{"id":17558,"date":"2023-03-14T08:36:21","date_gmt":"2023-03-14T07:36:21","guid":{"rendered":"https:\/\/agora.xtec.cat\/inslacetania\/?p=17558"},"modified":"2023-03-14T08:36:21","modified_gmt":"2023-03-14T07:36:21","slug":"estudi-controlat-de-phishing-i-ciberseguretat","status":"publish","type":"post","link":"https:\/\/agora.xtec.cat\/inslacetania\/general\/estudi-controlat-de-phishing-i-ciberseguretat\/","title":{"rendered":"Estudi controlat de phishing i ciberseguretat"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p>En el marc del curs d\u2019especialitzaci\u00f3 de <a href=\"https:\/\/agora.xtec.cat\/inslacetania\/fp\/cursos-despecialitzacio-dfp\/cefp-en-ciberseguretat-en-entorns-de-les-tecnologies-de-la-informacio-ic01\/\">Ciberseguretat en Entorns de les Tecnologies de la Informaci\u00f3<\/a> (CETI), l&#8217;alumne Mart\u00ed Pons Roca ha dut a terme un atac controlat de <a href=\"https:\/\/www.incibe.es\/protege-tu-empresa\/tematicas\/phishing\">phishing<\/a> per analitzar i validar el comportament dels usuaris davant d&#8217;una situaci\u00f3 d&#8217;aquest tipus. S&#8217;ha fet a trav\u00e9s d&#8217;un correu electr\u00f2nic on s&#8217;afirmava que les contrasenyes de l&#8217;usuari havien quedat exposades a internet i que era necessari actualitzar-les immediatament per evitar danys majors.<\/p>\n<p>S&#8217;ha enviat de forma controlada a una llista acotada de destinataris. En total s&#8217;han enviat 200 correus, dels quals 90 s&#8217;han obert, i d&#8217;aquests, un total de 61 han caigut en el fals parany proporcionant les seves dades tot i que aquestes no han estat registrades. L&#8217;atac s&#8217;ha preparat de forma intencionada, tal com s&#8217;acostuma a veure amb situacions d&#8217;aquests tipus, fent que el disseny i format de la notificaci\u00f3 s&#8217;assimil\u00e9s a casos habituals i cre\u00efbles, donant-li legitimitat i veracitat. El mateix Mart\u00ed s&#8217;ha encarregat de preparar i desenvolupar el codi i infraestructures necess\u00e0ries per dur-ho a terme de manera aut\u00f2noma, demostrant aix\u00ed les capacitats i coneixements adquirits pr\u00e8viament i durant el mateix curs.<\/p>\n<p>La formaci\u00f3 en ciberseguretat inform\u00e0tica \u00e9s una eina b\u00e0sica i molt valuosa perqu\u00e8 tant institucions com empreses en general puguin realitzar experiments similars i obtenir estad\u00edstiques sobre la conscienciaci\u00f3 en ciberseguretat dels seus usuaris i ser conscients de les vies a treballar des del punt de vista de la formaci\u00f3 i la ciberseguretat. Un cop finalitzat l&#8217;experiment, en Mart\u00ed va realitzar una xerrada per a conscienciar sobre la import\u00e0ncia de la ciberseguretat inform\u00e0tica com a eina preventiva i proactiva, aix\u00ed com l&#8217;actualitzaci\u00f3 constant requerida per evitar ser-ne v\u00edctimes mitjan\u00e7ant les pr\u00e0ctiques i t\u00e8cniques adequades.<\/p>\n<p>Tamb\u00e9 s&#8217;ha fet ress\u00f2 de la not\u00edcia a trav\u00e9s de diversos mitjans digitals. Podeu trobar-ho als seg\u00fcents enlla\u00e7os del <a href=\"https:\/\/www.regio7.cat\/fet-divers\/2023\/03\/10\/estudiant-manresa-posa-prova-ciberseguretat-84442556.html\">Regi\u00f3 7<\/a> i <a href=\"https:\/\/www.naciodigital.cat\/manresa\/noticia\/108340\/atac-phishing-institut-lacetania\">Naci\u00f3 Digital<\/a>.