<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1900-6586</journal-id>
<journal-title><![CDATA[Revista Científica General José María Córdova]]></journal-title>
<abbrev-journal-title><![CDATA[Rev. Cient. Gen. José María Córdova]]></abbrev-journal-title>
<issn>1900-6586</issn>
<publisher>
<publisher-name><![CDATA[Escuela Militar de Cadetes "General José María Córdova"]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1900-65862021000100181</article-id>
<article-id pub-id-type="doi">10.21830/19006586.726</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Protocolo de informática forense ante ciberincidentes en telemedicina para preservar información como primera respuesta]]></article-title>
<article-title xml:lang="en"><![CDATA[Computer forensic protocol for preserving information as first response in telemedicine cyber incidents]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Tejo Machado]]></surname>
<given-names><![CDATA[Nadjila]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Rodrigues Martinez Basile]]></surname>
<given-names><![CDATA[Felipe]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Cezar Amate]]></surname>
<given-names><![CDATA[Flavio]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Ramírez López]]></surname>
<given-names><![CDATA[Leonardo Juan]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Instituto Federal de Educação  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Brasil</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Instituto Federal de Educação  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Brasil</country>
</aff>
<aff id="Af3">
<institution><![CDATA[,Instituto Federal de Educação  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Brasil</country>
</aff>
<aff id="Af4">
<institution><![CDATA[,Universidad Militar Nueva Granada  ]]></institution>
<addr-line><![CDATA[Bogotá D.C]]></addr-line>
<country>Colombia</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>03</month>
<year>2021</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>03</month>
<year>2021</year>
</pub-date>
<volume>19</volume>
<numero>33</numero>
<fpage>181</fpage>
<lpage>203</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_arttext&amp;pid=S1900-65862021000100181&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_abstract&amp;pid=S1900-65862021000100181&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_pdf&amp;pid=S1900-65862021000100181&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[RESUMEN. Este estudio presenta un protocolo de preservación de rastros y evidencias digitales ante ciberincidentes por medio de diferentes niveles de acceso de usuarios, con base en la informática forense. La aplicación de nuevas herramientas y sus funciones permite conservar información que puede esclarecer los tipos de ataques, la dinámica del delito, su materialidad y su autoría. Este es un protocolo que determina la primera respuesta digital, clasificada por niveles de urgencia, para apoyar la toma de decisiones manteniendo la cadena de custodia según el riesgo de volatilidad de los datos. Se concluye que este protocolo apoya el esclarecimiento de un ciberincidente y permite la correcta conservación de los datos, de manera que cada organización atacada pueda decidir qué datos debe priorizar en la identificación, el aislamiento y la protección de la información.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[ABSTRACT. This study presents a protocol for preserving digital traces and evidence in cyber incidents through different user access levels based on computer forensics. The implementation of new tools could preserve information that can help clarify the attack type and the crime's dynamics, its materiality, and authorship. This protocol determines the first digital response, classified by level of urgency, to support decision making while maintaining the chain of custody according to the risk of data volatility. It is concluded that this protocol helps clarify cyber incidents while respecting the correct preservation of data. Thus, each charged organization can decide which data should be prioritized in information identification, isolation, and protection.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[acceso a la información]]></kwd>
<kwd lng="es"><![CDATA[cibercrimen]]></kwd>
<kwd lng="es"><![CDATA[informática forense]]></kwd>
<kwd lng="es"><![CDATA[protección de datos]]></kwd>
<kwd lng="es"><![CDATA[telemedicina]]></kwd>
<kwd lng="en"><![CDATA[access to information]]></kwd>
<kwd lng="en"><![CDATA[computer forensics]]></kwd>
<kwd lng="en"><![CDATA[cybercrime]]></kwd>
<kwd lng="en"><![CDATA[data protection]]></kwd>
<kwd lng="en"><![CDATA[telemedicine]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Babulak]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Jin]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Kim]]></surname>
<given-names><![CDATA[Y. S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Future e-Health, QoS provision and cybersecurity challenges]]></article-title>
