Mostrar el registro sencillo del ítem
Propuesta integral para el fortalecimiento de la ciberresiliencia en los Centros de Comando y Control de la Fuerza Aeroespacial Colombiana
| dc.contributor.author | Uribe Vergara, Carlos Augusto | |
| dc.coverage.spatial | Bogotá, Escuela Superior de Guerra | |
| dc.date.accessioned | 2026-05-01T00:57:40Z | |
| dc.date.available | 2026-05-01T00:57:40Z | |
| dc.date.issued | 2025 | |
| dc.date.submitted | 2025 | |
| dc.identifier.uri | https://hdl.handle.net/20.500.14205/11937 | |
| dc.description.abstract | Este artículo examina la ciberresiliencia en los centros de comando y control de la Fuerza Aeroespacial Colombiana, con el objetivo de identificar fortalezas y áreas de mejora en su capacidad para enfrentar amenazas cibernéticas. El estudio emplea un enfoque mixto, basado en revisión documental, entrevistas a expertos y la aplicación de un modelo de ciberresiliencia y otro de evaluación de madurez, adaptado al contexto militar. Los resultados evidencian avances en la gestión de activos y controles, así como en la integración de mejores prácticas internacionales y nacionales. Sin embargo, se detectan brechas en la formalización de planes de continuidad y recuperación ante incidentes. Como conclusión, se proponen lineamientos estratégicos y técnicos enfocados en la gobernanza, la cultura organizacional, la arquitectura resiliente y la medición de la madurez, con el fin de fortalecer la sostenibilidad operativa y la protección digital en entornos críticos. | es_ES |
| dc.description.abstract | This article examines cyber resilience in the command and control centers of the Colombian Aerospace Force, with the objective of identifying strengths and areas for improvement in their capacity to face cyber threats. The study employs a mixed approach, based on a document review, expert interviews and the application of a cyber resilience model and a maturity assessment model adapted to the military context. The results show progress in the management of assets and controls, as well as in the integration of international and national best practices. However, gaps are detected in the formalization of continuity and incident recovery plans. In conclusion, strategic and technical guidelines focused on governance, organizational culture, resilient architecture and maturity measurement are proposed in order to strengthen operational sustainability and digital protection in critical environments. | es_ES |
| dc.description.sponsorship | Escuela Superior de Guerra | es_ES |
| dc.format.extent | 52 páginas | |
| dc.format.mimetype | application/pdf | es_ES |
| dc.language.iso | spa | es_ES |
| dc.rights.uri | http://creativecommons.org/publicdomain/zero/1.0/ | * |
| dc.title | Propuesta integral para el fortalecimiento de la ciberresiliencia en los Centros de Comando y Control de la Fuerza Aeroespacial Colombiana | es_ES |
| dc.title.alternative | Comprehensive proposal for strengthening cyber resilience in the Command and Control Centers of the Colombian Aerospace Force | es_ES |
| dcterms.bibliographicCitation | Acur, S., & Hendriks, T. (2024). The Need for Cyber-Resilience in Complex Systems. 2024 IEEE International Conference on Cyber Security and Resilience (CSR), 480–485. https://doi.org/10.1109/CSR61664.2024.10679396 | es_ES |
| dcterms.bibliographicCitation | Ainslie, S., Thompson, D., Maynard, S., & Ahmad, A. (2023). Cyber-threat intelligence for security decision-making: A review and research agenda for practice. Computers & Security, 132, 103352. https://doi.org/10.1016/j.cose.2023.103352 | es_ES |
| dcterms.bibliographicCitation | Araujo, M. S. d., Machado, B. A. S., & Passos, F. U. (2024). Resilience in the context of cyber security: A review of the fundamental concepts and relevance. Applied Sciences, 14(5), 2116. https://doi.org/10.3390/app14052116 | es_ES |
| dcterms.bibliographicCitation | Baesystems.com. (n.d.). C4ISR Systems. Retrieved June 19, 2025, from https://www.baesystems.com/en-us/who-we-are/electronic-systems/c4isr | es_ES |
