Analysis of a comprehensive security system for risk prevention: Cellshop company case study
Abstract
This article presents the final product of the thesis entitled “Analysis and Evaluation of a Comprehensive Security System for Risk Prevention at Cellshop,” whose objective was to analyze and evaluate the implementation of a comprehensive security system focused on risk prevention at Cellshop, a company dedicated to the sale and management of high-value technological devices in the city of Guayaquil. The research arose from the need to strengthen the physical and digital security of the main warehouse, where vulnerabilities related to access control, monitoring, event traceability, and incident management were identified, affecting operational continuity and the protection of company assets. The methodology employed was a mixed-methods approach, both descriptive and applied, developed as a case study. Techniques such as direct observation, interviews, document review, and checklists based on the international standards ISO 31000 and ISO/IEC 27001 were used, allowing for the diagnosis of the risk level and the design of an integrated technological solution. The proposal includes the implementation of IP video surveillance cameras, biometric access control, electromagnetic locks, and a centralized monitoring system, managed according to PMBOK and ITIL best practices. The results demonstrate significant improvements in access control, a reduction in incidents, optimized response times, and strengthened operational traceability. It is concluded that a comprehensive security system mitigates risks, improves efficiency, and reinforces business sustainability.
Downloads
References
Adrián, T. B. (06 de 2025). Ecuador : https://repositorio.ug.edu.ec/handle/redug/81408.
Beltrán Tomalá, W. S. (2024). Efectos de la inseguridad en el desarrollo económico de las PYMES de Guayaquil. Efectos de la inseguridad en el desarrollo económico de las PYMES de Guayaquil. http://dspace.ups.edu.ec/handle/123456789/27530.
Cajamarca Sari, M. V. (2022). Diseño, desarrollo e implementación de una bodega inteligente en Ecuador. Repositorio Institucional UPS.
Cajamarca Sari, M. V. (Enero de 2022). Diseño, desarrollo e implementación de una bodega inteligente en la nube, utilizando tecnología de código de barras para la empresa Balnearios Durán. Cuenca, Ecuador: http://dspace.ups.edu.ec/handle/123456789/21597.
eólica, A. e. (28 de 05 de 2025). Asociación empresarial eólica . Obtenido de https://aeeolica.org/la-videovigilancia-con-ia-que-reduce-en-un-998-las-falsas-alarmas/?utm_source=
Fuentes Quichimbo, D. A. (2018). Repositorio Universidad de Guayaquil . Obtenido de http://repositorio.ug.edu.ec/handle/redug/27532
Hopkin, P. (2018). Fundamentals of Risk Management: Understanding, Evaluating and Implementing Effective Risk Management. Londres: Kogan Page. Obtenido de https://www.koganpage.com/product/fundamentals-of-risk-management-9780749483077
International Organization for Standardization. (2019). ISO 22301:2019 Security and resilience — Business continuity management systems — Requirements. International Organization for Standardization, Ginebra. Obtenido de https://www.iso.org/standard/75106.html
Laudon, K. C. (2022). Management Information Systems: Managing the Digital Firm (17th ed.). Pearson Education. Obtenido de https://www.pearson.com/en-us/subject-catalog/p/management-information-systems-managing-the-digital-firm/P200000007462/9780137613759
Morocho, J. A. (2020). Modelo de gestión de riesgos basado en ISO 31000 para organizaciones tecnológicas.
Paredes, D. A. (2021). Implementación de un sistema integral de seguridad física y electrónica para una empresa logística. Repositorio ESPE.
PILAY, M. I. (2018). Repositorio Universidad de Guayaquil. Obtenido de https://repositorio.ug.edu.ec/bitstream/redug/37528/1/TESIS%20SERVARTU%20corregid%20...pdf
Ratcliffe, J. H. (2016). Intelligence-Led Policing (2 ed.). Nueva York: Routledge. Obtenido de https://www.routledge.com/Intelligence-Led-Policing/Ratcliffe/p/book/9781138859039
Standardization, I. O. (2018). ISO 31000. Obtenido de https://www.iso.org/standard/65694.html
Standardization, I. O. (2022). ISO/IEC 27001. Obtenido de https://www.iso.org/standard/27001
Tomalá Bajaña, K. A. (2025). Emulación de un Red Team con herramientas open source para evaluar la seguridad de la infraestructura de red de la empresa SOLINPRO S.A. Repositorio UG.
Von Solms, R. y. (2013). From information security to cyber security. 38, págs. 97–102. doi:10.1016/j.cose.2013.04.004
Whitman, M. E. (2021). Principles of Information Security. Boston: Cengage Learning. Obtenido de https://www.cengage.com/c/principles-of-information-security-6e-whitman/
Yin, R. K. (2018). Case Study Research and Applications: Design and Methods (6 ed.). Thousand Oaks, CA: Sage Publications.
Copyright (c) 2026 Fausto Raúl Orozco Lara,Ingrid Kathyuska Giraldo Martínez,Camilo Geampierre Peñafiel Olaya,Jefferson Alexander Rugel Cuadrado

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
