|

Menu

  • Journals
  • Who we are
  • Editorial process
Journals
Who we are
Editorial process
  • Register
  • Login
  • |
    en
    es Español pt_PT Português
    MLSPM

    Sponsored by:

    Logo Funiber
    Logo UNINI Logo UNEAT
    Logo UNIB Logo unincol
    Logo unidc Logo Romana
    Logo PM Logo UNEAT
    Logo UNINI
    Logo UNEAT
    Logo UNIB
    Logo unincol
    Logo unidc
    Logo Romana
    Logo PM
    • Current
    • Archives
    • About
      • Sobre la revista
      • Editorial Team
      • Reviewers
      • Statistics
    • Submissions
    • Indexation
    • Contact us

    Importance of information security in corporate information technology companies

    Published 2020-06-02

    DOI:

    https://doi.org/10.35992/pdm.v2i1.431

    Fernando Quissanga

    ORCID http://orcid.org/0000-0002-6738-6572

    Roberto Fernandes

    ORCID http://orcid.org/0000-0002-6738-6572

    Available formats

    PDF

    pt_PT

    PDF

    es

    PDF

    en

    Item number

    Vol. 2 No. 1 (2020)

    ISSN: 2683-1597

    Published: 2020-05-15

    Abstract

    The importance of information security in corporate information technology companies has the primary objective of proposing security measures to protect information in corporate information technology companies. In this sense, the research is a qualitative research, exploratory and descriptive, as it is based on the search for bibliographic material that makes it possible to suggest security measures for the protection of information. Secondary data were collected systematically, looking for the keyword - security measures and their synonyms. The search was carried out in computerized databases, such as Google Acadêmico® and the Portal de Periódicos Capes. A set of suggestions for security measures that enable corporate companies in the field of Information Technology to take advantage of has been identified. It is highlighted as a conclusion that the proposed preventive, detective and corrective measures must be involved in a security and contingency plan disseminated throughout the organization.


    Downloads

    Download data is not yet available.

    Statistics


    How to Cite

    • ACM
    • ACS
    • APA
    • ABNT
    • Chicago
    • Harvard
    • IEEE
    • MLA
    • Turabian
    • Vancouver
    • AMA
    Importance of information security in corporate information technology companies. (2020). Project Design and Management , 2(1). https://doi.org/10.35992/pdm.v2i1.431
    EndNote Zotero Mendeley
    Download .ris
    EndNote
    Download .bib

    Quotes

    CERT.br. (2012). Cartilha de Segurançapara Internet: Interceptação de tráfego (Sniffing). 4.0-Versão. São Paulo. Retrieved from http://cartilha.cert.br/.

    Coopamootoo, K. (2018). Cyber Security: Privacidade online e offline. [vídeo]. Newcastle University. Retrieved from

    https://www.futurelearn.com/courses/cyber-security/0/steps/19596.

    Creswell, J. W. (2010) Projeto de pesquisa métodos qualitativo, quantitativo e misto. In: Projeto de pesquisa métodos qualitativo, quantitativo e misto.

    Financial Fraud Action UK. (2017). Fraud The Facts: This category covers fraud on cards that have been. Retrieved from

    https://www.financialfraudaction.org.uk/fraudfacts17/assets/fraud_the_facts.pdf.

    Futurelearn. (2018a). Cyber Security: Riscos pessoais decorrentes de violação de privacidade nos negócios. [vídeo]. Newcastle University. Retrieved from https://www.futurelearn.com/courses/cyber-security/0/steps/19598.

    Futurelearn (2018b) Cyber Security for Small and Medium Enterprises: What can we learn from this attack? Universidade Deakin. Retrieved from https://www.futurelearn.com/courses/cyber-security-business#what-is-upgrade.

    Gonsalez. Y. J. (2011) Que es Protocolo SET. Universidad de le Salle. Retrieved from https://www.researchgate.net/publication/261551164_QUE_ES_PROTOCOLO_SET

    Martinelli, H. (2008). Vírus de Celular: Estudo e classificação para um protótipo de defesa: O início das ameaças: Quanto às formas de propagação mais comuns temos. Uniritter. Brasil - RS, Porto Alegre.

    Laureano, M. A. P. (2005) Gestão de segurança da informação. Retrieved from http://www.mlaureano.org/aulas_material/gst/apostila_versao_20.pdf.

    Oficina da Net. (2015) Samsung é condenada a pagar indenização milionária a Apple. Retrieved from

    https://www.oficinadanet.com.br/post/14544-samsung-e-condenada-a-pagar-indenizacao-milionaria-a-apple.

    Oliveira, G. (2009). Segurança de redes:As ameaças organizacionais. Escola Superior Aberta do Brasil - Vitoria - Espírito Santo.

    Quissanga, F. C. (2015).Caracterização de vírus informáticos em telefonia móvel celular:Propagação e infecção.(Trabalho de conclusão do curso) Escola Superior Aberta do Brasil -ESAB - Vitoria - Espírito Santo.

    Portal de periódicos capes. Missão e Objetivos. Retrieved from https://www.periodicos.capes.gov.br/index.php?option=com_pcontent&view=pcontent&alias=missao-objetivos&Itemid=144.

    Terra (2016). Panama Papers. Retrieved from https://www.terra.com.br/noticias/mundo/panama-papers-geram-denuncias-e-investigacoes-em-todo-o mundo,814039f797239995dea030884e41f8faakajlviv.html.

    Scholarship

    en en

    Search Documents

    Submit an article

    MLS Journals accepts submissions in English, Spanish, and Portuguese.

    Sponsored by:

    Logo Funiber
    Logo UNINI
    Logo UNEAT
    Logo UNIB
    Logo unincol
    Logo unidc
    Logo Romana
    Logo PM
    EU Flag

    Contact

    Parque Científico y Tecnológico de Cantabria. C/Isabel Torres 21.

    39011 Santander, Spain.

    © 2026 Multi-Lingual Scientific (MLS) Journals. All rights reserved. | Privacy Policy | Transparency | Projects | News