TCC - Bacharelado em Ciência da Computação (Sede)

URI permanente para esta coleçãohttps://arandu.ufrpe.br/handle/123456789/415

Navegar

Resultados da Pesquisa

Agora exibindo 1 - 2 de 2
  • Imagem de Miniatura
    Item
    Utilização de inteligência de ameaças cibernéticas para prevenção e mitigação de ataques ransomware: uma revisão sistemática da literatura
    (2025-02-27) Cabral, Rennan Luis Barros; Lins, Fernando Antonio Aires; http://lattes.cnpq.br/2475965771605110; http://lattes.cnpq.br/4612932794474682
  • Imagem de Miniatura
    Item
    Security evaluation of operating systems considering compliance policies
    (2021-03-01) Teixeira, Vanessa Bandeira Lins; Lins, Fernando Antonio Aires; Nóbrega, Obionor de Oliveira; http://lattes.cnpq.br/8576087238071129; http://lattes.cnpq.br/2475965771605110; http://lattes.cnpq.br/9351392044969981
    Currently, to search, mitigate and solve security vulnerabilities is considered a relevant and complex task. New software are being developed everyday, and each one of them may bring its own vulnerabilities. In addition, the configurations of these applications can also increase these vulnerabilities. In this context, there is a lack of securityoriented configurations in a significant part of the current operating systems. These assets, which are usually not properly configured considering security requirements, become easy targets for a considered number of security attacks. The application of compliance policies in an operating system helps to preserve the environment from malicious exploitation. The main objective of this work is to evaluate the use of compliance policies to assess and improve the security level of operating systems. To achieve this, a methodology is proposed and described. This methodology is also applied to a case study with server operating systems. For this purpose, faults in the factory configuration of the operating systems were considered, which were identified using the Center for Internet Security (CIS) compliance policies. Thus, it became possible to evaluate the system security level and to classify the main recommendations for prioritizing the corrections that users can follow. Such recommendations aim to reduce the attacks surface on systems and increase the security level by mitigating the vulnerabilities to which the systems are exposed.