Mostrar el registro sencillo del ítem
Amenazas y desafíos del terrorismo cibernético en Colombia: un enfoque en la seguridad nacional.
| dc.contributor.author | Vargas Martinez, John Alexander | |
| dc.coverage.spatial | Bogotá, Escuela Superior de Guerra "General Rafael Reyes Prieto", 2025 | |
| dc.date.accessioned | 2026-04-28T20:59:54Z | |
| dc.date.available | 2026-04-28T20:59:54Z | |
| dc.date.issued | 2025 | |
| dc.date.submitted | 2025 | |
| dc.identifier.uri | https://hdl.handle.net/20.500.14205/11777 | |
| dc.description.abstract | La investigación aborda el impacto del terrorismo cibernético en el marco de seguridad digital colombiano, considerando la evolución de las amenazas y la integración de inteligencia artificial. Utilizando un enfoque cualitativo, se analizaron conceptos clave, debilidades en la defensa cibernética y capacidades de respuesta militar frente a ataques duales. Los resultados destacan que ataques como ransomware y fuerza bruta poseen alta complejidad técnica y afectan infraestructuras públicas críticas, mientras que las amenazas locales tienen menor impacto. Basándose en lineamientos de la OTAN, se propone actualizar los núcleos estratégicos de defensa digital para mitigar riesgos emergentes y fortalecer la resiliencia cibernética en sectores clave. | es_ES |
| dc.description.abstract | The research examines the impact of cyberterrorism on Colombia's digital security framework, focusing on evolving threats and artificial intelligence integration. Using a qualitative approach, key concepts, weaknesses in cyber defense, and military response capabilities to dual attacks were analyzed. Results reveal that ransomware and brute force attacks exhibit high technical complexity, affecting critical public infrastructures, while local threats have lower impact. Based on NATO guidelines, the study suggests updating strategic digital defense frameworks to mitigate emerging risks and enhance cyber resilience in key sectors. | es_ES |
| dc.description.sponsorship | Escuela Superior de Guerra "General Rafael Reyes Prieto" | es_ES |
| dc.format.extent | 32 páginas | |
| dc.format.mimetype | application/pdf | es_ES |
| dc.language.iso | spa | es_ES |
| dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/ | * |
| dc.title | Amenazas y desafíos del terrorismo cibernético en Colombia: un enfoque en la seguridad nacional. | es_ES |
| dc.title.alternative | Threats and challenges of cyberterrorism in Colombia: a focus on national security. | es_ES |
| dcterms.bibliographicCitation | Achkoski, J., & Dojchinovski, M. (2012). Cyber terrorism and cyber-crime–threats for cyber security. Proc. First Annu. Int. Sci. Conf., 1-10. | es_ES |
| dcterms.bibliographicCitation | Almahmoud, Z. (12 de enero de 2024). Forecasting cyber threats & pertinent alleviation technologies. Doctoral dissertation, Birkbeck, University of London, 1-10. | es_ES |
| dcterms.bibliographicCitation | Arely, G. (2007). Knowledge management, Terrorism and cyber terrorism. Cyber warfare and cyber terrorism, 7-16. | es_ES |
| dcterms.bibliographicCitation | Asadullin, Y. Y. (2019). Cyber Security Threat Landscape. The 2019 Symposium on Cybersecurity of the Digital Economy-CDE'19, 10-17. | es_ES |
| dcterms.bibliographicCitation | CCOCI. (12 de junio de 2024). Boletín cibernético nº 18. Obtenido de https://drive.google.com/file/d/1sMT1D2WRDP7kwWaPCnVVIQG94RJkplVg/view | es_ES |
| dcterms.bibliographicCitation | CCOCI. (2024). Boletín CCOCI - 2024. Repositorio CCOCI: https://drive.google.com/file/d/1sMT1D2WRDP7kwWaPCnVVIQG94RJkplVg/view. | es_ES |
| dcterms.bibliographicCitation | Chauhan, S. S. (2021). A Survey on Cyber Security Threats. . IEEE, 218-223. | es_ES |
| dcterms.bibliographicCitation | Crotty, J., & Daniel, E. (2022). Cyber threat: its origins and consequence and the use of qualitative and quantitative methods in cyber risk assessment. Applied Computing and Informatics, 1-10. | es_ES |
| dcterms.bibliographicCitation | Dekker, M., & Alevizos, L. (2024). A threat‐intelligence driven methodology to incorporate uncertainty in cyber risk analysis and enhance decision‐making. Security and Privacy, 7(1), 1-10. | es_ES |
