Mostrar el registro sencillo del ítem
Estudio comparativo de tecnologías de la seguridad informática phishing y spoofing para la detección de un ataque informático.
dc.contributor.advisor | Joffre Vicente, León Acurio | |
dc.contributor.author | Torres López, Nelson Iván | |
dc.date.accessioned | 2022-05-19T20:33:53Z | |
dc.date.available | 2022-05-19T20:33:53Z | |
dc.date.issued | 2022 | |
dc.identifier.uri | http://dspace.utb.edu.ec/handle/49000/11680 | |
dc.description | In this comparative study of phishing and spoofing computer security technologies for the detection of a computer attack, the characteristics, types, differences and tools to be used to counteract these two methods used by cybercriminals have been specifically detailed. such as phishing and spoofing for information theft. For this reason, a bibliographical investigation was carried out in which the different methodologies used by cybercriminals to commit their criminal acts have been cited from different websites and in which it was found that phishing is one of the most used in recent years. that implements very convincing methods in which they use social engineering to achieve their goal. In addition, different types of computer tools were suggested that help counteract these types of cyber threats. | es_ES |
dc.description | In this comparative study of phishing and spoofing computer security technologies for the detection of a computer attack, the characteristics, types, differences and tools to be used to counteract these two methods used by cybercriminals have been specifically detailed. such as phishing and spoofing for information theft. For this reason, a bibliographical investigation was carried out in which the different methodologies used by cybercriminals to commit their criminal acts have been cited from different websites and in which it was found that phishing is one of the most used in recent years. that implements very convincing methods in which they use social engineering to achieve their goal. In addition, different types of computer tools were suggested that help counteract these types of cyber threats. | es_ES |
dc.description.abstract | En el presente estudio comparativo de tecnologías de la seguridad informática phishing y spoofing para la detección de un ataque informático se ha ido detallando de manera específica cuales han sido las características, tipos, diferencias y herramientas a utilizar para contrarrestar estos dos métodos que emplean los ciberdelincuentes como es el phishing y spoofing para el robo de la información. Por ello se realizó una investigación bibliográfica en la que se ha citado de diferentes sitios web las diferentes metodologías que emplean los ciberdelincuentes para cometer sus actos delictivos y en la que se pudo encontrar que el phishing es uno de los más usados en los últimos años ya que implementa métodos muy convincente en la que utilizan la ingeniería social para lograr su cometido. Además, se sugirió diferentes tipos de herramientas informáticas que ayudan a contrarrestar estos tipos de amenazas cibernéticas. | es_ES |
dc.format.extent | 27 p. | es_ES |
dc.language.iso | es | es_ES |
dc.publisher | Babahoyo: UTB-FAFI. 2022 | es_ES |
dc.rights | Atribución-NoComercial-SinDerivadas 3.0 Ecuador | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/ec/ | * |
dc.subject | Ciberdelincuentes | es_ES |
dc.subject | Herramientas Informáticas | es_ES |
dc.subject | Phishing | es_ES |
dc.subject | Spoofing | es_ES |
dc.subject | Tecnologías De La Seguridad | es_ES |
dc.subject | Ataques Cibernéticos | es_ES |
dc.subject | Ingeniería Social | es_ES |
dc.title | Estudio comparativo de tecnologías de la seguridad informática phishing y spoofing para la detección de un ataque informático. | es_ES |
dc.type | bachelorThesis | es_ES |