Survey: viabilidade e impacto na implantação de um modelo de predição de ataques de redes de computadores
| Main Author: | |
|---|---|
| Publication Date: | 2023 |
| Format: | Bachelor thesis |
| Language: | por |
| Source: | Repositório Institucional da Universidade Federal do Ceará (UFC) |
| Download full: | http://repositorio.ufc.br/handle/riufc/75234 |
Summary: | Information technology is rooted in a large part of society, working in different areas and showing constant evolution, which is mainly due to the computer network that allows users and machines to connect. The network is of vital importance today as a means of obtaining, sharing and storing information that can be of immeasurable value. In view of this, it is noticeable that malicious individuals can target this information, these individuals mostly have the knowledge to invade computer networks and obtain this data, they are also known as hackers. Because these attack techniques to ensure security have been developed over time, most of these methods are correctives being applied during or after episodes of cyber attacks. Thus, the objective is to present the research to enable the implementation of the network attack prediction model and the impact that the model may cause. The research model used was the survey performing the sample selection process using techniques to separate the target population in an effective and concise way, so that the collected data are valid. In view of this, the questionnaire used was constructed aiming at the main points that need validation, such as feasibility, impact, cost and cataloging of the individuals in the sample. Finally some statistical data were obtained as a result of the survey denoting a brief discussion about the peculiarities. |
| id |
UFC-7_fb879f342a708e91ab52f8ac2fe09b59 |
|---|---|
| oai_identifier_str |
oai:repositorio.ufc.br:riufc/75234 |
| network_acronym_str |
UFC-7 |
| network_name_str |
Repositório Institucional da Universidade Federal do Ceará (UFC) |
| repository_id_str |
|
| spelling |
Pereira Filho, Cícero Romão RibeiroMelo, Reuber Regis De2023-12-11T19:20:15Z2023-12-11T19:20:15Z2023http://repositorio.ufc.br/handle/riufc/75234Information technology is rooted in a large part of society, working in different areas and showing constant evolution, which is mainly due to the computer network that allows users and machines to connect. The network is of vital importance today as a means of obtaining, sharing and storing information that can be of immeasurable value. In view of this, it is noticeable that malicious individuals can target this information, these individuals mostly have the knowledge to invade computer networks and obtain this data, they are also known as hackers. Because these attack techniques to ensure security have been developed over time, most of these methods are correctives being applied during or after episodes of cyber attacks. Thus, the objective is to present the research to enable the implementation of the network attack prediction model and the impact that the model may cause. The research model used was the survey performing the sample selection process using techniques to separate the target population in an effective and concise way, so that the collected data are valid. In view of this, the questionnaire used was constructed aiming at the main points that need validation, such as feasibility, impact, cost and cataloging of the individuals in the sample. Finally some statistical data were obtained as a result of the survey denoting a brief discussion about the peculiarities.A tecnologia da informação está enraizada em uma grande parte da sociedade atuando em diferentes áreas e apresentando uma evolução constante, a qual se deve principalmente pela rede de computadores que possibilita que os usuários e máquinas se conectem. A rede é de vital importância na atualidade sendo um meio de obter, compartilhar e armazenar informações essas que podem possuir um valor imensurável. Perante isso é perceptível que indivíduos mal-intencionados podem almejar essas informações esses indivíduos em sua maioria possuem conhecimentos para invadir redes de computadores e obter esses dados, os mesmo também são conhecidos como hackers. Em razão desses ataques técnicas para garantir a segurança foram desenvolvidas com o tempo, em sua maioria esses métodos são corretivos sendo aplicados durante ou depois dos episódios de ataques cibernéticos. Desse modo o objetivo é apresentar a pesquisa para viabilização da implantação do modelo de predição de ataques de rede e o impacto que o modelo poderá causar. O modelo de pesquisa utilizado foi o survey realizando o processo de seleção de amostra utilizando técnicas para separar a população alvo de maneira efetiva e concisa, para que assim os dados coletados sejam válidos. À vista disto o questionário utilizado foi construído objetivando os principais pontos que necessitam de validação como viabilidade, impacto, custo e catalogação dos indivíduos da amostra. Por fim alguns dados estatísticos foram obtidos como resultado do survey denotando uma breve discussão sobre as peculiaridades.Survey: viabilidade e impacto na implantação de um modelo de predição de ataques de redes de computadoresinfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/bachelorThesisSurveyCybersegurançaRedes de computadoresSurveyNetwork securityCyber attacksinfo:eu-repo/semantics/openAccessporreponame:Repositório Institucional da Universidade Federal do Ceará (UFC)instname:Universidade Federal do Ceará (UFC)instacron:UFC2023ORIGINAL2023_tcc_cfilho.pdfa.pdf2023_tcc_cfilho.pdfa.pdfapplication/pdf699481http://repositorio.ufc.br/bitstream/riufc/75234/1/2023_tcc_cfilho.pdfa.pdfe2e62240fdb17364cfad569f7a19067aMD51LICENSElicense.txtlicense.txttext/plain; charset=utf-81748http://repositorio.ufc.br/bitstream/riufc/75234/2/license.txt8a4605be74aa9ea9d79846c1fba20a33MD52riufc/752342025-09-16 10:19:01.926oai:repositorio.ufc.br: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Repositório InstitucionalPUBhttp://www.repositorio.ufc.br/ri-oai/requestbu@ufc.br || repositorio@ufc.bropendoar:2025-09-16T13:19:01Repositório Institucional da Universidade Federal do Ceará (UFC) - Universidade Federal do Ceará (UFC)false |
