Maturity model for data leakage security protocols in telecommunications companies applying the NIST framework
Descripción del Articulo
Attacks on information security and data leaks in telecommunications companies in Peru cause considerable losses both financially and in terms of social reputation. For this reason, response protocols have been implemented to deal with these situations. However, the mere implementation and developme...
Autores: | , , , , , |
---|---|
Formato: | artículo |
Fecha de Publicación: | 2023 |
Institución: | Universidad Peruana de Ciencias Aplicadas |
Repositorio: | UPC-Institucional |
Lenguaje: | inglés |
OAI Identifier: | oai:repositorioacademico.upc.edu.pe:10757/673091 |
Enlace del recurso: | http://hdl.handle.net/10757/673091 |
Nivel de acceso: | acceso embargado |
Materia: | evaluation maturity model NIST response protocols |
id |
UUPC_136b117fa2820b39107f9b5b55f9982c |
---|---|
oai_identifier_str |
oai:repositorioacademico.upc.edu.pe:10757/673091 |
network_acronym_str |
UUPC |
network_name_str |
UPC-Institucional |
repository_id_str |
2670 |
dc.title.es_PE.fl_str_mv |
Maturity model for data leakage security protocols in telecommunications companies applying the NIST framework |
title |
Maturity model for data leakage security protocols in telecommunications companies applying the NIST framework |
spellingShingle |
Maturity model for data leakage security protocols in telecommunications companies applying the NIST framework Leon, Solis evaluation maturity model NIST response protocols |
title_short |
Maturity model for data leakage security protocols in telecommunications companies applying the NIST framework |
title_full |
Maturity model for data leakage security protocols in telecommunications companies applying the NIST framework |
title_fullStr |
Maturity model for data leakage security protocols in telecommunications companies applying the NIST framework |
title_full_unstemmed |
Maturity model for data leakage security protocols in telecommunications companies applying the NIST framework |
title_sort |
Maturity model for data leakage security protocols in telecommunications companies applying the NIST framework |
author |
Leon, Solis |
author_facet |
Leon, Solis Joel, Brian Jara, Di Paola Giovanni, Renzo Cornejo, Copaja Nivaldo, Richard |
author_role |
author |
author2 |
Joel, Brian Jara, Di Paola Giovanni, Renzo Cornejo, Copaja Nivaldo, Richard |
author2_role |
author author author author author |
dc.contributor.author.fl_str_mv |
Leon, Solis Joel, Brian Jara, Di Paola Giovanni, Renzo Cornejo, Copaja Nivaldo, Richard |
dc.subject.es_PE.fl_str_mv |
evaluation maturity model NIST response protocols |
topic |
evaluation maturity model NIST response protocols |
description |
Attacks on information security and data leaks in telecommunications companies in Peru cause considerable losses both financially and in terms of social reputation. For this reason, response protocols have been implemented to deal with these situations. However, the mere implementation and development of these protocols is not enough to effectively prevent or counter attacks. Therefore, a technological solution is proposed that combines a maturity assessment model for protocols and a reporting system that provides information on the current level and possible improvements that can be applied to the assessed protocols. The project aims to reduce attacks on companies in the telecommunications sector and at the same time enable them to assess the state of their protocols in terms of cybersecurity, giving them greater insight into possible situations that could result from protocol misuse. To validate the project, 4 cybersecurity experts were involved, who have used it for a given period to obtain sufficient information to offer their opinion. At the end of the period of use, a form was sent to them to evaluate the level of satisfaction with the project, using the indicators that were established. The final level of satisfaction obtained was 81.39%, which indicates that the project has been successful according to the evaluation of the security experts. |
publishDate |
2023 |
dc.date.accessioned.none.fl_str_mv |
2024-03-18T15:40:34Z |
dc.date.available.none.fl_str_mv |
2024-03-18T15:40:34Z |
dc.date.issued.fl_str_mv |
2023-01-01 |
dc.type.es_PE.fl_str_mv |
info:eu-repo/semantics/article |
format |
article |
dc.identifier.doi.none.fl_str_mv |
10.1109/INTERCON59652.2023.10326098 |
dc.identifier.uri.none.fl_str_mv |
http://hdl.handle.net/10757/673091 |
dc.identifier.journal.es_PE.fl_str_mv |
Proceedings of the 2023 IEEE 30th International Conference on Electronics, Electrical Engineering and Computing, INTERCON 2023 |
dc.identifier.eid.none.fl_str_mv |
2-s2.0-85179894342 |