| dcterms.bibliographicCitation | Bagrodia, R. (2023). Using network digital twins to improve cyber resilience of missions. Journal of Defense Modeling and Simulation: Applications, Methodology, Technology, 20(1), 97–106. https://doi.org/10.1177/15485129221131226 | es_ES |
| dcterms.bibliographicCitation | Bodeau, D., Graubart, R., Picciotto, J., & McQuaid, R. (2011, September 1). Cyber resiliency engineering framework. MITRE. https://www.mitre.org/newsinsights/ publication/cyber-resiliency-engineering-framework | es_ES |
| dcterms.bibliographicCitation | Carmichael, T., & Hadzikadic, M. (2019). The fundamentals of complex adaptive systems. In M. Hadzikadic, S. O’Brien, & M. Khouja (Eds.), Managing complexity: Practical considerations in the development and application of agent-based models (pp. 3–21). Springer. https://doi.org/10.1007/978-3-030-20309-2_1 | es_ES |
| dcterms.bibliographicCitation | CISA. (2020). Cyber Resilience Review (CRR): Method description and self-assessment user guide. U.S. Department of Homeland Security. https://www.cisa.gov/sites/default/files/publications/2_CRR%25204.0_Self- Assessment_User_Guide_April_2020.pdf | es_ES |
| dcterms.bibliographicCitation | Congreso de la República de Colombia. (2009). Ley 1273 de 2009: Por medio de la cual se modifica el Código Penal, se crea un nuevo bien jurídico tutelado - denominado "de la protección de la información y de los datos"- y se preservan integralmente los sistemas que utilicen las tecnologías de la información y las comunicaciones, entre otras disposiciones. https://www.funcionpublica.gov.co/eva/gestornormativo/norma_pdf.php?i=34492 | es_ES |
| dcterms.bibliographicCitation | Conklin, W. A., & Shoemaker, D. (2017). Cyber-resilience: Seven steps for institutional survival. EDPACS, 55(2), 14–22. https://doi.org/10.1080/07366981.2017.1289026 | es_ES |
| dcterms.bibliographicCitation | Consejo de la Unión Europea. (2008). Directiva 2008/114/CE del Consejo de 8 de diciembre de 2008 sobre la identificación y designación de infraestructuras críticas europeas y la evaluación de la necesidad de mejorar su protección. Diario Oficial de la Unión Europea, L 345, 75–82. https://eur-lex.europa.eu/legalcontent/ ES/TXT/PDF/?uri=CELEX:32008L0114 | es_ES |
| dcterms.bibliographicCitation | Cyber resiliency level®. (n.d.). Lockheed Martin. Retrieved April 24, 2025, from https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-resiliencylevel. html | es_ES |
| dcterms.bibliographicCitation | Cybersecurity and Infrastructure Security Agency. (2020, April). Cyber Resilience Review (CRR): Method description and self-assessment user guide. U.S. Department of Homeland Security. https://www.cisa.gov/sites/default/files/publications/2_CRR%25204.0_Self- Assessment_User_Guide_April_2020.pdf | es_ES |
| dcterms.bibliographicCitation | Dale, C. (2020). Red, blue and purple teams: Combining your security capabilities for the best outcome. SANS Institute. https://www.sans.org/media/analyst-program/redblue- purple-teams-combining-security-capabilities-outcome-39190.pdf | es_ES |
| dcterms.bibliographicCitation | de Nobrega, K. M., Rutkowski, A.-F., & Saunders, C. (2024). The whole of cyber defense: Syncing practice and theory. The Journal of Strategic Information Systems, 33(4), 101861. https://doi.org/10.1016/j.jsis.2024.101861 | es_ES |
| dcterms.bibliographicCitation | Departamento Nacional de Planeación. (2011). Lineamientos de política para ciberseguridad y ciberdefensa (Documento CONPES 3701). https://colaboracion.dnp.gov.co/CDT/Conpes/Econ%C3%B3micos/3701.pdf | es_ES |
| dcterms.bibliographicCitation | Departamento Nacional de Planeación. (2016). Política nacional de seguridad digital (Documento CONPES 3854). https://colaboracion.dnp.gov.co/CDT/Conpes/Econ%C3%B3micos/3854.pdf | es_ES |
| dcterms.bibliographicCitation | Díaz Mardones, J. (2021). Infraestructuras críticas y ciberseguridad: una aproximación desde América Latina. Revista de Derecho Público, (175), 63–84. https://publicacionesacague.cl/index.php/tica/article/view/175/198 | es_ES |
