Cybersecurity and Business Continuity in Pandemic Times

Este documento se enmarca en el contexto del proyecto de investigación en curso titulado "Diseño de un mecanismo de resiliencia cibernética para la continuidad del negocio en las organizaciones”, teniendo como objetivo presentan el contexto de la ciberseguridad en este tiempo de pandemia, donde...

Full description

Autores:
Hernández Bejarano, Miguel
Simanca Herrera, Fredys Alberto
Páez Páez, Jaime Alberto
Castro, Mario Fernando
Cortés Méndez, Jairo Augusto
Tipo de recurso:
Article of journal
Fecha de publicación:
2021
Institución:
Universidad Cooperativa de Colombia
Repositorio:
Repositorio UCC
Idioma:
OAI Identifier:
oai:repository.ucc.edu.co:20.500.12494/49046
Acceso en línea:
https://hdl.handle.net/20.500.12494/49046
Palabra clave:
La seguridad cibernética
COVID-19
Continuidad del negocio
Cybersecurity
COVID-19
Business continuity
Rights
openAccess
License
http://purl.org/coar/access_right/c_abf2
id COOPER2_b28823b9e3828f6ad0795d73d423ca36
oai_identifier_str oai:repository.ucc.edu.co:20.500.12494/49046
network_acronym_str COOPER2
network_name_str Repositorio UCC
repository_id_str
dc.title.none.fl_str_mv Cybersecurity and Business Continuity in Pandemic Times
title Cybersecurity and Business Continuity in Pandemic Times
spellingShingle Cybersecurity and Business Continuity in Pandemic Times
La seguridad cibernética
COVID-19
Continuidad del negocio
Cybersecurity
COVID-19
Business continuity
title_short Cybersecurity and Business Continuity in Pandemic Times
title_full Cybersecurity and Business Continuity in Pandemic Times
title_fullStr Cybersecurity and Business Continuity in Pandemic Times
title_full_unstemmed Cybersecurity and Business Continuity in Pandemic Times
title_sort Cybersecurity and Business Continuity in Pandemic Times
dc.creator.fl_str_mv Hernández Bejarano, Miguel
Simanca Herrera, Fredys Alberto
Páez Páez, Jaime Alberto
Castro, Mario Fernando
Cortés Méndez, Jairo Augusto
dc.contributor.author.none.fl_str_mv Hernández Bejarano, Miguel
Simanca Herrera, Fredys Alberto
Páez Páez, Jaime Alberto
Castro, Mario Fernando
Cortés Méndez, Jairo Augusto
dc.subject.none.fl_str_mv La seguridad cibernética
COVID-19
Continuidad del negocio
topic La seguridad cibernética
COVID-19
Continuidad del negocio
Cybersecurity
COVID-19
Business continuity
dc.subject.other.none.fl_str_mv Cybersecurity
COVID-19
Business continuity
description Este documento se enmarca en el contexto del proyecto de investigación en curso titulado "Diseño de un mecanismo de resiliencia cibernética para la continuidad del negocio en las organizaciones”, teniendo como objetivo presentan el contexto de la ciberseguridad en este tiempo de pandemia, donde el cibercrimen busca nuevos caminos para atacar a organizaciones e individuos. Las estrategias de ciberseguridad deben adaptarse a las contexto situacional. La resiliencia organizacional también está presente en las organizaciones para garantizar la continuidad, donde los planes de continuidad de las organizaciones están considerando la pandemia
publishDate 2021
dc.date.issued.none.fl_str_mv 2021
dc.date.accessioned.none.fl_str_mv 2023-03-28T19:42:20Z
dc.date.available.none.fl_str_mv 2023-03-28T19:42:20Z
dc.type.none.fl_str_mv Artículo
dc.type.coar.fl_str_mv http://purl.org/coar/resource_type/c_2df8fbb1
dc.type.coar.none.fl_str_mv http://purl.org/coar/resource_type/c_6501
dc.type.coarversion.none.fl_str_mv http://purl.org/coar/version/c_970fb48d4fbd8a85
dc.type.driver.none.fl_str_mv info:eu-repo/semantics/article
dc.type.version.none.fl_str_mv info:eu-repo/semantics/publishedVersion
format http://purl.org/coar/resource_type/c_6501
status_str publishedVersion
dc.identifier.issn.none.fl_str_mv 1583-6258
dc.identifier.uri.none.fl_str_mv https://hdl.handle.net/20.500.12494/49046
dc.identifier.bibliographicCitation.none.fl_str_mv Simanca, F; Rodríguez. J; Paez, j.; Cortes, J., E y Castro, M. (2021). Cybersecurity and Business Continuity in Pandemic Times. Annals of R.S.C.B. Vol. 25, Issue 6
identifier_str_mv 1583-6258
Simanca, F; Rodríguez. J; Paez, j.; Cortes, J., E y Castro, M. (2021). Cybersecurity and Business Continuity in Pandemic Times. Annals of R.S.C.B. Vol. 25, Issue 6
url https://hdl.handle.net/20.500.12494/49046
dc.relation.isversionof.none.fl_str_mv https://scholar.google.es/scholar?oi=bibs&hl=es&cluster=2584272814630191096
dc.relation.ispartofjournal.none.fl_str_mv Annals of R.S.C.B
dc.relation.references.none.fl_str_mv M. Chen, S. Mao, and Y. Liu, "Big data: A survey," Mob. Netw. Appl. vol. 19, pp. 171-209, 2014.
