The cybersecurity tree: a training proposal for citizens, institutions, and society

Descripción del Articulo

The cybersecurity tree: a training proposal for citizens, institutions, and society in an increasingly interconnected world, cybersecurity has become a fundamental pillar for protecting critical information and ensuring the privacy of individuals, institutions, and society at large. The increase in...

Descripción completa

Detalles Bibliográficos
Autores: Bustillos Ortega, Olda, Murillo Gamboa, Jorge, Mena Bocker, Daniel, De la O Fonseca, Carlos
Formato: artículo
Fecha de Publicación:2025
Institución:Universidad de Lima
Repositorio:Revistas - Universidad de Lima
Lenguaje:español
OAI Identifier:oai:revistas.ulima.edu.pe:article/7986
Enlace del recurso:https://revistas.ulima.edu.pe/index.php/Interfases/article/view/7986
Nivel de acceso:acceso abierto
Materia:cybersecurity
cyberthreat
security
training
tree
árbol
ciberseguridad
ciberamenaza
formación
seguridad
id REVULIMA_fb864d4535b3144a95d5bea5962f1285
oai_identifier_str oai:revistas.ulima.edu.pe:article/7986
network_acronym_str REVULIMA
network_name_str Revistas - Universidad de Lima
repository_id_str
spelling The cybersecurity tree: a training proposal for citizens, institutions, and societyEl árbol de ciberseguridad: una propuesta de formación al ciudadano, a las instituciones y a la sociedadBustillos Ortega, OldaMurillo Gamboa, Jorge Mena Bocker, DanielDe la O Fonseca, CarloscybersecuritycyberthreatsecuritytrainingtreeárbolciberseguridadciberamenazaformaciónseguridadThe cybersecurity tree: a training proposal for citizens, institutions, and society in an increasingly interconnected world, cybersecurity has become a fundamental pillar for protecting critical information and ensuring the privacy of individuals, institutions, and society at large. The increase in cyberthreats, such as unauthorized access, malicious code injections, and attacks on critical systems, underscores the need for a comprehensive approach to digital security. This study is based on definitions and guidelines from the ISO/IEC 27032 cybersecurity standard, the ACM/IEEE CSEC2017 curriculum guide, and the IEEE-CS Enterprise IT Body of Knowledge (EITBOK). The “Cybersecurity Tree” model is proposed as a comprehensive training proposal aimed at strengthening information security competencies. The tree analogy provides a conceptual framework that distributes strategic tools across its components: foliage, trunk, and roots. The tree analogy provides a conceptual framework that distributes strategic tools across its components: foliage, trunk, and roots. This approach allows us to address the challenges of a constantly evolving cyber environment, optimizing processes for identifying, preventing, and mitigating cyberthreats, while simultaneously contributing to strengthening a resilient and secure digital society.En un mundo cada vez más interconectado, la ciberseguridad se ha convertido en un pilar fundamental para proteger la información crítica y garantizar la privacidad de las personas, las instituciones y la sociedad en general. El aumento de ciberamenazas, tales como accesos no autorizados, inyecciones de código malicioso y ataques a sistemas críticos, subraya la necesidad de un enfoque integral para la seguridad digital. Este estudio se basa en definiciones y directrices del estándar en ciberseguridad ISO/ IEC 27032:2023, la guía curricular ACM/IEEE CSEC2017 y el cuerpo de conocimiento de TI empresarial IEEE-CS (EITBOK). En relación con ello, se plantea el modelo del árbol de la ciberseguridad como propuesta formativa integral destinada a fortalecer las competencias en el ámbito de seguridad de la información. La analogía del árbol proporciona un marco conceptual que distribuye herramientas estratégicas en sus componentes: follaje, tronco y raíces. Este enfoque permite enfrentar los desafíos de un entorno cibernético en constante evolución, lo que optimiza los procesos de identificación, prevención y mitigación de ciberamenazas, y contribuye simultáneamente al fortalecimiento de una sociedad digital resiliente y segura.Universidad de Lima2025-07-31info:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionapplication/pdftext/htmlhttps://revistas.ulima.edu.pe/index.php/Interfases/article/view/798610.26439/interfases2025.n021.7986Interfases; No. 021 (2025); 101-124Interfases; Núm. 021 (2025); 101-124Interfases; n. 021 (2025); 101-1241993-491210.26439/interfases2025.n021reponame:Revistas - Universidad de Limainstname:Universidad de Limainstacron:ULIMAspahttps://revistas.ulima.edu.pe/index.php/Interfases/article/view/7986/7822https://revistas.ulima.edu.pe/index.php/Interfases/article/view/7986/7823info:eu-repo/semantics/openAccessoai:revistas.ulima.edu.pe:article/79862025-08-01T14:45:45Z