| dcterms.bibliographicCitation | Djenna, A., Harous, S., & Saidouni, D. E. (2021). Internet of Things meet Internet of Threats: New concern cyber security issues of critical cyber infrastructure. Applied Sciences, 11(10), 4580. https://doi.org/10.3390/app11104580 | es_ES |
| dcterms.bibliographicCitation | European Commission. (2022). Proposal for a regulation on horizontal cybersecurity requirements for products with digital elements (Cyber Resilience Act). https://ec.europa.eu/newsroom/ECCC/items/757902/en | es_ES |
| dcterms.bibliographicCitation | European Union Agency for Cybersecurity. (2023). ENISA threat landscape 2023. https://www.enisa.europa.eu/publications/enisa-threat-landscape-2023 | es_ES |
| dcterms.bibliographicCitation | European Union Agency for Cybersecurity. (2024). ENISA threat landscape 2024. https://www.enisa.europa.eu/publications/enisa-threat-landscape-2024 | es_ES |
| dcterms.bibliographicCitation | Flor-Unda, O., Simbaña, F., Larriva-Novo, X., Acuña, Á., Tipán, R., & Acosta-Vargas, P. (2023). A Comprehensive Analysis of the Worst Cybersecurity Vulnerabilities in Latin America. Informatics, 10(3), 71. https://doi.org/10.3390/informatics10030071 | es_ES |
| dcterms.bibliographicCitation | Fuerza Aérea Colombiana. (2013). Manual de doctrina básica aérea y espacial (MADBA) (4ª ed.). Comando Fuerza Aérea Colombiana. | es_ES |
| dcterms.bibliographicCitation | Fuerza Aérea Colombiana. (2019). Cartilla de políticas institucionales (Versión del 27 de enero de 2019) [Documento institucional no publicado]. | es_ES |
| dcterms.bibliographicCitation | Hernández Sampieri, R., Fernández Collado, C., & Baptista Lucio, M. P. (2014). Metodología de la investigación (6.ª ed.). McGraw-Hill Interamericana. | es_ES |
| dcterms.bibliographicCitation | Holland, J. H. (1992). Complex adaptive systems. Daedalus, 121(1), 17–30. https://www.jstor.org/stable/20025416 | es_ES |
| dcterms.bibliographicCitation | International Organization for Standardization & International Electrotechnical Commission. (2022). ISO/IEC 27001:2022: Information security, cybersecurity and privacy protection — Information security management systems — Requirements (3.ª ed.). https://www.iso.org/standard/27001 | es_ES |
| dcterms.bibliographicCitation | International Organization for Standardization & International Electrotechnical Commission. (2019). ISO/IEC 27001:2022: Security and resilience — Business continuity management systems — Requirements (2.ª ed.). https://www.iso.org/standard/75106.html | es_ES |
| dcterms.bibliographicCitation | International Organization for Standardization & International Electrotechnical Commission. (2019). ISO/IEC 27031:2025: Cybersecurity — Information and communication technology readiness for business continuity (2.ª ed.). https://www.iso.org/standard/27031 | es_ES |
| dcterms.bibliographicCitation | International Organization for Standardization & International Electrotechnical Commission. (2023). ISO/IEC 27032:2023: Cybersecurity — Guidelines for Internet security(2.ª ed.). https://www.iso.org/standard/76070.html | es_ES |
| dcterms.bibliographicCitation | MITRE ATLAS. (2024). Adversarial Threat Landscape for Artificial-Intelligence Systems (ATLAS). https://atlas.mitre.org | es_ES |
| dcterms.bibliographicCitation | MITRE ATT&CK. (n.d.). Mitre.org. Retrieved July 6, 2025, from https://attack.mitre.org/ | es_ES |
| dcterms.bibliographicCitation | National Cyber Security Centre. (2024). Cyber Assessment Framework (CAF). https://www.ncsc.gov.uk/collection/cyber-assessment-framework | es_ES |
| dcterms.bibliographicCitation | Petrenko, S. (2019). Cyber resilience. River Publishers. https://doi.org/10.1201/9781003337300 | es_ES |
| dcterms.bibliographicCitation | Poulter, A.J.; Cox, S.J. Enabling Secure Guest Access for Command-and-Control of Internet of Things Devices. IoT 2021, 2, 236-248. https://doi.org/10.3390/iot2020013 | es_ES |
