Análise de vulnerabilidades em Sistemas Computacionais Modernos: Conceitos, Exploits e Proteções

 em Publicações

The growing occurrence of cyberattacks has increased the scientific community interest and the amount of organizations investment in the search for new solutions capable of dealing with these hacking techniques of computational systems. Among these techniques, the development of exploits has been highlighted by several authors as one of the main attacker’s weapons in the last decades. For this reason, the development of these artifacts has also been incorporated by security analysts to their penetration test methodologies, as a strategy to prevent attacks, contributing to the research of new defense mechanisms. This chapter provides insight into the exploit development techniques and its use in the building of malicious artifacts effective in the impairment of computational systems.

AUTORES

  • Thiago de Souza Rocha
  • Mateus Tymburibá
  • Gilbert Breves Martins
  • Eduardo Luzeiro Feitosa
  • Eduardo James P. Souto

EVENTO

  • SBSEG 2012 – Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais
  • Data e Local: 19 de novembro de 2012, Curitiba – PR.

Comece a digitar e pressione Enter para pesquisar

Sistema para automatização do processo de alimentação da empacotadora dos blocos de recado

 

BENEFÍCIOS

TECNOLOGIAS

Plataforma para modelamento Creo, plataforma de modelamento Solid Works, programação PLC, linguagem Ladder, normas NR 10 e NR 12.  

 

×