Navegando por Assunto "Criptografia"
Agora exibindo 1 - 3 de 3
- Resultados por página
- Opções de Ordenação
Item Uma análise comparativa em relação à criptografia nos bancos de dados Oracle e MySQL(Centro Universitário do Estado do Pará, 2023-12-07) Santos, Gabriel de Oliveira; Angelim, Isaac Ponte; Alencar, Ricardo Larrat Mota de; Lopes Junior, Samoel Vieira; Mendonça, Eudes Danilo da Silva; http://lattes.cnpq.br/1404209498845660; Elgrably, Isaac Souza; http://lattes.cnpq.br/7590598824563858; Gomes, Vitor Hugo Freitas; http://lattes.cnpq.br/5218954387107307In an increasingly digital and interconnected world, data security becomes imperative. In the business context, leaks and exposures of sensitive information pose significant threats to company databases. Encryption in databases emerges as an essential protection, ensuring confidentiality and integrity, crucial elements to prevent potential harm and ensure trust in data storage and management. This study conducts a literature review on encryption, highlighting its historical significance and objectives, such as information confidentiality and integrity. It explores the evolution of encryption, introducing Oracle and MySQL Database Management Systems, emphasizing the security features of both. During the research journey, different encryption techniques and security tools were found. The importance of encryption in protecting sensitive data is emphasized. The study contributes to understanding security practices in Oracle and MySQL, proving valuable for information security professionals.Item Estratégias inteligentes de segurança para transação com cartão(Centro Universitário do Estado do Pará, 2018-06-15) Pereira, Lucas Carvalho; Bitar, Yasmin Adla da Costa; Baganha, Polyana Santos Fonseca; Mendonça, Eudes Danilo da Silva; http://lattes.cnpq.br/1404209498845660; http://lattes.cnpq.br/6889523334917369; Teixeira, Otávio Noura; http://lattes.cnpq.br/5784356232477760As time goes by, we realize that technology’s evolution is very consistent in society and our life. One of the branches that has grown in this period was in the commercial area, with new payment options (like credit card, debit card, internet banking, among other choices). However, this progress has positive and negative points. One of the negative points one could mention are hackers: people that observe and use system’s weakness for self-benefit. There are many reasons why hackers do it, for instance, for self-realization and financial return. Credit card utilization is getting more frequent each day due to commercial transactions by mobile devices. Information security needs to increase in order to prevent credit card cloning and other forms of cyber-attacks. This study aims to build a methodology using hardware and software. The purpose is to increase security in credit and debit card transactions, minimizing infrastructure related problems, like credit card cloning. Cryptography transactions and artificial intelligence (Pattern Recognitions) applied to authentication multi protocols will be studied. We will also look at improving authentication to increase the security. Cryptography will be used to protect the client’s data along the way. Pattern recognition is the knowledge used to classify and recognize in and out information in a credit card machine, like digital impression, iris and voice patterns.Item Técnicas anti-forenses em computadores pessoais(Centro Universitário do Estado do Pará, 2017-12-04) Macêdo, Wilson Antonio Cosmo; Brito, Itamar Jorge Vilhena de; http://lattes.cnpq.br/5143837732124006; Araújo, Andrea Cristina Marques de; http://lattes.cnpq.br/7322421741765559; Carmo, Ricardo Melo Casseb do; http://lattes.cnpq.br/4933624262290855The evolution of information technologies and the increase of users in the digital environment also resulted in the increase of the number of crimes in the virtual environment, as well as the complexity of them, thus creating new challenges for the professionals involved in the computer forensics. The purpose of this study is precisely to analyze the forms that malicious users with personal computers can use to try to obstruct the expert analysis in case of suspect of crim, either by hiding or destroying data, so that the information obtained during the analyzes of this work may help in cases where the presence of any of these techniques. The approach used to carry out the study was the use of simulations of some of these techniques in a controlled environment close to the real scenario and the use of tools focused on expertise and digital research in these scenarios to evaluate the efficiency and main characteristics of these techniques, generating in this way technical information that may provide an advantage to the expert or digital investigator in cases with simliar occurrences to those present in this study.