Análisis de los diferentes tipos de ataques cibernéticos que son utilizados a través de los sms
Today, technology is advancing rapidly, which has led to the increase in cyber attacks through SMS, posing a threat to user security and loss of business information. In this research on cyber attacks through SMS, a methodological approach will be used that combines various data compilation and anal...
Gardado en:
| Autor Principal: | |
|---|---|
| Formato: | bachelorThesis |
| Publicado: |
2023
|
| Subjects: | |
| Acceso en liña: | http://dspace.utb.edu.ec/handle/49000/14875 |
| Tags: |
Engadir etiqueta
Sen Etiquetas, Sexa o primeiro en etiquetar este rexistro!
|
| Summary: | Today, technology is advancing rapidly, which has led to the increase in cyber attacks through SMS, posing a threat to user security and loss of business information. In this research on cyber attacks through SMS, a methodological approach will be used that combines various data compilation and analysis techniques. The main objective is to analyze the different types of most common cyber attacks that SMS uses to understand in depth the different types of cyber attacks and their impact on the security of SMS messaging users. This case study will use exploratory and descriptive research. Exploratory research will help identify the different types of cyber attacks, while descriptive research will provide a detailed view of each type of attack and its characteristics. Interviews will be carried out with graduate students and professionals where possible victims of cyber attacks via SMS will be analyzed. These interviews will help obtain valuable qualitative information about the strategies used by attackers and the impact on people and organizations. To address this issue, it is crucial to conduct an analysis of the different types of cyber attacks and educate users about the security of their information. The development of the Internet has revolutionized the way information is exchanged in various sectors, and security in cyberspace is vital to protect users and organizational assets. |
|---|