dc.creator | Cayón Peña, Juan | |
dc.creator | García Segura, Luis A. | |
dc.date | 2014-12-01 | |
dc.date.accessioned | 2023-01-18T21:17:10Z | |
dc.date.available | 2023-01-18T21:17:10Z | |
dc.identifier | https://esdegrevistas.edu.co/index.php/resd/article/view/9 | |
dc.identifier | 10.25062/1900-8325.9 | |
dc.identifier.uri | https://hdl.handle.net/20.500.14205/7333 | |
dc.description | Este artículo pretende estudiar las principales Estrategias de ciberseguridad publicadas hasta el momento, prestando especial atención al componente educativo de las mismas. A partir de este análisis hacemos una serie de recomendaciones de cara al diseño e implementación de acciones educativas relativas a la ciberseguridad. Concluimos que la coordinación entre el sector público y privado, entre los estamentos militares y de los cuerpos de seguridad de un lado y la sociedad civil a la que sirven de otro, es vital para el desarrollo e impartición de un currículo apropiado sobre ciberseguridad en todos los niveles educativos. | es-ES |
dc.format | application/pdf | |
dc.format | text/html | |
dc.language | spa | |
dc.publisher | Escuela Superior de Guerra "General Rafael Reyes Prieto" | es-ES |
dc.relation | https://esdegrevistas.edu.co/index.php/resd/article/view/9/4 | |
dc.relation | https://esdegrevistas.edu.co/index.php/resd/article/view/9/128 | |
dc.relation | /*ref*/Agence Nationale de la Sécurité des Systèmes d'Information. (2011). Information systems defence and security. France's strategy. Recuperado de: http://www.ssi.gouv.fr/IMG/pdf/2011-02-15_Information_system_defence_and_security_-_France_s_strategy.pdf | |
dc.relation | /*ref*/Australian Government. (2009). Cyber Security Strategy. | |
dc.relation | /*ref*/Backstrom, A. & Henderson, I. (2012). Surgimiento de nuevas capacidades de combate: los avances tecnológicos contemporáneos y los desafíos jurídicos y técnicos que plantea el examen previsto en el artículo 36 del Protocolo I. International Review of the Red Cross, 94(886). | |
dc.relation | /*ref*/Baldwin, A. & Palfreyman, J. (2009). Cyber defense: Understanding and combating the threat. Nueva York: IBM Corporation. | |
dc.relation | /*ref*/Bundesministerium Für Inneres. (2013). Austrian Cyber Security Strategy. Vienna: Republik Österreich. Recuperado de: https://www.bka.gv.at/DocView.axd?CobId=50999 | |
dc.relation | /*ref*/CCDCOE. (2015). Cyber Security Strategy Documents. NATO Cooperative Cyber Defence Centre of Excellence. | |
dc.relation | /*ref*/CSC. (s.f.). Education and Development Overview. Cyber Security Challenge UK. | |
dc.relation | /*ref*/Denmark Government. (2012). Danish Defence Agreement 2013-2017. Recuperado de: http://www.fmn.dk/eng/allabout/Documents/TheDanishDefenceAgrement2013-2017englishversion.pdf | |
dc.relation | /*ref*/Droege, C. (2012). Get off my cloud: cyber warfare, international humanitarian law, and the protection of civilians. International Review of the RedCross, 94(886), pp.533-578. https://doi.org/10.1017/S1816383113000246 | |
dc.relation | /*ref*/European Union Agency for Network and Information Security. (2012). National Cyber Security Strategies. Bruselas: European Network and Information Security Agency. | |
dc.relation | /*ref*/European Union Agency for Network and Information Security. (2014). Public Private Partnerships in Network and Information Security Education. Bruselas: European Network and Information Security Agency. | |
dc.relation | /*ref*/Government of Hungary. (2013). Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary. Recuperado de: http://www.nbf.hu/anyagok/Government%20Decision%20No%201139_2013%20on%20the%20National%20Cyber%20Security%20Strategy%20of%20Hungary.docx | |
dc.relation | /*ref*/Klimburg, A. (Ed.). (2012). National Cyber Security Framework Manual. Tallinn: NATO CCD COE Publication. | |
dc.relation | /*ref*/Lin, H. (2012). Cyber conflict and international humanitarian law. International Review of the RedCross, 94(886), 515-531. https://doi.org/10.1017/S1816383112000811 | |
