Balanced Scorecard model for critical computer security controls according to the Center for Internet Security (CIS)
Descripción del Articulo
In different sectors of human activities, organizations are adopting information technology (IT) more intensively, exposing sensitive and confidential information of employees and customers. This situation makes public and private entities to develop standards and regulations to protect these inform...
Autores: | , |
---|---|
Formato: | artículo |
Fecha de Publicación: | 2020 |
Institución: | Universidad de Lima |
Repositorio: | Revistas - Universidad de Lima |
Lenguaje: | español |
OAI Identifier: | oai:ojs.pkp.sfu.ca:article/4876 |
Enlace del recurso: | https://revistas.ulima.edu.pe/index.php/Interfases/article/view/4876 |
Nivel de acceso: | acceso abierto |
Materia: | Compliance security and privacy organizational modeling Cumplimiento seguridad y privacidad modelamiento organizacional |
id |
REVULIMA_de9b9f5842b72d1b5874819449173910 |
---|---|
oai_identifier_str |
oai:ojs.pkp.sfu.ca:article/4876 |
network_acronym_str |
REVULIMA |
network_name_str |
Revistas - Universidad de Lima |
repository_id_str |
|
spelling |
Balanced Scorecard model for critical computer security controls according to the Center for Internet Security (CIS)Modelo Balanced Scorecard para los controles críticos de seguridad informática según el Center for Internet Security (CIS)Marchand-Niño, William-RogelioVega Ventocilla, Edwin JesúsMarchand-Niño, William-RogelioVega Ventocilla, Edwin JesúsCompliancesecurity and privacyorganizational modelingCumplimientoseguridad y privacidadmodelamiento organizacionalIn different sectors of human activities, organizations are adopting information technology (IT) more intensively, exposing sensitive and confidential information of employees and customers. This situation makes public and private entities to develop standards and regulations to protect these information assets, ensuring confidentiality, integrity and availability. As a result of the study, a Balanced Scorecard model that links the critical security controls of the CIS is formulated and supported by an office IT application as a preliminary tool that facilitates the presentation of the results. Such results highlight that the highest proportion (80%) of the preliminary application that occurred in five institutions agrees with the proposed model and its usefulness for monitoring and managing security controls.En diversos sectores de las actividades humanas, las organizaciones están adoptando con mayor intensidad las tecnologías de la información (TI). De este modo, exponen datos sensibles y confidenciales de empleados y clientes, lo cual genera que las entidades públicas y privadas desarrollen normas y regulaciones para proteger estos activos y asegurar su confidencialidad, integridad y disponibilidad. Como resultado del estudio se formula un modelo de Cuadro de Mando Integral que vincula a los controles críticos de seguridad del CIS, soportado además por un aplicativo de ofimática como una herramienta preliminar que facilite la presentación de resultados. Dichos resultados resaltan que sobre la aplicación preliminar que se dio en cinco instituciones, la mayor proporción (80 %) está de acuerdo con el modelo propuesto y su utilidad para el monitoreo y gestión de los controles de seguridad.Universidad de Lima2020-12-22info:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionapplication/pdfhttps://revistas.ulima.edu.pe/index.php/Interfases/article/view/487610.26439/interfases2020.n013.4876Interfases; No. 013 (2020); 57-76Interfases; Núm. 013 (2020); 57-76Interfases; n. 013 (2020); 57-761993-491210.26439/interfases2020.n013reponame:Revistas - Universidad de Limainstname:Universidad de Limainstacron:ULIMAspahttps://revistas.ulima.edu.pe/index.php/Interfases/article/view/4876/4872Derechos de autor 2020 Revista Interfasesinfo:eu-repo/semantics/openAccessoai:ojs.pkp.sfu.ca:article/48762023-07-24T13:32:54Z |
dc.title.none.fl_str_mv |
Balanced Scorecard model for critical computer security controls according to the Center for Internet Security (CIS) Modelo Balanced Scorecard para los controles críticos de seguridad informática según el Center for Internet Security (CIS) |