<source><![CDATA[Journal of the Institute of Industrial Applications Engineers]]></source>
<year>2014</year>
<volume>2</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>113-21</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Basile]]></surname>
<given-names><![CDATA[F. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Ramírez]]></surname>
<given-names><![CDATA[L. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Amate]]></surname>
<given-names><![CDATA[F. C]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Método para realizar copias de seguridad de imágenes médicas basado en tareas automatizadas]]></article-title>
<source><![CDATA[JINT. Journal of Industrial Neo-Technologies]]></source>
<year>2019</year>
<volume>6</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>26-33</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Basile]]></surname>
<given-names><![CDATA[F. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Thomé]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Amate]]></surname>
<given-names><![CDATA[F. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Rodrigues]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Bastos]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Goroso]]></surname>
<given-names><![CDATA[D. G]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Segurança de trans ferência de dados em Telessaúde e Telemedicina]]></article-title>
<source><![CDATA[Proteção à privacidade e acesso às informações em saúde: tecnologias, direitos e ética]]></source>
<year>2016</year>
<page-range>279-98</page-range><publisher-name><![CDATA[Instituto de Saúde]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bidgoli]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
</person-group>
<source><![CDATA[Handbook of information security: Key concepts, infrastructure, standards, and proto cols]]></source>
<year>2006</year>
<volume>2</volume>
<publisher-name><![CDATA[John Wiley &amp; Sons]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Britz]]></surname>
<given-names><![CDATA[M. T]]></given-names>
</name>
</person-group>
<source><![CDATA[Computer forensics and cyber crime: An introduction]]></source>
<year>2013</year>
<edition>3</edition>
<publisher-name><![CDATA[Pearson Education]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Carrier]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Spafford]]></surname>
<given-names><![CDATA[E. H]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An event-based digital forensic investigation framework]]></article-title>
<source><![CDATA[Proceedings of the Fourth Digital Forensics Research Workshop]]></source>
<year>2004</year>
<page-range>11-3</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="">
<collab>Center for Strategic and International Studies (CSIS)</collab>
<source><![CDATA[Economic impact of cybercrime - No slowing down]]></source>
<year>2018</year>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="">
<collab>Centro de Estudos, Resposta e Tratamento de Ciberincidentes de Segurança no Brasil (CERT)</collab>
<source><![CDATA[Estatísticas dos ciberincidentes reportados ao CERT.br]]></source>
<year>2020</year>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cichonski]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Millar]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Grance]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Scarfone]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
</person-group>
<source><![CDATA[Computer security incident handling guide]]></source>
<year>2012</year>
<page-range>800-61</page-range><publisher-name><![CDATA[NIST Special Publications]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Coventry]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Branley]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cybersecurity in healthcare: A narrative review of trends, threats and ways forward]]></article-title>
<source><![CDATA[Maturitas]]></source>
<year>2018</year>
<numero>113</numero>
<issue>113</issue>
<page-range>48-52</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="book">
<collab>Cybersecurity Ventures</collab>
<source><![CDATA[2017 Cybercrime Report]]></source>
<year>2017</year>
<publisher-name><![CDATA[Herjavec Group]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="">
<collab>Dfir it!</collab>
<source><![CDATA[Memory acquisition tools for Windows]]></source>
<year>2015</year>
<month>,</month>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Guimarães]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
</person-group>
<source><![CDATA[Os crimes dos hackers que interrompem até quimioterapia em sequestros virtuais de hospitais]]></source>
<year>2017</year>
<month>,</month>
<publisher-name><![CDATA[BBC Brasil]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jarrett]]></surname>
