Basic cybersecurity protocol for SMES
Descripción del Articulo
Movement restrictions imposed by governments during the COVID-19 pandemic have changed consumption patterns and the way of doing business, forcing small and medium-sized companies to migrate their businesses to electronic media. Similarly, crime increased its participation in cyberspace, exploiting...
Autores: | , |
---|---|
Formato: | artículo |
Fecha de Publicación: | 2022 |
Institución: | Universidad de Lima |
Repositorio: | Revistas - Universidad de Lima |
Lenguaje: | español |
OAI Identifier: | oai:revistas.ulima.edu.pe:article/6021 |
Enlace del recurso: | https://revistas.ulima.edu.pe/index.php/Interfases/article/view/6021 |
Nivel de acceso: | acceso abierto |
Materia: | cybersecurity SME ICT protocol ciberseguridad pymes TIC protocolo |
id |
REVULIMA_f493cbc56e3f12d89da271bcf0b22e45 |
---|---|
oai_identifier_str |
oai:revistas.ulima.edu.pe:article/6021 |
network_acronym_str |
REVULIMA |
network_name_str |
Revistas - Universidad de Lima |
repository_id_str |
|
spelling |
Basic cybersecurity protocol for SMESProtocolo básico de ciberseguridad para pymesBustillos Ortega, OldaRojas Segura, JaviercybersecuritySMEICTprotocolciberseguridadpymesTICprotocoloMovement restrictions imposed by governments during the COVID-19 pandemic have changed consumption patterns and the way of doing business, forcing small and medium-sized companies to migrate their businesses to electronic media. Similarly, crime increased its participation in cyberspace, exploiting the vulnerability of these companies due to their dependence on digital technologies and the lack of resources for effective management of data integrity, confidentiality, and availability. Therefore, it is necessary to sensitize small and medium- sized companies about the importance of cybersecurity and prepare them not only to defend themselves against cyberattacks but also for a quick and timely recovery from possible incidents. The objective of this study is to propose a basic cybersecurity protocol as the primary defense strategy against cyberattacks, which allows business continuity in the event of a cyberattack. Academic publications, theses, technical standards, and practical guides examined in the current global threats context were the protocol’s basis. Small and medium-sized companies perceive cybersecurity as too complex and onerous; thus, they require economical, effective, and accessible solutions.Las restricciones de circulación impuestas por los gobiernos durante la pandemia del COVID-19 modificaron los patrones de consumo y la forma de hacer negocios, obligando a las pequeñas y medianas empresas a migrar a medios electrónicos para no perecer. Del mismo modo, la delincuencia incrementó su participación en el ciberespacio, explotando la vulnerabilidad de estas empresas por su dependencia de las tecnologías digitales y la falta de recursos para un manejo efectivo de la integridad, confidencialidad y disponibilidad de los datos. Por tanto, es necesario sensibilizar a las pequeñas y medianas empresas sobre la importancia de la ciberseguridad y prepararlas no solo para defenderse contra un ciberataque, sino también para una rápida y oportuna recuperación ante un posible incidente. El objetivo de esta investigación es proponer un protocolo básico de ciberseguridad, como principal estrategia de defensa contra ciberataques, que permita la continuidad del negocio en caso de un ataque cibernético. El protocolo se construye a partir de publicaciones académicas, tesis, normas técnicas y guías prácticas, examinadas en el contexto actual de las amenazas globales. La ciberseguridad es percibida por las pequeñas y medianas empresas como demasiado compleja y onerosa, por lo que se requieren soluciones económicas, efectivas y accesibles.Universidad de Lima2022-12-23info:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionapplication/pdftext/htmlhttps://revistas.ulima.edu.pe/index.php/Interfases/article/view/602110.26439/interfases2022.n016.6021Interfases; No. 016 (2022); 168-186Interfases; Núm. 016 (2022); 168-186Interfases; n. 016 (2022); 168-1861993-491210.26439/interfases2022.n016reponame:Revistas - Universidad de Limainstname:Universidad de Limainstacron:ULIMAspahttps://revistas.ulima.edu.pe/index.php/Interfases/article/view/6021/6043https://revistas.ulima.edu.pe/index.php/Interfases/article/view/6021/6061Derechos de autor 2022 Interfaseshttps://creativecommons.org/licenses/by/4.0info:eu-repo/semantics/openAccessoai:revistas.ulima.edu.pe:article/60212023-07-24T13:33:28Z |
