995 resultados para Política de Segurança da Informação


Relevância:

90.00% 90.00%

Publicador:

Resumo:

Ações possíveis para implantação de uma política de automação da informação num instituto de pesquisas tecnológicas.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

O problema da Segurança da Informação em ambientes informatizados tem vindo a crescer significativamente. Porém, verifica-se existirem diferentes perspectivas e abordagens à questão da Segurança Informática, raramente concordantes, nem mesmo no essencial, verificando-se alguma dificuldade em estabelecer um conjunto de pressupostos teóricos que permitam estruturar a análise da realidade. Estas questões, preocupam os organismos ligados à Defesa, nomeadamente no âmbito da NATO, que tem vindo a divulgar uma série de documentos, não classificados, relativamente à sua perspectiva sobre o assunto, enunciando requisitos de segurança com vista a estabelecer padrões de orientação para os construtores de hardware e software de modo a que, após certificação, possam vir a ser usados militarmente.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Este trabalho de investigação apresenta a problemática das Redes Universitárias cujo objectivo principal é perceber o panorama da Utilização das Novas Tecnologias, Segurança e Auditoria nas Instituições de Ensino Superior em Cabo Verde. As técnicas utilizadas para a atingir os objectivos do mesmo, foram consultas de obras bibliográficas, distribuição e análise de dois questionários para o estudo do caso prático. Como resultado da pesquisa surgem alguns indicadores que caracterizam o nível da utilização das Tecnologias de Informação e Comunicação nas Instituições de Ensino Superior em Cabo Verde e o estado da implementação da segurança de informação nessas instituições.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Com a necessidade de expandir o negócio juntamente com a expansão da internet e do surgimento de novas tecnologias, surgiu o comércio eletrónico cujo objetivo é facilitar os processos de compra e venda sem a necessidade de construção de novas instalações visto que o mesmo pode ser expandido, a nível mundial, através da internet e com custos reduzidos. Deste modo, deve-se levar em conta a segurança da informação que transita pela internet visto que, por exemplo, se um site de comércio eletrónico não estiver seguro há sempre o risco de, quer o comprador como o vendedor, perder sem poder efetuar a sua compra. Consequentemente, a presente monografia intitulada “Segurança do Comércio Eletrónico – O caso de Cabo Verde” realça o comércio eletrónico, a segurança da informação bem como um caso prático onde foi aplicado os conceitos dos conteúdos teóricos para o caso de Cabo Verde sem deixar de lado a análise efetuada a alguns sites de comércio eletrónico em Cabo Verde.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Este Guia de Preservação & Segurança da Biblioteca Nacional para salvaguarda do seu acervo e do seu edifício tem por objetivo apresentar orientações, caminhos e rotas para procedimentos e atitudes relativas as questões desta natureza, importantes e vitais nesta era de tantas incertezas. Como base toma-se o saber adquirido no campo da preservação de bens culturais e no campo da política de segurança adotada para acervos bibliográficos e documentais, para usuários e para os edifícios que os abriga. O caráter interdisciplinar que concerne a estes campos do conhecimento sinaliza para o aprimoramento educacional da população como um todo e para nossa memória cultural. Visa a mudança do papel do homem como crítico da natureza, como agente transformador da realidade e de si próprio.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

O tema central deste trabalho é a segurança alimentar e nutricional. O objetivo básico é entender porque o Brasil não possui uma política de segurança alimentar capaz de coordenar e integrar as diversas ações nos estados, municípios e sociedade civil para a erradicação da fome. Para atingir este objetivo buscou-se aprofundar conhecimentos sobre segurança alimentar e nutricional, abordar conceitos de justiça social, analisar as políticas sociais brasileiras, examinar a questão da pobreza, fome e desnutrição e avaliar criticamente o Programa Fome Zero apresentado pelo governo como uma proposta de segurança alimentar para o Brasil. A guisa de conclusão pretendeu-se reforçar a importância de considerar os aspectos qualificativos da pobreza na formulação de políticas e a prioridade do enfoque da segurança alimentar como um objetivo estratégico a ser perseguido com base em políticas públicas implementadas com ativa participação da sociedade civil.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The information technology - IT- benefits have been more perceived during the last decades. Both IT and business managers are dealing with subjects like governance, IT-Business alignment, information security and others on their top priorities. Talking about governance, specifically, managers are facing it with a technical approach, that gives emphasis on protection against invasions, antivirus systems, access controls and others technical issues. The IT risk management, commonly, is faced under this approach, that means, has its importance reduced and delegated to IT Departments. On the last two decades, a new IT risk management perspective raised, bringing an holistic view of IT risk to the organization. According to this new perspective, the strategies formulation process should take into account the IT risks. With the growing of IT dependence on most of organizations, the necessity of a better comprehension about the subject becomes more clear. This work shows a study in three public organizations of the Pernambuco State that investigates how those organizations manage their IT risks. Structured interviews were made with IT managers, and later, analyzed and compared with conceptual categories found in the literature. The results shows that the IT risks culture and IT governance are weakly understood and implemented on those organizations, where there are not such an IT risk methodology formally defined, neither executed. In addition, most of practices suggested in the literature were found, even without an alignment with an IT risks management process

