Maturity Model of Response Protocols to Ransomware Scenarios in the Mining Sector
Descripción del Articulo
The Maturity Model for Defense Protocols against Ransomware Scenarios in the mining sector is a useful tool to assess an organization’s level of preparedness against ransomware attacks and design effective strategies to mitigate their impacts. This model, based on the NIST methodology and the ISO 27...
Autores: | , , |
---|---|
Formato: | artículo |
Fecha de Publicación: | 2024 |
Institución: | Universidad Peruana de Ciencias Aplicadas |
Repositorio: | UPC-Institucional |
Lenguaje: | inglés |
OAI Identifier: | oai:repositorioacademico.upc.edu.pe:10757/676012 |
Enlace del recurso: | http://hdl.handle.net/10757/676012 |
Nivel de acceso: | acceso embargado |
Materia: | cybersecurity defense maturity model protocol ransomware |
id |
UUPC_42d18b034969a8fe716dbc09c287a67d |
---|---|
oai_identifier_str |
oai:repositorioacademico.upc.edu.pe:10757/676012 |
network_acronym_str |
UUPC |
network_name_str |
UPC-Institucional |
repository_id_str |
2670 |
dc.title.es_PE.fl_str_mv |
Maturity Model of Response Protocols to Ransomware Scenarios in the Mining Sector |
title |
Maturity Model of Response Protocols to Ransomware Scenarios in the Mining Sector |
spellingShingle |
Maturity Model of Response Protocols to Ransomware Scenarios in the Mining Sector Gomez, Brignith cybersecurity defense maturity model protocol ransomware |
title_short |
Maturity Model of Response Protocols to Ransomware Scenarios in the Mining Sector |
title_full |
Maturity Model of Response Protocols to Ransomware Scenarios in the Mining Sector |
title_fullStr |
Maturity Model of Response Protocols to Ransomware Scenarios in the Mining Sector |
title_full_unstemmed |
Maturity Model of Response Protocols to Ransomware Scenarios in the Mining Sector |
title_sort |
Maturity Model of Response Protocols to Ransomware Scenarios in the Mining Sector |
author |
Gomez, Brignith |
author_facet |
Gomez, Brignith Vargas, Saul Mansilla, Juan Pablo |
author_role |
author |
author2 |
Vargas, Saul Mansilla, Juan Pablo |
author2_role |
author author |
dc.contributor.author.fl_str_mv |
Gomez, Brignith Vargas, Saul Mansilla, Juan Pablo |
dc.subject.es_PE.fl_str_mv |
cybersecurity defense maturity model protocol ransomware |
topic |
cybersecurity defense maturity model protocol ransomware |
description |
The Maturity Model for Defense Protocols against Ransomware Scenarios in the mining sector is a useful tool to assess an organization’s level of preparedness against ransomware attacks and design effective strategies to mitigate their impacts. This model, based on the NIST methodology and the ISO 27001 AND 27002 Standards, and the experience of cybersecurity experts, consists of five levels of maturity that go from initial adoption to defense optimization. The Initial level focuses on risk awareness and basic preparation. The Managed level focuses on the protection of critical data and systems, while the Defined level, focuses on early detection and response to incidents. The Managed level seeks response automation and collaboration with third parties, while Optimized level, focuses on continuous improvement and innovation. For each level, achieve the characteristics and objectives allow organizations to assess their current position and establish action plans to improve their readiness. Some recommended best practices include ongoing employee training, implementing technical security measures, conducting incident simulations, adopting backup and recovery solutions, and collaborating with cybersecurity service providers. In summary, the Maturity Model for Ransomware Defense Protocols is a valuable tool to help organizations improve their ability to resist and recover from ransomware attacks. Its focus on best practices and continuous improvement makes it a reference in the field of cybersecurity. |
publishDate |
2024 |
dc.date.accessioned.none.fl_str_mv |
2024-10-06T03:15:38Z |
dc.date.available.none.fl_str_mv |
2024-10-06T03:15:38Z |
dc.date.issued.fl_str_mv |
2024-01-01 |
dc.type.es_PE.fl_str_mv |
info:eu-repo/semantics/article |
format |
article |
dc.identifier.issn.none.fl_str_mv |
18650929 |
dc.identifier.doi.none.fl_str_mv |
10.1007/978-3-031-48855-9_20 |
dc.identifier.uri.none.fl_str_mv |
http://hdl.handle.net/10757/676012 |
