2016
DOI: 10.3390/fi8030033
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Dynamic Complexity of the Cyber Security Ecosystem of Colombia

Abstract: This paper presents two proposals for the analysis of the complexity of the Cyber security Ecosystem of Colombia (CEC). This analysis shows the available knowledge about entities engaged in cyber security in Colombia and the relationships between them, which allow an understanding of the synergy between the different existing components. The complexity of the CEC is detailed from the view of the Influence Diagram of System Dynamics and the Domain Diagram of Software Engineering. The resulting model makes cyber… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0
2

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 1 publication
0
5
0
2
Order By: Relevance
“…CYBERSECURITY SYSTEM Cyberspace defined [6], as a virtual environment that concentrates on various infrastructure, technology devices, and people who connected to the network, so that bring forth an evolution concept of information security of cybersecurity. This is including a small network such as home network, a big network of industry, national network, provider communication, and so on.…”
Section: IImentioning
confidence: 99%
See 3 more Smart Citations
“…CYBERSECURITY SYSTEM Cyberspace defined [6], as a virtual environment that concentrates on various infrastructure, technology devices, and people who connected to the network, so that bring forth an evolution concept of information security of cybersecurity. This is including a small network such as home network, a big network of industry, national network, provider communication, and so on.…”
Section: IImentioning
confidence: 99%
“…Cybersecurity system modeling, begin with identifying each entity of system and its goal, so resource and processes can be determined, including relation each other. As illustration case, we use cybersecurity entity that proposed [6], consist of the public sector, the private sector, critical infrastructure, citizen, and attacker. Then each process from the entity connected to an interface that will be system executor.…”
Section: B System Modelingmentioning
confidence: 99%
See 2 more Smart Citations
“…La Ciberseguridad entendida en la norma ISO 27032 como la "preservación de la confidencialidad, integridad y disponibilidad de la información en el ciberespacio" (ISO/IEC, 2012); el ciberespacio es entendido como el ambiente virtual que en el que confluyen las personas, los usuarios, las infraestructuras tecnológicas y las organizaciones en la Internet (Flórez et al, 2016). Adicionalmente se presenta el concepto de la Ciberdefensa, en el cual se amplía el campo de estudio de la Ciberseguridad o la seguridad informática al incluir las infraestructuras y redes industriales donde se soportan servicios esenciales o estratégicos, tales como el transporte, tránsito, energía, petróleo y gas, nuclear, entre otros, los cuales al estar interconectados al Ciberespacio se encuentran expuestos a las vulnerabilidades y amenazas inherentes en el mismo (Skopik et al, 2016).…”
Section: Introductionunclassified