Extensión Cañar - Ingeniería de Sistemas
URI permanente para esta colecciónhttps://dspace.ucacue.edu.ec/handle/ucacue/12706
Examinar
Envíos recientes
Ítem Embargo Modelo de madurez de los sistemas de información para la Cooperativa Yuyay Limitada del cantón Cañar, mediante COBIT 2019(Universidad Católica de Cuenca campus Cañar, 2024) Palchizaca Chimborazo, Rosa Alexandra; Flores Urgilés, Cristhian Humberto; 035016990-0This degree work aims to develop a model of maturity of information systems for the Cooperativa Yuyay Ltda., of the Cañar canton, based on the framework of COBIT 2019. Through this model, it seeks to evaluate and improve IT management, aligning its processes with the strategic objectives of the cooperative. The specific objectives include conducting a theoretical study on maturity models and COBIT 2019, evaluating the current maturity level of the cooperative's information systems, and designing a maturity model adapted to its needs and requirements. The methodology used in the study is quantitative and descriptive approach. Surveys were applied to IT staff, and a documentary review was conducted to analyze the current processes of the cooperative in terms of information technology. Subsequently, the results were evaluated using the practices recommended by COBIT 2019. The implementation of this model will improve operational efficiency, information security, and regulatory compliance, contributing to the sustainable and competitive development of the cooperative. Keywords: maturity model, COBIT 2019, IT management, systems.Ítem Acceso Abierto Propuesta de un modelo de Gobierno de TI para la gestión estratégica de las cooperativas de ahorro y crédito del cantón Cañar, basado en Cobit 5(Universidad Católica de Cuenca campus Cañar, 2023) Lema Mullo, Johnson Neptali; Flores Urgiles, Cristhian Humberto; 0606223824The entitled thesis "PROPOSAL OF AN IT GOVERNANCE MODEL FOR THE STRATEGIC MANAGEMENT OF THE SAVINGS AND CREDIT COOPERATIVES OF CAÑAR CANTON, BASED ON COBIT 5" focuses on the need to establish an IT governance model for the savings and credit cooperatives of Cañar Canton. For this purpose, it focuses on meeting three key objectives: A) To conduct an exhaustive technical study on the domains, processes, and application of the COBIT 5 reference framework in the area of IT governance. COBIT 5 is an international framework of best practices used to manage and govern information technology effectively and aligned with the strategic objectives of an organization. B) To analyze the current state of the crucial business processes related to the IT department in financial institutions. This analysis made it possible to identify areas for improvement and existing gaps in IT management in these cooperatives. C) To build an IT governance model based on COBIT 5 specifically designed for financial institutions. The proposed COBIT 5-based IT governance model provides the necessary tools to achieve this improvement, and ensure adequate control of technical resources, operational efficiency and adaptability to change, all concerning international standards of good IT practices. Keywords: COBIT 5, IT governance, strategic management.Ítem Acceso Abierto Auditoría de la seguridad física y lógica de los servicios tecnológicos en el Gadipcs Suscal, usando como referencia la norma ISO/IEC 27002:2016(Universidad Católica de Cuenca campus Cañar, 2023) Zamora Pomaquiza, Diana Jakeline; Andrade Cárdenas, Danny Patricio; 030286774-2As part of the project, it is proposed to conduct a security audit covering both physical and logical aspects of the Autonomous Decentralized Intercultural and Participative Decentralized Government of the Suscal canton (GADIPCS by its Spanish acronym) technological systems. The primary purpose is to identify vulnerabilities that compromise the robustness of institutional technological services. The project began by establishing a theoretical framework with the items related to the research topic. Subsequently, the audit phases were defined and executed. In order to diagnose the current security posture of the municipality, an interview and a compliance test (Checklist) aligned to the ISO 27002 standard were applied. The checklist was used to assess adherence to security controls or policies. Based on the checklist, a risk matrix was developed to discern the levels of exposure resulting from the lack of implementation of specific controls. At the end of the assessment, an evaluation report was generated, specifying the observations identified and their corresponding suggestions for improvement. Keywords: ISO 27002 standard, risk matrix, security audit, vulnerabilities, audit phases.