Cyber threats
DOI:
https://doi.org/10.5281/zenodo.6998468Keywords:
Cyberspace, Cyberattack, CybersecurityAbstract
The "Cyberspace" is a community where millions of users called "Netizens" navigate and interact through various economic, social and educational models, among others, to meet their needs through products and / or services offered in this community, the gains in Mexico under this heading exceed one trillion dollars, quickly becoming a "modus vivendi" for both companies and users. Therefore as all global community has also allowed the creation of "cyber criminals" who want to be part of the profits generated, trying to get them in breach of the "cyber security" through information technology, infrastructure created in this "cyberspace", managing to keep a "threat Cybernetics" constant, where secondsecond attacks trying to get made "profits" product users through hardware and specialized software or "social engineering". This community has also been organized to prevent or mitigate these "Cyber Threats" getting legislate, organize and regulate safety in the use of information technology and communication used.
Metrics
References
AMIPCI. (2015). "COMERCIO ELECTRÓNICO". Recuperado el OCTUBRE de 2016, de https://amipci.org.mx/estudios/comercio_electronico/Estudio_de_Comercio_Electronico_AMIPCI_2015_version_publica.pdf
Ciberseguridad, O. d. (2016). Ciberseguridad ¿Estamos preparados en América Latina y el caribe?. Recuperado el Octubre de 2016
CNN, E. e. (Septiembre de 2014). El 'hackeo' a Yahoo tendrá repercusiones durante años: expertos. Recuperado el Octubre de 2016, de http://expansion.mx/tecnologia/2016/09/23/el-hackeo-a-yahoo-tendrarepercusiones-durante-anos-expertos
Colarebointernacional. (Octubre de 2016). ¿Qué es un ataque de denegación de servicio?. Recuperado el Octubre de 2016, de https://colarebointernacional.wordpress.com/2016/10/22/que-es-un-ataquede-denegacion-de-servicio/
CONDUSEF. (12 de OCTUBRE de 2016). PROTEJA SU DINERO. Obtenido de http://www.condusef.gob.mx/Revista/index.php/usuario-inteligente/consejosde-seguridad/563-robo-de-identidad
Economista, E. (Agosto de 2016). Ciberataques en México cuestan 24 millones de dólares al año: Lockton. Recuperado el Octubre de 2016, de http://eleconomista.com.mx/finanzas-publicas/2016/08/18/ciberataquesmexico-cuestan-24-millones-dolares-ano-lockton
Excelsior. (Junio de 2016). De nuevo hackean fotos de Scarlett Johansson al desnudo. Recuperado el Octubre de 2016, de http://www.excelsior.com.mx/funcion/2016/06/01/1096106
ITU, U. I. (Noviembre de 2010). Unión Internacional de Telecomunicaciones. Recuperado el 10 de Octubre de 2016, de http://www.itu.int/net/itunews/issues/2010/09/20-es.aspx
Merca2.0. (13 de Mayo de 2014). 5 amenazas que acechan en los videojuegos. Recuperado el Octubre de 2016, de http://www.merca20.com/5-amenazassobre-los-juegos-online/
México, E. S. (Marzo de 2016). Hackearon página del SAT; Anonymous se adjudica el ataque. Recuperado el Octubre de 2016, de https://www.elsoldemexico.com.mx/mexico/157113-anonymous-mexicohackea-el-sitio-web-del-sat
Osigma. (Diciembre de 2011). Observatorio Nacional de las Redes Sociales y de las SI. Recuperado el Octubre de 2016, de Observatorio Nacional de las Redes Sociales y de las SI: http://www.osimga.gal/export/sites/osimga/gl/documentos/d/20111201_ontsiredes_sociais.pdf
Symantec. (Abril de 2016). Publicaciones de Security Response. Recuperado el Octubre de 2016, de https://www.symantec.com/es/mx/security_response/publications/threatreport.jsp
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
This journal adheres to the Creative Commons license in the definition of its policy of open access and reuse of published material, in the following terms:
- Accessibility to articles and other publications in whole or in part under the concept of copying, distribution, public communication , interactive access (through the Internet or other means), explicitly maintaining the recognition of the author or authors and the journal itself (authorship acknowledgment).
- Warning that if the articles are remixed, modified or fragments used in other creations, the modified material cannot be distributed, nor is it allowed to reconstruct versions from the original published articles (derived works).
- The use of the contents of the published articles, in whole or in part, for profit (non-commercial recognition) is prohibited.
The author retains copyright, transfers or grants exclusive commercial rights to the publisher, and a non-commercial license is used.