Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ Recolector de Cienci...arrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
versions View all 1 versions
addClaim

Ciberdelitos / Ciberincidentes, ¿cómo comprometen a las organizaciones y usuarios?

Authors: Busto Pérez de Mendiguren, Estíbaliz;

Ciberdelitos / Ciberincidentes, ¿cómo comprometen a las organizaciones y usuarios?

Abstract

La digitalización, las nuevas tecnologías e Internet han supuesto un importante cambio en nuestras vidas tanto a nivel personal como profesional. La conexión a Internet multiplica las vías de ataque y los ciberincidentes, los cuales pueden tener gran impacto con enormes repercusiones en pocos segundos en los usuarios y empresas. De aquí la importancia de la ciberseguridad. En este Trabajo Fin de Máster se llevará a cabo un estudio de los ciberincidentes: clasificación, detección, nivel de peligrosidad e impacto, para posteriormente analizar dos de ellos: PHISHING (tipo de incidente: fraude) y RANSOMWARE (tipo de incidente: Malware). Para su estudio se procederá a ubicarlos en el tiempo desde sus orígenes hasta nuestros días, conocer sus tipos o variantes más frecuentes, así como sus mecanismos de acción e infección utilizados. A continuación, se analizarán diferentes medidas de seguridad para evitar estos ciberataques. Para finalizar, se darán a conocer sus repercusiones más importantes tanto en los usuarios como en las empresas del sector privado y público en la actualidad.

La digitalització, les noves tecnologies i Internet han suposat un important canvi en les nostres vides tant a nivell personal com professional. La connexió a Internet multiplica les vies d'atac i els ciberincidents, els quals poden tenir gran impacte amb enormes repercussions en pocs segons als usuaris i empreses. D'aquí la importància de la ciberseguretat. En aquest Treball Final de Màster es durà a terme un estudi dels ciberincidents: classificació, detecció, nivell de perillositat i impacte, per posteriorment analitzar-ne dos: PHISHING (tipus d'incident: frau) i RANSOMWARE (tipus d'incident: codi maliciós (malware)). Per al seu estudi es procedirà a ubicar-los en el temps des dels seus orígens fins als nostres dies, conèixer-ne els tipus o variants més freqüents, així com els mecanismes d'acció i infecció utilitzats. A continuació, s'analitzaran diferents mesures de seguretat per evitar-los ciberatacs. Per finalitzar, es donaran a conèixer les seves repercussions més importants tant a els usuaris com a les empreses del sector privat i públic actualment.

Digitization, new technologies and Internet have brought about an important change in our lives, both personally and professionally. The Internet connection multiplies the ways of attack and cyber incidents, which can have a great impact with enormous repercussions in a few seconds for users and companies. Hence the importance of cybersecurity. In this Final Master's Project, a study of cyber incidents will be carried out: classification, detection, level of danger and impact, to later analyze two of them: PHISHING (incident type: fraud) and RANSOMWARE (incident type: malware). For their study, we will proceed to locate them in time from their origins to the present day, to know their most frequent types or variants, as well as their infection methods. Next, different security measures will be analyzed to avoid them. Next, different security measures will be analyzed to avoid these cyberattacks. Finally, its most important repercussions will be announced both for users and for companies in the private and public sector today.

Country
Spain
Related Organizations
Keywords

cyber incident, ransomware, phishing, Seguretat informàtica -- TFM, Computer security -- TFM, ciberincidente

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
Green