Short Courses of the 8th Brazilian Symposium on Information and Computational Systems Security
Keywords:
Information Security, Computational Systems, Short Couses SBSeg 2008, SBSeg 2008Synopsis
The Brazilian Symposium on Information and Computational Systems Security (SBSeg) is a scientific event promoted annually by the Brazilian Computer Society (SBC). SBSeg represents the country’s main forum for disseminating research results and relevant activities related to information and computational systems security.
This book comprises the four chapters produced by the authors of the short courses selected for presentation at SBSeg 2008.
Chapter 1, "Gestão de Riscos", presents the security risks management process, with its advantages and limitations. This chapter includes the theoretical and practical aspects of the risks management, to create a knowledge base for the reader’s own projects. We expect this course contributes to the knowledge of the security risk management methodology.
Chapter 2, "Segurança em Redes Mesh: Tendências, Desafios e Aplicações", presents main problems, solutions and challenges for providing security in wireless mesh networks, in a theoretical way. This chapter has three main focuses: the mesh networks contextualization; Security issues in wireless mesh networks, with your challenges and deficiency and; the main proposals found in the literature.
Chapter 3, "Tráfego Internet não Desejado: Conceitos, Caracterização e Soluções", presents the unwanted traffic universe including definitions, classification, and the reasons that explain its growth. It also points out the shortcomings of the existent solutions for detection of unwanted traffic. Lastly, this chapter presents potential solutions and a list of research topics and open problems on unwanted Internet traffic.
Chapter 4, "Virtualização: Conceitos e Aplicações em Segurança", presents the fundamental concepts about virtual machines, discusses advantages and drawbacks of using virtual machines in several application domains, explores the usage possibilities of virtual machines in the systems security area, and shows some examples of popular virtual machine environments.
Chapters
-
1. Gestão de Riscos
-
2. Segurança em Redes Mesh: Tendências, Desafios e Aplicações
-
3. Tráfego Internet não Desejado: Conceitos, Caracterização e Soluções
-
4. Virtualização: Conceitos e Aplicações em Segurança