Export Ready — 

Estudo de técnicas de phishing: métodos de ataque e estratégias de defesa

Bibliographic Details
Main Author: Bezerra, Paloma de Sousa
Publication Date: 2024
Other Authors: Millian, Lucca Eiki Amarante
Format: Bachelor thesis
Language: por
Source: Repositório Digital do Mackenzie
Download full: https://dspace.mackenzie.br/handle/10899/40150
Summary: Indicado para publicação.
id UPM_fd3fd07e85fc71fa89b091c52fb186cc
oai_identifier_str oai:dspace.mackenzie.br:10899/40150
network_acronym_str UPM
network_name_str Repositório Digital do Mackenzie
repository_id_str 10277
spelling Bezerra, Paloma de SousaMillian, Lucca Eiki AmaranteSilva, Rodrigo Cardoso2025-03-15T16:51:53Z2025-03-15T16:51:53Z2024-12-08Indicado para publicação.Phishing é um tipo de ataque cibernético que envolve a tentativa de obter informações confidenciais, geralmente por e-mail ou mensagens fraudulentas. Este trabalho realiza um estudo sobre as técnicas de Phishing, suas implicações e as estratégias de defesa. A pesquisa abrange os diferentes métodos utilizados por atacantes em ataques de Phishing, destacando as situações em que cada tipo de ataque é empregado, o impacto causado tanto em empresas quanto em usuários comuns, formas de prevenção mais utilizadas e, apresenta também, uma simulação de ataques do tipo e-mail phishing. Foi observado que, mesmo com o crescimento de ferramentas de segurança cibernética e conscientização sobre esse tipo de ataque, ainda é um elemento muito utilizado por criminosos para a coleta de dados e aplicação de golpesPhishing is a type of cyberattack that involves attempting to obtain confidential information, usually through fraudulent emails or messages. This work explores phishing techniques, their implications, and defense strategies. The research covers the different methods used by cybercriminals in phishing attacks highlighting the situations in which each type of attack is employed, the impact caused on both companies and ordinary users, the most used prevention methods and includes a simulation of e-mail phishing attacks. It has been observed that, despite the growth of cybersecurity tools and awareness about this type of attack, it is still a widely used element by criminals for data collection and the execution of scams.https://dspace.mackenzie.br/handle/10899/40150Universidade Presbiteriana Mackenziephishingsegurança cibernéticaengenharia socialmalwarephishingcybersecuritysocial engineeringmalwareEstudo de técnicas de phishing: métodos de ataque e estratégias de defesainfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/bachelorThesisporreponame:Repositório