Participaciones en Congresos

El equipo formado por los investigadores Montes, S.R., Robles, G., Gonzalez-Barahona, J.M. y Sánchez, L.E. y con la colaboración de la división de ciberseguridad MARISMA del grupo Sicaman, ha participado con un artículo denominado Considerations Regarding the Creation of a Post-graduate Master’s Degree in Free Software dentro del 10th IFIP WG 2.13 International Conference on Open Source Systems and Technologies (ICOSST14), San José, Costa Rica, May 6–9, 2014,  Pp. 123-132, ISBN: 978-3-642-55127-7. DOI: 10.1007/978-3-642-55128-4_17.

Este documento forma parte de los avances e investigaciones en el campo de la Ciberseguridad desarrolladas por el Grupo GSyA y la división de seguridad MARISMA del Grupo Sicaman.

ABSTRACT
Free software has gained importance over the last few years, and can be found in almost any sphere in which ‘software processes’ are important. However, even when universities and higher education establishments include subjects concerning free programming and technologies in their curriculums, their graduates tend to attain limited technological, organisational and philosophical knowledge that limits them as regards their participation in, management and development of free software projects. This gap in skills and knowledge has recently led to a series of post-graduate studies whose objective is to offer students the possibility of acquiring competencies that will allow them to become experts in free software. This paper presents a study concerning the offers for post-graduate studies in free software that currently exist, with the intention of creating similar post-graduate studies in Ecuador.

 

Más información:

URL Noticia 1: https://www.researchgate.net

URL Noticia 2: https://link.springer.com

Learn More

Participación en Congresos

El equipo formado por los investigadores Santos-Olmo, A., Sánchez, L.E., Fernández Medina, E. y Piattini, M. y con la colaboración de la división de ciberseguridad MARISMA del grupo Sicaman, ha participado con un artículo denominado Systematic Review of Methodologies and Models for the Analysis and Management of Associative and Hierarchical Risk in SMEs  dentro del   9th International Workshop on Security in Information Systems (WOSIS12) In conjunction with 11th International Conference on Enterprise Information Systems (ICEIS12). Wroclaw, Poland, June 2012,  Pp. 117 -124, ISBN: 978-989-8565-15-0, EID: 2-s2.0-84865681427. Core: C.

Este documento forma parte de los avances e investigaciones en el campo de la Ciberseguridad desarrolladas por el Grupo GSyA y la división de seguridad MARISMA del Grupo Sicaman.

ABSTRACT

As a result of the growing dependence of information society on ICTs, the need to know the risks that can affect information is enormously increasing with the purpose of protecting it. This article shows advances in the identification and management of risks in ICTs, particularly in the case of SMEs, along with the first proposal of a methodology for management and analysis of the associative risk in SMEs taking into account not only internal risks derived from SMEs but also other external risks derived from other enterprises in the same sector or collaborating with them. Thus, we will obtain a high quality risk analysis at low cost using advanced concepts such as “associative algorithms” and “enterprise social networks”. In the era of globalization, SMEs no longer work as independent companies but share more and more services, even facilities, with other companies. Therefore, we cannot obtain an adequate risk analysis without considering the risks associated with these collaborations. In this article we present rhe results of a systematic review of methodologies and models for the analysis and management of associative and hierarchical risk in SMEs.

 

Más información:

URL Noticia 1: https://www.researchgate.net/pdf

URL Noticia 2: http://www.iceis.org

Learn More

Participación en Congresos

El equipo formado por los investigadores Gállego, A., Santos- Olmo, A., Sánchez, L.E. y Fernández Medina, E. y con la colaboración de la división de ciberseguridad MARISMA del grupo Sicaman, ha participado con un artículo denominado Automated Security Metrics in ISMSs to Discover the Level of Security of OSs and DBMSs dentro del   8th International Workshop on Security in Information Systems (WOSIS11) In conjunction with 11th International Conference on Enterprise Information Systems (ICEIS11), Beijing, China, 02-05 Junio 2011,  Pp. 159 – 166, ISBN: 978-989-8425-61-4 – Deposito Legal: 327884/11, EID: 2-s2.0-84865234383. Core: C.

Este documento forma parte de los avances e investigaciones en el campo de la Ciberseguridad desarrolladas por el Grupo GSyA y la división de seguridad MARISMA del Grupo Sicaman.

