The cybersecurity tree: a training proposal for citizens, institutions, and society
DOI:
https://doi.org/10.26439/interfases2025.n021.7986Keywords:
cybersecurity, cyberthreat, security, training, treeAbstract
The cybersecurity tree: a training proposal for citizens, institutions, and society in an increasingly interconnected world, cybersecurity has become a fundamental pillar for protecting critical information and ensuring the privacy of individuals, institutions, and society at large. The increase in cyberthreats, such as unauthorized access, malicious code injections, and attacks on critical systems, underscores the need for a comprehensive approach to digital security. This study is based on definitions and guidelines from the ISO/IEC 27032 cybersecurity standard, the ACM/IEEE CSEC2017 curriculum guide, and the IEEE-CS Enterprise IT Body of Knowledge (EITBOK). The “Cybersecurity Tree” model is proposed as a comprehensive training proposal aimed at strengthening information security competencies. The tree analogy provides a conceptual framework that distributes strategic tools across its components: foliage, trunk, and roots. The tree analogy provides a conceptual framework that distributes strategic tools across its components: foliage, trunk, and roots. This approach allows us to address the challenges of a constantly evolving cyber environment, optimizing processes for identifying, preventing, and mitigating cyberthreats, while simultaneously contributing to strengthening a resilient and secure digital society.
Downloads
References
Akamai. (2025). What is zero trust. https://www.akamai.com/glossary/what-is-zero-trust
Arreola García, A. (2019). Desafíos a las estrategias de ciberseguridad. Revista del Centro de Estudios Superiores Navales, 40(4), 25-53. https://cesnav.uninav.edu.mx/cesnav/revista_pdf/2019/2019-4.pdf
Ballestero, F. (2020). La ciberseguridad en tiempos difíciles. Información Comercial Española. Boletín Económico, (3122), 39-48. https://doi.org/10.32796/bice.2020.3122.6993
Cano, J. (2008). Cibercrimen y ciberterrorismo: dos amenazas emergentes. Information Systems Control Journal, 1-6. https://www.researchgate.net/publication/238781406_Cibercrimen_y_Ciberterrorismo_Dos_Amenazas_Emergentes.
Cano, J. (2011). Ciberseguridad y ciberdefensa: dos tendencias emergentes en un contexto global. Sistemas. Asociación Colombiana de Ingenieros de Sistemas, (119).
Cano M., J. J. (2020). Seguridad y ciberseguridad 2009-2019. Lecciones aprendidas y retos pendientes. Sistemas, (155), 81-94. https://doi.org/10.29236/sistemas.n155a6
Carrillo, J. J. M., Zambrano, N. A., Cantos, J. S. M., & Bravo, M. Z. (2019). Ciberseguridad y su aplicación en las instituciones de educación superior. Revista Ibérica de Sistemas e Tecnologias de Informação, E20, 438-448. https://www.proquest.com/docview/2318537201/fulltextPDF/85B311F112D34AA7PQ/1?accountid=45277
Clark, O., Reynolds, T. L., Ugwuabonyi, E. C., & Joshi, K. P. (2024). Exploring the impact of increased health information accessibility in cyberspace on trust and self-care practices. SaT-CPS 2024: Proceedings of the 2024 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (pp. 61-70). Association for Computing Machinery. https://doi.org/10.1145/3643650.3658611
De-Moragas, M. (Ed.). (2012). La comunicación: de los orígenes a internet. Gedisa.
Emedec, S. (2021, 30 de julio). La estructura del árbol. https://www.emedec.com/la-estructura-del-arbol/
Ganesan, R., Jajodia, S., Shah, A., & Cam, H. (2016). Dynamic scheduling of cybersecurity analysts for minimizing risk using reinforcement learning. ACM Transactions on Intelligent Systems and Technology (TIST), 8(1), 1-21. https://doi.org/10.1145/2882969
Garrison, J., & Nova, K. (2017). Cloud native infrastructure. Patterns for scalable infrastructure and applications in a dynamic environment. O’Reilly.
