Mostrar el registro sencillo del ítem
Protocolo de Protección de Datos Sensibles en Centros Penitenciarios Militares de Colombia, alineada con la arquitectura de las FF.MM
| dc.contributor.author | Obando Vera, Yeferson | |
| dc.coverage.spatial | Bogotá, Escuela Superior de Guerra “General Rafael Reyes Prieto”. 2025 | |
| dc.date.accessioned | 2026-04-30T11:33:50Z | |
| dc.date.available | 2026-04-30T11:33:50Z | |
| dc.date.issued | 2025 | |
| dc.date.submitted | 2025 | |
| dc.identifier.uri | https://hdl.handle.net/20.500.14205/11862 | |
| dc.description.abstract | El artículo analiza el diseño e implementación de un protocolo para la protección de datos sensibles en centros penitenciarios militares colombianos, alineado con la arquitectura de ciberseguridad de las Fuerzas Militares. Partiendo de los vacíos existentes en la protección de información clasificada y los riesgos operacionales asociados a ciberamenazas, se propone un modelo integral basado en cuatro pilares: i) clasificación jerárquica de datos según su sensibilidad (alto secreto, reservado, confidencial); ii) controles técnicos avanzados (encriptación, autenticación multifactor, segmentación de redes); iii) programas de capacitación continua para el personal técnico y operativo, y iv) sistemas de monitoreo con tecnología para detección temprana de amenazas. La investigación destaca la importancia de integrar este protocolo con los sistemas existentes de las FF.MM., particularmente con redes seguras institucionales y protocolos del Comando Conjunto Cibernético, garantizando interoperabilidad y respuesta coordinada ante incidentes. El análisis de viabilidad demuestra que la implementación es estratégicamente viable mediante un cronograma por fases, priorizando centros piloto antes de su escalamiento nacional. Como conclusión, el protocolo no solo mitiga riesgos inmediatos (filtraciones, sabotajes), sino que fortalece la arquitectura de ciberdefensa nacional. Las recomendaciones enfatizan en aprovechar el marco legal en desarrollo, fomentar alianzas público-privadas y convertir esta iniciativa en un referente regional para la protección de entornos críticos. El estudio aporta así un modelo adaptable que equilibra seguridad operacional y resiliencia frente a amenazas digitales evolutivas | es_ES |
| dc.description.abstract | This article analyzes the design and implementation of a protocol for the protection of sensitive data in Colombian military penitentiaries, aligned with the cybersecurity architecture of the Armed Forces. Based on the existing gaps in the protection of classified information and the operational risks associated with cyberthreats, a comprehensive model is proposed based on four pillars: i) hierarchical classification of data according to its sensitivity (top secret, reserved, confidential); ii) advanced technical controls (encryption, multifactor authentication, network segmentation); iii) continuous training programs for technical and operational personnel; and iv) monitoring systems with technology for early threat detection. The research highlights the importance of integrating this protocol with existing systems of the Armed Forces, particularly with institutional secure networks and protocols of the Joint Cyber Command, ensuring interoperability and a coordinated response to incidents. The feasibility analysis demonstrates that implementation is strategically viable through a phased schedule, prioritizing pilot centers before national scaling. In conclusion, the protocol not only mitigates immediate risks (leaks, sabotage) but also strengthens the national cyber defense architecture. The recommendations emphasize leveraging the developing legal framework, fostering public-private partnerships, and making this initiative a regional benchmark for the protection of critical environments. The study thus provides an adaptable model that balances operational security and resilience against evolving digital threats | es_ES |
