Show simple item record

dc.creatorCayón Peña, Juan
dc.creatorGarcía Segura, Luis A.
dc.date2014-12-01
dc.date.accessioned2023-01-18T21:17:10Z
dc.date.available2023-01-18T21:17:10Z
dc.identifierhttps://esdegrevistas.edu.co/index.php/resd/article/view/9
dc.identifier10.25062/1900-8325.9
dc.identifier.urihttps://hdl.handle.net/20.500.14205/7333
dc.descriptionEste artículo pretende estudiar las principales Estrategias de ciberseguridad publicadas hasta el momento, prestando especial atención al componente educativo de las mismas. A partir de este análisis hacemos una serie de recomendaciones de cara al diseño e implementación de acciones educativas relativas a la ciberseguridad. Concluimos que la coordinación entre el sector público y privado, entre los estamentos militares y de los cuerpos de seguridad de un lado y la sociedad civil a la que sirven de otro, es vital para el desarrollo e impartición de un currículo apropiado sobre ciberseguridad en todos los niveles educativos.es-ES
dc.formatapplication/pdf
dc.formattext/html
dc.languagespa
dc.publisherEscuela Superior de Guerra "General Rafael Reyes Prieto"es-ES
dc.relationhttps://esdegrevistas.edu.co/index.php/resd/article/view/9/4
dc.relationhttps://esdegrevistas.edu.co/index.php/resd/article/view/9/128
dc.relation/*ref*/Agence Nationale de la Sécurité des Systèmes d'Information. (2011). Information systems defence and security. France's strategy. Recuperado de: http://www.ssi.gouv.fr/IMG/pdf/2011-02-15_Information_system_defence_and_security_-_France_s_strategy.pdf
dc.relation/*ref*/Australian Government. (2009). Cyber Security Strategy.
dc.relation/*ref*/Backstrom, A. & Henderson, I. (2012). Surgimiento de nuevas capacidades de combate: los avances tecnológicos contemporáneos y los desafíos jurídicos y técnicos que plantea el examen previsto en el artículo 36 del Protocolo I. International Review of the Red Cross, 94(886).
dc.relation/*ref*/Baldwin, A. & Palfreyman, J. (2009). Cyber defense: Understanding and combating the threat. Nueva York: IBM Corporation.
dc.relation/*ref*/Bundesministerium Für Inneres. (2013). Austrian Cyber Security Strategy. Vienna: Republik Österreich. Recuperado de: https://www.bka.gv.at/DocView.axd?CobId=50999
dc.relation/*ref*/CCDCOE. (2015). Cyber Security Strategy Documents. NATO Cooperative Cyber Defence Centre of Excellence.
dc.relation/*ref*/CSC. (s.f.). Education and Development Overview. Cyber Security Challenge UK.
dc.relation/*ref*/Denmark Government. (2012). Danish Defence Agreement 2013-2017. Recuperado de: http://www.fmn.dk/eng/allabout/Documents/TheDanishDefenceAgrement2013-2017englishversion.pdf
dc.relation/*ref*/Droege, C. (2012). Get off my cloud: cyber warfare, international humanitarian law, and the protection of civilians. International Review of the RedCross, 94(886), pp.533-578. https://doi.org/10.1017/S1816383113000246
dc.relation/*ref*/European Union Agency for Network and Information Security. (2012). National Cyber Security Strategies. Bruselas: European Network and Information Security Agency.
dc.relation/*ref*/European Union Agency for Network and Information Security. (2014). Public Private Partnerships in Network and Information Security Education. Bruselas: European Network and Information Security Agency.
dc.relation/*ref*/Government of Hungary. (2013). Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary. Recuperado de: http://www.nbf.hu/anyagok/Government%20Decision%20No%201139_2013%20on%20the%20National%20Cyber%20Security%20Strategy%20of%20Hungary.docx
dc.relation/*ref*/Klimburg, A. (Ed.). (2012). National Cyber Security Framework Manual. Tallinn: NATO CCD COE Publication.
