IT Integration in Inclusive Education

Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.

Authors

Carla Sousa, Escola de Ciências e Tecnologia, Departamento de Engenharias Universidade de Trás-os-Montes e Alto Douro

Media

PDF

To cite this article

Carla Sousa, IT Integration in Inclusive Education

DOI: 10.31112/kriativ-tech-2021-10-65

Abstract

Promoting contextualised and meaningful learning is a peremptory issue in an inclusive school. The motivation for this study was based on the observation of the difficulties and adaptations of educational practice around children and young people with specific needs. It was verified the scarcity of free technological resources at national level, the need to use international software and the difficulties experienced by teachers and technicians in adapting educational models due the lack of training in the area of information and communication technologies. This study aims to identify the software and educational digital resources aimed at special education existing in three clusters, the difficulties experienced by teachers and technicians in adapting materials and the importance of new technologies in inclusive education. To this end, a survey was used as a research method in the School Groups of Entroncamento, Vila Nova da Barquinha and Torres Novas with the participation of special education groups and specialised technicians. Its access was made available to participants via email, the data gathered were subjected to a qualitative and quantitative analysis, with exploratory descriptive analysis in the objective questions and content analysis in the descriptive ones. Additionally, a literature review was conducted around technology and inclusive education based on articles published in the B-On scientific database. After the selection, 6 studies were considered as the final sample of the investigation. The main results of the research carried out, point to the importance of technological resources in optimizing inclusive education, particularly in students with specific needs. The scarcity of materials that allow the adaptability of content to the specificities of students and the lack of training of professionals in the area of ICT.

Keywords

Technology in Inclusive Education, Inclusion, Special Education.

References

1) Bardin, L. Analise de conteúdo. Lisboa: Editora 70,1977

2) Biazus. G. Ferreira; Rieder. C. Roberto Mello (2019), Uso da Tecnologia Assistiva na Educação Inclusiva no Ambiente Escolar: Revisão Sistemática, Revista Educação Especial. ISSN:1984-686X.

3) Carvalho. S; Campos. A; Moreira. A; Santos. P. (2019), ISSN: 1647-3582, Práticas educativas inclusivas mediadas pelas TIC, Indagatio Didactica, vol. 11 (3)

4) Despacho N. º 5291/2015, 21 maio. Diário da República, 2.ª serie — N. º 98 — 21 de maio de 2015. Disponível em :https://dre.pt/application/file/67271120. Acesso em: 12-07-2021

5) Direção-Geral da Educação (2012), Guia dos CRTIC e das Tecnologias de Apoio

6) Direção-Geral da Educação (2012), Educação Inclusiva. Disponível em: https://www.dge.mec.pt/educacaoinclusiva. Acesso em: 10-07-2021

7) Dorziat, A. (2014). O profissional da inclusão escolar. Cadernos de Pesquisa, 43(150), 986-1003.

8) Erdem, R. (2017). Students with special educational needs and assistive technologies: A literature review. Turkish Online Journal of Educational Technology TOJET, 16(1), 128-146

9) Gonçalves. J. Rita Domingues (2013), As T.I.C. Como Recurso a Inclusão de crianças com N.E.E. Escola Superior de Educação João de Deus, Lisboa

10) GLAT, Rosana (organização e edição), 2007, Educação Inclusiva: Cultura e Cotidiano Escolar, Questões atuais em Educação Especial, Rio de Janeiro, 7 Letras

11) Lima – Rodrigues, Luzia (coordenação); Ferreira, Ana Maria; Trindade, Ana Rosa; Rodrigues, David; Coloa, Joaquim; Nogueira, Jorge Humberto; Magalhães, Maria Bibi Ana, 2007, Percursos de Educação Inclusiva em Portugal, dez estudos de caso, Forum de Estudos de Educação Inclusiva/ Departamento de Educacão Especial e Reabilitação da faculdade de Motricidade Humana/ Universidade Técnica de Lisboa.

12) Matos, S. N., Mendes, E. G. (2015). Demandas de professores decorrentes da inclusão escolar. Revista Brasileira de Educação Especial, 21(1), 9-22.

