Identificación de elementos de seguridad basados en el modelo C2M2 para la industria manufacturera del sector textil

En este trabajo se presenta un estudio de identificación de los elementos de seguridad que afectan a la industria textil –que utiliza sistemas SCADA– los riesgos de fuga, indisponibilidad o alteración no permitida de la información en los ambientes comunes en que operan las tecnologías de la informa...

Full description

Autores:
Aristizábal Correa, Jorge Mario
Marín Ramírez, Leonel
Álvarez Salazar, Johny
Tipo de recurso:
Trabajo de grado de pregrado
Fecha de publicación:
2019
Institución:
Universidad Autónoma de Bucaramanga - UNAB
Repositorio:
Repositorio UNAB
Idioma:
spa
OAI Identifier:
oai:repository.unab.edu.co:20.500.12749/8826
Acceso en línea:
http://hdl.handle.net/20.500.12749/8826
Palabra clave:
TIC
Desarrollo urbano
Planeación territorial
Gobierno local
Sistemas de información
C2M2
Cibersecurity
SCADA
Security elements
Textile industry
Computer's science
Technological innovations
Research
Technology of the information and communication
Ciencias de la computación
Innovaciones tecnológicas
Investigación
Tecnologías de la información y la comunicación
Desarrollo urbano
Planeación territorial
Gobierno local
Sistemas de información
Rights
License
Derechos de autor 2019 Revista Colombiana de Computación
id UNAB2_0137a623d60769cb3ce99aa61bf9c0c2
oai_identifier_str oai:repository.unab.edu.co:20.500.12749/8826
network_acronym_str UNAB2
network_name_str Repositorio UNAB
repository_id_str
dc.title.spa.fl_str_mv Identificación de elementos de seguridad basados en el modelo C2M2 para la industria manufacturera del sector textil
dc.title.translated.eng.fl_str_mv Identification of safety elements based on the C2M2 model for the textile industry
title Identificación de elementos de seguridad basados en el modelo C2M2 para la industria manufacturera del sector textil
spellingShingle Identificación de elementos de seguridad basados en el modelo C2M2 para la industria manufacturera del sector textil
TIC
Desarrollo urbano
Planeación territorial
Gobierno local
Sistemas de información
C2M2
Cibersecurity
SCADA
Security elements
Textile industry
Computer's science
Technological innovations
Research
Technology of the information and communication
Ciencias de la computación
Innovaciones tecnológicas
Investigación
Tecnologías de la información y la comunicación
Desarrollo urbano
Planeación territorial
Gobierno local
Sistemas de información
title_short Identificación de elementos de seguridad basados en el modelo C2M2 para la industria manufacturera del sector textil
title_full Identificación de elementos de seguridad basados en el modelo C2M2 para la industria manufacturera del sector textil
title_fullStr Identificación de elementos de seguridad basados en el modelo C2M2 para la industria manufacturera del sector textil
title_full_unstemmed Identificación de elementos de seguridad basados en el modelo C2M2 para la industria manufacturera del sector textil
title_sort Identificación de elementos de seguridad basados en el modelo C2M2 para la industria manufacturera del sector textil
dc.creator.fl_str_mv Aristizábal Correa, Jorge Mario
Marín Ramírez, Leonel
Álvarez Salazar, Johny
dc.contributor.author.spa.fl_str_mv Aristizábal Correa, Jorge Mario
Marín Ramírez, Leonel
Álvarez Salazar, Johny
dc.contributor.googlescholar.spa.fl_str_mv Álvarez Salazar, Johny [h4QtY5EAAAAJ]
dc.contributor.orcid.spa.fl_str_mv Aristizábal Correa, Jorge Mario [0000-0003-1880-8684]
Álvarez Salazar, Johny [0000-0002-7041-8619]
dc.subject.none.fl_str_mv TIC
Desarrollo urbano
Planeación territorial
Gobierno local
Sistemas de información
topic TIC
Desarrollo urbano
Planeación territorial
Gobierno local
Sistemas de información
C2M2
Cibersecurity
SCADA
Security elements
Textile industry
Computer's science
Technological innovations
Research
Technology of the information and communication
Ciencias de la computación
Innovaciones tecnológicas
Investigación
Tecnologías de la información y la comunicación
Desarrollo urbano
Planeación territorial
