Maturity model for data leakage security protocols in telecommunications companies applying the NIST framework

Descripción del Articulo

Attacks on information security and data leaks in telecommunications companies in Peru cause considerable losses both financially and in terms of social reputation. For this reason, response protocols have been implemented to deal with these situations. However, the mere implementation and developme...

Descripción completa

Detalles Bibliográficos
Autores: Leon, Solis, Joel, Brian, Jara, Di Paola, Giovanni, Renzo, Cornejo, Copaja, Nivaldo, Richard
Formato: artículo
Fecha de Publicación:2023
Institución:Universidad Peruana de Ciencias Aplicadas
Repositorio:UPC-Institucional
Lenguaje:inglés
OAI Identifier:oai:repositorioacademico.upc.edu.pe:10757/673091
Enlace del recurso:http://hdl.handle.net/10757/673091
Nivel de acceso:acceso embargado
Materia:evaluation
maturity model
NIST
response protocols
Descripción
Sumario:Attacks on information security and data leaks in telecommunications companies in Peru cause considerable losses both financially and in terms of social reputation. For this reason, response protocols have been implemented to deal with these situations. However, the mere implementation and development of these protocols is not enough to effectively prevent or counter attacks. Therefore, a technological solution is proposed that combines a maturity assessment model for protocols and a reporting system that provides information on the current level and possible improvements that can be applied to the assessed protocols. The project aims to reduce attacks on companies in the telecommunications sector and at the same time enable them to assess the state of their protocols in terms of cybersecurity, giving them greater insight into possible situations that could result from protocol misuse. To validate the project, 4 cybersecurity experts were involved, who have used it for a given period to obtain sufficient information to offer their opinion. At the end of the period of use, a form was sent to them to evaluate the level of satisfaction with the project, using the indicators that were established. The final level of satisfaction obtained was 81.39%, which indicates that the project has been successful according to the evaluation of the security experts.
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).