<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1405-5546</journal-id>
<journal-title><![CDATA[Computación y Sistemas]]></journal-title>
<abbrev-journal-title><![CDATA[Comp. y Sist.]]></abbrev-journal-title>
<issn>1405-5546</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Investigación en Computación]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1405-55462022000301201</article-id>
<article-id pub-id-type="doi">10.13053/cys-26-3-3925</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Cybersecurity and Internet of Things. Outlook for this Decade]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Márquez Díaz]]></surname>
<given-names><![CDATA[Jairo Eduardo]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad de Cundinamarca  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Colombia</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>09</month>
<year>2022</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>09</month>
<year>2022</year>
</pub-date>
<volume>26</volume>
<numero>3</numero>
<fpage>1201</fpage>
<lpage>1214</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1405-55462022000301201&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1405-55462022000301201&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1405-55462022000301201&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract: The Internet of Things is one of the technologies with the greatest incursion and expansion in the services market, making it attractive to cyberattacks due to its various vulnerabilities, both in its protocols and in its implementation. This brings with its aspects that the industry and users must take into account to minimize the risk of suffering various types of attacks, compromising sensitive information in the process. In this sense, a study on the advantages and disadvantages of the IoT is shown, focusing on the protection of information based on its present flaws, which will eventually have to be taken into account for future developments that involve data management and administration through devices. smart. The methodology used is based on theoretical and quasi-experimental research represented in the skills and experience in ethical hacking applied to the corporate environment. In this way, the most representative flaws in terms of cybersecurity related to the IoT are exposed, so that they are attended by companies and personnel responsible for their security.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Advanced persistent threats]]></kwd>
<kwd lng="en"><![CDATA[botnet]]></kwd>
<kwd lng="en"><![CDATA[cyberattacks]]></kwd>
<kwd lng="en"><![CDATA[distributed denial of services]]></kwd>
<kwd lng="en"><![CDATA[ransomware]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Márquez]]></surname>
<given-names><![CDATA[D. J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Riesgos y vulnerabilidades de la denegación de servicio distribuidos en internet de las cosas]]></article-title>
<source><![CDATA[Revista de Bioética y Derecho]]></source>
<year>2019</year>
<numero>46</numero>
<issue>46</issue>
<page-range>85-100</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lin]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Lin]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Cohn]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Gan]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Han]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[MCUNet: Tiny deep learning on IoT devices]]></source>
<year>2020</year>
<conf-name><![CDATA[ Advances in Neural Information Processing Systems 33 NeurIPS´20]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Harth]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Anagnostopoulos]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Pezaros]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Predictive intelligence to the edge: Impact on edge analytics]]></article-title>
<source><![CDATA[Evolving Systems]]></source>
<year>2018</year>
<volume>9</volume>
<page-range>95-118</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mekki]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Bajic]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Chaxel]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Meyer]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<source><![CDATA[A comparative study of LPWAN technologies for large-scale IoT deployment]]></source>
<year>2018</year>
<publisher-name><![CDATA[ICT Express]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ackerman]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[System brings deep learning to &#8220;internet of things&#8221; devices]]></source>
<year>2020</year>
<publisher-name><![CDATA[MIT News on campus and around the Word]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Acharya]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Tiwari]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Survey of DDoS attacks based on TCP/IP protocol vulnerabilities]]></article-title>
<source><![CDATA[IOSR Journal of Computer Engineering]]></source>
<year>2016</year>
<volume>18</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>68-76</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sistu]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Ozcelebi]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Dijk]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Zotti]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<source><![CDATA[Performance evaluation of thread protocol based wireless mesh networks for lighting systems]]></source>
<year>2019</year>
<conf-name><![CDATA[ International Symposium on Networks, Computers and Communications (ISNCC)]]></conf-name>
<conf-loc>Istanbul, Turkey </conf-loc>
<page-range>1-8</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Márquez]]></surname>
<given-names><![CDATA[D. J. E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Armas cibernéticas. inteligencia artificial para el desarrollo de virus informáticos letales]]></article-title>
<source><![CDATA[Revista Ing.USBMed]]></source>
<year>2017</year>
<volume>8</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>48-57</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="">
<collab>CSIS</collab>
<source><![CDATA[]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Luoung]]></surname>
<given-names><![CDATA[H. T.]]></given-names>
</name>
<name>
<surname><![CDATA[Phan]]></surname>
<given-names><![CDATA[H. D.]]></given-names>
</name>
<name>
<surname><![CDATA[Chu]]></surname>
<given-names><![CDATA[D. V.]]></given-names>
</name>
<name>
<surname><![CDATA[Nguyen]]></surname>
