Estudo de técnicas de phishing: métodos de ataque e estratégias de defesa
Main Author: | |
---|---|
Publication Date: | 2024 |
Other Authors: | |
Format: | Bachelor thesis |
Language: | por |
Source: | Repositório Digital do Mackenzie |
Download full: | https://dspace.mackenzie.br/handle/10899/40150 |
Summary: | Indicado para publicação. |
id |
UPM_fd3fd07e85fc71fa89b091c52fb186cc |
---|---|
oai_identifier_str |
oai:dspace.mackenzie.br:10899/40150 |
network_acronym_str |
UPM |
network_name_str |
Repositório Digital do Mackenzie |
repository_id_str |
10277 |
spelling |
Bezerra, Paloma de SousaMillian, Lucca Eiki AmaranteSilva, Rodrigo Cardoso2025-03-15T16:51:53Z2025-03-15T16:51:53Z2024-12-08Indicado para publicação.Phishing é um tipo de ataque cibernético que envolve a tentativa de obter informações confidenciais, geralmente por e-mail ou mensagens fraudulentas. Este trabalho realiza um estudo sobre as técnicas de Phishing, suas implicações e as estratégias de defesa. A pesquisa abrange os diferentes métodos utilizados por atacantes em ataques de Phishing, destacando as situações em que cada tipo de ataque é empregado, o impacto causado tanto em empresas quanto em usuários comuns, formas de prevenção mais utilizadas e, apresenta também, uma simulação de ataques do tipo e-mail phishing. Foi observado que, mesmo com o crescimento de ferramentas de segurança cibernética e conscientização sobre esse tipo de ataque, ainda é um elemento muito utilizado por criminosos para a coleta de dados e aplicação de golpesPhishing is a type of cyberattack that involves attempting to obtain confidential information, usually through fraudulent emails or messages. This work explores phishing techniques, their implications, and defense strategies. The research covers the different methods used by cybercriminals in phishing attacks highlighting the situations in which each type of attack is employed, the impact caused on both companies and ordinary users, the most used prevention methods and includes a simulation of e-mail phishing attacks. It has been observed that, despite the growth of cybersecurity tools and awareness about this type of attack, it is still a widely used element by criminals for data collection and the execution of scams.https://dspace.mackenzie.br/handle/10899/40150Universidade Presbiteriana Mackenziephishingsegurança cibernéticaengenharia socialmalwarephishingcybersecuritysocial engineeringmalwareEstudo de técnicas de phishing: métodos de ataque e estratégias de defesainfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/bachelorThesisporreponame:Repositório Digital do Mackenzieinstname:Universidade Presbiteriana Mackenzie (MACKENZIE)instacron:MACKENZIEinfo:eu-repo/semantics/openAccessFaculdade de Computação e Informática (FCI)ORIGINALtcc_artigo -Lucca Eiki Amarante Millian1.pdftcc_artigo -Lucca Eiki Amarante Millian1.pdfapplication/pdf826529https://dspace.mackenzie.br/bitstreams/ea3bb8ff-17a5-4439-b98b-43725da49698/download8a991882bf439cdceade314ff67923a8MD51LICENSElicense.txtlicense.txttext/plain; charset=utf-82269https://dspace.mackenzie.br/bitstreams/c162b0bd-2765-46c5-a8b5-570609fe77b4/downloadf0d4931322d30f6d2ee9ebafdf037c16MD52TEXTtcc_artigo -Lucca Eiki Amarante Millian1.pdf.txttcc_artigo -Lucca Eiki Amarante Millian1.pdf.txtExtracted texttext/plain55280https://dspace.mackenzie.br/bitstreams/dac69a63-1f5a-4526-89d6-90d64a6b6eb0/downloadd80e7786012179c81ef701016f8132b3MD53THUMBNAILtcc_artigo -Lucca Eiki Amarante Millian1.pdf.jpgtcc_artigo -Lucca Eiki Amarante Millian1.pdf.jpgGenerated Thumbnailimage/jpeg4769https://dspace.mackenzie.br/bitstreams/abcb67db-6399-459c-a954-5b0b566fac4b/download9f241d3f6fa754d0ec7bfbd3bd8ff9d3MD5410899/401502025-03-16 03:00:14.923oai:dspace.mackenzie.br:10899/40150https://dspace.mackenzie.brBiblioteca Digital de Teses e Dissertaçõeshttp://tede.mackenzie.br/jspui/PRIhttps://adelpha-api.mackenzie.br/server/oai/repositorio@mackenzie.br||paola.damato@mackenzie.bropendoar:102772025-04-14T16:34:11.214084Repositório Digital do Mackenzie - Universidade Presbiteriana Mackenzie (MACKENZIE)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 |