D. S. Reveron and J. E. Savage, "Cybersecurity Convergence: Digital Human and National Security," Orbis, vol. 64, pp. 555-570, 2020.
M. Choraś and M. Pawlicki, "Intrusion detection approach based on optimised artificial neural network," artificial neural network, 2020.
T. Papadopoulos, K. N. Baltas, and M. E. Balta, "he use of digital technologies by small and medium enterprises during COVID-19: Implications for theory and practice," International Journal of Information Management, vol. 55, p. 102192, 2020.
Statista, "FRAUD ONLINE," 1 09 2020. [Online]. Available: https://es.statista.com/grafico/18427/intentos-de-phishing-durante-la-pandemia/. [Last access: 11 04 2021].
C. Pandit, H. Kothari, and C. Neuman, "Privacy in time of a pandemic," from 2020 13th CMI Conference on Cybersecurity and Privacy (CMI) - Digital Transformation - Potentials and Challenges(51275), IEEE, 2020, pp. 1-6.
L. Galbusera, M. Cardarilli, and G. Giannopoulos, "The ERNCIP survey on COVID-19: Emergency & Business Continuity for fostering resilience in critical infrastructures,,," Safety Science, p. 105161, 2021.
L. Budd, S. Ison, and N. Adrienne, "European airline response to the COVID-19 pandemic - Contraction, consolidation and future considerations for airline business and management,,," Research in Transportation Business & Management, vol. 37, p. 100578, 2020
V. Susukailo, I. Opirskyy, and S. Vasylyshyn, "Analysis of the attack vectors used by threat actors during the pandemic," from 2020 IEEE 15th International Conference on Computer Sciences and Information Technologies (CSIT), IEEE, 2020, pp. 261-264.
W. N. Zechariah Wong, "Transforming corporate performance: A
L. Tawalbeh, F. Muheidat, T. M., M. Quwaider, and G. Saldamli, "Predicting and Preventing Cyber Attacks During COVID-19 Time Using Data Analysis and Proposed Secure IoT layered Model," from 2020 Fourth International Conference on Multimedia Computing, Networking and Applications (MCNA), Valencia, Spain, IEEE, 2020, pp. 113- 118.
dc.rights.accessrights.none.fl_str_mv info:eu-repo/semantics/openAccess
dc.rights.coar.none.fl_str_mv http://purl.org/coar/access_right/c_abf2
eu_rights_str_mv openAccess
rights_invalid_str_mv http://purl.org/coar/access_right/c_abf2
dc.format.extent.none.fl_str_mv 7280 - 7289
dc.coverage.temporal.none.fl_str_mv Vol. 25, Issue 6
dc.publisher.none.fl_str_mv Universidad Cooperativa de Colombia, Facultad de Ingenierías, Ingeniería de Sistemas, Bogotá
dc.publisher.program.none.fl_str_mv Ingeniería de Sistemas
dc.publisher.place.none.fl_str_mv Bogotá
publisher.none.fl_str_mv Universidad Cooperativa de Colombia, Facultad de Ingenierías, Ingeniería de Sistemas, Bogotá
institution Universidad Cooperativa de Colombia
bitstream.url.fl_str_mv https://repository.ucc.edu.co/bitstreams/8e27c2a6-f35b-4ece-82cb-886cb3a75ae9/download
bitstream.checksum.fl_str_mv 3bce4f7ab09dfc588f126e1e36e98a45
bitstream.checksumAlgorithm.fl_str_mv MD5
repository.name.fl_str_mv Repositorio Institucional Universidad Cooperativa de Colombia
repository.mail.fl_str_mv bdigital@metabiblioteca.com
_version_ 1814246710200762368
spelling Hernández Bejarano, MiguelSimanca Herrera, Fredys AlbertoPáez Páez, Jaime AlbertoCastro, Mario FernandoCortés Méndez, Jairo AugustoVol. 25, Issue 62023-03-28T19:42:20Z2023-03-28T19:42:20Z20211583-6258https://hdl.handle.net/20.500.12494/49046Simanca, F; Rodríguez. J; Paez, j.; Cortes, J., E y Castro, M. (2021). Cybersecurity and Business Continuity in Pandemic Times. Annals of R.S.C.B. Vol. 25, Issue 6Este documento se enmarca en el contexto del proyecto de investigación en curso titulado "Diseño de un mecanismo de resiliencia cibernética para la continuidad del negocio en las organizaciones”, teniendo como objetivo presentan el contexto de la ciberseguridad en este tiempo de pandemia, donde el cibercrimen busca nuevos caminos para atacar a organizaciones e individuos. Las estrategias de ciberseguridad deben adaptarse a las contexto situacional. La resiliencia organizacional también está presente en las organizaciones para garantizar la continuidad, donde los planes de continuidad de las organizaciones están considerando la pandemiaThis document