451
RECIMUNDO VOL. 7 N°2 (2023)
Strategic Direction, «Digital defenses: The importance
of cybersecurity in entrepreneurial ventures in the
digital age», Strategic Direction, vol. 38, n.o 2, pp.
24-26, ene. 2022, doi: 10.1108/SD-12-2021-0159.
A. I. G. Ibrahim, «CYBERSECURITY: PANORAMA
AND IMPLEMENTATION IN 2021», presentado en
SAFE 2021, Rome, Italy, dic. 2021, pp. 41-54. doi:
10.2495/SAFE210041.
M. Alawida, A. E. Omolara, O. I. Abiodun, y M. Al-Ra-
jab, «A deeper look into cybersecurity issues in the
wake of Covid-19: A survey», Journal of King Saud
University - Computer and Information Sciences,
vol. 34, n.o 10, Part A, pp. 8176-8206, nov. 2022,
doi: 10.1016/j.jksuci.2022.08.003.
J. Antczak, «The impact of the covid-19 pandemic
on business entity cyber security», Inżynieria Be-
zpieczeństwa Obiektów Antropogenicznych, n.o 1,
Art. n.o 1, mar. 2022, doi: 10.37105/iboa.128.
B. Kitchenham, O. Pearl Brereton, D. Budgen, M.
Turner, J. Bailey, y S. Linkman, «Systematic lite-
rature reviews in software engineering – A syste-
matic literature review», Information and Software
Technology, vol. 51, n.o 1, pp. 7-15, ene. 2009, doi:
10.1016/j.infsof.2008.09.009.
ISOTools, «ISO 27001 - Software ISO 27001 de Sis-
temas de Gestión», Software ISO, 2021. https://
www.isotools.org/normas/riesgos-y-seguridad/iso-
27001/ (accedido 16 de diciembre de 2022).
Net at Work Team, «The Role of HR Mitigating Cyber
Security Threats», Net at Work, 6 de junio de 2018.
https://www.netatwork.com/the-role-of-hr-mitiga-
ting-cyber-security-threats/ (accedido 16 de di-
ciembre de 2022).
R. Krishnamurthi, A. Kumar, y S. S. Gill, Autonomous
and Connected Heavy Vehicle Technology. Acade-
mic Press, 2022.
Cisco, «Cisco 2016. Informe anual de seguridad»,
Cisco Systems, Inc., San José, CA, 2016. Acce-
dido: 6 de julio de 2022. [En línea]. Disponible
en: https://www.cisco.com/c/dam/m/es_es/inter-
net-of-everything-ioe/iac/assets/pdfs/security/cis-
co_2016_asr_011116_es-es.pdf
CheckPoint, «¿Qué es el phishing? Tipos de ataques
de phishing - Software de Check Point», What is Phi-
shing? Types of Phishing Attacks, 2020. https://www.
checkpoint.com/cyber-hub/threat-prevention/what-
is-phishing/# (accedido 11 de febrero de 2022).
W. C. Barker, W. Fisher, K. Scarfone, y M. Souppaya,
«Ransomware Risk Management: A Cybersecurity
Framework Profile (Spanish Translation)», National
Institute of Standards and Technology, abr. 2022.
doi: 10.6028/NIST.IR.8374.spa.
B. H. Ali, N. Sulaiman, S. A. R. Al-Haddad, R. Atan, S.
L. M. Hassan, y M. Alghrairi, «Identification of Distri-
buted Denial of Services Anomalies by Using Com-
bination of Entropy and Sequential Probabilities Ra-
tio Test Methods», Sensors (Basel), vol. 21, n.o 19,
p. 6453, sep. 2021, doi: 10.3390/s21196453.
G. Lally y D. Sgandurra, «Towards a Framework for
Testing the Security of IoT Devices Consistently»,
en Emerging Technologies for Authorization and
Authentication, A. Saracino y P. Mori, Eds., en Lec-
ture Notes in Computer Science. Cham: Springer
International Publishing, 2018, pp. 88-102. doi:
10.1007/978-3-030-04372-8_8.
E. Ahmed, A. Islam, M. Ashraf, A. I. Chowdhury, y M.
M. Rahman, «Internet of Things (IoT): Vulnerabili-
ties, Security Concerns and Things to Consider»,
en 2020 11th International Conference on Compu-
ting, Communication and Networking Technologies
(ICCCNT), Kharagpur, India: IEEE, jul. 2020, pp.
1-6. doi: 10.1109/ICCCNT49239.2020.9225283.
A. Chorti et al., «Context-Aware Security for 6G Wi-
reless: The Role of Physical Layer Security», IEEE
Communications Standards Magazine, vol. 6, n.o
1, pp. 102-108, mar. 2022, doi: 10.1109/MCOM-
STD.0001.2000082.
J. Nivedita, «Cybersecurity Statistics: Updated Re-
port 2023», 19 de diciembre de 2022. https://www.
getastra.com/blog/security-audit/cyber-securi-
ty-statistics/ (accedido 22 de mayo de 2023).
M. Ahlgren, «Estadísticas, tendencias y hechos de
ciberseguridad que importan para 2022», Websi-
te Rating, 11 de diciembre de 2022. https://www.
websiterating.com/es/research/cybersecurity-sta-
tistics-facts/ (accedido 16 de diciembre de 2022).
Verizon Business, «2021 DBIR Master’s Guide», Ve-
rizon Business, 2021. https://www.verizon.com/bu-
siness/resources/reports/dbir/2021/masters-gui-
de/ (accedido 16 de diciembre de 2022).
M. Rosenthal, «Phishing Statistics (Updated 2022) -
50+ Important Phishing Stats», Tessian, 12 de enero
de 2022. https://www.tessian.com/blog/phishing-sta-
tistics-2020/ (accedido 16 de diciembre de 2022).
P. Muncaster, «One Ransomware Victim Every 10
Seconds in 2020», Infosecurity Magazine, 25 de
febrero de 2021. https://www.infosecurity-maga-
zine.com/news/one-ransomware-victim-every-10/
(accedido 16 de diciembre de 2022).
S. Morgan, «Cybercrime To Cost The World $10.5
Trillion Annually By 2025», Cybercrime Magazine,
2021. https://cybersecurityventures.com/hacker-
pocalypse-cybercrime-report-2016/ (accedido 16
de diciembre de 2022).
MAPEO DEL PANORAMA ACTUAL DE LA CIBERSEGURIDAD EN LA ERA MODERNA DIGITAL