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Previous works have studied the characteristics and peculiarities of P2P networks, especially security information aspects. Most works, in some way, deal with the sharing of resources and, in particular, the storage of files. This work complements previous studies and adds new definitions relating to this kind of systems. A system for safe storage of files (SAS-P2P) was specified and built, based on P2P technology, using the JXTA platform. This system uses standard X.509 and PKCS # 12 digital certificates, issued and managed by a public key infrastructure, which was also specified and developed based on P2P technology (PKIX-P2P). The information is stored in a special file with XML format which is especially prepared, facilitating handling and interoperability among applications. The intention of developing the SAS-P2P system was to offer a complementary service for Giga Natal network users, through which the participants in this network can collaboratively build a shared storage area, with important security features such as availability, confidentiality, authenticity and fault tolerance. Besides the specification, development of prototypes and testing of the SAS-P2P system, tests of the PKIX-P2P Manager module were also performed, in order to determine its fault tolerance and the effective calculation of the reputation of the certifying authorities participating in the system

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This paper studies the communication and information management in the perspective of corporate social responsibility. We assume that a company becomes socially responsible when it’s necessary implementing a communication and information policy able to align their business management processes to social responsibility policies, thus creating the necessary, fundamental synergy to their audiences. We raised the hypothesis that corporate social responsibility, in order to be incorporated on a business process management, necessarily involves a transformation in the form of information management and communication - understood as strategic skills which enable the generation of knowledge creation value and the acquisition of awareness of ethical conduct and company's corporate organizational culture as a mirror, reflected to its internal and external audiences. Therefore, this study was supported by a case study in a retail company in Bauru city, regarded as a socially responsible company. Thus, we proceeded to develop a descriptive-exploratory field research, by using the technique of structured interviews which were conducted with the most representative considered leaders of the company - management, store managers, responsible CSR department and advertising agency

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This work aims to understand how cloud computing contextualizes the IT government and decision agenda, in the light of the multiple streams model, considering the current status of public IT policies, the dynamics of the agenda setting for the area, the interface between the various institutions, and existing initiatives on the use of cloud computing in government. Therefore, a qualitative study was conducted through interviews with a group of policy makers and the other group consists of IT managers. As analysis technique, this work made use of content analysis and analysis of documents, with some results by word cloud. As regards the main results to overregulation to the area, usually scattered in various agencies of the federal government, which hinders the performance of the managers. Identified a lack of knowledge of standards, government programs, regulations and guidelines. Among these he highlighted a lack of understanding of the TI Maior Program, the lack of effectiveness of the National Broadband Plan in view of the respondents, as well as the influence of Internet Landmark as an element that can jam the advances in the use of computing cloud in the Brazilian government. Also noteworthy is the bureaucratization of the acquisition of goods to IT services, limited, in many cases, technological advances. Regarding the influence of the actors, it was not possible to identify the presence of a political entrepreneur, and it was noticed a lack of political force. Political flow was affected only by changes within the government. Fragmentation was a major factor for the theme of weakening the agenda formation. Information security was questioned by the respondents pointed out that the main limitation coupled with the lack of training of public servants. In terms of benefits, resource economy is highlighted, followed by improving efficiency. Finally, the discussion about cloud computing needs to advance within the public sphere, whereas the international experience is already far advanced, framing cloud computing as a responsible element for the improvement of processes, services and economy of public resources

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The information technology - IT- benefits have been more perceived during the last decades. Both IT and business managers are dealing with subjects like governance, IT-Business alignment, information security and others on their top priorities. Talking about governance, specifically, managers are facing it with a technical approach, that gives emphasis on protection against invasions, antivirus systems, access controls and others technical issues. The IT risk management, commonly, is faced under this approach, that means, has its importance reduced and delegated to IT Departments. On the last two decades, a new IT risk management perspective raised, bringing an holistic view of IT risk to the organization. According to this new perspective, the strategies formulation process should take into account the IT risks. With the growing of IT dependence on most of organizations, the necessity of a better comprehension about the subject becomes more clear. This work shows a study in three public organizations of the Pernambuco State that investigates how those organizations manage their IT risks. Structured interviews were made with IT managers, and later, analyzed and compared with conceptual categories found in the literature. The results shows that the IT risks culture and IT governance are weakly understood and implemented on those organizations, where there are not such an IT risk methodology formally defined, neither executed. In addition, most of practices suggested in the literature were found, even without an alignment with an IT risks management process

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The information technology - IT- benefits have been more perceived during the last decades. Both IT and business managers are dealing with subjects like governance, IT-Business alignment, information security and others on their top priorities. Talking about governance, specifically, managers are facing it with a technical approach, that gives emphasis on protection against invasions, antivirus systems, access controls and others technical issues. The IT risk management, commonly, is faced under this approach, that means, has its importance reduced and delegated to IT Departments. On the last two decades, a new IT risk management perspective raised, bringing an holistic view of IT risk to the organization. According to this new perspective, the strategies formulation process should take into account the IT risks. With the growing of IT dependence on most of organizations, the necessity of a better comprehension about the subject becomes more clear. This work shows a study in three public organizations of the Pernambuco State that investigates how those organizations manage their IT risks. Structured interviews were made with IT managers, and later, analyzed and compared with conceptual categories found in the literature. The results shows that the IT risks culture and IT governance are weakly understood and implemented on those organizations, where there are not such an IT risk methodology formally defined, neither executed. In addition, most of practices suggested in the literature were found, even without an alignment with an IT risks management process