dc.title.none.fl_str_mv The cybersecurity tree: a training proposal for citizens, institutions, and society
El árbol de ciberseguridad: una propuesta de formación al ciudadano, a las instituciones y a la sociedad
title The cybersecurity tree: a training proposal for citizens, institutions, and society
spellingShingle The cybersecurity tree: a training proposal for citizens, institutions, and society
Bustillos Ortega, Olda
cybersecurity
cyberthreat
security
training
tree
árbol
ciberseguridad
ciberamenaza
formación
seguridad
title_short The cybersecurity tree: a training proposal for citizens, institutions, and society
title_full The cybersecurity tree: a training proposal for citizens, institutions, and society
title_fullStr The cybersecurity tree: a training proposal for citizens, institutions, and society
title_full_unstemmed The cybersecurity tree: a training proposal for citizens, institutions, and society
title_sort The cybersecurity tree: a training proposal for citizens, institutions, and society
dc.creator.none.fl_str_mv Bustillos Ortega, Olda
Murillo Gamboa, Jorge
Mena Bocker, Daniel
De la O Fonseca, Carlos
author Bustillos Ortega, Olda
author_facet Bustillos Ortega, Olda
Murillo Gamboa, Jorge
Mena Bocker, Daniel
De la O Fonseca, Carlos
author_role author
author2 Murillo Gamboa, Jorge
Mena Bocker, Daniel
De la O Fonseca, Carlos
author2_role author
author
author
dc.subject.none.fl_str_mv cybersecurity
cyberthreat
security
training
tree
árbol
ciberseguridad
ciberamenaza
formación
seguridad
topic cybersecurity
cyberthreat
security
training
tree
árbol
ciberseguridad
ciberamenaza
formación
seguridad
description The cybersecurity tree: a training proposal for citizens, institutions, and society in an increasingly interconnected world, cybersecurity has become a fundamental pillar for protecting critical information and ensuring the privacy of individuals, institutions, and society at large. The increase in cyberthreats, such as unauthorized access, malicious code injections, and attacks on critical systems, underscores the need for a comprehensive approach to digital security. This study is based on definitions and guidelines from the ISO/IEC 27032 cybersecurity standard, the ACM/IEEE CSEC2017 curriculum guide, and the IEEE-CS Enterprise IT Body of Knowledge (EITBOK). The “Cybersecurity Tree” model is proposed as a comprehensive training proposal aimed at strengthening information security competencies. The tree analogy provides a conceptual framework that distributes strategic tools across its components: foliage, trunk, and roots. The tree analogy provides a conceptual framework that distributes strategic tools across its components: foliage, trunk, and roots. This approach allows us to address the challenges of a constantly evolving cyber environment, optimizing processes for identifying, preventing, and mitigating cyberthreats, while simultaneously contributing to strengthening a resilient and secure digital society.
publishDate 2025
dc.date.none.fl_str_mv 2025-07-31
dc.type.none.fl_str_mv info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
format article
status_str publishedVersion
dc.identifier.none.fl_str_mv https://revistas.ulima.edu.pe/index.php/Interfases/article/view/7986
10.26439/interfases2025.n021.7986
url https://revistas.ulima.edu.pe/index.php/Interfases/article/view/7986
identifier_str_mv 10.26439/interfases2025.n021.7986
dc.language.none.fl_str_mv spa
language spa
dc.relation.none.fl_str_mv https://revistas.ulima.edu.pe/index.php/Interfases/article/view/7986/7822
https://revistas.ulima.edu.pe/index.php/Interfases/article/view/7986/7823
dc.rights.none.fl_str_mv info:eu-repo/semantics/openAccess
eu_rights_str_mv openAccess
dc.format.none.fl_str_mv application/pdf
text/html
dc.publisher.none.fl_str_mv Universidad de Lima
publisher.none.fl_str_mv Universidad de Lima
dc.source.none.fl_str_mv Interfases; No. 021 (2025); 101-124
Interfases; Núm. 021 (2025); 101-124
Interfases; n. 021 (2025); 101-124
1993-4912
10.26439/interfases2025.n021
reponame:Revistas - Universidad de Lima
instname:Universidad de Lima
instacron:ULIMA
instname_str Universidad de Lima
instacron_str ULIMA
institution ULIMA
reponame_str Revistas - Universidad de Lima
collection Revistas - Universidad de Lima
repository.name.fl_str_mv
repository.mail.fl_str_mv
_version_ 1841719318630367232
score 13.941313
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).