<given-names><![CDATA[V. Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Le]]></surname>
<given-names><![CDATA[K. T.]]></given-names>
</name>
<name>
<surname><![CDATA[Hoang]]></surname>
<given-names><![CDATA[T. L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Understanding Cybercrimes in Vietnam: from leading-point provisions to legislative system and law enforcement]]></article-title>
<source><![CDATA[International Journal of Cyber Criminology]]></source>
<year>2019</year>
<volume>13</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>290-308</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Baezner]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Hotspot analysis: use of cybertools in regional tensions in Southeast Asia]]></source>
<year>2018</year>
<numero>27</numero>
<issue>27</issue>
<publisher-loc><![CDATA[Zurich ]]></publisher-loc>
<publisher-name><![CDATA[Center for Security Studies]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bullee]]></surname>
<given-names><![CDATA[J. W.]]></given-names>
</name>
<name>
<surname><![CDATA[Montoya]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Junger]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Hartel]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Spear phishing in organisations explained]]></article-title>
<source><![CDATA[Information and Computer Security]]></source>
<year>2017</year>
<volume>25</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>593-613</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ortiz]]></surname>
<given-names><![CDATA[C. N. J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Normativa Legal sobre Delitos Informáticos en Ecuador]]></article-title>
<source><![CDATA[Revista Científica Hallazgos21]]></source>
<year>2019</year>
<volume>4</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>100-11</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Márquez]]></surname>
<given-names><![CDATA[D. J. E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Bioethics in Medicine and Society]]></article-title>
<source><![CDATA[Internet of things and distributed denial of service as risk factors in information security]]></source>
<year>2020</year>
</nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="">
<collab>Associated Press</collab>
<source><![CDATA[Suspected Russian hack fuels New US action on cybersecurity]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sanger]]></surname>
<given-names><![CDATA[D. E.]]></given-names>
</name>
<name>
<surname><![CDATA[Perlroth]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<source><![CDATA[U.S. to accuse China of trying to hack vaccine data, as virus redirects cyberattacks]]></source>
<year>2020</year>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Connolly]]></surname>
<given-names><![CDATA[Y. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Wall]]></surname>
<given-names><![CDATA[D. S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The rise of crypto-ransomware in a changing cybercrime landscape: Taxonomising countermeasures]]></article-title>
<source><![CDATA[Computers &amp; Security]]></source>
<year>2019</year>
<volume>87</volume>
<page-range>101568</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Maurya]]></surname>
<given-names><![CDATA[A. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Kumar]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Agrawal]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Khan]]></surname>
<given-names><![CDATA[R. A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Ransomware: Evolution, Target and Safety Measures]]></article-title>
<source><![CDATA[International Journal of Computer Sciences and Engineering]]></source>
<year>2018</year>
<volume>6</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>80-5</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Brewer]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Ransomware attacks: detection, prevention and cure]]></article-title>
<source><![CDATA[Network Security]]></source>
<year>2016</year>
<volume>2016</volume>
<numero>9</numero>
<issue>9</issue>
<page-range>5-9</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Harkins]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Freed]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Ransomware Assault on the Healthcare Sector]]></article-title>
<source><![CDATA[Journal of Law &amp; Cyber Warfare]]></source>
<year>2018</year>
<volume>6</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>148-64</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Collier]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[NHS ransomware attack spreads worldwide]]></article-title>
<source><![CDATA[CMAJ: Canadian Medical Association journal (journal de l'Association medicale canadienne)]]></source>
<year>2017</year>
<volume>189</volume>
<numero>22</numero>
<issue>22</issue>
<page-range>E786-7</page-range></nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Branch]]></surname>
<given-names><![CDATA[L.E.]]></given-names>
</name>
<name>
<surname><![CDATA[Eller]]></surname>
<given-names><![CDATA[W.S.]]></given-names>
</name>
<name>
<surname><![CDATA[Bias]]></surname>
<given-names><![CDATA[T.K.]]></given-names>
</name>
<name>
<surname><![CDATA[McCawley]]></surname>
<given-names><![CDATA[M.A.]]></given-names>
</name>
<name>
<surname><![CDATA[Myers]]></surname>
<given-names><![CDATA[D.J.]]></given-names>
</name>
<name>
<surname><![CDATA[Gerber]]></surname>
<given-names><![CDATA[B.J.]]></given-names>
</name>
<name>
<surname><![CDATA[Bassler]]></surname>
<given-names><![CDATA[J.R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Trends in Malware Attacks against United States Healthcare Organizations, 2016-2017]]></article-title>
<source><![CDATA[Global Biosecurity]]></source>
<year>2019</year>
<volume>1</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>15-27</page-range></nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Argaw]]></surname>
<given-names><![CDATA[S. T.]]></given-names>
</name>
<name>
<surname><![CDATA[Troncoso-Pastoriza]]></surname>
<given-names><![CDATA[J. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Lacey]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Florin]]></surname>
<given-names><![CDATA[M.-V.]]></given-names>
</name>
<name>
<surname><![CDATA[Calcavecchia]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Anderson]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Flahault]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cybersecurity of hospitals: Discussing the challenges and working towards mitigating the risks]]></article-title>
<source><![CDATA[BMC Medical Informatics and Decision Making]]></source>
