Ciência da Computação
URI Permanente desta comunidadehttps://repositorio.cesupa.br/handle/prefix/19
Navegar
Navegando Ciência da Computação por Orientador "Mendonça, Eudes Danilo da Silva"
Agora exibindo 1 - 3 de 3
- Resultados por página
- Opções de Ordenação
Item Uma análise comparativa em relação à criptografia nos bancos de dados Oracle e MySQL(Centro Universitário do Estado do Pará, 2023-12-07) Santos, Gabriel de Oliveira; Angelim, Isaac Ponte; Alencar, Ricardo Larrat Mota de; Lopes Junior, Samoel Vieira; Mendonça, Eudes Danilo da Silva; http://lattes.cnpq.br/1404209498845660; Elgrably, Isaac Souza; http://lattes.cnpq.br/7590598824563858; Gomes, Vitor Hugo Freitas; http://lattes.cnpq.br/5218954387107307In an increasingly digital and interconnected world, data security becomes imperative. In the business context, leaks and exposures of sensitive information pose significant threats to company databases. Encryption in databases emerges as an essential protection, ensuring confidentiality and integrity, crucial elements to prevent potential harm and ensure trust in data storage and management. This study conducts a literature review on encryption, highlighting its historical significance and objectives, such as information confidentiality and integrity. It explores the evolution of encryption, introducing Oracle and MySQL Database Management Systems, emphasizing the security features of both. During the research journey, different encryption techniques and security tools were found. The importance of encryption in protecting sensitive data is emphasized. The study contributes to understanding security practices in Oracle and MySQL, proving valuable for information security professionals.Item Análise e implementação da técnica de invasão Man-in-the-middle em redes sem fio IEEE 802.11 com a elaboração do relatório incidente(Centro Universitário do Estado do Pará, 2019) Castro, Filipe do Couto; Moraes, Lucas Davi Monteiro; Silva, Lucas Miguins da; Toutenge, Yussef Lobato; Mendonça, Eudes Danilo da SilvaAs technology advances, people become more susceptible to network intrusions, and the Manin-the-Middle invasion becomes extremely dangerous because of its ease of implementation. The purpose of this monograph is to create an incident response document, based on an implementation of a Man-in-the-middle attack carried out on the Centro Universitário do Estado do Pará - CESUPA network.Item Revisão sistemática sobre a metodologia de ataque dos Worms Iloveyou, Wannacry, Mirai e Lion nos sistemas operacionais Windows e Linux(Centro Universitário do Estado do Pará, 2023-12-11) Rocha, Nícolas de Oliveira; Martins, Paula D’nazaré da Silva; Pfeiff, Fabian Victor Reis; Mendonça, Eudes Danilo da Silva; http://lattes.cnpq.br/1404209498845660; Gomes, Vitor Hugo Freitas; http://lattes.cnpq.br/5218954387107307; Rocha, Johnny Marcus Gomes; http://lattes.cnpq.br/7014364443235002Every day, several devices are attacked by different threats around the world, affecting both home users and governments or large institutions, making information security specialists have to work harder to defend against these attacks. Typically, attackers use malwares as an attack instrument, one of the most used in recent times being worms. To be successful in attacks, the attackers and cybercriminals develop worms focused on the most used operating systems: Windows and Linux, both of which have different architectures and paradigms. Therefore, there is a great effort by information security specialists to work to protect these two systems. Based on this context, the present work aims to compare the worms: WannaCry, ILOVEYOU, Mirai and Lion, focusing on their attack methodologies and the defense methodologies of their respective target systems, based on a systematic review of articles and academic literatures obtained by searching through repositories and online collections. In the end, we hope that this article contributes to the future research in the area of cybersecurity.