Computer Systems Security Management
Mostrando 1-8 de 8 artigos, teses e dissertações.
-
1. AutonomicSec: Um Mecanismo Autonômico para Segurança de Redes baseado em Decepção / AutonomicSec: A Autonomic Mechanism for Networks Security based on Deception
Security in computer networks is the area responsible for protecting the data passing through it. The research for better security strategies has increased considerably since exists a vast number of attempted attacks. These attacks have caused financial loss and reputation damage to companies, institutions and individuals. There are several obstacles to achi
IBICT - Instituto Brasileiro de Informação em Ciência e Tecnologia. Publicado em: 21/03/2012
-
2. Análise do uso de novas tecnologias na troca e armazenamento de informações de saúde e o segredo profissional / Analysis of the use of new technologies in the exchange and storage of health information and in relation to the professional secrecy
O caráter privativo das informações de saúde, reconhecido e valorizado desde a antigüidade clássica, hoje é considerado como um dos fatores indispensáveis à manutenção da sociedade, das garantias constitucionais de liberdade e também, em última instância, à própria democracia. Essa importância é demonstrada pela existência do segredo profi
Publicado em: 2010
-
3. A percepção gerencial sobre o modelo de gestão da segurança da informação de uma empresa pública de TIC: perspectiva de evolução para um modelo de governança
In the globalized world of information and communication technology (ICT), the threats to information systems and computer networks make information security a key element to competitive advantage in order to guarantee the success of both private and public organizations. In this context, security management takes on a key role in the strategy of risk recogn
Publicado em: 2007
-
4. Um portal para o P2PGrid
In the ongoing informatics context, applications oriented technologies that envisage computational power is leading to the Development of distributed cooperative and shared systems known as Computational Grid. The accelerated growing of Computer networks and its interconnecting communications means make viable the use of such systems that aims to occupy its
Publicado em: 2007
-
5. Framework de Kernel para um sistema de segurança imunologica
The alarming growth in the quantity and the sophistication of the attacks that threaten modem computer systems shows the need for new, more efticient security systems. In nature, there is a biological system that accomplishes this task with a remarkable efticiency: the human immune system. Not only this system is capable of assuring the survival of a human b
Publicado em: 2006
-
6. Gerenciamento baseado em modelos da configuração de sistemas de segurança em ambientes de redes complexos / Model-based configuration management of security systems in complex network environments
Os mecanismos de segurança empregados em ambientes de redes atuais têm complexidade crescente e o gerenciamento de suas configurações adquire um papel fundamental para proteção desses ambientes. Particularmente em redes de computadores de larga escala, os administradores de segurança se vêem confrontados com o desafio de projetar, implementar, manter
Publicado em: 2006
-
7. Policy Viewer : ferramenta para visualização de politicas de segurança em grafos / Policy Viewer: a tool for security policy visualization using graphs
The Internet brought great benefits to organizations and computer users, but has also caused a larger exposure of the computing systems connected to the network. Countless efforts are being made to contain the increasingly higher leveI of attacks that happen ali over the world, among which stands the development of safer operating systems. Un-fortunately, th
Publicado em: 2005
-
8. Segurança em processamento de dados / Data processing security
The business community and the Data Processing and Information Systems professionals are facing today a new kind of challenge: the Computer threat. The increasing number of installed computers and the large utilization of teleprocessing and networking techniques are pushing the organizations to be greatly dependent on the Information Processing Facility and
Publicado em: 1981