Balanced Scorecard model for critical computer security controls according to the Center for Internet Security (CIS)

Descripción del Articulo

In different sectors of human activities, organizations are adopting information technology (IT) more intensively, exposing sensitive and confidential information of employees and customers. This situation makes public and private entities to develop standards and regulations to protect these inform...

Descripción completa

Detalles Bibliográficos
Autores: Marchand-Niño, William-Rogelio, Vega Ventocilla, Edwin Jesús
Formato: artículo
Fecha de Publicación:2020
Institución:Universidad de Lima
Repositorio:Revistas - Universidad de Lima
Lenguaje:español
OAI Identifier:oai:ojs.pkp.sfu.ca:article/4876
Enlace del recurso:https://revistas.ulima.edu.pe/index.php/Interfases/article/view/4876
Nivel de acceso:acceso abierto
Materia:Compliance
security and privacy
organizational modeling
Cumplimiento
seguridad y privacidad
modelamiento organizacional
id REVULIMA_de9b9f5842b72d1b5874819449173910
oai_identifier_str oai:ojs.pkp.sfu.ca:article/4876
network_acronym_str REVULIMA
network_name_str Revistas - Universidad de Lima
repository_id_str
spelling Balanced Scorecard model for critical computer security controls according to the Center for Internet Security (CIS)Modelo Balanced Scorecard para los controles críticos de seguridad informática según el Center for Internet Security (CIS)Marchand-Niño, William-RogelioVega Ventocilla, Edwin JesúsMarchand-Niño, William-RogelioVega Ventocilla, Edwin JesúsCompliancesecurity and privacyorganizational modelingCumplimientoseguridad y privacidadmodelamiento organizacionalIn different sectors of human activities, organizations are adopting information technology (IT) more intensively, exposing sensitive and confidential information of employees and customers. This situation makes public and private entities to develop standards and regulations to protect these information assets, ensuring confidentiality, integrity and availability. As a result of the study, a Balanced Scorecard model that links the critical security controls of the CIS is formulated and supported by an office IT application as a preliminary tool that facilitates the presentation of the results. Such results highlight that the highest proportion (80%) of the preliminary application that occurred in five institutions agrees with the proposed model and its usefulness for monitoring and managing security controls.En diversos sectores de las actividades humanas, las organizaciones están adoptando con mayor intensidad las tecnologías de la información (TI). De este modo, exponen datos sensibles y confidenciales de empleados y clientes, lo cual genera que las entidades públicas y privadas desarrollen normas y regulaciones para proteger estos activos y asegurar su confidencialidad, integridad y disponibilidad. Como resultado del estudio se formula un modelo de Cuadro de Mando Integral que vincula a los controles críticos de seguridad del CIS, soportado además por un aplicativo de ofimática como una herramienta preliminar que facilite la presentación de resultados. Dichos resultados resaltan que sobre la aplicación preliminar que se dio en cinco instituciones, la mayor proporción (80 %) está de acuerdo con el modelo propuesto y su utilidad para el monitoreo y gestión de los controles de seguridad.Universidad de Lima2020-12-22info:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionapplication/pdfhttps://revistas.ulima.edu.pe/index.php/Interfases/article/view/487610.26439/interfases2020.n013.4876Interfases; No. 013 (2020); 57-76Interfases; Núm. 013 (2020); 57-76Interfases; n. 013 (2020); 57-761993-491210.26439/interfases2020.n013reponame:Revistas - Universidad de Limainstname:Universidad de Limainstacron:ULIMAspahttps://revistas.ulima.edu.pe/index.php/Interfases/article/view/4876/4872Derechos de autor 2020 Revista Interfasesinfo:eu-repo/semantics/openAccessoai:ojs.pkp.sfu.ca:article/48762023-07-24T13:32:54Z
dc.title.none.fl_str_mv Balanced Scorecard model for critical computer security controls according to the Center for Internet Security (CIS)
