Visible to the public Biblio

Filters: Author is Molina, Juan Manuel Madrid  [Clear All Filters]
2023-01-05
Rojas, Aarón Joseph Serrano, Valencia, Erick Fabrizzio Paniura, Armas-Aguirre, Jimmy, Molina, Juan Manuel Madrid.  2022.  Cybersecurity maturity model for the protection and privacy of personal health data. 2022 IEEE 2nd International Conference on Advanced Learning Technologies on Education & Research (ICALTER). :1—4.
This paper proposes a cybersecurity maturity model to assess the capabilities of medical organizations to identify their level of maturity, prioritizing privacy and personal data protection. There are problems such as data breaches, the lack of security measures in health information, and the poor capacity of organizations to handle cybersecurity threats that generate concern in the health sector as they seek to mitigate risks in cyberspace. The proposal, based upon C2M2 (Cybersecurity Capability Maturity Model), incorporates practices and controls which allow organizations to identify security gaps generated through cyberattacks on sensitive health patient data. This model seeks to integrate the best practices related to privacy and protection of personal data in the Peruvian legal framework through the Administrative Directive No. 294-MINSA and the personal data protection Act No. 29733. The model consists of 3 evaluation phases. 1. Assessment planning; 2. Execution of the evaluation; 3. Implementation of improvements. The model was validated and tested in a public sector medical organization in Lima, Peru. The preliminary results showed that the organization is at Level 1 with 14% of compliance with established controls, 34% in risk, threat and vulnerability management practices and 19% in supply chain management. These the 3 highest percentages of the 10 evaluated domains.
2022-01-31
Gómez, Giancarlo, Espina, Enrique, Armas-Aguirre, Jimmy, Molina, Juan Manuel Madrid.  2021.  Cybersecurity architecture functional model for cyber risk reduction in IoT based wearable devices. 2021 Congreso Internacional de Innovación y Tendencias en Ingeniería (CONIITI). :1—4.
In this paper, we propose a functional model for the implementation of devices that use the Internet of Things (IoT). In recent years, the number of devices connected to the internet per person has increased from 0.08 in 2003 to a total of 6.58 in 2020, suggesting an increase of 8,225% in 7 years. The proposal includes a functional IoT model of a cybersecurity architecture by including components to ensure compliance with the proposed controls within a cybersecurity framework to detect cyber threats in IoT-based wearable devices. The proposal focuses on reducing the number of vulnerabilities present in IoT devices since, on average, 57% of these devices are vulnerable to attacks. The model has a 3-layer structure: business, applications, and technology, where components such as policies, services and nodes are described accordingly. The validation was done through a simulated environment of a system for the control and monitoring of pregnant women using wearable devices. The results show reductions of the probability index and the impact of risks by 14.95% and 6.81% respectively.