Digital do Mackenzieinstname:Universidade Presbiteriana Mackenzie (MACKENZIE)instacron:MACKENZIEinfo:eu-repo/semantics/openAccessFaculdade de Computação e Informática (FCI)ORIGINALtcc_artigo -Lucca Eiki Amarante Millian1.pdftcc_artigo -Lucca Eiki Amarante Millian1.pdfapplication/pdf826529https://dspace.mackenzie.br/bitstreams/ea3bb8ff-17a5-4439-b98b-43725da49698/download8a991882bf439cdceade314ff67923a8MD51LICENSElicense.txtlicense.txttext/plain; charset=utf-82269https://dspace.mackenzie.br/bitstreams/c162b0bd-2765-46c5-a8b5-570609fe77b4/downloadf0d4931322d30f6d2ee9ebafdf037c16MD52TEXTtcc_artigo -Lucca Eiki Amarante Millian1.pdf.txttcc_artigo -Lucca Eiki Amarante Millian1.pdf.txtExtracted texttext/plain55280https://dspace.mackenzie.br/bitstreams/dac69a63-1f5a-4526-89d6-90d64a6b6eb0/downloadd80e7786012179c81ef701016f8132b3MD53THUMBNAILtcc_artigo -Lucca Eiki Amarante Millian1.pdf.jpgtcc_artigo -Lucca Eiki Amarante Millian1.pdf.jpgGenerated Thumbnailimage/jpeg4769https://dspace.mackenzie.br/bitstreams/abcb67db-6399-459c-a954-5b0b566fac4b/download9f241d3f6fa754d0ec7bfbd3bd8ff9d3MD5410899/401502025-03-16 03:00:14.923oai:dspace.mackenzie.br:10899/40150https://dspace.mackenzie.brBiblioteca Digital de Teses e Dissertaçõeshttp://tede.mackenzie.br/jspui/PRIhttps://adelpha-api.mackenzie.br/server/oai/repositorio@mackenzie.br||paola.damato@mackenzie.bropendoar:102772025-04-14T16:34:11.214084Repositório Digital do Mackenzie - Universidade Presbiteriana Mackenzie (MACKENZIE)trueTElDRU7Dh0EgREUgRElTVFJJQlVJw4fDg08gTsODTy1FWENMVVNJVkEKPGJyPjxicj4KQ29tIG8gYWNlaXRlIGRlc3RhIGxpY2Vuw6dhLCB2b2PDqiAobyBhdXRvciAoZXMpIG91IG8gdGl0dWxhciBkb3MgZGlyZWl0b3MgZGUgYXV0b3IpIGNvbmNlZGUgw6AgVW5pdmVyc2lkYWRlIFByZXNiaXRlcmlhbmEgTWFja2VuemllIG8gZGlyZWl0byBuw6NvLWV4Y2x1c2l2byBkZSByZXByb2R1emlyLCB0cmFkdXppciAoY29uZm9ybWUgZGVmaW5pZG8gYWJhaXhvKSwgZS9vdSBkaXN0cmlidWlyIHNldSB0cmFiYWxobyAoaW5jbHVpbmRvIG8gcmVzdW1vKSBwb3IgdG9kbyBvIG11bmRvIG5vIGZvcm1hdG8gaW1wcmVzc28gZSBlbGV0csO0bmljbyBlIGVtIHF1YWxxdWVyIG1laW8sIGluY2x1aW5kbyBvcyBmb3JtYXRvcyDDoXVkaW8gb3UgdsOtZGVvLgo8YnI+PGJyPgpBY2VpdGFuZG8gZXNzYSBsaWNlbsOnYSB2b2PDqiBjb25jb3JkYSBxdWUgYSBVbml2ZXJzaWRhZGUgUHJlc2JpdGVyaWFuYSBNYWNrZW56aWUgcG9kZSwgc2VtIGFsdGVyYXIgbyBjb250ZcO6ZG8sIHRyYW5zcG9yIG8gc2V1IHRyYWJhbGhvIHBhcmEgcXVhbHF1ZXIgbWVpbyBvdSBmb3JtYXRvIGUgbWFudGVyIG1haXMgZGUgdW1hIGPDs3BpYSBkbyBzZXUgdHJhYmFsaG8gcGFyYSBmaW5zIGRlIHNlZ3VyYW7Dp2EsIGJhY2stdXAgZSBwcmVzZXJ2YcOnw6NvLgo8YnI+PGJyPgpDb25jb3JkYXLDoSBxdWUgc2V1IHRyYWJhbGhvIHRhbWLDqW0gc2Vyw6EgcmVnaWRvIHBlbGEgQ3JlYXRpdmUgQ29tbW9ucyBxdWUgTsODTyBwZXJtaXRlIG8gdXNvIGNvbWVyY2lhbCBvdSBxdWFscXVlciBhbHRlcmHDp8OjbyBkYSBvYnJhIHBvciB0ZXJjZWlyb3MgY29uZm9ybWUgZGVzY3JpdG8gZW0gPGEgaHJlZj0iaHR0cHM6Ly9jcmVhdGl2ZWNvbW1vbnMub3JnL2xpY2Vuc2VzL2J5LW5jLW5kLzQuMC8iIHRhcmdldD0iX2JsYW5rIj5odHRwczovL2NyZWF0aXZlY29tbW9ucy5vcmcvbGljZW5zZXMvYnktbmMtbmQvNC4wLzwvYT4uCjxicj48YnI+ClZvY8OqIGRlY2xhcmEgcXVlIHNldSB0cmFiYWxobyDDqSBvcmlnaW5hbCBlIHF1ZSB2b2PDqiB0ZW0gbyBwb2RlciBkZSBjb25jZWRlciBvcyBkaXJlaXRvcyBjb250aWRvcyBuZXN0YSBsaWNlbsOnYS4gRGVjbGFyYSB0YW1iw6ltIHF1ZSBvIGRlcMOzc2l0byBkbyBzZXUgdHJhYmFsaG8gbsOjbywgcXVlIHNlamEgZGUgc2V1IGNvbmhlY2ltZW50bywgaW5mcmluZ2UgZGlyZWl0b3MgYXV0b3JhaXMgZGUgbmluZ3XDqW0uCjxicj48YnI+CkNhc28gbyBzZXUgdHJhYmFsaG8gY29udGVuaGEgbWF0ZXJpYWwgcXVlIHZvY8OqIG7Do28gcG9zc3VpIGEgdGl0dWxhcmlkYWRlIGRvcyBkaXJlaXRvcyBhdXRvcmFpcywgdm9jw6ogZGVjbGFyYSBxdWUgb2J0ZXZlIGEgcGVybWlzc8OjbyBpcnJlc3RyaXRhIGRvIGRldGVudG9yIGRvcyBkaXJlaXRvcyBhdXRvcmFpcyBwYXJhIGNvbmNlZGVyIMOgIFVuaXZlcnNpZGFkZSBQcmVzYml0ZXJpYW5hIE1hY2tlbnppZSBvcyBkaXJlaXRvcyBhcHJlc2VudGFkb3MgbmVzdGEgbGljZW7Dp2EsIGUgcXVlIGVzc2UgbWF0ZXJpYWwgZGUgcHJvcHJpZWRhZGUgZGUgdGVyY2Vpcm9zIGVzdMOhIGNsYXJhbWVudGUgaWRlbnRpZmljYWRvIGUgcmVjb25oZWNpZG8gbm8gdGV4dG8gb3Ugbm8gY29udGXDumRvIGRvIHNldSB0cmFiYWxobyBvcmEgZGVwb3NpdGFkby4KPGJyPjxicj4KQ0FTTyBPIFRSQUJBTEhPIE9SQSBERVBPU0lUQURPIFRFTkhBIFNJRE8gUkVTVUxUQURPIERFIFVNIFBBVFJPQ8ONTklPIE9VIEFQT0lPIERFIFVNQSBBR8OKTkNJQSBERSBGT01FTlRPIE9VIE9VVFJPIE9SR0FOSVNNTyBRVUUgTsODTyBTRUpBIEEgVU5JVkVSU0lEQURFIFBSRVNCSVRFUklBTkEgTUFDS0VOWklFLCBWT0PDiiBERUNMQVJBIFFVRSBSRVNQRUlUT1UgVE9ET1MgRSBRVUFJU1FVRVIgRElSRUlUT1MgREUgUkVWSVPDg08gQ09NTyBUQU1Cw4lNIEFTIERFTUFJUyBPQlJJR0HDh8OVRVMgRVhJR0lEQVMgUE9SIENPTlRSQVRPIE9VIEFDT1JETy4KPGJyPjxicj4KQSBVbml2ZXJzaWRhZGUgUHJlc2JpdGVyaWFuYSBNYWNrZW56aWUgc2UgY29tcHJvbWV0ZSBhIGlkZW50aWZpY2FyIGNsYXJhbWVudGUgbyBzZXUgbm9tZSAocykgb3UgbyhzKSBub21lKHMpIGRvKHMpIGRldGVudG9yKGVzKSBkb3MgZGlyZWl0b3MgYXV0b3JhaXMgZG8gc2V1IHRyYWJhbGhvLCBlIG7Do28gZmFyw6EgcXVhbHF1ZXIgYWx0ZXJhw6fDo28sIGFsw6ltIGRhcXVlbGFzIGNvbmNlZGlkYXMgcG9yIGVzdGEgbGljZW7Dp2EuCg==
dc.title.none.fl_str_mv Estudo de técnicas de phishing: métodos de ataque e estratégias de defesa
title Estudo de técnicas de phishing: métodos de ataque e estratégias de defesa
spellingShingle Estudo de técnicas de phishing: métodos de ataque e estratégias de defesa
Bezerra, Paloma de Sousa
phishing
segurança cibernética
engenharia social
malware
phishing
cybersecurity
social engineering
malware
title_short Estudo de técnicas de phishing: métodos de ataque e estratégias de defesa
title_full Estudo de técnicas de phishing: métodos de ataque e estratégias de defesa
title_fullStr Estudo de técnicas de phishing: métodos de ataque e estratégias de defesa
title_full_unstemmed Estudo de técnicas de phishing: métodos de ataque e estratégias de defesa
