<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>2007-7467</journal-id>
<journal-title><![CDATA[RIDE. Revista Iberoamericana para la Investigación y el Desarrollo Educativo]]></journal-title>
<abbrev-journal-title><![CDATA[RIDE. Rev. Iberoam. Investig. Desarro. Educ]]></abbrev-journal-title>
<issn>2007-7467</issn>
<publisher>
<publisher-name><![CDATA[Centro de Estudios e Investigaciones para el Desarrollo Docente A.C.]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S2007-74672025000200926</article-id>
<article-id pub-id-type="doi">10.23913/ride.v16i31.2516</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Ciberseguridad: Métodos de Defensa Ante Ataques de Infiltraciones]]></article-title>
<article-title xml:lang="en"><![CDATA[Cybersecurity: Defense Methods Against Infiltration Attacks]]></article-title>
<article-title xml:lang="pt"><![CDATA[Cibersegurança: Métodos de Defesa Contra Ataques de Infiltração]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Bernal Ontiveros]]></surname>
<given-names><![CDATA[Juan Manuel]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Palacios Reyes]]></surname>
<given-names><![CDATA[Marisela]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Zorrilla Briones]]></surname>
<given-names><![CDATA[Francisco]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Rosales Morales]]></surname>
<given-names><![CDATA[Noé Ramón]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Cervantes Cardenas]]></surname>
<given-names><![CDATA[Susan Alexandra]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Tecnológico Nacional de México Instituto Tecnológico de Ciudad Juárez ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>México</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Tecnológico Nacional de México Instituto Tecnológico de Ciudad Juárez ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>México</country>
</aff>
<aff id="Af3">
<institution><![CDATA[,Tecnológico Nacional de México Instituto Tecnológico de Ciudad Juárez ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>México</country>
</aff>
<aff id="Af4">
<institution><![CDATA[,Tecnológico Nacional de México Instituto Tecnológico de Ciudad Juárez ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>México</country>
</aff>
<aff id="Af5">
<institution><![CDATA[,Tecnológico Nacional de México Instituto Tecnológico de Ciudad Juárez ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>México</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>12</month>
<year>2025</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>12</month>
<year>2025</year>
</pub-date>
<volume>16</volume>
<numero>31</numero>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S2007-74672025000200926&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S2007-74672025000200926&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S2007-74672025000200926&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen Este estudio aborda la ciberseguridad frente a intrusiones, considerando la creciente digitalización y los riesgos asociados con la protección de información sensible en las organizaciones. Se plantea determinar qué métodos de defensa resultan más efectivos y cómo pueden adaptarse las organizaciones a tácticas emergentes de los ciberdelincuentes. Los objetivos incluyen identificar amenazas, evaluar las defensas actuales y proponer estrategias de mitigación para fortalecer la seguridad. La metodología contempla un estudio de caso en una organización, en el cual se evalúan vulnerabilidades mediante pruebas de penetración (penetration testing) y análisis de infraestructura. Se espera como resultado una disminución en el tiempo de detección de amenazas y una respuesta más eficaz mediante la implementación de tecnologías avanzadas, como la autenticación multifactorial y la segmentación de redes. La interpretación de estos hallazgos destaca la relevancia de una ciberseguridad robusta y adaptativa, capaz no solo de prevenir sino también de mitigar ataques. Las conclusiones indican que las amenazas cibernéticas evolucionan rápidamente, lo que hace imprescindible la adopción de defensas proactivas y el fortalecimiento de una cultura organizacional orientada a la seguridad. En consecuencia, este estudio resalta que una estrategia de ciberseguridad sólida es esencial para reducir los impactos financieros y salvaguardar los activos críticos de las empresas.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract This study addresses cybersecurity in the face of intrusion attacks, considering the increasing digitalization and the risks associated with protecting sensitive information within organizations. It aims to determine the most effective defense methods and explore how organizations can adapt to emerging tactics employed by cybercriminals. The objectives include identifying threats, evaluating current defense mechanisms, and proposing mitigation strategies to enhance security. The methodology involves a case study within an organization to identify vulnerabilities through penetration testing and infrastructure analysis. The expected results include shorter threat detection times and a more effective response enabled by advanced technologies such as multifactor authentication and network segmentation. These findings highlight the need for robust and adaptive cybersecurity that not only prevents but also mitigates attacks. The conclusions emphasize that cyber threats evolve rapidly, necessitating the implementation of proactive defense mechanisms and fostering a strong cybersecurity culture within organizations. Ultimately, this study underscores that a resilient cybersecurity strategy is crucial to minimizing financial losses and safeguarding critical corporate assets.]]></p></abstract>
