Análisis de la evolución de las técnicas de phishing para la clonación de páginas web
The purpose of this case study is to study and analyze the evolution of the different phishing techniques used in web spoofing and to deceive unaware users, because phishing is a cyber-attack that aims to obtain confidential information by pretending to be legitimate entities, which is why the diffe...
Guardado en:
| Autor principal: | |
|---|---|
| Formato: | bachelorThesis |
| Publicado: |
2023
|
| Materias: | |
| Acceso en línea: | http://dspace.utb.edu.ec/handle/49000/15129 |
| Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
| _version_ | 1863483716087578624 |
|---|---|
| author | Vaca Angulo, Eva Azucena |
| author_facet | Vaca Angulo, Eva Azucena |
| author_role | author |
| collection | Repositorio Universidad Técnica de Babahoyo |
| dc.contributor.none.fl_str_mv | Leon Acurio, Joffre Vicente |
| dc.creator.none.fl_str_mv | Vaca Angulo, Eva Azucena |
| dc.date.none.fl_str_mv | 2023-11-08T19:23:56Z 2023-11-08T19:23:56Z 2023 |
| dc.format.none.fl_str_mv | 40 p. application/pdf |
| dc.identifier.none.fl_str_mv | http://dspace.utb.edu.ec/handle/49000/15129 |
| dc.language.none.fl_str_mv | es |
| dc.publisher.none.fl_str_mv | Babahoyo: UTB-FAFI. 2023 |
| dc.rights.none.fl_str_mv | Atribución-NoComercial-SinDerivadas 3.0 Ecuador http://creativecommons.org/licenses/by-nc-nd/3.0/ec/ info:eu-repo/semantics/openAccess |
| dc.source.none.fl_str_mv | reponame:Repositorio Universidad Técnica de Babahoyo instname:Universidad Técnica de Babahoyo instacron:UTB |
| dc.subject.none.fl_str_mv | Phishing Clonación de páginas web Ciberataque Spoofing |
| dc.title.none.fl_str_mv | Análisis de la evolución de las técnicas de phishing para la clonación de páginas web |
| dc.type.none.fl_str_mv | info:eu-repo/semantics/publishedVersion info:eu-repo/semantics/bachelorThesis |
| description | The purpose of this case study is to study and analyze the evolution of the different phishing techniques used in web spoofing and to deceive unaware users, because phishing is a cyber-attack that aims to obtain confidential information by pretending to be legitimate entities, which is why the different cybercriminals have adapted their strategies to greater success in their phishing campaigns as technology advances. The main objective of this study is to analyze the constant evolution of phishing methods for cloning web pages and how cybercriminals obtain sensitive user data; it will also review previous investigations in which the tools and tactics used by attackers will be evaluated, as well as how social engineering and customization have been used to increase the effectiveness of attacks. This case study will provide a comprehensive overview of how phishing techniques for cloning web pages have changed, allowing a better understanding of current threats, as well as providing information to improve security strategies and raise user awareness about the risks associated with phishing. |
| eu_rights_str_mv | openAccess |
| format | bachelorThesis |
| id | UTB_ea5ec776a806ae9dd10df3337532f7dc |
| instacron_str | UTB |
| institution | UTB |
| instname_str | Universidad Técnica de Babahoyo |
| language_invalid_str_mv | es |
| network_acronym_str | UTB |
| network_name_str | Repositorio Universidad Técnica de Babahoyo |
| oai_identifier_str | oai:dspace.utb.edu.ec:49000/15129 |
| publishDate | 2023 |
| publisher.none.fl_str_mv | Babahoyo: UTB-FAFI. 2023 |
| reponame_str | Repositorio Universidad Técnica de Babahoyo |
| repository.mail.fl_str_mv | . |
| repository.name.fl_str_mv | Repositorio Universidad Técnica de Babahoyo - Universidad Técnica de Babahoyo |
| repository_id_str | 0 |
| rights_invalid_str_mv | Atribución-NoComercial-SinDerivadas 3.0 Ecuador http://creativecommons.org/licenses/by-nc-nd/3.0/ec/ |
| spelling | Análisis de la evolución de las técnicas de phishing para la clonación de páginas webVaca Angulo, Eva AzucenaPhishingClonación de páginas webCiberataqueSpoofingThe purpose of this case study is to study and analyze the evolution of the different phishing techniques used in web spoofing and to deceive unaware users, because phishing is a cyber-attack that aims to obtain confidential information by pretending to be legitimate entities, which is why the different cybercriminals have adapted their strategies to greater success in their phishing campaigns as technology advances. The main objective of this study is to analyze the constant evolution of phishing methods for cloning web pages and how cybercriminals obtain sensitive user data; it will also review previous