| dc.description.sponsorship | Escuela Superior de Guerra “General Rafael Reyes Prieto” | es_ES |
| dc.format.extent | 53 Paginas | |
| dc.format.mimetype | application/pdf | es_ES |
| dc.language.iso | spa | es_ES |
| dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/ | * |
| dc.title | Protocolo de Protección de Datos Sensibles en Centros Penitenciarios Militares de Colombia, alineada con la arquitectura de las FF.MM | es_ES |
| dc.title.alternative | Protocol for the Protection of Sensitive Data in Colombian Military Penitentiary Centers, aligned with the architecture of the Armed Forces | es_ES |
| dcterms.bibliographicCitation | Al-Hawamleh, A., Alorfi, A., Al-Gasawneh, J., & Al-Rawashdeh, G. (2020). Cyber Security and Ethical Hacking: The Importance of Protecting User Data. Solid State Technology, 63(5), 7894-7899. Obtenido de https://www.researchgate.net/publication/347902323_Cyber_Security_and_Ethical_Hacking_The_Importance_of_Protecting_User_Data | es_ES |
| dcterms.bibliographicCitation | Barney, N. (2022). Network security. What is network security? (B. (. Lutkevich, Ed.) Search Networking. Obtenido de https://www.techtarget.com/searchnetworking/definition/network-security | es_ES |
| dcterms.bibliographicCitation | Collett, R. (2021). Understanding cybersecurity capacity building and its relationship to norms and confidence building measures. Journal of Cyber Policy, 6(3), 298-317. Obtenido de https://www.tandfonline.com/doi/pdf/10.1080/23738871.2021.1948582 | es_ES |
| dcterms.bibliographicCitation | Consejo Europeo. (2025). Reglamento General de Protección de Datos. El Reglamento General de Protección de Datos (RGPD) de la UE regula cómo pueden tratarse y transferirse los datos personales de las personas físicas en la UE. Obtenido de https://www.consilium.europa.eu/es/policies/data-protection/data-protection-regulation/ | es_ES |
| dcterms.bibliographicCitation | Constantinescu, L. M., & Manea, O. A. (2023). RISK MANAGEMENT AND CIBERSECURITY - BINOMIAL INSEPARABLE INTO THE DIGITALIZATION AREA. Journal Revue Européenne du Droit Social, 61(4), 53-65. doi:10.53373/reds.2023.61.4.0134 | es_ES |
| dcterms.bibliographicCitation | Cooperative Cyber Defence Centre of Excellence - CCDCOE. (2022). The Rights to Privacy and Data Protection in Times of Armed Conflict. (R. B. (Eds.), Ed.) Tallinn, Estonia: NATO CCDCOE Publications. Obtenido de https://ccdcoe.org/uploads/2022/06/The-Rights-to-Privacy-and-Data-Protection-in-Armed-Conflict.pdf | es_ES |
| dcterms.bibliographicCitation | Cooperative Cyber Defence Centre of Excellence (CCDCOE). (2022). The Rights to Privacy and Data Protection in Times of Armed Conflict. (R. B. (Eds.), Ed.) Tallinn, Estonia: NATO CCDCOE Publications. Obtenido de https://ccdcoe.org/uploads/2022/06/The-Rights-to-Privacy-and-Data-Protection-in-Armed-Conflict.pdf | es_ES |
| dcterms.bibliographicCitation | CrowdStrike. (2024). CrowdStrike’s Global Threat Report. Counter Adversary Operations team. Austin, Texas, United States: CrowdStrike Security . Obtenido de https://iitd.com.ua/wp-content/uploads/2024/03/global-threat-report-2024-cs.pdf | es_ES |
| dcterms.bibliographicCitation | Culot, G., Nassimbeni, G., Podrecca, M., & Sartor, M. (2021). The ISO/IEC 27001 information security management standard: literature review and theory-based research agenda. The TQM Journal, 33(7), 76-105. Obtenido de https://www.emerald.com/insight/search?q=Guido%20Nassimbeni | es_ES |