Ítem Acceso Abierto Desarrollo de un modelo de transformación digital para la Empresa Pública Municipal Mancomunada de aseo integral del Pueblo Cañarí Emmaipc-Ep del cantón Cañar(Universidad Católica de Cuenca campus Cañar, 2023) Pomavilla Zhinin, Luis Abrahan; Pinos Castillo, Luis Fernando; 0302233044Digital transformation is presented as an imperative to optimize the operational efficiency of organizations. In the case of EMMAIPC-EP, although there is a clear commitment to technological management, there are still significant challenges to face for its full digitization. Based on a survey, key departments, such as Management and Human Talent, were identified that would benefit from digitalized processes. The relationship with the customer and technological obsolescence are critical areas to address. However, the biggest challenge lies in data management and security. Through the SWOT analysis and the model of David L. Rogert, recommendations were proposed, focusing on training, technological updating, data management, process efficiency, organizational change, etc. These measures aim to strengthen the competitiveness and efficiency of EMMAIPC-EP on its journey towards digitization. Keywords: EMMAIPC-EP, SWOT, Digitization, Processes, CompetitivenessÍtem Acceso Abierto Planificación estratégica “PETI” para la Cooperativa de Ahorro y Crédito “Achik Inty” Ltda.(Universidad Católica de Cuenca campus Cañar, 2023) Tenelema Ganzhi, Carlos Geovanny; Pinos Castillo, Luis Fernando; 0302732243The purpose of this research project is to carry out an IT Strategic Plan for the "ACHIK INTY" Savings and Credit Cooperative, with the main objective of developing a strategic plan that guides the investment, implementation, and management of the cooperative's IT infrastructure and services, aligning them with the strategic objectives and needs of the organization. The research methodology is detailed in-depth, addressing aspects such as approach, level of research, and sources of information. The IT Strategic Plan proposal for ACHIK INTY Cooperative was developed in four phases, starting with an analysis of the current situation of the IT department. This included an assessment of the inventory of IT resources, the existing technology infrastructure, and a review of available institutional documentation. These steps will provide a solid foundation for formulating Information Technology (IT) strategies. A detailed schedule was designed to implement these IT strategies, detailing the activities to be developed, the estimated time for execution, the associated costs, and the risks inherent to each activity, thus developing a plan to manage and mitigate these risks effectively. Keywords: IT Strategic Plan, information technologies, IT strategyÍtem Acceso Abierto Propuesta de un modelo de madurez de ciberseguridad para Ecuador(Universidad Católica de Cuenca campus Cañar, 2023) Verdugo Crespo, Gerson Leonardo; Flores Urgiles, Cristhian Humberto; 0303016851ABSTRACT The purpose of this article is to propose a cybersecurity maturity model adapted to the needs and characteristics of Ecuador, which will allow the evaluation and improvement of cybersecurity capacity in organizations, government agencies and critical infrastructures in the country. The Model is called Cybersecurity Maturity Model of Ecuador (CMME), and the main objectives are; Develop a cybersecurity maturity model, with a proposal for the Ecuadorian State, determining its domains, maturity levels, functions and categories based on recognized standards and reference frameworks, which when applied allows establishing and evaluating cybersecurity in the country , a survey of documentary information will be carried out on the models and reference frameworks that will allow establishing the steps that must be followed for its preparation. In addition to developing a reference framework for future projects on cybersecurity maturity models for nations. To propose the following model, the ISO 27001 standard and three fundamental cybersecurity frameworks were studied, such as: CMM (Cybersecurity Capacity Maturity Model for Nations), C2M2 (Cybersecurity Capacity Maturity Model for Organizations), and NIST CSF (National Institute of Standards). and Technology) (Cybersecurity Framework), to which two types of comparative analysis were carried out to obtain the phases presented below, and evaluation of cybersecurity capabilities in Ecuador. Following the phases proposed in this