dc.title.none.fl_str_mv |
Estudo de técnicas de phishing: métodos de ataque e estratégias de defesa |
title |
Estudo de técnicas de phishing: métodos de ataque e estratégias de defesa |
spellingShingle |
Estudo de técnicas de phishing: métodos de ataque e estratégias de defesa Bezerra, Paloma de Sousa phishing segurança cibernética engenharia social malware phishing cybersecurity social engineering malware |
title_short |
Estudo de técnicas de phishing: métodos de ataque e estratégias de defesa |
title_full |
Estudo de técnicas de phishing: métodos de ataque e estratégias de defesa |
title_fullStr |
Estudo de técnicas de phishing: métodos de ataque e estratégias de defesa |
title_full_unstemmed |
Estudo de técnicas de phishing: métodos de ataque e estratégias de defesa |
title_sort |
Estudo de técnicas de phishing: métodos de ataque e estratégias de defesa |
author |
Bezerra, Paloma de Sousa |
author_facet |
Bezerra, Paloma de Sousa Millian, Lucca Eiki Amarante |
author_role |
author |
author2 |
Millian, Lucca Eiki Amarante |
author2_role |
author |
dc.contributor.author.fl_str_mv |
Bezerra, Paloma de Sousa Millian, Lucca Eiki Amarante |
dc.contributor.advisor1.fl_str_mv |
Silva, Rodrigo Cardoso |
contributor_str_mv |
Silva, Rodrigo Cardoso |
dc.subject.por.fl_str_mv |
phishing segurança cibernética engenharia social malware phishing cybersecurity social engineering malware |
topic |
phishing segurança cibernética engenharia social malware phishing cybersecurity social engineering malware |
description |
Indicado para publicação. |
publishDate |
2024 |
dc.date.issued.fl_str_mv |
2024-12-08 |
dc.date.accessioned.fl_str_mv |
2025-03-15T16:51:53Z |
dc.date.available.fl_str_mv |
2025-03-15T16:51:53Z |
dc.type.status.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
dc.type.driver.fl_str_mv |
info:eu-repo/semantics/bachelorThesis |
format |
bachelorThesis |
status_str |
publishedVersion |
dc.identifier.uri.fl_str_mv |
https://dspace.mackenzie.br/handle/10899/40150 |
url |
https://dspace.mackenzie.br/handle/10899/40150 |
dc.language.iso.fl_str_mv |
por |
language |
por |
dc.rights.driver.fl_str_mv |
info:eu-repo/semantics/openAccess |
eu_rights_str_mv |
openAccess |
dc.publisher.none.fl_str_mv |
Universidade Presbiteriana Mackenzie |
publisher.none.fl_str_mv |
Universidade Presbiteriana Mackenzie |
dc.source.none.fl_str_mv |
reponame:Repositório Digital do Mackenzie instname:Universidade Presbiteriana Mackenzie (MACKENZIE) instacron:MACKENZIE |
instname_str |
Universidade Presbiteriana Mackenzie (MACKENZIE) |
instacron_str |
MACKENZIE |
institution |
MACKENZIE |
reponame_str |
Repositório Digital do Mackenzie |
collection |
Repositório Digital do Mackenzie |
bitstream.url.fl_str_mv |
https://dspace.mackenzie.br/bitstreams/ea3bb8ff-17a5-4439-b98b-43725da49698/download https://dspace.mackenzie.br/bitstreams/c162b0bd-2765-46c5-a8b5-570609fe77b4/download https://dspace.mackenzie.br/bitstreams/dac69a63-1f5a-4526-89d6-90d64a6b6eb0/download https://dspace.mackenzie.br/bitstreams/abcb67db-6399-459c-a954-5b0b566fac4b/download |
bitstream.checksum.fl_str_mv |
8a991882bf439cdceade314ff67923a8 f0d4931322d30f6d2ee9ebafdf037c16 d80e7786012179c81ef701016f8132b3 9f241d3f6fa754d0ec7bfbd3bd8ff9d3 |
bitstream.checksumAlgorithm.fl_str_mv |
MD5 MD5 MD5 MD5 |
repository.name.fl_str_mv |
Repositório Digital do Mackenzie - Universidade Presbiteriana Mackenzie (MACKENZIE) |
repository.mail.fl_str_mv |
repositorio@mackenzie.br||paola.damato@mackenzie.br |
_version_ |
1829412156526821376 |