Show simple item record

dc.contributor.authorRey Castiblanco, Carlos Andres
dc.contributor.authorREY CASTIBLANCO , CARLOS ANDRES
dc.coverage.spatialBogotá, Escuela Superior de Guerra "General Rafael Reyes Prieto",2025
dc.date.accessioned2026-04-28T20:16:38Z
dc.date.available2026-04-28T20:16:38Z
dc.date.issued2025
dc.date.submitted2025
dc.identifier.urihttps://hdl.handle.net/20.500.14205/11701
dc.description.abstractEl aumento de ciberamenazas en Colombia, especialmente aquellas vinculadas a inteligencia artificial (IA), plantea riesgos significativos para la infraestructura crítica cibernética del sector defensa. Este estudio cualitativo y descriptivo analiza cómo la IA incrementa la complejidad y persistencia de los ataques cibernéticos, destacando desafíos en la prevención y mitigación de riesgos. Se emplearon metodologías como FAIR y triangulación conceptual para identificar vulnerabilidades, evaluar impactos y formular estrategias de mitigación basadas en amenazas persistentes avanzadas. Los resultados evidencian que la IA no solo amplifica los riesgos al automatizar ataques, sino que también requiere enfoques estratégicos de ciberseguridad que incluyan actualización tecnológica y análisis anticipado de riesgos. La investigación concluye que es esencial implementar procesos robustos de gestión del riesgo y metodologías preventivas para proteger la infraestructura crítica del sector defensa frente a amenazas cibernéticas impulsadas por IA.es_ES
dc.description.abstractThe rise of cyber threats in Colombia, particularly those linked to artificial intelligence (AI), poses significant risks to the critical cyber infrastructure of the defense sector. This qualitative and descriptive study examines how AI increases the complexity and persistence of cyberattacks, highlighting challenges in risk prevention and mitigation. Methodologies such as FAIR and conceptual triangulation were employed to identify vulnerabilities, assess impacts, and propose mitigation strategies based on advanced persistent threats. Results show that AI not only amplifies risks by automating attacks but also demands strategic cybersecurity approaches involving technological updates and anticipatory risk analysis. The study concludes that robust risk management processes and preventive methodologies are essential to safeguard the critical infrastructure of the defense sector against AI-driven cyber threats.es_ES
dc.description.sponsorshipEscuela Superior de Guerra " General Rafael Reyes Prieto"es_ES
dc.format.extent29 páginas
dc.format.mimetypeapplication/pdfes_ES
dc.language.isospaes_ES
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/*
dc.titleRiesgos para la Infraestructura Crítica Cibernética del Sector Defensa: implementación de inteligencia artificial e identificación con metodología FAIR.es_ES
dc.title.alternativeRisks to the Cyber Critical Infrastructure of the Defense Sector: Implementation of Artificial Intelligence and Identification with FAIR Methodology.es_ES
dcterms.bibliographicCitationAbdullahi, M., Baashar, Y., Alhussian, H., Alwadain, A., Aziz, N., Capretz, L. F., & Abdulkadir, S. J. (2022). Detecting cybersecurity attacks in internet of things using artificial intelligence methods: A systematic literature review. Electronics, 11(2), 198.es_ES
dcterms.bibliographicCitationAgrawal, G., Kaur, A., y Myneni, S. (2024). A review of generative models in generating synthetic attack data for cybersecurity. Electronics, 13(2), 322 - 325.es_ES
dcterms.bibliographicCitationAkbarian, F., Ramezani, A., Hamidi, M., y Haghighat, V. (2020). Advanced algorithm to detect stealthy cyber attacks on automatic generation control in smart grid. ET Cyber‐Physical Systems: Theory & Applications, 54, 351-358.es_ES
dcterms.bibliographicCitationAlhayani, B., Mohammed, H. J., Chaloob, I. Z., y Ahmed, J. S. (2021). Effectiveness of artificial Intelligence techniques against cyber security risks apply of IT industry. Materials Today: Proceedings, 531(10.1016).es_ES
dcterms.bibliographicCitationAnkalaki, S., Rajesh, A., Pallavi, M., Hukkeri, G., & Naik, G. R. (2025). Cyber attack prediction: From traditional machine learning to generative artificial intelligence. IEEE Access., 1-14.es_ES
