Mostrar el registro sencillo del ítem
Gestión Riesgos cibernéticos para el sistema de información del Departamento Control comercio de Armas Municiones y Explosivos.
| dc.contributor.author | Rincón Solano, Rubén Eduardo | |
| dc.coverage.spatial | Bogotá, Escuela superior de guerra "Generar Rafel Peyes Prieto" 2025 | |
| dc.date.accessioned | 2026-04-28T20:34:45Z | |
| dc.date.available | 2026-04-28T20:34:45Z | |
| dc.date.issued | 2025 | |
| dc.date.submitted | 2025 | |
| dc.identifier.uri | https://hdl.handle.net/20.500.14205/11737 | |
| dc.description.abstract | La investigación analiza los riesgos cibernéticos asociados a bases de datos relacionales SQL, con énfasis en el sistema del Departamento de Control de Comercio de Armas, Municiones y Explosivos (DCCAE). Utilizando una revisión crítica de literatura académica, se identificaron amenazas como inyección de código SQL, escalada de privilegios y denegación de servicio, que representan el 45% de los incidentes reportados en sistemas similares. Las estrategias basadas en aprendizaje automático, como CNN-BiLSTM y Naïve Bayes, alcanzan precisiones del 97.8% en detección de amenazas. Además, se evaluó el nivel de madurez del sistema del DCCAE, revelando que el 70% de los dominios críticos operan en niveles iniciales. La investigación propone soluciones adaptativas y escalables para fortalecer la seguridad y resiliencia frente a amenazas emergentes, integrando tecnologías avanzadas y medidas tradicionales. | es_ES |
| dc.description.abstract | This study examines cybersecurity risks in SQL relational databases, focusing on the Department of Arms Trade Control (DCCAE) system. Through a critical review of academic literature, threats such as SQL code injection, privilege escalation, and denial of service—accounting for 45% of incidents in similar systems—were identified. Machine learning strategies, including CNN-BiLSTM and Naïve Bayes, achieved 97.8% accuracy in threat detection. Furthermore, the maturity level assessment of the DCCAE system revealed that 70% of critical domains operate at initial levels. The research proposes adaptive and scalable solutions to enhance security and resilience against emerging threats, integrating advanced technologies and traditional measures. | es_ES |
| dc.description.sponsorship | Escuela Superior de Guerra "Generar Rafel Peyes Prieto" | es_ES |
| dc.format.extent | 32 | |
| dc.format.mimetype | application/pdf | es_ES |
| dc.language.iso | spa | es_ES |
| dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/ | * |
| dc.title | Gestión Riesgos cibernéticos para el sistema de información del Departamento Control comercio de Armas Municiones y Explosivos. | es_ES |
| dc.title.alternative | Cyber Risk Management for the Information System of the Department of Arms, Ammunition, and Explosives Trade Control. | es_ES |
| dcterms.bibliographicCitation | Craigen, D., Diakun-Thibault, N., & Purse, R. (2014). Defining cybersecurity. Technology innovation management review, 4(10). | es_ES |
| dcterms.bibliographicCitation | Ibrahim, H., Karabatak, S., & Abdullahi, A. A. (2020). A study on cybersecurity challenges in e-learning and database management system. Proceedings of the IEEE International Conference on Computing, Networking and Communications (ICNC), 1–8. https://doi.org/10.1109/ICNC45684.2020.1234567 | es_ES |
| dcterms.bibliographicCitation | Al-Maliki, M. H. A., & Jasim, M. N. (2022). Review of SQL injection attacks: Detection, to enhance the security of the website from client-side attacks. International Journal of Nonlinear Analysis and Applications, 13(1), 3773-3782. https://doi.org/10.22075/ijnaa.2022.6152 | es_ES |
| dcterms.bibliographicCitation | Alghawazi, M., Alghazzawi, D., & Alarifi, S. (2022). Detection of SQL Injection Attack Using Machine Learning Techniques: A Systematic Literature Review. Journal of Cybersecurity and Privacy, 2(4), 764–777. https://doi.org/10.3390/jcp2040039 | es_ES |
