Maturity Model of Response Protocols to Ransomware Scenarios in the Mining Sector

Descripción del Articulo

The Maturity Model for Defense Protocols against Ransomware Scenarios in the mining sector is a useful tool to assess an organization’s level of preparedness against ransomware attacks and design effective strategies to mitigate their impacts. This model, based on the NIST methodology and the ISO 27...

Descripción completa

Detalles Bibliográficos
Autores: Gomez, Brignith, Vargas, Saul, Mansilla, Juan Pablo
Formato: artículo
Fecha de Publicación:2024
Institución:Universidad Peruana de Ciencias Aplicadas
Repositorio:UPC-Institucional
Lenguaje:inglés
OAI Identifier:oai:repositorioacademico.upc.edu.pe:10757/676012
Enlace del recurso:http://hdl.handle.net/10757/676012
Nivel de acceso:acceso embargado
Materia:cybersecurity
defense
maturity model
protocol
ransomware
id UUPC_42d18b034969a8fe716dbc09c287a67d
oai_identifier_str oai:repositorioacademico.upc.edu.pe:10757/676012
network_acronym_str UUPC
network_name_str UPC-Institucional
repository_id_str 2670
dc.title.es_PE.fl_str_mv Maturity Model of Response Protocols to Ransomware Scenarios in the Mining Sector
title Maturity Model of Response Protocols to Ransomware Scenarios in the Mining Sector
spellingShingle Maturity Model of Response Protocols to Ransomware Scenarios in the Mining Sector
Gomez, Brignith
cybersecurity
defense
maturity model
protocol
ransomware
title_short Maturity Model of Response Protocols to Ransomware Scenarios in the Mining Sector
title_full Maturity Model of Response Protocols to Ransomware Scenarios in the Mining Sector
title_fullStr Maturity Model of Response Protocols to Ransomware Scenarios in the Mining Sector
title_full_unstemmed Maturity Model of Response Protocols to Ransomware Scenarios in the Mining Sector
title_sort Maturity Model of Response Protocols to Ransomware Scenarios in the Mining Sector
author Gomez, Brignith
author_facet Gomez, Brignith
Vargas, Saul
Mansilla, Juan Pablo
author_role author
author2 Vargas, Saul
Mansilla, Juan Pablo
author2_role author
author
dc.contributor.author.fl_str_mv Gomez, Brignith
Vargas, Saul
Mansilla, Juan Pablo
dc.subject.es_PE.fl_str_mv cybersecurity
defense
maturity model
protocol
ransomware
topic cybersecurity
defense
maturity model
protocol
ransomware
description The Maturity Model for Defense Protocols against Ransomware Scenarios in the mining sector is a useful tool to assess an organization’s level of preparedness against ransomware attacks and design effective strategies to mitigate their impacts. This model, based on the NIST methodology and the ISO 27001 AND 27002 Standards, and the experience of cybersecurity experts, consists of five levels of maturity that go from initial adoption to defense optimization. The Initial level focuses on risk awareness and basic preparation. The Managed level focuses on the protection of critical data and systems, while the Defined level, focuses on early detection and response to incidents. The Managed level seeks response automation and collaboration with third parties, while Optimized level, focuses on continuous improvement and innovation. For each level, achieve the characteristics and objectives allow organizations to assess their current position and establish action plans to improve their readiness. Some recommended best practices include ongoing employee training, implementing technical security measures, conducting incident simulations, adopting backup and recovery solutions, and collaborating with cybersecurity service providers. In summary, the Maturity Model for Ransomware Defense Protocols is a valuable tool to help organizations improve their ability to resist and recover from ransomware attacks. Its focus on best practices and continuous improvement makes it a reference in the field of cybersecurity.
