Skip to main content

Applicability of Cybersecurity Standards in Ecuador - A Field Exploration

  • Conference paper
  • First Online:
Developments and Advances in Defense and Security (MICRADS 2018)

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 94))

Included in the following conference series:

Abstract

The evolution of information and communications technology (ICT) as well as cyberspace, walks along with collateral hazards. These need to be managed, in order to minimize the affecting impacts on information, which often appear to be vital for the operability of nations. The fulfillment of such risk reduction has been achieved with the development of worldwide, well known and widespread regulations, rules, manuals, guides and procedures for good Cybersecurity practices. Its impact has been significant in the construction of national policies within each country, due to its influence beyond the borders and the needed international cooperation for its elaboration. However, the current study presents a description, scope and coverage of both the standardization organizations as well as standards and specifications related to Cybersecurity, in order to establish a guide for researchers and information security specialist in the protection of assets and information of companies. Furthermore, it also demonstrates a systematic non-experimental field research that considered Ecuadorian institutions and companies to identify the current status of their adoption. Finally, the obtained results allow the applicability of standards, in order to protect enterprise information, which in turn will be able to serve in the future as input for the definition of national policies in such context.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. CEN: European Committee for Standardization. http://www.cen.eu/. Accessed 15 Oct 2016

  2. ISO: International Organization for Standardization. http://www.iso.org/. Accessed 15 Oct 2016

  3. ITU: International Telecommunication Union. https://www.itu.int. Accessed 15 Oct 2016

  4. IEEE: Institute of Electrical and Electronics Engineers IEEE. https://www.ieee.org/index.html. Accessed 12 Oct 2017

  5. IETF: Internet Engineering Task Force. https://www.ietf.org/. Accessed 15 Oct 2016

  6. IEC: International Electro technical Commission. http://www.iec.ch/. Accessed 15 Oct 2016

  7. ISO: ISO 27000.es. http://www.iso27000.es/iso27000.html. Accessed 18 Oct 2016

  8. NIST: Framework for Improving Critical Infrastructure Cybersecurity, USA, p. 39 (2014)

    Google Scholar 

  9. Bustamante, F., Fuertes, W., Díaz, P., Toulkeridis, T.: A methodological proposal concerning to the management of information security in industrial control systems. In: IEEE Ecuador Technical Chapters Meeting (ETCM). IEEE (2016)

    Google Scholar 

  10. Bustamante, F., Fuertes, W., Diaz, P., Toulqueridis, T.: Methodology for management of information security in industrial control systems: a proof of concept aligned with enterprise objectives. Adv. Sci. Technol. Eng. Syst. J. 2(3), 88–99 (2017). https://doi.org/10.25046/aj020313

  11. Shen, Lei: The NIST cybersecurity framework: overview and potential impacts. SciTech Lawyer 10(4), 16 (2014)

    Google Scholar 

  12. Bustamante, F., Fuertes, W., Díaz, P., Toulkeridis, T.: Integration of IT frameworks for the management of information security within industrial control systems providing metrics and indicators. In: Electronics, Electrical Engineering and Computing (INTERCON) (2017)

    Google Scholar 

  13. Carvajal, R.M.: Estudio de las normas españolas y estadounidenses de seguridad de la información. Universidad de Valladolid (2015)

    Google Scholar 

  14. Hernández Sampieri, R., Fernández Collado, C., Baptista Lucio, M.P.: Metodología de la investigación, 5ta. McGraw-Hill, Mexico (2010)

    Google Scholar 

  15. EKOS (2010). http://www.ekosnegocios.com. Accessed 15 Oct 2017

Download references

Acknowledgment

The authors would like to express special recognition to all companies and professionals who participated in the survey and who have the firm intention of collaborating in the development of Ecuador’s National Cybersecurity Policy.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marco Bonilla .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ron, M., Bonilla, M., Fuertes, W., Díaz, J., Toulkeridis, T. (2018). Applicability of Cybersecurity Standards in Ecuador - A Field Exploration. In: Rocha, Á., Guarda, T. (eds) Developments and Advances in Defense and Security. MICRADS 2018. Smart Innovation, Systems and Technologies, vol 94. Springer, Cham. https://doi.org/10.1007/978-3-319-78605-6_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-78605-6_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-78604-9

  • Online ISBN: 978-3-319-78605-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics