9 resultados para Computer networks -- Security measures

em Universidade Federal do Rio Grande do Norte(UFRN)


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The increasing of the number of attacks in the computer networks has been treated with the increment of the resources that are applied directly in the active routers equip-ments of these networks. In this context, the firewalls had been consolidated as essential elements in the input and output control process of packets in a network. With the advent of intrusion detectors systems (IDS), efforts have been done in the direction to incorporate packets filtering based in standards of traditional firewalls. This integration incorporates the IDS functions (as filtering based on signatures, until then a passive element) with the already existing functions in firewall. In opposite of the efficiency due this incorporation in the blockage of signature known attacks, the filtering in the application level provokes a natural retard in the analyzed packets, and it can reduce the machine performance to filter the others packets because of machine resources demand by this level of filtering. This work presents models of treatment for this problem based in the packets re-routing for analysis by a sub-network with specific filterings. The suggestion of implementa- tion of this model aims reducing the performance problem and opening a space for the consolidation of scenes where others not conventional filtering solutions (spam blockage, P2P traffic control/blockage, etc.) can be inserted in the filtering sub-network, without inplying in overload of the main firewall in a corporative network

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The realization of human rights is a prerequisite to the development of peoples, this requires legal mechanisms and techniques to its consistent and effective promotion, protection and fulfillment. So, agree that there is an institution or public agency created for the purpose of protecting those who suffer most in the face of human rights violations: the needy. In Brazil, among other institutions and public agencies, the responsibility of the Public Defender to promote the protection of human rights. The constitutional system recognizes the institution in its essence the role of the state court, whose duty is to provide guidance and legal defense of the needy. The legal system as a whole sufraga the relevance of the Ombudsman as a mainspring of human rights. In the prison system, with the ultimate regulatory changes, such as Law 12.313 of 2010 which introduced changes to the Law 7.210 of 1984, the institution must ensure the correct and humane enforcement of sentences and the security measures pertaining to the needy. With the Complementary Law 132 of 2009, to systematize other duties of the Public Defender, highlighting their contribution to the movement of access to justice. Within the OAS, to adopt Resolution 2656, 2011, characterizing, with ruler and compass, the relevance of the Ombudsman access to justice and protection of human rights. In this step, the present study concerns the role of Defender in the legal protection of human rights, through monographic and deductive methods, as there remains a technical and theoretical connection between these two points themed legal phenomenon, since the rights humans, especially after the second half of the twentieth century, form the basis of the legal system of the major Western nations in the world. This led, therefore, the emergence of technical and legal institutions aimed at realizing human rights. This applies to the Defender. Access to justice and public service provision of legal assistance are human rights, therefore, essential to humans and necessary for social inclusion. Countries such as Brazil, marked by social inequality, depend on the structuring of institutions like the Defender, designed to promote citizenship to the Brazilian people

Relevância:

100.00% 100.00%

Publicador:

Resumo:

New multimedia applications that use the Internet as a communication media are pressing for the development of new technologies, such as: MPLS (Multiprotocol Label Switching) and DiffServ. These technologies introduce new and powerful features to the Internet backbone, as the provision of QoS (Quality of Service) capabilities. However, to obtain a true end-to-end QoS, it is not enough to implement such technologies in the network core, it becomes indispensable to extend such improvements to the access networks, what is the aim of the several works presently under development. To contribute to this process, this Thesis presents the RSVP-SVC (Resource Reservation Protocol Switched Virtual Connection) that consists in an extension of RSVP-TE. The RSVP-SVC is presented herein as a mean to support a true end-to-end QoS, through the extension of MPLS scope. Thus, it is specified a Switched Virtual Connection (SVC) service to be used in the context of a MPLS User-to-Network Interface (MPLS UNI), that is able to efficiently establish and activate Label Switched Paths (LSP), starting from the access routers that satisfy the QoS requirements demanded by the applications. The RSVP-SVC was specified in Estelle, a Formal Description Technique (FDT) standardized by ISO. The edition, compilation, verification and simulation of RSVP-SVC were made by the EDT (Estelle Development Toolset) software. The benefits and most important issues to be considered when using the proposed protocol are also included

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In the two last decades of the past century, following the consolidation of the Internet as the world-wide computer network, applications generating more robust data flows started to appear. The increasing use of videoconferencing stimulated the creation of a new form of point-to-multipoint transmission called IP Multicast. All companies working in the area of software and the hardware development for network videoconferencing have adjusted their products as well as developed new solutionsfor the use of multicast. However the configuration of such different solutions is not easy done, moreover when changes in the operational system are also requirede. Besides, the existing free tools have limited functions, and the current comercial solutions are heavily dependent on specific platforms. Along with the maturity of IP Multicast technology and with its inclusion in all the current operational systems, the object-oriented programming languages had developed classes able to handle multicast traflic. So, with the help of Java APIs for network, data bases and hipertext, it became possible to the develop an Integrated Environment able to handle multicast traffic, which is the major objective of this work. This document describes the implementation of the above mentioned environment, which provides many functions to use and manage multicast traffic, functions which existed only in a limited way and just in few tools, normally the comercial ones. This environment is useful to different kinds of users, so that it can be used by common users, who want to join multimedia Internet sessions, as well as more advenced users such engineers and network administrators who may need to monitor and handle multicast traffic

Relevância:

100.00% 100.00%

Publicador:

Resumo:

