Proposal for IT security in the organizational aspects of an IT system, applying ISO 27002 and CSF

Authors

  • Esteban Silva Universidad Tecnológica Israel

DOI:

https://doi.org/10.62465/riif.v2n1.2023.9

Keywords:

Modelo, ISO, seguridad, información

Abstract

The article proposes a comprehensive approach to address computer security in the organizational aspects of a computer system. To achieve this, a combined framework of ISO 27002 (International Information Security Standard) and the CSF (Cybersecurity Framework) is used. ISO 27002 establishes standards and guidelines for managing information security in an organization. Its implementation involves the identification of information assets, risk assessment, application of security controls and continuous improvement of the information security management system. On the other hand, the CSF provides a specific framework for cybersecurity, addressing the prevention, detection and response to cyber threats. This framework can be tailored to the specific needs of the organization, allowing for greater flexibility in the implementation of security measures. The cyber security approach focuses on integrating these two frameworks to address both general aspects of information security and specific cyber threats. It highlights the importance of interdepartmental collaboration and staff awareness to ensure effective implementation.

Downloads

Download data is not yet available.

References

F. Morales, S. Toapanta, and R. M. Toasa, “Implementación de un sistema de seguridad perimetral como estrategia de seguridad de la información,” Revista Ibérica de Sistemas e Tecnologias de Informação, vol. E, no. 27, pp. 553–565, 2020.

P. F. Baldeon Egas, M. A. Gaibor Saltos, and R. Toasa, “Integrated Strategic Management System,” 2019 14th Iberian Conference on Information Systems and Technologies (CISTI), pp. 1–6, Jun. 2019, doi: 10.23919/CISTI.2019.8760801. DOI: https://doi.org/10.23919/CISTI.2019.8760801

C. A. T. Almeida and L. R. Herrera, “La ciberseguridad en el ecuador, una propuesta de organización,” Revista de Ciencias de Seguridad y Defensa, vol. IV, no. 7, pp. 156–169, 2019.

M. Cristiá, U. Nacional, and R. Rosario -Argentina, “Apunte de clase Seguridad Informática”.

R. Vargas Borbúa, R. P. Reyes Chicango, and L. Recalde Herrera, “Ciberdefensa y ciberseguridad, más allá del mundo virtual: modelo ecuatoriano de gobernanza en ciberdefensa/ Cyber-defense and cybersecurity, beyond the virtual world: Ecuadorian model of cyber-defense governance,” URVIO - Revista Latinoamericana de Estudios de Seguridad, no. 20, p. 31, Jun. 2017, doi: 10.17141/urvio.20.2017.2571. DOI: https://doi.org/10.17141/urvio.20.2017.2571

J. A. Senn, E. G. U. Medal, and O. A. P. Velasco, Análisis y diseño de sistemas de información, vol. 2. McGraw-Hill, 1992.

R. Barrantes Echavarría, Investigación: un camino al conocimiento Un enfoque cualitativo, cuantitativo y mixto, 2nd ed. Costa Rica: UNED, 2013. Accessed: Mar. 01, 2021. [Online]. Available: https://editorial.uned.ac.cr/book/U08167

M. Baldeón and J. Guanopatin, “Políticas de seguridad de la información para la Universidad Central del Ecuador bajo los estándares ISO/TEC 27000 y Cobit 5,” 2015, Accessed: Dec. 02, 2023. [Online]. Available: http://repositorio.espe.edu.ec/jspui/handle/21000/12551

A. Molina Oviedo, “Modelo de gobierno y gestión de riesgos TI para las universidades públicas de Colombia: caso de estudio Universidad Popular del Cesar,” 2020, Accessed: Dec. 02, 2023. [Online]. Available: https://manglar.uninorte.edu.co/handle/10584/10394

“¿Qué es ISO 27000 - Seguridad de la Información? | GSS.” Accessed: Dec. 02, 2023. [Online]. Available: https://www.globalsuitesolutions.com/es/la-familia-de-normas-iso-27000/

Published

2023-05-30

How to Cite

Silva, E. (2023). Proposal for IT security in the organizational aspects of an IT system, applying ISO 27002 and CSF. Revista Ingeniería E Innovación Del Futuro, 2(1), 31–40. https://doi.org/10.62465/riif.v2n1.2023.9

Issue

Section

Articles