10.1145/3375900.3375911acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicetmConference Proceedingsconference-collections
research-article

Cybersecurity Analysis to Determine the Impact on the Social area in Latin America and the Caribbean

Published:07 February 2020Publication History

ABSTRACT

This document presents an introduction to the events that occurred in Latin America and the Caribbean, where banks are compromised by cyber-attacks, the same case is also seen in Ecuador, where losses from these attacks would amount to $ 6 billion by 2021. Our goal is to provide an analysis that demonstrates the social impact that cybersecurity has in Latin America and the Caribbean and a way to measure cybersecurity to combat threats due to constant technological progress and the great privacy risks presented to the day with cyber systems. The deductive method was used, adopting and generating a set of activities to evaluate the Total Cybersecurity (TC) of the cyber systems and / or companies to have a control of the security that it has and the improvements that can be implemented to prevent or combat Possible cyber threats or vulnerabilities. It resulted in cyber-resilience activities and activities based on the main functions before, during and after a cyber-attack. These activities are evaluated by the frequency of use, allowing each activity to assign a value and in this way apply the formulas proposed and obtain the CT, achieving the percentage of cybersecurity that has been implemented and discovering the weaknesses of the systems that They must be strengthened. It was concluded that in certain countries of Latin America and the Caribbean they have very little interest in the development and expansion of cybersecurity in their lands, unlike the progress of cybersecurity in European countries.

