Skip to main content

2018 | OriginalPaper | Buchkapitel

Situational Status of Global Cybersecurity and Cyber Defense According to Global Indicators. Adaptation of a Model for Ecuador

verfasst von : Fabián Bustamante, Walter Fuertes, Theofilos Tulkeredis, Mario Ron

Erschienen in: Developments and Advances in Defense and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The aim of this study has been to establish a Cybersecurity and Cyber defense model in Ecuador, based on the comparison of the worldwide situation status. Therefore, we performed a descriptive research, which has been related to the metrics and indicators of the countries with greater relevance in such areas, which have been considered as important by the International Telecommunications Union (ITU). Subsequently, we applied an incremental methodology in order to perform the comparative analysis. The main findings demonstrate that G8 countries appear or be the most prepared and mature in Cybersecurity/Cyber defense and Cyberwar. This has been also evidenced about countries with high technological level and which historically have maintained warlike conflicts. The final exposed results according to the Cybersecurity pillars of the ITU, yielded details of the relevant points and evidenced that on a global scale the United States and France are the most outstanding countries, which has led to propose a model to follow for Ecuador, which represents a country that still allows great opportunities for growth and improvement in this topic.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Watkins, B.: The Impact of Cyber-Attacks on the Private Sector, p. 12. Association for International Affair, Briefing Paper (2014) Watkins, B.: The Impact of Cyber-Attacks on the Private Sector, p. 12. Association for International Affair, Briefing Paper (2014)
2.
Zurück zum Zitat Brahima, S.: Global Cybersecurity Index 2017. International Telecommunication Union (ITU), pp. 1–77 (2017) Brahima, S.: Global Cybersecurity Index 2017. International Telecommunication Union (ITU), pp. 1–77 (2017)
4.
Zurück zum Zitat Davara, F.: Documentos de seguridad y defensa 60 Estrategia de la información y seguridad en el ciberespacio, pp. 1–120 (2014) Davara, F.: Documentos de seguridad y defensa 60 Estrategia de la información y seguridad en el ciberespacio, pp. 1–120 (2014)
5.
Zurück zum Zitat Parraguez, L.: The State of Cybersecurity in Mexico: An Overview, pp. 1–23. Wlson Center Mexico Institute, Mexico, January 2017 Parraguez, L.: The State of Cybersecurity in Mexico: An Overview, pp. 1–23. Wlson Center Mexico Institute, Mexico, January 2017
6.
Zurück zum Zitat Australian Cyber Security Centre: Strategies to Mitigate Cyber Security Incidents – Migration Details, Australian Government, pp. 1–42, February 2017 Australian Cyber Security Centre: Strategies to Mitigate Cyber Security Incidents – Migration Details, Australian Government, pp. 1–42, February 2017
7.
Zurück zum Zitat Shackelford, S., Russell, S., Haut, J.: Bottoms Up: A comparison of voluntary Cybersecurity Frameworks, pp. 1–39 (2016) Shackelford, S., Russell, S., Haut, J.: Bottoms Up: A comparison of voluntary Cybersecurity Frameworks, pp. 1–39 (2016)
8.
Zurück zum Zitat Cioaca, C., Bratu, A., Stefanescu, D.: The Analysis of Benchmarking Application in Cybersecurity, Romania, pp. 1–6 (2017) Cioaca, C., Bratu, A., Stefanescu, D.: The Analysis of Benchmarking Application in Cybersecurity, Romania, pp. 1–6 (2017)
9.
Zurück zum Zitat National Institute of Standars and Technology: Framework for Improving Critical Infrastructure Cybersecurity, United States Government, pp. 1–61, January 2017 National Institute of Standars and Technology: Framework for Improving Critical Infrastructure Cybersecurity, United States Government, pp. 1–61, January 2017
10.
Zurück zum Zitat Craig, A., Shackelford, S., Hiller, J.: Proactive cybersecurity: a comparative industry and regulatory analysis, pp. 1–63 (2016) Craig, A., Shackelford, S., Hiller, J.: Proactive cybersecurity: a comparative industry and regulatory analysis, pp. 1–63 (2016)
11.