13) Simoni Pires da Fonseca, Maria Madalena Moraes Sant’Anna, Paula Tatiana Cardoso, Solange Aparecida Tedesco (2018), ISSN 2526-8910. Detailing and reflections on occupational therapy in the process of school inclusion. Cad. Bras. Ter. Ocup., Sao Carlos, v. 26, n. 2, p. 381-397

14) Siqueira, I. M., Santana, C. D. S. (2010). Propostas de acessibilidade para a inclusão de pessoas com deficiências no ensino superior. Revista Brasileira de Educação Especial, 16(1), 127-136.

15) Revista Tecné, Episteme y Didaxis. A no 2018. Número Extraordinário. ISSN impreso: 0121-3814, ISSN web: 2323-0126 Memórias, Octavo Congreso Internacional de formación de Profesores de Ciências para la Construcción de Sociedades Sustentables. Octubre 10, 11 Y 12 de 2018, Bogotá

16) Trevisan, J. G.; Barba, P. C. S. D. Reflexões acerca da atuação do terapeuta ocupacional no processo de inclusão escolar de crianças com necessidades educacionais especiais. Cadernos de Terapia Ocupacional da UFSCar, São Carlos, v. 20, n. 1, p. 89-94, 2012. Disponível em: http://doi.editoracubo.com.br/10.4322/cto.2012.010, Acesso em: 07 julho 2021.


Procedural generation: diversification algorithms for level generation in an RPG video game

Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.

Authors

Ricardo Baptista, Assistant Professor at ISTEC-Porto/ CITECA

Renato Santos, Computer Degree at ISTEC-Porto

Media

PDF

To cite this article

Ricardo Baptista, Renato Santos, Procedural generation: diversification algorithms for level generation in an RPG video game DOI: 10.31112/kriativ-tech-2021-10-66

Abstract

It is necessary to provide some gameplay diversity to nurture a growing desire to play again when it comes to simple video games. To this end, we can focus on one of the most prominent components, the videogame environment itself.

Procedural generation algorithms assist both the developer in the development process and the player by providing new experiences each time he plays. However, studying and choosing the correct algorithm for the desired video game style is essential for success since if the algorithm does not fit the intended purpose, the feeling when playing will not be the same.

This article intends to approach some of the videogame genres and present a procedural level generation algorithms study, followed by the analysis of the algorithm implemented in a videogame developed as a personal project.

Keywords

Procedural generation, videogames, RPG, development, algorithm

References


Security and Privacy in Cloud Computing: Simple Checklist to Virtualization

Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.

Authors

Dulce Mourato, Assistant Professor at ISTEC

Media

PDF

To cite this article

Dulce Mourato, Security and Privacy in Cloud Computing: Simple Checklist to Virtualization

DOI: 10.31112/kriativ-tech-2021-10-63

Abstract

With the COVID-19 Pandemic, Portuguese enterprises discover the crucial opportunity to make the difference worldwide with virtualization, using Cloud Computing technologies, however they are yet not fully convinced. Cloud security and privacy seems to be the main problems for organizations early adoption. It was possible to use a descriptive methodology, and an literature review approach to differentiate solutions, build on a simple checklist format and reveal essential arguments, that any small and medium-sized Portuguese company should take into account, before purchasing Cloud technologies adapted to its potential growth.

One of the major limitations of this study, was the inability to point out at real business environment, only using observation and scientific, technological and specialized level studies, presented here as potential result. The goal was verify if the applications or services implementation for protection and security scalability - really works.

Keywords

Security, Privacy, Cloud Computing, Virtualization, Checklist.

References

[1]  IDC Portugal. Future Enterprise: Building Resiliency and Agility to Thrive in the Next Normal. IDC Futur Scape Portugal - Digital Event. Lisboa, 2021. https://idcportugal.com/solucoes/eventos/ [Accessed 2 11 2021].

[2] Aristova, S., Daradkeh Y. I.  & Korolev, P. A General Systems Approach to Cloud Computing Security Issues. Intechopen, 2020. p. 4. https://www.intechopen.com/chapters/71961 [Accessed 2 11 2021].

[3] Zissis, D. and Lekkas, D. Addressing cloud computing security issues. Future Generation Computer Systems., pp. 583-592.,2012.http://www.sciencedirect.com/science/article/pii/S0167739X10002554http://dx.doi.org/10.1016/j.future.2010.12.006 [Accessed 2 11 2021].