title |
Balanced Scorecard model for critical computer security controls according to the Center for Internet Security (CIS) |
spellingShingle |
Balanced Scorecard model for critical computer security controls according to the Center for Internet Security (CIS) Marchand-Niño, William-Rogelio Compliance security and privacy organizational modeling Cumplimiento seguridad y privacidad modelamiento organizacional |
title_short |
Balanced Scorecard model for critical computer security controls according to the Center for Internet Security (CIS) |
title_full |
Balanced Scorecard model for critical computer security controls according to the Center for Internet Security (CIS) |
title_fullStr |
Balanced Scorecard model for critical computer security controls according to the Center for Internet Security (CIS) |
title_full_unstemmed |
Balanced Scorecard model for critical computer security controls according to the Center for Internet Security (CIS) |
title_sort |
Balanced Scorecard model for critical computer security controls according to the Center for Internet Security (CIS) |
dc.creator.none.fl_str_mv |
Marchand-Niño, William-Rogelio Vega Ventocilla, Edwin Jesús Marchand-Niño, William-Rogelio Vega Ventocilla, Edwin Jesús |
author |
Marchand-Niño, William-Rogelio |
author_facet |
Marchand-Niño, William-Rogelio Vega Ventocilla, Edwin Jesús |
author_role |
author |
author2 |
Vega Ventocilla, Edwin Jesús |
author2_role |
author |
dc.subject.none.fl_str_mv |
Compliance security and privacy organizational modeling Cumplimiento seguridad y privacidad modelamiento organizacional |
topic |
Compliance security and privacy organizational modeling Cumplimiento seguridad y privacidad modelamiento organizacional |
description |
In different sectors of human activities, organizations are adopting information technology (IT) more intensively, exposing sensitive and confidential information of employees and customers. This situation makes public and private entities to develop standards and regulations to protect these information assets, ensuring confidentiality, integrity and availability. As a result of the study, a Balanced Scorecard model that links the critical security controls of the CIS is formulated and supported by an office IT application as a preliminary tool that facilitates the presentation of the results. Such results highlight that the highest proportion (80%) of the preliminary application that occurred in five institutions agrees with the proposed model and its usefulness for monitoring and managing security controls. |
publishDate |
2020 |
dc.date.none.fl_str_mv |
2020-12-22 |
dc.type.none.fl_str_mv |
info:eu-repo/semantics/article info:eu-repo/semantics/publishedVersion |
format |
article |
status_str |
publishedVersion |
dc.identifier.none.fl_str_mv |
https://revistas.ulima.edu.pe/index.php/Interfases/article/view/4876 10.26439/interfases2020.n013.4876 |
url |
https://revistas.ulima.edu.pe/index.php/Interfases/article/view/4876 |
identifier_str_mv |
10.26439/interfases2020.n013.4876 |
dc.language.none.fl_str_mv |
spa |
language |
spa |
dc.relation.none.fl_str_mv |
https://revistas.ulima.edu.pe/index.php/Interfases/article/view/4876/4872 |
dc.rights.none.fl_str_mv |
Derechos de autor 2020 Revista Interfases info:eu-repo/semantics/openAccess |
rights_invalid_str_mv |
Derechos de autor 2020 Revista Interfases |
eu_rights_str_mv |
openAccess |
dc.format.none.fl_str_mv |
application/pdf |
dc.publisher.none.fl_str_mv |
Universidad de Lima |
publisher.none.fl_str_mv |
Universidad de Lima |
dc.source.none.fl_str_mv |
Interfases; No. 013 (2020); 57-76 Interfases; Núm. 013 (2020); 57-76 Interfases; n. 013 (2020); 57-76 1993-4912 10.26439/interfases2020.n013 reponame:Revistas - Universidad de Lima instname:Universidad de Lima instacron:ULIMA |
instname_str |
Universidad de Lima |
instacron_str |
ULIMA |
institution |
ULIMA |
reponame_str |
Revistas - Universidad de Lima |
collection |
Revistas - Universidad de Lima |
repository.name.fl_str_mv |
|
repository.mail.fl_str_mv |
|
_version_ |
1846157624204066816 |
score |
13.982926 |
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).