Overview of International and National Cybersecurity
DOI:
https://doi.org/10.5281/zenodo.6998569Keywords:
Cybersecurity, National, InternationalAbstract
Today, talking about issues related to Cybersecurity in Mexico forces us to carry out a review of the cases and the probable perpetrators of these events, not only to know and adopt the very sophisticated security systems, but also to be prepared for attacks that are increasingly they will be more powerful and with serious consequences. Particularly because Mexico is in a weak position both technologically and legally.
Metrics
References
Arreola, J. (26 de abril de 2016). Padrón electoral en la nube: ¿ciberproblemas a la mexicana? Obtenido de Forbes México.
Caldwell, G. (07 de febrero de 2016). Why You Should Be Concerned About The . Obtenido de TechCrunch.
Calmes, J. (09 de febrero de 2016). Obama’s Last Budget, and Last Budget Battle With Congress. Obtenido de The New York Times.
López, J. (07 de febrero de 2016). Cibercrimen ataca a 40% de internautas mexicanos. Obtenido de El Financiero.
Danilak, M., & Thomas, D. (23 de marzo de 2016). What is Cybersecurity? Obtenido de Quora.
Jessop, S., & Kerber, R. (28 de agosto de 2015). Investors still in the dark as cyber threat grows. Obtenido de Reuters UK.
Kapellmann, Daniel & Benjamín Reyes, Retos de Ciberseguridad en México. Obtenido en http://the-ciu.net/nwsltr/381_1Distro.html
Kushner, David. “The Real Story of Stuxnet.” IEEE Spectrum: Technology, Engineering, and Science News. N.p., 26 Feb. 2013. Web. 16 May 2016.
Notimex. (28 de diciembre de 2015). México, tercer lugar mundial en ataques cibernéticos; equipo de IPN los combate. Obtenido de Aristegui Noticias.
Office of the National Counterintelligence Executive. “Foreign Spies Stealing US Economic Secrets in Cyberspace.” Counterintelligence (n.d.): n. pág., Oct. 2011. Web.
Stone, Richard. “A Call to Arms.” Science Mag 339.6123 (2000): n. pag. 1 Mar. 2013. Web.
The White House. (09 de febrero de 2016). Fact Sheet: Cybersecurity National Action Plan. Obtenido de The White House Office of the Press Secretary.
Weedon, Jen, and Laura Galante. “Intelligence Analysts Dissect the Headlines: Russia, Hackers, Cyberwar! Not So Fast. « Executive Perspective.” Atom. N.p., 12 Mar. 2014. Web. 17 May 2016.
Wikipedia. (07 de mayo de 2016). List of cyber-attacks. Obtenido de Wikipedia.
www.forbes.com.mx/ciberseguridad-casi-prueba-del-enemigo-invisible/BenjamínReyes
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
This journal adheres to the Creative Commons license in the definition of its policy of open access and reuse of published material, in the following terms:
- Accessibility to articles and other publications in whole or in part under the concept of copying, distribution, public communication , interactive access (through the Internet or other means), explicitly maintaining the recognition of the author or authors and the journal itself (authorship acknowledgment).
- Warning that if the articles are remixed, modified or fragments used in other creations, the modified material cannot be distributed, nor is it allowed to reconstruct versions from the original published articles (derived works).
- The use of the contents of the published articles, in whole or in part, for profit (non-commercial recognition) is prohibited.
The author retains copyright, transfers or grants exclusive commercial rights to the publisher, and a non-commercial license is used.