[4] Bhandari B, Zheng J. A Preliminary Study On Emerging Cloud Computing Security Challenges., ACM, 2018. https://arxiv.org/pdf/1808.04143.pdf [Accessed 2 11 2021]

[5]  Gonzalez, N., Miers, C., Redígolo, F., Simplício, M., Carvalho, T., Näslund, M. and PourzandI, M. A quantitative analysis of current security concerns and solutions for cloud computing., Journal of Cloud Computing,, pp. 1-18., 2012. https://journalofcloudcomputing.springeropen.com/articles/10.1186/2192-113X-1-11 [Accessed 2 11 2021]

[6]  Alqahtani, H. A novel approach to providing secure data storage using multi cloud computing. University of Bedfordshire., London. England., 2019. [Accessed 2 10 2021]

[7]  Ray, D. Cloud Adoption Decisions: Benefitting from an Integrated Perspective. The Electronic Journal Information Systems Evaluation. 2016. 19 (1), 3-21. https://academic-publishing.org/index.php/ejise/article/view/168 [Accessed 2 10 2021]

[8} Nagahawatta, R.; Warren, M.; Salzman S. and Lokuge S. Security and Privacy Factors Influencing the Adoption of Cloud Computing in Australian SMEs. PACIS 2021 Proceedings. 7., 2021.

[9] Gartner Group. Gartner Top Strategic Technology Trends for 2022.  20 10 2021. [Online]. Available: https://www.gartner.com/en/information-technology/insights/top-technology-trends. [Accessed 2 11 2021].

[10]  Brandao, P. R.  and Martins M. CyberSecurity - Risks of Telework. Kriativ-Tech, no. 9, p. 4, 26 October 2021. http://www.kriativ-tech.com/?p=66388

[11] Dalmazo, B. A Prediction-based Approach for Anomaly Detection in the Cloud, Coimbra: PhD Thesis, Department of Informatics Engineering Faculty of Sciences and Technology University of Coimbra, 2018. https://eg.uc.pt/bitstream/10316/81235/1/A%20Prediction-based%20Approach%20for%20Anomaly%20Detection%20in%20the%20Cloud.pdf


The Relevance and the Concerning Sides of the Distance Education

Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.

Authors

José Câmara, Assistant Professor at ISTEC

Media

PDF

To cite this article

José Câmara, The Relevance and the Concerning Sides of the Distance Education

DOI: 10.31112/kriativ-tech-2021-10-61

Abstract

Distance Education is becoming very popular and important nowadays, not only due to the pandemic moment that we are living, but also due to the several advantages it offers over the traditional teaching models and a need there is  for it.

This article presents the main characteristics and concepts, as well as the relevance and the concerning sides of the Distance Education.

Keywords

Distance Education,  Multimedia, Video Conference, Community of Inquiry, Cognitive Learning, Synchronous Learning, Asynchronous Learning.

References

[1]Siemens, George, in edX Course: Pivoting to Online Teaching and Practitioner Perspectives (2020). Consultado em https://courses.edx.org/dashboard

 

[2]Mirriahi,  Negin, in edX Course: Pivoting to Online Teaching and Practitioner Perspectives (2020). Consultado em https://courses.edx.org/dashboard

 

[3]Anderson, T., Rourke, L., Garrison, D. R., Archer, W. (2001). Assessing Teaching presence in a Computer Conference Environment. Consultado em https://coi.athabascau.ca/coi-model/

Journal of Asynchronous Learning Networks, 5(2), 1-17. Consultado em http://cde.athabascau.ca/coi_site/documents/Anderson_Rourke_Garrison_Archer_Teaching_Presence.pdf

 

[4]In edX Course: Pivoting to Online Teaching and Practitioner Perspectives (2020) Consultado em

https://courses.edx.org/dashboard

 

[5]Crosslin, Matt. Consultado em https://mattcrosslin.com/
[6]Kerketta, Susma, M. The Need and Importance of Distance Education in India.

Higher Education Review. Consultado em https://www.thehighereducationreview.com/news/the-need-and-importance-of-distance-education-in-india-nid-867.html

 

[7]Rigney, Lester-Irabinna. Consultado em https://people.unisa.edu.au/Lester.Rigney

Defining culturally responsive digital education for classrooms: Writing from Oceania to build indigenous pacific futures. In E. A. McKinley & L. T. Smith (Eds.), Handbook of Indigenous Education (pp. 1–17). Springer Singapore. Consultado em https://doi.org/10.1007/978-981-10-1839-8_44-1


CyberSecurity - Risks of Telework

Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.