Gobierno local
Sistemas de información
dc.subject.keywords.eng.fl_str_mv C2M2
Cibersecurity
SCADA
Security elements
Textile industry
Computer's science
Technological innovations
Research
Technology of the information and communication
dc.subject.lemb.spa.fl_str_mv Ciencias de la computación
Innovaciones tecnológicas
Investigación
Tecnologías de la información y la comunicación
dc.subject.proposal.spa.fl_str_mv Desarrollo urbano
Planeación territorial
Gobierno local
Sistemas de información
description En este trabajo se presenta un estudio de identificación de los elementos de seguridad que afectan a la industria textil –que utiliza sistemas SCADA– los riesgos de fuga, indisponibilidad o alteración no permitida de la información en los ambientes comunes en que operan las tecnologías de la información (TI) y las tecnologías de operación (TO). Para llevar a cabo lo anterior se utilizaron los elementos identificados en la guía de seguridad para los sistemas de control industrial NIST 800-82 y el modelo de madurez en ciberseguridad C2M2. Como resultado se obtuvieron los elementos de seguridad que se ven involucrados en los diferentes procesos, tendencias tecnológicas de la industria analizada; de otra parte, se realizó un comparativo del modelo C2M2 y la NIST 800-82.
publishDate 2019
dc.date.issued.none.fl_str_mv 2019-12-01
dc.date.accessioned.none.fl_str_mv 2020-10-27T00:19:56Z
dc.date.available.none.fl_str_mv 2020-10-27T00:19:56Z
dc.type.coar.fl_str_mv http://purl.org/coar/resource_type/c_2df8fbb1
dc.type.coarversion.fl_str_mv http://purl.org/coar/version/c_970fb48d4fbd8a85
dc.type.driver.none.fl_str_mv info:eu-repo/semantics/article
dc.type.local.spa.fl_str_mv Artículo
dc.type.coar.none.fl_str_mv http://purl.org/coar/resource_type/c_7a1f
dc.type.redcol.none.fl_str_mv http://purl.org/redcol/resource_type/CJournalArticle
format http://purl.org/coar/resource_type/c_7a1f
dc.identifier.issn.none.fl_str_mv 2539-2115
1657-2831
dc.identifier.uri.none.fl_str_mv http://hdl.handle.net/20.500.12749/8826
dc.identifier.instname.spa.fl_str_mv instname:Universidad Autónoma de Bucaramanga UNAB
dc.identifier.repourl.none.fl_str_mv repourl:https://repository.unab.edu.co
dc.identifier.doi.none.fl_str_mv 10.29375/25392115.3722
identifier_str_mv 2539-2115
1657-2831
instname:Universidad Autónoma de Bucaramanga UNAB
repourl:https://repository.unab.edu.co
10.29375/25392115.3722
url http://hdl.handle.net/20.500.12749/8826
dc.language.iso.spa.fl_str_mv spa
language spa
dc.relation.none.fl_str_mv https://revistas.unab.edu.co/index.php/rcc/article/view/3722/3158
Https://revistas.unab.edu.co/index.php/rcc/article/view/3722/3144
/*ref*/Ani, U. P. D., He, H. (Mary), & Tiwari, A. (2017). Review of cybersecurity issues in industrial critical infrastructure: manufacturing in perspective. Journal of Cyber Security Technology, 1(1), 32–74. https://doi.org/10.1080/23742917.2016.1252211
/*ref*/Assante, D., Romano, E., Flamini, M., Castro, M., Martin, S., Lavirotte, S., & Spatafora, M. (2018). Internet of Things education: Labor market training needs and national policies. In 2018 IEEE Global Engineering Education Conference (EDUCON) (pp. 1846–1853). IEEE. https://doi.org/10.1109/EDUCON.2018.8363459
/*ref*/Bernieri, G., Etchevés Miciolino, E., Pascucci, F., & Setola, R. (2017). Monitoring system reaction in cyber-physical testbed under cyber-attacks. Computers & Electrical Engineering, 59, 86–98. https://doi.org/10.1016/j.compeleceng.2017.02.010
/*ref*/Candell, R., Anand, D., & Stouffer, K. (2014). A cybersecurity testbed for industrial control systems. In Proceedings of the 2014 Process Control and Safety Symposium (pp. 1–16). Retrieved from https://ws680.nist.gov/publication/get_pdf.cfm?pub_id=915876
/*ref*/Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H., & Stoddart, K. (2016). A review of cyber security risk assessment methods for SCADA systems. Computers & Security, 56, 1–27. https://doi.org/10.1016/j.cose.2015.09.009
/*ref*/CIDETEXCO. (2011). Tendencias tecnológicas ciclo de vida de producto. industria fibra textil confección R2-2011-CIDETEXCO.