dc.identifier.eissn.none.fl_str_mv |
18650937 |
dc.identifier.journal.es_PE.fl_str_mv |
Communications in Computer and Information Science |
dc.identifier.eid.none.fl_str_mv |
2-s2.0-85181978463 |
dc.identifier.scopusid.none.fl_str_mv |
SCOPUS_ID:85181978463 |
identifier_str_mv |
18650929 10.1007/978-3-031-48855-9_20 18650937 Communications in Computer and Information Science 2-s2.0-85181978463 SCOPUS_ID:85181978463 |
url |
http://hdl.handle.net/10757/676012 |
dc.language.iso.es_PE.fl_str_mv |
eng |
language |
eng |
dc.rights.none.fl_str_mv |
info:eu-repo/semantics/embargoedAccess |
eu_rights_str_mv |
embargoedAccess |
dc.format.es_PE.fl_str_mv |
application/html |
dc.publisher.es_PE.fl_str_mv |
Springer Science and Business Media Deutschland GmbH |
dc.source.none.fl_str_mv |
reponame:UPC-Institucional instname:Universidad Peruana de Ciencias Aplicadas instacron:UPC |
instname_str |
Universidad Peruana de Ciencias Aplicadas |
instacron_str |
UPC |
institution |
UPC |
reponame_str |
UPC-Institucional |
collection |
UPC-Institucional |
dc.source.journaltitle.none.fl_str_mv |
Communications in Computer and Information Science |
dc.source.volume.none.fl_str_mv |
1936 |
dc.source.beginpage.none.fl_str_mv |
264 |
dc.source.endpage.none.fl_str_mv |
274 |
bitstream.url.fl_str_mv |
https://repositorioacademico.upc.edu.pe/bitstream/10757/676012/1/license.txt |
bitstream.checksum.fl_str_mv |
8a4605be74aa9ea9d79846c1fba20a33 |
bitstream.checksumAlgorithm.fl_str_mv |
MD5 |
repository.name.fl_str_mv |
Repositorio académico upc |
repository.mail.fl_str_mv |
upc@openrepository.com |
_version_ |
1837187181277347840 |
spelling |
0ff6912998efe470ac57c4b796ea6e17300e9022a9231663a4e8be211484f7644ff300bdbc32ed76a48b6165f7ff2019a1ce36500Gomez, BrignithVargas, SaulMansilla, Juan Pablo2024-10-06T03:15:38Z2024-10-06T03:15:38Z2024-01-011865092910.1007/978-3-031-48855-9_20http://hdl.handle.net/10757/67601218650937Communications in Computer and Information Science2-s2.0-85181978463SCOPUS_ID:85181978463The Maturity Model for Defense Protocols against Ransomware Scenarios in the mining sector is a useful tool to assess an organization’s level of preparedness against ransomware attacks and design effective strategies to mitigate their impacts. This model, based on the NIST methodology and the ISO 27001 AND 27002 Standards, and the experience of cybersecurity experts, consists of five levels of maturity that go from initial adoption to defense optimization. The Initial level focuses on risk awareness and basic preparation. The Managed level focuses on the protection of critical data and systems, while the Defined level, focuses on early detection and response to incidents. The Managed level seeks response automation and collaboration with third parties, while Optimized level, focuses on continuous improvement and innovation. For each level, achieve the characteristics and objectives allow organizations to assess their current position and establish action plans to improve their readiness. Some recommended best practices include ongoing employee training, implementing technical security measures, conducting incident simulations, adopting backup and recovery solutions, and collaborating with cybersecurity service providers. In summary, the Maturity Model for Ransomware Defense Protocols is a valuable tool to help organizations improve their ability to resist and recover from ransomware attacks. Its focus on best practices and continuous improvement makes it a reference in the field of cybersecurity.application/htmlengSpringer Science and Business Media Deutschland GmbHinfo:eu-repo/semantics/embargoedAccesscybersecuritydefensematurity modelprotocolransomwareMaturity Model of Response Protocols to Ransomware Scenarios in the Mining Sectorinfo:eu-repo/semantics/articleCommunications in Computer and Information Science1936264274reponame:UPC-Institucionalinstname:Universidad Peruana de Ciencias Aplicadasinstacron:UPCLICENSElicense.txtlicense.txttext/plain; charset=utf-81748https://repositorioacademico.upc.edu.pe/bitstream/10757/676012/1/license.txt8a4605be74aa9ea9d79846c1fba20a33MD51false10757/676012oai:repositorioacademico.upc.edu.pe:10757/6760122024-10-06 10:48:55.318Repositorio académico upcupc@openrepository.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 |
score |
13.958958 |
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).