Authors

Pedro Ramos Brandao, Coordinator Professor at ISTEC
Manuel Martins, Master's student in Computing at ISTEC

Media

PDF

To cite this article

Pedro Ramos Brandao, Manuel Martins, CyberSecurity - Risks of Telework 

DOI: 10.31112/kriativ-tech-2021-10-60

Abstract

Nowadays, telework is increasingly seen as an issue that must be addressed importantly and that solutions are found to enhance and strengthen it. As a result, organizations are increasingly relying on hybrid models of telework and presential work. The purpose of this paper is to assess whether an objective approach in the correlation between the tools made available and employee training and awareness for good use practices will reduce the risks associated with telework.

Keywords

Telework, Cybersecurity, Professional Qualification

References

[1]      "Work from Home Cyber Risks – CyberExperts.com." [Online]. Available: https://cyberexperts.com/work-from-home-cyber-risks/. [Accessed: 19-Jul-2021].

[2]      D. Dahlberg, "Identifying Unique Risks Of Work From Home-Remote Office Networks," p. 6, 2020.

[3]      GundechaPritam, BarbierGeoffrey, TangJiliang, and LiuHuan, "User Vulnerability and Its Reduction on a Social Networking Site," ACM Trans. Knowl. Discov. from Data, vol. 9, no. 2, Sep. 2014, doi: 10.1145/2630421.

[4]      L. Marinos and M. Lourenço, ENISA Threat Landscape Report 2018 15 Top Cyberthreats and Trends, no. January. 2018.

[5]      “CyberEdge 2020 Cyberthreat Defense Report Infographic | CyberEdge Group.” [Online]. Available: https://cyber-edge.com/resources/cyberedge-2020-cyberthreat-defense-report-infographic/. [Accessed: 31-Jul-2021].

[6]      " What's a honeypot? How do honeypots improve security | Kaspersky.” [Online]. Available: https://www.kaspersky.com.br/resource-center/threats/what-is-a-honeypot. [Accessed: 21-Jul-2021].

[7]      L. Bonacini, G. Gallo, and S. Scicchitano, "Working from home and income inequality: risks of a 'new normal' with COVID-19," J. Popul. Econ. 2020 341, vol. 34, no. 1, pp. 303–360, Sep. 2020, doi: 10.1007/S00148-020-00800-7.

[8]      “IT Management Software & Remote Monitoring Tools | SolarWinds.” [Online]. Available: https://www.solarwinds.com/. [Accessed: 21-Jul-2021].


Next-Generation Firewalls: Concept, Features, and Their Benefits

Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.

Authors

Pedro Ramos Brandao, Coordinator Professor at ISTEC
José Almeida, Master's student in Computing at ISTEC

Media

PDF

To cite this article

Pedro Ramos Brandao, José Almeida, Next-Generation Firewalls: Concept, Features, and Their Benefits

DOI: 10.31112/kriativ-tech-2021-10-59

Abstract

A firewall is a solution for securing computer networks; it can be a software program or a hardware device that allows or inhibits access to or from a system. Firewalls are used regularly to prevent untrusted Internet-originating traffic from accessing private systems and networks. All connection requests and packets that intend to pass through the firewall are analyzed according to the configured security criteria and denied or allowed. By rule, firewalls are designed to protect against unauthorized and abusive access. This paper is intended to provide a historical background on the technological evolution of firewalls and present the concept, functionalities, benefits of use, and aspects to be taken into account when choosing and setting firewalls.

Keywords

Firewall, next-generation firewall, information security, protection, technological evolution.

References

[1] SÊMOLA, Marcos. Gestão da Segurança da Informação, uma visão Executiva. (Information Security Management, an Executive View). Rio de Janeiro: Elsevier,2003

[2] ABNT NBR ISO/IEC 27001:2013 – Tecnologia da Informação – Técnicas de Segurança – Sistemas de gestão da segurança da informação — Requisitos. (Information Technology - Security Techniques - Information Security Management Systems - Requirements).

[3] BEAL, Adriana. Segurança da Informação: princípios e melhores práticas para a proteção dos ativos de informação nas organizações (Information Security: principles and best practices for the protection of information assets within organizations) – São Paulo: Atlas, 2005.

