Repository logo
Communities & Collections
All of DSpace
  • English
  • العربية
  • বাংলা
  • Català
  • Čeština
  • Deutsch
  • Ελληνικά
  • Español
  • Suomi
  • Français
  • Gàidhlig
  • हिंदी
  • Magyar
  • Italiano
  • Қазақ
  • Latviešu
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Српски
  • Svenska
  • Türkçe
  • Yкраї́нська
  • Tiếng Việt
Log In
Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Jinde Sisa, Ariel Hernán"

Filter results by typing the first few letters
Now showing 1 - 1 of 1
  • Results Per Page
  • Sort Options
  • No Thumbnail Available
    Item
    Estrategia para mitigar fraudes de angler-phishing basados en ingeniería social en plataformas de redes sociales
    (Universidad Técnica de Ambato. Facultad de Ingeniería en Sistemas, Electrónica e Industrial. Carrera de Tecnologías de la Información, 2024-02) Jinde Sisa, Ariel Hernán; Fernández Peña, Félix Oscar
    This research titled “Strategy to mitigate Angler-Phishing fraud based on social engineering on social media platforms.” For which we worked based on the general objective which is to define a strategy to prevent and reduce the incidence of Angler-Phishing frauds based on Social Engineering. The work has a mixed approach methodology when collecting and analyzing data from social network users. By exploring the experiences of individuals who interact on these platforms, particularly those susceptible to social engineering and phishing, viable solutions are identified to mitigate fraud risks. Furthermore, we worked with an infinite population, given that it is impracticable to count the exact number of active users on social networks today. As a relevant result, it was found that by applying a comprehensive strategy based on the OSSTMM methodology for an effective integration of Information Technology (IT) instruments, with the purpose of preventing and reducing the incidence of attacks, resulting in a strategy focused on promoting collaboration between various technological solutions, such as two-step authentication, intrusion detection systems and email filters, it is also highlighted that this agreement between instruments strengthens the defensive capacity which follows a strategic approach that encompasses different security layers.

DSpace software copyright © 2002-2025 LYRASIS

  • Privacy policy
  • End User Agreement
  • Send Feedback
Repository logo COAR Notify