Mostrar el registro sencillo del ítem
Riesgos de la Inteligencia Artificial en la Ciberseguridad de UAV: Análisis bajo marco de la ISO 27032.
| dc.contributor.author | Naranjo, Luis | |
| dc.coverage.spatial | Bogota, Escuela Superior de Guerra “General Rafael Reyes Prieto”, 2025 | |
| dc.date.accessioned | 2026-04-30T11:14:36Z | |
| dc.date.available | 2026-04-30T11:14:36Z | |
| dc.date.issued | 2025 | |
| dc.date.submitted | 2025 | |
| dc.identifier.uri | https://hdl.handle.net/20.500.14205/11833 | |
| dc.description.abstract | El estudio aborda los desafíos de ciberseguridad en vehículos aéreos no tripulados (UAV) utilizados por la Aviación del Ejército, destacando su dependencia tecnológica de terceros fabricantes. El problema radica en la falta de autonomía tecnológica, lo que limita la capacidad de identificar vulnerabilidades y prevenir ciberataques impulsados por inteligencia artificial. El objetivo principal es establecer riesgos técnicos asociados al uso de UAV bajo el marco metodológico de la norma ISO 27032. La investigación sigue un enfoque cualitativo con diseño exploratorio, dividido en tres fases: análisis conceptual, aplicación normativa y diseño de estrategias. Se busca construir un protocolo escalonado de ciberseguridad que permita anticipar y mitigar amenazas, garantizando la protección integral de los UAV frente a ataques sofisticados. Los resultados esperan contribuir a la seguridad operativa y geoestratégica del sistema militar | es_ES |
| dc.description.abstract | This research addresses cybersecurity challenges in unmanned aerial vehicles (UAVs) operated by the Army Aviation, emphasizing their technological dependence on third-party manufacturers. The main issue lies in the lack of technological autonomy, which restricts the ability to identify vulnerabilities and prevent AI-driven cyberattacks. The primary objective is to establish technical risks associated with UAV usage within the methodological framework of ISO 27032. The research employs a qualitative exploratory design divided into three phases: conceptual analysis, normative application, and strategy development. It aims to construct a tiered cybersecurity protocol to anticipate and mitigate threats while ensuring comprehensive UAV protection against sophisticated attacks. The results are expected to enhance the operational and geostrategic security of military systems. | es_ES |
| dc.description.sponsorship | Escuela Superior de Guerra “General Rafael Reyes Prieto” | es_ES |
| dc.format.extent | 36 Paginas | |
| dc.format.mimetype | application/pdf | es_ES |
| dc.language.iso | spa | es_ES |
| dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/ | * |
| dc.title | Riesgos de la Inteligencia Artificial en la Ciberseguridad de UAV: Análisis bajo marco de la ISO 27032. | es_ES |
| dc.title.alternative | Artificial Intelligence Risks in UAV Cybersecurity: Analysis within the ISO 27032 Framework. | es_ES |
| dcterms.bibliographicCitation | Basan, E., Abramov, E., Gladkov, N., Lapina, M., Vitalii, E., & K., S. (2024). UAV Security Analysis Framework. Fourth Congress on Intelligent Systems. CIS 2023. Lecture Notes in Networks and Systems, vol 865. Springer, Singapore, 865, 1-50. | es_ES |
| dcterms.bibliographicCitation | Cosar, M. (2022). Cyber attacks on unmanned aerial vehicles and cyber security measures. The Eurasia Proceedings of Science Technology Engineering and Mathematics, 21, 258-265. | es_ES |
| dcterms.bibliographicCitation | Cruzado, C., Rodriguez, L., López, L., & Acuña, E. (2022). Reference framework “HOGO” for cybersecurity in SMEs based on ISO 27002 and 27032. . 2022 12th International Conference on Cloud Computing, Data Science & Engineering (Confluence), 35-40. | es_ES |
| dcterms.bibliographicCitation | Dedeke, A., & Masterson, K. (2019). Contrasting cybersecurity implementation frameworks. Information & Computer Security, 27(3), 373-392. | es_ES |
| dcterms.bibliographicCitation | Di Nocera, F., Tempestini, G., & Presaghi, F. (2025). Behaviour & Information Technology. Reliability and validity of the Cybersecurity Awareness INventory, 44(7), 1417-1428. | es_ES |
| dcterms.bibliographicCitation | Efthymiopoulos, M. P. (2019). A cyber-security framework for development, defense and innovation at NATO. Journal of Innovation and Entrepreneurship, 8(81), 12. | es_ES |
| dcterms.bibliographicCitation | Fidler, D. P., Pregent, R., & Vandurme, A. (2013). NATO, Cyber defense, and international law. John's J. Int'l & Comp. L., 1-4. | es_ES |
| dcterms.bibliographicCitation | Gúzman, S. (2019). GUÍA PARA LA IMPLEMENTACION DE LA NORMA ISO 27032. Trabajo de investigación tipo especialización. Repositorio UNICATÓLICA: https://repository.ucatolica.edu.co/server/api/core/bitstreams/9ff18d8b-4832-448c-8325-0b4a839b90a6/content. | es_ES |
| dcterms.bibliographicCitation | Hartman, K., & Giles, K. (2016). UAV Exploitation: A New Domain for Cyber Power. International Conference on Cyber Conflict , 205-221. | es_ES |
| dcterms.bibliographicCitation | Hartmann, K., & Steup, C. (2013). The Vulnerability of UAVs to Cyber Attacks - An Approach to the Risk Assessment. International Conference on Cyber Conflict, 1-10. | es_ES |
| dcterms.bibliographicCitation | Hazelton, J. L. (2017). Drone strikes and grand strategy: toward a political understanding of the uses of unmanned aerial vehicle attacks in US security policy. Journal of Strategic Studies, 40(1-2), 68-91. | es_ES |
| dcterms.bibliographicCitation | Hjelle, J., Omli, M., & Elisabeth, L. (2023). Cybersecurity Threats to the Internet of Drones in Critical Infrastructure: An Analysis of Risks and Mitigation Strategies. NTNU, 1-10. | es_ES |
| dcterms.bibliographicCitation | kumar, N., & Chaundhary, A. (2024). Surveying cybersecurity vulnerabilities and countermeasures for enhancing UAV security. Computer Networks, 252, 1-25. | es_ES |
| dcterms.bibliographicCitation | Langer, A. M. (2025). Cybersecurity in Analysis and Design - Analysis and Design of Next-Generation Software Architectures. Springer, Langer, A. M. (2025). Cybersecurity in Analysis and Design. In Analysis and Design of Next-Generation Software Architectures (pp. 183-204). Springer, Cham., 183-204. | es_ES |
| dcterms.bibliographicCitation | Li, G., Lan, X., Zhang, H., Li, H., Jiao, S., & Sheng, H. (2022). Analysis of the effects of information security attacks on the flight safety of a typical multi-rotor UAV. . International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering , 1047-1051. | es_ES |
| dcterms.bibliographicCitation | Lubkowski, G., Lanzrath, M., Lavau, L., & Suhrke, M. (2020). Response of the UAV sensor system to HPEM attacks. . International Symposium on Electromagnetic Compatibility-EMC EUROPE - IEEE., 1-6. | es_ES |
| dcterms.bibliographicCitation | Ly, B., & Ly, R. (2021). Cybersecurity in unmanned aerial vehicles (UAVs). Journal of cyber security technology, 5(2), 120-137. | es_ES |
| dcterms.bibliographicCitation | Lykou, G., Moustakas, D., & Gritzalis, D. (2020). Defending airports from UAS: A survey on cyber-attacks and counter-drone sensing technologies. Sensors, 20(12), 1-10. | es_ES |
| dcterms.bibliographicCitation | Marble, J., Lawless, W., Mittu, R., Coyne, J., Abramson, M., & Sibley, C. (2015). The human factor in cybersecurity: Robust & intelligent defense. Cyber Warfare: Building the Scientific Foundation, 173-206. | es_ES |
| dcterms.bibliographicCitation | Mohammad, K. (2025). Cyber Shield: Advances in Detection, Isolation, and Containment Mechanisms. ARC, 1-12. | es_ES |
| dcterms.bibliographicCitation | Monteiro Marques, M. (2004). STANAG 4586 – Standard Interfaces of UAV Control System (UCS) for NATO UAV Interoperability. Almada: Publicación STANAG - OTAN. | es_ES |
| dcterms.bibliographicCitation | Parra, H., Fernándo, A., & Recalde, L. (2017). Directrices para la gestión de la Ciberseguridad utilizando el estándar ISO/ECT 27032. Estudios en Seguridad y Defensa, 1-10. | es_ES |
