Computer Security Risk Matrix for Computer Forensic Laboratories
Keywords:
Cyberattack, Cybersecurity, Risk mitigation, WebsiteAbstract
The objective of this work is to describe the process carried out for the identification, analysis and management of technological risks to which a Forensic Computing Laboratory (LIF) would be exposed, taking as reference the MAGERIT methodology (Methodology for Analysis and Risk Management of Information Systems). Based on the ISO/IEC 31000 standard, MAGERIT is presented as a very useful tool for studying risk in the technological infrastructure of any organization. The general guidelines of this methodology are followed and with the necessary adaptation for the case, the Technological Risk Matrix that must be considered for a LIF is shown as a result.
References
Ministerio de Administraciones Públicas, MAGERIT v3: Libro 1, Método, Madrid: Ministerio de Hacienda y Administraciones Públicas, 2012. [En línea]. Disponible: https://administracionelectronica.gob.es/pae_Home/dam/jcr:fb373672-f804-4d05-8567-2d44b3020387/2012_Magerit_v3_libro1_metodo_es_NIPO_630-12-171-8.pdf
M. Ambrústolo, A. Onaine y M. Migueles, Integración Sistemas de Gestión de la Calidad y Seguridad de la Información. Mar del Plata: Universidad Nacional de Mar del Plata, 2023.
M. Paez y D. Portilla, “La Metodología Magerit para la evaluación de riesgos de activos de información, caso Instituto Superior Tecnológico Nelson Torres: Evaluación de Riesgos,” Nexos Científicos, vol. 8, no. 1, pp. 1-11, 2024.
M. F. Molina-Miranda, “Análisis de riesgos de centro de datos basado en la herramienta pilar de Magerit,” Espirales Revista Multidisciplinaria de Investigación, vol. 1, no. 11, 2017.
A. H. Di Iorio et al., Guía técnica para el diseño, implementación y gestión de laboratorios de informática forense, 1a ed. Mar del Plata: Universidad FASTA, 2019. [En línea]. Disponible: https://info-lab.org.ar/images/pdf/LibroGuiaTcnica.pdf
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 InFo-Cyber. Journal of Cybersecurity and Digital Forensics

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