dc.title.none.fl_str_mv |
Basic cybersecurity protocol for SMES Protocolo básico de ciberseguridad para pymes |
title |
Basic cybersecurity protocol for SMES |
spellingShingle |
Basic cybersecurity protocol for SMES Bustillos Ortega, Olda cybersecurity SME ICT protocol ciberseguridad pymes TIC protocolo |
title_short |
Basic cybersecurity protocol for SMES |
title_full |
Basic cybersecurity protocol for SMES |
title_fullStr |
Basic cybersecurity protocol for SMES |
title_full_unstemmed |
Basic cybersecurity protocol for SMES |
title_sort |
Basic cybersecurity protocol for SMES |
dc.creator.none.fl_str_mv |
Bustillos Ortega, Olda Rojas Segura, Javier |
author |
Bustillos Ortega, Olda |
author_facet |
Bustillos Ortega, Olda Rojas Segura, Javier |
author_role |
author |
author2 |
Rojas Segura, Javier |
author2_role |
author |
dc.subject.none.fl_str_mv |
cybersecurity SME ICT protocol ciberseguridad pymes TIC protocolo |
topic |
cybersecurity SME ICT protocol ciberseguridad pymes TIC protocolo |
description |
Movement restrictions imposed by governments during the COVID-19 pandemic have changed consumption patterns and the way of doing business, forcing small and medium-sized companies to migrate their businesses to electronic media. Similarly, crime increased its participation in cyberspace, exploiting the vulnerability of these companies due to their dependence on digital technologies and the lack of resources for effective management of data integrity, confidentiality, and availability. Therefore, it is necessary to sensitize small and medium- sized companies about the importance of cybersecurity and prepare them not only to defend themselves against cyberattacks but also for a quick and timely recovery from possible incidents. The objective of this study is to propose a basic cybersecurity protocol as the primary defense strategy against cyberattacks, which allows business continuity in the event of a cyberattack. Academic publications, theses, technical standards, and practical guides examined in the current global threats context were the protocol’s basis. Small and medium-sized companies perceive cybersecurity as too complex and onerous; thus, they require economical, effective, and accessible solutions. |
publishDate |
2022 |
dc.date.none.fl_str_mv |
2022-12-23 |
dc.type.none.fl_str_mv |
info:eu-repo/semantics/article info:eu-repo/semantics/publishedVersion |
format |
article |
status_str |
publishedVersion |
dc.identifier.none.fl_str_mv |
https://revistas.ulima.edu.pe/index.php/Interfases/article/view/6021 10.26439/interfases2022.n016.6021 |
url |
https://revistas.ulima.edu.pe/index.php/Interfases/article/view/6021 |
identifier_str_mv |
10.26439/interfases2022.n016.6021 |
dc.language.none.fl_str_mv |
spa |
language |
spa |
dc.relation.none.fl_str_mv |
https://revistas.ulima.edu.pe/index.php/Interfases/article/view/6021/6043 https://revistas.ulima.edu.pe/index.php/Interfases/article/view/6021/6061 |
dc.rights.none.fl_str_mv |
Derechos de autor 2022 Interfases https://creativecommons.org/licenses/by/4.0 info:eu-repo/semantics/openAccess |
rights_invalid_str_mv |
Derechos de autor 2022 Interfases https://creativecommons.org/licenses/by/4.0 |
eu_rights_str_mv |
openAccess |
dc.format.none.fl_str_mv |
application/pdf text/html |
dc.publisher.none.fl_str_mv |
Universidad de Lima |
publisher.none.fl_str_mv |
Universidad de Lima |
dc.source.none.fl_str_mv |
Interfases; No. 016 (2022); 168-186 Interfases; Núm. 016 (2022); 168-186 Interfases; n. 016 (2022); 168-186 1993-4912 10.26439/interfases2022.n016 reponame:Revistas - Universidad de Lima instname:Universidad de Lima instacron:ULIMA |
instname_str |
Universidad de Lima |
instacron_str |
ULIMA |
institution |
ULIMA |
reponame_str |
Revistas - Universidad de Lima |
collection |
Revistas - Universidad de Lima |
repository.name.fl_str_mv |
|
repository.mail.fl_str_mv |
|
_version_ |
1841719310378074112 |
score |
12.851645 |
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).