| dcterms.bibliographicCitation | Dutton, W. H., Creese, S., Shillair, R., & Bada, M. (2019). Cybersecurity capacity: does it matter? Journal of Information Policy, 9, 280-306. Obtenido de https://scholarlypublishingcollective.org/psup/information-policy/article-pdf/doi/10.5325/jinfopoli.9.2019.0280/1611397/jinfopoli_9_1_280.pdf | es_ES |
| dcterms.bibliographicCitation | Edemekong, P. F., Annamaraju, P., Afzal, M., & J., H. M. (2024). Health Insurance Portability and Accountability Act (HIPAA) Compliance. National Library of Medicina. Obtenido de https://www.ncbi.nlm.nih.gov/books/NBK500019/ | es_ES |
| dcterms.bibliographicCitation | European Union Agency for Cybersecurity - ENISA. (2020). Focus on National Cybersecurity Capabilities: New Self-Assessment Framework to Empower EU Member States. Enisa Publications. Obtenido de https://www.enisa.europa.eu/news/enisa-news/national-cybersecurity-capabilities-framework | es_ES |
| dcterms.bibliographicCitation | Flower, J. (31 de January de 2024). Fortifying the Walls: Cybersecurity in the United States Prison Service. Linkedin Articles. Obtenido de https://www.linkedin.com/pulse/fortifying-walls-cybersecurity-united-states-prison-service-flower-wlslc | es_ES |
| dcterms.bibliographicCitation | Fortinet Inc. (2023). What Is Data Security?Global Threat Landscape Report 2H 2023: Understand how data security enables organizations to protect information against cyberattacks. Sunnyvale, California: Fortinet Research Team. Obtenido de https://www.fortinet.com/resources/cyberglossary/data-security | es_ES |
| dcterms.bibliographicCitation | Giroux, H. (1997). .La pedagógia de frontera y la política del postmodernismo. Revista Intringulis(6), 96. | es_ES |
| dcterms.bibliographicCitation | Global Cyber Security Capacity Centre - GCSCC. (2021). Assessing national cybersecurity capacity. University of Oxford, Department of Computer Science, Oxford, United Kingdom. Obtenido de https://gcscc.ox.ac.uk/files/cmm2021editiondocpdf | es_ES |
| dcterms.bibliographicCitation | Global Forum on Cyber Expertise (GFCE). (2022). Assessing and developing cybersecurity capability. Obtenido de https://thegfce.org/ | es_ES |
| dcterms.bibliographicCitation | GlobalSuite Solutions. (16 de August de 2023). What is the ISO 27001 standard and what is its purpose? Obtenido de https://www.globalsuitesolutions.com/what-is-the-iso-27001-standard-and-what-is-its-purpose/ | es_ES |
| dcterms.bibliographicCitation | Himelwright, K. (2022). Cybersecurity & Correctional Institutions. Old Dominion University: Cybersecurity Showcase, 1-13. Obtenido de https://digitalcommons.odu.edu/cgi/viewcontent.cgi?article=1030&context=covacci-undergraduateresearch | es_ES |
| dcterms.bibliographicCitation | Imandeka, E., Hadi Putra, P. O., Hidayanto, A. N., & Mahmud, M. (2024). Exploring the World of Smart Prisons: Barriers, Trends, and Sustainable Solutions. Human Behavior and Emerging Technologies(6158154), 1-21. Obtenido de https://onlinelibrary.wiley.com/doi/10.1155/2024/6158154 | es_ES |
| dcterms.bibliographicCitation | Intel Corporation. (2025). Data Security: What It Is, Why It’s Important, and How to Get Started. Data Security Technology Overview. Obtenido de https://www.intel.com/content/www/us/en/artificial-intelligence/data-security.html | es_ES |
| dcterms.bibliographicCitation | Kosling, K. (6 de June de 2024). GDPR: Understanding the 6 Data Protection Principles. IT Governance European Blog. Obtenido de https://www.itgovernance.eu/blog/en/the-gdpr-understanding-the-6-data-protection-principles | es_ES |
