PPG.EGPSA/ITEGAM

URI permanente desta comunidadehttps://rigalileo.itegam.org.br/handle/123456789/1

A comunidade dispõe da produção técnica e científica do Programa de Pós-graduação em Engenharia, Gestão de Processos, Sistema e Ambiental (PPG.EGPSA) do Instituto de Tecnologia e Educação Galileo da Amazônia (ITEGAM), fruto da atividade de pesquisa e desenvolvimento (P&D). É possível acessar os trabalhos de conclusão do programa de pós-graduação, artigos e livros vinculados a pesquisa, desenvolvimento, inovação e extensão.

Navegar

Resultados da Pesquisa

Agora exibindo 1 - 2 de 2
  • Imagem de Miniatura
    Item
    DESENVOLVIMENTO DE SMARTS CONTRACTS E TOKENS NA REDE ETHEREUM
    (Instituto de Tecnologia e Educação Galileo da Amazônia, 2023) ALENCAR, David Barbosa de; LEITE, Jandecy Cabral
    This article explores the development of smart contracts and tokens on the Ethereum network, highlighting the benefits of automation of agreements, elimination of intermediaries, transparency, and security provided by blockchain technology. Challenges such as scalability, privacy, and security are discussed, along with the possibilities of building innovative decentralized applications. The research adopted an approach of collecting primary and secondary data, including interviews with experts and analysis of existing smart contracts.
  • Imagem de Miniatura
    Item
    WIRELESS – ANÁLISE DE VULNERABILIDADES EM REDES DE COMPUTADORES SEM FIO EM UMA EMPRESA DO POLO DUAS RODAS
    (Instituto de Tecnologia e Educação Galileo da Amazônia, 2023) ALENCAR, David Barbosa de; LEITE, Jandecy Cabral
    This article highlights the importance of analyzing vulnerabilities in wireless computer networks to ensure information security and data protection in a specific company. During the project, several vulnerabilities were identified, such as inadequate security configurations, lack of strong authentication, use of outdated encryption protocols, and absence of network segregation. These vulnerabilities represent significant risks to the integrity, confidentiality, and availability of data transmitted and stored in wireless networks. However, through the implementation of appropriate mitigation measures, it is possible to strengthen the security of wireless networks and reduce these risks. It is recommended to update security configurations, such as changing default passwords, using strong encryption, and adopting multi-factor authentication. Additionally, network segregation is essential to protect the internal network against unauthorized access. By following these measures, the company will strengthen the security of its wireless networks, ensuring data protection, information privacy, and business continuity. It is important to emphasize that vulnerability analysis in wireless networks should be an ongoing process, adapting to new threats and technologies, to ensure continuous network security and the protection of the company's information assets.