Social Engineering refers to the set of activities that have the objective of manipulating human beings through deception with the sole purpose of obtaining private access or confidential information from the same people, companies. This study aims to determine in Social engineering, methodologies to counter computer attacks on the web in the Barrio 26 de Septiembre, Portoviejo, Ecuador. With the research carried out and what is currently experienced, it can be said that it is increasingly common to be a victim of computer attacks by Social Engineering, which is characterized by studying the exploitation of user trust to extract confidential information, The purpose of these techniques is to achieve the infiltration of people into organizations, homes, or any other place; also identity theft through deception, in order to seize information or data at your convenience. This research shows its importance within the branch of computer security, it is raised through a systematic review on Social Engineering. For the elaboration of this work, a Quantitative, Analytical, Descriptive and Bibliographical methodology was chosen; For the collection of information, a survey was applied to residents of the 26 de Septiembre neighborhood to find out what knowledge they have regarding Social Engineering, taking into consideration various aspects, such as: management of credentials, types of portals or applications that they use, information that is requested the most on web pages, configuration of smart equipment (laptops, mobile devices and desktop computers). As a result, it was possible to know that the majority of the people surveyed are unaware of Social Engineering techniques, therefore, they do not know what to do and how to act in case of an attack, therefore, a list with preventive methodologies that allow the user to identify malicious computer attacks. In conclusion, it was established that the methodologies that allow to mitigate and counteract computer attacks have to do with the development of security policies and plans, computer security training, Backup's or Security Copies of personal information, a correct authentication of the information when entering a website, as well as the periodic update of devices. [ABSTRACT FROM AUTHOR]