The cybersecurity tree: a training proposal for citizens, institutions, and society
Descripción del Articulo
The cybersecurity tree: a training proposal for citizens, institutions, and society in an increasingly interconnected world, cybersecurity has become a fundamental pillar for protecting critical information and ensuring the privacy of individuals, institutions, and society at large. The increase in...
Autores: | , , , |
---|---|
Formato: | artículo |
Fecha de Publicación: | 2025 |
Institución: | Universidad de Lima |
Repositorio: | Revistas - Universidad de Lima |
Lenguaje: | español |
OAI Identifier: | oai:revistas.ulima.edu.pe:article/7986 |
Enlace del recurso: | https://revistas.ulima.edu.pe/index.php/Interfases/article/view/7986 |
Nivel de acceso: | acceso abierto |
Materia: | cybersecurity cyberthreat security training tree árbol ciberseguridad ciberamenaza formación seguridad |
Sumario: | The cybersecurity tree: a training proposal for citizens, institutions, and society in an increasingly interconnected world, cybersecurity has become a fundamental pillar for protecting critical information and ensuring the privacy of individuals, institutions, and society at large. The increase in cyberthreats, such as unauthorized access, malicious code injections, and attacks on critical systems, underscores the need for a comprehensive approach to digital security. This study is based on definitions and guidelines from the ISO/IEC 27032 cybersecurity standard, the ACM/IEEE CSEC2017 curriculum guide, and the IEEE-CS Enterprise IT Body of Knowledge (EITBOK). The “Cybersecurity Tree” model is proposed as a comprehensive training proposal aimed at strengthening information security competencies. The tree analogy provides a conceptual framework that distributes strategic tools across its components: foliage, trunk, and roots. The tree analogy provides a conceptual framework that distributes strategic tools across its components: foliage, trunk, and roots. This approach allows us to address the challenges of a constantly evolving cyber environment, optimizing processes for identifying, preventing, and mitigating cyberthreats, while simultaneously contributing to strengthening a resilient and secure digital society. |
---|
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).