Estudio comparativo de tecnologías de la seguridad informática phishing y spoofing para la detección de un ataque informático.
In this comparative study of phishing and spoofing computer security technologies for the detection of a computer attack, the characteristics, types, differences and tools to be used to counteract these two methods used by cybercriminals have been specifically detailed. such as phishing and spoofing...
Wedi'i Gadw mewn:
| Prif Awdur: | |
|---|---|
| Fformat: | bachelorThesis |
| Cyhoeddwyd: |
2022
|
| Pynciau: | |
| Mynediad Ar-lein: | http://dspace.utb.edu.ec/handle/49000/11680 |
| Tagiau: |
Ychwanegu Tag
Dim Tagiau, Byddwch y cyntaf i dagio'r cofnod hwn!
|
| _version_ | 1859044649468952576 |
|---|---|
| author | Torres López, Nelson Iván |
| author_facet | Torres López, Nelson Iván |
| author_role | author |
| collection | Repositorio Universidad Técnica de Babahoyo |
| dc.contributor.none.fl_str_mv | Joffre Vicente, León Acurio |
| dc.creator.none.fl_str_mv | Torres López, Nelson Iván |
| dc.date.none.fl_str_mv | 2022-05-19T20:33:53Z 2022-05-19T20:33:53Z 2022 |
| dc.format.none.fl_str_mv | 27 p. application/pdf |
| dc.identifier.none.fl_str_mv | http://dspace.utb.edu.ec/handle/49000/11680 |
| dc.language.none.fl_str_mv | es |
| dc.publisher.none.fl_str_mv | Babahoyo: UTB-FAFI. 2022 |
| dc.rights.none.fl_str_mv | Atribución-NoComercial-SinDerivadas 3.0 Ecuador http://creativecommons.org/licenses/by-nc-nd/3.0/ec/ info:eu-repo/semantics/openAccess |
| dc.source.none.fl_str_mv | reponame:Repositorio Universidad Técnica de Babahoyo instname:Universidad Técnica de Babahoyo instacron:UTB |
| dc.subject.none.fl_str_mv | Ciberdelincuentes Herramientas Informáticas Phishing Spoofing Tecnologías De La Seguridad Ataques Cibernéticos Ingeniería Social |
| dc.title.none.fl_str_mv | Estudio comparativo de tecnologías de la seguridad informática phishing y spoofing para la detección de un ataque informático. |
| dc.type.none.fl_str_mv | info:eu-repo/semantics/publishedVersion info:eu-repo/semantics/bachelorThesis |
| description | In this comparative study of phishing and spoofing computer security technologies for the detection of a computer attack, the characteristics, types, differences and tools to be used to counteract these two methods used by cybercriminals have been specifically detailed. such as phishing and spoofing for information theft. For this reason, a bibliographical investigation was carried out in which the different methodologies used by cybercriminals to commit their criminal acts have been cited from different websites and in which it was found that phishing is one of the most used in recent years. that implements very convincing methods in which they use social engineering to achieve their goal. In addition, different types of computer tools were suggested that help counteract these types of cyber threats. |
| eu_rights_str_mv | openAccess |
| format | bachelorThesis |
| id | UTB_121c637ef3038b05e0fffe4d50a8d5bc |
| instacron_str | UTB |
| institution | UTB |
| instname_str | Universidad Técnica de Babahoyo |
| language_invalid_str_mv | es |
| network_acronym_str | UTB |
| network_name_str | Repositorio Universidad Técnica de Babahoyo |
| oai_identifier_str | oai:dspace.utb.edu.ec:49000/11680 |
| publishDate | 2022 |
| publisher.none.fl_str_mv | Babahoyo: UTB-FAFI. 2022 |
| reponame_str | Repositorio Universidad Técnica de Babahoyo |
| repository.mail.fl_str_mv | . |
| repository.name.fl_str_mv | Repositorio Universidad Técnica de Babahoyo - Universidad Técnica de Babahoyo |
| repository_id_str | 0 |
| rights_invalid_str_mv | Atribución-NoComercial-SinDerivadas 3.0 Ecuador http://creativecommons.org/licenses/by-nc-nd/3.0/ec/ |