References

  1. "delitosinformaticos-coip-policia-fiscalia @ www.eltelegrafo.com.ec.".Google ScholarGoogle Scholar
  2. Tirumala, S. S., Valluri, M. R., & Babu, G. A. (2019). A survey on cybersecurity awareness concerns, practices and conceptual measures. 2019 International Conference on Computer Communication and Informatics (ICCCI), 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  3. Onumo, A., Cullen, A., & Ullah-Awan, I. (2017). An empirical study of cultural dimensions and cybersecurity development. Proceedings - 2017 IEEE 5th International Conference on Future Internet of Things and Cloud, FiCloud 2017, 2017-Janua, 70--76. https://doi.org/10.1109/FiCloud.2017.41.Google ScholarGoogle ScholarCross RefCross Ref
  4. Toapanta, S. M. T., Saá, I. F. M., Quimi, F. G. M., & Gallegos, L. E. M. (2019). An approach to vulnerabilities, threats and risk in voting systems for popular elections in Latin America. Advances in Science, Technology and Engineering Systems, 4(3), 106--116. https://doi.org/10.25046/aj040315.Google ScholarGoogle ScholarCross RefCross Ref
  5. Seabra Oliveira, D., Epstein, J., Kurose, J., & Rocha, A. (2019). Cybersecurity and Privacy Issues in Brazil: Back, Now, and Then [Guest Editors' Introduction]. IEEE Security and Privacy, 16(6), 10--12. https://doi.org/10.1109/MSEC.2018.2874824.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Dedeke, A. (2017). Cybersecurity Framework Adoption: Using Capability Levels for Implementation Tiers and Profiles. IEEE Security and Privacy, 15(5), 47--54. https://doi.org/10.1109/MSP.2017.3681063.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. De Bruin, R., & Von Solms, S. H. (2017). Humanitarian perspective of cybersecurity and cybersecurity governance. 2017 IST-Africa Week Conference, IST-Africa 2017, 1--10. https://doi.org/10.23919/ISTAFRICA.2017.8102388.Google ScholarGoogle ScholarCross RefCross Ref
  8. Raj, R. K., Ekstrom, J. J., Impagliazzo, J., Lingafelt, S., Parrish, A., Reif, H., & Sobiesk, E. (2017). Perspectives on the future of cybersecurity education. Proceedings - Frontiers in Education Conference, FIE, 2017-Octob, 1--2. https://doi.org/10.1109/FIE.2017.8190498.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Chowdhury, N. H., Adam, M. T. P., & Skinner, G. (2019). The impact of time pressure on human cybersecurity behavior: An integrative framework. 26th International Conference on Systems Engineering, ICSEng 2018 - Proceedings, 1--10. https://doi.org/10.1109/ICSENG.2018.8638250.Google ScholarGoogle Scholar
  10. McQuaid, P., Britton, B., Minnich, M., Borelli, D., Baker, J., & Burton, B. (2018). University and Government Uniting to Address Homeland CyberSecurity Issues. 2018 IEEE International Symposium on Technologies for Homeland Security, HST 2018, 1--5. https://doi.org/10.1109/THS.2018.8574161.Google ScholarGoogle ScholarCross RefCross Ref
  11. Rea-Guaman, M., Calvo-Manzano, J. A., & Feliu, T. S. (2018). A prototype to manage cybersecurity in small companies. Iberian Conference on Information Systems and Technologies, CISTI, 2018-June, 1--6. https://doi.org/10.23919/CISTI.2018.8399252.Google ScholarGoogle ScholarCross RefCross Ref
  12. Moises, T. T., Enrique, M. G., & Antonio, O. T. (2018). An approach of efficient security algorithms for distribute architectures. 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing, ICECDS 2017, 22--25. https://doi.org/10.1109/ICECDS.2017.8389939.Google ScholarGoogle Scholar
  13. Mylrea, M., Gourisetti, S. N. G., & Nicholls, A. (2018). An introduction to buildings cybersecurity framework. 2017 IEEE Symposium Series on Computational Intelligence, SSCI 2017 - Proceedings, 2018-Janua, 1--7. https://doi.org/10.1109/SSCI.2017.8285228.Google ScholarGoogle Scholar
  14. Strielkina, A., Illiashenko, O., Zhydenko, M., & Uzun, D. (2018). Cybersecurity of healthcare IoT-based systems: Regulation and case-oriented assessment. Proceedings of 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies, DESSERT 2018, 67--73. https://doi.org/10.1109/DESSERT.2018.8409101.Google ScholarGoogle ScholarCross RefCross Ref
  15. Mailloux, L. O., & Grimaila, M. (2018). Advancing cybersecurity: The growing need for a cyber-resiliency workforce. IT Professional, 20(3), 23--30. https://doi.org/10.1109/MITP.2018.032501745.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Savola, R. M. (2017). Current level of cybersecurity competence and future development - Case Finland. ACM International Conference Proceeding Series, Part F130530, 121--124. https://doi.org/10.1145/3129790.3129804.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Jin, G., Tu, M., Kim, T. H., Heffron, J., & White, J. (2018). Game based cybersecurity training for High School Students. SIGCSE 2018 - Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018-January, 68--73. https://doi.org/10.1145/3159450.3159591.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Oruganti, P. S., Appel, M., & Ahmed, Q. (2019). Hardware-in-loop based Automotive Embedded Systems Cybersecurity Evaluation Testbed. AutoSec 2019 - Proceedings of the ACM Workshop on Automotive Cybersecurity, Co-Located with CODASPY 2019, 41--44. https://doi.org/10.1145/3309171.3309173.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Alshboul, Y., & Streff, K. (2017). Beyond cybersecurity awareness: Antecedents and satisfaction. ACM International Conference Proceeding Series, 85--91. https://doi.org/10.1145/3178212.3178218.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Haney, J. M., & Lutters, W. G. (2017). The work of cybersecurity advocates. Conference on Human Factors in Computing Systems - Proceedings, Part F127655, 1663--1670. https://doi.org/10.1145/3027063.3053134.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Cuchta, T., Blackwood, B., Devine, T. R., Niichel, R. J., Daniels, K. M., Lutjens, C. H.,... Stephenson, R. J. (2019). Human Risk Factors in Cybersecurity. 87--92.Google ScholarGoogle Scholar
  22. [1] "87a08800712285fbd459c6991a470f337588b586 @ blog.ehcgroup.io.".Google ScholarGoogle Scholar
  23. OEA, "Estado de la Ciberseguridad en el Sector Bancario en América Latina y el Caribe," p. 186, 2018.Google ScholarGoogle Scholar

Index Terms

  1. Cybersecurity Analysis to Determine the Impact on the Social area in Latin America and the Caribbean

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICETM '19: Proceedings of the 2019 2nd International Conference on Education Technology Management
      December 2019
      126 pages
      ISBN:9781450376297
      DOI:10.1145/3375900

      Copyright © 2019 ACM

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 7 February 2020

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader
    About Cookies On This Site

    We use cookies to ensure that we give you the best experience on our website.

    Learn more

    Got it!