/*ref*/Curtis, P. D., & Mehravari, N. (2015). Evaluating and improving cybersecurity capabilities of the energy critical infrastructure. In 2015 IEEE International Symposium on Technologies for Homeland Security (HST) (pp. 1–6). IEEE. https://doi.org/10.1109/THS.2015.7225323.
/*ref*/Cybersecurity and Infrastructure Security Agency. (2018). ICS Alert (ICS-ALERT-12-195-01). Retrieved May 30, 2019, from https://www.us-cert.gov/ics/alerts/ICS-ALERT-12-195-01.
/*ref*/Hernández Cevallos, M. I., & Ledesma Marcalla, D. A. (2010). Desarrollo de un sistema SCADA para la medición de voltajes con sistemas embebidos para el laboratorio de mecatrónica de la facultad de mecánica. Retrieved from http://dspace.espoch.edu.ec/bitstream/123456789/1137/1/25T00140.pdf.
/*ref*/Johnson, C. (2012). CyberSafety: CyberSecurity and Safety-Critical Software Engineering. In Achieving Systems Safety (pp. 85–95). London: Springer London. https://doi.org/10.1007/978-1-4471-2494-8_8.
/*ref*/Knapp, E. D., & Langill, J. T. (2015). Industrial Network Security (Second). Elsevier. https://doi.org/10.1016/C2013-0-06836-3.
/*ref*/Kornecki, A. J., & Zalewski, J. (2010). Safety and security in industrial control. In Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research - CSIIRW ’10 (p. 1). New York, New York, USA: ACM Press. https://doi.org/10.1145/1852666.1852754.
/*ref*/Kriz, D. (2011). Cybersecurity principles for industry and government: A useful framework for efforts globally to improve cybersecurity. In 2011 Second Worldwide Cybersecurity Summit (WCS). London, UK: IEEE. Retrieved from https://ieeexplore.ieee.org/abstract/document/5978798.
/*ref*/McGurk, S. P. (2008). Industrial Control Systems Security. Retrieved from https://csrc.nist.gov/csrc/media/events/ispab-december-2008-meeting/documents/icssecurity_ispab-dec2008_spmcgurk.pdf.
/*ref*/Proença, D., & Borbinha, J. (2016). Maturity Models for Information Systems - A State of the Art. Procedia Computer Science, 100, 1042–1049. https://doi.org/10.1016/j.procs.2016.09.279.
/*ref*/Schrecker, S. (2015). Industrial automation systems cybersecurity. Embedding end-to-end trust and security. Retrieved May 30, 2019, from https://www.isa.org/intech/20150401/.
/*ref*/U.S. Department of Energy. (2014). Cybersecurity Capability Maturity Model (C2M2). Retrieved May 30, 2019, from https://www.energy.gov/ceser/activities/cybersecurity-critical-energy-infrastructure/energy-sector-cybersecurity-0-0.