| spelling | Estudio comparativo de tecnologías de la seguridad informática phishing y spoofing para la detección de un ataque informático.Torres López, Nelson IvánCiberdelincuentesHerramientas InformáticasPhishingSpoofingTecnologías De La SeguridadAtaques CibernéticosIngeniería SocialIn this comparative study of phishing and spoofing computer security technologies for the detection of a computer attack, the characteristics, types, differences and tools to be used to counteract these two methods used by cybercriminals have been specifically detailed. such as phishing and spoofing for information theft. For this reason, a bibliographical investigation was carried out in which the different methodologies used by cybercriminals to commit their criminal acts have been cited from different websites and in which it was found that phishing is one of the most used in recent years. that implements very convincing methods in which they use social engineering to achieve their goal. In addition, different types of computer tools were suggested that help counteract these types of cyber threats.In this comparative study of phishing and spoofing computer security technologies for the detection of a computer attack, the characteristics, types, differences and tools to be used to counteract these two methods used by cybercriminals have been specifically detailed. such as phishing and spoofing for information theft. For this reason, a bibliographical investigation was carried out in which the different methodologies used by cybercriminals to commit their criminal acts have been cited from different websites and in which it was found that phishing is one of the most used in recent years. that implements very convincing methods in which they use social engineering to achieve their goal. In addition, different types of computer tools were suggested that help counteract these types of cyber threats.En el presente estudio comparativo de tecnologías de la seguridad informática phishing y spoofing para la detección de un ataque informático se ha ido detallando de manera específica cuales han sido las características, tipos, diferencias y herramientas a utilizar para contrarrestar estos dos métodos que emplean los ciberdelincuentes como es el phishing y spoofing para el robo de la información. Por ello se realizó una investigación bibliográfica en la que se ha citado de diferentes sitios web las diferentes metodologías que emplean los ciberdelincuentes para cometer sus actos delictivos y en la que se pudo encontrar que el phishing es uno de los más usados en los últimos años ya que implementa métodos muy convincente en la que utilizan la ingeniería social para lograr su cometido. Además, se sugirió diferentes tipos de herramientas informáticas que ayudan a contrarrestar estos tipos de amenazas cibernéticas.Babahoyo: UTB-FAFI. 2022Joffre Vicente, León Acurio2022-05-19T20:33:53Z2022-05-19T20:33:53Z2022info:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/bachelorThesis27 p.application/pdfhttp://dspace.utb.edu.ec/handle/49000/11680esAtribución-NoComercial-SinDerivadas 3.0 Ecuadorhttp://creativecommons.org/licenses/by-nc-nd/3.0/ec/info:eu-repo/semantics/openAccessreponame:Repositorio Universidad Técnica de Babahoyoinstname:Universidad Técnica de Babahoyoinstacron:UTB2022-05-20T08:01:05Zoai:dspace.utb.edu.ec:49000/11680Institucionalhttp://dspace.utb.edu.ec/Universidad públicahttps://utb.edu.ec/http://dspace.utb.edu.ec/oai.Ecuador...opendoar:02026-03-07T22:25:26.377689Repositorio Universidad Técnica de Babahoyo - Universidad Técnica de Babahoyotrue |
| spellingShingle | Estudio comparativo de tecnologías de la seguridad informática phishing y spoofing para la detección de un ataque informático. Torres López, Nelson Iván Ciberdelincuentes Herramientas Informáticas Phishing Spoofing Tecnologías De La Seguridad Ataques Cibernéticos Ingeniería Social |
| status_str | publishedVersion |
| title | Estudio comparativo de tecnologías de la seguridad informática phishing y spoofing para la detección de un ataque informático. |
| title_full | Estudio comparativo de tecnologías de la seguridad informática phishing y spoofing para la detección de un ataque informático. |
| title_fullStr | Estudio comparativo de tecnologías de la seguridad informática phishing y spoofing para la detección de un ataque informático. |
| title_full_unstemmed | Estudio comparativo de tecnologías de la seguridad informática phishing y spoofing para la detección de un ataque informático. |
| title_short | Estudio comparativo de tecnologías de la seguridad informática phishing y spoofing para la detección de un ataque informático. |
| title_sort | Estudio comparativo de tecnologías de la seguridad informática phishing y spoofing para la detección de un ataque informático. |
| topic | Ciberdelincuentes Herramientas Informáticas Phishing Spoofing Tecnologías De La Seguridad Ataques Cibernéticos Ingeniería Social |
| url | http://dspace.utb.edu.ec/handle/49000/11680 |