| dcterms.bibliographicCitation | Srivastava, V., Majumdar, A., & Jeyasekar, A. (2023). Prevention of SQL Injection Attacks in Web Applications. Journal of Survey in Fisheries Sciences, 10(2S), 1113-1119. | es_ES |
| dcterms.bibliographicCitation | Alam, A., Tahreen, M., Alam, M. M., Mohammad, S. A., & Rana, S. (2021). SCAMM: Detection and prevention of SQL injection attacks using a machine learning approach | es_ES |
| dcterms.bibliographicCitation | Ismail, S. H., Jaafar, A. G., & Abdul Rahim, F. (2024). A review of penetration testing process for SQL injection attack. Open International Journal of Informatics (OIJI), 12(1), 72-73. | es_ES |
| dcterms.bibliographicCitation | Abdullayev, V., & Chauhan, A. S. (2023). SQL Injection Attack: Quick View. Mesopotamian Journal of Cybersecurity, 2023, 30–34. https://doi.org/10.58496/MJCS/2023/006 | es_ES |
| dcterms.bibliographicCitation | Begum, M. (2021). Efficient Detection Of SQL Injection Attack(SQLIA) Using Pattern-based Neural Network Model. International Conference on Computing, Communication, and Intelligent Systems (ICCCIS), 343-347. | es_ES |
| dcterms.bibliographicCitation | CCOCI. (2024). Boletín CCOCI - 2024. Repositorio CCOCI: https://drive.google.com/file/d/1sMT1D2WRDP7kwWaPCnVVIQG94RJkplVg/view. Rahman, M., Al- | es_ES |
| dcterms.bibliographicCitation | Ibrahim, H., Karabatak, S., & Abdullahi, A. A. (2020). A study on cybersecurity challenges in e-learning and database management system. Proceedings of the IEEE International Conference on Computing, Networking and Communications (ICNC), 1–8. https://doi.org/10.1109/ICNC45684.2020.1234567 | es_ES |
| dcterms.bibliographicCitation | Al-Maliki, M. H. A., & Jasim, M. N. (2022). Review of SQL injection attacks: Detection, to enhance the security of the website from client-side attacks. International Journal of Nonlinear Analysis and Applications, 13(1), 3773-3782. https://doi.org/10.22075/ijnaa.2022.6152 | es_ES |
| dcterms.bibliographicCitation | Alghawazi, M., Alghazzawi, D., & Alarifi, S. (2022). Detection of SQL Injection Attack Using Machine Learning Techniques: A Systematic Literature Review. Journal of Cybersecurity and Privacy, 2(4), 764–777. https://doi.org/10.3390/jcp2040039 | es_ES |
| dcterms.bibliographicCitation | Srivastava, V., Majumdar, A., & Jeyasekar, A. (2023). Prevention of SQL Injection Attacks in Web Applications. Journal of Survey in Fisheries Sciences, 10(2S), 1113-1119. | es_ES |
| datacite.rights | http://purl.org/coar/access_right/c_16ec | es_ES |
| oaire.resourcetype | http://purl.org/coar/resource_type/c_2df8fbb1 | es_ES |
| oaire.version | http://purl.org/coar/version/c_ab4af688f83e57aa | es_ES |
| dc.audience | Público general | es_ES |
| dc.contributor.tutor | González Moreno Julián Alberto | |
| dc.contributor.tutor | Aldemar Serrano Cuervo | |
| dc.identifier.instname | Escuela Superior de Guerra "General Rafael Reyes Prieto" | es_ES |
| dc.identifier.reponame | Repositorio ESDEG | es_ES |
| dc.publisher.place | Bogotá | es_ES |
| dc.publisher.program | Maestría en Ciberseguridad y Ciberdefensa | es_ES |
| dc.relation.citationEdition | 32 páginas | es_ES |
| dc.rights.accessrights | info:eu-repo/semantics/restrictedAccess | es_ES |
| dc.rights.cc | Attribution-NonCommercial-NoDerivatives 4.0 Internacional | * |
| dc.subject.keywords | Ciberseguridad | es_ES |
| dc.subject.keywords | Ciberseguridad . | es_ES |
| dc.subject.keywords | bases de datos | es_ES |
| dc.subject.keywords | SQL | es_ES |
| dc.subject.keywords | inteligencia artificial | es_ES |
| dc.subject.keywords | mitigación | es_ES |
| dc.subject.keywords | inyección | es_ES |
| dc.subject.keywords | Cybersecurity | es_ES |
| dc.subject.keywords | data bases | es_ES |
| dc.subject.keywords | SQL | es_ES |
| dc.subject.keywords | artificial intelligence | es_ES |
| dc.subject.keywords | mitigation | es_ES |
| dc.subject.keywords | injection | es_ES |
| dc.type.driver | info:eu-repo/semantics/article | es_ES |
| dc.type.hasversion | info:eu-repo/semantics/restrictedAccess | es_ES |
| dc.type.spa | Artículo | es_ES |