| dc.title.pt_BR.fl_str_mv |
Survey: viabilidade e impacto na implantação de um modelo de predição de ataques de redes de computadores |
| title |
Survey: viabilidade e impacto na implantação de um modelo de predição de ataques de redes de computadores |
| spellingShingle |
Survey: viabilidade e impacto na implantação de um modelo de predição de ataques de redes de computadores Pereira Filho, Cícero Romão Ribeiro Survey Cybersegurança Redes de computadores Survey Network security Cyber attacks |
| title_short |
Survey: viabilidade e impacto na implantação de um modelo de predição de ataques de redes de computadores |
| title_full |
Survey: viabilidade e impacto na implantação de um modelo de predição de ataques de redes de computadores |
| title_fullStr |
Survey: viabilidade e impacto na implantação de um modelo de predição de ataques de redes de computadores |
| title_full_unstemmed |
Survey: viabilidade e impacto na implantação de um modelo de predição de ataques de redes de computadores |
| title_sort |
Survey: viabilidade e impacto na implantação de um modelo de predição de ataques de redes de computadores |
| author |
Pereira Filho, Cícero Romão Ribeiro |
| author_facet |
Pereira Filho, Cícero Romão Ribeiro |
| author_role |
author |
| dc.contributor.author.fl_str_mv |
Pereira Filho, Cícero Romão Ribeiro |
| dc.contributor.advisor1.fl_str_mv |
Melo, Reuber Regis De |
| contributor_str_mv |
Melo, Reuber Regis De |
| dc.subject.ptbr.pt_BR.fl_str_mv |
Survey Cybersegurança Redes de computadores |
| topic |
Survey Cybersegurança Redes de computadores Survey Network security Cyber attacks |
| dc.subject.en.pt_BR.fl_str_mv |
Survey Network security Cyber attacks |
| description |
Information technology is rooted in a large part of society, working in different areas and showing constant evolution, which is mainly due to the computer network that allows users and machines to connect. The network is of vital importance today as a means of obtaining, sharing and storing information that can be of immeasurable value. In view of this, it is noticeable that malicious individuals can target this information, these individuals mostly have the knowledge to invade computer networks and obtain this data, they are also known as hackers. Because these attack techniques to ensure security have been developed over time, most of these methods are correctives being applied during or after episodes of cyber attacks. Thus, the objective is to present the research to enable the implementation of the network attack prediction model and the impact that the model may cause. The research model used was the survey performing the sample selection process using techniques to separate the target population in an effective and concise way, so that the collected data are valid. In view of this, the questionnaire used was constructed aiming at the main points that need validation, such as feasibility, impact, cost and cataloging of the individuals in the sample. Finally some statistical data were obtained as a result of the survey denoting a brief discussion about the peculiarities. |
| publishDate |
2023 |
| dc.date.accessioned.fl_str_mv |
2023-12-11T19:20:15Z |
| dc.date.available.fl_str_mv |
2023-12-11T19:20:15Z |
| dc.date.issued.fl_str_mv |
2023 |
| dc.type.status.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
| dc.type.driver.fl_str_mv |
info:eu-repo/semantics/bachelorThesis |
| format |
bachelorThesis |
| status_str |
publishedVersion |
| dc.identifier.uri.fl_str_mv |
http://repositorio.ufc.br/handle/riufc/75234 |
| url |
http://repositorio.ufc.br/handle/riufc/75234 |
| dc.language.iso.fl_str_mv |
por |
| language |
por |
| dc.rights.driver.fl_str_mv |
info:eu-repo/semantics/openAccess |
| eu_rights_str_mv |
openAccess |
| dc.source.none.fl_str_mv |
reponame:Repositório Institucional da Universidade Federal do Ceará (UFC) instname:Universidade Federal do Ceará (UFC) instacron:UFC |
| instname_str |
Universidade Federal do Ceará (UFC) |
| instacron_str |
UFC |
| institution |
UFC |
| reponame_str |
Repositório Institucional da Universidade Federal do Ceará (UFC) |
| collection |
Repositório Institucional da Universidade Federal do Ceará (UFC) |
| bitstream.url.fl_str_mv |
http://repositorio.ufc.br/bitstream/riufc/75234/1/2023_tcc_cfilho.pdfa.pdf http://repositorio.ufc.br/bitstream/riufc/75234/2/license.txt |
| bitstream.checksum.fl_str_mv |
e2e62240fdb17364cfad569f7a19067a 8a4605be74aa9ea9d79846c1fba20a33 |
| bitstream.checksumAlgorithm.fl_str_mv |
MD5 MD5 |
| repository.name.fl_str_mv |
Repositório Institucional da Universidade Federal do Ceará (UFC) - Universidade Federal do Ceará (UFC) |
| repository.mail.fl_str_mv |
bu@ufc.br || repositorio@ufc.br |
| _version_ |
1847792804847157248 |