Mostrar el registro sencillo del ítem

dc.contributor.advisorJoffre Vicente, León Acurio
dc.contributor.authorTorres López, Nelson Iván
dc.date.accessioned2022-05-19T20:33:53Z
dc.date.available2022-05-19T20:33:53Z
dc.date.issued2022
dc.identifier.urihttp://dspace.utb.edu.ec/handle/49000/11680
dc.descriptionIn this comparative study of phishing and spoofing computer security technologies for the detection of a computer attack, the characteristics, types, differences and tools to be used to counteract these two methods used by cybercriminals have been specifically detailed. such as phishing and spoofing for information theft. For this reason, a bibliographical investigation was carried out in which the different methodologies used by cybercriminals to commit their criminal acts have been cited from different websites and in which it was found that phishing is one of the most used in recent years. that implements very convincing methods in which they use social engineering to achieve their goal. In addition, different types of computer tools were suggested that help counteract these types of cyber threats.es_ES
dc.descriptionIn this comparative study of phishing and spoofing computer security technologies for the detection of a computer attack, the characteristics, types, differences and tools to be used to counteract these two methods used by cybercriminals have been specifically detailed. such as phishing and spoofing for information theft. For this reason, a bibliographical investigation was carried out in which the different methodologies used by cybercriminals to commit their criminal acts have been cited from different websites and in which it was found that phishing is one of the most used in recent years. that implements very convincing methods in which they use social engineering to achieve their goal. In addition, different types of computer tools were suggested that help counteract these types of cyber threats.es_ES
dc.description.abstractEn el presente estudio comparativo de tecnologías de la seguridad informática phishing y spoofing para la detección de un ataque informático se ha ido detallando de manera específica cuales han sido las características, tipos, diferencias y herramientas a utilizar para contrarrestar estos dos métodos que emplean los ciberdelincuentes como es el phishing y spoofing para el robo de la información. Por ello se realizó una investigación bibliográfica en la que se ha citado de diferentes sitios web las diferentes metodologías que emplean los ciberdelincuentes para cometer sus actos delictivos y en la que se pudo encontrar que el phishing es uno de los más usados en los últimos años ya que implementa métodos muy convincente en la que utilizan la ingeniería social para lograr su cometido. Además, se sugirió diferentes tipos de herramientas informáticas que ayudan a contrarrestar estos tipos de amenazas cibernéticas.es_ES
dc.format.extent27 p.es_ES
dc.language.isoeses_ES
dc.publisherBabahoyo: UTB-FAFI. 2022es_ES
dc.rightsAtribución-NoComercial-SinDerivadas 3.0 Ecuador*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/ec/*
dc.subjectCiberdelincuenteses_ES
dc.subjectHerramientas Informáticases_ES
dc.subjectPhishinges_ES
dc.subjectSpoofinges_ES
dc.subjectTecnologías De La Seguridades_ES
dc.subjectAtaques Cibernéticoses_ES
dc.subjectIngeniería Sociales_ES
dc.titleEstudio comparativo de tecnologías de la seguridad informática phishing y spoofing para la detección de un ataque informático.es_ES
dc.typebachelorThesises_ES


Ficheros en el ítem

Thumbnail
Thumbnail

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem

Atribución-NoComercial-SinDerivadas 3.0 Ecuador
Excepto si se señala otra cosa, la licencia del ítem se describe como Atribución-NoComercial-SinDerivadas 3.0 Ecuador