Show simple item record

dc.creatorSaavedra, Boris
dc.creatorParraguez, Luisa
dc.date2018-03-31
dc.date.accessioned2023-01-18T19:12:53Z
dc.date.available2023-01-18T19:12:53Z
dc.identifierhttps://esdegrevistas.edu.co/index.php/refa/article/view/737
dc.identifier.urihttps://hdl.handle.net/20.500.14205/6940
dc.descriptionCyberspace is a complex and dynamic environment created by humans and subject to rapid and accelerated changes, motivated by three forces that interact: digital technology, globalization and climate change. This article focuses on an analysis of cyberspace from a Security and Defense perspective at the political and strategic level. The topic of governance is addressed through adequate cybersecurity which constitutes the most important and relevant global challenge in this area. In order to reach this goal, analysis is required to generate the structural capacities (technological) as well as the geopolitical enquiry. The complexity of cyberspace calls for a national policy that defines the capacity of the State to develop technology, competent human resources, the adequate financing and the necessary material. The strategy should explain the use of all the components in cyberspace and its role in achieving the goals underlined in the policy. Finally, the digital ecosystem and the international actors demonstrate the complex dynamics involved in the interaction among States.en-US
dc.descriptionEl ciberespacio es un ambiente complejo y dinámico caracterizado por ser una creación humana sujeta a cambios acelerados, motivados por tres fuerzas que interactúan: la tecnología digital, la globalización y el cambio climático. Este artículo se enfoca en el análisis del ciberespacio desde la óptica de la Seguridad y Defensa a nivel político y estratégico. Se discute el tema de la gobernanza a través de la ciberseguridad adecuada, lo cual constituye el reto más importante y relevante a escala global en este ámbito. El logro de este objetivo requiere del análisis para generar las capacidades estructurales (tecnológicas) así como también de observaciones geopolíticas correspondientes. La complejidad del ciberespacio requiere de una política nacional que defina la capacidad del Estado para desarrollar la tecnología, el recurso humano competente, el financiamiento adecuado y el material necesario. La estrategia deberá explicar el empleo de todos los componentes del ciberespacio y su papel para la materialización de los fines delineados en la política. Finalmente, el ecosistema digital y los actores internacionales ponen en evidencia la compleja dinámica que se presenta actualmente en la interacción entre los Estados.es-ES
dc.formatapplication/pdf
dc.languagespa
dc.publisherEscuela Superior de Guerra - Colombiaes-ES
dc.relationhttps://esdegrevistas.edu.co/index.php/refa/article/view/737/985
dc.relation/*ref*/Campbell, R.J. (10 de junio del 2015). Cybersecurity Issues for the Bulk Power System.Washington DC Congressional Research Service. Obtenido de https://www.fas.org/sgp/crs/misc/R43989.pdf
dc.relation/*ref*/Choucri, N. (2012). Cyberpolitics in International Relations. Nueva York: HarperCollins. https://doi.org/10.7551/mitpress/7736.001.0001
dc.relation/*ref*/Clark, A. y Eddy, R.P. (2017). Warnings Finding Cassandras to Stop Catastrophes. Nueva York: HarperCollins publishers.
dc.relation/*ref*/Connell, M. y Vogler, S. (2017). Russia's Approach to Cyber Warfare. CNA Analysis and Solutions. Obtenido de https://www.realcleardefense.com/articles/2017/05/09/russias_approach_to_cyber_warfare_111338.html
dc.relation/*ref*/EuropeanCommission.(2017).Cybersecurity initiatives: working towards a more secure online environment. Obtenido de http://ec.europa.eu/information_society/newsroom/image/document/2017-3/factsheet_cybersecurity_update_january_2017_41543.pdf
dc.relation/*ref*/European Commission. (2017). Building an Effective European Cyber Shield: Taking EU Cooperation to the Next Level. Obtenido de http://ec.europa.eu/epsc/publications/strategic-notes/building-effective-european-cyber-shield_en
dc.relation/*ref*/Friedman, A. y Singer, P. W. (2014). Cybersecurity and Cyberwar what everyone needs to know. Oxford: Oxford University Press.
dc.relation/*ref*/Friedman, T. L. (2016). Thank You for Being Late: An optimist's Guide to Thriving in the Age of Acceleration. Nueva York: Farrar, Straus & Giroux.
dc.relation/*ref*/Goodman, M. (2015). Future Crimes Everything is Connected Everyone is Vulnerable and What We Can Do about It. Nueva York, EE.UU: Doubleday.