Modelo Balanced Scorecard para los controles críticos de seguridad informática según el Center for Internet Security (CIS)
title Balanced Scorecard model for critical computer security controls according to the Center for Internet Security (CIS)
spellingShingle Balanced Scorecard model for critical computer security controls according to the Center for Internet Security (CIS)
Marchand-Niño, William-Rogelio
Compliance
security and privacy
organizational modeling
Cumplimiento
seguridad y privacidad
modelamiento organizacional
title_short Balanced Scorecard model for critical computer security controls according to the Center for Internet Security (CIS)
title_full Balanced Scorecard model for critical computer security controls according to the Center for Internet Security (CIS)
title_fullStr Balanced Scorecard model for critical computer security controls according to the Center for Internet Security (CIS)
title_full_unstemmed Balanced Scorecard model for critical computer security controls according to the Center for Internet Security (CIS)
title_sort Balanced Scorecard model for critical computer security controls according to the Center for Internet Security (CIS)
dc.creator.none.fl_str_mv Marchand-Niño, William-Rogelio
Vega Ventocilla, Edwin Jesús
Marchand-Niño, William-Rogelio
Vega Ventocilla, Edwin Jesús
author Marchand-Niño, William-Rogelio
author_facet Marchand-Niño, William-Rogelio
Vega Ventocilla, Edwin Jesús
author_role author
author2 Vega Ventocilla, Edwin Jesús
author2_role author
dc.subject.none.fl_str_mv Compliance
security and privacy
organizational modeling
Cumplimiento
seguridad y privacidad
modelamiento organizacional
topic Compliance
security and privacy
organizational modeling
Cumplimiento
seguridad y privacidad
modelamiento organizacional
description In different sectors of human activities, organizations are adopting information technology (IT) more intensively, exposing sensitive and confidential information of employees and customers. This situation makes public and private entities to develop standards and regulations to protect these information assets, ensuring confidentiality, integrity and availability. As a result of the study, a Balanced Scorecard model that links the critical security controls of the CIS is formulated and supported by an office IT application as a preliminary tool that facilitates the presentation of the results. Such results highlight that the highest proportion (80%) of the preliminary application that occurred in five institutions agrees with the proposed model and its usefulness for monitoring and managing security controls.
publishDate 2020
dc.date.none.fl_str_mv 2020-12-22
dc.type.none.fl_str_mv info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
format article
status_str publishedVersion
dc.identifier.none.fl_str_mv https://revistas.ulima.edu.pe/index.php/Interfases/article/view/4876
10.26439/interfases2020.n013.4876
url https://revistas.ulima.edu.pe/index.php/Interfases/article/view/4876
identifier_str_mv 10.26439/interfases2020.n013.4876
dc.language.none.fl_str_mv spa
language spa
dc.relation.none.fl_str_mv https://revistas.ulima.edu.pe/index.php/Interfases/article/view/4876/4872
dc.rights.none.fl_str_mv Derechos de autor 2020 Revista Interfases
info:eu-repo/semantics/openAccess
rights_invalid_str_mv Derechos de autor 2020 Revista Interfases
eu_rights_str_mv openAccess
dc.format.none.fl_str_mv application/pdf
dc.publisher.none.fl_str_mv Universidad de Lima
publisher.none.fl_str_mv Universidad de Lima
dc.source.none.fl_str_mv Interfases; No. 013 (2020); 57-76
Interfases; Núm. 013 (2020); 57-76
Interfases; n. 013 (2020); 57-76
1993-4912
10.26439/interfases2020.n013
reponame:Revistas - Universidad de Lima
instname:Universidad de Lima
instacron:ULIMA
instname_str Universidad de Lima
instacron_str ULIMA
institution ULIMA
reponame_str Revistas - Universidad de Lima
collection Revistas - Universidad de Lima
repository.name.fl_str_mv
repository.mail.fl_str_mv
_version_ 1846157624204066816
score 13.982926
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).