Characterization of Phishing Attacks and Techniques to Mitigate These Attacks: A Systematic Review of The Literature

In Computer Security, it does not matter whichSoftware or Hardware equipment is installed, becausealways the weakest link in this security chain, is the enduser. From this premise are used the different types ofSocial Engineering attacks, whose main objective isto obtain information almost directly...

Descripció completa

Guardat en:
Dades bibliogràfiques
Autor principal: Benavides , Eduardo (author)
Altres autors: Fuertes, Walter (author), Sanchez , Sandra (author), Nuñez-Agurto, Daniel (author)
Format: article
Idioma:spa
Publicat: 2020
Matèries:
Accés en línia:https://revistas.uteq.edu.ec/index.php/cyt/article/view/357
Etiquetes: Afegir etiqueta
Sense etiquetes, Sigues el primer a etiquetar aquest registre!