Mostrar el registro sencillo del ítem
Methodology for Computer Security Incident Response Teams into IoT Strategy
dc.contributor.author | Enciso Bernal, Alejandro | |
dc.contributor.author | Martinez Monterrubio, Sergio Mauricio | |
dc.contributor.author | Parra Puente, Javier | |
dc.contributor.author | González-Crespo, Rubén | |
dc.contributor.author | Verdú, Elena | |
dc.date | 2021 | |
dc.date.accessioned | 2022-01-04T08:29:52Z | |
dc.date.available | 2022-01-04T08:29:52Z | |
dc.identifier.issn | 1976-7277 | |
dc.identifier.uri | https://reunir.unir.net/handle/123456789/12255 | |
dc.description.abstract | At present, the Colombian government shares information on threats or vulnerabilities in the area of cybersecurity and cyberdefense, from other government agencies or departments, on an ad-hoc basis but not in real time, with the surveillance entities of the Government of the Republic of Colombia such as the Joint Command of Cybernetic Operations (CCOCI) and the Cybernetic Emergencies Response Team of Colombia (ColCERT). This research presents the MS-CSIRT (Management System Computer Security Incident Response Teams) methodology, that is used to unify the guidelines of a CSIRT towards a joint communication command in cybersecurity for the surveillance of Information Technology (IT), Technological Operations (TO), Internet Connection Sharing (ICS) or Internet of Things (IoT) infrastructures. This methodology evaluates the level of maturity, by means of a roadmap, to establish a CSIRT as a reference framework for government entities and as a guide for the areas of information security, IT and TO to strengthen the growth of the industry 4.0. This allows the organizations to draw a line of cybersecurity policy with scope, objectives, controls, metrics, procedures and use cases for the correct coordination between ColCERT and CCOCI, as support entities in cybersecurity, and the different companies (ICS, IoT, gas and energy, mining, maritime, agroindustrial, among others) or government agencies that use this methodology. | es_ES |
dc.language.iso | eng | es_ES |
dc.publisher | KSII transactions on internet and information systems | es_ES |
dc.relation.ispartofseries | ;vol. 15, nº 5 | |
dc.relation.uri | http://itiis.org/digital-library/24651 | es_ES |
dc.rights | openAccess | es_ES |
dc.subject | cybersecurity | es_ES |
dc.subject | cyberdefense | es_ES |
dc.subject | CSIRT | es_ES |
dc.subject | information | es_ES |
dc.subject | security | es_ES |
dc.subject | methodology | es_ES |
dc.subject | WOS(2) | es_ES |
dc.title | Methodology for Computer Security Incident Response Teams into IoT Strategy | es_ES |
dc.type | article | es_ES |
reunir.tag | ~ARI | es_ES |
dc.identifier.doi | https://doi.org/10.3837/tiis.2021.05.018 |
Ficheros en el ítem
Ficheros | Tamaño | Formato | Ver |
---|---|---|---|
No hay ficheros asociados a este ítem. |