1000 resultados para Governanaça corporativa
Resumo:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior
Resumo:
The electronic mail service is one of the most Internet services that grow in the corporate environment. This evolution is bringing several problems for the organizations, especially to information that circulates inside of the corporate net. The lack of correct orientation to the people, about the usage and the security importance of these resources, is leaving breaches and causing misusage and overuse of service, for example. In recent literature, it starts to coming out several ideas, which has helped to rganizations how to plain and how to implement the information security system to the electronic mail in computer environment. However, these ideas are still not placed in practice in many companies, public or private. This dissertation tries to demonstrate the results of a research that has like goal, identify the importance that user training has over the information security policy, through a case study inside of private superior education institute in this state. Besides, this work had by basic orientation the ISO/IEC 17799, which talk about People Security. This study was developed over a proposed model to this research, which looked for offer conditions to guide the institution studied, how to plan better a information security policy to the electronic mail. Also, this research has an exploratory and descreptive nature and your type, qualitative. Firstly, it was applied na questionary to the information technology manager, as better way to get some general data and to deepen the contact which still then, it was being kept through e-mail. Thereupon this first contact, eleven interviews were done with the same manager, beside one interview with twenty-four users, among employees e students. After that to collect and transcript the interviews, were review with the manager all informations given, to correct any mistakes and to update that informations, to then, start the data analyze. The research suggests that the institution has a pro attitude about the information security policy and the electronic mail usage. However, it was clear that answers have their perception about information security under a very inexperient way, derived of a planning lack in relation to training program capable to solve the problem
Resumo:
The increasing of the number of attacks in the computer networks has been treated with the increment of the resources that are applied directly in the active routers equip-ments of these networks. In this context, the firewalls had been consolidated as essential elements in the input and output control process of packets in a network. With the advent of intrusion detectors systems (IDS), efforts have been done in the direction to incorporate packets filtering based in standards of traditional firewalls. This integration incorporates the IDS functions (as filtering based on signatures, until then a passive element) with the already existing functions in firewall. In opposite of the efficiency due this incorporation in the blockage of signature known attacks, the filtering in the application level provokes a natural retard in the analyzed packets, and it can reduce the machine performance to filter the others packets because of machine resources demand by this level of filtering. This work presents models of treatment for this problem based in the packets re-routing for analysis by a sub-network with specific filterings. The suggestion of implementa- tion of this model aims reducing the performance problem and opening a space for the consolidation of scenes where others not conventional filtering solutions (spam blockage, P2P traffic control/blockage, etc.) can be inserted in the filtering sub-network, without inplying in overload of the main firewall in a corporative network
Resumo:
T'his dissertation proposes alternative models to allow the interconnectioin of the data communication networks of COSERN Companhia Energética do Rio Grande do Norte. These networks comprise the oorporative data network, based on TCP/IP architecture, and the automation system linking remote electric energy distribution substations to the main Operatin Centre, based on digital radio links and using the IEC 60870-5-101 protoco1s. The envisaged interconnection aims to provide automation data originated from substations with a contingent route to the Operation Center, in moments of failure or maintenance of the digital radio links. Among the presented models, the one chosen for development consists of a computational prototype based on a standard personal computer, working under LINUX operational system and running na application, developesd in C language, wich functions as a Gateway between the protocols of the TCP/IP stack and the IEC 60870-5-101 suite. So, it is described this model analysis, implementation and tests of functionality and performance. During the test phase it was basically verified the delay introduced by the TCP/IP network when transporting automation data, in order to guarantee that it was cionsistent with the time periods present on the automation network. Besides , additional modules are suggested to the prototype, in order to handle other issues such as security and prioriz\ation of the automation system data, whenever they are travesing the TCP/IP network. Finally, a study hás been done aiming to integrate, in more complete way, the two considered networks. It uses IP platform as a solution of convergence to the communication subsystem of na unified network, as the most recente market tendencies for supervisory and other automation systems indicate
Resumo:
