Estudio comparativo de tecnologías de la seguridad informática phishing y spoofing para la detección de un ataque informático.

In this comparative study of phishing and spoofing computer security technologies for the detection of a computer attack, the characteristics, types, differences and tools to be used to counteract these two methods used by cybercriminals have been specifically detailed. such as phishing and spoofing...

Descrición completa

Gardado en:
Detalles Bibliográficos
Autor Principal: Torres López, Nelson Iván (author)
Formato: bachelorThesis
Publicado: 2022
Subjects:
Acceso en liña:http://dspace.utb.edu.ec/handle/49000/11680
Tags: Engadir etiqueta
Sen Etiquetas, Sexa o primeiro en etiquetar este rexistro!
Descripción
Summary:In this comparative study of phishing and spoofing computer security technologies for the detection of a computer attack, the characteristics, types, differences and tools to be used to counteract these two methods used by cybercriminals have been specifically detailed. such as phishing and spoofing for information theft. For this reason, a bibliographical investigation was carried out in which the different methodologies used by cybercriminals to commit their criminal acts have been cited from different websites and in which it was found that phishing is one of the most used in recent years. that implements very convincing methods in which they use social engineering to achieve their goal. In addition, different types of computer tools were suggested that help counteract these types of cyber threats.