article, it was possible to develop three of the six planned, which are: Analysis of the Ecuadorian Context, Definition of Objectives and Development of the Model, the three missing ones were not developed since being a proposal it cannot be test, implement, evaluate and therefore improve. In conclusion, it was possible to develop a cybersecurity maturity model, with its domains and subdomains, establish the maturity levels, functions and category that will serve as a reference when evaluating Ecuador's cybersecurity capacity, in addition to serving as a guide for the development of other cybersecurity frameworks for nations. KEYWORDS Cybersecurity, Maturity Model, Ecuador, Technology, CMM, C2M2, NIST CSF.Ítem Acceso Abierto Propuesta de un plan estratégico de tecnologías de la información para la gestión de TI de la Emmaipc-ep del cantón Cañar(Universidad Católica de Cuenca campus Cañar, 2023) Mullo Guacho, Jessica Marcela; Flores Urgilés, Cristina Mariuxi; 0605734243Strategic information technology planning establishes action strategies to use technology as a competitive advantage in the marketplace. The proposed thesis project focuses on several crucial strategic objectives, such as modernization of technology infrastructure, cybersecurity and data protection, ongoing innovation, and digital transformation, to make a Empresa Mancomunada de Aseo Integral a technological entity at the forefront of innovation. Considering several technological methodologies used in the industry to analyze this project with the stakeholders of the EMMAIPC-EP (Municipal Public Company for the Integral Sanitation of the Cañari Town) company, it was decided to select the Information Technology Strategic Planning (PETI by its Spanish acronym) methodology and create the plan based on previous evaluations where the information technology (IT) area is prioritized. Seeking to maximize the technology’s benefits and improve the user experience while aligning the technology function with the organization’s strategy policies. Therefore, this technological proposal defines the essential services and applications for the company, as well as the skills and resources needed to foster behaviors that may be valuable in the future. In addition, it aims to achieve the implementation of asset management systems that optimize the maintenance of the public area of workers, as well as the network of a computer security team that monitors cyber threats, proposals for firewall systems to protect the company's network against external attacks and active participation in the industry with technological perspectives. Keywords: PETI, ITIL (Information Technology Infrastructure Library), IT.Ítem Acceso Abierto Propuesta de manual de política de seguridad de la información para la Cooperativa de Ahorro y Crédito Achik Inti Ltda, del cantón Cañar(Universidad Católica de Cuenca campus Cañar, 2023) Bermejo Pichasaca, Segundo Francisco; Flores Urgiles, Cristhian Humberto; 0350152690Achik Inti Savings and Credit Cooperative has played a key role in providing financial solutions throughout the Cañar canton and has proactively adapted to emerging competencies and the implementation of innovative projects. However, the lack of IT security protocols in the entity poses challenges, making it susceptible to unauthorized interventions. This project is oriented to the elaboration of an "IT SECURITY STANDARDS SCHEME FOR THE COOPERATIVE OF SAVINGS AND CREDIT ACHIK INTI LTDA, IN THE CANTON CAÑAR". To strengthen the structure of this research, the guidelines of ISO 27001:2013 and the recommendations of ISO 27002 were used. These frameworks were used to define and implement measures to ensure the confidentiality of information. A threat assessment was carried out using the MAGERIT methodology, which made it possible to detect and assess the assets in the Information and Communication Technologies (ICT) department. After this assessment, the technological risks associated with vulnerabilities were identified and the necessary controls to mitigate them were determined. Keywords: technological risks, MAGERIT, ICT, ISO 27001Ítem Acceso Abierto Análisis del nivel de cumplimiento de las políticas de seguridad de la información de los Gad’s cantonales Cañar, El Tambo y Suscal(Universidad Católica de Cuenca campus Cañar, 2023) Zhao Yuquipa, Claudio Xavier; Flores Urgiles, Cristhian Humberto; 0302602222The purpose of this research is to assess the extent to which information security policies are implemented in the Cantonal GADs (Decentralized Autonomous Governments) of Cañar. The focus of this study is quantitative, descriptive, and explanatory. For the evaluation, the ISO 27001:2013 standard and the ISO 27002 best practices guide are applied, allowing the assessment of each domain and control objective. The theoretical framework is established through the analysis of documents related to the Information Security Management System (ISMS), ISO 27000, the Data Protection Law, the computer security regulations for public entities in Ecuador, and the information security guidelines issued by regulatory entities.To understand the current condition of the GAD's, an investigation was carried out through a survey of administrators in the information technology departments, obtaining the following results: 2 domains with high risk, 10 with medium risk, and 2 with low risk. Keywords: ISO, SGSI, GAD's, Data, Domains.Ítem Acceso Abierto Análisis de riesgos y amenazas de ciberseguridad en el estado ecuatoriano, utilizando la metodología Magerit(Universidad Católica de Cuenca campus Cañar, 2023) Guamán Guamán, José Manuel; Carrillo Zenteno, José Antonio; 0302382361The Ecuadorian state, due to its size, economic relevance, and vast amount of confidential information, has become an attractive target for cyber attackers. This has led to the conduct of a study focused on the analysis of cybersecurity risks and threats to the country's assets. The proposed objectives were: a) To carry out an analysis of risks and threats of cybersecurity in the Ecuadorian state, to determine the vulnerabilities to which the country is exposed, b) To conduct a theoretical study on the methodologies of analysis and risk management that can be applied to countries, c) To carry out a survey of critical information assets belonging to the Ecuadorian State, d) To analyze the risks, determine vulnerabilities, and threats of cybersecurity for the critical assets of the Ecuadorian state using the Magerit methodology. The MAGERIT methodology was applied to identify and categorize threats, vulnerabilities, and risks, classifying critical assets into areas such as government, health, and energy, and threats according to their origin, such as user errors, technical failures, deliberate attacks, and natural disasters. The study evaluated the potential impact of each threat in terms of confidentiality, integrity, and availability, and estimated the likelihood of occurrence, thus calculating the risk level to prioritize mitigation actions. The results revealed that the assets with the highest risks are the personal and financial data of citizens, medical records, and confidential governmental information. Keywords: cybersecurity, Magerit methodology, critical infrastructure, Ecuador.Ítem Acceso Abierto Guía de prevención de riesgos de ciberseguridad derivado del uso del internet y las redes sociales en niños y adolescentes del cantón Cañar(Universidad Católica de Cuenca campus Cañar, 2023) Narváez Ochoa, Fernanda Michaelle; Flores Urgilés, Cristhian Humberto; 0302358601Access to the internet and social platforms has significantly increased among young people and children worldwide, mainly using smartphones and other portable devices. However, this access is not exempt from dangers, such as inappropriate content, cyberbullying, blackmail, among others. This document proposes the development of a cybersecurity prevention guide for minors in the Cañar canton. As part of this process, a survey was conducted on digital security and its impact on the children in various schools of the urban center of the Cañar canton. Subsequently, a risk assessment was carried out using the MAGERIT methodology, following each phase to determine the most critical aspects in terms of privacy and security for young people, in addition to identifying the main vulnerabilities and threats they face on a daily basis. The findings showed that these young people are highly susceptible to the risks of the web and social networks. Based on this, a cybersecurity prevention handbook was designed for parents and education professionals to enable children and adolescents to develop skills and knowledge to navigate safely. Keywords: cybersecurity, MAGERIT methodology, digital threats, social networks.