dc.contributor | Nacamura Júnior, Luiz | |
dc.contributor | http://lattes.cnpq.br/7319201804384288 | |
dc.contributor | Nacamura Júnior, Luiz | |
dc.contributor | http://lattes.cnpq.br/7319201804384288 | |
dc.contributor | Vendramin, Ana Cristina Barreiras Kochem | |
dc.contributor | http://lattes.cnpq.br/3005557336605080 | |
dc.contributor | Fonseca, Mauro Sergio Pereira | |
dc.contributor | http://orcid.org/0000-0003-1604-0915 | |
dc.contributor | http://lattes.cnpq.br/6534637358360971 | |
dc.contributor | Santin, Altair Olivo | |
dc.contributor | https://orcid.org/0000-0002-2341-2177 | |
dc.contributor | http://lattes.cnpq.br/9604696592563769 | |
dc.contributor | Maziero, Carlos Alberto | |
dc.contributor | http://lattes.cnpq.br/5659788852261811 | |
dc.creator | Uhlig, Paulo Roberto | |
dc.date.accessioned | 2019-11-14T20:18:33Z | |
dc.date.accessioned | 2022-12-06T14:13:45Z | |
dc.date.available | 2019-11-14T20:18:33Z | |
dc.date.available | 2022-12-06T14:13:45Z | |
dc.date.created | 2019-11-14T20:18:33Z | |
dc.date.issued | 2019-08-13 | |
dc.identifier | UHLIG, Paulo Roberto. Avaliação do impacto de segurança de dispositivos móveis via abordagem fuzzy. 2019. Dissertação (Mestrado em Computação Aplicada) - Universidade Tecnológica Federal do Paraná, Curitiba, 2019. | |
dc.identifier | http://repositorio.utfpr.edu.br/jspui/handle/1/4565 | |
dc.identifier.uri | https://repositorioslatinoamericanos.uchile.cl/handle/2250/5244140 | |
dc.description.abstract | Smartphones and tablets are commonly used equipment for personal purposes as well as for work-oriented activities. The number of companies that adopt the policy of allowing their users to use their own equipment to carry out personal and work activities is increasing. This policy, called Bring Your Own Device (BYOD), offers advantages such as reduced costs in the acquisition of equipment by the company, increased mobility and productivity. However, the adoption of BYOD offers risks because these devices may have operating system¿s customizable configurations that are too permissive and also they may store highly relevant information. In this way, the customizable settings of the mobile device¿s operating system can directly impact on the security of the equipment and as a consequence, digital threats such as malware, data theft and financial loss might occur. In this work it is proposed the collection and evaluation of the parameters of the operating system¿s customizable configurations allied to the quantification of the data stored by the user in the mobile device. In this way, it is possible to evaluate the security impact offered by the equipment and thus, qualify it to access corporate information whose relevance is compatible with the degree of security impact presented by the device. To validate the proposal, the Fuzzy BYOD (FBYOD) application was developed. This application uses fuzzy logic as the main component for the analysis of equipment. FBYOD has been evaluated in a non-simulated corporate environment where mobile devices run Android operating system and are compliant with BYOD policy. The results obtained demonstrate the effectiveness of the proposal and also reveal that users neglect important aspects of security and that in addition, above-average amounts of files, which is reported in the literature, are stored in the devices. | |
dc.publisher | Universidade Tecnológica Federal do Paraná | |
dc.publisher | Curitiba | |
dc.publisher | Brasil | |
dc.publisher | Programa de Pós-Graduação em Computação Aplicada | |
dc.publisher | UTFPR | |
dc.rights | openAccess | |
dc.subject | Computação | |
dc.subject | Computação móvel - Medidas de segurança | |
dc.subject | Computadores de bolso - Medidas de segurança | |
dc.subject | Aplicativos móveis - Desenvolvimento | |
dc.subject | Sistemas operacionais (Computadores) - Avaliação | |
dc.subject | Lógica difusa | |
dc.subject | Proteção de dados | |
dc.subject | Crime por computador - Prevenção | |
dc.subject | Empresas - Redes de computadores - Medidas de segurança | |
dc.subject | Métodos de simulação | |
dc.subject | Computer science | |
dc.subject | Mobile computing - Security measures | |
dc.subject | Pocket computers - Security measures | |
dc.subject | Mobile apps - Development | |
dc.subject | Operating systems (Computers) - Rating of | |
dc.subject | Fuzzy logic | |
dc.subject | Data protection | |
dc.subject | Computer crimes - Prevention | |
dc.subject | Business enterprises - Computer network - Security measures | |
dc.subject | Simulation methods | |
dc.title | Avaliação do impacto de segurança de dispositivos móveis via abordagem fuzzy | |
dc.type | masterThesis | |