dcterms.bibliographicCitationAnsari, M. F., Dash, B., Sharma, P., y Yathiraju, N. (2022). The impact and limitations of artificial intelligence in cybersecurity: a literature review. International Journal of Advanced Research in Computer and Communication Engineering.es_ES
dcterms.bibliographicCitationBirthriya, S. K., Ahlawat, P., & Jain, A. K. (2025). Detection and Prevention of Spear Phishing Attacks: A Comprehensive Survey. . Computers & Security, 1-14.es_ES
dcterms.bibliographicCitationChakraborty, A., Biswas, A., & Khan, A. K. (2023). Artificial intelligence for cybersecurity: Threats, attacks and mitigation. In Artificial Intelligence for Societal Issues (pp. 3-25). Cham: Springer International Publishing.es_ES
dcterms.bibliographicCitationChauhan, R., Sabeel, U., Izaddoost, A., & Shah Heydari, S. (2021). Polymorphic adversarial cyberattacks using WGAN. Journal of Cybersecurity and Privacy, 1(4), 767-792.es_ES
dcterms.bibliographicCitationChehri, A., Fofana, I., & Yang, X. (2021). Security risk modeling in smart grid critical infrastructures in the era of big data and artificial intelligence. Sustainability, 13(6), 3196.es_ES
dcterms.bibliographicCitationChoudhary, A., Choudhary, P., & Salve, S. (2018). A study on various cyber attacks and a proposed intelligent system for monitoring such attacks. 2018 3rd International Conference on Inventive Computation Technologies (ICICT), 10(27), 612-617.es_ES
dcterms.bibliographicCitationComando Cibernético de las Fuerzas Militares. (2024). Boletín informativo nº 24. Publicación mensual de CCOCI.es_ES
dcterms.bibliographicCitationConsejo de Política Económica y Social . (14 de febrero de 2025). POLÍTICA NACIONAL DE INTELIGENCIA ARTIFICIAL . Obtenido de https://www.dnp.gov.co/LaEntidad_/subdireccion-general-prospectiva-desarrollo-nacional/direccion-desarrollo-digital/Paginas/documentos-conpes-confianza-y-seguridad-digital.aspxes_ES
dcterms.bibliographicCitationCosano, A. R. (2024). EL LIBRO BLANCO DE LA INTELIGENCIA ARTIFICIAL GENERATIVA . ESPAÑA : DigitalES.es_ES
dcterms.bibliographicCitationGoffer, M., Uddin, M., Has an, S., Barikdar, C., Hassan, J., Das, N., & Hasan, R. (2025). AI-Enhanced Cyber Threat Detection and Response Advancing National Security in Critical Infrastructure. Journal of Posthumanism, 5(3), 1667-1689.es_ES
dcterms.bibliographicCitationGuembe, B., Azeta, A., Misra, S., Osamor, V. C., Fernández-Sanz, L., y Pospelova, V. (2022). The emerging threat of AI-deriven cyber-attacks: A review. Applied Artificial Intelligence, 36(1), 2037254.es_ES
dcterms.bibliographicCitationHernández, R., Fernández, C., & Baptista, P. (2014). Metodología de la investigación (Vol. 6, pp. 102-256). México: mcGraw-Hill.es_ES
dcterms.bibliographicCitationJimmy, F. (2024). Cyber security vulnerabilities and remediation through cloud security tools. Journal of Artificial Intelligence General science (JAIGS), 2(1), 129-171.es_ES
dcterms.bibliographicCitationKure, H. I., Islam, S., y Mouratidis, H. (2022). An integrated cyber security risk management framework and risk predication for the critical infrastructure protection. Neural Computing and Applications, 34(18), 15241-15271.es_ES
dcterms.bibliographicCitationLandauer, M., Alton, L., Lindorfer, M., Skopik, F., Wurzenberger, M., & Hotwagner, W. (2025). Trace of the Times: Rootkit Detection through Temporal Anomalies in Kernel Activity. Landauer, M., Alton, L., Lindorfer, M., Skopik, F., Wurzenberger, M., & Hotwagner, W. (2025). Trace of the Times: Rootkit Detection through Temporal Anomalies in Kernel Activity. , 1-12.es_ES
dcterms.bibliographicCitationMaddireddy, B. R., & Maddireddy, B. R. (2020). Proactive Cyber Defense: Utilizing AI for Early Threat Detection and Risk Assessment. International Journal of Advanced Engineering Technologies and Innovations, 1(2), 64-83.es_ES
dcterms.bibliographicCitationMalik, S. (2024). The Future of AI in Biometric Security: Enhancing Authentication and Privacy Protection.es_ES
dcterms.bibliographicCitationMargalef, L., & Arenas, A. (2006). ¿Qué entendemos por innovación Educativa? A proposito del desarrollo curricular. Perpectiva Educacional, 1(47), 13-31.es_ES
dcterms.bibliographicCitationMosteanu, N. R. (2020). Artificial intelligence and cyber security “face to face with cyber-attack maltese case of risk management approach. Ecoforum Journal, 9(2).es_ES
