Logo do repositório
Comunidades e Coleções
Tudo no DSpace
  • English
  • العربية
  • বাংলা
  • Català
  • Čeština
  • Deutsch
  • Ελληνικά
  • Español
  • Suomi
  • Français
  • Gàidhlig
  • हिंदी
  • Magyar
  • Italiano
  • Қазақ
  • Latviešu
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Српски
  • Svenska
  • Türkçe
  • Yкраї́нська
  • Tiếng Việt
Entrar
Novo usuário? Clique aqui para cadastrar. Esqueceu sua senha?
  1. Início
  2. Pesquisar por Autor

Navegando por Autor "Pfeiff, Fabian Victor Reis"

Filtrar resultados informando as primeiras letras
Agora exibindo 1 - 1 de 1
  • Resultados por página
  • Opções de Ordenação
  • Nenhuma Miniatura disponível
    Item
    Revisão sistemática sobre a metodologia de ataque dos Worms Iloveyou, Wannacry, Mirai e Lion nos sistemas operacionais Windows e Linux
    (Centro Universitário do Estado do Pará, 2023-12-11) Rocha, Nícolas de Oliveira; Martins, Paula D’nazaré da Silva; Pfeiff, Fabian Victor Reis; Mendonça, Eudes Danilo da Silva; http://lattes.cnpq.br/1404209498845660; Gomes, Vitor Hugo Freitas; http://lattes.cnpq.br/5218954387107307; Rocha, Johnny Marcus Gomes; http://lattes.cnpq.br/7014364443235002
    Every day, several devices are attacked by different threats around the world, affecting both home users and governments or large institutions, making information security specialists have to work harder to defend against these attacks. Typically, attackers use malwares as an attack instrument, one of the most used in recent times being worms. To be successful in attacks, the attackers and cybercriminals develop worms focused on the most used operating systems: Windows and Linux, both of which have different architectures and paradigms. Therefore, there is a great effort by information security specialists to work to protect these two systems. Based on this context, the present work aims to compare the worms: WannaCry, ILOVEYOU, Mirai and Lion, focusing on their attack methodologies and the defense methodologies of their respective target systems, based on a systematic review of articles and academic literatures obtained by searching through repositories and online collections. In the end, we hope that this article contributes to the future research in the area of cybersecurity.

DSpace software copyright © 2002-2025 LYRASIS

  • Política de Privacidade
  • Termos de Uso
  • Enviar uma Sugestão