Characterization of Phishing Attacks and Techniques to Mitigate These Attacks: A Systematic Review of The Literature
In Computer Security, it does not matter whichSoftware or Hardware equipment is installed, becausealways the weakest link in this security chain, is the enduser. From this premise are used the different types ofSocial Engineering attacks, whose main objective isto obtain information almost directly...
Gorde:
| Egile nagusia: | |
|---|---|
| Beste egile batzuk: | , , |
| Formatua: | article |
| Hizkuntza: | spa |
| Argitaratua: |
2020
|
| Gaiak: | |
| Sarrera elektronikoa: | https://revistas.uteq.edu.ec/index.php/cyt/article/view/357 |
| Etiketak: |
Etiketa erantsi
Etiketarik gabe, Izan zaitez lehena erregistro honi etiketa jartzen!
|