Characterization of Phishing Attacks and Techniques to Mitigate These Attacks: A Systematic Review of The Literature

In Computer Security, it does not matter whichSoftware or Hardware equipment is installed, becausealways the weakest link in this security chain, is the enduser. From this premise are used the different types ofSocial Engineering attacks, whose main objective isto obtain information almost directly...

Full description

Saved in:
Bibliographic Details
Main Author: Benavides , Eduardo (author)
Other Authors: Fuertes, Walter (author), Sanchez , Sandra (author), Nuñez-Agurto, Daniel (author)
Format: article
Language:spa
Published: 2020
Subjects:
Online Access:https://revistas.uteq.edu.ec/index.php/cyt/article/view/357
Tags: Add Tag
No Tags, Be the first to tag this record!

Similar Items