is framed in the context of the ongoing research project entitled "Design of a cyber resilience mechanism for business continuity in organizations", having as an objective to present the context of cybersecurity in this time of pandemic, where cybercrime seeks new ways to attack organizations and individuals. Cybersecurity strategies must be adapted to the situational context. Organizational resilience is also present in organizations to ensure business continuity, where the continuity plans of organizations are considering the pandemic ahttps://co.linkedin.com/in/jaime-alberto-paez-paez-49548823https://www.researchgate.net/profile/Jairo-Cortes-Mendezhttps://orcid.org/0000-0002-7312-0180INSIGHTJaime.paez@campusucc.edu.cojairo.cortes@campusucc.edu.cofredys.simanca@campusucc.edu.cohttps://scholar.google.com/citations?user=7SOhB48AAAAJ&hl=eshttps://scholar.google.es/citations?hl=es&user=dhHrDtQAAAAJ&view_op=list_works&sortby=pubdatehttps://scholar.google.com.co/citations?user=QnZg_mkAAAAJ&hl=en7280 - 7289Universidad Cooperativa de Colombia, Facultad de Ingenierías, Ingeniería de Sistemas, BogotáIngeniería de SistemasBogotáhttps://scholar.google.es/scholar?oi=bibs&hl=es&cluster=2584272814630191096Annals of R.S.C.BM. Chen, S. Mao, and Y. Liu, "Big data: A survey," Mob. Netw. Appl. vol. 19, pp. 171-209, 2014.D. S. Reveron and J. E. Savage, "Cybersecurity Convergence: Digital Human and National Security," Orbis, vol. 64, pp. 555-570, 2020.M. Choraś and M. Pawlicki, "Intrusion detection approach based on optimised artificial neural network," artificial neural network, 2020.T. Papadopoulos, K. N. Baltas, and M. E. Balta, "he use of digital technologies by small and medium enterprises during COVID-19: Implications for theory and practice," International Journal of Information Management, vol. 55, p. 102192, 2020.Statista, "FRAUD ONLINE," 1 09 2020. [Online]. Available: https://es.statista.com/grafico/18427/intentos-de-phishing-durante-la-pandemia/. [Last access: 11 04 2021].C. Pandit, H. Kothari, and C. Neuman, "Privacy in time of a pandemic," from 2020 13th CMI Conference on Cybersecurity and Privacy (CMI) - Digital Transformation - Potentials and Challenges(51275), IEEE, 2020, pp. 1-6.L. Galbusera, M. Cardarilli, and G. Giannopoulos, "The ERNCIP survey on COVID-19: Emergency & Business Continuity for fostering resilience in critical infrastructures,,," Safety Science, p. 105161, 2021.L. Budd, S. Ison, and N. Adrienne, "European airline response to the COVID-19 pandemic - Contraction, consolidation and future considerations for airline business and management,,," Research in Transportation Business & Management, vol. 37, p. 100578, 2020V. Susukailo, I. Opirskyy, and S. Vasylyshyn, "Analysis of the attack vectors used by threat actors during the pandemic," from 2020 IEEE 15th International Conference on Computer Sciences and Information Technologies (CSIT), IEEE, 2020, pp. 261-264.W. N. Zechariah Wong, "Transforming corporate performance: AL. Tawalbeh, F. Muheidat, T. M., M. Quwaider, and G. Saldamli, "Predicting and Preventing Cyber Attacks During COVID-19 Time Using Data Analysis and Proposed Secure IoT layered Model," from 2020 Fourth International Conference on Multimedia Computing, Networking and Applications (MCNA), Valencia, Spain, IEEE, 2020, pp. 113- 118.La seguridad cibernéticaCOVID-19Continuidad del negocioCybersecurityCOVID-19Business continuityCybersecurity and Business Continuity in Pandemic TimesArtículohttp://purl.org/coar/resource_type/c_6501http://purl.org/coar/resource_type/c_2df8fbb1http://purl.org/coar/version/c_970fb48d4fbd8a85info:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/openAccesshttp://purl.org/coar/access_right/c_abf2PublicationLICENSElicense.txtlicense.txttext/plain; charset=utf-84334https://repository.ucc.edu.co/bitstreams/8e27c2a6-f35b-4ece-82cb-886cb3a75ae9/download3bce4f7ab09dfc588f126e1e36e98a45MD5120.500.12494/49046oai:repository.ucc.edu.co:20.500.12494/490462024-08-10 21:01:42.451metadata.onlyhttps://repository.ucc.edu.coRepositorio Institucional Universidad Cooperativa de Colombiabdigital@metabiblioteca.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