dc.relation.uri.none.fl_str_mv https://revistas.unab.edu.co/index.php/rcc/article/view/3722
dc.relation.references.none.fl_str_mv Ani, U. P. D., He, H. (Mary), y Tiwari, A. (2017). Review of cybersecurity issues in industrial critical infrastructure: manufacturing in perspective. Journal of Cyber Security Technology, 1(1), 32–74. https://doi.org/10.1080/ 23742917.2016.1252211
Assante, D., Romano, E., Flamini, M., Castro, M., Martin, S., Lavirotte, S., y Spatafora, M. (2018). Internet of Things education: Labor market training needs and national policies. In 2018 IEEE Global Engineering Education Conference (EDUCON) (pp. 1846–1853). IEEE. https://doi.org/10.1109/EDUCON.2018.8363459
Bernieri, G., Etchevés Miciolino, E., Pascucci, F., y Setola, R. (2017). Monitoring system reaction in cyber-physical testbed under cyber-attacks. Computers y Electrical Engineering, 59, 86–98. https://doi.org/10.1016/j. compeleceng.2017.02.010
Candell, R., Anand, D., y Stouffer, K. (2014). A cybersecurity testbed for industrial control systems. In Proceedings of the 2014 Process Control and Safety Symposium (pp. 1–16). Retrieved from https://ws680.nist.gov/ publication/get_pdf.cfm?pub_id=915876
Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H., y Stoddart, K. (2016). A review of cyber security risk assessment methods for SCADA systems. Computers y Security, 56, 1–27. https://doi. org/10.1016/j.cose.2015.09.009
CIDETEXCO. (2011). Tendencias tecnológicas ciclo de vida de producto. industria fbra textil confección R2-2011- CIDETEXCO.
Curtis, P. D., y Mehravari, N. (2015). Evaluating and improving cybersecurity capabilities of the energy critical infrastructure. In 2015 IEEE International Symposium on Technologies for Homeland Security (HST) (pp. 1–6). IEEE. https://doi.org/10.1109/THS.2015.7225323.
Cybersecurity and Infrastructure Security Agency. (2018). ICS Alert (ICS-ALERT-12-195-01). Retrieved May 30, 2019, from https://www.us-cert.gov/ics/alerts/ICS-ALERT-12-195-01.
Hernández Cevallos, M. I., y Ledesma Marcalla, D. A. (2010). Desarrollo de un sistema SCADA para la medición de voltajes con sistemas embebidos para el laboratorio de mecatrónica de la facultad de mecánica. Retrieved from http://dspace.espoch.edu.ec/bitstream/123456789/1137/1/25T00140.pdf.
Johnson, C. (2012). CyberSafety: CyberSecurity and Safety-Critical Software Engineering. In Achieving Systems Safety (pp. 85–95). London: Springer London. https://doi.org/10.1007/978-1-4471-2494-8_8.
Knapp, E. D., y Langill, J. T. (2015). Industrial Network Security (Second). Elsevier. https://doi.org/10.1016/C2013- 0-06836-3.
Kornecki, A. J., y Zalewski, J. (2010). Safety and security in industrial control. In Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research - CSIIRW ’10 (p. 1). New York, New York, USA: ACM Press. https://doi.org/10.1145/1852666.1852754.
Kriz, D. (2011). Cybersecurity principles for industry and government: A useful framework for efforts globally to improve cybersecurity. In 2011 Second Worldwide Cybersecurity Summit (WCS). London, UK: IEEE. Retrieved from https://ieeexplore.ieee.org/abstract/document/5978798.
McGurk, S. P. (2008). Industrial Control Systems Security. Retrieved from https://csrc.nist.gov/csrc/media/events/ ispab-december-2008-meeting/documents/icssecurity_ispab-dec2008_spmcgurk.pdf.
Proença, D., y Borbinha, J. (2016). Maturity Models for Information Systems - A State of the Art. Procedia Computer Science, 100, 1042–1049. https://doi.org/10.1016/j.procs.2016.09.279.
Schrecker, S. (2015). Industrial automation systems cybersecurity. Embedding end-to-end trust and security. Retrieved May 30, 2019, from https://www.isa.org/intech/20150401/.
