Characterization of Phishing Attacks and Techniques to Mitigate These Attacks: A Systematic Review of The Literature

In Computer Security, it does not matter whichSoftware or Hardware equipment is installed, becausealways the weakest link in this security chain, is the enduser. From this premise are used the different types ofSocial Engineering attacks, whose main objective isto obtain information almost directly...

Descrición completa

Gardado en:
Detalles Bibliográficos
Autor Principal: Benavides , Eduardo (author)
Outros autores: Fuertes, Walter (author), Sanchez , Sandra (author), Nuñez-Agurto, Daniel (author)
Formato: article
Idioma:spa
Publicado: 2020
Subjects:
Acceso en liña:https://revistas.uteq.edu.ec/index.php/cyt/article/view/357
Tags: Engadir etiqueta
Sen Etiquetas, Sexa o primeiro en etiquetar este rexistro!