Ítem Acceso Abierto Diagnóstivo y línea base de los activos de la información e infraestructura crítica para la gestión de ciber seguridad del estado ecuatoriano, utilizando CSF NIST(Universidad Católica de Cuenca campus Cañar, 2023) Criollo Neira, Evelin Giomara; Flores Urgiles, Cristhian Humberto; 0302420815This study provides a comprehensive overview of the current state of cybersecurity in the country, clearly identifying its strengths, weaknesses, and areas for improvement. It offers a valuable baseline for future evaluations and for informing the development of strategies in this area. To this end, the following objectives were achieved: a) Conduct a diagnosis and establish a baseline of Ecuador's state cybersecurity information assets and critical infrastructure, b) Collect information on Ecuador's critical cybersecurity information assets and infrastructure, c) Conduct a thorough assessment of the current situation of identified information assets and critical infrastructures. A qualitative approach has been used through a literature review to establish the context and current situation. Ecuador's critical infrastructure has been classified into 7 sectors: water, electricity, health, military, telecommunications, oil, and gas. The study also evaluates Ecuador's cybersecurity maturity using the CMM model, mainly placing it in the initial stages of "formative" and "implemented. Keywords: critical infrastructures, baseline, information assets, cybersecurityÍtem Acceso Abierto Diseño de un plan de continuidad de negocio para la Cooperativa de ahorro y crédito Achik Inti Ltda(Universidad Católica de Cuenca campus Cañar, 2023) Loja Mayancela, Angelica Maria; Flores Urgiles, Cristhian Humberto; 0350164018Regardless of its field of operation, every organization is subject to calamities or incidents that could disrupt its normal operations. To avoid these problems, it is crucial to establish business continuity plans that enable it to act and resume business operations after incidents or emergencies. Within this framework, the present investigation proposes an elaboration of a "Business Continuity Plan (BCP) for the Achik Inti Savings and Credit Cooperative" with a technical and strategic approach to ensure the operational continuity and resilience of the organization. The study’s first and second chapters analyze the existing literature on business continuity planning, best practices in the credit union industry, and international standards in this field. The third chapter contains a detailed analysis of Savings and Credit Cooperative “Achik Inti Ltda.,” its daily operations, infrastructure, staff, financial services, and the risks associated with each aspect. It also includes the selection of the ISO 22301 standard for the preparation of the BCP and the MAGERIT methodology for risk analysis and management. The business continuity plan is developed in the fourth chapter of the investigation. This includes identifying critical business functions, the resources needed to maintain them, and strategies to recover them after an outage. Keywords: Business Continuity Plan, Savings and Credit Cooperative, ISO 22301 Standard, MAGERIT Methodology, BCP.Ítem Acceso Abierto Gestión de servicios de TI usando las prácticas de ITIL V4 para la empresa Millenium Connection(Universidad Católica de Cuenca campus Cañar, 2023) Yupa Yupa, Edwin Alfredo; Flores Urgiles, Cristhian Humberto; 0302856802The research paper entitled " Gestión de Servicios de TI usando las prácticas de ITIL V4 para la Empresa Millenium Connection" [IT Service Management using the ITIL V4 practices for the Millenium Connection Company] focuses on the growing importance of Information Technology (IT) management in modern organizations. Initially, it highlights how IT management —at one time considered relevant only for large companies— has become essential for all-sized organizations nowadays. The main objective of the project is to develop an IT service management model based on the best practices of ITIL V4, specifically for the ‘Millenium Connection’ company. Throughout the work, topics addressed include theoretical framework, IT strategic planning, research methodology, and the design of an interview. Moreover, a service management proposal based on ITIL 4 adapted to the company’s needs is presented. This project aims to provide the company with a solid base to optimize its IT services, improve operational efficiency and customer satisfaction, and maintain competitiveness in a business environment propelled by constantly changing technology. Keywords: ITIL, IT, service management, management model.