<year>2020</year>
<volume>20</volume>
<numero>1</numero>
<issue>1</issue>
</nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yeo]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Vander Ende]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber evolution]]></article-title>
<source><![CDATA[Route to Strengthening Resilience in Asia-Pacific]]></source>
<year>2017</year>
<publisher-name><![CDATA[FireEye]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="book">
<collab>European Commission</collab>
<source><![CDATA[Cybersecurity. Our digital anchor a European perspective]]></source>
<year>2020</year>
<publisher-name><![CDATA[Publications Office of the European Union]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Johnson]]></surname>
<given-names><![CDATA[D. B.]]></given-names>
</name>
</person-group>
<source><![CDATA[New ransomware campaign exploits weak MySQL credentials to lock thousands of databases]]></source>
<year>2020</year>
</nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Unterfingher]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
</person-group>
<source><![CDATA[Ryuk ransomware &#8211; untangling a convoluted malware narrative]]></source>
<year>2020</year>
</nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gittins]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Soltys]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Malware persistence mechanisms]]></article-title>
<source><![CDATA[Procedia Computer Science]]></source>
<year>2020</year>
<volume>176</volume>
<page-range>88-97</page-range></nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Astudillo]]></surname>
<given-names><![CDATA[B. K.]]></given-names>
</name>
</person-group>
<source><![CDATA[Hacking ético]]></source>
<year>2019</year>
<edition>Tercera</edition>
<publisher-name><![CDATA[Ed. Ra-ma]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="journal">
<collab>Anonymous news</collab>
<article-title xml:lang=""><![CDATA[Massive new botnet discovered]]></article-title>
<source><![CDATA[Computer Fraud &amp; Security]]></source>
<year>2020</year>
<volume>2020</volume>
<numero>9</numero>
<issue>9</issue>
<page-range>3</page-range></nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Baena]]></surname>
<given-names><![CDATA[G. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Mendoza]]></surname>
<given-names><![CDATA[M. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Joel]]></surname>
<given-names><![CDATA[C. E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Importancia de la norma ISO/EIC 27000 en la implementación de un sistema de gestión de la seguridad de la información]]></article-title>
<source><![CDATA[Revista contribuciones a la Economía]]></source>
<year>2019</year>
<page-range>1-13</page-range></nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="">
<collab>MinTIC</collab>
<source><![CDATA[Guía para la Implementación de Seguridad de la Información en una MIPYME (Norma No. 1.2)]]></source>
<year>2016</year>
</nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="book">
<collab>IBM Security</collab>
<source><![CDATA[Informe sobre el coste de una brecha de datos]]></source>
<year>2020</year>
<publisher-loc><![CDATA[Madrid, España ]]></publisher-loc>
<publisher-name><![CDATA[IBM, España, SA]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="book">
<collab>International Labour Organization</collab>
<source><![CDATA[An employers&#8217; guide on working from home in response to the outbreak of COVID-19]]></source>
<year>2020</year>
<publisher-loc><![CDATA[Geneva ]]></publisher-loc>
<publisher-name><![CDATA[International Labour Office]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Clifford]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Quilty]]></surname>
<given-names><![CDATA[B. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Russell]]></surname>
<given-names><![CDATA[T. W.]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
<name>
<surname><![CDATA[Desmond-Chan]]></surname>
<given-names><![CDATA[Y. W.]]></given-names>
</name>
<name>
<surname><![CDATA[Pearson]]></surname>
<given-names><![CDATA[C. A. B.]]></given-names>
</name>
<name>
<surname><![CDATA[Eggo]]></surname>
<given-names><![CDATA[R. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Endo]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Flasche]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Edmunds]]></surname>
<given-names><![CDATA[W. J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Estrategias para reducir el riesgo de reintroducción del SARS-CoV-2 de viajeros internacionales]]></article-title>
<source><![CDATA[MedRxiv´20]]></source>
<year>2020</year>
</nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="book">
<collab>ETSI</collab>
<source><![CDATA[CYBER; cyber security for consumer internet of things: baseline requirements]]></source>
<year>2020</year>
<publisher-name><![CDATA[European Standard]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Luo]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Fei]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Ding]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Closas]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Comprehensive side-channel power analysis of XTS-AES]]></article-title>
<source><![CDATA[IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems]]></source>
<year>2019</year>
<volume>38</volume>
<numero>12</numero>
<issue>12</issue>
<page-range>2191-200</page-range></nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhao]]></surname>
<given-names><![CDATA[E. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Geng]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Homomorphic encryption technology for cloud computing]]></article-title>
<source><![CDATA[Procedia Computer Science]]></source>
<year>2019</year>
<volume>154</volume>
<page-range>73-83</page-range></nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="book">
<collab>FIPS 140-3</collab>
<source><![CDATA[Federal information processing standards publication (Supersedes FIPS PUB 140-2). Security requirements for cryptographic modules]]></source>
<year>2019</year>
<publisher-loc><![CDATA[Gaithersburg ]]></publisher-loc>
<publisher-name><![CDATA[Information Technology Laboratory National Institute of Standards and Technology]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Turjman]]></surname>
<given-names><![CDATA[F. A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Artificial intelligence in IoT. Transactions on Computational Science and Computational Intelligence]]></source>
<year>2019</year>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
