Mostrar el registro sencillo del ítem

Importancia de combinar seguridad de la información y ciberseguridad en procesos de desarrollo de software

dc.creatorOchoa Torres, Raúl Antonio
dc.creatorEnrique López, David
dc.date2025-06-30
dc.date.accessioned2025-09-24T21:22:43Z
dc.date.available2025-09-24T21:22:43Z
dc.identifierhttps://esdegrevistas.edu.co/index.php/rcit/article/view/4962
dc.identifier10.25062/2955-0270.4962
dc.identifier.urihttps://hdl.handle.net/20.500.14205/11631
dc.descriptionThe use of specialized software is an imperative need for companies that wish to compete and differentiate themselves from their rivals. To have an in-house software development process, all measures and methodologies must be established to ensure that the generated product meets expected quality and reliability standards. Therefore, the integration of information security and cybersecurity with agile methodologies is necessary. This article explores the importance of incorporating information security and cybersecurity recommendations and practices into software development from the earliest stages of the software development life cycle using agile methodologies, which could mitigate risks and improve project stability in the face of future scenarios of uncertainty generated by external threats.en-US
dc.descriptionEl uso de software especializado es una necesidad imperiosa para las empresas que quieran competir y diferenciarse de sus rivales. Para contar con un proceso de desarrollo de software interno, deben establecerse todas las medidas y metodologías para garantizar que el producto generado cumpla con los estándares de calidad y confiabilidad esperados. Es necesaria, pues, la integración de la seguridad de la información y la ciberseguridad con las metodologías ágiles. Este artículo explora la importancia en el desarrollo de software la incorporación de recomendaciones y prácticas de seguridad de la información y ciberseguridad desde las primeras fases del ciclo de desarrollo de software con metodologías ágiles, lo que podría mitigar riesgos y mejorar la estabilidad de los proyectos ante futuros escenarios de incertidumbre generados por amenazas externas.es-ES
dc.formatapplication/pdf
dc.languagespa
dc.publisherSello Editorial ESDEGes-ES
dc.relationhttps://esdegrevistas.edu.co/index.php/rcit/article/view/4962/5416
dc.relation/*ref*/Baca, D., & Petersen, K. (2013). Prioritizing agile software security practices. Information and Software Technology, 56(8), 1027-1042.
dc.relation/*ref*/Beck, K., et al. (2001). Manifesto for Agile Software Development. Agile Alliance. https://agilemanifesto.org/
dc.relation/*ref*/Boehm, B., & Turner, R. (2003). Balancing Agility and Discipline: A Guide for the Perplexed. Addison-Wesley.
dc.relation/*ref*/Campbell-Kelly, M. (2002). The computer history of software packages. IEEE Annals of the History of Computing, 24(1), 66-81. https://doi.org/10.1109/MAHC.2002.988810
dc.relation/*ref*/Díaz-Arancibia, J., & Cadena-Martínez, R. (2023). Towards the integration of security practices in agile software development: A systematic mapping review. Applied Sciences, 13(7), 4578. https://doi.org/10.3390/app13074578
dc.relation/*ref*/Global Risk Report. (2024). World Economic Forum, Pg 7-8. ISBN: 978-2-940631-64-3, https://n9.cl/mlb4i
dc.relation/*ref*/International Organization for Standardization (ISO). (2022). ISO/IEC 27001:2022 Information technology. Security techniques. Information security management systems. Requirements. ISO.
dc.relation/*ref*/International Organization for Standardization. (2023). ISO/IEC 27032:2023 - Information technology - Security techniques - Guidelines for cybersecurity. ISO.
dc.relation/*ref*/Kersten, M. (2018). The DevOps transformation: Secure software development in the age of agile.
dc.relation/*ref*/John Wiley & Sons, Inc. Manes, S., & Andrews, P. (1993). Gates: How Microsoft’s mogul reinvented an industry and made himself the richest man in America. Doubleday.
dc.relation/*ref*/Nicolaysen, T., Sasson, R., Line, M. B., & Jaatun, M. G. (2010). Agile software development: The straight and narrow path to secure software? International Journal of Secure Software Engineering (IJSSE), 1(3), 71-85. https://doi.org/10.4018/jsse.2010070105
dc.relation/*ref*/Oueslati, H., Rahman, M. M., & ben Othmane, L. (2015). Literature review of the challenges of developing secure software using the agile approach. In 10th International Conference on Availability, Reliability and Security (pp. 540–547). IEEE. https://doi.org/10.1109/ARES.2015.75
dc.relation/*ref*/Poppendieck, M., & Poppendieck, T. (2003). Lean Software Development: An Agile Toolkit. Addison-Wesley.
dc.relation/*ref*/San Miguel, J. (2018). Diseño y levantamiento de un sistema seguro de manejo de historias clínicas en Colombia. Universidad Nacional de Colombia. https://n9.cl/m91j0y
