Mostrar el registro sencillo del ítem

dc.contributor.authorNaranjo, Luis
dc.coverage.spatialBogota, Escuela Superior de Guerra “General Rafael Reyes Prieto”, 2025
dc.date.accessioned2026-04-30T11:14:36Z
dc.date.available2026-04-30T11:14:36Z
dc.date.issued2025
dc.date.submitted2025
dc.identifier.urihttps://hdl.handle.net/20.500.14205/11833
dc.description.abstractEl estudio aborda los desafíos de ciberseguridad en vehículos aéreos no tripulados (UAV) utilizados por la Aviación del Ejército, destacando su dependencia tecnológica de terceros fabricantes. El problema radica en la falta de autonomía tecnológica, lo que limita la capacidad de identificar vulnerabilidades y prevenir ciberataques impulsados por inteligencia artificial. El objetivo principal es establecer riesgos técnicos asociados al uso de UAV bajo el marco metodológico de la norma ISO 27032. La investigación sigue un enfoque cualitativo con diseño exploratorio, dividido en tres fases: análisis conceptual, aplicación normativa y diseño de estrategias. Se busca construir un protocolo escalonado de ciberseguridad que permita anticipar y mitigar amenazas, garantizando la protección integral de los UAV frente a ataques sofisticados. Los resultados esperan contribuir a la seguridad operativa y geoestratégica del sistema militares_ES
dc.description.abstractThis research addresses cybersecurity challenges in unmanned aerial vehicles (UAVs) operated by the Army Aviation, emphasizing their technological dependence on third-party manufacturers. The main issue lies in the lack of technological autonomy, which restricts the ability to identify vulnerabilities and prevent AI-driven cyberattacks. The primary objective is to establish technical risks associated with UAV usage within the methodological framework of ISO 27032. The research employs a qualitative exploratory design divided into three phases: conceptual analysis, normative application, and strategy development. It aims to construct a tiered cybersecurity protocol to anticipate and mitigate threats while ensuring comprehensive UAV protection against sophisticated attacks. The results are expected to enhance the operational and geostrategic security of military systems.es_ES
dc.description.sponsorshipEscuela Superior de Guerra “General Rafael Reyes Prieto”es_ES
dc.format.extent36 Paginas
dc.format.mimetypeapplication/pdfes_ES
dc.language.isospaes_ES
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/*
dc.titleRiesgos de la Inteligencia Artificial en la Ciberseguridad de UAV: Análisis bajo marco de la ISO 27032.es_ES
dc.title.alternativeArtificial Intelligence Risks in UAV Cybersecurity: Analysis within the ISO 27032 Framework.es_ES
dcterms.bibliographicCitationBasan, E., Abramov, E., Gladkov, N., Lapina, M., Vitalii, E., & K., S. (2024). UAV Security Analysis Framework. Fourth Congress on Intelligent Systems. CIS 2023. Lecture Notes in Networks and Systems, vol 865. Springer, Singapore, 865, 1-50.es_ES
dcterms.bibliographicCitationCosar, M. (2022). Cyber attacks on unmanned aerial vehicles and cyber security measures. The Eurasia Proceedings of Science Technology Engineering and Mathematics, 21, 258-265.es_ES
dcterms.bibliographicCitationCruzado, C., Rodriguez, L., López, L., & Acuña, E. (2022). Reference framework “HOGO” for cybersecurity in SMEs based on ISO 27002 and 27032. . 2022 12th International Conference on Cloud Computing, Data Science & Engineering (Confluence), 35-40.es_ES
dcterms.bibliographicCitationDedeke, A., & Masterson, K. (2019). Contrasting cybersecurity implementation frameworks. Information & Computer Security, 27(3), 373-392.es_ES
dcterms.bibliographicCitationDi Nocera, F., Tempestini, G., & Presaghi, F. (2025). Behaviour & Information Technology. Reliability and validity of the Cybersecurity Awareness INventory, 44(7), 1417-1428.es_ES