dc.relation | /*ref*/Ministry of Information and Communications Technology. (2012). National Information Assurance and Cyber Security Strategy -NIACSS-. | |
dc.relation | /*ref*/Ministry of Security and Justice. (2011). The National Cyber Security Strategy (NCSS). Recuperado de "http://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-security-strategies-ncsss/Netherlands_Cyber_Security_strategy.pdf | |
dc.relation | /*ref*/National center of Incident readiness and Strategy for Cybersecurity. (2013, June, 10). Cybersecurity Strategy: Towards a world-leading, resilient and vigorous cyberspace. Recuperado de: http:// http://www.nisc.go.jp/active/kihon/pdf/cybersecuritystrategy-en.pdf | |
dc.relation | /*ref*/National Security and Intelligence. (2011). The UK Cyber SecurityStrategy. Protecting and promoting the UK in a digital world. Recuperado de:http://www.gov.uk/government/publications/cyber-security-strategy | |
dc.relation | /*ref*/NICCS. (s.f.). National Initiative For Cybersecurity Careers and Studies. Department of Homeland Security. Recuperado de http://niccs.us-cert.gov/ | |
dc.relation | /*ref*/NICE. (s.f.). National Initiative For Cybersecurity Education (NICE). National Initiative For Cybersecurity Education. Recuperado de http://csrc.nist.gov/nice/index.htm | |
dc.relation | /*ref*/Rappert, B., Moyes, R., Crowe, A., & Nash, T. (2012). The roles of civil society in the development of standards around new weapons and other technologies of warfare. International Review of the Red Cross, 94(886) 765-785. https://doi.org/10.1017/S1816383112000744 | |
dc.relation | /*ref*/Shaw, L. (2014, December, 18). Sony's Costs From 'The Interview' Seen Near US$200 Million. Bloomberg Business. Recuperado de http://www.bloomberg.com/news/articles/2014-12-18/sony-s-costs-from-the-interview-seen-near-200-million | |
dc.relation | /*ref*/Slovak Republic. (2008). National Strategy for Information Security in the Slovak Republic. Recuperado de: http://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-security-strategies-ncsss/Slovakia_National_Strategy_for_ISEC.pdf | |
dc.relation | /*ref*/SSO. (s.f.). Stay Smart Online. Australian Government Initiative. Recuperado de http://www.staysmartonline.gov.au/ | |
dc.relation | /*ref*/The White House. (2003, February). The National Strategy to Secure Cyberspace. Recuperado de: http://www.us-cert.gov/sites/default/files/publications/cyberspace_strategy.pdf | |
dc.relation | /*ref*/Underwood, J., & Koskinen, T. (2012). Ciberseguridad y educación. Comisión Europea. Elearning Papers, (28), 2-3. | |
dc.relation | /*ref*/Unión Internacional de Telecomunicaciones (2007). Guía de ciberseguridad para los países en desarrollo. | |
dc.relation | /*ref*/Unión Internacional de Telecomunicaciones. (2010). Resolución 181: Definiciones y terminología relativas a la creación de confianza y seguridad en la utilización de las tecnologías de la información y la comunicación. Conferencia de Plenipotenciarios. | |
dc.relation | /*ref*/United States Government Accountability Office (2012). Cyber Threats Facilitate Ability to Commit Economic Espionage. GAO-12-876T. Recuperado de: https://www.gao.gov | |
dc.relation | /*ref*/White House. (s.f.). Cybersecurity Information Sharing Legislation. US Government. | |
dc.source | Revista Estudios en Seguridad y Defensa; Vol. 9 No. 18 (2014); 5-13 | en-US |
dc.source | Estudios en Seguridad y Defensa; Vol. 9 Núm. 18 (2014); 5-13 | es-ES |
dc.source | 2744-8932 | |
dc.source | 1900-8325 | |
dc.subject | Ciberseguridad | es-ES |
dc.subject | estrategia | es-ES |
dc.subject | educación | es-ES |
dc.subject | derecho | es-ES |
dc.title | La importancia del componente educativo en toda estrategia de Ciberseguridad | es-ES |
dc.type | info:eu-repo/semantics/article | |
dc.type | info:eu-repo/semantics/publishedVersion | |