| dcterms.bibliographicCitation | DNP. (2025). CONPES 4144. POLÍTICA NACIONAL DE CONFIANZA Y SEGURIDAD DIGITAL. Bogotá D.C.: Repositorio DNP: https://colaboracion.dnp.gov.co/CDT/Conpes/Econ%C3%B3micos/3995.pdf. | es_ES |
| dcterms.bibliographicCitation | Ertan, A., Floyd, K., Pernik, P., & Stevens, T. (2020). Cyber Threats and NATO 2030: Horizon Scanning and Analysis. CCDCOE, 1-267. | es_ES |
| dcterms.bibliographicCitation | Ghelani, D. (2022). Cyber Security, Cyber Threats, Implications and Future Perspectives: A Review. American Journal of Science, Engineering and Technology, 12-19. | es_ES |
| dcterms.bibliographicCitation | Harish, A., Tam, K., & Jones, K. (2025). Literature review of maritime cyber security: The first decade. Maritime Technology and Research, 7(2), 1-12. | es_ES |
| dcterms.bibliographicCitation | Heickerö, R. (2014). Cyber Terrorism: Electronic Jihad. Strategic Analysis, 1-10. | es_ES |
| dcterms.bibliographicCitation | Inayat, U., Zia, M., Mahmood, S., Khalid, H., & Benbouzid, M. (2022). Learning-based methods for cyber attacks detection in IoT systems: A survey on methods, analysis, and future prospects. Electronics, 11(9), 10-14. | es_ES |
| dcterms.bibliographicCitation | Jarvis, L., Macdonald, S., & Nouri, L. (2014). Ciberterrorismo: Conceptos y políticas. Revista de Estudios sobre Terrorismo, 69, 1-10. | es_ES |
| dcterms.bibliographicCitation | Margalef, L., & Arenas, A. (2006). ¿Qué entendemos por innovación Educativa? A proposito del desarrollo curricular. Perpectiva Educacional, 1(47), 13-31. | es_ES |
| dcterms.bibliographicCitation | Marslli, M. (2019). The war on cyberterrorism. Democracy and security, 172-199. | es_ES |
| dcterms.bibliographicCitation | Rathmell, A. (1997). CYBER-TERRORISM: THE SHAPE OFFUTURE CONFLICT? DEFENCE & INTERNATIONAL SECURITY, 1-10. | es_ES |
| dcterms.bibliographicCitation | Sharma, P., Prakash, S., & Chaudhary, K. (2023). Analyzing Cybersecurity Patterns in the Pacific Region: Trends and Challenges for 2023. . IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE), 1-7. | es_ES |
| dcterms.bibliographicCitation | UNODC. (2025). Hacktivismo, Terrorismo, Espionaje, Campañas de Desinformación y Guerra en el Ciberespacio. Ciber terrorismo. Bogotá D.C.: Repositorio editorial: https://www.unodc.org/e4j/es/cybercrime/module-14/key-issues/cyberterrorism.html. | es_ES |
| dcterms.bibliographicCitation | Yunos, Z., Ahmad, R., & Mohd, N. (2015). A Qualitative Analysis for Evaluating a Cyber Terrorism Framework in Malaysia. Information Security Journal: A Global Perspective, 6-24. | es_ES |
| dcterms.bibliographicCitation | Zhylin, A. (2024). Methodology of Quantitative Assessment of Network Cyber Threats Using a Risk-Based Approach. Applied Cybersecurity & Internet Governance, 37(1), 227-260. | es_ES |
| datacite.rights | http://purl.org/coar/access_right/c_16ec | es_ES |
| oaire.resourcetype | http://purl.org/coar/resource_type/c_2df8fbb1 | es_ES |
| oaire.version | http://purl.org/coar/version/c_ab4af688f83e57aa | es_ES |
| dc.audience | Público general | es_ES |
| dc.contributor.tutor | Jiménez Reina, Jonnathan | |
| dc.contributor.tutor | Serrano Cuervo, Aldemar | |
| dc.identifier.instname | Escuela Superior de Guerra "General Rafael Reyes Prieto" | es_ES |
| dc.identifier.reponame | Repositorio ESDEG | es_ES |
| dc.publisher.place | Bogotá | es_ES |
| dc.publisher.program | Maestría en Ciberseguridad y Ciberdefensa | es_ES |
| dc.relation.citationEdition | 32 páginas | es_ES |
| dc.rights.accessrights | info:eu-repo/semantics/restrictedAccess | es_ES |
| dc.rights.cc | Attribution-NonCommercial-NoDerivatives 4.0 Internacional | * |
| dc.subject.keywords | Ciberseguridad | es_ES |
| dc.subject.keywords | Terrorismo | es_ES |
| dc.subject.keywords | Inteligencia | es_ES |
| dc.subject.keywords | Ransomware | es_ES |
| dc.subject.keywords | OTAN | es_ES |
| dc.subject.keywords | Resiliencia | es_ES |
| dc.subject.keywords | Cybersecurity | es_ES |
| dc.subject.keywords | Terrorism | es_ES |
| dc.subject.keywords | Artificial intelligence | es_ES |
| dc.subject.keywords | Ransomware | es_ES |
| dc.subject.keywords | NATO | es_ES |
| dc.subject.keywords | Resilience | es_ES |
| dc.type.driver | info:eu-repo/semantics/article | es_ES |
| dc.type.hasversion | info:eu-repo/semantics/restrictedAccess | es_ES |
| dc.type.spa | Artículo | es_ES |


