Method for Designing Countermeasures for Crypto-Ransomware Based on the NIST CSF
Descripción del Articulo
El texto completo de este trabajo no está disponible en el Repositorio Académico UPC por restricciones de la casa editorial donde ha sido publicado.
| Autores: | , , |
|---|---|
| Formato: | artículo |
| Fecha de Publicación: | 2021 |
| Institución: | Universidad Peruana de Ciencias Aplicadas |
| Repositorio: | UPC-Institucional |
| Lenguaje: | inglés |
| OAI Identifier: | oai:repositorioacademico.upc.edu.pe:10757/657880 |
| Enlace del recurso: | http://hdl.handle.net/10757/657880 |
| Nivel de acceso: | acceso embargado |
| Materia: | Crypto-ransomware Cybersecurity Method NIST Security Policies |
| id |
UUPC_197119b3f5ed0f53ff7db3456b2bce81 |
|---|---|
| oai_identifier_str |
oai:repositorioacademico.upc.edu.pe:10757/657880 |
| network_acronym_str |
UUPC |
| network_name_str |
UPC-Institucional |
| repository_id_str |
2670 |
| dc.title.es_PE.fl_str_mv |
Method for Designing Countermeasures for Crypto-Ransomware Based on the NIST CSF |
| title |
Method for Designing Countermeasures for Crypto-Ransomware Based on the NIST CSF |
| spellingShingle |
Method for Designing Countermeasures for Crypto-Ransomware Based on the NIST CSF Torres-Calderon, Hector Crypto-ransomware Cybersecurity Method NIST Security Policies |
| title_short |
Method for Designing Countermeasures for Crypto-Ransomware Based on the NIST CSF |
| title_full |
Method for Designing Countermeasures for Crypto-Ransomware Based on the NIST CSF |
| title_fullStr |
Method for Designing Countermeasures for Crypto-Ransomware Based on the NIST CSF |
| title_full_unstemmed |
Method for Designing Countermeasures for Crypto-Ransomware Based on the NIST CSF |
| title_sort |
Method for Designing Countermeasures for Crypto-Ransomware Based on the NIST CSF |
| author |
Torres-Calderon, Hector |
| author_facet |
Torres-Calderon, Hector Velasquez, Marco Mauricio, David |
| author_role |
author |
| author2 |
Velasquez, Marco Mauricio, David |
| author2_role |
author author |
| dc.contributor.author.fl_str_mv |
Torres-Calderon, Hector Velasquez, Marco Mauricio, David |
| dc.subject.es_PE.fl_str_mv |
Crypto-ransomware Cybersecurity Method NIST Security Policies |
| topic |
Crypto-ransomware Cybersecurity Method NIST Security Policies |
| description |
El texto completo de este trabajo no está disponible en el Repositorio Académico UPC por restricciones de la casa editorial donde ha sido publicado. |
| publishDate |
2021 |
| dc.date.accessioned.none.fl_str_mv |
2021-11-02T16:38:20Z |
| dc.date.available.none.fl_str_mv |
2021-11-02T16:38:20Z |
| dc.date.issued.fl_str_mv |
2022-01-01 |
| dc.type.es_PE.fl_str_mv |
info:eu-repo/semantics/article |
| format |
article |
| dc.identifier.issn.none.fl_str_mv |
21903018 |
| dc.identifier.doi.none.fl_str_mv |
10.1007/978-981-16-3637-0_26 |
| dc.identifier.uri.none.fl_str_mv |
http://hdl.handle.net/10757/657880 |
| dc.identifier.eissn.none.fl_str_mv |
21903026 |
| dc.identifier.journal.es_PE.fl_str_mv |
Smart Innovation, Systems and Technologies |
| dc.identifier.eid.none.fl_str_mv |
2-s2.0-85116922763 |
| dc.identifier.scopusid.none.fl_str_mv |
SCOPUS_ID:85116922763 |
| dc.identifier.isni.none.fl_str_mv |
0000 0001 2196 144X |
| identifier_str_mv |
21903018 10.1007/978-981-16-3637-0_26 21903026 Smart Innovation, Systems and Technologies 2-s2.0-85116922763 SCOPUS_ID:85116922763 0000 0001 2196 144X |
| url |
http://hdl.handle.net/10757/657880 |
| dc.language.iso.es_PE.fl_str_mv |
eng |
| language |
eng |
| dc.relation.url.es_PE.fl_str_mv |
https://link.springer.com/chapter/10.1007/978-981-16-3637-0_26 |
| dc.rights.es_PE.fl_str_mv |
info:eu-repo/semantics/embargoedAccess |
| eu_rights_str_mv |