dcterms.bibliographicCitationEfthymiopoulos, M. P. (2019). A cyber-security framework for development, defense and innovation at NATO. Journal of Innovation and Entrepreneurship, 8(81), 12.es_ES
dcterms.bibliographicCitationFidler, D. P., Pregent, R., & Vandurme, A. (2013). NATO, Cyber defense, and international law. John's J. Int'l & Comp. L., 1-4.es_ES
dcterms.bibliographicCitationGúzman, S. (2019). GUÍA PARA LA IMPLEMENTACION DE LA NORMA ISO 27032. Trabajo de investigación tipo especialización. Repositorio UNICATÓLICA: https://repository.ucatolica.edu.co/server/api/core/bitstreams/9ff18d8b-4832-448c-8325-0b4a839b90a6/content.es_ES
dcterms.bibliographicCitationHartman, K., & Giles, K. (2016). UAV Exploitation: A New Domain for Cyber Power. International Conference on Cyber Conflict , 205-221.es_ES
dcterms.bibliographicCitationHartmann, K., & Steup, C. (2013). The Vulnerability of UAVs to Cyber Attacks - An Approach to the Risk Assessment. International Conference on Cyber Conflict, 1-10.es_ES
dcterms.bibliographicCitationHazelton, J. L. (2017). Drone strikes and grand strategy: toward a political understanding of the uses of unmanned aerial vehicle attacks in US security policy. Journal of Strategic Studies, 40(1-2), 68-91.es_ES
dcterms.bibliographicCitationHjelle, J., Omli, M., & Elisabeth, L. (2023). Cybersecurity Threats to the Internet of Drones in Critical Infrastructure: An Analysis of Risks and Mitigation Strategies. NTNU, 1-10.es_ES
dcterms.bibliographicCitationkumar, N., & Chaundhary, A. (2024). Surveying cybersecurity vulnerabilities and countermeasures for enhancing UAV security. Computer Networks, 252, 1-25.es_ES
dcterms.bibliographicCitationLanger, A. M. (2025). Cybersecurity in Analysis and Design - Analysis and Design of Next-Generation Software Architectures. Springer, Langer, A. M. (2025). Cybersecurity in Analysis and Design. In Analysis and Design of Next-Generation Software Architectures (pp. 183-204). Springer, Cham., 183-204.es_ES
dcterms.bibliographicCitationLi, G., Lan, X., Zhang, H., Li, H., Jiao, S., & Sheng, H. (2022). Analysis of the effects of information security attacks on the flight safety of a typical multi-rotor UAV. . International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering , 1047-1051.es_ES
dcterms.bibliographicCitationLubkowski, G., Lanzrath, M., Lavau, L., & Suhrke, M. (2020). Response of the UAV sensor system to HPEM attacks. . International Symposium on Electromagnetic Compatibility-EMC EUROPE - IEEE., 1-6.es_ES
dcterms.bibliographicCitationLy, B., & Ly, R. (2021). Cybersecurity in unmanned aerial vehicles (UAVs). Journal of cyber security technology, 5(2), 120-137.es_ES
dcterms.bibliographicCitationLykou, G., Moustakas, D., & Gritzalis, D. (2020). Defending airports from UAS: A survey on cyber-attacks and counter-drone sensing technologies. Sensors, 20(12), 1-10.es_ES
dcterms.bibliographicCitationMarble, J., Lawless, W., Mittu, R., Coyne, J., Abramson, M., & Sibley, C. (2015). The human factor in cybersecurity: Robust & intelligent defense. Cyber Warfare: Building the Scientific Foundation, 173-206.es_ES
dcterms.bibliographicCitationMohammad, K. (2025). Cyber Shield: Advances in Detection, Isolation, and Containment Mechanisms. ARC, 1-12.es_ES
dcterms.bibliographicCitationMonteiro Marques, M. (2004). STANAG 4586 – Standard Interfaces of UAV Control System (UCS) for NATO UAV Interoperability. Almada: Publicación STANAG - OTAN.es_ES
dcterms.bibliographicCitationParra, H., Fernándo, A., & Recalde, L. (2017). Directrices para la gestión de la Ciberseguridad utilizando el estándar ISO/ECT 27032. Estudios en Seguridad y Defensa, 1-10.es_ES
