Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ Recolector de Cienci...arrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
Recolector de Ciencia Abierta, RECOLECTA
Bachelor thesis . 2022
License: CC BY NC ND
versions View all 3 versions
addClaim

Estudio experimental de ciberataques a través de códigos QR

Experimental study of cyber attacks via QR codes
Authors: Fernández Rosique, Francisco Javier;

Estudio experimental de ciberataques a través de códigos QR

Abstract

El objetivo de este TFG es analizar de forma experimental qué tipos de ciberataques podrían realizarse utilizando como arma los códigos QR. Los códigos de respuesta rápida (QR codes) son cada vez más populares. Se estima que gran parte de los usuarios de smartphones consideran que los códigos QR facilitan tareas rutinarias, son una forma fácil de realizar pagos e interactuar en un mundo sin contacto, a pesar de que la mayoría carecen de seguridad en sus dispositivos móviles. Con las nuevas tecnologías surgen nuevas amenazas y vulnerabilidades, y los dispositivos móviles son un objetivo atractivo para los cibercriminales porque la interfaz de usuario móvil incita a los usuarios a realizar acciones inmediatas al tiempo que limita la cantidad de información disponible. Los usuarios también se distraen cuando utilizan sus dispositivos móviles, lo que les hace más propensos a ser víctimas de ataques. Como consecuencia, estamos siendo testigos de un aumento exponencial del uso de los códigos QR como arma para los hackers (no éticos). Estos utilizan los códigos QR para infiltrarse en los dispositivos móviles, robar datos de la empresa y, en última instancia, causar estragos en las organizaciones. Será objeto de este TFG analizar de forma experimental qué tipos de ciberataques podrían realizarse utilizando como arma los códigos QR.

Escuela Técnica Superior de Ingeniería de Telecomunicación

Universidad Politécnica de Cartagena

Country
Spain
Related Organizations
Keywords

Piracy, Ingeniería Telemática, 1207.03 Cibernética, Piratería

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
Green
Related to Research communities