| dcterms.bibliographicCitation | Lallie, H. S., Shepherd, L. A., Nurse, J. R., Erola, A., Epiphaniou, G., Maple, C., & Bellekens, X. (2021). Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Computers & Security, 105(102248), 1-20. Obtenido de https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9755115/ | es_ES |
| dcterms.bibliographicCitation | Libicki, M. (2021). Cyberspace in peace and war. Naval Institute Press | es_ES |
| dcterms.bibliographicCitation | Lloyd, I. J. (2020). Information Technology Law (9th ed.). Oxford University Press. Obtenido de https://global.oup.com/academic/product/information-technology-law-9780198830559?cc=co&lang=en& | es_ES |
| dcterms.bibliographicCitation | Margalef, L., & Arenas, A. (2006). ¿Qué entendemos por innovación Educativa? A proposito del desarrollo curricular. Perpectiva Educacional, 1(47), 13-31. | es_ES |
| dcterms.bibliographicCitation | Mason Pope, T. (2023). Introducción a los aspectos éticos y legales en la atención sanitaria. Mitchell Hamline School of Law. Obtenido de https://www.msdmanuals.com/es/hogar/fundamentos/asuntos-legales-y-%C3%A9ticos/introducci%C3%B3n-a-los-aspectos-%C3%A9ticos-y-legales-en-la-atenci%C3%B3n-sanitaria | es_ES |
| dcterms.bibliographicCitation | MinTIC. (2025). Política de Seguridad Digital. Preguntas frecuentes. Obtenido de https://www.mintic.gov.co/portal/inicio/Atencion-y-Servicio-a-la-Ciudadania/Preguntas-frecuentes/15430:Politica-de-Seguridad-Digital | es_ES |
| dcterms.bibliographicCitation | Mishra, A., Alzoubi, Y. I., & Javeria Anwar, M. Q. (September de 2022). Attributes impacting cybersecurity policy development: An evidence from seven nations. Computers & Security, 120, 102820. Obtenido de https://doi.org/10.1016/j.cose.2022.102820 | es_ES |
| dcterms.bibliographicCitation | Mishra, A., Alzoubi, Y. I., Gill, A. Q., & Anwar, M. J. (2022). Cybersecurity enterprises policies: A comparative study. Sensors, 22(538), 1-35. Obtenido de https://www.mdpi.com/1424-8220/22/2/538/pdf | es_ES |
| dcterms.bibliographicCitation | Nakhli, F. (2022). Cybersecurity development areas of action: an overview. PPT Presentation. Obtenido de https://www.itu.int/en/ITU-D/Regional-Presence/Europe/Documents/Events/2019/Workshop%20Kyiv/5%20%D0%A4%D0%B0%D1%80%D0%B8%D0%B4%20ITU%20Workshop%2016%20May%20-%20Farid%20Nakhli.pdf | es_ES |
| dcterms.bibliographicCitation | Naseir, M. A. (2021). National cybersecurity capacity building framework for counties in a transitional phase. Doctoral dissertation. Bournemouth University. Obtenido de https://eprints.bournemouth.ac.uk/35646/1/NASEIR%2C%20Mohamed%20Altaher%20Ben_Ph.D._2020.pdf | es_ES |
| dcterms.bibliographicCitation | Okta Inc. (29 de August de 2024). Privacy vs. Security: Exploring the Differences & Relationship. Identity 101. Obtenido de https://www.okta.com/identity-101/privacy-vs-security/ | es_ES |
| dcterms.bibliographicCitation | Paananen, H., Lapke, M., & Siponen, M. (January de 2020). State of the art in information security policy development. Computers & Security, 88(101608). Obtenido de https://www.sciencedirect.com/science/article/abs/pii/S0167404818313002 | es_ES |
| dcterms.bibliographicCitation | Riddell, C. (12 de February de 2024). Data Security Explained: Challenges and Solutions. Blog netwrix. Obtenido de https://blog.netwrix.com/data-security/ | es_ES |
| dcterms.bibliographicCitation | Roselli, N. (2011). Teoria del aprendizaje colaborativo y la teoria de la repesentación social: convergencias y posibles articulaciones. Revista colombiana de Ciencias Sociales, 2(2), 173-191. | es_ES |