dcterms.bibliographicCitationReyes, R., Mendoza, R., Oswaldo, E., Vargas, M., Luna, F., Martínez, J., & Mendoza, A. (2025). Cybersecurity Conceptual Framework Applied to Edge Computing and Internet of Things Environments. Electronics, 14(11), 21-30.es_ES
dcterms.bibliographicCitationRugo, A., Ardagna, C., & El Ioini, N. (2022). A Security Review in the UAVNet Era: Threats, Countermeasures, and Gap Analysis. ACM Computing Surveys (CSUR), 55(1), 1-35.es_ES
dcterms.bibliographicCitationShafique, A., Mehmood, A., & Elhadef, M. (2021). Survey of security protocols and vulnerabilities in unmanned aerial vehicles. IEEE Access, 9, 46927-46948.es_ES
dcterms.bibliographicCitationŚniatała, P., Iyengar, S., Bendarma, A., & Klósak, M. (2022). Modern Technologies Enabling Safe and Secure UAV Operation in Urban Airspace. Obtenido de https://www.nato.int/cps/en/natohq/topics_190859.htm?es_ES
dcterms.bibliographicCitationSpyros, A. (2022). A study of cybersecurity threats in UAVs and threat model approaches. International Helletic University, 1-102.es_ES
dcterms.bibliographicCitationSyafrizal, M., Selamat, S., & Zakaria, N. (2020). Analysis of cybersecurity standard and framework components. International Journal of Communication Networks and Information Security, 12(3), 417-432.es_ES
dcterms.bibliographicCitationTang, A. (2015). A Review on Cybersecurity Vulnerabilities for Urban Air Mobility. National Aeronautics and Space Administration, 1-10.es_ES
dcterms.bibliographicCitationTheron, P., Kott, A., Drašar, M., Rzadca, K., LeBlanc, B., Pihelgas, M., & Panico, A. (2018). Towards an active, autonomous and intelligent cyber defense of military systems: The NATO AICA reference architecture. In 2018 International conference on military communications and information systems (ICMCIS)-IEEE., 1-9.es_ES
dcterms.bibliographicCitationTomco, V., & Pashaj, K. (2024). Enhancing Cybersecurity for UAV Systems: Implementing NIS2 Provisions for Safe Drone Deployment in Albania. Asociatia Romana pentru Asigurarea Securitatii Informatiei, 35-43.es_ES
dcterms.bibliographicCitationVon Solms, B., & Von Solms, R. (2018). Cybersecurity and information security–what goes where?. I. Information & Computer Security, 26(1), 2-9.es_ES
dcterms.bibliographicCitationYu, Z., Wang, Z., Yu, J., Liu, D., Song, H. H., & Li, Z. (2023). Cybersecurity of unmanned aerial vehicles: A survey. . IEEE Aerospace and Electronic Systems Magazine, 1-10.es_ES
datacite.rightshttp://purl.org/coar/access_right/c_16eces_ES
oaire.resourcetypehttp://purl.org/coar/resource_type/c_2df8fbb1es_ES
oaire.versionhttp://purl.org/coar/version/c_ab4af688f83e57aaes_ES
dc.audiencePúblico generales_ES
dc.contributor.tutorOspina, Jaider
dc.identifier.instnameEscuela Superior de Guerra "General Rafael Reyes Prieto"es_ES
dc.identifier.reponameRepositorio ESDEGes_ES
dc.publisher.placeBogotáes_ES
dc.publisher.programCurso de Estado Mayor (CEM)es_ES
dc.relation.citationEdition36 Paginases_ES
dc.rights.accessrightsinfo:eu-repo/semantics/restrictedAccesses_ES
dc.rights.ccAttribution-NonCommercial-NoDerivatives 4.0 Internacional*
dc.subject.keywordsUAVes_ES
dc.subject.keywordsMarcoes_ES
dc.subject.keywordsProtocolares_ES
dc.subject.keywordsCiber seguridades_ES
dc.subject.keywordsEnfoquees_ES
dc.subject.keywordsEstratégicoes_ES
dc.subject.keywordsUAVes_ES
dc.subject.keywordsFrameworkes_ES
dc.subject.keywordsProtocoles_ES
dc.subject.keywordsCybersecurityes_ES
dc.subject.keywordsApproaches_ES
dc.subject.keywordsStrategices_ES
dc.type.driverinfo:eu-repo/semantics/articlees_ES
dc.type.hasversioninfo:eu-repo/semantics/restrictedAccesses_ES
dc.type.spaArtículoes_ES


Ficheros en el ítem

Thumbnail
Thumbnail

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem

http://creativecommons.org/licenses/by-nc-nd/4.0/
Excepto si se señala otra cosa, la licencia del ítem se describe como http://creativecommons.org/licenses/by-nc-nd/4.0/