Detection and Handling of Threats in Pre-Established Networks Through a Junior Perspective in Internship Scenario
DOI:
https://doi.org/10.56394/aris2.v1i1.5Keywords:
cybersecurity, threats, infrastructure, free toolsAbstract
In this paper, there are two questions that we seek to answer, what are the tools used in the industry nowadays regarding its cybersecurity? How is cybersecurity being approached and dealt with by the companies and their greatest difficulties? Along the way it’s observed how the entire interaction with clients is made as also how the investigation on possible threats is conducted and handled, passing through how to detect, analyze and interact with the client team in the mitigation of it, this taking into consideration their infrastructure and capabilities. This paper is taken from the point of view of a junior utilizing free tools to analyze threats and dealing with attempts of infiltrating the network utilizing social engineering tactics as well as more technical skills.
References
I. Security, “Cost of a Data Breach,” 2020
N. Coelho, B. Fonseca e A. Castro, “Paranoid operative system methodology for anonymous & secure web browsing, doctoral project,” in Atas da Conferência da Associação Portuguesa de Sistemas de Informação, Portugal, 2017
C. P. S. T. Ltd, “Check Point R80.10,” [Online]. Available: https://www.checkpoint.com/downloads/products/r80.10-security-management-architecture-overview.pdf. [Accessed em 20 08 2021
M. M. Cruz-Cunha, N. R. Mateus-Coelho, Handbook of Research on Cyber Crime and Information Privacy, IGI Global, 2020
R. Serra, Realizador, Television Delivers People. [Movie]. USA: Richard Serra, 1973
I. XFE, “Perguntas mais frequentes,” [Online]. Available: https://exchange.xforce.ibmcloud.com/faq. [Acedido em 16 09 2021]
J. S. L. 2021, “Automated Malware Analysis -Joe Sandbox Cloud Basic,” © Joe Security LLC 2021, [Online]. Available: https://www.joesandbox.com
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2021 Carlos Barros, Nuno Mateus-Coelho

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.