This book will allow to know the different theoretical references necessary to reach the design and construction of a cybersecurity framework, through the use of free software and emerging technologies. How was the selection of the different antecedents obtained, this was carried out through a search in different bibliographic sources in order to take up the most important and necessary to manage the different risks and threats that can be generated in any context.