Return to Article Details Methodology for the implementation of the computer security suite for the management of cybersecurity