publishDate 2024
dc.date.accessioned.none.fl_str_mv 2024-10-06T03:15:38Z
dc.date.available.none.fl_str_mv 2024-10-06T03:15:38Z
dc.date.issued.fl_str_mv 2024-01-01
dc.type.es_PE.fl_str_mv info:eu-repo/semantics/article
format article
dc.identifier.issn.none.fl_str_mv 18650929
dc.identifier.doi.none.fl_str_mv 10.1007/978-3-031-48855-9_20
dc.identifier.uri.none.fl_str_mv http://hdl.handle.net/10757/676012
dc.identifier.eissn.none.fl_str_mv 18650937
dc.identifier.journal.es_PE.fl_str_mv Communications in Computer and Information Science
dc.identifier.eid.none.fl_str_mv 2-s2.0-85181978463
dc.identifier.scopusid.none.fl_str_mv SCOPUS_ID:85181978463
identifier_str_mv 18650929
10.1007/978-3-031-48855-9_20
18650937
Communications in Computer and Information Science
2-s2.0-85181978463
SCOPUS_ID:85181978463
url http://hdl.handle.net/10757/676012
dc.language.iso.es_PE.fl_str_mv eng
language eng
dc.rights.none.fl_str_mv info:eu-repo/semantics/embargoedAccess
eu_rights_str_mv embargoedAccess
dc.format.es_PE.fl_str_mv application/html
dc.publisher.es_PE.fl_str_mv Springer Science and Business Media Deutschland GmbH
dc.source.none.fl_str_mv reponame:UPC-Institucional
instname:Universidad Peruana de Ciencias Aplicadas
instacron:UPC
instname_str Universidad Peruana de Ciencias Aplicadas
instacron_str UPC
institution UPC
reponame_str UPC-Institucional
collection UPC-Institucional
dc.source.journaltitle.none.fl_str_mv Communications in Computer and Information Science
dc.source.volume.none.fl_str_mv 1936
dc.source.beginpage.none.fl_str_mv 264
dc.source.endpage.none.fl_str_mv 274
bitstream.url.fl_str_mv https://repositorioacademico.upc.edu.pe/bitstream/10757/676012/1/license.txt
bitstream.checksum.fl_str_mv 8a4605be74aa9ea9d79846c1fba20a33
bitstream.checksumAlgorithm.fl_str_mv MD5
repository.name.fl_str_mv Repositorio académico upc
repository.mail.fl_str_mv upc@openrepository.com
_version_ 1837187181277347840
spelling 0ff6912998efe470ac57c4b796ea6e17300e9022a9231663a4e8be211484f7644ff300bdbc32ed76a48b6165f7ff2019a1ce36500Gomez, BrignithVargas, SaulMansilla, Juan Pablo2024-10-06T03:15:38Z2024-10-06T03:15:38Z2024-01-011865092910.1007/978-3-031-48855-9_20http://hdl.handle.net/10757/67601218650937Communications in Computer and Information Science2-s2.0-85181978463SCOPUS_ID:85181978463The Maturity Model for Defense Protocols against Ransomware Scenarios in the mining sector is a useful tool to assess an organization’s level of preparedness against ransomware attacks and design effective strategies to mitigate their impacts. This model, based on the NIST methodology and the ISO 27001 AND 27002 Standards, and the experience of cybersecurity experts, consists of five levels of maturity that go from initial adoption to defense optimization. The Initial level focuses on risk awareness and basic preparation. The Managed level focuses on the protection of critical data and systems, while the Defined level, focuses on early detection and response to incidents. The Managed level seeks response automation and collaboration with third parties, while Optimized level, focuses on continuous improvement and innovation. For each level, achieve the characteristics and objectives allow organizations to assess their current position and establish action plans to improve their readiness. Some recommended best practices include ongoing employee training, implementing technical security measures, conducting incident simulations, adopting backup and recovery