dc.relation/*ref*/Lin, H. (2012). Cyber conflict and international humanitarian law. International Review of the RedCross, 94(886), 515-531. https://doi.org/10.1017/S1816383112000811
dc.relation/*ref*/Ministry of Information and Communications Technology. (2012). National Information Assurance and Cyber Security Strategy -NIACSS-.
dc.relation/*ref*/Ministry of Security and Justice. (2011). The National Cyber Security Strategy (NCSS). Recuperado de "http://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-security-strategies-ncsss/Netherlands_Cyber_Security_strategy.pdf
dc.relation/*ref*/National center of Incident readiness and Strategy for Cybersecurity. (2013, June, 10). Cybersecurity Strategy: Towards a world-leading, resilient and vigorous cyberspace. Recuperado de: http:// http://www.nisc.go.jp/active/kihon/pdf/cybersecuritystrategy-en.pdf
dc.relation/*ref*/National Security and Intelligence. (2011). The UK Cyber SecurityStrategy. Protecting and promoting the UK in a digital world. Recuperado de:http://www.gov.uk/government/publications/cyber-security-strategy
dc.relation/*ref*/NICCS. (s.f.). National Initiative For Cybersecurity Careers and Studies. Department of Homeland Security. Recuperado de http://niccs.us-cert.gov/
dc.relation/*ref*/NICE. (s.f.). National Initiative For Cybersecurity Education (NICE). National Initiative For Cybersecurity Education. Recuperado de http://csrc.nist.gov/nice/index.htm
dc.relation/*ref*/Rappert, B., Moyes, R., Crowe, A., & Nash, T. (2012). The roles of civil society in the development of standards around new weapons and other technologies of warfare. International Review of the Red Cross, 94(886) 765-785. https://doi.org/10.1017/S1816383112000744
dc.relation/*ref*/Shaw, L. (2014, December, 18). Sony's Costs From 'The Interview' Seen Near US$200 Million. Bloomberg Business. Recuperado de http://www.bloomberg.com/news/articles/2014-12-18/sony-s-costs-from-the-interview-seen-near-200-million
dc.relation/*ref*/Slovak Republic. (2008). National Strategy for Information Security in the Slovak Republic. Recuperado de: http://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-security-strategies-ncsss/Slovakia_National_Strategy_for_ISEC.pdf
dc.relation/*ref*/SSO. (s.f.). Stay Smart Online. Australian Government Initiative. Recuperado de http://www.staysmartonline.gov.au/
dc.relation/*ref*/The White House. (2003, February). The National Strategy to Secure Cyberspace. Recuperado de: http://www.us-cert.gov/sites/default/files/publications/cyberspace_strategy.pdf
dc.relation/*ref*/Underwood, J., & Koskinen, T. (2012). Ciberseguridad y educación. Comisión Europea. Elearning Papers, (28), 2-3.
dc.relation/*ref*/Unión Internacional de Telecomunicaciones (2007). Guía de ciberseguridad para los países en desarrollo.
dc.relation/*ref*/Unión Internacional de Telecomunicaciones. (2010). Resolución 181: Definiciones y terminología relativas a la creación de confianza y seguridad en la utilización de las tecnologías de la información y la comunicación. Conferencia de Plenipotenciarios.
dc.relation/*ref*/United States Government Accountability Office (2012). Cyber Threats Facilitate Ability to Commit Economic Espionage. GAO-12-876T. Recuperado de: https://www.gao.gov
dc.relation/*ref*/White House. (s.f.). Cybersecurity Information Sharing Legislation. US Government.
dc.sourceRevista Estudios en Seguridad y Defensa; Vol. 9 No. 18 (2014); 5-13en-US
dc.sourceEstudios en Seguridad y Defensa; Vol. 9 Núm. 18 (2014); 5-13es-ES
dc.source2744-8932
dc.source1900-8325
dc.subjectCiberseguridades-ES
dc.subjectestrategiaes-ES
dc.subjecteducaciónes-ES
dc.subjectderechoes-ES
dc.titleLa importancia del componente educativo en toda estrategia de Ciberseguridades-ES
dc.typeinfo:eu-repo/semantics/article
dc.typeinfo:eu-repo/semantics/publishedVersion


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record