Characterization of Phishing Attacks and Techniques to Mitigate These Attacks: A Systematic Review of The Literature

In Computer Security, it does not matter whichSoftware or Hardware equipment is installed, becausealways the weakest link in this security chain, is the enduser. From this premise are used the different types ofSocial Engineering attacks, whose main objective isto obtain information almost directly...

Deskribapen osoa

Gorde:
Xehetasun bibliografikoak
Egile nagusia: Benavides , Eduardo (author)
Beste egile batzuk: Fuertes, Walter (author), Sanchez , Sandra (author), Nuñez-Agurto, Daniel (author)
Formatua: article
Hizkuntza:spa
Argitaratua: 2020
Gaiak:
Sarrera elektronikoa:https://revistas.uteq.edu.ec/index.php/cyt/article/view/357
Etiketak: Etiketa erantsi
Etiketarik gabe, Izan zaitez lehena erregistro honi etiketa jartzen!