Attacks to devices connected to networks are one of the main problems related to the confidentiality of sensitive data and the correct functioning of computer systems. In spite of the availability of tools and procedures that harden or prevent the occurrence of security incidents, network devices are successfully attacked using strategies applied in previous events. The lack of knowledge about scenarios in which these attacks occurred effectively contributes to the success of new attacks. The development of a tool that makes this kind of information available is, therefore, of great relevance. This work presents a support system to the management of corporate security for the storage, retrieval and help in constructing attack scenarios and related information. If an incident occurs in a corporation, an expert must access the system to store the specific attack scenario. This scenario, made available through controlled access, must be analyzed so that effective decisions or actions can be taken for similar cases. Besides the strategy used by the attacker, attack scenarios also exacerbate vulnerabilities in devices. The access to this kind of information contributes to an increased security level of a corporation's network devices and a decreased response time to occurring incidents
Resumo:
Apresentamos um sistema implementado em Linux® com o intuito de proteger redes contendo estações de trabalho Windows® contra agentes maliciosos. O sistema, denominado LIV - Linux® Integrated Viruswall, agrega características existentes em outras soluções e acrescenta novas funcionalidades. Uma das funcionalidades implementadas é a capacidade de detecção de estações de trabalho contaminadas tendo como base a análise do tráfego de rede. Outra é o uso de uma técnica denominada compartilhamento armadilha para identificar agentes maliciosos em propagação na rede local. Uma vez detectado um foco de contaminação, o LIV é capaz de isolá-lo da rede, contendo a difusão do agente malicioso. Resultados obtidos pelo LIV na proteção de uma rede corporativa demonstram a eficácia da análise do tráfego de rede como instrumento de detecção de agentes maliciosos, especialmente quando comparada a mecanismos tradicionais de detecção, baseados exclusivamente em assinaturas digitais de códigos maliciosos
Resumo:
Este estudo se propõe a analisar os mandatos das subsidiárias de empresas transnacionais (ETNs) no estrangeiro por intermédio dos mecanismos de alocação das atividades de pesquisa e desenvolvimento (P&D) entre os centros descentralizados de pesquisa. Iniciamos o trabalho com a apresentação de uma síntese das diferentes perspectivas encontradas na literatura econômica sobre a subordinação (ou condicionamentos) da autonomia administrativa e tecnológica das filiais. Tal síntese permite estabelecer uma hierarquia entre as subsidiárias e uma tipologia para evolução (retrocesso) de mandatos construída, principalmente, para as ETNs estruturadas em forma de rede corporativa. A seguir, a partir de pesquisas realizadas sobre as atividades dos laboratórios de P&D da indústria de equipamentos de telecomunicações no Brasil, procuramos mostrar que: a) a descentralização das atividades tecnológicas é um fato que não está restrito apenas aos países centrais; b) as tecnologias de informação permitiram que as subsidiárias no país se integrassem aos laboratórios centrais das ETNs, dando-lhes condições de desenvolver e participar de outras atividades tecnológicas, além das tradicionais funções de adaptação de processo e de produtos.
Resumo:
The Health Family Program (HFP) was founded in the 1990s with the objective of changing the health care model through a restructuring of primary care. Oral health was officially incorporated into HFP mainly through the efforts of dental professionals, and was seen as a way to break from oral health care models based on curative, technical biological and inequity methods. Despite the fast expansion of HFP oral health teams, it is essential to ask if changes are really occurring in the oral health model of municipalities. Therefore, the purpose of this study is to evaluate the incorporation of oral health teams into the Health Family Program by analyzing the factors that may interfere positively or negatively in the implementation of this strategy and consequently in the process of changing oral health care models in the National Health System in the state of Rio Grande do Norte, Brazil. This evaluation involves three dimensions: access, work organization and strategies of planning. For this purpose,19 municipalities, geographically distributed according to Regional Public Health Units (RPHU), were randomly selected. The data collection instruments used were: structured interview of supervisors and dentists, structured observation, documental research and data from national health data banks. It was possible to identify critical points that may be impeding the implementation of oral health into HFP, such as, low incomes, no legal employment contract, difficulty in referring patients for high-complexity procedures, in developing intersectoral actions and program strategies such as epidemiologic diagnosis and evaluation of the new actions. The majority of municipalities showed little or no improvement in oral health care after incorporating the new model into HFP. All of them had failures in most of the aspects mentioned above. Furthermore, these municipalities are similar in other areas, such as low educational levels in children from 7 to 14 years of age, high child mortality rates and wide social inequalities. On the other hand, the five municipalities that had improved oral health, according to the categories analyzed, offered better living conditions to the population, with higher life expectancy, low infant mortality rates, per capita income among the highest in the state as well as high Human Development Index (HDI) means. Therefore, it is possible to conclude that public policies that include aspects beyond the health sector are decisive for a real change in health care models
Resumo:
O objetivo do artigo é tratar das mutações sociais que ocorrem no mundo do trabalho a partir da era neoliberal no Brasil. Examina-se a precarização do trabalho como sendo elemento compositivo do novo metabolismo social que emerge com a reestruturação produtiva do capital e a constituição do Estado neoliberal. Apresenta-se como bases objetivas da precarização do trabalho, a intensificação (e ampliação) da exploração (e espoliação) da força de trabalho, o desmonte de coletivos de trabalho e de resistência sindical-corporativa; assim como a fragmentação social nas cidades em virtude do crescimento exacerbado do desemprego em massa.
Resumo:
Documento en inglés ingresado en Biblioteca (97446)
Resumo:
Incluye Bibliografía
Resumo:
Incluye Bibliografía
Resumo:
Incluye Bibliografía
Resumo:
Incluye Bibliografía
Resumo:
Incluye Bibliografía