Zurück zum Zitat Department of Commerce United States: Meeting of the Commission on Enhancing National Cybersecurity. New York University – School of Law, pp. 1–26, May 2016 Department of Commerce United States: Meeting of the Commission on Enhancing National Cybersecurity. New York University – School of Law, pp. 1–26, May 2016
13.
Zurück zum Zitat Symantec Corporation: Internet Security Threat Report, United States, vol. 22, pp. 1–77 (2017) Symantec Corporation: Internet Security Threat Report, United States, vol. 22, pp. 1–77 (2017)
14.
Zurück zum Zitat Medina, M., Molist, M.: Ciberseguridad: Tendencias 2017, Universidad Internacional de Valencia, pp. 1–35, February 2017 Medina, M., Molist, M.: Ciberseguridad: Tendencias 2017, Universidad Internacional de Valencia, pp. 1–35, February 2017
15.
Zurück zum Zitat Pilkey, A., Ahmad, A., Patel, A., et al.: 2017 State of cyber security, F-SECURE, pp. 1–77 (2017) Pilkey, A., Ahmad, A., Patel, A., et al.: 2017 State of cyber security, F-SECURE, pp. 1–77 (2017)
16.
Zurück zum Zitat Bustamante, F., Fuertes, W., Díaz, P., Toulkeridis, T.: Integration of IT frameworks for the management of information security within industrial control systems providing metrics and indicators. IEEE Xplore, pp. 1–4, August 2017 Bustamante, F., Fuertes, W., Díaz, P., Toulkeridis, T.: Integration of IT frameworks for the management of information security within industrial control systems providing metrics and indicators. IEEE Xplore, pp. 1–4, August 2017
17.
Zurück zum Zitat Bustamante, F., Fuertes, W., Díaz, P., Toulkeridis, T.: Methodology for management of information security in industrial control systems: a proof of concept aligned with enterprise objectives. Adv. Sci. Technol. Eng. Syst. J. 2(3), 88–99 (2017)CrossRef Bustamante, F., Fuertes, W., Díaz, P., Toulkeridis, T.: Methodology for management of information security in industrial control systems: a proof of concept aligned with enterprise objectives. Adv. Sci. Technol. Eng. Syst. J. 2(3), 88–99 (2017)CrossRef
18.
Zurück zum Zitat Bustamante, F., Fuertes, W., Díaz, P., Toulkeridis, T.: A methodological proposal concerning to the management of information security in Industrial Control Systems. In: Ecuador Technical Chapters Meeting (ETCM), vol. 1, pp. 1–6. IEEE, October 2016 Bustamante, F., Fuertes, W., Díaz, P., Toulkeridis, T.: A methodological proposal concerning to the management of information security in Industrial Control Systems. In: Ecuador Technical Chapters Meeting (ETCM), vol. 1, pp. 1–6. IEEE, October 2016
19.
Zurück zum Zitat ICS-CERT: “Year in Review”, Industrial Control Systems Cyber Emergency Response Team U.S. Department of Homeland Security, pp. 1–24 (2014) ICS-CERT: “Year in Review”, Industrial Control Systems Cyber Emergency Response Team U.S. Department of Homeland Security, pp. 1–24 (2014)
20.
Zurück zum Zitat Vishik, C., Matsubara, M., Plonk, A.: Key Concepts in Cyber Security: Towards a Common Policy and Technology Context for Cyber Security Norms, pp. 221–242. NATO CCD COE Publications, Tallinn (2016) Vishik, C., Matsubara, M., Plonk, A.: Key Concepts in Cyber Security: Towards a Common Policy and Technology Context for Cyber Security Norms, pp. 221–242. NATO CCD COE Publications, Tallinn (2016)
21.
Zurück zum Zitat Tabansky, L.: Basic concepts in cyber warfare. Mil. Strateg. Aff. 3, 75–92 (2011) Tabansky, L.: Basic concepts in cyber warfare. Mil. Strateg. Aff. 3, 75–92 (2011)
22.
Zurück zum Zitat Boopathi, K., Sreejith, S., Bithin, A.: Learning cyber security through gamification. Indian J. Sci. Technol. 8(7), 642–649 (2015)CrossRef Boopathi, K., Sreejith, S., Bithin, A.: Learning cyber security through gamification. Indian J. Sci. Technol. 8(7), 642–649 (2015)CrossRef
23.
Zurück zum Zitat Abrahams, L., Mbanaso, U.: State of Internet Security and Policy in Africa, pp. 1–7, October 2017 Abrahams, L., Mbanaso, U.: State of Internet Security and Policy in Africa, pp. 1–7, October 2017
Metadaten
Titel
Situational Status of Global Cybersecurity and Cyber Defense According to Global Indicators. Adaptation of a Model for Ecuador
verfasst von
Fabián Bustamante
Walter Fuertes
Theofilos Tulkeredis
Mario Ron
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-78605-6_2