Ítem Acceso Abierto Pronóstico de migración humana del Ecuador, utilizando modelos de series temporales(Universidad Católica de Cuenca campus Cañar, 2023) Andrade Guallpa, Cristian Andrés; Flores Urgilés, Cristina Mariuxi; 030279200-7The article presents a study to generate forecasts on human migration in Ecuador using time series techniques. The objectives set out were a) To forecast human migration in Ecuador using time series models, b) To conduct a state-of-the-art study and literature review on data mining and machine learning methodologies, c) To evaluate and compare different time series models using precision and performance measures, aiming to select the model that offers the best predictions for future human migration in Ecuador d) To forecast migration in Ecuador using time series models. Initially, the context of migration in Ecuador is presented, which has been affected in recent years by several factors such as earthquakes, changes in government, and the COVID-19 pandemic. The article then delves into theoretical concepts related to time series, components of a time series (trend, seasonality, cycles), and forecasting methods like ARIMA and regression models. The study applies the CRISP-DM methodology using migration data from the National Institute of Statistics and Censuses of Ecuador between 2019-2022. Two models were applied: linear regression and seasonal ARIMA. The results show that the linear regression model had a lower prediction error, so it was chosen as the definitive model. The article concludes that time series models are a valuable tool for making forecasts on social topics such as migration. Key words: migration, prognosis, CRISP-DM, ARIMAÍtem Acceso Abierto Analítica descriptiva para la comprensión del estado actual del fenómeno delincuencial en el Ecuador(Universidad Católica de Cuenca campus Cañar, 2023) Yupa Morocho, Alex Juan; Flores Urgiles, Cristhian Humberto; 0350031035This study carries out a practical application of data analysis techniques to generate intelligence that supports informed decision-making on public safety and crime prevention in Ecuador. The stated objectives were: a) To conduct a theoretical study on descriptive analytics and its related concepts, b) To analyze the INEC database related to crime in Ecuador, c) To develop descriptive analytics models that allow the analysis of the crime phenomenon in Ecuador. The study applies the agile MAMBO methodology for the analytical processing of a dataset on arrests and police apprehensions in Ecuador. It uses 79,609 records with 23 fields covering demographic, geographic, and types of crime information. The inductive approach enables insights generation from the data to support decision-making in citizen security. Techniques include descriptive statistics, data visualization, ARIMA time series modeling, and aggregation algorithms. Data cleaning, integration, and transformation are applied; then, dashboards with indicators about the demographic profile of offenders, geographic comparisons, temporal evolution, and patterns by hours are generated. The results reveal a predominance of young repeat male offenders. Guayas, Pichincha, and Manabí have the highest criminal activity, identifying crime peaks during nighttime. A trend forecasting model is also constructed, suggesting stability with slight fluctuations. Thus, the study demonstrates the value of Big Data analytics in comprehensively characterizing the crime phenomenon Keywords: descriptive analytics, crime, MAMBO.Ítem Acceso Abierto Análisis y diseño de un aplicativo móvil, con la utilización de un Framework multiplataforma, para registro de incidentes para la empresa Fibermedia Telecomunicaciones(Universidad Católica de Cuenca campus Cañar, Enfermería, 2023) Cela Lazo, Franklin Oswaldo; Pinos Castillo, Luis Fernando; 030264811-8The project focuses on the analysis and design of a multiplatform mobile application for incident logging for the company Fiber Media Telecomunicaciones. A comparative analysis of multiplatform frameworks shows that Flutter is the most suitable option for developing mobile applications due to its performance, ease of learning, and multiplatform support advantages. Similarly, when comparing different agile methodologies, Mobile-D was the most suitable option for the project. This is due to its capacity to facilitate agile deliveries of functional prototypes and its adequate adaptation to the development of mobile applications. Its iterative and incremental approach played an effective role in guiding the design of the application effectively. The preliminary design of the application, following the Mobile-D methodology, successfully confirmed the adequate coverage of the initial requirements. This evidences the mobile application’s effectiveness, which allows user registration and authentication, incident logging, map location, incident assignment, and tracking. Keywords: Framework, Flutter, Mobile D, Incidents, mobile application.