| dcterms.bibliographicCitation | Reyes, R., Mendoza, R., Oswaldo, E., Vargas, M., Luna, F., Martínez, J., & Mendoza, A. (2025). Cybersecurity Conceptual Framework Applied to Edge Computing and Internet of Things Environments. Electronics, 14(11), 21-30. | es_ES |
| dcterms.bibliographicCitation | Rugo, A., Ardagna, C., & El Ioini, N. (2022). A Security Review in the UAVNet Era: Threats, Countermeasures, and Gap Analysis. ACM Computing Surveys (CSUR), 55(1), 1-35. | es_ES |
| dcterms.bibliographicCitation | Shafique, A., Mehmood, A., & Elhadef, M. (2021). Survey of security protocols and vulnerabilities in unmanned aerial vehicles. IEEE Access, 9, 46927-46948. | es_ES |
| dcterms.bibliographicCitation | Śniatała, P., Iyengar, S., Bendarma, A., & Klósak, M. (2022). Modern Technologies Enabling Safe and Secure UAV Operation in Urban Airspace. Obtenido de https://www.nato.int/cps/en/natohq/topics_190859.htm? | es_ES |
| dcterms.bibliographicCitation | Spyros, A. (2022). A study of cybersecurity threats in UAVs and threat model approaches. International Helletic University, 1-102. | es_ES |
| dcterms.bibliographicCitation | Syafrizal, M., Selamat, S., & Zakaria, N. (2020). Analysis of cybersecurity standard and framework components. International Journal of Communication Networks and Information Security, 12(3), 417-432. | es_ES |
| dcterms.bibliographicCitation | Tang, A. (2015). A Review on Cybersecurity Vulnerabilities for Urban Air Mobility. National Aeronautics and Space Administration, 1-10. | es_ES |
| dcterms.bibliographicCitation | Theron, P., Kott, A., Drašar, M., Rzadca, K., LeBlanc, B., Pihelgas, M., & Panico, A. (2018). Towards an active, autonomous and intelligent cyber defense of military systems: The NATO AICA reference architecture. In 2018 International conference on military communications and information systems (ICMCIS)-IEEE., 1-9. | es_ES |
| dcterms.bibliographicCitation | Tomco, V., & Pashaj, K. (2024). Enhancing Cybersecurity for UAV Systems: Implementing NIS2 Provisions for Safe Drone Deployment in Albania. Asociatia Romana pentru Asigurarea Securitatii Informatiei, 35-43. | es_ES |
| dcterms.bibliographicCitation | Von Solms, B., & Von Solms, R. (2018). Cybersecurity and information security–what goes where?. I. Information & Computer Security, 26(1), 2-9. | es_ES |
| dcterms.bibliographicCitation | Yu, Z., Wang, Z., Yu, J., Liu, D., Song, H. H., & Li, Z. (2023). Cybersecurity of unmanned aerial vehicles: A survey. . IEEE Aerospace and Electronic Systems Magazine, 1-10. | es_ES |
| datacite.rights | http://purl.org/coar/access_right/c_16ec | es_ES |
| oaire.resourcetype | http://purl.org/coar/resource_type/c_2df8fbb1 | es_ES |
| oaire.version | http://purl.org/coar/version/c_ab4af688f83e57aa | es_ES |
| dc.audience | Público general | es_ES |
| dc.contributor.tutor | Ospina, Jaider | |
| dc.identifier.instname | Escuela Superior de Guerra "General Rafael Reyes Prieto" | es_ES |
| dc.identifier.reponame | Repositorio ESDEG | es_ES |
| dc.publisher.place | Bogotá | es_ES |
| dc.publisher.program | Curso de Estado Mayor (CEM) | es_ES |
| dc.relation.citationEdition | 36 Paginas | es_ES |
| dc.rights.accessrights | info:eu-repo/semantics/restrictedAccess | es_ES |
| dc.rights.cc | Attribution-NonCommercial-NoDerivatives 4.0 Internacional | * |
| dc.subject.keywords | UAV | es_ES |
| dc.subject.keywords | Marco | es_ES |
| dc.subject.keywords | Protocolar | es_ES |
| dc.subject.keywords | Ciber seguridad | es_ES |
| dc.subject.keywords | Enfoque | es_ES |
| dc.subject.keywords | Estratégico | es_ES |
| dc.subject.keywords | UAV | es_ES |
| dc.subject.keywords | Framework | es_ES |
| dc.subject.keywords | Protocol | es_ES |
| dc.subject.keywords | Cybersecurity | es_ES |
| dc.subject.keywords | Approach | es_ES |
| dc.subject.keywords | Strategic | es_ES |
| dc.type.driver | info:eu-repo/semantics/article | es_ES |
| dc.type.hasversion | info:eu-repo/semantics/restrictedAccess | es_ES |
| dc.type.spa | Artículo | es_ES |


