The study of computer security entails acquiring knowledge about and categorizing the most common infection propagation techniques, as well as understanding the exploitation of security vulnerabilities, both local and remote. It is essential to understand the main software exploitation mechanisms, such as stack and buffer overflows, as well as heap overflows. Additionally, software and hardware infection techniques should be investigated to be prepared for potential attacks. Finally, being aware of the main attacks resulting from social engineering is crucial, as these can compromise the security of computer systems.
At the end of this module, the student should be able to:
Identify and categorize the most commonly used infection propagation techniques.
Understand the exploitation of security vulnerabilities that compromise computer systems, encompassing both local and remote exploits.
Understand the main mechanisms for exploiting software vulnerabilities, including stack/buffer overflow, as well as heap overflow.
Recognize common software and hardware infection techniques.
Identify the principal attacks derived from social engineering.
- R. Zieni, L. Massari and M. C. Calzarossa, "Phishing or Not Phishing? A Survey on the Detection of Phishing Websites," in IEEE Access, vol. 11, pp. 18499-18519, 2023, doi: 10.1109/ACCESS.2023.3247135. Electronic ISSN: 2169-3536
- Anti-Phishing Working Group. APWG. Phishing activity trends reports. https://apwg.org/trendsreports/
- Anti-Phishing Working Group. APWG. Phishing Activity Trends Report 4th Quarter 2023. https://docs.apwg.org/reports/apwg_trends_report_q4_2023.pdf?_gl=1*2d3izn*_ga*MTQ0MTI4MDUxNy4xNzEwNDMwMzA4*_ga_55RF0RHXSR*MTcxMDQzMzIyMy4yLjEuMTcxMDQzMzY3NS4wLjAuMA.
- Making the world’s information safely accesible. Safe Browsing – Google Safe Browsing. https://safebrowsing.google.com/
- PhishTank. Join the fight against phishing. Collaborative anti-phishing platform with open API. https://www.phishtank.com/
- M. Mena Roa. "Hackeo en Twitter: Los famosos víctimas del hackeo masivo en Twitter," in Statista (julio 2020). https://es.statista.com/grafico/22294/numero-de-seguidores-de-las-cuentas-de-twitter-mas-populares-hackeadas/