPSec-Virtual-
Private-Network-A-Case-Study-at-the-University-of-Namibia.pdf
Hernández-Sampieri, R., Fernández, C., & Baptista, P. (2018). Metodología de la Investigación.
In Mc Graw Hill (Sexta). Mc Graw Hill.
Jing, S., Qi, Q., Sun, R., & Li, Q. (2016). Study on VPN Solution Based on Multi-campus Network.
2016 8th International Conference on Information Technology in Medicine and Education
(ITME), 777–780. https://doi.org/10.1109/ITME.2016.0180
Joshi, C., & Singh, U. K. (2017). Information security risks management framework – A step
towards mitigating security risks in university network. Journal of Information Security and
Applications, 35, 128–137. https://doi.org/10.1016/j.jisa.2017.06.006
Li yong. (2015). Analysis of network connectivity probability on damage probability. 2015 IEEE
Advanced Information Technology, Electronic and Automation Control Conference (IAEAC),
1056–1059. https://doi.org/10.1109/IAEAC.2015.7428719
Ponemon Institute. (2018). 2018 State of Cybersecurity in Small & Medium Size Businesses.
November, 46. https://www.keepersecurity.com/assets/pdf/Keeper-2018-Ponemon-Report.pdf