Detection and Handling of Threats in Pre-Established Networks Through a Junior Perspective in Internship Scenario

Authors

  • Carlos Barros IPCA – Polytechnic of Cávado and Ave
  • Nuno Mateus-Coelho IPGT-Polytechnic Institute of Management and Technology https://orcid.org/0000-0001-5517-9181

DOI:

https://doi.org/10.56394/aris2.v1i1.5

Keywords:

cybersecurity, threats, infrastructure, free tools

Abstract

In this paper, there are two questions that we seek to answer, what are the tools used in the industry nowadays regarding its cybersecurity? How is cybersecurity being approached and dealt with by the companies and their greatest difficulties? Along the way it’s observed how the entire interaction with clients is made as also how the investigation on possible threats is conducted and handled, passing through how to detect, analyze and interact with the client team in the mitigation of it, this taking into consideration their infrastructure and capabilities. This paper is taken from the point of view of a junior utilizing free tools to analyze threats and dealing with attempts of infiltrating the network utilizing social engineering tactics as well as more technical skills.

References

I. Security, “Cost of a Data Breach,” 2020

N. Coelho, B. Fonseca e A. Castro, “Paranoid operative system methodology for anonymous & secure web browsing, doctoral project,” in Atas da Conferência da Associação Portuguesa de Sistemas de Informação, Portugal, 2017

C. P. S. T. Ltd, “Check Point R80.10,” [Online]. Available: https://www.checkpoint.com/downloads/products/r80.10-security-management-architecture-overview.pdf. [Accessed em 20 08 2021

M. M. Cruz-Cunha, N. R. Mateus-Coelho, Handbook of Research on Cyber Crime and Information Privacy, IGI Global, 2020

R. Serra, Realizador, Television Delivers People. [Movie]. USA: Richard Serra, 1973

I. XFE, “Perguntas mais frequentes,” [Online]. Available: https://exchange.xforce.ibmcloud.com/faq. [Acedido em 16 09 2021]

J. S. L. 2021, “Automated Malware Analysis -Joe Sandbox Cloud Basic,” © Joe Security LLC 2021, [Online]. Available: https://www.joesandbox.com

Downloads

Published

2021-12-30

How to Cite

[1]
C. Barros and N. Mateus-Coelho, “Detection and Handling of Threats in Pre-Established Networks Through a Junior Perspective in Internship Scenario”, ARIS2-Journal, vol. 1, no. 1, pp. 41–49, Dec. 2021.