ABSTRACT
The information society is ever-increasingly dependent upon Information Security Management Systems (ISMSs), and the availability of these systems has come to be vital to the evolution of SMEs. However, this type of companies requires ISMSs which have been adapted to their particular characteristics, and which are optimised from the point of view of the resources that are necessary to install and maintain them. This paper concentrates on the development of a process for ISMSs that will allow the level of security of critical applications installed in these sytems, i.e., Operative Systems and Data Base Management Systems, to be measured. This process is currently being directly applied in real cases, thus leading to an improvement in its application.

 

Más información:

URL Noticia 1: https://www.researchgate.net

URL Noticia 2: https://pdfs.semanticscholar.org/pdf

Learn More

Participación en Congresos

El equipo formado por los investigadores Santos-Olmo, A., Sánchez, L.E., Fernández Medina, E. y Piattini, M. y con la colaboración de la división de ciberseguridad MARISMA del grupo Sicaman, ha participado con un artículo denominado Desirable Characteristics for an ISMS Oriented to SMEs dentro del   8th International Workshop on Security in Information Systems (WOSIS11) In conjunction with 11th International Conference on Enterprise Information Systems (ICEIS11), Beijing, China, 02-05 Junio 2011,  Pp. 151 – 158, 978-989-8425-61-4 – Deposito Legal: 327884/11, EID: 2-s2.0-84865262643. Core: C.

Este documento forma parte de los avances e investigaciones en el campo de la Ciberseguridad desarrolladas por el Grupo GSyA y la división de seguridad MARISMA del Grupo Sicaman.

ABSTRACT
Information Society depends more and more on Information Security Management Systems (ISMSs) and the availability of these systems has become vital for SMEs’ evolution. However, this kind of companies need that ISMSs are adapted to their special characteristics as well as optimized from the viewpoint of the necessary resources to implement and maintain them. In this paper, we present an analysis of the different proposals that are arising oriented to implement ISMSs into SMEs with the purpose of determining the characteristics that a security management methodology oriented to SMEs should have.

 

Más información:

URL Noticia 1: https://www.researchgate.net

URL Noticia 2: http://www.scitepress.org

URL Noticia 3: http://www.iceis.org

Learn More

Participación en Congresos

El equipo formado por los investigadores Rebollo, O., Mellado, D., Sánchez, L.E., Fernández Medina, E y con la colaboración de la división de ciberseguridad MARISMA del grupo Sicaman, ha participado con un artículo denominado Comparative Analysis of Information Security Governance Frameworks: A Public Sector Approach dentro del  11th European Conference on e-Coverment (ECEG’11), Ljubljani, Slovenia, 16 – 17 June, 2011,  Pp. 482 – 490, ISBN: 978-1-908272-01-0 CD. IDSNumber: BYT92, EID: 2-s2.0-84870894787, WOS: 000300256400058. Core: C.

Este documento forma parte de los avances e investigaciones en el campo de la Ciberseguridad desarrolladas por el Grupo GSyA y la división de seguridad MARISMA del Grupo Sicaman.

ABSTRACT
Security awareness has spread inside many organizations leading them to tackle information security not just as a technical matter, but from a corporate point of view. Information Security Governance (ISG) provides enterprises with means of dealing with the security of their information assets in a comprehensive manner, involving every stakeholder through the whole governance and management processes. Boards of Public Entities cannot remain unaware of this development and should make efforts to include ISG in their business processes. Realizing this relevant role, scientific literature contains a variety of proposals which define different frameworks to foster ISG inside any corporation. In order to facilitate the adoption of any of them by the public sector, this paper compiles existing approaches, highlighting the main contributions and characteristics of each one. Senior executives and security managers may need support on their decisions about adopting one of these frameworks, so a comparative analysis is performed. Although some comparative reviews are found in literature, they lack a systematic and repeatable methodology, ignore recently published contributions or focus on specific areas, making results biased and inappropriate for general use in corporations and the public sector. This paper tries to guarantee an objective comparison through a set of comparative criteria that have been defined and applied to every proposal, so that strengths and weaknesses of each one can be pointed out. These criteria have been selected from a deep analysis of existing ISG papers, including both governance and management aspects. As results show, each proposal focuses on different aspects of ISG giving priority to some of the defined criteria, and none of them covers the entire required spectrum. Most of the selected frameworks can be used by any public organization as a starting point towards integrating security into their processes, but this paper helps managers to be aware of their limitations and the gaps which need to be covered in order to achieve a complete integration. Consequently, more investigation is needed to fulfill detected gaps and define an ISG framework that organizations can rely on, and which offers security guarantees of covering every information asset of the company. Public sector´s idiosyncrasy must be taken into account in this development, resulting in a general framework eligible for adoption by both public and private companies.

