The purpose of this research was to determine the most common key cyber-attack techniques to consider when developing cybersecurity strategies and appropriate tools that can be applied to any company, asset or threat, its financial economic relationship and evidencing the relationship of influence and dependence of these attacks. The study was classified as qualitative, documentary review was carried out and brainstorming and MICMAC techniques were applied. As a result, it was obtained that attacks such as Botnets, Machine learning poisoning, Exploitation of vulnerabilities among others, are attacks that require a rigorous monitoring and monitoring that allows to verify the effectiveness of the control of common attacks in general, because ...
The information security in organizations is a problem that afflicts us all, because if it is true w...
La fuga de datos se ha considerado el ataque informático más frecuente en América Latina en los últi...
Organizations today handle information that is critical for their business by using information tech...
La ciberseguridad se ha convertido en un pilar fundamental de la sociedad actual, especialmente en e...
Cyber attribution is a fundamental part of a State's cyber defense. The task of assigning someone ...
El objetivo de este trabajo de fin de grado es explicar la importancia de la seguridad informática e...
Artificial Intelligence is rapidly entering the domain of cybersecurity, leaded by big technology pl...
The number of attacks on government websites has escalated in the last years. In order to assist in ...
En la actualidad prácticamente todo el mundo conoce Internet y dispone de él en casa, o en su empres...
Social Engineering is the technique of obtaining confidential information from users, in a fraudulen...
With the implementation of new trends and the impact of digitization, mass data storage represents a...
En la actualidad, la implementación de medios técnicos y tecnológicos ha obligado a la población mun...
Open source intelligence (OSINT) is used to obtain and analyze information related to adversaries, s...
El objetivo de este TFE es analizar en detalle algunos de los ciberataques con más repercusión en la...
This work constitutes a documentary research on the cyber-attacks carried out in Latin America. A cy...
The information security in organizations is a problem that afflicts us all, because if it is true w...
La fuga de datos se ha considerado el ataque informático más frecuente en América Latina en los últi...
Organizations today handle information that is critical for their business by using information tech...
La ciberseguridad se ha convertido en un pilar fundamental de la sociedad actual, especialmente en e...
Cyber attribution is a fundamental part of a State's cyber defense. The task of assigning someone ...
El objetivo de este trabajo de fin de grado es explicar la importancia de la seguridad informática e...
Artificial Intelligence is rapidly entering the domain of cybersecurity, leaded by big technology pl...
The number of attacks on government websites has escalated in the last years. In order to assist in ...
En la actualidad prácticamente todo el mundo conoce Internet y dispone de él en casa, o en su empres...
Social Engineering is the technique of obtaining confidential information from users, in a fraudulen...
With the implementation of new trends and the impact of digitization, mass data storage represents a...
En la actualidad, la implementación de medios técnicos y tecnológicos ha obligado a la población mun...
Open source intelligence (OSINT) is used to obtain and analyze information related to adversaries, s...
El objetivo de este TFE es analizar en detalle algunos de los ciberataques con más repercusión en la...
This work constitutes a documentary research on the cyber-attacks carried out in Latin America. A cy...
The information security in organizations is a problem that afflicts us all, because if it is true w...
La fuga de datos se ha considerado el ataque informático más frecuente en América Latina en los últi...
Organizations today handle information that is critical for their business by using information tech...