51https://ccdcoe.org/library/publications/guide-to-developing-a-national-cybersecurity-strategy/
52https://ccdcoe.org/library/publications/national-cyber-security-strategy-guidelines/
53https://ccdcoe.org/library/publications/?focus_area=strategy
54https://www.lacnic.net/
55https://www.lacnic.net/lacnic33
56https://warp.lacnic.net/wp-content/themes/warpnew/docs/manual_basico_sp.pdf
57https://www.europol.europa.eu/about-europol/european-cybercrime-centre-ec3
58https://europa.eu/european-union/about-eu/agencies/eurojust_es
59ZERO-SUM GAME is a situation in which the gains or losses of one participant are exactly balanced with the losses or gains of the other participants.
60VPN (Virtual Private Network) is a technology that enables a secure extension of a private network over the Internet by establishing a virtual point-to-point connection
using dedicated connections,
encryption, or the combination of both methods.
61Paris Call for Trust and Security in Cyberspace (https://pariscall.international/en/)
62 SCEPVA: Sovereign Cyber Effects
Provided Voluntarily by Allies63https://www.iso.org/standard/73906.html
64https://www.nist.gov/topics/cybersecurity
65https://www.nist.gov/cyberframework
66https://www.nist.gov/itl/applied-cybersecurity/nice/about
67https://www.ccn-cert.cni.es/guias/indice-de-guias.html
68https://www.ccn.cni.es/index.php/es/ccn-cert-menu-es/soluciones-ccn-cert
69https://www.ccn.cni.es/index.php/es/menu-formacion-es
70https://www.ccn-cert.cni.es/soluciones-seguridad/ear-pilar.html
71https://www.ccn-cert.cni.es/soluciones-seguridad/ear-pilar/metodologia.html
72https://www.bsi.bund.de/EN/Publications/BSIStandards/BSIStandards_node.html
GUÍA DE
CIBERDEFENSAORIENTACIONES PARA EL DISEÑO, PLANEAMIENTO, IMPLANTACIÓN Y DESARROLLO
DE UNA CIBERDEFENSA MILITAR100