 

Más información:

URL Noticia 1: https://www.researchgate.net

URL Noticia 2: https://books.google.es/books

URL Presentación: https://comparative-analysis-of-information-security

Learn More

Participación en Congresos

El equipo formado por los investigadores Sánchez, L.E., Santos-Olmo, A., Fernández Medina, E. y Piattini, M y con la colaboración de la división de ciberseguridad MARISMA del grupo Sicaman, ha participado con un artículo denominado Security Culture in Small and Medium-Size Enterprise dentro del  Conference on ENTERprise Information Systems (CENTERIS’10), Viana do Castelo, Portugal, 20 – 22 October, 2010,  Procedings: Communications in Computer and Information Science. Springer Verlag (Book Series), ISSN: 1865-0929. Pp. 315-324. ISBN: 1865-0929 978-3-642-16418-7, IDSNumber: BTZ21, DOI: 10.1007/978-3-642-16419-4_32, EID: 2-s2.0-78650890371, WOS: 000288485400032. Impact factor: 0.127 (Q4).

Este documento forma parte de los avances e investigaciones en el campo de la Ciberseguridad desarrolladas por el Grupo GSyA y la división de seguridad MARISMA del Grupo Sicaman.

ABSTRACT
The information society depends ever-increasingly on Information Security Management Systems (ISMSs), and these systems have become vital to SMEs. However, ISMSs must be adapted to SME’s specific characteristics, and they must be optimised from the point of view of the resources which are necessary to install and maintain them. Furthermore, when installing ISMSs, the majority of models have until now been centred on technical and management aspects, and the third aspect, which is institutional and is of particular relevance to SMEs, has been virtually ignored. In this paper we present the importance of the security culture for SMEs, along with our proposal to introduce this concept into SMEs in a progressive and sustainable manner. The model is currently being applied in real cases, thus leading to a constant improvement in its application.

 

Más información:

URL Noticia 1: https://www.researchgate.net

URL Noticia 2: https://link.springer.com

Learn More

Participación en Congresos

El equipo formado por los investigadores Sánchez, L.E., Santos-Olmo, A., Fernández Medina, E. y Piattini, M y con la colaboración de la división de ciberseguridad MARISMA del grupo Sicaman, ha participado con un artículo denominado Building ISMS Through Knowledge Reuse  dentro del  7th International Conference on Trust, Privacy & Security in Digital Business (TRUSTBUS’10), Bilbao, Spain, 30 August – 3 September 2010,  Pp. 190-201. ISBN:  0302-9743 978-3-642-15151-4 – LNCS (Lecture Notes in Computer Science) 6264, Publisher: Springer Verlag. ISSN: 0302-9743. IDSNumber: BSR04, DOI: 10.1007/978-3-642-15152-1_17, EID: 2-s2.0-78049357355, WOS: 000285524700017. Core: B.

Este documento forma parte de los avances e investigaciones en el campo de la Ciberseguridad desarrolladas por el Grupo GSyA y la división de seguridad MARISMA del Grupo Sicaman.

ABSTRACT

The information society is increasingly dependent Information Systems Security Management (ISMS) and knowledge of the security risks associated with its assets value. However, very few risk analysis methodologies have been raised as to create systems to analyze risks in a quick and economical, and which in turn can leave this system dynamically update. This paper presents a new methodology, called MARISMA, aimed at carrying out a risk analysis simplified and dynamic, which is valid for all companies, including SMEs, and to provide solutions to the problems identified during the application of the scientific method “Action Research”. This methodology is being applied directly to real cases, thus achieving a constant improvement of its processes.

 

Más información:

URL Noticia 1: http://www.revistaieeela.pea.usp.br.pdf

URL Noticia 2: https://www.nics.uma.es

Learn More

Participación en Congresos

El equipo formado por los investigadores Sánchez, L.E., Ruiz, C., Fernández Medina y Piattini, M. y con la colaboración de la división de ciberseguridad MARISMA del grupo Sicaman, ha participado con un artículo denominado Managing the asset risk of SMEs, Fifth International Conference on Availability dentro del  Reliability and Security (ARES’10). Second International Workshop on Organizational Security Aspects (OSA’10)., Krakow, Poland, Febrero, 2010,  Pp. 422-429. ISBN: 978-0-7695-3965-2/10, IDSNumber: BOZ84, DOI: 10.1109/ARES.2010.52, EID: 2-s2.0-77952326945, WOS: 000278197800062. Core: B.