dc.relation/*ref*/Schneier, B. (2000). Secrets and lies: Digital security in a networked world. John Wiley & Sons, Inc.
dc.relation/*ref*/Schwaber, K., & Sutherland, J. (2020). The Scrum Guide: The Definitive Guide to Scrum: The Rules of the Game. https://scrumguides.org/scrum-guide.html
dc.relation/*ref*/Stallings, W., Brown, L., & Bauer, M. (2018). Computer Security: Principles and Practice. Pearson Education Upper Saddle River, NJ, USA.
dc.relation/*ref*/Whitman, M. E., & Mattord, H. J. (2018). Principles of Information Security. Cengage Learning.
dc.relation/*ref*/Baca, D., & Petersen, K. (2013). Prioritizing agile software security practices. Information and Software Technology, 56(8), 1027-1042.
dc.relation/*ref*/Beck, K., et al. (2001). Manifesto for Agile Software Development. Agile Alliance. https://agilemanifesto.org/
dc.relation/*ref*/Boehm, B., & Turner, R. (2003). Balancing Agility and Discipline: A Guide for the Perplexed. Addison-Wesley.
dc.relation/*ref*/Campbell-Kelly, M. (2002). The computer history of software packages. IEEE Annals of the History of Computing, 24(1), 66-81. https://doi.org/10.1109/MAHC.2002.988810
dc.relation/*ref*/Díaz-Arancibia, J., & Cadena-Martínez, R. (2023). Towards the integration of security practices in agile software development: A systematic mapping review. Applied Sciences, 13(7), 4578. https://doi.org/10.3390/app13074578
dc.relation/*ref*/Global Risk Report. (2024). World Economic Forum, Pg 7-8. ISBN: 978-2-940631-64-3, https://n9.cl/mlb4i
dc.relation/*ref*/International Organization for Standardization (ISO). (2022). ISO/IEC 27001:2022 Information technology. Security techniques. Information security management systems. Requirements. ISO.
dc.relation/*ref*/International Organization for Standardization. (2023). ISO/IEC 27032:2023 - Information technology - Security techniques - Guidelines for cybersecurity. ISO.
dc.relation/*ref*/Kersten, M. (2018). The DevOps transformation: Secure software development in the age of agile.
dc.relation/*ref*/John Wiley & Sons, Inc. Manes, S., & Andrews, P. (1993). Gates: How Microsoft’s mogul reinvented an industry and made himself the richest man in America. Doubleday.
dc.relation/*ref*/Nicolaysen, T., Sasson, R., Line, M. B., & Jaatun, M. G. (2010). Agile software development: The straight and narrow path to secure software? International Journal of Secure Software Engineering (IJSSE), 1(3), 71-85. https://doi.org/10.4018/jsse.2010070105
dc.relation/*ref*/Oueslati, H., Rahman, M. M., & ben Othmane, L. (2015). Literature review of the challenges of developing secure software using the agile approach. In 10th International Conference on Availability, Reliability and Security (pp. 540–547). IEEE. https://doi.org/10.1109/ARES.2015.75
dc.relation/*ref*/Poppendieck, M., & Poppendieck, T. (2003). Lean Software Development: An Agile Toolkit. Addison-Wesley.
dc.relation/*ref*/San Miguel, J. (2018). Diseño y levantamiento de un sistema seguro de manejo de historias clínicas en Colombia. Universidad Nacional de Colombia. https://n9.cl/m91j0y
dc.relation/*ref*/Schneier, B. (2000). Secrets and lies: Digital security in a networked world. John Wiley & Sons, Inc.
dc.relation/*ref*/Schwaber, K., & Sutherland, J. (2020). The Scrum Guide: The Definitive Guide to Scrum: The Rules of the Game. https://scrumguides.org/scrum-guide.html
dc.relation/*ref*/Stallings, W., Brown, L., & Bauer, M. (2018). Computer Security: Principles and Practice. Pearson Education Upper Saddle River, NJ, USA.
dc.relation/*ref*/Whitman, M. E., & Mattord, H. J. (2018). Principles of Information Security. Cengage Learning.
dc.rightsDerechos de autor 2025 Revista Ciberespacio, Tecnologia e Innovaciónes-ES
dc.rightshttps://creativecommons.org/licenses/by-nc-nd/4.0es-ES
dc.sourceRevista Ciberespacio, Tecnología e Innovación; Vol. 4 Núm. 7 (2025): Sociedad digital y tecnología disruptivas; 5-13es-ES
dc.source3028-3310
dc.source2955-0270
dc.subjectamenazaes-ES
dc.subjectciberseguridades-ES
dc.subjectdesarrollo de softwarees-ES
dc.subjectmetodologías ágileses-ES
dc.subjectriesgoes-ES
dc.subjectseguridad de la informaciónes-ES
dc.subjectthreaten-US
dc.subjectcybersecurityen-US
dc.subjectsoftware developmenten-US
dc.subjectagile methodologiesen-US
dc.subjectrisken-US
dc.subjectinformation securityen-US
dc.titleImportance of combining information security and cybersecurity in software development processesen-US
dc.titleImportancia de combinar seguridad de la información y ciberseguridad en procesos de desarrollo de softwarees-ES
dc.typeinfo:eu-repo/semantics/article
dc.typeinfo:eu-repo/semantics/publishedVersion


Ficheros en el ítem

FicherosTamañoFormatoVer

No hay ficheros asociados a este ítem.

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem