The cybersecurity tree: a training proposal for citizens, institutions, and society

Descripción del Articulo

The cybersecurity tree: a training proposal for citizens, institutions, and society in an increasingly interconnected world, cybersecurity has become a fundamental pillar for protecting critical information and ensuring the privacy of individuals, institutions, and society at large. The increase in...

Descripción completa

Detalles Bibliográficos
Autores: Bustillos Ortega, Olda, Murillo Gamboa, Jorge, Mena Bocker, Daniel, De la O Fonseca, Carlos
Formato: artículo
Fecha de Publicación:2025
Institución:Universidad de Lima
Repositorio:Revistas - Universidad de Lima
Lenguaje:español
OAI Identifier:oai:revistas.ulima.edu.pe:article/7986
Enlace del recurso:https://revistas.ulima.edu.pe/index.php/Interfases/article/view/7986
Nivel de acceso:acceso abierto
Materia:cybersecurity
cyberthreat
security
training
tree
árbol
ciberseguridad
ciberamenaza
formación
seguridad
Descripción
Sumario:The cybersecurity tree: a training proposal for citizens, institutions, and society in an increasingly interconnected world, cybersecurity has become a fundamental pillar for protecting critical information and ensuring the privacy of individuals, institutions, and society at large. The increase in cyberthreats, such as unauthorized access, malicious code injections, and attacks on critical systems, underscores the need for a comprehensive approach to digital security. This study is based on definitions and guidelines from the ISO/IEC 27032 cybersecurity standard, the ACM/IEEE CSEC2017 curriculum guide, and the IEEE-CS Enterprise IT Body of Knowledge (EITBOK). The “Cybersecurity Tree” model is proposed as a comprehensive training proposal aimed at strengthening information security competencies. The tree analogy provides a conceptual framework that distributes strategic tools across its components: foliage, trunk, and roots. The tree analogy provides a conceptual framework that distributes strategic tools across its components: foliage, trunk, and roots. This approach allows us to address the challenges of a constantly evolving cyber environment, optimizing processes for identifying, preventing, and mitigating cyberthreats, while simultaneously contributing to strengthening a resilient and secure digital society.
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).