Construcción de directrices para el cumplimiento normativo en infraestructuras críticas de tecnologías de la información para instancias educativas autónomas

Main Article Content

Andrés Martínez López
https://orcid.org/0009-0002-9683-9697
Adriana Cruz García
https://orcid.org/0009-0004-1857-7761

Abstract

The growing demand for network services  has raised their importance because they support organizations key processes, which creates the need  for a reliable future perspective for the contracting and renewing internet services. This scenario, and the emergence of different models for data study and forecasting that allow the analysis of future behavior using information with time series data, has favored the implementation of strategies that deliver results in less time. Following the  model of continuous improvement and good practices in information technologies services, the Departamento de Monitoreo de la Red, known as NOC RedUNAM, proposed the analysis of behavior of the collected data regarding the bandwidth consumption of internet links that integrate RedUNAM, which exhibit time series characteristics. With the aim of obtaining reliable information about future expected internet service consumption, different analysis algorithms that consider the conditions that affect the demand of services in the Universidad Nacional Autónoma de México (schedules, extraordinary events, school periods, among others) were tested. Based on this need, the algorithm that best  accepted the influence of changes in data links daily behavior was selected. In the first analyses, the clarity of the data was considered (elimination of null data, traffic peaks considered anomalous, among others) and linear forecasts of future demand were generated. The results reflected a loss of information due to the filtering. Consequently, the analysis was focused on algorithms that gave major importance to the variables considered relevant for the demand of network links forecast, as well as the network operation general behavior.  For this exercise, simple regression models, integrated moving averages and other techniques were tested, concluding with the selection of an algorithm that offered a margin of reliability, allowing the forecast to be considered acceptable for the conditions of the collected network data.

Downloads

Download data is not yet available.

Article Details

How to Cite
Martínez López, A., & Cruz García, A. (2025). Construcción de directrices para el cumplimiento normativo en infraestructuras críticas de tecnologías de la información para instancias educativas autónomas. Cuadernos Técnicos Universitarios De La DGTIC, 3(4). https://doi.org/10.22201/dgtic.30618096e.2025.3.4.133
Section
Reportes técnicos
Author Biographies

Andrés Martínez López, Dirección General de Cómputo y de Tecnologías de Información y Comunicación, Universidad Nacional Autónoma de México

.

Adriana Cruz García, Dirección General de Cómputo y de Tecnologías de Información y Comunicación, Universidad Nacional Autónoma de México

Técnica Académica (Dirección General de Cómputo y de Tecnologías de Información y Comunicación)  

References

Angraini, R., Alias, R. A., & Okfalisa. (2019). Information security policy compliance: Systematic literature review. Procedia Computer Science, 161, 1216–1224. https://doi.org/10.1016/j.procs.2019.11.235 DOI: https://doi.org/10.1016/j.procs.2019.11.235

Bejarano, F., & Martín, J. L. (2021). La ciberseguridad no es un problema de TI, nunca lo fue. Harvard Deusto Management & Innovation, (39). https://www.harvard-deusto.com/la-ciberseguridad-no-es-un-problema-de-ti-nunca-lo-fue

Benavides, L. M. C., Tamayo Arias, J. A., Arango Serna, M. D., Branch Bedoya, J. W., & Burgos, D. (2020). Digital transformation in higher education institutions: A systematic literature review. Sensors, 20(11), 3291. https://doi.org/10.3390/s20113291 DOI: https://doi.org/10.3390/s20113291

Center for Internet Security. (2023). CIS Critical Security Controls Version 8.1. https://www.cisecurity.org/controls/v8-1csf.tools+2

Cordero Guzmán, D., & Bribiesca Correa, G. (2018). Model for information technology governance (GTI) in a university environment. Computación y Sistemas, 22(4), 1503–1518. https://doi.org/10.13053/cys-22-4-2797 DOI: https://doi.org/10.13053/cys-22-4-2797

CSRC Content Editor. (n.d.-c). Asset – Glossary. National Institute of Standards and Technology. https://csrc.nist.gov/glossary/term/asset

CSRC Content Editor. (n.d.-c). Defense-in-depth – Glossary. National Institute of Standards and Technology. https://csrc.nist.gov/glossary/term/defense_in_depth

Dirección General de Cómputo y de Tecnologías de Información y Comunicación. (2023). Directrices generales en torno a la seguridad de la información que obra en los sistemas informáticos de la UNAM. Universidad Nacional Autónoma de México. https://www.red-tic.unam.mx/directrices-seguridad-informacion

Dunsin, D. (2024). Evaluating cybersecurity frameworks for protecting consumer IoT devices from emerging phishing and ransomware threats. Journal of Cybersecurity and Privacy, 3(4), 327–350. https://doi.org/10.3390/jcp3040017

Franco Reboreda, C. (2024). Gobierno de las Tecnologías de Información. En J.L. Ponce-López, L.M. Castañeda-De León y H. Valles-Baca (Coords.), Estado actual de las tecnologías de la información y las comunicaciones en las instituciones de educación superior en México. Estudio 2024. México: Asociación Nacional de Universidades e Instituciones de Educación Superior.

International Organization for Standardization & International Electrotechnical Commission. (2013). ISO/IEC 27001:2013 – Information security, cybersecurity and privacy protection – Information security management systems – Requirements.

International Organization for Standardization & International Electrotechnical Commission. (2016). ISO/IEC 27004:2016 – Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluationls. https://www.iso.org/standard/64120.html

Jorm, A. (2025). Specifying “Experts” and “Consensus”. In: Expert Consensus in Science. Palgrave Macmillan, Singapore. https://doi.org/10.1007/978-981-97-9222-1_7 DOI: https://doi.org/10.1007/978-981-97-9222-1_7

Kure, H.I., Islam, S. & Mouratidis, H. (2022). An integrated cyber security risk management framework and risk predication for critical infrastructure protection. Neural Comput & Applic. 34 (15241). https://doi.org/10.1007/s00521-022-06959-2 DOI: https://doi.org/10.1007/s00521-022-06959-2

Melaku, H. M. (2023). A dynamic and adaptive cybersecurity governance framework. Journal of Cybersecurity and Privacy, 3(3), 327–350. https://doi.org/10.3390/jcp3030017 DOI: https://doi.org/10.3390/jcp3030017

National Institute of Standards and Technology. (2020). Security and Privacy Controls for Information Systems and Organizations (NIST Special Publication 800-53 Revision 5). https://doi.org/10.6028/NIST.SP.800-53r5 DOI: https://doi.org/10.6028/NIST.SP.800-53r5

National Institute of Standards and Technology. (2024). Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations (NIST Special Publication 800-171 Revision 3). https://csrc.nist.gov/pubs/sp/800/171/r3/final

National Institute of Standards and Technology. (2024). The NIST Cybersecurity Framework (CSF) 2.0 (NIST Cybersecurity White Paper No. 29). https://doi.org/10.6028/NIST.CSWP.29 DOI: https://doi.org/10.6028/NIST.CSWP.29

Subsecretaría de la Función Pública. (2011). Guía para emitir documentos normativos. Secretaría de la Función Pública. https://www.gob.mx/cms/uploads/attachment/file/914320/guia-emitir-documentos-normativos-sfp-07052024.pdf

Sullivan, G. (2022). Law, technology and data-driven security: Infra-legalities as method assemblage. Journal of Law and Society, 49(S1), 31–50. https://doi.org/10.1111/jols.12352 DOI: https://doi.org/10.1111/jols.12352

Taherdoost, H. (2022). Understanding cybersecurity frameworks and information security standards—A review and comprehensive overview. Electronics, 11(14), 2181. https://doi.org/10.3390/electronics11142181 DOI: https://doi.org/10.3390/electronics11142181

Zhong, X., Vatanasakdakul, S., & Aoun, C. (2012). It Governance In China: Cultral Fit And It Governance Capabilities. PACIS 2012 Proceedings. (55). https://aisel.aisnet.org/pacis2012/55