investigations in which the tools and tactics used by attackers will be evaluated, as well as how social engineering and customization have been used to increase the effectiveness of attacks. This case study will provide a comprehensive overview of how phishing techniques for cloning web pages have changed, allowing a better understanding of current threats, as well as providing information to improve security strategies and raise user awareness about the risks associated with phishing.The purpose of this case study is to study and analyze the evolution of the different phishing techniques used in web spoofing and to deceive unaware users, because phishing is a cyber-attack that aims to obtain confidential information by pretending to be legitimate entities, which is why the different cybercriminals have adapted their strategies to greater success in their phishing campaigns as technology advances. The main objective of this study is to analyze the constant evolution of phishing methods for cloning web pages and how cybercriminals obtain sensitive user data; it will also review previous investigations in which the tools and tactics used by attackers will be evaluated, as well as how social engineering and customization have been used to increase the effectiveness of attacks. This case study will provide a comprehensive overview of how phishing techniques for cloning web pages have changed, allowing a better understanding of current threats, as well as providing information to improve security strategies and raise user awareness about the risks associated with phishing.El propósito de este caso de estudio es estudiar y analizar la evolución de las diferentes técnicas de phishing empleadas en el web spoofing y para engañar a usuarios inadvertidos, debido a que el phishing es un ciberataque que tiene como objetivo obtener nformación confidencial haciéndose pasar por entidades legítimas, razón por la cual los diferentes ciberdelincuentes han adaptado sus estrategias para conseguir un mayor éxito en sus campañas de phishing a medida que avanza la tecnología. El objetivo principal de este estudio es analizar la constante evolución de los métodos de phishing para la clonación de páginas web y cómo los ciberdelincuentes obtienen datos confidenciales de los usuarios, también se revisarán investigaciones previas en las que se evaluarán las herramientas y tácticas empleadas por los atacantes, así como cómo la ingeniería social y la personalización han sido utilizadas para incrementar la efectividad de los ataques. Este caso de estudio proporcionará una completa visión de cómo han cambiado las técnicas de phishing para la clonación de páginas web permitiendo una mejor comprensión de las amenazas actuales, además de brindar información para así mejorar las estrategias de seguridad y concientizar a los usuarios sobre los riesgos asociados con el phishingBabahoyo: UTB-FAFI. 2023Leon Acurio, Joffre Vicente2023-11-08T19:23:56Z2023-11-08T19:23:56Z2023info:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/bachelorThesis40 p.application/pdfhttp://dspace.utb.edu.ec/handle/49000/15129esAtribución-NoComercial-SinDerivadas 3.0 Ecuadorhttp://creativecommons.org/licenses/by-nc-nd/3.0/ec/info:eu-repo/semantics/openAccessreponame:Repositorio Universidad Técnica de Babahoyoinstname:Universidad Técnica de Babahoyoinstacron:UTB2023-11-09T08:01:22Zoai:dspace.utb.edu.ec:49000/15129Institucionalhttp://dspace.utb.edu.ec/Universidad públicahttps://utb.edu.ec/http://dspace.utb.edu.ec/oai.Ecuador...opendoar:02026-04-25T22:21:00.944094Repositorio Universidad Técnica de Babahoyo - Universidad Técnica de Babahoyotrue |
| spellingShingle | Análisis de la evolución de las técnicas de phishing para la clonación de páginas web Vaca Angulo, Eva Azucena Phishing Clonación de páginas web Ciberataque Spoofing |
| status_str | publishedVersion |
| title | Análisis de la evolución de las técnicas de phishing para la clonación de páginas web |
| title_full | Análisis de la evolución de las técnicas de phishing para la clonación de páginas web |
| title_fullStr | Análisis de la evolución de las técnicas de phishing para la clonación de páginas web |
| title_full_unstemmed | Análisis de la evolución de las técnicas de phishing para la clonación de páginas web |
| title_short | Análisis de la evolución de las técnicas de phishing para la clonación de páginas web |
| title_sort | Análisis de la evolución de las técnicas de phishing para la clonación de páginas web |
| topic | Phishing Clonación de páginas web Ciberataque Spoofing |
| url | http://dspace.utb.edu.ec/handle/49000/15129 |