González, A., Idrobo, S., & Villamarín, A. (2020). Gestión de seguridad del activo intangible. Universidad Internacional SEK. https://www.academia.edu/43066543/Maestr%C3%ADa_en_Ciberseguridad
International Organization for Standarization. (2023). ISO/IEC 27032:2023. Cybersecurity—Guidelines for internet security (2.a ed.). https://www.iso.org/standard/76070.html
Joint Task Force on Cybersecurity Education. (2017). Cybersecurity Curricula 2017. Association for Computing Machinery; IEEE Computer Security; Association for Information Systems Special Interest Group on Information Security and Privacy; International Federation for Information Processeing Technical Committee on Information Security Education. https://doi.org/10.1145/3184594
Lewis, J. (2018). Economic impact of cybercrime—No slowing down. CSIS https://www.academia.edu/38817793/Economic_Impact_of_Cybercrime_No_Slowing_Down
Manuel, V., Gonçalves, B., & Carrapatoso, E. M. (2006). Rumo a uma web mais inteligente resumo. EduSer, 2(2), 201-227.
Mayle, C. (2018). Ciberseguridad CERTAL 2018. Academia. https://www.academia.edu/44956544/Ciberseguridad_CERTAL_2018
Mendoza, M. A. (2014). Seguridad en la nube para empresas: ¿qué son los CASB? We Live Security. https://www.welivesecurity.com/la-es/2014/09/24/seguridad-nube-empresas-que-son-casb/
Moraes, T. (2024). Ethical AI regulatory sandboxes: Insights from cyberspace regulation and internet governance. En TAS ’24: Proceedings of the Second International Symposium on Trustworthy Autonomous Systems (pp. 1-10). Association for Computing Machinery. https://doi.org/10.1145/3686038.3686049
Morales Suárez, A. C., Díaz Ávila, S. S., & Leguizamón Páez, M. Á. (2019). Mecanismos de seguridad en el internet de las cosas. Vínculos, 16(2), 288-297. https://doi.org/10.14483/2322939x.15758
Moreno González, J., Albornoz, M. M., & Maqueo Ramírez, M. S. (2019). Ciberseguridad: estado de la cuestión en América Latina. Revista de Administración Pública, 1(148), 23-46. https://revistas-colaboracion.juridicas.unam.mx/index.php/rev-administracion-publica/article/download/38396/35294
Okonkwo, I. E., & Udo, B. (2022). Utilising BIMI-VMC as a cybersecurity tool for brand protection. Academia Letters, Artículo 4690. https://doi.org/10.20935/al4690
Pinheiro, M. (2000). Redesignando a WWW o papel do design na democratização da World Wide Web. Pontifícia Universidade Católica do Rio de Janeiro.
PurpleSec. (2025). 2024 Cybersecurity Statistics. The Ultimate List Of Cybersecurity Stats Data, & Trends. https://purplesec.us/resources/cybersecurity-statistics/
Tim Berners-Lee. (2025, 12 de junio). En Wikipedia. https://es.wikipedia.org/wiki/Tim_Berners-Lee
Unesco. (2024). Marco de competencias para docentes em matéria de IA. https://unesdoc.unesco.org/ark:/48223/pf0000393813
Valencia-Arias, A., Bermeo Giraldo, M. C., Acevedo-Correa, Y., Garcés-Giraldo, L. F., Quiroz-Fabra, J., Benjumea-Arias, M. L., & Patiño-Vanegas, J. (2020). Tendencias investigativas en educación en ciberseguridad: un estudio bibliométrico. Revista Ibérica de Sistemas e Tecnologias de Informacąo, (E29), 225-239. https://www.researchgate.net/publication/341220536
Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. Computers & Security, 38, 97-102. https://doi.org/10.1016/j.cose.2013.04.004
What is the enterprise IT BOK? (2017, 22 de diciembre). En EITBOK. Guide to the Enterprise IT Body of Experience. http://eitbokwiki.org/What_is_the_Enterprise_IT_BOK%3F
Zhou, Y., Wang, Q., & Li, G. (2024). Intelligent talent information system guarantee based on cyberspace security technology. En ICCSIE ‘24: Proceedings of the 2024 9th International Conference on Cyber Security and Information Engineering (pp. 123-130). Association for Computing Machinery. https://doi.org/10.1145/3689236.3689867
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under an Attribution 4.0 International (CC BY 4.0) License. that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Last updated 03/05/21
