Maturity model for data leakage security protocols in telecommunications companies applying the NIST framework

Descripción del Articulo

Attacks on information security and data leaks in telecommunications companies in Peru cause considerable losses both financially and in terms of social reputation. For this reason, response protocols have been implemented to deal with these situations. However, the mere implementation and developme...

Descripción completa

Detalles Bibliográficos
Autores: Leon, Solis, Joel, Brian, Jara, Di Paola, Giovanni, Renzo, Cornejo, Copaja, Nivaldo, Richard
Formato: artículo
Fecha de Publicación:2023
Institución:Universidad Peruana de Ciencias Aplicadas
Repositorio:UPC-Institucional
Lenguaje:inglés
OAI Identifier:oai:repositorioacademico.upc.edu.pe:10757/673091
Enlace del recurso:http://hdl.handle.net/10757/673091
Nivel de acceso:acceso embargado
Materia:evaluation
maturity model
NIST
response protocols
id UUPC_136b117fa2820b39107f9b5b55f9982c
oai_identifier_str oai:repositorioacademico.upc.edu.pe:10757/673091
network_acronym_str UUPC
network_name_str UPC-Institucional
repository_id_str 2670
dc.title.es_PE.fl_str_mv Maturity model for data leakage security protocols in telecommunications companies applying the NIST framework
title Maturity model for data leakage security protocols in telecommunications companies applying the NIST framework
spellingShingle Maturity model for data leakage security protocols in telecommunications companies applying the NIST framework
Leon, Solis
evaluation
maturity model
NIST
response protocols
title_short Maturity model for data leakage security protocols in telecommunications companies applying the NIST framework
title_full Maturity model for data leakage security protocols in telecommunications companies applying the NIST framework
title_fullStr Maturity model for data leakage security protocols in telecommunications companies applying the NIST framework
title_full_unstemmed Maturity model for data leakage security protocols in telecommunications companies applying the NIST framework
title_sort Maturity model for data leakage security protocols in telecommunications companies applying the NIST framework
author Leon, Solis
author_facet Leon, Solis
Joel, Brian
Jara, Di Paola
Giovanni, Renzo
Cornejo, Copaja
Nivaldo, Richard
author_role author
author2 Joel, Brian
Jara, Di Paola
Giovanni, Renzo
Cornejo, Copaja
Nivaldo, Richard
author2_role author
author
author
author
author
dc.contributor.author.fl_str_mv Leon, Solis
Joel, Brian
Jara, Di Paola
Giovanni, Renzo
Cornejo, Copaja
Nivaldo, Richard
dc.subject.es_PE.fl_str_mv evaluation
maturity model
NIST
response protocols
topic evaluation
maturity model
NIST
response protocols
description Attacks on information security and data leaks in telecommunications companies in Peru cause considerable losses both financially and in terms of social reputation. For this reason, response protocols have been implemented to deal with these situations. However, the mere implementation and development of these protocols is not enough to effectively prevent or counter attacks. Therefore, a technological solution is proposed that combines a maturity assessment model for protocols and a reporting system that provides information on the current level and possible improvements that can be applied to the assessed protocols. The project aims to reduce attacks on companies in the telecommunications sector and at the same time enable them to assess the state of their protocols in terms of cybersecurity, giving them greater insight into possible situations that could result from protocol misuse. To validate the project, 4 cybersecurity experts were involved, who have used it for a given period to obtain sufficient information to offer their opinion. At the end of the period of use, a form was sent to them to evaluate the level of satisfaction with the project, using the indicators that were established. The final level of satisfaction obtained was 81.39%, which indicates that the project has been successful according to the evaluation of the security experts.
publishDate 2023
dc.date.accessioned.none.fl_str_mv 2024-03-18T15:40:34Z
dc.date.available.none.fl_str_mv 2024-03-18T15:40:34Z
dc.date.issued.fl_str_mv 2023-01-01
dc.type.es_PE.fl_str_mv info:eu-repo/semantics/article
format article
dc.identifier.doi.none.fl_str_mv 10.1109/INTERCON59652.2023.10326098
dc.identifier.uri.none.fl_str_mv http://hdl.handle.net/10757/673091
dc.identifier.journal.es_PE.fl_str_mv Proceedings of the 2023 IEEE 30th International Conference on Electronics, Electrical Engineering and Computing, INTERCON 2023
dc.identifier.eid.none.fl_str_mv 2-s2.0-85179894342