dc.identifier.scopusid.none.fl_str_mv |
SCOPUS_ID:85179894342 |
dc.identifier.isni.none.fl_str_mv |
0000 0001 2196 144X |
identifier_str_mv |
10.1109/INTERCON59652.2023.10326098 Proceedings of the 2023 IEEE 30th International Conference on Electronics, Electrical Engineering and Computing, INTERCON 2023 2-s2.0-85179894342 SCOPUS_ID:85179894342 0000 0001 2196 144X |
url |
http://hdl.handle.net/10757/673091 |
dc.language.iso.es_PE.fl_str_mv |
eng |
language |
eng |
dc.rights.es_PE.fl_str_mv |
info:eu-repo/semantics/embargoedAccess |
eu_rights_str_mv |
embargoedAccess |
dc.format.es_PE.fl_str_mv |
application/html |
dc.publisher.es_PE.fl_str_mv |
Institute of Electrical and Electronics Engineers Inc. |
dc.source.es_PE.fl_str_mv |
Repositorio Academico - UPC Universidad Peruana de Ciencias Aplicadas (UPC) |
dc.source.none.fl_str_mv |
reponame:UPC-Institucional instname:Universidad Peruana de Ciencias Aplicadas instacron:UPC |
instname_str |
Universidad Peruana de Ciencias Aplicadas |
instacron_str |
UPC |
institution |
UPC |
reponame_str |
UPC-Institucional |
collection |
UPC-Institucional |
dc.source.journaltitle.none.fl_str_mv |
Proceedings of the 2023 IEEE 30th International Conference on Electronics, Electrical Engineering and Computing, INTERCON 2023 |
bitstream.url.fl_str_mv |
https://repositorioacademico.upc.edu.pe/bitstream/10757/673091/1/license.txt |
bitstream.checksum.fl_str_mv |
8a4605be74aa9ea9d79846c1fba20a33 |
bitstream.checksumAlgorithm.fl_str_mv |
MD5 |
repository.name.fl_str_mv |
Repositorio académico upc |
repository.mail.fl_str_mv |
upc@openrepository.com |
_version_ |
1846066002842877952 |
spelling |
6caa3a60cf7dd7c18fe0e7caa5ee44f6300f8c915f8e4650d2ee9932f566ef8d577300be8bbfa43a49f962032641a72ba95f9930085ffff860d3b33fe7b6bbf92585b4d41f54f577698a01e53604d40028bf66bcabdb71026d5e80d8634d5801ad4e7ad2cLeon, SolisJoel, BrianJara, Di PaolaGiovanni, RenzoCornejo, CopajaNivaldo, Richard2024-03-18T15:40:34Z2024-03-18T15:40:34Z2023-01-0110.1109/INTERCON59652.2023.10326098http://hdl.handle.net/10757/673091Proceedings of the 2023 IEEE 30th International Conference on Electronics, Electrical Engineering and Computing, INTERCON 20232-s2.0-85179894342SCOPUS_ID:851798943420000 0001 2196 144XAttacks on information security and data leaks in telecommunications companies in Peru cause considerable losses both financially and in terms of social reputation. For this reason, response protocols have been implemented to deal with these situations. However, the mere implementation and development of these protocols is not enough to effectively prevent or counter attacks. Therefore, a technological solution is proposed that combines a maturity assessment model for protocols and a reporting system that provides information on the current level and possible improvements that can be applied to the assessed protocols. The project aims to reduce attacks on companies in the telecommunications sector and at the same time enable them to assess the state of their protocols in terms of cybersecurity, giving them greater insight into possible situations that could result from protocol misuse. To validate the project, 4 cybersecurity experts were involved, who have used it for a given period to obtain sufficient information to offer their opinion. At the end of the period of use, a form was sent to them to evaluate the level of satisfaction with the project, using the indicators that were established. The final level of satisfaction obtained was 81.39%, which indicates that the project has been successful according to the evaluation of the security experts.Revisión por paresODS 9: Industria, Innovación e InfraestructuraODS 12: Producción y Consumo ResponsablesODS 16: Paz, Justicia e Instituciones Sólidasapplication/htmlengInstitute of Electrical and Electronics Engineers Inc.info:eu-repo/semantics/embargoedAccessRepositorio Academico - UPCUniversidad Peruana de Ciencias Aplicadas (UPC)Proceedings of the 2023 IEEE 30th International Conference on Electronics, Electrical Engineering and Computing, INTERCON 2023reponame:UPC-Institucionalinstname:Universidad Peruana de Ciencias Aplicadasinstacron:UPCevaluationmaturity modelNISTresponse protocolsMaturity model for data leakage security protocols in telecommunications companies applying the NIST frameworkinfo:eu-repo/semantics/articleLICENSElicense.txtlicense.txttext/plain; charset=utf-81748https://repositorioacademico.upc.edu.pe/bitstream/10757/673091/1/license.txt8a4605be74aa9ea9d79846c1fba20a33MD51false10757/673091oai:repositorioacademico.upc.edu.pe:10757/6730912024-07-20 04:32:10.596Repositorio académico upcupc@openrepository.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 |
score |
13.377112 |
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).