| dcterms.bibliographicCitation | Scale Computing. (5 de February de 2024). What is data protection, and why is it important? SC Insights. Obtenido de https://www.scalecomputing.com/resources/what-is-data-protection-and-why-is-it-important | es_ES |
| dcterms.bibliographicCitation | Slavin, R. (2002). Aprendizaje cooperativo: Teoria, investigación y práctica. AIQUE | es_ES |
| dcterms.bibliographicCitation | Solar Calvo, M. (2023). Tecnología, prisiones y toma de decisión: Posibilidades y riesgos. Norte de salud mental,, 19(69), 78-90. Obtenido de https://dialnet.unirioja.es/descarga/articulo/9372275.pdf | es_ES |
| dcterms.bibliographicCitation | Srisakthi, S., & Suresh Babu, C. V. (2024). Chap.1 Cybersecurity: Protecting Information in a Digital World. En S. Saeed, N. Azizi, S. Tahir, M. Ahmad, & A. M. Almuhaideb, Strengthening Industrial Cybersecurity to Protect Business Intelligence (págs. 1-25). IGI Global. Obtenido de https://www.researchgate.net/publication/380125676_Cybersecurity_Protecting_Information_in_a_Digital_World | es_ES |
| dcterms.bibliographicCitation | The BBC. (2025). Data Protection Act (1998). Obtenido de https://www.bbc.co.uk/bitesize/guides/z8m36yc/revision/4 | es_ES |
| dcterms.bibliographicCitation | Unión Europea. (2025). Reglamento general de protección de datos. Obtenido de https://europa.eu/youreurope/business/dealing-with-customers/data-protection/data-protection-gdpr/index_es.htm | es_ES |
| dcterms.bibliographicCitation | Universidad Externado de Colombia. (20 de Octubre de 2022). 10 años de la Ley de protección de datos ¿Qué tanto hemos avanzado, qué nos hace falta? La Ley al tablero. Memorias Foro Académico. (D. M. Quiñones Zambrano, Recopilador) Departamento de Derecho de las Telecomunicaciones. Obtenido de https://www.uexternado.edu.co/wp-content/uploads/2024/02/10-ANOS-DE-LA-LEY-DE-PROTECCION-DE-DATOS-1.pdf | es_ES |
| dcterms.bibliographicCitation | Villegas-Carrasquilla, L. (18 de February de 2021). Data protection and cybersecurity laws in Colombia. CMS Legal. Obtenido de https://cms.law/en/int/expert-guides/cms-expert-guide-to-data-protection-and-cyber-security-laws/colombia | es_ES |
| datacite.rights | http://purl.org/coar/access_right/c_16ec | es_ES |
| oaire.resourcetype | http://purl.org/coar/resource_type/c_2df8fbb1 | es_ES |
| oaire.version | http://purl.org/coar/version/c_ab4af688f83e57aa | es_ES |
| dc.audience | Público general | es_ES |
| dc.contributor.tutor | Ospina Navas, Jaider | |
| dc.identifier.instname | Escuela Superior de Guerra "General Rafael Reyes Prieto" | es_ES |
| dc.identifier.reponame | Repositorio ESDEG | es_ES |
| dc.publisher.place | Bogotá | es_ES |
| dc.publisher.program | Curso de Estado Mayor (CEM) | es_ES |
| dc.relation.citationEdition | 53 Páginas | es_ES |
| dc.rights.accessrights | info:eu-repo/semantics/restrictedAccess | es_ES |
| dc.rights.cc | Attribution-NonCommercial-NoDerivatives 4.0 Internacional | * |
| dc.subject.keywords | Ciberseguridad | es_ES |
| dc.subject.keywords | Datos Clasificados | es_ES |
| dc.subject.keywords | Protocolo de Protección | es_ES |
| dc.subject.keywords | Centros Penitenciarios Militares, FF.MM | es_ES |
| dc.subject.keywords | Cybersecurity | es_ES |
| dc.subject.keywords | Classified Data | es_ES |
| dc.subject.keywords | Protection Protocol | es_ES |
| dc.subject.keywords | Military Penitentiaries | es_ES |
| dc.subject.keywords | Armed | es_ES |
| dc.type.driver | info:eu-repo/semantics/article | es_ES |
| dc.type.hasversion | info:eu-repo/semantics/restrictedAccess | es_ES |
| dc.type.spa | Artículo | es_ES |


