dc.creatorEnciso Bernal, Alejandro (1)
dc.creatorMartinez Monterrubio, Sergio Mauricio (1)
dc.creatorParra Puente, Javier (1)
dc.creatorGonzález-Crespo, Rubén (1)
dc.creatorVerdú, Elena (1)
dc.date.accessioned2022-01-04T08:29:52Z
dc.date.accessioned2023-03-07T19:34:06Z
dc.date.available2022-01-04T08:29:52Z
dc.date.available2023-03-07T19:34:06Z
dc.date.created2022-01-04T08:29:52Z
dc.identifier1976-7277
dc.identifierhttps://reunir.unir.net/handle/123456789/12255
dc.identifierhttps://doi.org/10.3837/tiis.2021.05.018
dc.identifier.urihttps://repositorioslatinoamericanos.uchile.cl/handle/2250/5906556
dc.description.abstractAt present, the Colombian government shares information on threats or vulnerabilities in the area of cybersecurity and cyberdefense, from other government agencies or departments, on an ad-hoc basis but not in real time, with the surveillance entities of the Government of the Republic of Colombia such as the Joint Command of Cybernetic Operations (CCOCI) and the Cybernetic Emergencies Response Team of Colombia (ColCERT). This research presents the MS-CSIRT (Management System Computer Security Incident Response Teams) methodology, that is used to unify the guidelines of a CSIRT towards a joint communication command in cybersecurity for the surveillance of Information Technology (IT), Technological Operations (TO), Internet Connection Sharing (ICS) or Internet of Things (IoT) infrastructures. This methodology evaluates the level of maturity, by means of a roadmap, to establish a CSIRT as a reference framework for government entities and as a guide for the areas of information security, IT and TO to strengthen the growth of the industry 4.0. This allows the organizations to draw a line of cybersecurity policy with scope, objectives, controls, metrics, procedures and use cases for the correct coordination between ColCERT and CCOCI, as support entities in cybersecurity, and the different companies (ICS, IoT, gas and energy, mining, maritime, agroindustrial, among others) or government agencies that use this methodology.
dc.languageeng
dc.publisherKSII transactions on internet and information systems
dc.relation;vol. 15, nº 5
dc.relationhttp://itiis.org/digital-library/24651
dc.rightsopenAccess
dc.subjectcybersecurity
dc.subjectcyberdefense
dc.subjectCSIRT
dc.subjectinformation
dc.subjectsecurity
dc.subjectmethodology
dc.subjectWOS(2)
dc.titleMethodology for Computer Security Incident Response Teams into IoT Strategy
dc.typearticle


Este ítem pertenece a la siguiente institución