dc.contributorNacamura Júnior, Luiz
dc.contributorhttp://lattes.cnpq.br/7319201804384288
dc.contributorNacamura Júnior, Luiz
dc.contributorhttp://lattes.cnpq.br/7319201804384288
dc.contributorVendramin, Ana Cristina Barreiras Kochem
dc.contributorhttp://lattes.cnpq.br/3005557336605080
dc.contributorFonseca, Mauro Sergio Pereira
dc.contributorhttp://orcid.org/0000-0003-1604-0915
dc.contributorhttp://lattes.cnpq.br/6534637358360971
dc.contributorSantin, Altair Olivo
dc.contributorhttps://orcid.org/0000-0002-2341-2177
dc.contributorhttp://lattes.cnpq.br/9604696592563769
dc.contributorMaziero, Carlos Alberto
dc.contributorhttp://lattes.cnpq.br/5659788852261811
dc.creatorUhlig, Paulo Roberto
dc.date.accessioned2019-11-14T20:18:33Z
dc.date.accessioned2022-12-06T14:13:45Z
dc.date.available2019-11-14T20:18:33Z
dc.date.available2022-12-06T14:13:45Z
dc.date.created2019-11-14T20:18:33Z
dc.date.issued2019-08-13
dc.identifierUHLIG, Paulo Roberto. Avaliação do impacto de segurança de dispositivos móveis via abordagem fuzzy. 2019. Dissertação (Mestrado em Computação Aplicada) - Universidade Tecnológica Federal do Paraná, Curitiba, 2019.
dc.identifierhttp://repositorio.utfpr.edu.br/jspui/handle/1/4565
dc.identifier.urihttps://repositorioslatinoamericanos.uchile.cl/handle/2250/5244140
dc.description.abstractSmartphones and tablets are commonly used equipment for personal purposes as well as for work-oriented activities. The number of companies that adopt the policy of allowing their users to use their own equipment to carry out personal and work activities is increasing. This policy, called Bring Your Own Device (BYOD), offers advantages such as reduced costs in the acquisition of equipment by the company, increased mobility and productivity. However, the adoption of BYOD offers risks because these devices may have operating system¿s customizable configurations that are too permissive and also they may store highly relevant information. In this way, the customizable settings of the mobile device¿s operating system can directly impact on the security of the equipment and as a consequence, digital threats such as malware, data theft and financial loss might occur. In this work it is proposed the collection and evaluation of the parameters of the operating system¿s customizable configurations allied to the quantification of the data stored by the user in the mobile device. In this way, it is possible to evaluate the security impact offered by the equipment and thus, qualify it to access corporate information whose relevance is compatible with the degree of security impact presented by the device. To validate the proposal, the Fuzzy BYOD (FBYOD) application was developed. This application uses fuzzy logic as the main component for the analysis of equipment. FBYOD has been evaluated in a non-simulated corporate environment where mobile devices run Android operating system and are compliant with BYOD policy. The results obtained demonstrate the effectiveness of the proposal and also reveal that users neglect important aspects of security and that in addition, above-average amounts of files, which is reported in the literature, are stored in the devices.
dc.publisherUniversidade Tecnológica Federal do Paraná
dc.publisherCuritiba
dc.publisherBrasil
dc.publisherPrograma de Pós-Graduação em Computação Aplicada
dc.publisherUTFPR
dc.rightsopenAccess
dc.subjectComputação
dc.subjectComputação móvel - Medidas de segurança
dc.subjectComputadores de bolso - Medidas de segurança
dc.subjectAplicativos móveis - Desenvolvimento
dc.subjectSistemas operacionais (Computadores) - Avaliação
dc.subjectLógica difusa
dc.subjectProteção de dados
dc.subjectCrime por computador - Prevenção
dc.subjectEmpresas - Redes de computadores - Medidas de segurança
dc.subjectMétodos de simulação
dc.subjectComputer science
dc.subjectMobile computing - Security measures
dc.subjectPocket computers - Security measures
dc.subjectMobile apps - Development
dc.subjectOperating systems (Computers) - Rating of
dc.subjectFuzzy logic
dc.subjectData protection
dc.subjectComputer crimes - Prevention
dc.subjectBusiness enterprises - Computer network - Security measures
dc.subjectSimulation methods
dc.titleAvaliação do impacto de segurança de dispositivos móveis via abordagem fuzzy
dc.typemasterThesis


Este ítem pertenece a la siguiente institución