Show simple item record

dc.contributor.advisorLeon Acurio, Joffre Vicente
dc.contributor.authorVaca Angulo, Eva Azucena
dc.date.accessioned2023-11-08T19:23:56Z
dc.date.available2023-11-08T19:23:56Z
dc.date.issued2023
dc.identifier.urihttp://dspace.utb.edu.ec/handle/49000/15129
dc.descriptionThe purpose of this case study is to study and analyze the evolution of the different phishing techniques used in web spoofing and to deceive unaware users, because phishing is a cyber-attack that aims to obtain confidential information by pretending to be legitimate entities, which is why the different cybercriminals have adapted their strategies to greater success in their phishing campaigns as technology advances. The main objective of this study is to analyze the constant evolution of phishing methods for cloning web pages and how cybercriminals obtain sensitive user data; it will also review previous investigations in which the tools and tactics used by attackers will be evaluated, as well as how social engineering and customization have been used to increase the effectiveness of attacks. This case study will provide a comprehensive overview of how phishing techniques for cloning web pages have changed, allowing a better understanding of current threats, as well as providing information to improve security strategies and raise user awareness about the risks associated with phishing.es_ES
dc.descriptionThe purpose of this case study is to study and analyze the evolution of the different phishing techniques used in web spoofing and to deceive unaware users, because phishing is a cyber-attack that aims to obtain confidential information by pretending to be legitimate entities, which is why the different cybercriminals have adapted their strategies to greater success in their phishing campaigns as technology advances. The main objective of this study is to analyze the constant evolution of phishing methods for cloning web pages and how cybercriminals obtain sensitive user data; it will also review previous investigations in which the tools and tactics used by attackers will be evaluated, as well as how social engineering and customization have been used to increase the effectiveness of attacks. This case study will provide a comprehensive overview of how phishing techniques for cloning web pages have changed, allowing a better understanding of current threats, as well as providing information to improve security strategies and raise user awareness about the risks associated with phishing.es_ES
dc.description.abstractEl propósito de este caso de estudio es estudiar y analizar la evolución de las diferentes técnicas de phishing empleadas en el web spoofing y para engañar a usuarios inadvertidos, debido a que el phishing es un ciberataque que tiene como objetivo obtener nformación confidencial haciéndose pasar por entidades legítimas, razón por la cual los diferentes ciberdelincuentes han adaptado sus estrategias para conseguir un mayor éxito en sus campañas de phishing a medida que avanza la tecnología. El objetivo principal de este estudio es analizar la constante evolución de los métodos de phishing para la clonación de páginas web y cómo los ciberdelincuentes obtienen datos confidenciales de los usuarios, también se revisarán investigaciones previas en las que se evaluarán las herramientas y tácticas empleadas por los atacantes, así como cómo la ingeniería social y la personalización han sido utilizadas para incrementar la efectividad de los ataques. Este caso de estudio proporcionará una completa visión de cómo han cambiado las técnicas de phishing para la clonación de páginas web permitiendo una mejor comprensión de las amenazas actuales, además de brindar información para así mejorar las estrategias de seguridad y concientizar a los usuarios sobre los riesgos asociados con el phishinges_ES
dc.format.extent40 p.es_ES
dc.language.isoeses_ES
dc.publisherBabahoyo: UTB-FAFI. 2023es_ES
dc.rightsAtribución-NoComercial-SinDerivadas 3.0 Ecuador*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/ec/*
dc.subjectPhishinges_ES
dc.subjectClonación de páginas webes_ES
dc.subjectCiberataquees_ES
dc.subjectSpoofinges_ES
dc.titleAnálisis de la evolución de las técnicas de phishing para la clonación de páginas webes_ES
dc.typebachelorThesises_ES


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record

Atribución-NoComercial-SinDerivadas 3.0 Ecuador
Except where otherwise noted, this item's license is described as Atribución-NoComercial-SinDerivadas 3.0 Ecuador