La importancia del componente educativo en toda estrategia de Ciberseguridad

  1. Cayón Peña, Juan 1
  2. García Segura, Luis A. 1
  1. 1 Universidad Nebrija
    info

    Universidad Nebrija

    Madrid, España

    ROR https://ror.org/03tzyrt94

Journal:
Estudios en Seguridad y Defensa

ISSN: 2744-8932

Year of publication: 2014

Volume: 9

Issue: 18

Pages: 5-13

Type: Article

DOI: 10.25062/1900-8325.9 DIALNET GOOGLE SCHOLAR lock_openOpen access editor

More publications in: Estudios en Seguridad y Defensa

Sustainable development goals

Abstract

Este artículo pretende estudiar las principales Estrategias de ciberseguridad publicadas hasta el momento, prestando especial atención al componente educativo de las mismas. A partir de este análisis hacemos una serie de recomendaciones de cara al diseño e implementación de acciones educativas relativas a la ciberseguridad. Concluimos que la coordinación entre el sector público y privado, entre los estamentos militares y de los cuerpos de seguridad de un lado y la sociedad civil a la que sirven de otro, es vital para el desarrollo e impartición de un currículo apropiado sobre ciberseguridad en todos los niveles educativos.

Bibliographic References

  • Agence Nationale de la Sécurité des Systèmes d'Information. (2011). Information systems defence and security. France's strategy. Recuperado de: http://www.ssi.gouv.fr/IMG/pdf/2011-02-15_Information_system_defence_and_security_-_France_s_strategy.pdf
  • Australian Government. (2009). Cyber Security Strategy.
  • Backstrom, A. & Henderson, I. (2012). Surgimiento de nuevas capacidades de combate: los avances tecnológicos contemporáneos y los desafíos jurídicos y técnicos que plantea el examen previsto en el artículo 36 del Protocolo I. International Review of the Red Cross, 94(886).
  • Baldwin, A. & Palfreyman, J. (2009). Cyber defense: Understanding and combating the threat. Nueva York: IBM Corporation.
  • Bundesministerium Für Inneres. (2013). Austrian Cyber Security Strategy. Vienna: Republik Österreich. Recuperado de: https://www.bka.gv.at/DocView.axd?CobId=50999
  • CCDCOE. (2015). Cyber Security Strategy Documents. NATO Cooperative Cyber Defence Centre of Excellence.
  • CSC. (s.f.). Education and Development Overview. Cyber Security Challenge UK.
  • Denmark Government. (2012). Danish Defence Agreement 2013-2017. Recuperado de: http://www.fmn.dk/eng/allabout/Documents/TheDanishDefenceAgrement2013-2017englishversion.pdf
  • Droege, C. (2012). Get off my cloud: cyber warfare, international humanitarian law, and the protection of civilians. International Review of the RedCross, 94(886), pp.533-578. https://doi.org/10.1017/S1816383113000246
  • European Union Agency for Network and Information Security. (2012). National Cyber Security Strategies. Bruselas: European Network and Information Security Agency.
  • European Union Agency for Network and Information Security. (2014). Public Private Partnerships in Network and Information Security Education. Bruselas: European Network and Information Security Agency.
  • Government of Hungary. (2013). Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary. Recuperado de: http://www.nbf.hu/anyagok/Government%20Decision%20No%201139_2013%20on%20the%20National%20Cyber%20Security%20Strategy%20of%20Hungary.docx
  • Klimburg, A. (Ed.). (2012). National Cyber Security Framework Manual. Tallinn: NATO CCD COE Publication.
  • Lin, H. (2012). Cyber conflict and international humanitarian law. International Review of the RedCross, 94(886), 515-531. https://doi.org/10.1017/S1816383112000811
  • Ministry of Information and Communications Technology. (2012). National Information Assurance and Cyber Security Strategy -NIACSS-.
  • Ministry of Security and Justice. (2011). The National Cyber Security Strategy (NCSS). Recuperado de "http://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-security-strategies-ncsss/Netherlands_Cyber_Security_strategy.pdf
  • National center of Incident readiness and Strategy for Cybersecurity. (2013, June, 10). Cybersecurity Strategy: Towards a world-leading, resilient and vigorous cyberspace. Recuperado de: http:// http://www.nisc.go.jp/active/kihon/pdf/cybersecuritystrategy-en.pdf
  • National Security and Intelligence. (2011). The UK Cyber SecurityStrategy. Protecting and promoting the UK in a digital world. Recuperado de:http://www.gov.uk/government/publications/cyber-security-strategy
  • NICCS. (s.f.). National Initiative For Cybersecurity Careers and Studies. Department of Homeland Security. Recuperado de http://niccs.us-cert.gov/
  • NICE. (s.f.). National Initiative For Cybersecurity Education (NICE). National Initiative For Cybersecurity Education. Recuperado de http://csrc.nist.gov/nice/index.htm
  • Rappert, B., Moyes, R., Crowe, A., & Nash, T. (2012). The roles of civil society in the development of standards around new weapons and other technologies of warfare. International Review of the Red Cross, 94(886) 765-785. https://doi.org/10.1017/S1816383112000744
  • Shaw, L. (2014, December, 18). Sony's Costs From 'The Interview' Seen Near US$200 Million. Bloomberg Business. Recuperado de http://www.bloomberg.com/news/articles/2014-12-18/sony-s-costs-from-the-interview-seen-near-200-million
  • Slovak Republic. (2008). National Strategy for Information Security in the Slovak Republic. Recuperado de: http://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-security-strategies-ncsss/Slovakia_National_Strategy_for_ISEC.pdf
  • SSO. (s.f.). Stay Smart Online. Australian Government Initiative. Recuperado de http://www.staysmartonline.gov.au/
  • The White House. (2003, February). The National Strategy to Secure Cyberspace. Recuperado de: http://www.us-cert.gov/sites/default/files/publications/cyberspace_strategy.pdf
  • Underwood, J., & Koskinen, T. (2012). Ciberseguridad y educación. Comisión Europea. Elearning Papers, (28), 2-3.
  • Unión Internacional de Telecomunicaciones (2007). Guía de ciberseguridad para los países en desarrollo.
  • Unión Internacional de Telecomunicaciones. (2010). Resolución 181: Definiciones y terminología relativas a la creación de confianza y seguridad en la utilización de las tecnologías de la información y la comunicación. Conferencia de Plenipotenciarios.
  • United States Government Accountability Office (2012). Cyber Threats Facilitate Ability to Commit Economic Espionage. GAO-12-876T. Recuperado de: https://www.gao.gov
  • White House. (s.f.). Cybersecurity Information Sharing Legislation. US Government.