dc.identifier.scopusid.none.fl_str_mv SCOPUS_ID:85179894342
dc.identifier.isni.none.fl_str_mv 0000 0001 2196 144X
identifier_str_mv 10.1109/INTERCON59652.2023.10326098
Proceedings of the 2023 IEEE 30th International Conference on Electronics, Electrical Engineering and Computing, INTERCON 2023
2-s2.0-85179894342
SCOPUS_ID:85179894342
0000 0001 2196 144X
url http://hdl.handle.net/10757/673091
dc.language.iso.es_PE.fl_str_mv eng
language eng
dc.rights.es_PE.fl_str_mv info:eu-repo/semantics/embargoedAccess
eu_rights_str_mv embargoedAccess
dc.format.es_PE.fl_str_mv application/html
dc.publisher.es_PE.fl_str_mv Institute of Electrical and Electronics Engineers Inc.
dc.source.es_PE.fl_str_mv Repositorio Academico - UPC
Universidad Peruana de Ciencias Aplicadas (UPC)
dc.source.none.fl_str_mv reponame:UPC-Institucional
instname:Universidad Peruana de Ciencias Aplicadas
instacron:UPC
instname_str Universidad Peruana de Ciencias Aplicadas
instacron_str UPC
institution UPC
reponame_str UPC-Institucional
collection UPC-Institucional
dc.source.journaltitle.none.fl_str_mv Proceedings of the 2023 IEEE 30th International Conference on Electronics, Electrical Engineering and Computing, INTERCON 2023
bitstream.url.fl_str_mv https://repositorioacademico.upc.edu.pe/bitstream/10757/673091/1/license.txt
bitstream.checksum.fl_str_mv 8a4605be74aa9ea9d79846c1fba20a33
bitstream.checksumAlgorithm.fl_str_mv MD5
repository.name.fl_str_mv Repositorio académico upc
repository.mail.fl_str_mv upc@openrepository.com
_version_ 1846066002842877952
spelling 6caa3a60cf7dd7c18fe0e7caa5ee44f6300f8c915f8e4650d2ee9932f566ef8d577300be8bbfa43a49f962032641a72ba95f9930085ffff860d3b33fe7b6bbf92585b4d41f54f577698a01e53604d40028bf66bcabdb71026d5e80d8634d5801ad4e7ad2cLeon, SolisJoel, BrianJara, Di PaolaGiovanni, RenzoCornejo, CopajaNivaldo, Richard2024-03-18T15:40:34Z2024-03-18T15:40:34Z2023-01-0110.1109/INTERCON59652.2023.10326098http://hdl.handle.net/10757/673091Proceedings of the 2023 IEEE 30th International Conference on Electronics, Electrical Engineering and Computing, INTERCON 20232-s2.0-85179894342SCOPUS_ID:851798943420000 0001 2196 144XAttacks on information security and data leaks in telecommunications companies in Peru cause considerable losses both financially and in terms of social reputation. For this reason, response protocols have been implemented to deal with these situations. However, the mere implementation and development of these protocols is not enough to effectively prevent or counter attacks. Therefore, a technological solution is proposed that combines a maturity assessment model for protocols and a reporting system that provides information on the current level and possible improvements that can be applied to the assessed protocols. The project aims to reduce attacks on companies in the telecommunications sector and at the same time enable them to assess the state of their protocols in terms of cybersecurity, giving them greater insight into possible situations that could result from protocol misuse. To validate the project, 4 cybersecurity experts were involved, who have used it for a given period to obtain sufficient information to offer their opinion. At the end of the period of use, a form was sent to them to evaluate the level of satisfaction with the project, using the indicators that were established. The final level of satisfaction obtained was 81.39%, which indicates that the project has been successful according to the evaluation of the security experts.Revisión por paresODS 9: Industria, Innovación e InfraestructuraODS 12: Producción y Consumo ResponsablesODS 16: Paz, Justicia e Instituciones Sólidasapplication/htmlengInstitute of Electrical and Electronics Engineers Inc.info:eu-repo/semantics/embargoedAccessRepositorio Academico - UPCUniversidad Peruana de Ciencias Aplicadas (UPC)Proceedings of the 2023 IEEE 30th International Conference on Electronics, Electrical Engineering and Computing, INTERCON 2023reponame:UPC-Institucionalinstname:Universidad Peruana de Ciencias Aplicadasinstacron:UPCevaluationmaturity modelNISTresponse protocolsMaturity model for data leakage security protocols in telecommunications companies applying the NIST frameworkinfo:eu-repo/semantics/articleLICENSElicense.txtlicense.txttext/plain; charset=utf-81748https://repositorioacademico.upc.edu.pe/bitstream/10757/673091/1/license.txt8a4605be74aa9ea9d79846c1fba20a33MD51false10757/673091oai:repositorioacademico.upc.edu.pe:10757/6730912024-07-20 04:32:10.596Repositorio académico upcupc@openrepository.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
score 13.377112
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).