dc.relation/*ref*/Gordon, B. (2017). The EU Gets Serious About Cyber: The EU Cybersecurity Act and Other Elements of the Cyber Package. Obtenido de https://www.lexology.com/library/detail.aspx?g=c401bf00-99dd-4a11-8d63-9387f10374bd
dc.relation/*ref*/KPMG. (2017). Overview of China's Cybersecurity Law. KPMG. Obtenido de https://assets.kpmg.com/content/dam/kpmg/cn/pdf/en/2017/02/overview-of-cybersecurity-law.pdf
dc.relation/*ref*/Kramer, Franklin D., et al. (eds.). (2009) Cyberpower and National Security. Washington: National Defense University Press & Potomac Books, Inc.
dc.relation/*ref*/Lindsay, J., et al. (2015). China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain. Oxford: Oxford University Press. https://doi.org/10.1093/acprof:oso/9780190201265.001.0001
dc.relation/*ref*/Luo, J., et al. (2014). A software vulnerability rating approach based on the vulnerability database. Journal of Applied Mathematics. Obtenido de https://www.hindawi.com/journals/jam/2014/932397/abs/ https://doi.org/10.1155/2014/932397
dc.relation/*ref*/Meulen, van der, Nicole, et al. (2015). Cybersecurity in the European Union and Beyond: Exploring the Threats and Policy Responses, RAND Corporation, European Parliament.
dc.relation/*ref*/NATO. (2017). Cyber defence. Acceso a https://www.nato.int/cps/en/natohq/topics_78170.htm.
dc.relation/*ref*/Robles Carrillo, M. (2017). Gobernanza política versus gobernanza tecnológica del ciberespacio, Instituto Español de Estudios Estratégicos. Obtenido de http://www.ieee.es/Galerias/fichero/docs_opinion/2017/DIEEEO56-2017_Gobernanza_Margarita_Robles.pdf
dc.relation/*ref*/Schmidt, E. y Cohen, J. (2013). The New Digital Age: Transforming Nations, Businesses and Our Lives. Nueva York: Vintage Company.
dc.relation/*ref*/Schneier, B. (2015). Data and Goliath The Hidden Battles to Collect Your Data and Control Your World. Nueva York: W. W. Norton & Company, Inc.
dc.relation/*ref*/Segal, A. (2016). The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Era. Nueva York: Public Affairs.
dc.relation/*ref*/Shea, J. (2018). How is NATO Meeting the Challenge of Cyberspace? PRISM, 7(2), 19-29.
dc.relation/*ref*/Simon, P. (2013). Too Big to Ignore: The Business Case of Big Data. Nueva Jersey: John Wiley & Sons, Inc. https://doi.org/10.1002/9781119204039
dc.relation/*ref*/Singer P.W. y Friedman, A. (2014). Cybersecurity and Cyberwar what everyone needs to know. Oxford: Oxford University Press. https://doi.org/10.1093/wentk/9780199918096.001.0001
dc.relation/*ref*/United Nations Office for Disarmament Affairs. (2018). Developments in the field of information and telecommunications in the context of international security. Obtenido de https://www.un.org/disarmament/topics/informationsecurity/
dc.relation/*ref*/UNLP (2016). Minería de datos aplicada a datos masivos. Obtenido de http://sedici.unlp.edu.ar/handle/10915/52901
dc.relation/*ref*/U.S. Department of Defense. (2015). The Department of Defense Cyber Strategy. Obtenido de https://www.defense.gov/Portals/1/features/2015/0415_cyber-strategy/Final_2015_DoD_CYBER_STRATEGY_for_web.pdf
dc.relation/*ref*/U.S. National Intelligence. (2018). Statement for the record: Worldwide Threat Assessment of the US Intelligence Community. Obtenido de https://www.intelligence.senate.gov/sites/default/files/documents/os-dcoats-021318.PDF
dc.relation/*ref*/Vaishnav, C., et al. (2013). "Cyber International Relations as an Integrated System." Environment Systems and Decisions, 33(4), 561- 576. https://doi.org/10.1007/s10669-013-9480-3
dc.rightsDerechos de autor 2022 Fuerzas Armadases-ES
dc.rightshttps://creativecommons.org/licenses/by-nc-nd/4.0es-ES
dc.sourceFuerzas Armadas; Núm. 243 (2018): La Geopolítica de las emociones; 44-51es-ES
dc.source0120-0631
dc.subjectciberseguridades-ES
dc.subjectestrategiaes-ES
dc.subjectgeopolíticaes-ES
dc.subjectinternetes-ES
dc.subjectrelaciones internacionaleses-ES
dc.subjectcybersecurityen-US
dc.subjectstrategyen-US
dc.subjectgeopoliticsen-US
dc.subjectInterneten-US
dc.subjectInternational Relationsen-US
dc.titleLa ciberseguridad: análisis político y estratégicoes-ES
dc.typeinfo:eu-repo/semantics/article
dc.typeinfo:eu-repo/semantics/publishedVersion


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record