<abstract abstract-type="short" xml:lang="pt"><p><![CDATA[Resumo Este estudo aborda a segurança cibernética contra intrusões, considerando a crescente digitalização e os riscos associados à proteção de informações sensíveis nas organizações. O objetivo é determinar quais métodos de defesa são mais eficazes e como as organizações podem se adaptar às táticas emergentes de cibercriminosos. Os objetivos incluem identificar ameaças, avaliar as defesas atuais e propor estratégias de mitigação para fortalecer a segurança. A metodologia inclui um estudo de caso em uma organização, no qual as vulnerabilidades são avaliadas por meio de testes de penetração e análise de infraestrutura. O resultado esperado é a redução do tempo de detecção de ameaças e uma resposta mais eficaz por meio da implementação de tecnologias avançadas, como autenticação multifator e segmentação de rede. A interpretação desses resultados destaca a importância de uma segurança cibernética robusta e adaptável, capaz não apenas de prevenir, mas também de mitigar ataques. As conclusões indicam que as ameaças cibernéticas estão evoluindo rapidamente, tornando essenciais a adoção de defesas proativas e o fortalecimento de uma cultura organizacional voltada para a segurança. Consequentemente, este estudo destaca que uma estratégia de segurança cibernética robusta é essencial para reduzir os impactos financeiros e proteger os ativos críticos do negócio.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[ataque cibernético]]></kwd>
<kwd lng="es"><![CDATA[vulnerabilidad]]></kwd>
<kwd lng="es"><![CDATA[intrusión]]></kwd>
<kwd lng="es"><![CDATA[ciberseguridad]]></kwd>
<kwd lng="es"><![CDATA[protección de datos]]></kwd>
<kwd lng="en"><![CDATA[cyber attack]]></kwd>
<kwd lng="en"><![CDATA[vulnerability]]></kwd>
<kwd lng="en"><![CDATA[intrusion]]></kwd>
<kwd lng="en"><![CDATA[cybersecurity]]></kwd>
<kwd lng="en"><![CDATA[data protection]]></kwd>
<kwd lng="pt"><![CDATA[ataque cibernético]]></kwd>
<kwd lng="pt"><![CDATA[vulnerabilidade]]></kwd>
<kwd lng="pt"><![CDATA[intrusão]]></kwd>
<kwd lng="pt"><![CDATA[segurança cibernética]]></kwd>
<kwd lng="pt"><![CDATA[proteção de dados]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Abrahams]]></surname>
<given-names><![CDATA[T. O.]]></given-names>
</name>
<name>
<surname><![CDATA[Farayola]]></surname>
<given-names><![CDATA[O. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Kaggwa]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Uwaoma]]></surname>
<given-names><![CDATA[P. U.]]></given-names>
</name>
<name>
<surname><![CDATA[Hassan]]></surname>
<given-names><![CDATA[A. O.]]></given-names>
</name>
<name>
<surname><![CDATA[Dawodu]]></surname>
<given-names><![CDATA[S. O.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cybersecurity awareness and education programs: A review of employee engagement and accountability]]></article-title>
<source><![CDATA[Computer Science &amp; IT Research Journal]]></source>
<year>2024</year>
<volume>5</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>100-19</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="book">
<collab>Ariel y Fundación Telefónica</collab>
<source><![CDATA[Ciberseguridad, la protección de la información en un mundo digital]]></source>
<year>2016</year>
<publisher-name><![CDATA[Editorial Ariel]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Asad]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Steltzer]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<source><![CDATA[Artificial Intelligence in Cyber Defense: Predicting and Preventing Cyber Threats]]></source>
<year>2025</year>
</nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Carroll]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Dunton]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Fokker]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Lancioni]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Munson]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Roccia]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Samani]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Sarukkai]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Sommer]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Woodward]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Amenazas móviles McAfee]]></article-title>
<source><![CDATA[Capital Software]]></source>
<year>2019</year>
</nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Corallo]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Lazoi]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Lezzi]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Luperto]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cybersecurity awareness in the context of the Industrial Internet of Things: A systematic literature review]]></article-title>