embargoedAccess |
| dc.format.es_PE.fl_str_mv |
application/html |
| dc.publisher.es_PE.fl_str_mv |
Springer Science and Business Media Deutschland GmbH |
| dc.source.none.fl_str_mv |
reponame:UPC-Institucional instname:Universidad Peruana de Ciencias Aplicadas instacron:UPC |
| instname_str |
Universidad Peruana de Ciencias Aplicadas |
| instacron_str |
UPC |
| institution |
UPC |
| reponame_str |
UPC-Institucional |
| collection |
UPC-Institucional |
| dc.source.journaltitle.none.fl_str_mv |
Smart Innovation, Systems and Technologies |
| dc.source.volume.none.fl_str_mv |
237 |
| dc.source.beginpage.none.fl_str_mv |
365 |
| dc.source.endpage.none.fl_str_mv |
380 |
| bitstream.url.fl_str_mv |
https://repositorioacademico.upc.edu.pe/bitstream/10757/657880/1/license.txt |
| bitstream.checksum.fl_str_mv |
8a4605be74aa9ea9d79846c1fba20a33 |
| bitstream.checksumAlgorithm.fl_str_mv |
MD5 |
| repository.name.fl_str_mv |
Repositorio académico upc |
| repository.mail.fl_str_mv |
upc@openrepository.com |
| _version_ |
1846065782450028544 |
| spelling |
d294483047c0c5a103c831695e9829e4ad43c604ff007d672969bcc02054b58bc63d9ae1b7e9e0a8b9f5fffff3be59c0Torres-Calderon, HectorVelasquez, MarcoMauricio, David2021-11-02T16:38:20Z2021-11-02T16:38:20Z2022-01-012190301810.1007/978-981-16-3637-0_26http://hdl.handle.net/10757/65788021903026Smart Innovation, Systems and Technologies2-s2.0-85116922763SCOPUS_ID:851169227630000 0001 2196 144XEl texto completo de este trabajo no está disponible en el Repositorio Académico UPC por restricciones de la casa editorial donde ha sido publicado.Crypto-ransomware are malicious programs that encrypt the data of an infected machine, making it a hostage until the owner of the device decides to pay the fee to recover their information. This has become a complex cybersecurity problem causing more and more economic damage. Crypto-ransomware has rendered cybersecurity models not adequate since they do not establish specific guidelines for the design of countermeasures. This paper proposes a method for the design of countermeasures related to crypto-ransomware attacks based on the NIST 800–53 revision 4 standard and the Information Security Maturity Model published by ISACA in the COBIT Focus magazine. The model consists of five phases: identify vulnerabilities, assess vulnerabilities, propose countermeasures, implement countermeasures, and evaluate countermeasures. This allows an organization to measure its current cybersecurity state, know cybersecurity measures oriented to crypto-ransomware and its prioritization through criticality indexes in a simple, adaptive and easy to implement way. A case study in a Peruvian company shows the simplicity and ease of use of the method, which allows the design of countermeasures with which the level of cybersecurity can be improved by 55.6%.application/htmlengSpringer Science and Business Media Deutschland GmbHhttps://link.springer.com/chapter/10.1007/978-981-16-3637-0_26info:eu-repo/semantics/embargoedAccessCrypto-ransomwareCybersecurityMethodNISTSecurity PoliciesMethod for Designing Countermeasures for Crypto-Ransomware Based on the NIST CSFinfo:eu-repo/semantics/articleSmart Innovation, Systems and Technologies237365380reponame:UPC-Institucionalinstname:Universidad Peruana de Ciencias Aplicadasinstacron:UPCLICENSElicense.txtlicense.txttext/plain; charset=utf-81748https://repositorioacademico.upc.edu.pe/bitstream/10757/657880/1/license.txt8a4605be74aa9ea9d79846c1fba20a33MD51false10757/657880oai:repositorioacademico.upc.edu.pe:10757/6578802021-11-02 16:38:20.972Repositorio académico upcupc@openrepository.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 |
| score |
13.987519 |
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).