La ciberseguridad: análisis político y estratégico

Authors

  • Boris Saavedra Instituto Universitario Gutiérrez Mellado, España
  • Luisa Parraguez Universidad Nacional Autónoma de México, México

DOI:

https://doi.org/10.25062/0120-0631.737

Keywords:

cybersecurity, strategy, geopolitics, Internet, International Relations

Abstract

Cyberspace is a complex and dynamic environment created by humans and subject to rapid and accelerated changes, motivated by three forces that interact: digital technology, globalization and climate change. This article focuses on an analysis of cyberspace from a Security and Defense perspective at the political and strategic level. The topic of governance is addressed through adequate cybersecurity which constitutes the most important and relevant global challenge in this area. In order to reach this goal, analysis is required to generate the structural capacities (technological) as well as the geopolitical enquiry. The complexity of cyberspace calls for a national policy that defines the capacity of the State to develop technology, competent human resources, the adequate financing and the necessary material. The strategy should explain the use of all the components in cyberspace and its role in achieving the goals underlined in the policy. Finally, the digital ecosystem and the international actors demonstrate the complex dynamics involved in the interaction among States.

Author Biographies

Boris Saavedra, Instituto Universitario Gutiérrez Mellado, España

Doctor en Paz y Seguridad Internacional, Instituto Universitario Gutiérrez Mellado de la Universidad Nacional de Educación a Distancia en España; y Profesor de Seguridad Nacional, Centro de Estudios Hemisféricos de Defensa William J. Perry, Universidad Nacional de Defensa, Washington, D.C.

Luisa Parraguez, Universidad Nacional Autónoma de México, México

Doctora en Relaciones Internacionales, Universidad Nacional Autónoma de México; Investigadora Fulbright, Centro de Estudios Hemisféricos de Defensa William J. Perry, Universidad de la Defensa Nacional, Washington, D.C.; y Profesora Investigadora del Tecnológico de Monterrey, Campus Ciudad de México.

References

Campbell, R.J. (10 de junio del 2015). Cybersecurity Issues for the Bulk Power System.Washington DC Congressional Research Service. Obtenido de https://www.fas.org/sgp/crs/misc/R43989.pdf

Choucri, N. (2012). Cyberpolitics in International Relations. Nueva York: HarperCollins. https://doi.org/10.7551/mitpress/7736.001.0001

Clark, A. y Eddy, R.P. (2017). Warnings Finding Cassandras to Stop Catastrophes. Nueva York: HarperCollins publishers.

Connell, M. y Vogler, S. (2017). Russia's Approach to Cyber Warfare. CNA Analysis and Solutions. Obtenido de https://www.realcleardefense.com/articles/2017/05/09/russias_approach_to_cyber_warfare_111338.html

EuropeanCommission.(2017).Cybersecurity initiatives: working towards a more secure online environment. Obtenido de http://ec.europa.eu/information_society/newsroom/image/document/2017-3/factsheet_cybersecurity_update_january_2017_41543.pdf

European Commission. (2017). Building an Effective European Cyber Shield: Taking EU Cooperation to the Next Level. Obtenido de http://ec.europa.eu/epsc/publications/strategic-notes/building-effective-european-cyber-shield_en

Friedman, A. y Singer, P. W. (2014). Cybersecurity and Cyberwar what everyone needs to know. Oxford: Oxford University Press.

Friedman, T. L. (2016). Thank You for Being Late: An optimist's Guide to Thriving in the Age of Acceleration. Nueva York: Farrar, Straus & Giroux.

Goodman, M. (2015). Future Crimes Everything is Connected Everyone is Vulnerable and What We Can Do about It. Nueva York, EE.UU: Doubleday.

Gordon, B. (2017). The EU Gets Serious About Cyber: The EU Cybersecurity Act and Other Elements of the Cyber Package. Obtenido de https://www.lexology.com/library/detail.aspx?g=c401bf00-99dd-4a11-8d63-9387f10374bd

KPMG. (2017). Overview of China's Cybersecurity Law. KPMG. Obtenido de https://assets.kpmg.com/content/dam/kpmg/cn/pdf/en/2017/02/overview-of-cybersecurity-law.pdf

Kramer, Franklin D., et al. (eds.). (2009) Cyberpower and National Security. Washington: National Defense University Press & Potomac Books, Inc.

Lindsay, J., et al. (2015). China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain. Oxford: Oxford University Press. https://doi.org/10.1093/acprof:oso/9780190201265.001.0001

Luo, J., et al. (2014). A software vulnerability rating approach based on the vulnerability database. Journal of Applied Mathematics. Obtenido de https://www.hindawi.com/journals/jam/2014/932397/abs/ https://doi.org/10.1155/2014/932397

Meulen, van der, Nicole, et al. (2015). Cybersecurity in the European Union and Beyond: Exploring the Threats and Policy Responses, RAND Corporation, European Parliament.

NATO. (2017). Cyber defence. Acceso a https://www.nato.int/cps/en/natohq/topics_78170.htm.

Robles Carrillo, M. (2017). Gobernanza política versus gobernanza tecnológica del ciberespacio, Instituto Español de Estudios Estratégicos. Obtenido de http://www.ieee.es/Galerias/fichero/docs_opinion/2017/DIEEEO56-2017_Gobernanza_Margarita_Robles.pdf

Schmidt, E. y Cohen, J. (2013). The New Digital Age: Transforming Nations, Businesses and Our Lives. Nueva York: Vintage Company.

Schneier, B. (2015). Data and Goliath The Hidden Battles to Collect Your Data and Control Your World. Nueva York: W. W. Norton & Company, Inc.

Segal, A. (2016). The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Era. Nueva York: Public Affairs.

Shea, J. (2018). How is NATO Meeting the Challenge of Cyberspace? PRISM, 7(2), 19-29.

Simon, P. (2013). Too Big to Ignore: The Business Case of Big Data. Nueva Jersey: John Wiley & Sons, Inc. https://doi.org/10.1002/9781119204039

Singer P.W. y Friedman, A. (2014). Cybersecurity and Cyberwar what everyone needs to know. Oxford: Oxford University Press. https://doi.org/10.1093/wentk/9780199918096.001.0001

United Nations Office for Disarmament Affairs. (2018). Developments in the field of information and telecommunications in the context of international security. Obtenido de https://www.un.org/disarmament/topics/informationsecurity/

UNLP (2016). Minería de datos aplicada a datos masivos. Obtenido de http://sedici.unlp.edu.ar/handle/10915/52901

U.S. Department of Defense. (2015). The Department of Defense Cyber Strategy. Obtenido de https://www.defense.gov/Portals/1/features/2015/0415_cyber-strategy/Final_2015_DoD_CYBER_STRATEGY_for_web.pdf

U.S. National Intelligence. (2018). Statement for the record: Worldwide Threat Assessment of the US Intelligence Community. Obtenido de https://www.intelligence.senate.gov/sites/default/files/documents/os-dcoats-021318.PDF

Vaishnav, C., et al. (2013). "Cyber International Relations as an Integrated System." Environment Systems and Decisions, 33(4), 561- 576. https://doi.org/10.1007/s10669-013-9480-3

How to Cite

Saavedra, B. and Parraguez, L. (2018) “La ciberseguridad: análisis político y estratégico”, Revista de las Fuerzas Armadas, (243), pp. 44–51. doi: 10.25062/0120-0631.737.

Downloads

Download data is not yet available.

Published

2018-03-31

Altmetric

Escanea para compartir
QR Code

Some similar items: