Measuring cybersecurity culture through controlled malware attack simulations
DOI:
https://doi.org/10.59169/pentaciencias.v7i3.1510Keywords:
cybersecurity; malware; ecuadorian air force; cyber defenseAbstract
The Ecuadorian Air Force (FAE) faces growing cyber threats that jeopardize national security, the integrity of its operations, and the confidentiality of its information. With the advancement of information and communication technologies (TIC), cyberspace has become a new battlefield where cyber threats can affect the institution's functioning. In this context, the FAE created a Cyber Defense unit with the objective of protecting its digital infrastructure by managing security incidents both proactively and reactively. This study aims to measure the level of cybersecurity culture within the FAE, using an experimental methodology to assess the personnel's response to controlled cyberattacks through malware embedded in an application that digitally signs documents. The research is based on a quantitative approach, using surveys and statistical data analysis obtained from the experimental tests. The results will help identify patterns of knowledge and behavior in the personnel regarding cyber threats, providing valuable information to strengthen cybersecurity in the Ecuadorian Air Force and guide future interventions in this field.
Downloads
References
Denning, D. (2012). activism, hacktivism, and cyberterrorism: the internet as a tool for influencing foreign policy. Networks and Netwars: The Future of Terror, Crime, and Militancy, 239-280.
Fortinet. (1 de Septiembre de 2022). Fortinet: Latinoamérica sufre 137 mil millones de ciberataques en 2022. Obtenido de Fortinet: Latinoamérica sufre 137 mil millones de ciberataques en 2022: https://thestandardcio.com/2022/09/01/fortinet-latinoamerica-sufre-137-mil-millones-de-ciberataques-en-2022/
Ganuza Artiles, N. (2010). Ciberseguridad, retos y amenazas a la seguridad en el ciberespacio. Madrid: Instituto Español de Estudios Estratégicos.
Ganuza, N. (2020). Guía de Ciberdefensa. Canadá: Junta Interamericana de Defensa.
Joint, P. 1.-0. (2016). Department of Defense Dictionary of Military and Associated Terms. Estado Unidos: Joint Publication.
Klimburg, A. (23 de Noviembre de 2017). The-darkening-web-the-war-for-cyberspace. Obtenido de https://ikindlebooks.com/best-sellers/the-darkening-web-the-war-for-cyberspace
León, Á. D. (18 de Junio de 2021). blog.infranetworking.com. Obtenido de https://blog.infranetworking.com/que-es-apache-servidor/
Luz, S. D. (16 de Octubre de 2022). Redeszone.net. Obtenido de https://www.redeszone.net/tutoriales/configuracion-puertos/que-es-socket-tcp-udp-diferencias-puertos/
Microsoft. (2012). Microsoft_Security_Intelligence_Report_Special_Edition. Obtenido de Microsoft_Security_Intelligence_Report_Special_Edition: https://www.microsoft.com/en-us/download/details.aspx?id=29046
Pollit, M. (1998). Cyberterrorism — fact or fancy? Computer Fraud and Security, 8-10.
Ranchal, J. (25 de Octubre de 2018). https://www.muycomputer.com/. Obtenido de https://www.muycomputer.com/2018/10/25/consola-de-windows-guia/redhat. (8 de Mayo de 2020). redhat.com. Obtenido de https://www.redhat.com/es/topics/api/what-is-a-rest-api
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Revista Científica Arbitrada Multidisciplinaria PENTACIENCIAS - ISSN 2806-5794.

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

