Kategorier: Alla - phishing - suplantación

av FRINE PEÑA OLMEDO för 1 år sedan

242

PHISHING

El phishing es una técnica utilizada por ciberdelincuentes para obtener información personal y confidencial de manera fraudulenta. Existen diferentes tipos de ataques de phishing, cada uno con sus propias características y métodos.

PHISHING

Mer av detta

Prevención de Delitos Informáticos
CAMILO GARRIDO SEQUERA

Prevención de Delitos Informáticos

av CAMILO GARRIDO SEQUERA

Importancia de crear contraseñas seguras y evaluarlas
Rubén Arellano Cintado

Importancia de crear contraseñas seguras y evaluarlas

av Rubén Arellano Cintado

seguridad informatica y ciberseguridad


.monica-writing-entry-btn {
  position: absolute;
  right: 1px;
  bottom: 1px;
  pointer-events: all;
  cursor: pointer;
  user-select: none;
  -webkit-user-drag: none;
  display: flex;
  flex-direction: row;
  justify-content: center;
  align-items: center;
  background: transparent;
  transition: all ease 0.2s;
  border-radius: 20px;
  border: 1px solid transparent;
}
.monica-writing-clickable-item {
  cursor: pointer;
  user-select: none;
  -webkit-user-drag: none;
  display: flex;
  flex-direction: row;
  justify-content: center;
  align-items: center;
  padding: 0 4px;
  height: 26px;
  color: #a0a0a0;
}
.monica-writing-clickable-item.monica-writing-first {
  border-top-left-radius: 20px;
  border-bottom-left-radius: 20px;
}
.monica-writing-clickable-item.monica-writing-last {
  border-top-right-radius: 20px;
  border-bottom-right-radius: 20px;
}
.monica-writing-clickable-item:hover {
  color: #3872e0;
}
.monica-writing-divider {
  background-color: #eeeeee;
  min-width: 1px;
  height: 12px;
}

.monica-writing-entry-btn:hover {
  background: #ffffff;
  border: 1px solid rgba(115, 114, 120, 0.15);
}

.monica-writing-caret {
  width: 1.5px;
  background-color: #3872e0;
  pointer-events: none;
  position: absolute;
  border-radius: 1px;
}
.monica-writing-caret-head {
  background-color: #3872e0;
  width: 6px;
  height: 6px;
  border-radius: 6px;
  position: absolute;
  left: -2.25px;
}
@media print {
  .monica-writing-entry-btn {
    display: none;
  }
}
LUCIA VALERIA DAVILA NUÑEZ

seguridad informatica y ciberseguridad .monica-writing-entry-btn { position: absolute; right: 1px; bottom: 1px; pointer-events: all; cursor: pointer; user-select: none; -webkit-user-drag: none; display: flex; flex-direction: row; justify-content: center; align-items: center; background: transparent; transition: all ease 0.2s; border-radius: 20px; border: 1px solid transparent; } .monica-writing-clickable-item { cursor: pointer; user-select: none; -webkit-user-drag: none; display: flex; flex-direction: row; justify-content: center; align-items: center; padding: 0 4px; height: 26px; color: #a0a0a0; } .monica-writing-clickable-item.monica-writing-first { border-top-left-radius: 20px; border-bottom-left-radius: 20px; } .monica-writing-clickable-item.monica-writing-last { border-top-right-radius: 20px; border-bottom-right-radius: 20px; } .monica-writing-clickable-item:hover { color: #3872e0; } .monica-writing-divider { background-color: #eeeeee; min-width: 1px; height: 12px; } .monica-writing-entry-btn:hover { background: #ffffff; border: 1px solid rgba(115, 114, 120, 0.15); } .monica-writing-caret { width: 1.5px; background-color: #3872e0; pointer-events: none; position: absolute; border-radius: 1px; } .monica-writing-caret-head { background-color: #3872e0; width: 6px; height: 6px; border-radius: 6px; position: absolute; left: -2.25px; } @media print { .monica-writing-entry-btn { display: none; } }

av LUCIA VALERIA DAVILA NUÑEZ

CISCO 12  SEGURIDAD
fabiola arana

CISCO 12 SEGURIDAD

av fabiola arana

PHISHING

¿COMO PREVENIR LOS ATAQUES?

Tipos

Qrshing
Vishing
Spear phishing
SIM swapping
Pharming
Whishing
Smishing
Whaling

¿QUE ES PHISHING?

Suplantación de identidad