dc.contributor.advisor | Leon Acurio, Joffre Vicente | |
dc.contributor.author | Vaca Angulo, Eva Azucena | |
dc.date.accessioned | 2023-11-08T19:23:56Z | |
dc.date.available | 2023-11-08T19:23:56Z | |
dc.date.issued | 2023 | |
dc.identifier.uri | http://dspace.utb.edu.ec/handle/49000/15129 | |
dc.description | The purpose of this case study is to study and analyze the evolution of the different phishing techniques used in web spoofing and to deceive unaware users, because phishing is a cyber-attack that aims to obtain confidential information by pretending to be legitimate entities, which is why the different cybercriminals have adapted their strategies to greater success in their phishing campaigns as technology advances. The main objective of this study is to analyze the constant evolution of phishing methods for cloning web pages and how cybercriminals obtain sensitive user data; it will also review previous investigations in which the tools and tactics used by attackers will be evaluated, as well as how social engineering and customization have been used to increase the effectiveness of attacks. This case study will provide a comprehensive overview of how phishing techniques for cloning web pages have changed, allowing a better understanding of current threats, as well as providing information to improve security strategies and raise user awareness about the risks associated with phishing. | es_ES |
dc.description | The purpose of this case study is to study and analyze the evolution of the different phishing techniques used in web spoofing and to deceive unaware users, because phishing is a cyber-attack that aims to obtain confidential information by pretending to be legitimate entities, which is why the different cybercriminals have adapted their strategies to greater success in their phishing campaigns as technology advances. The main objective of this study is to analyze the constant evolution of phishing methods for cloning web pages and how cybercriminals obtain sensitive user data; it will also review previous investigations in which the tools and tactics used by attackers will be evaluated, as well as how social engineering and customization have been used to increase the effectiveness of attacks. This case study will provide a comprehensive overview of how phishing techniques for cloning web pages have changed, allowing a better understanding of current threats, as well as providing information to improve security strategies and raise user awareness about the risks associated with phishing. | es_ES |
dc.description.abstract | El propósito de este caso de estudio es estudiar y analizar la evolución de las diferentes técnicas de phishing empleadas en el web spoofing y para engañar a usuarios inadvertidos, debido a que el phishing es un ciberataque que tiene como objetivo obtener nformación confidencial haciéndose pasar por entidades legítimas, razón por la cual los diferentes ciberdelincuentes han adaptado sus estrategias para conseguir un mayor éxito en sus campañas de phishing a medida que avanza la tecnología. El objetivo principal de este estudio es analizar la constante evolución de los métodos de phishing para la clonación de páginas web y cómo los ciberdelincuentes obtienen datos confidenciales de los usuarios, también se revisarán investigaciones previas en las que se evaluarán las herramientas y tácticas empleadas por los atacantes, así como cómo la ingeniería social y la personalización han sido utilizadas para incrementar la efectividad de los ataques. Este caso de estudio proporcionará una completa visión de cómo han cambiado las técnicas de phishing para la clonación de páginas web permitiendo una mejor comprensión de las amenazas actuales, además de brindar información para así mejorar las estrategias de seguridad y concientizar a los usuarios sobre los riesgos asociados con el phishing | es_ES |
dc.format.extent | 40 p. | es_ES |
dc.language.iso | es | es_ES |
dc.publisher | Babahoyo: UTB-FAFI. 2023 | es_ES |
dc.rights | Atribución-NoComercial-SinDerivadas 3.0 Ecuador | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/ec/ | * |
dc.subject | Phishing | es_ES |
dc.subject | Clonación de páginas web | es_ES |
dc.subject | Ciberataque | es_ES |
dc.subject | Spoofing | es_ES |
dc.title | Análisis de la evolución de las técnicas de phishing para la clonación de páginas web | es_ES |
dc.type | bachelorThesis | es_ES |