TY - JOUR
T1 - Comparative study of computer security methodologies for countering cyber attacks
AU - Falcón, Francisco Manuel Hilario
AU - Arévalo, Milner David Liendo
AU - Atuncar, Giancarlo Sanchez
AU - Sanchez, Ivan Crispin
N1 - Publisher Copyright:
© 2024 Author(s).
PY - 2024/3/22
Y1 - 2024/3/22
N2 - Nowadays, computer security ensures the absence of risks in any of the elements of a system such as hardware, software, computer-human resources, networks, users, data, and procedures, interrupting that any user or personnel without authorization can have access to the information contained in the system and avoiding modifying, damaging, altering, eliminating and/or giving it any treatment that is not authorized. That is why large organizations or IT researchers developed methodologies ((a) ISSAF Methodology, (b) OSSTMM Methodology, and (c) OWASP Methodology) that were implemented in different organizational environments and were effective in countering anomalies and cyber attacks. Therefore, the objective of the present research is the comparison of computer security methodologies to counter cyber attacks with the following criteria: Year of inception, Country of development, definition, characteristics, method, phases, benefits. These criteria were fundamental to compare the information of each development methodology presented to evaluate their functions and classify which one is more efficient to avoid some anomalies in an entity. As a recommendation, it is proposed to continue developing this research in different variables of evaluation based on the methodologies of computer security that help to encourage students to develop scientific articles based on computer security, information security, and mong others.
AB - Nowadays, computer security ensures the absence of risks in any of the elements of a system such as hardware, software, computer-human resources, networks, users, data, and procedures, interrupting that any user or personnel without authorization can have access to the information contained in the system and avoiding modifying, damaging, altering, eliminating and/or giving it any treatment that is not authorized. That is why large organizations or IT researchers developed methodologies ((a) ISSAF Methodology, (b) OSSTMM Methodology, and (c) OWASP Methodology) that were implemented in different organizational environments and were effective in countering anomalies and cyber attacks. Therefore, the objective of the present research is the comparison of computer security methodologies to counter cyber attacks with the following criteria: Year of inception, Country of development, definition, characteristics, method, phases, benefits. These criteria were fundamental to compare the information of each development methodology presented to evaluate their functions and classify which one is more efficient to avoid some anomalies in an entity. As a recommendation, it is proposed to continue developing this research in different variables of evaluation based on the methodologies of computer security that help to encourage students to develop scientific articles based on computer security, information security, and mong others.
KW - ISSAF
KW - OSSTMM
KW - OWASP
KW - computer auditing
KW - computer security
UR - https://www.scopus.com/pages/publications/85189311369
U2 - 10.1063/5.0177434
DO - 10.1063/5.0177434
M3 - Conference article
AN - SCOPUS:85189311369
SN - 0094-243X
VL - 2816
JO - AIP Conference Proceedings
JF - AIP Conference Proceedings
IS - 1
M1 - 150001
T2 - 2021 International Conference on Advance Computing and Ingenious Technology in Engineering Science, ICACITES 2021
Y2 - 30 December 2021 through 31 December 2021
ER -