dcterms.bibliographicCitationPătrașcu, P. (2019). CYBERNETIC ACTIONS ON CRITICAL INFRASTRUCTURES IN THE MILITARY FIEL. . Bulletin of" Carol I" National Defence University , 40-45.es_ES
dcterms.bibliographicCitationRoopesh, M., Nishat, N., Rasetti, S., & Rahaman, M. A. (2024). A Review Of Machine Learning And Feature Selection Techniques For Cybersecurity Attack Detection With A Focus On DDoS Attacks. Academic Journal on Science, Technology, Engineering & Mathematic Education, 4(03), 178-194.es_ES
dcterms.bibliographicCitationRoselli, N. (2011). Teoria del aprendizaje colaborativo y la teoria de la repesentación social: convergencias y posibles articulaciones. Revista colombiana de Ciencias Sociales, 2(2), 173-191.es_ES
dcterms.bibliographicCitationSarker, I. H. (2024). AI for critical infrastructure protection and resilience. . AI-driven cybersecurity and threat intelligence: Cyber automation, intelligent decision-making and explainability, 153-172.es_ES
dcterms.bibliographicCitationShaik, A., & Shaik, A. (2024). Integrated AI Cyber Secured Approach for Detection of Rootkits in Malware. In International Conference on Frontiers of Intelligent Computing: Theory and Applications. Singapore: Springer Nature Singapore., 12, 567-576.es_ES
dcterms.bibliographicCitationThomas, T. (2016). Russia's information warfare strategy: can the nation cope in future conflicts?. . The Transformation of Russia’s Armed Forces , 148-177.es_ES
dcterms.bibliographicCitationTruong, T. C., Diep, Q. B., & Zelinka, I. (2020). Artificial intelligence in the cyber domain: Offense and defense. Symmetry, 12(3), 410.es_ES
dcterms.bibliographicCitationVakulyk, O., Petrenko, P., Kuzmenko, I., Pochtovyi, M., & Orlovskyi, R. (2020). CYBERSECURITY AS A COMPONENT OF THE NATIONAL SECURITY OF THE STATE. Journal of Security & Sustainability Issues, 9(3), 1-10.es_ES
dcterms.bibliographicCitationVolk, M. (2024). A safer future: Leveraging the AI power to improve the cybersecurity in critical infrastructures. Electrotechnical Review/Elektrotehniski Vestnik, 91(3), 1-10.es_ES
dcterms.bibliographicCitationWang, J., Guo, J., Li, K., & Zheng, H. (2024). Distributed adaptive event-triggered control of connected automated vehicle platoon systems with spoofing cyber attacks. IEEE Transactions on Vehicular Technology., 1-10.es_ES
dcterms.bibliographicCitationYamin, M. M., Ullah, M., Ullah, H., & Katt, B. (2021). Weaponized AI for cyber-attacks. Journal of Information Security and Applications, 57, 102722.es_ES
dcterms.bibliographicCitationZhang, Z., Al Hamadi, H., Damiani, E., Yeun, C. Y., & Taher, F. (2022). Explainable artificial Intelligence applications in cyber security: State-of-the-art in Research. IEEE Access, 10, 93104-93139.es_ES
datacite.rightshttp://purl.org/coar/access_right/c_16eces_ES
oaire.resourcetypehttp://purl.org/coar/resource_type/c_2df8fbb1es_ES
oaire.versionhttp://purl.org/coar/version/c_ab4af688f83e57aaes_ES
dc.audiencePúblico generales_ES
dc.contributor.tutorBecerra Cuervo, Jairo Andrés (Metodologico)
dc.contributor.tutorGiraldo Rios, Lucas Adolfo (Temático)
dc.identifier.instnameEscuela Superior de Guerra "General Rafael Reyes Prieto"es_ES
dc.identifier.reponameRepositorio ESDEGes_ES
dc.publisher.placeBogotáes_ES
dc.publisher.programMaestría en Ciberseguridad y Ciberdefensaes_ES
dc.relation.citationEdition29 páginases_ES
dc.rights.accessrightsinfo:eu-repo/semantics/restrictedAccesses_ES
dc.rights.ccAttribution-NonCommercial-NoDerivatives 4.0 Internacional*
dc.subject.keywordsCiberseguridades_ES
dc.subject.keywordsInteligencia artificiales_ES
dc.subject.keywordsCiberamenazases_ES
dc.subject.keywordsInfraestructura críticaes_ES
dc.subject.keywordsMitigaciónes_ES
dc.subject.keywordsDefensaes_ES
dc.subject.keywordsCybersecurityes_ES
dc.subject.keywordsArtificial intelligencees_ES
dc.subject.keywordsCyberthreatses_ES
dc.subject.keywordsCritical infrastructurees_ES
dc.subject.keywordsMitigationes_ES
dc.subject.keywordsDefensees_ES
dc.type.driverinfo:eu-repo/semantics/articlees_ES
dc.type.hasversioninfo:eu-repo/semantics/restrictedAccesses_ES
dc.type.spaArtículoes_ES


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record

http://creativecommons.org/licenses/by-nc-nd/4.0/
Except where otherwise noted, this item's license is described as http://creativecommons.org/licenses/by-nc-nd/4.0/