title_sort Estudo de técnicas de phishing: métodos de ataque e estratégias de defesa
author Bezerra, Paloma de Sousa
author_facet Bezerra, Paloma de Sousa
Millian, Lucca Eiki Amarante
author_role author
author2 Millian, Lucca Eiki Amarante
author2_role author
dc.contributor.author.fl_str_mv Bezerra, Paloma de Sousa
Millian, Lucca Eiki Amarante
dc.contributor.advisor1.fl_str_mv Silva, Rodrigo Cardoso
contributor_str_mv Silva, Rodrigo Cardoso
dc.subject.por.fl_str_mv phishing
segurança cibernética
engenharia social
malware
phishing
cybersecurity
social engineering
malware
topic phishing
segurança cibernética
engenharia social
malware
phishing
cybersecurity
social engineering
malware
description Indicado para publicação.
publishDate 2024
dc.date.issued.fl_str_mv 2024-12-08
dc.date.accessioned.fl_str_mv 2025-03-15T16:51:53Z
dc.date.available.fl_str_mv 2025-03-15T16:51:53Z
dc.type.status.fl_str_mv info:eu-repo/semantics/publishedVersion
dc.type.driver.fl_str_mv info:eu-repo/semantics/bachelorThesis
format bachelorThesis
status_str publishedVersion
dc.identifier.uri.fl_str_mv https://dspace.mackenzie.br/handle/10899/40150
url https://dspace.mackenzie.br/handle/10899/40150
dc.language.iso.fl_str_mv por
language por
dc.rights.driver.fl_str_mv info:eu-repo/semantics/openAccess
eu_rights_str_mv openAccess
dc.publisher.none.fl_str_mv Universidade Presbiteriana Mackenzie
publisher.none.fl_str_mv Universidade Presbiteriana Mackenzie
dc.source.none.fl_str_mv reponame:Repositório Digital do Mackenzie
instname:Universidade Presbiteriana Mackenzie (MACKENZIE)
instacron:MACKENZIE
instname_str Universidade Presbiteriana Mackenzie (MACKENZIE)
instacron_str MACKENZIE
institution MACKENZIE
reponame_str Repositório Digital do Mackenzie
collection Repositório Digital do Mackenzie
bitstream.url.fl_str_mv https://dspace.mackenzie.br/bitstreams/ea3bb8ff-17a5-4439-b98b-43725da49698/download
https://dspace.mackenzie.br/bitstreams/c162b0bd-2765-46c5-a8b5-570609fe77b4/download
https://dspace.mackenzie.br/bitstreams/dac69a63-1f5a-4526-89d6-90d64a6b6eb0/download
https://dspace.mackenzie.br/bitstreams/abcb67db-6399-459c-a954-5b0b566fac4b/download
bitstream.checksum.fl_str_mv 8a991882bf439cdceade314ff67923a8
f0d4931322d30f6d2ee9ebafdf037c16
d80e7786012179c81ef701016f8132b3
9f241d3f6fa754d0ec7bfbd3bd8ff9d3
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
MD5
MD5
repository.name.fl_str_mv Repositório Digital do Mackenzie - Universidade Presbiteriana Mackenzie (MACKENZIE)
repository.mail.fl_str_mv repositorio@mackenzie.br||paola.damato@mackenzie.br
_version_ 1829412156526821376