<source><![CDATA[Computers in Industry]]></source>
<year>2022</year>
<volume>137</volume>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Diogenes]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Ozkaya]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cybersecurity - Attack and Defense Strategies]]></source>
<year>2018</year>
<publisher-name><![CDATA[Packt Publishing Ltd]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Eassttom]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Network Defense and Countermeasures; Principles and practices]]></source>
<year>2018</year>
<publisher-name><![CDATA[Pearson]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Giménez]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
</person-group>
<source><![CDATA[Hacking y Ciberdelito]]></source>
<year>2011</year>
<publisher-name><![CDATA[Universitat Politécnica de Valencia]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gómez González]]></surname>
<given-names><![CDATA[I. C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Diseño de metodología para verificar la seguridad en aplicaciones web contra inyecciones SQL]]></source>
<year>2012</year>
<publisher-loc><![CDATA[Bogotá, Colombia ]]></publisher-loc>
<publisher-name><![CDATA[Universidad Militar Nueva Granada]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hotten]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Volkswagen: The scandal explained]]></article-title>
<source><![CDATA[BBC News]]></source>
<year>2015</year>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Herrero]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Estudio, despliegue y modificación de la Botnet Mirai]]></source>
<year>2022</year>
<publisher-name><![CDATA[Universidad de Alcalá Escuela Politécnica Superior]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="">
<collab>Keyed Systems LLC.</collab>
<source><![CDATA[Understanding the Consequences of Cyber Attacks on Infrastructure]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kiser]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
</person-group>
<source><![CDATA[Ciberseguridad: Una simple guía para principiantes sobre ciberseguridad, redes informáticas y cómo protegerse del hacking en forma de phishing, malware, ransomware e ingeniería social]]></source>
<year>2021</year>
<publisher-name><![CDATA[Editorial Primasta]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kissel]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Glossary of key information security terms (NIST IR 7298r2)]]></source>
<year>2013</year>
<publisher-name><![CDATA[National Institute of Standards and Technology]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Montero]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
</person-group>
<source><![CDATA[Técnicas de Penetration Testing]]></source>
<year>2005</year>
<publisher-loc><![CDATA[Buenos Aires Argentina ]]></publisher-loc>
<publisher-name><![CDATA[CYBSEC Security System]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="book">
<collab>National Cyber Security Authority</collab>
<source><![CDATA[Cyber Defense Methodology For An Organization]]></source>
<year>2017</year>
<publisher-name><![CDATA[NATIONAL CYBER SECURITY AUTHORITY]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<collab>Rapid7</collab>
<article-title xml:lang=""><![CDATA[Metasploit Framework]]></article-title>
<source><![CDATA[Computer software]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rashid]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Chivers]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Danezis]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Lupu]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Martin]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[The Cyber Security Body of Knowledge]]></source>
<year>2019</year>
<publisher-name><![CDATA[The National Cyber Security Centre]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sánchez]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<source><![CDATA[Seguridad Cibernética: Hackeo Ético y Programación defensiva]]></source>
<year>2018</year>
<publisher-name><![CDATA[Alfaomega Grupo Editor, S.A. de C.V.]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Scarfone]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Mell]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Guide to intrusion detection and prevention systems (IDPS)]]></source>
<year>2007</year>
<publisher-loc><![CDATA[National Institute of Standards and Technology ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="">
<collab>Tenable</collab>
<source><![CDATA[Nessus Vulnerability Scanner]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tori]]></surname>
<given-names><![CDATA[C. S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Hacking ético]]></source>
<year>2008</year>
<publisher-loc><![CDATA[Rosario, Argentina ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vañó-Chic]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Exploits]]></source>
<year>2014</year>
<publisher-name><![CDATA[Universitat Oberta de Catalunya. UOC]]></publisher-name>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