<given-names><![CDATA[M. P]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cybersecurity-A serious patient care concern]]></article-title>
<source><![CDATA[JAMA]]></source>
<year>2017</year>
<volume>318</volume>
<numero>14</numero>
<issue>14</issue>
<page-range>1319-20</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kent]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Chevalier]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Grance]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Dang]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
</person-group>
<source><![CDATA[Guide to integrating forensic techniques into inci dent response]]></source>
<year>2006</year>
<page-range>800-86</page-range><publisher-name><![CDATA[NIST Special Publications]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Machado]]></surname>
<given-names><![CDATA[N. T.]]></given-names>
</name>
<name>
<surname><![CDATA[Ramírez]]></surname>
<given-names><![CDATA[L. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Basile]]></surname>
<given-names><![CDATA[F. R. M]]></given-names>
</name>
</person-group>
<source><![CDATA[Forense computacional como estratégia para investigação em crimes cibernéticos]]></source>
<year>2019</year>
<conf-name><![CDATA[ 10Congresso de Inovação]]></conf-name>
<conf-loc>Sorocaba, Brasil </conf-loc>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mackway-Jones]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Marsden]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Windle]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA[Emergency triage: Manchester Triage Group]]></source>
<year>2014</year>
<edition>3</edition>
<publisher-name><![CDATA[John Wiley &amp; Sons]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Maldonado]]></surname>
<given-names><![CDATA[J. M. S. V.]]></given-names>
</name>
<name>
<surname><![CDATA[Marques]]></surname>
<given-names><![CDATA[A. B.]]></given-names>
</name>
<name>
<surname><![CDATA[Cruz]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Telemedicina: desafios à sua difusão no Brasil]]></article-title>
<source><![CDATA[Cadernos de Saúde Pública]]></source>
<year>2016</year>
<volume>32</volume>
<numero>2</numero>
<issue>2</issue>
</nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="">
<collab>National Institute of Standards and Technology (NIST)</collab>
<source><![CDATA[Searching for forensic tools and techniques by functionality]]></source>
<year>2019</year>
</nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="">
<collab>National Institute of Standards and Technology (NIST)</collab>
<source><![CDATA[Computer Forensics Tools &amp; Techniques Catalog]]></source>
<year>2020</year>
</nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="book">
<collab>Ponemon Institute</collab>
<source><![CDATA[The cost of cybercrime. Ninth annual cost of cybercrime study]]></source>
<year>2019</year>
<publisher-name><![CDATA[Accenture]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Queiroz]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Vargas]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<source><![CDATA[Investigação e perícia forense computacional: certificações, leis proces suais e estudos de caso]]></source>
<year>2010</year>
<publisher-name><![CDATA[Brasport]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="">
<collab>Network Working Group (NTWG)</collab>
<source><![CDATA[Site security handbook]]></source>
<year>1997</year>
<month>,</month>
</nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Santana]]></surname>
<given-names><![CDATA[K. G.]]></given-names>
</name>
<name>
<surname><![CDATA[Oliveira]]></surname>
<given-names><![CDATA[P. R. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Ramos]]></surname>
<given-names><![CDATA[D. R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Perícia cibernética: a evolução do trabalho científi co pericial informatizado ante aos desafios tecnológicos de ataques virtuais nos sistemas de segurança]]></article-title>
<source><![CDATA[Revista Dat@venia]]></source>
<year>2017</year>
<volume>9</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>101-11</page-range></nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="">
<collab>Scientific Working Group on Digital Evidence (SWGDE)</collab>
<source><![CDATA[SWGDE best practices for mobile device evidence collection &amp; preservation, handling, and acquisition (version 1.2)]]></source>
<year>2020</year>
</nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="">
<collab>Scientific Working Group on Digital Evidence (SWGDE)</collab>
<source><![CDATA[SWGDE capture of live systems (version 2.0)]]></source>
<year>2014</year>
</nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vallim]]></surname>
<given-names><![CDATA[A. P]]></given-names>
</name>
</person-group>
<source><![CDATA[Forense computacional e criptografia]]></source>
<year>2017</year>
<publisher-name><![CDATA[Senac São Paulo]]></publisher-name>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