Ítem Acceso Abierto Metodología Steam como herramienta para mejorar el pensamiento lógico y matemático en estudiantes de séptimo año EGB de la UECIB Suscal(Universidad Católica de Cuenca campus Cañar, Enfermería, 2023) Angamarca Andrade , Erik Israel; Flores Urgiles, Cristhian Humberto; 0302169941The purpose of this research is to determine the feasibility of improving logical-mathematical reasoning in children from seventh grade EGB of UECIB "Suscal" through the implementation of the STEAM methodology in the classroom. A mixed research approach with a descriptive emphasis was adopted. For the evaluation, the STEAM methodology was used, which integrates various disciplines and enhances critical thinking and creativity. The Wechsler Intelligence Test (WISC) was also used, focusing on the "Matrix Design" subtest that measures non-verbal reasoning, essential for children's academic and social development. The theoretical foundation specifically addressed topics related to computational thinking, logical-mathematical reasoning, and methodologies, etc. To determine the effectiveness of implementing this method, a course was conducted using technological tools like Scratch as the essential element of the STEAM method, which helped strengthen logical-mathematical thinking through practical activities. The most notable finding was a moderate increase in logical reasoning and perceptual skills, achieving a higher average than the initial evaluation. Keywords: STEAM, SCRATCH, Wechsler (WISC), UECIBÍtem Acceso Abierto Modelo de madurez de ciberseguridad para infraestructuras criticas caso de estudio: Ecuador(Universidad Católica de Cuenca campus Cañar, Enfermería, 2023) Lopez Loja, Carlos Patricio; Carrrillo Zenteno, Jose Antoni; 0303016851In the digital age, critical infrastructure, financial systems, and even national security are at risk from cyberattacks, so countries must adopt a comprehensive approach to protect themselves from the growing threat of these. Therefore, this study proposes a cybersecurity maturity model focused on critical infrastructures for the Ecuadorian state called ECU-C2M2, based on the Cybersecurity Capability Maturity Model (C2M2). The objectives set to carry out this research were: a) Carry out a theoretical study on the different maturity models for Critical Infrastructures, b) Carry out an information survey based on the existing information from government pages, c) Propose a cybersecurity maturity model for Critical Infrastructures. For the creation of the model, a comparative analysis of existing cybersecurity maturity models was carried out, as well as checking their domains and subdomains. The study also presents an analysis of cybersecurity in Ecuador, with the aim that the proposed model is aligned with the country's needs and allows collaboration and cooperation between different entities, both governmental and private sector. Keywords: ECU-C2M2, cybersecurity, critical infrastructuresÍtem Acceso Abierto Desarrollo de sistema de información web para la gestión de frecuencias de turnos de la cooperativa Rutas Cañaris(Universidad Católica de Cuenca campus Cañar, Enfermería, 2023) Cuesta Falconi, Bryan Fabian; Pinos Castillo, Luis Fernando; 0302548565The purpose of this article is to develop a Web System for the Management of Shift Frequencies of the Cañaris Routes cooperative, with the goal of presenting an adaptable and secure system that meets the needs of the cooperative. For this, the Adaptive Software Development (ASD) methodology was used, which enables to confront changes and make necessary adjustments in the process. Java, SQL server, and Bootstrap are among the tools used. In conclusion, using the previously mentioned tools and methodologies has been fundamental to developing an efficient and secure computer system for the management of the cooperative. The combination of Java, Bootstrap, the TDE procedure, and the SQL Server database has provided a complete and effective solution to address the specific requirements of the cooperative. Implementing the ASD methodology has permitted proximate collaboration and optimal adaptability throughout the development process. Likewise, using Azure DB for the cloud database has ensured a safe and expandable management of the cooperative's data. Overall, these choices have led to the project’s success and have significantly improved the cooperative’s management. Keywords: Web System, Adaptable Software Development, SQL Server