Advertisement

Applicability of Cybersecurity Standards in Ecuador - A Field Exploration

  • Mario Ron
  • Marco Bonilla
  • Walter Fuertes
  • Javier Díaz
  • Theofilos Toulkeridis
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 94)

Abstract

The evolution of information and communications technology (ICT) as well as cyberspace, walks along with collateral hazards. These need to be managed, in order to minimize the affecting impacts on information, which often appear to be vital for the operability of nations. The fulfillment of such risk reduction has been achieved with the development of worldwide, well known and widespread regulations, rules, manuals, guides and procedures for good Cybersecurity practices. Its impact has been significant in the construction of national policies within each country, due to its influence beyond the borders and the needed international cooperation for its elaboration. However, the current study presents a description, scope and coverage of both the standardization organizations as well as standards and specifications related to Cybersecurity, in order to establish a guide for researchers and information security specialist in the protection of assets and information of companies. Furthermore, it also demonstrates a systematic non-experimental field research that considered Ecuadorian institutions and companies to identify the current status of their adoption. Finally, the obtained results allow the applicability of standards, in order to protect enterprise information, which in turn will be able to serve in the future as input for the definition of national policies in such context.

Keywords

Cybersecurity National policy System Hazard Risk reduction 

Notes

Acknowledgment

The authors would like to express special recognition to all companies and professionals who participated in the survey and who have the firm intention of collaborating in the development of Ecuador’s National Cybersecurity Policy.

References

  1. 1.
    CEN: European Committee for Standardization. http://www.cen.eu/. Accessed 15 Oct 2016
  2. 2.
    ISO: International Organization for Standardization. http://www.iso.org/. Accessed 15 Oct 2016
  3. 3.
    ITU: International Telecommunication Union. https://www.itu.int. Accessed 15 Oct 2016
  4. 4.
    IEEE: Institute of Electrical and Electronics Engineers IEEE. https://www.ieee.org/index.html. Accessed 12 Oct 2017
  5. 5.
    IETF: Internet Engineering Task Force. https://www.ietf.org/. Accessed 15 Oct 2016
  6. 6.
    IEC: International Electro technical Commission. http://www.iec.ch/. Accessed 15 Oct 2016
  7. 7.
    ISO: ISO 27000.es. http://www.iso27000.es/iso27000.html. Accessed 18 Oct 2016
  8. 8.
    NIST: Framework for Improving Critical Infrastructure Cybersecurity, USA, p. 39 (2014)Google Scholar
  9. 9.
    Bustamante, F., Fuertes, W., Díaz, P., Toulkeridis, T.: A methodological proposal concerning to the management of information security in industrial control systems. In: IEEE Ecuador Technical Chapters Meeting (ETCM). IEEE (2016)Google Scholar
  10. 10.
    Bustamante, F., Fuertes, W., Diaz, P., Toulqueridis, T.: Methodology for management of information security in industrial control systems: a proof of concept aligned with enterprise objectives. Adv. Sci. Technol. Eng. Syst. J. 2(3), 88–99 (2017). https://doi.org/10.25046/aj020313
  11. 11.
    Shen, Lei: The NIST cybersecurity framework: overview and potential impacts. SciTech Lawyer 10(4), 16 (2014)Google Scholar
  12. 12.
    Bustamante, F., Fuertes, W., Díaz, P., Toulkeridis, T.: Integration of IT frameworks for the management of information security within industrial control systems providing metrics and indicators. In: Electronics, Electrical Engineering and Computing (INTERCON) (2017)Google Scholar
  13. 13.
    Carvajal, R.M.: Estudio de las normas españolas y estadounidenses de seguridad de la información. Universidad de Valladolid (2015)Google Scholar
  14. 14.
    Hernández Sampieri, R., Fernández Collado, C., Baptista Lucio, M.P.: Metodología de la investigación, 5ta. McGraw-Hill, Mexico (2010)Google Scholar
  15. 15.
    EKOS (2010). http://www.ekosnegocios.com. Accessed 15 Oct 2017

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • Mario Ron
    • 1
  • Marco Bonilla
    • 1
  • Walter Fuertes
    • 1
  • Javier Díaz
    • 2
  • Theofilos Toulkeridis
    • 1
  1. 1.Universidad de las Fuerzas Armadas ESPESangolquíEcuador
  2. 2.Universidad Nacional de la PlataLa PlataArgentina

Personalised recommendations