Conference Agenda
Overview and details of the sessions of this conference. Please select a date or location to show only sessions at that day or location. Please select a single session for detailed view (with abstracts and downloads if available).
Please note that all times are shown in the time zone of the conference. The current conference time is: 1st June 2025, 05:08:12am CST
|
Session Overview |
Session | ||
31C
Session Topics: Virtual
| ||
Presentations | ||
7:00am - 7:08am
Cloud Services and Versatility in Industrial Companies: A Systematic Literature Review 1Universidad Tecnológica del Perú UTP - (PE), Perú; 2Universidad Tecnológica del Perú UTP - (PE), Perú; 3Universidad Tecnológica del Perú UTP - (PE), Perú In the last decade, cloud services have become an essential tool for the transformation of industrial companies, standing out for their scalability, flexibility, and sustainability. This study aims to analyze how these technologies enhance versatility in companies currently facing challenges related to cybersecurity while contributing to sustainability in industrial processes. The PIOC and PRISMA methodologies were employed, selecting 31 relevant articles from databases such as Scopus and IEEE as part of a systematic literature review. The results revealed that cloud services enable industrial companies to adjust their resources in real-time, improving operational efficiency by 30-40% and reducing costs by up to 25% compared to traditional methods. However, significant risks were identified, including insufficient authentication and misconfigurations, which account for 60% of security incidents. Proposed strategies such as advanced firewalls, intrusion detection systems, and cybersecurity training have shown to reduce these risks by 50%, furthermore, virtualization and intelligent resource management have demonstrated a 20-30% reduction in energy consumption, minimizing the carbon footprint and promoting sustainable practices. Companies adopting green technologies in data centers achieve compliance with environmental regulations in over 90% of cases. In conclusión cloud services provide significant value to industrial companies but require comprehensive strategies to balance security, sustainability, and operational versatility. Additionally, exploring emerging technologies, such as artificial intelligence and blockchain, is recommended to optimize risk management and maximize the benefits of cloud services' versatility in industrial environments. 7:08am - 7:16am
DetectEP: A Vulnerability Monitoring and Detection Tool Using Wazuh in a Military Institution 1Instituto Científico y Tecnológico del Ejército - (PE), Perú; 2Universidad Privada del Norte - (PE) Currently, information security is essential for organizations across all sectors, particularly for military institutions, which handle sensitive data and operate in high-security environments. Cyberattacks, such as unauthorized access and data manipulation, are rapidly evolving in complexity, significantly increasing the risks faced, both personally and organizationally. Vulnerabilities in technological infrastructures, caused by software failures, misconfigurations, or weaknesses in security protocols, create openings for attackers, jeopardizing the integrity of systems. This article proposes a security monitoring tool designed to detect and manage vulnerabilities in real-time, using the Wazuh tool. A methodology was implemented, including the installation and configuration of Wazuh in the institution's technological infrastructure, followed by continuous monitoring. The results showed that, through monitoring, 115,311 events were detected in total, of which 37 were identified as authentication failures. Additionally, 135 vulnerabilities were detected, ranging from critical to medium levels. Wazuh demonstrated accuracy in monitoring and vulnerability detection, allowing for the timely implementation of corrective measures and strengthening system security. 7:16am - 7:24am
SentinelJC: An Open-Source Tool for Cyber Incident Management in a Military Institution 1Instituto Científico y Tecnológico del Ejército - (PE), Perú; 2Universidad Privada del Norte - (PE) Currently, organizations manage complex IT infrastructures characterized by a large number of interconnected devices. While interconnectivity provides operational advantages, it also complicates the control and detection of cyberattacks, increasing the likelihood of cybersecurity incidents. Such incidents can damage strategic objectives, cause financial losses, affect reputation, and steal confidential information. In a military institution, it is crucial to protect sensitive assets that may be targets for breaches of national security. These assets include not only strategic facilities but also classified information, advanced technological systems, and critical operational capabilities. In this context, this article presents SentinelJC, an open-source cybersecurity incident management tool that enables the Joint Command of the Armed Forces of Peru (CCFFAA) to manage events, incidents, and vulnerabilities based on the NIST framework with four key functions: prevention, detection, response, and recovery. Tools such as Security Onion and Wazuh are used for proactive threat detection, while iTop is employed for incident tracking and documented management. During a seven-day trial conducted to validate the tool, early detection of incidents and threats was achieved, allowing for optimized infrastructure security. This approach significantly contributed to reducing the risk of attacks and enhancing the response capability to cybersecurity incidents. 7:24am - 7:32am
OSINTEP: A Tool for Cyber Defense in the Peruvian Army 1Instituto Científico y Tecnológico del Ejército - (PE), Perú; 2Universidad Privada del Norte - (PE) Open-Source Intelligence (OSINT) plays a crucial role in cybersecurity by enabling the collection and analysis of publicly available information to detect emerging threats. The Peruvian Army (EP) faces a significant challenge in relying on commercial tools that are not fully adapted to its specific operational needs, limiting their effectiveness in addressing the ever-evolving cyber threats. To bridge this gap, this paper proposes the development of OSINT EP, a customized solution designed specifically to enhance the EP's response capabilities to cybersecurity challenges. The OSINT EP tool integrates several APIs, such as X API, IPinfo.io, NewsAPI, and LookupClient, to perform real-time data analysis and detect threats from various sources. The OSINT EP tool enabled the identification of cyber threats through multiple APIs. The X API revealed an increase in mentions regarding vulnerabilities on social media, suggesting a greater public interest. The IP analysis with IPinfo.io detected an address linked to a known attack in Peru, recommending its blocking. NewsAPI identified incidents of cyberattacks on critical infrastructures, which led to alerts being issued to the authorities. Finally, the DNS analysis with LookupClient verified the security of an email server, recommending periodic security audits. 7:32am - 7:40am
GOOD CYBERSECURITY PRACTICES AGAINST CYBER ATTACKS ON IOT DEVICES OF RETAIL COMPANIES: LITERATURE REVIEW 1Universidad Tecnológica del Perú UTP - (PE), Perú; 2Universidad Tecnológica del Perú UTP - (PE), Perú; 3Universidad Tecnológica del Perú UTP - (PE), Perú; 4Universidad Tecnológica del Perú UTP - (PE), Perú The growing use of IoT devices in companies has 7:40am - 7:48am
Assessing Cadet Cybersecurity: Simulated Rogue Access Point Attacks at Peruvian Air Force Academy 1Pontificia Universidad Católica del Perú - (PE); 2Universidad Norbert Wiener - (PE); 3Escuela de Oficiales de la Fuerza Aérea del Perú - EOFAP - (PE); 4Universidad San Martín de Porras - (PE) Abstract —This study explores the deployment of Rogue Access Points (Rogue APs) with realistic attack templates to assess cybersecurity vulnerabilities among cadets at the Peruvian Air Force Academy. Given the growing threat that Rogue APs pose to military networks, the research underscores the need to strengthen cadets' cybersecurity training. A structured methodology was employed to design and implement realistic attack scenarios that replicate potential weaknesses in wireless networks. Through penetration testing exercises, the study evaluates cadets' ability to detect, respond to, and mitigate these threats. The findings suggest that incorporating Rogue APs into training programs significantly improves cadets' situational awareness and reaction times, equipping them with essential skills for real-world cyber defense. |
Contact and Legal Notice · Contact Address: Privacy Statement · Conference: LACCEI 2025 |
Conference Software: ConfTool Pro 2.8.106+TC © 2001–2025 by Dr. H. Weinreich, Hamburg, Germany |