Experimental Study based on the Implementation of a Regulatory Framework for the Improvement of Cyber Resilience in SMEs

Descripción del Articulo

Currently, applying regulations oriented to cybersecurity, cyber resilience is relevant to face the high rates of cyberattacks, which have caused an interruption in the operational processes of organizations, generating an economic loss, and affecting the continuity of their business processes on th...

Descripción completa

Detalles Bibliográficos
Autores: Rodriguez-Baca, Liset S., Allagi, Shridhar, Larrea-Serquen, Rosa, Cruzado, Carlos F., Alarcon Diaz, Mitchell, Garcia-Hernández, Sandra, Daza Monteiro, Julio
Formato: artículo
Fecha de Publicación:2023
Institución:Universidad Autónoma del Perú
Repositorio:AUTONOMA-Institucional
Lenguaje:inglés
OAI Identifier:oai:repositorio.autonoma.edu.pe:20.500.13067/2882
Enlace del recurso:https://hdl.handle.net/20.500.13067/2882
https://doi.org/10.17762/ijritcc.v11i3.6337
Nivel de acceso:acceso abierto
Materia:Cyber resilience
Cybersecurity
Business continuity
https://purl.org/pe-repo/ocde/ford#2.02.04
Descripción
Sumario:Currently, applying regulations oriented to cybersecurity, cyber resilience is relevant to face the high rates of cyberattacks, which have caused an interruption in the operational processes of organizations, generating an economic loss, and affecting the continuity of their business processes on the web. In this scenario, small and medium-sized enterprises (SMEs) are the most affected due to their weak technological infrastructure. Given this, this experimental study was developed to implement a regulatory framework for the improvement of cyber resilience; the criteria anticipate, resist, recover and evolve presented significant statistical values of improvement after the application of the experiment. This research contributes to counteract the refusal to use information technologies for business development; Improvement actions were carried out to face threats and computer vulnerabilities to which organizations are exposed when carrying out operations in cyberspace.
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).