Characterization of Phishing Attacks and Techniques to Mitigate These Attacks: A Systematic Review of The Literature
In Computer Security, it does not matter whichSoftware or Hardware equipment is installed, becausealways the weakest link in this security chain, is the enduser. From this premise are used the different types ofSocial Engineering attacks, whose main objective isto obtain information almost directly...
Gardado en:
| Autor Principal: | |
|---|---|
| Outros autores: | , , |
| Formato: | article |
| Idioma: | spa |
| Publicado: |
2020
|
| Subjects: | |
| Acceso en liña: | https://revistas.uteq.edu.ec/index.php/cyt/article/view/357 |
| Tags: |
Engadir etiqueta
Sen Etiquetas, Sexa o primeiro en etiquetar este rexistro!
|
Sexa o primeiro en deixar un comentario!