<\/p>\n<figure id=\"attachment_17563\" aria-describedby=\"caption-attachment-17563\" style=\"width: 673px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/agora.xtec.cat\/inslacetania\/wp-content\/uploads\/usu1045\/2023\/03\/marti-ceti.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-17563\" src=\"https:\/\/agora.xtec.cat\/inslacetania\/wp-content\/uploads\/usu1045\/2023\/03\/marti-ceti-1024x768.jpg\" alt=\"Mart\u00ed Pons al CETI\" width=\"673\" height=\"505\" srcset=\"https:\/\/agora.xtec.cat\/inslacetania\/wp-content\/uploads\/usu1045\/2023\/03\/marti-ceti-1024x768.jpg 1024w, https:\/\/agora.xtec.cat\/inslacetania\/wp-content\/uploads\/usu1045\/2023\/03\/marti-ceti-300x225.jpg 300w, https:\/\/agora.xtec.cat\/inslacetania\/wp-content\/uploads\/usu1045\/2023\/03\/marti-ceti-768x576.jpg 768w, https:\/\/agora.xtec.cat\/inslacetania\/wp-content\/uploads\/usu1045\/2023\/03\/marti-ceti-200x150.jpg 200w, https:\/\/agora.xtec.cat\/inslacetania\/wp-content\/uploads\/usu1045\/2023\/03\/marti-ceti.jpg 1210w\" sizes=\"auto, (max-width: 673px) 100vw, 673px\" \/><\/a><figcaption id=\"caption-attachment-17563\" class=\"wp-caption-text\">Mart\u00ed Pons Roca, presentant els resultats de l&#8217;estudi<\/figcaption><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; En el marc del curs d\u2019especialitzaci\u00f3 de Ciberseguretat en Entorns de les Tecnologies de la Informaci\u00f3 (CETI), l&#8217;alumne Mart\u00ed Pons Roca ha dut a terme un atac controlat de phishing per analitzar i validar el comportament dels usuaris davant d&#8217;una situaci\u00f3 d&#8217;aquest tipus. S&#8217;ha fet a trav\u00e9s d&#8217;un correu electr\u00f2nic on s&#8217;afirmava que les [&hellip;]<\/p>\n","protected":false},"author":1050,"featured_media":17563,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[1,173,29],"tags":[804,803,802,805,157],"class_list":["post-17558","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","category-inf","category-portada","tag-ce","tag-ceti","tag-ciberseguretat","tag-curs-especialitzacio","tag-fp"],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/agora.xtec.cat\/inslacetania\/wp-json\/wp\/v2\/posts\/17558","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/agora.xtec.cat\/inslacetania\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/agora.xtec.cat\/inslacetania\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/agora.xtec.cat\/inslacetania\/wp-json\/wp\/v2\/users\/1050"}],"replies":[{"embeddable":true,"href":"https:\/\/agora.xtec.cat\/inslacetania\/wp-json\/wp\/v2\/comments?post=17558"}],"version-history":[{"count":3,"href":"https:\/\/agora.xtec.cat\/inslacetania\/wp-json\/wp\/v2\/posts\/17558\/revisions"}],"predecessor-version":[{"id":17568,"href":"https:\/\/agora.xtec.cat\/inslacetania\/wp-json\/wp\/v2\/posts\/17558\/revisions\/17568"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/agora.xtec.cat\/inslacetania\/wp-json\/wp\/v2\/media\/17563"}],"wp:attachment":[{"href":"https:\/\/agora.xtec.cat\/inslacetania\/wp-json\/wp\/v2\/media?parent=17558"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/agora.xtec.cat\/inslacetania\/wp-json\/wp\/v2\/categories?post=17558"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/agora.xtec.cat\/inslacetania\/wp-json\/wp\/v2\/tags?post=17558"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}