SEGURANÇA CIBERNÉTICA PARA DISPOSITIVOS MÓVEIS
DOI:
https://doi.org/10.61164/rmnm.v1i1.1910Keywords:
Wi-fi, hotspots, WpaEnterpriseAbstract
Wi-Fi is a wireless connection that offers advantages such as eliminating cabling and making it easier to connect to other devices compatible with this technology. In addition, the use of hotspots provides improved access control and strengthens security. However, a problem was identified in which users face difficulties accessing the wireless network due to the use of the WPA authentication method with a default password, resulting in an inadequate level of security and a lack of access control by administrators. An analysis of the network structure revealed the absence of effective access control, leading to the decision to implement a hotspot deployment project. The results of this analysis confirmed that, despite technological advances, information security on mobile devices in this context still depends a lot on the user.
Downloads
References
AVERSARI, Lucas OC; KULESZA, Raoni; MOREIRA, Josilene A. Um Estudo Prático sobre o Potencial do Ataque Slowloris a partir de Dispositivos Móveis. In: Anais do XVII Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais. SBC, 2017. p. 494-500. DOI: https://doi.org/10.5753/sbseg.2017.19523
BERTOGLIO, Daniel Dalalana et al. Weasels e a construção de conhecimento em Segurança Ofensiva. In: Anais do II Simpósio Brasileiro de Educação em Computação. SBC, 2022. p. 109-117.
BRAGA, Alexandre Melo et al. Introdução à segurança de dispositivos móveis modernos–um estudo de caso em android. Sociedade Brasileira de Computação, 2012. DOI: https://doi.org/10.5753/sbc.9464.5.2
CABRAL, Carlos Gabriel Nunes; DELOSKI, Matheus; STADLER, Júlio Cesar. Uso de técnicas de jogos em seu contexto atual: gamificação e sua importância. Anais da Jornada Científica dos Campos Gerais, v. 16, 2018.
CABRAL, Juliana Pereira; PONTES, Herleson Paiva. Segurança em Dispositivos Móveis: Um Estudo Sobre a Adoção de Boas Práticas para Proteção em Celulares. In: Anais do XLVIII Seminário Integrado de Software e Hardware. SBC, 2021. p. 58-68. DOI: https://doi.org/10.5753/semish.2021.15807
LEVY, G.; ANTÔNIO, M.; ZAMPIER. Gerenciamento de uma rede pública utilizando a ferramenta Hotspot do Sistema Operacional RouterOS. [s.l: s.n.]. Disponível em: <http://repositorioguairaca.com.br/jspui/bitstream/23102004/86/1/TCC%20Tads%20-%20Guilherme%20Levy.pdf>. Acesso em: 20 out. 2023.
MESQUITA, Pablo. Desafios da forense em dispositivos móveis. Gestão da Segurança da Informação-Unisul Virtual, 2018.
NAKAMURA, Emilio T. e DE GEUS, Paulo L. Segurança de redes em ambientes cooperativos. São Paulo SP: Novatec 2007
SILVA, Alex Aparecido et al. Metodologias ativas ao conceber, desenvolver e controlar fechaduras de forma remota, através do wi-fi com dispositivo móveL. CIMATech, v. 1, n. 8, p. 100-110, 2021.
VIANNA, Eduardo Wallier; DE SOUSA, Renato Tarciso Barbosa. Ciber Proteção: a segurança dos sistemas de informação no espaço cibernético. Revista Ibero-Americana de Ciência da Informação, v. 10, n. 1, p. 110-131, 2017. DOI: https://doi.org/10.26512/rici.v10.n1.2017.2489
ZEQUIM, Eduarda Pagim; RIBEIRO, Douglas Francisco. O papel da inteligencia artificial na segurança cibernetica: o uso de sistemas inteligentes em benefício da segurança dos dados das empresas. Revista Interface Tecnológica, v. 19, n. 1, p. 21-33, 2022. DOI: https://doi.org/10.31510/infa.v19i1.1358
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Revista Multidisciplinar do Nordeste Mineiro

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Authors who publish in this journal agree to the following terms:
Authors retain copyright and grant the journal the right of first publication, with the work simultaneously licensed under the Creative Commons Attribution License, which permits the sharing of the work with proper acknowledgment of authorship and initial publication in this journal;
Authors are authorized to enter into separate, additional agreements for the non-exclusive distribution of the version of the work published in this journal (e.g., posting in an institutional repository or publishing it as a book chapter), provided that authorship and initial publication in this journal are properly acknowledged, and that the work is adapted to the template of the respective repository;
Authors are permitted and encouraged to post and distribute their work online (e.g., in institutional repositories or on their personal websites) at any point before or during the editorial process, as this may lead to productive exchanges and increase the impact and citation of the published work (see The Effect of Open Access);
Authors are responsible for correctly providing their personal information, including name, keywords, abstracts, and other relevant data, thereby defining how they wish to be cited. The journal’s editorial board is not responsible for any errors or inconsistencies in these records.
PRIVACY POLICY
The names and email addresses provided to this journal will be used exclusively for the purposes of this publication and will not be made available for any other purpose or to third parties.
Note: All content of the work is the sole responsibility of the author and the advisor.
