Measuring cybersecurity culture through controlled malware attack simulations

Authors

DOI:

https://doi.org/10.59169/pentaciencias.v7i3.1510

Keywords:

cybersecurity; malware; ecuadorian air force; cyber defense

Abstract

The Ecuadorian Air Force (FAE) faces growing cyber threats that jeopardize national security, the integrity of its operations, and the confidentiality of its information. With the advancement of information and communication technologies (TIC), cyberspace has become a new battlefield where cyber threats can affect the institution's functioning. In this context, the FAE created a Cyber Defense unit with the objective of protecting its digital infrastructure by managing security incidents both proactively and reactively. This study aims to measure the level of cybersecurity culture within the FAE, using an experimental methodology to assess the personnel's response to controlled cyberattacks through malware embedded in an application that digitally signs documents. The research is based on a quantitative approach, using surveys and statistical data analysis obtained from the experimental tests. The results will help identify patterns of knowledge and behavior in the personnel regarding cyber threats, providing valuable information to strengthen cybersecurity in the Ecuadorian Air Force and guide future interventions in this field.

Downloads

Download data is not yet available.

References

Denning, D. (2012). activism, hacktivism, and cyberterrorism: the internet as a tool for influencing foreign policy. Networks and Netwars: The Future of Terror, Crime, and Militancy, 239-280.

Fortinet. (1 de Septiembre de 2022). Fortinet: Latinoamérica sufre 137 mil millones de ciberataques en 2022. Obtenido de Fortinet: Latinoamérica sufre 137 mil millones de ciberataques en 2022: https://thestandardcio.com/2022/09/01/fortinet-latinoamerica-sufre-137-mil-millones-de-ciberataques-en-2022/

Ganuza Artiles, N. (2010). Ciberseguridad, retos y amenazas a la seguridad en el ciberespacio. Madrid: Instituto Español de Estudios Estratégicos.

Ganuza, N. (2020). Guía de Ciberdefensa. Canadá: Junta Interamericana de Defensa.

Joint, P. 1.-0. (2016). Department of Defense Dictionary of Military and Associated Terms. Estado Unidos: Joint Publication.

Klimburg, A. (23 de Noviembre de 2017). The-darkening-web-the-war-for-cyberspace. Obtenido de https://ikindlebooks.com/best-sellers/the-darkening-web-the-war-for-cyberspace

León, Á. D. (18 de Junio de 2021). blog.infranetworking.com. Obtenido de https://blog.infranetworking.com/que-es-apache-servidor/

Luz, S. D. (16 de Octubre de 2022). Redeszone.net. Obtenido de https://www.redeszone.net/tutoriales/configuracion-puertos/que-es-socket-tcp-udp-diferencias-puertos/

Microsoft. (2012). Microsoft_Security_Intelligence_Report_Special_Edition. Obtenido de Microsoft_Security_Intelligence_Report_Special_Edition: https://www.microsoft.com/en-us/download/details.aspx?id=29046

Pollit, M. (1998). Cyberterrorism — fact or fancy? Computer Fraud and Security, 8-10.

Ranchal, J. (25 de Octubre de 2018). https://www.muycomputer.com/. Obtenido de https://www.muycomputer.com/2018/10/25/consola-de-windows-guia/redhat. (8 de Mayo de 2020). redhat.com. Obtenido de https://www.redhat.com/es/topics/api/what-is-a-rest-api

Published

2025-05-01

How to Cite

Álvarez Paredes, A. R. ., Cortez Viteri, C. D. ., Araujo Fierro, P. R. ., & Moreno Proaño, C. F. . (2025). Measuring cybersecurity culture through controlled malware attack simulations. Revista Científica Arbitrada Multidisciplinaria PENTACIENCIAS - ISSN 2806-5794., 7(3), 407–416. https://doi.org/10.59169/pentaciencias.v7i3.1510

Issue

Section

Artículos originales