It s notorious the advance of computer networks in recent decades, whether in relation to transmission rates, the number of interconnected devices or the existing applications. In parallel, it s also visible this progress in various sectors of the automation, such as: industrial, commercial and residential. In one of its branches, we find the hospital networks, which can make the use of a range of services, ranging from the simple registration of patients to a surgery by a robot under the supervision of a physician. In the context of both worlds, appear the applications in Telemedicine and Telehealth, which work with the transfer in real time of high resolution images, sound, video and patient data. Then comes a problem, since the computer networks, originally developed for the transfer of less complex data, is now being used by a service that involves high transfer rates and needs requirements for quality of service (QoS) offered by the network . Thus, this work aims to do the analysis and comparison of performance of a network when subjected to this type of application, for two different situations: the first without the use of QoS policies, and the second with the application of such policies, using as scenario for testing, the Metropolitan Health Network of the Federal University of Rio Grande do Norte (UFRN)

Relevância:

100.00% 100.00%

Publicador:

Resumo:

New versions of SCTP protocol allow the implementation of handover procedures in the transport layer, as well as the supply of a partially reliable communication service. A communication architecture is proposed herein, integrating SCTP with the session initiation protocol, SIP, besides additional protocols. This architecture is intended to handle voice applications over IP networks with mobility requirements. User localization procedures are specified in the application layer as well, using SIP, as an alternative mean to the mechanisms used by traditional protocols, that support mobility in the network layer. The SDL formal specification language is used to specify the operation of a control module, which coordinates the operation of the system component protocols. This formal specification is intended to prevent ambiguities and inconsistencies in the definition of this module, assisting in the correct implementation of the elements of this architecture

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The traditional perimeter-based approach for computer network security (the castle and the moat model) hinders the progress of enterprise systems and promotes, both in administrators and users, the delusion that systems are protected. To deal with the new range of threats, a new data-safety oriented paradigm, called de-perimeterisation , began to be studied in the last decade. One of the requirements for the implementation of the de-perimeterised model of security is the definition of a safe and effective mechanism for federated identity. This work seeks to fill this gap by presenting the specification, modelling and implementation of a mechanism for federated identity, based on the combination of SAML and X.509 digital certificates stored in smart-cards, following the A3 standard of ICP-Brasil (Brazilian official certificate authority and PKI)

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Through numerous technological advances in recent years along with the popularization of computer devices, the company is moving towards a paradigm “always connected”. Computer networks are everywhere and the advent of IPv6 paves the way for the explosion of the Internet of Things. This concept enables the sharing of data between computing machines and objects of day-to-day. One of the areas placed under Internet of Things are the Vehicular Networks. However, the information generated individually for a vehicle has no large amount and does not contribute to an improvement in transit, once information has been isolated. This proposal presents the Infostructure, a system that has to facilitate the efforts and reduce costs for development of applications context-aware to high-level semantic for the scenario of Internet of Things, which allows you to manage, store and combine the data in order to generate broader context. To this end we present a reference architecture, which aims to show the major components of the Infostructure. Soon after a prototype is presented which is used to validate our work reaches the level of contextualization desired high level semantic as well as a performance evaluation, which aims to evaluate the behavior of the subsystem responsible for managing contextual information on a large amount of data. After statistical analysis is performed with the results obtained in the evaluation. Finally, the conclusions of the work and some problems such as no assurance as to the integrity of the sensory data coming Infostructure, and future work that takes into account the implementation of other modules so that we can conduct tests in real environments are presented.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Objective: Evaluate the work structure and process in Psychos ocial Care Centers (CAPS) and the professionals profile, the satisfaction, conditions and work overload. Methods: Cross - sectional study conducted in five CAPS in Campina Grande city. The study sample consisted of five coordinators, 42 graduate professional s, 26 mid - level (technical and auxiliary nurses, and caregivers), and the medical records pertaining to 413 users followed up. Data were collected using validated questionnaires (CAPSUL - rating CAPS in southern Brazil) and adapted to the study, between July and October 2014. The questionnaires were double entered and submitted to validation in the sub - program “Validate Epi Info 3.5.4” , used along with the “SPSS 17.0” for processing the statistical analyzes. Measures of central tendency and dispersion were ap plied to the descriptive analyzes; “Fisher's” exact test to check the CAPS impact on hospital admissions and the “Bonferroni” adjusted to verify the diagnoses according to sex. 5% significance level was adopted. The study was approved by the Ethics Committ ee of the Rio Grande do Norte Federal University (UFRN), protocol 719.435, of 05.30.2014. Results: From the structure analysis were identified contextual factors that influenced the work process of CAPS professionals, such as: deficiencies with regard to h uman resources; forms of health professionals employment and qualifications; temporary contract existence. As to process dimension, it was found that the home visits performance by health professionals shows to be ineffective, given its insufficiency and i rregularity, which can be explained by the high demand, reduced staff and transportation lack. It was low coverage of items inherent to Therapeutic Individual Project, as the income generation program, insertion at work and home visit. The reference and co unter reference flow are still not satisfactorily organized. There was statistically significant difference for the diagnosis, with a predominance of mood disorders related to stress among women and those related to alcohol and other drugs among men (p <0. 05). There was an association between the degree of health professionals satisfaction and working conditions, overload and factors related to the content and working conditions, the security measures, comfort and CAPS appearance, contact between the teams and users, families treatment by the teams, temporary employment relationship. Conclusion: The data collected indicate the need for the CAPS organization through increased investments in the sector in order to enhance the infrastructure as potentiating el ement of practices with a view to changing the care model for mental health proposed by the Psychiatric Reform. It is hoped therefore that this research will contribute to better planning in CAPS unit management, with another tool to improve the dimensions involving the structure and the professional work process and improve this mental health care model.