Publicación:
Implementation of an Ethical Hacking Control Focused on Phishing to Optimize Computer Security in Credinka

dc.contributor.authorHuaylla, Annie
dc.contributor.authorCondori, Richard
dc.contributor.authorMolina, Pedro
dc.contributor.authorTicona, Wilfredo
dc.date.accessioned2025-08-11T16:43:49Z
dc.date.issued2024
dc.description.abstractOne of the main problems that exists in financial agencies is phishing attacks that have unauthorized access to technological systems. For this reason, the study conducted aimed to optimize computer security at the Credinka Agency. As a result, he met with agency officials to gather information on network security vulnerabilities. In which techniques related to the Information System Security Assessment Framework (ISSAF) methodology were conducted, where Pen testing procedures will be applied, which will help to know the most effective methods to detect vulnerabilities in the Agency's computer systems. Finally, the implementation of an ethical hacking control will be carried out in order to strengthen the technological infrastructure, in this way make employees aware of the risks that can be caused by cyberattacks. It is observed that the percentage of vulnerability decreased by 82% and 74% of workers are more prepared against hacking attacks. © 2024 IEEE.
dc.identifier.doi10.1109/Confluence60223.2024.10463306
dc.identifier.scopus2-s2.0-85190237416
dc.identifier.urihttps://cris.esan.edu.pe/handle/20.500.12640/668
dc.identifier.uuidb820cd83-9044-4ac6-8fdd-ae0ac6dd2b91
dc.language.isoen
dc.publisherInstitute of Electrical and Electronics Engineers Inc.
dc.relation.ispartofProceedings of the 14th International Conference on Cloud Computing, Data Science and Engineering, Confluence 2024
dc.rightshttp://purl.org/coar/access_right/c_14cb
dc.subjectbanking phishing
dc.subjectcrutches
dc.subjectethical hacking
dc.subjectphishing
dc.subjectsecurity
dc.subjectvulnerabilities
dc.subjectwebsites
dc.titleImplementation of an Ethical Hacking Control Focused on Phishing to Optimize Computer Security in Credinka
dc.typehttp://purl.org/coar/resource_type/c_5794
dspace.entity.typePublication
oaire.citation.endPage176
oaire.citation.startPage170

Archivos

Colecciones