U.S. Department of Energy. (2014). Cybersecurity Capability Maturity Model (C2M2). Retrieved May 30, 2019, from https://www.energy.gov/ceser/activities/cybersecurity-critical-energy-infrastructure/energy-sectorcybersecurity-0-0.
dc.rights.none.fl_str_mv Derechos de autor 2019 Revista Colombiana de Computación
dc.rights.coar.fl_str_mv http://purl.org/coar/access_right/c_abf2
dc.rights.uri.*.fl_str_mv http://creativecommons.org/licenses/by-nc-sa/4.0/
dc.rights.uri.none.fl_str_mv http://creativecommons.org/licenses/by-nc-nd/2.5/co/
dc.rights.creativecommons.*.fl_str_mv Attribution-NonCommercial-ShareAlike 4.0 International
rights_invalid_str_mv Derechos de autor 2019 Revista Colombiana de Computación
http://creativecommons.org/licenses/by-nc-sa/4.0/
http://creativecommons.org/licenses/by-nc-nd/2.5/co/
Attribution-NonCommercial-ShareAlike 4.0 International
http://purl.org/coar/access_right/c_abf2
dc.format.mimetype.spa.fl_str_mv application/pdf
Text/html
dc.publisher.none.fl_str_mv Universidad Autónoma de Bucaramanga UNAB
publisher.none.fl_str_mv Universidad Autónoma de Bucaramanga UNAB
dc.source.none.fl_str_mv Revista Colombiana de Computación; Vol. 20 Núm. 2 (2019): Revista Colombiana de Computación; 56-67
institution Universidad Autónoma de Bucaramanga - UNAB
bitstream.url.fl_str_mv https://repository.unab.edu.co/bitstream/20.500.12749/8826/1/2012_aRTICULO_Identificaci%c3%b3n%20de%20elementos%20de%20seguridad%20basados%20en%20el%20modelo%20C2M2%20para%20la%20industria%20manufacturera%20del%20sector%20textil.pdf
https://repository.unab.edu.co/bitstream/20.500.12749/8826/2/2012_aRTICULO_Identificaci%c3%b3n%20de%20elementos%20de%20seguridad%20basados%20en%20el%20modelo%20C2M2%20para%20la%20industria%20manufacturera%20del%20sector%20textil.pdf.jpg
bitstream.checksum.fl_str_mv bb4168cf4bc0ea0c2c3309c16f68373b
d5615ffe03aa8c17a4ed530a28840e82
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
repository.name.fl_str_mv Repositorio Institucional | Universidad Autónoma de Bucaramanga - UNAB
repository.mail.fl_str_mv repositorio@unab.edu.co
_version_ 1808410761564782592
spelling Aristizábal Correa, Jorge Mario9c7125ed-ef0b-4ac0-af43-f5c4a4da8dc2Marín Ramírez, Leonel1e6ed550-480e-48a0-b737-d97ec0392c25Álvarez Salazar, Johnyc55961c3-0333-4c26-9062-541f3ec7707fÁlvarez Salazar, Johny [h4QtY5EAAAAJ]Aristizábal Correa, Jorge Mario [0000-0003-1880-8684]Álvarez Salazar, Johny [0000-0002-7041-8619]2020-10-27T00:19:56Z2020-10-27T00:19:56Z2019-12-012539-21151657-2831http://hdl.handle.net/20.500.12749/8826instname:Universidad Autónoma de Bucaramanga UNABrepourl:https://repository.unab.edu.co10.29375/25392115.3722En este trabajo se presenta un estudio de identificación de los elementos de seguridad que afectan a la industria textil –que utiliza sistemas SCADA– los riesgos de fuga, indisponibilidad o alteración no permitida de la información en los ambientes comunes en que operan las tecnologías de la información (TI) y las tecnologías de operación (TO). Para llevar a cabo lo anterior se utilizaron los elementos identificados en la guía de seguridad para los sistemas de control industrial NIST 800-82 y el modelo de madurez en ciberseguridad C2M2. Como resultado se obtuvieron los elementos de seguridad que se ven involucrados en los diferentes procesos, tendencias tecnológicas de la industria analizada; de otra parte, se realizó un comparativo del modelo C2M2 y la NIST 800-82.This paper presents a study based on the identification of the security elements that affect the textile industry where SCADA systems are used, and that may cause risks of leakage, unavailability or unauthorized alteration of