Este documento forma parte de los avances e investigaciones en el campo de la Ciberseguridad desarrolladas por el Grupo GSyA y la división de seguridad MARISMA del Grupo Sicaman.

ABSTRACT
The information society is becoming increasingly dependent on systems for managing and analyzing the risk to which its main information assets are exposed and having access to these systems has become vital for the evolution of SMEs. However, this type of company requires the systems to be adapted to their special characteristics and to be optimized from the point of view of resources required to set them up and maintain them. This article presents a proposed method for carrying out risk analysis adaptation, which is suitable for SMEs, set within the framework of the methodology for security management in small and medium-sized enterprises (MSM2-SME). This model is being applied directly to real cases, and therefore its application is constantly being improved.

 

Más información:

URL Noticia 1: https://ieeexplore.ieee.org

URL Noticia 2: https://www.researchgate.net

Learn More

Participación en Congresos

El equipo formado por los investigadores Sánchez, L.E., Villafranca, D., Fernández Medina, E. y Piattini, M. y con la colaboración de la división de ciberseguridad MARISMA del grupo Sicaman, ha participado con un artículo denominado Management of Scorecards and Metrics to manage Security in SMEs dentro del  The 18th ACM International Conference on Information and Knowledge Management, Proceedings (CIKM’09). International Workshop on Data Quality and Security (DQS’09). Hong Kong, China, Noviembre, 2009,  Pp. 9-16., ISBN: 978-1-60558-884-1, DOI: 10.1145/1651415.1651418, EID: 2-s2.0-74049160791. Impact Factor: Q2. Core: A.

Este documento forma parte de los avances e investigaciones en el campo de la Ciberseguridad desarrolladas por el Grupo GSyA y la división de seguridad MARISMA del Grupo Sicaman.

ABSTRACT
Information Society depends more and more on Information Security Management Systems (ISMSs) and the availability of these systems has become vital for the evolution of Small and Medium Enterprises (SMEs). However, this kind of enterprises requires that ISMSs are adapted to their special characteristics and optimized from the viewpoint of the necessary resources to implement and maintain them. This paper presents the mechanisms included in the security management methodology for SMEs called MGSM-PYME that enables the responsible for security to have at all times knowledge of the level of security management of the enterprise. This model is being directly applied to real cases, thus obtaining a constant improvement in its application.

 

Más información:

URL Noticia 1: https://www.researchgate.net

Learn More

Participación en Congresos

El equipo formado por los investigadores Sánchez, L.E., Villafranca, D., Fernández Medina, E. y Piattini, M. y con la colaboración de la división de ciberseguridad MARISMA del grupo Sicaman, ha participado con un artículo denominado MMSM-SME: Methodology for the management of security and its maturity in Small and Medium-sized Enterprises dentro del  7th International Workshop on Security in Information Systems (WOSIS09) In conjunction with 10th International Conference on Enterprise Information Systems (ICEIS10)., Milan, Italia, Mayo 2009,  Pp. 67-78. ISBN: 978-989-8111-91-3, IDSNumber: BQL13, EID: 2-s2.0-74549134516, WOS: 000281235000007. Core: C.

Este documento forma parte de los avances e investigaciones en el campo de la Ciberseguridad desarrolladas por el Grupo GSyA y la división de seguridad MARISMA del Grupo Sicaman.

ABSTRACT
Due to the growing dependence of information society on Information and Communication Technologies (ICTs), the need to protect information is getting more and more important for enterprises. In this context, Information Security Management Systems (ISMSs), that are very important for the stability of the information systems of enterprises, have arisen. The fact of having these systems available has become more and more vital for the evolution of Small and Medium-Sized Enterprises (SMEs). In this article, we show the methodology that we have developed for the development, implementation and maintenance of a security management system, adapted for the needs and resources available for SMEs. This approach is being directly applied to real case studies and thus, we are obtaining a constant improvement in its application.

 

Más información:

URL Noticia 1: https://www.researchgate.net

Learn More