| dcterms.bibliographicCitation | Presidencia de la República de Colombia. (2022). Decreto 338 de 2022: Por el cual se adiciona el Título 21 a la Parte 2 del Libro 2 del Decreto Único 1078 de 2015, Reglamentario del Sector de Tecnologías de la Información y las Comunicaciones, con el fin de establecer los lineamientos generales para fortalecer la gobernanza de la seguridad digital, se crea el Modelo y las instancias de Gobernanza de Seguridad Digital y se dictan otras disposiciones. https://www.funcionpublica.gov.co/eva/gestornormativo/norma_pdf.php?i=181866 | es_ES |
| dcterms.bibliographicCitation | Rosenthal, C., & Jones, N. (2020). Chaos engineering: System resiliency in practice. O’Reilly Media, Inc. | es_ES |
| dcterms.bibliographicCitation | Ross, R., Pillitteri, V., Graubart, R., Bodeau, D., & McQuaid, R. (2021). Developing cyberresilient systems: A systems security engineering approach (NIST Special Publication 800-160, Volume 2, Revision 1). National Institute of Standards and Technology. https://doi.org/10.6028/NIST.SP.800-160v2r1 | es_ES |
| dcterms.bibliographicCitation | Swanson, M., Bowen, P., Wohl Phillips, A., Gallup, D., & Lynes, D. (2010). Contingency planning guide for federal information systems (NIST Special Publication 800-34 Rev. 1). National Institute of Standards and Technology. https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-34r1.pdf | es_ES |
| dcterms.bibliographicCitation | The White House. (2013). Presidential Policy Directive – Critical Infrastructure Security and Resilience (PPD-21). https://www.cisa.gov/sites/default/files/publications/ppd- 21-critical-infrastructure-security-and-resilience-508.pdf | es_ES |
| dcterms.bibliographicCitation | Tzavara, V., & Vassiliadis, S. (2024). Tracing the evolution of cyber resilience: A historical and conceptual review. International Journal of Information Security, 23, 1695– 1719. https://doi.org/10.1007/s10207-023-00811-x | es_ES |
| dcterms.bibliographicCitation | World Economic Forum. (2022). Cyber Resilience Index: Advancing cyber resilience across sectors and regions. https://www3.weforum.org/docs/WEF_Cyber_Resilience_Index_2022.pdf | es_ES |
| dcterms.bibliographicCitation | Yulianto, S., Soewito, B., Gaol, F. L., & Kurniawan, A. (2025). Enhancing cybersecurity resilience through advanced red-teaming exercises and MITRE ATT&CK framework integration: A paradigm shift in cybersecurity assessment. Cyber Security and Applications, 3, 100077. https://doi.org/10.1016/j.csa.2024.100077 | es_ES |
| datacite.rights | http://purl.org/coar/access_right/c_abf2 | es_ES |
| oaire.resourcetype | http://purl.org/coar/resource_type/c_2df8fbb1 | es_ES |
| oaire.version | http://purl.org/coar/version/c_b1a7d7d4d402bcce | es_ES |
| dc.audience | Público general | es_ES |
| dc.contributor.tutor | Serrano Cuervo, Aldemar | |
| dc.contributor.tutor | Manrique Villanueva, Lina María | |
| dc.identifier.instname | Escuela Superior de Guerra "General Rafael Reyes Prieto" | es_ES |
| dc.identifier.reponame | Repositorio ESDEG | es_ES |
| dc.publisher.place | Bogotá | es_ES |
| dc.publisher.program | Maestría en Ciberseguridad y Ciberdefensa | es_ES |
| dc.relation.citationEdition | 52 páginas | es_ES |
| dc.rights.accessrights | info:eu-repo/semantics/openAccess | es_ES |
| dc.rights.cc | CC0 1.0 Universal | * |
| dc.subject.keywords | Ciber Resiliencia | es_ES |
| dc.subject.keywords | Ciberseguridad | es_ES |
| dc.subject.keywords | Comando y Control | es_ES |
| dc.subject.keywords | Fuerza Aeroespacial | es_ES |
| dc.subject.keywords | Colombia | es_ES |
| dc.subject.keywords | Cyber Resilience | es_ES |
| dc.subject.keywords | Cybersecurity | es_ES |
| dc.subject.keywords | Command and Control | es_ES |
| dc.subject.keywords | Aerospace Force | es_ES |
| dc.type.driver | info:eu-repo/semantics/article | es_ES |
| dc.type.hasversion | info:eu-repo/semantics/draft | es_ES |
| dc.type.spa | Artículo | es_ES |