solutions, and collaborating with cybersecurity service providers. In summary, the Maturity Model for Ransomware Defense Protocols is a valuable tool to help organizations improve their ability to resist and recover from ransomware attacks. Its focus on best practices and continuous improvement makes it a reference in the field of cybersecurity.application/htmlengSpringer Science and Business Media Deutschland GmbHinfo:eu-repo/semantics/embargoedAccesscybersecuritydefensematurity modelprotocolransomwareMaturity Model of Response Protocols to Ransomware Scenarios in the Mining Sectorinfo:eu-repo/semantics/articleCommunications in Computer and Information Science1936264274reponame:UPC-Institucionalinstname:Universidad Peruana de Ciencias Aplicadasinstacron:UPCLICENSElicense.txtlicense.txttext/plain; charset=utf-81748https://repositorioacademico.upc.edu.pe/bitstream/10757/676012/1/license.txt8a4605be74aa9ea9d79846c1fba20a33MD51false10757/676012oai:repositorioacademico.upc.edu.pe:10757/6760122024-10-06 10:48:55.318Repositorio académico upcupc@openrepository.comTk9URTogUExBQ0UgWU9VUiBPV04gTElDRU5TRSBIRVJFClRoaXMgc2FtcGxlIGxpY2Vuc2UgaXMgcHJvdmlkZWQgZm9yIGluZm9ybWF0aW9uYWwgcHVycG9zZXMgb25seS4KCk5PTi1FWENMVVNJVkUgRElTVFJJQlVUSU9OIExJQ0VOU0UKCkJ5IHNpZ25pbmcgYW5kIHN1Ym1pdHRpbmcgdGhpcyBsaWNlbnNlLCB5b3UgKHRoZSBhdXRob3Iocykgb3IgY29weXJpZ2h0Cm93bmVyKSBncmFudHMgdG8gRFNwYWNlIFVuaXZlcnNpdHkgKERTVSkgdGhlIG5vbi1leGNsdXNpdmUgcmlnaHQgdG8gcmVwcm9kdWNlLAp0cmFuc2xhdGUgKGFzIGRlZmluZWQgYmVsb3cpLCBhbmQvb3IgZGlzdHJpYnV0ZSB5b3VyIHN1Ym1pc3Npb24gKGluY2x1ZGluZwp0aGUgYWJzdHJhY3QpIHdvcmxkd2lkZSBpbiBwcmludCBhbmQgZWxlY3Ryb25pYyBmb3JtYXQgYW5kIGluIGFueSBtZWRpdW0sCmluY2x1ZGluZyBidXQgbm90IGxpbWl0ZWQgdG8gYXVkaW8gb3IgdmlkZW8uCgpZb3UgYWdyZWUgdGhhdCBEU1UgbWF5LCB3aXRob3V0IGNoYW5naW5nIHRoZSBjb250ZW50LCB0cmFuc2xhdGUgdGhlCnN1Ym1pc3Npb24gdG8gYW55IG1lZGl1bSBvciBmb3JtYXQgZm9yIHRoZSBwdXJwb3NlIG9mIHByZXNlcnZhdGlvbi4KCllvdSBhbHNvIGFncmVlIHRoYXQgRFNVIG1heSBrZWVwIG1vcmUgdGhhbiBvbmUgY29weSBvZiB0aGlzIHN1Ym1pc3Npb24gZm9yCnB1cnBvc2VzIG9mIHNlY3VyaXR5LCBiYWNrLXVwIGFuZCBwcmVzZXJ2YXRpb24uCgpZb3UgcmVwcmVzZW50IHRoYXQgdGhlIHN1Ym1pc3Npb24gaXMgeW91ciBvcmlnaW5hbCB3b3JrLCBhbmQgdGhhdCB5b3UgaGF2ZQp0aGUgcmlnaHQgdG8gZ3JhbnQgdGhlIHJpZ2h0cyBjb250YWluZWQgaW4gdGhpcyBsaWNlbnNlLiBZb3UgYWxzbyByZXByZXNlbnQKdGhhdCB5b3VyIHN1Ym1pc3Npb24gZG9lcyBub3QsIHRvIHRoZSBiZXN0IG9mIHlvdXIga25vd2xlZGdlLCBpbmZyaW5nZSB1cG9uCmFueW9uZSdzIGNvcHlyaWdodC4KCklmIHRoZSBzdWJtaXNzaW9uIGNvbnRhaW5zIG1hdGVyaWFsIGZvciB3aGljaCB5b3UgZG8gbm90IGhvbGQgY29weXJpZ2h0LAp5b3UgcmVwcmVzZW50IHRoYXQgeW91IGhhdmUgb2J0YWluZWQgdGhlIHVucmVzdHJpY3RlZCBwZXJtaXNzaW9uIG9mIHRoZQpjb3B5cmlnaHQgb3duZXIgdG8gZ3JhbnQgRFNVIHRoZSByaWdodHMgcmVxdWlyZWQgYnkgdGhpcyBsaWNlbnNlLCBhbmQgdGhhdApzdWNoIHRoaXJkLXBhcnR5IG93bmVkIG1hdGVyaWFsIGlzIGNsZWFybHkgaWRlbnRpZmllZCBhbmQgYWNrbm93bGVkZ2VkCndpdGhpbiB0aGUgdGV4dCBvciBjb250ZW50IG9mIHRoZSBzdWJtaXNzaW9uLgoKSUYgVEhFIFNVQk1JU1NJT04gSVMgQkFTRUQgVVBPTiBXT1JLIFRIQVQgSEFTIEJFRU4gU1BPTlNPUkVEIE9SIFNVUFBPUlRFRApCWSBBTiBBR0VOQ1kgT1IgT1JHQU5JWkFUSU9OIE9USEVSIFRIQU4gRFNVLCBZT1UgUkVQUkVTRU5UIFRIQVQgWU9VIEhBVkUKRlVMRklMTEVEIEFOWSBSSUdIVCBPRiBSRVZJRVcgT1IgT1RIRVIgT0JMSUdBVElPTlMgUkVRVUlSRUQgQlkgU1VDSApDT05UUkFDVCBPUiBBR1JFRU1FTlQuCgpEU1Ugd2lsbCBjbGVhcmx5IGlkZW50aWZ5IHlvdXIgbmFtZShzKSBhcyB0aGUgYXV0aG9yKHMpIG9yIG93bmVyKHMpIG9mIHRoZQpzdWJtaXNzaW9uLCBhbmQgd2lsbCBub3QgbWFrZSBhbnkgYWx0ZXJhdGlvbiwgb3RoZXIgdGhhbiBhcyBhbGxvd2VkIGJ5IHRoaXMKbGljZW5zZSwgdG8geW91ciBzdWJtaXNzaW9uLgo=
score 13.958958
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).