Livros e capítulo
URI permanente para esta coleçãohttps://rigalileo.itegam.org.br/handle/123456789/6
Navegar
3 resultados
Resultados da Pesquisa
Item Desenvolvimento de Políticas de Segurança da Informação: Implementação de Políticas de Segurança da Informação em Organizações para Proteção de Dados e Informações Sensíveis(Instituto de Tecnologia e Educação Galileo da Amazônia, 2023) ALENCAR, David Barbosa de; LEITE, Jandecy CabralThis article discusses the importance of information security policies in protecting sensitive data and information in organizations. It highlights the need to implement clear and comprehensive policies that establish appropriate guidelines and procedures to protect information assets. Additionally, it discusses the relationship between the implementation of these policies and compliance with specific regulations and standards, avoiding legal and financial consequences resulting from security breaches. A case study in the financial sector demonstrates the improvement in data protection and compliance with regulations after the implementation of more comprehensive policies. Employee engagement and continuous policy evaluation are also addressed as key elements to strengthen the security culture.Item DESENVOLVIMENTO DE SMARTS CONTRACTS E TOKENS NA REDE ETHEREUM(Instituto de Tecnologia e Educação Galileo da Amazônia, 2023) ALENCAR, David Barbosa de; LEITE, Jandecy CabralThis article explores the development of smart contracts and tokens on the Ethereum network, highlighting the benefits of automation of agreements, elimination of intermediaries, transparency, and security provided by blockchain technology. Challenges such as scalability, privacy, and security are discussed, along with the possibilities of building innovative decentralized applications. The research adopted an approach of collecting primary and secondary data, including interviews with experts and analysis of existing smart contracts.Item WIRELESS – ANÁLISE DE VULNERABILIDADES EM REDES DE COMPUTADORES SEM FIO EM UMA EMPRESA DO POLO DUAS RODAS(Instituto de Tecnologia e Educação Galileo da Amazônia, 2023) ALENCAR, David Barbosa de; LEITE, Jandecy CabralThis article highlights the importance of analyzing vulnerabilities in wireless computer networks to ensure information security and data protection in a specific company. During the project, several vulnerabilities were identified, such as inadequate security configurations, lack of strong authentication, use of outdated encryption protocols, and absence of network segregation. These vulnerabilities represent significant risks to the integrity, confidentiality, and availability of data transmitted and stored in wireless networks. However, through the implementation of appropriate mitigation measures, it is possible to strengthen the security of wireless networks and reduce these risks. It is recommended to update security configurations, such as changing default passwords, using strong encryption, and adopting multi-factor authentication. Additionally, network segregation is essential to protect the internal network against unauthorized access. By following these measures, the company will strengthen the security of its wireless networks, ensuring data protection, information privacy, and business continuity. It is important to emphasize that vulnerability analysis in wireless networks should be an ongoing process, adapting to new threats and technologies, to ensure continuous network security and the protection of the company's information assets.