Published 2023-12-11
license
Original article

Structuring of computer attacks through playbooks

DOI: https://doi.org/10.22490/25394088.7498
John Freddy Quintero Tamayo Universidad Nacional Abierta y a Distancia
Yenny Stella Nuñez Alvarez Universidad Nacional Abierta y a Distancia
Nelly Alexandra Cuevas Nuñez Universidad Nacional Abierta y a Distancia

This project proposes the need to establish a knowledge database that provides guidance for responding to cybersecurity events or incidents that may arise within the University or involve any of its stakeholders or target communities. The initiative aims to enhance the University's cybersecurity capabilities and ensure a prompt and effective response to potential cyber threats within its community and beyond. By leveraging collective knowledge, the database will become a valuable resource to protect and safeguard the University's digital environment.

 

The purpose is to strengthen preparedness and response to computer incidents, fostering coordination among involved parties and target communities. Additionally, this project represents a significant step towards establishing a Computer Security Incident Response Team (CSIRT) Center, enabling the University to proactively and efficiently address security challenges in a constantly evolving technological environment. The structuring of a computer attack is crucial within the operation of groups responsible for generating responses to these incidents, which is why the playbooks will include attack descriptions, system impact, tools used for containment, resolution, and recommendations.

The project addresses the automation of playbooks managed by the academic CSIRT of the National Open University and Distance Learning (UNAD) using the GLPI tool.

keywords: Learning, database, knowledge, processes, response, computer attacks
license

Copyright (c) 2023 Publicaciones e Investigación

Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

When the Publicaciones e Investigaciones Journal receives an original study or article from its author(s), whether by email, postal service, or the platforms available for said purpose, know that it may be published in physical or electronic formats in national or international archives, databases, or SIRES. As such, Publications and Research authorizes the reproduction and citation of said material, provided that the description of information is carried out in conformity with bibliographic norms, and mention the corresponding names, authors, article, issue, and pages. Publications and Research, in advance, expresses that the information, concepts, and methods are the responsibility of the author(s). As such, the UNAD does not have any influence whatsoever over that expressed in the manuscript.

How to Cite

Quintero Tamayo, J. F. ., Nuñez Alvarez, Y. S. ., & Cuevas Nuñez, N. A. . (2023). Structuring of computer attacks through playbooks. Publicaciones E Investigación, 17(4). https://doi.org/10.22490/25394088.7498
Metrics
Archivos descargados
231
Jan 2024Jul 2024Jan 2025Jul 2025Jan 20269

PRIVACY STATEMENT: In accordance with the Personal Data Protection Law (Law 1581 of 2012), the names and email addresses managed by Publicaciones e Investigación will be used exclusively for the purposes stated by this journal and will not be made available for any other purpose or to any other individual. Manuscripts submitted to the publication are only accessible to the editorial team and external peer reviewers. 

Design and implemented by
Highlight links Change background Increase text size Hide images Expand text Increase spacing Restore