information, in common environments in which information technologies (IT) and operating technologies (OT) operate. For this, the elements identified in the safety guide for industrial control systems NIST 800-82 and the cybersecurity maturity model C2M2 were used. As a result, the security elements that are involved in the different processes, technological trends of the analyzed industry were obtained and a comparison of the C2M2 and NIST 800-82 models is made.application/pdfText/htmlspaUniversidad Autónoma de Bucaramanga UNABhttps://revistas.unab.edu.co/index.php/rcc/article/view/3722/3158Https://revistas.unab.edu.co/index.php/rcc/article/view/3722/3144/*ref*/Ani, U. P. D., He, H. (Mary), & Tiwari, A. (2017). Review of cybersecurity issues in industrial critical infrastructure: manufacturing in perspective. Journal of Cyber Security Technology, 1(1), 32–74. https://doi.org/10.1080/23742917.2016.1252211/*ref*/Assante, D., Romano, E., Flamini, M., Castro, M., Martin, S., Lavirotte, S., & Spatafora, M. (2018). Internet of Things education: Labor market training needs and national policies. In 2018 IEEE Global Engineering Education Conference (EDUCON) (pp. 1846–1853). IEEE. https://doi.org/10.1109/EDUCON.2018.8363459/*ref*/Bernieri, G., Etchevés Miciolino, E., Pascucci, F., & Setola, R. (2017). Monitoring system reaction in cyber-physical testbed under cyber-attacks. Computers & Electrical Engineering, 59, 86–98. https://doi.org/10.1016/j.compeleceng.2017.02.010/*ref*/Candell, R., Anand, D., & Stouffer, K. (2014). A cybersecurity testbed for industrial control systems. In Proceedings of the 2014 Process Control and Safety Symposium (pp. 1–16). Retrieved from https://ws680.nist.gov/publication/get_pdf.cfm?pub_id=915876/*ref*/Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H., & Stoddart, K. (2016). A review of cyber security risk assessment methods for SCADA systems. Computers & Security, 56, 1–27. https://doi.org/10.1016/j.cose.2015.09.009/*ref*/CIDETEXCO. (2011). Tendencias tecnológicas ciclo de vida de producto. industria fibra textil confección R2-2011-CIDETEXCO./*ref*/Curtis, P. D., & Mehravari, N. (2015). Evaluating and improving cybersecurity capabilities of the energy critical infrastructure. In 2015 IEEE International Symposium on Technologies for Homeland Security (HST) (pp. 1–6). IEEE. https://doi.org/10.1109/THS.2015.7225323./*ref*/Cybersecurity and Infrastructure Security Agency. (2018). ICS Alert (ICS-ALERT-12-195-01). Retrieved May 30, 2019, from https://www.us-cert.gov/ics/alerts/ICS-ALERT-12-195-01./*ref*/Hernández Cevallos, M. I., & Ledesma Marcalla, D. A. (2010). Desarrollo de un sistema SCADA para la medición de voltajes con sistemas embebidos para el laboratorio de mecatrónica de la facultad de mecánica. Retrieved from http://dspace.espoch.edu.ec/bitstream/123456789/1137/1/25T00140.pdf./*ref*/Johnson, C. (2012). CyberSafety: CyberSecurity and Safety-Critical Software Engineering. In Achieving Systems Safety (pp. 85–95). London: Springer London. https://doi.org/10.1007/978-1-4471-2494-8_8./*ref*/Knapp, E. D., & Langill, J. T. (2015). Industrial Network Security (Second). Elsevier. https://doi.org/10.1016/C2013-0-06836-3./*ref*/Kornecki, A. J., & Zalewski, J. (2010). Safety and security in industrial control. In Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research - CSIIRW ’10 (p. 1). New York, New York, USA: ACM Press. https://doi.org/10.1145/1852666.1852754./*ref*/Kriz, D. (2011). Cybersecurity principles for industry and government: A useful framework for efforts globally to improve cybersecurity. In 2011 Second Worldwide Cybersecurity Summit (WCS). London, UK: IEEE. Retrieved from https://ieeexplore.ieee.org/abstract/document/5978798./*ref*/McGurk, S. P. (2008). Industrial Control Systems Security. Retrieved from https://csrc.nist.gov/csrc/media/events/ispab-december-2008-meeting/documents/icssecurity_ispab-dec2008_spmcgurk.pdf./*ref*/Proença, D., & Borbinha, J. (2016). Maturity Models for Information Systems - A State of the Art. Procedia Computer Science, 100, 1042–1049. https://doi.org/10.1016/j.procs.2016.09.279./*ref*/Schrecker, S. (2015). Industrial automation systems cybersecurity. Embedding end-to-end trust and security. Retrieved May 30, 2019, from https://www.isa.org/intech/20150401/./*ref*/U.S. Department of Energy. (2014). Cybersecurity Capability Maturity Model (C2M2). Retrieved May 30, 2019, from https://www.energy.gov/ceser/activities/cybersecurity-critical-energy-infrastructure/energy-sector-cybersecurity-0-0.https://revistas.unab.edu.co/index.php/rcc/article/view/3722Ani, U. P. D., He, H. (Mary), y Tiwari, A. (2017). Review of cybersecurity issues in industrial critical infrastructure: manufacturing in perspective. Journal of Cyber Security Technology, 1(1), 32–74. https://doi.org/10.1080/ 23742917.2016.1252211Assante, D., Romano, E., Flamini, M., Castro, M., Martin, S., Lavirotte, S., y Spatafora, M. (2018). Internet of Things education: Labor market training needs and national policies. In 2018 IEEE Global Engineering Education Conference (EDUCON) (pp. 1846–1853). IEEE. https://doi.org/10.1109/EDUCON.2018.8363459Bernieri, G., Etchevés Miciolino, E., Pascucci, F., y Setola, R. (2017). Monitoring system reaction in cyber-physical testbed under cyber-attacks. Computers y Electrical Engineering, 59, 86–98. https://doi.org/10.1016/j. compeleceng.2017.02.010Candell, R., Anand, D., y Stouffer, K. (2014). A cybersecurity testbed for industrial control systems. In Proceedings of the 2014 Process Control and Safety Symposium (pp. 1–16). Retrieved from https://ws680.nist.gov/ publication/get_pdf.cfm?pub_id=915876Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H., y Stoddart, K. (2016). A review of cyber security risk assessment methods for SCADA systems. Computers y Security, 56, 1–27. https://doi. org/10.1016/j.cose.2015.09.009CIDETEXCO. (2011). Tendencias tecnológicas ciclo de vida de producto. industria fbra textil confección R2-2011- CIDETEXCO.Curtis, P. D., y Mehravari, N. (2015). Evaluating and improving cybersecurity capabilities of the energy critical infrastructure. In 2015 IEEE International Symposium on Technologies for Homeland Security (HST) (pp. 1–6). IEEE. https://doi.org/10.1109/THS.2015.7225323.Cybersecurity and Infrastructure Security Agency. (2018). ICS Alert (ICS-ALERT-12-195-01). Retrieved May 30, 2019, from https://www.us-cert.gov/ics/alerts/ICS-ALERT-12-195-01.Hernández Cevallos, M. I., y Ledesma Marcalla, D. A. (2010). Desarrollo de un sistema SCADA para la medición de voltajes con sistemas embebidos para el laboratorio de mecatrónica de la facultad de mecánica. Retrieved from http://dspace.espoch.edu.ec/bitstream/123456789/1137/1/25T00140.pdf.Johnson, C. (2012). CyberSafety: CyberSecurity and Safety-Critical Software Engineering. In Achieving Systems Safety (pp. 85–95). London: Springer London. https://doi.org/10.1007/978-1-4471-2494-8_8.Knapp, E. D., y Langill, J. T. (2015). Industrial Network Security (Second). Elsevier. https://doi.org/10.1016/C2013- 0-06836-3.Kornecki, A. J., y Zalewski, J. (2010). Safety and security in industrial control. In Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research - CSIIRW ’10 (p. 1). New York, New York, USA: ACM Press. https://doi.org/10.1145/1852666.1852754.Kriz, D. (2011). Cybersecurity principles for industry and government: A useful framework for efforts globally to improve cybersecurity. In 2011 Second Worldwide Cybersecurity Summit (WCS). London, UK: IEEE. Retrieved from https://ieeexplore.ieee.org/abstract/document/5978798.McGurk, S. P. (2008). Industrial Control Systems Security. Retrieved from https://csrc.nist.gov/csrc/media/events/ ispab-december-2008-meeting/documents/icssecurity_ispab-dec2008_spmcgurk.pdf.Proença, D., y Borbinha, J. (2016). Maturity Models for Information Systems - A State of the Art. Procedia Computer Science, 100, 1042–1049. https://doi.org/10.1016/j.procs.2016.09.279.Schrecker, S. (2015). Industrial automation systems cybersecurity. Embedding end-to-end trust and security. Retrieved May 30, 2019, from https://www.isa.org/intech/20150401/.U.S. Department of Energy. (2014). Cybersecurity Capability Maturity Model (C2M2). Retrieved May 30, 2019, from https://www.energy.gov/ceser/activities/cybersecurity-critical-energy-infrastructure/energy-sectorcybersecurity-0-0.Derechos de autor 2019 Revista Colombiana de Computaciónhttp://creativecommons.org/licenses/by-nc-sa/4.0/http://creativecommons.org/licenses/by-nc-nd/2.5/co/Attribution-NonCommercial-ShareAlike 4.0 Internationalhttp://purl.org/coar/access_right/c_abf2Revista Colombiana de Computación; Vol. 20 Núm. 2 (2019): Revista Colombiana de Computación; 56-67TICDesarrollo urbanoPlaneación territorialGobierno localSistemas de informaciónC2M2CibersecuritySCADASecurity elementsTextile industryComputer's scienceTechnological innovationsResearchTechnology of the information and communicationCiencias de la computaciónInnovaciones tecnológicasInvestigaciónTecnologías de la información y la comunicaciónDesarrollo urbanoPlaneación territorialGobierno localSistemas de informaciónIdentificación de elementos de seguridad basados en el modelo C2M2 para la industria manufacturera del sector textilIdentification of safety elements based on the C2M2 model for the textile industryinfo:eu-repo/semantics/articleArtículohttp://purl.org/coar/resource_type/c_7a1fhttp://purl.org/coar/resource_type/c_2df8fbb1http://purl.org/redcol/resource_type/CJournalArticlehttp://purl.org/coar/version/c_970fb48d4fbd8a85ORIGINAL2012_aRTICULO_Identificación de elementos de seguridad basados en el modelo C2M2 para la industria manufacturera del sector textil.pdf2012_aRTICULO_Identificación de elementos de seguridad basados en el modelo C2M2 para la industria manufacturera del sector textil.pdfArtículoapplication/pdf621442https://repository.unab.edu.co/bitstream/20.500.12749/8826/1/2012_aRTICULO_Identificaci%c3%b3n%20de%20elementos%20de%20seguridad%20basados%20en%20el%20modelo%20C2M2%20para%20la%20industria%20manufacturera%20del%20sector%20textil.pdfbb4168cf4bc0ea0c2c3309c16f68373bMD51open accessTHUMBNAIL2012_aRTICULO_Identificación de elementos de seguridad basados en el modelo C2M2 para la industria manufacturera del sector textil.pdf.jpg2012_aRTICULO_Identificación de elementos de seguridad basados en el modelo C2M2 para la industria manufacturera del sector textil.pdf.jpgIM Thumbnailimage/jpeg13370https://repository.unab.edu.co/bitstream/20.500.12749/8826/2/2012_aRTICULO_Identificaci%c3%b3n%20de%20elementos%20de%20seguridad%20basados%20en%20el%20modelo%20C2M2%20para%20la%20industria%20manufacturera%20del%20sector%20textil.pdf.jpgd5615ffe03aa8c17a4ed530a28840e82MD52open access20.500.12749/8826oai:repository.unab.edu.co:20.500.12749/88262022-11-28 17:31:44.182open accessRepositorio Institucional | Universidad Autónoma de Bucaramanga - UNABrepositorio@unab.edu.co