[4] ABNT NBR ISO/IEC 27002:2013 – Tecnologia da Informação – Técnicas de Segurança – Código de prática para controles de segurança da informação. (Information Technology - Security Techniques - Code of practice for information security controls).

[5] KUROSE James F., ROSS, Keith W. (2010), Redes de Computadores e a Internet 5a. Edição. (Computer Networks and the Internet 5th Edition). 2010. Pearson Publishing.

[6] CHAURE, Rupali. An Implementation of Anomaly Detection Mechanism for Centralized and Distributed Firewalls. NRI Institute of Information Science and Technology. 2010. Bhopal, India.

[7] Tanenbaum, Andrew S. Redes de Computadores - Tradução da 4ª Edição. (Computer Networks - Translation of the 4th Edition). 2003. Editora Campus / Elsevier (Campus / Elsevier Publisher)

[8] Kagermann H., Wahlster, W., & Helbig, J. Recommendations for implementing the strategic initiative Industrie 4.0, Final report of the Industrie 4.0 Working Group. 2013

[9] Ashibani, Y. & Mahmoud, H. M. Cyber-physical systems security: Analysis, challenges, and solutions. Computers & Security. 2017

[10] Ahram, T., Arman, S., Saman, S., Daniels, J., & Amaba, B. Blockchain Technology Innovations. Conference:  IEEE-Technology-and-Engineering-Management-Society Conference. 2017

[11] Babiceanu, R.  F., & Seker, R. Cybersecurity and resilience modeling for software-defined networks-based manufacturing application. In:  Service Orientation in Holonic and Multi-Agent Manufacturing. Studies in Computational Intelligence. Springer, Cham. 2017

[12] Corallo, A., Lazo, i M., & Lezzi, M. Cybersecurity in the context of industry 4.0:  A structured classification of critical assets and business impacts. Science Direct, Elsevier, Computers in Industry. 2020

[13] Dimase, D., Collier, Z.A., Heffner, K., et al. Systems engineering framework for cyber-physical security and resilience. 2015

[14] European Union Agency for Network and Information Security (ENISA). Good Practice for Security of Internet of Things in the Context of Smart Manufacturing, ENISA. 2018

[15] Greitzer, F. L., J., Purl, Y. M., & Leong P. J. S. Positioning your organization to respond to insider threats. IEEE Engineering Management Review. 2019

[16] Industrial Control Systems Cyber Emergency Response Team ICS-CERT. Annual Assessment Report. National Cybersecurity and Communications Integration Center (NCCIC). 2016

[17] Kaplan J., Weinberg, A., & Sharma, S. Meeting the cybersecurity challenge. Digit. McKinsey. 2011

[18] Liu, Y., &Xu, X. Industry 4.0 and cloud manufacturing: A comparative analysis. Journal of Manufacturing Science and Engineering. 2017

[19] Lu, T., Lin J., Zhao, L., Li, Y., & Peng, Y. A security architecture in cyber-physical systems:  security theories, analysis simulation, and application fields. 2015

[20] National   Security   &   Defense. Memorandum on   Space   Policy   Directive   5 –Cybersecurity. https://www.whitehouse.gov/presidential-actions/memorandum-space-policy-directive-5-cybersecurity-principles-space-systems. 2020

[21] Zhu, Q., Craig, R., & Basar, T. A hierarchical security architecture for cyber-physical systems. In:  2011 4th International Symposium on Resilient Control Systems. 2011

[22] Theron, P., & Lazari, A. The IACS Cybersecurity Certification Framework (ICCF). Lessons from the 2017 study of state of the art., EUR 29237 EN, Publications Office of the European Union, Luxembourg, ISBN 978-92-79-85968-7, 10.2760/856808, JRC111611. 2018

[23] Stouffer, K., Pillitteri, V., Lightman, S., Abrams, M., & Hahn, A. NIST Special Publication 800-82.  Guide to Industrial Control Systems (ICS) Security. National Institute of Standard and Technology (NIST). 2015

[24] Fortinet the Next Step in Enterprise Firewall Evolution. https://www.fortinet.com/blog/industry-trends/the-next-step-in-enterprise-firewall-evolution

[25] Gartner. Available at: http://www.gartner.com/it-glossary/next-generationfirewalls-ngfws. 2015

[26] MANECA, Miguel António Moreira Boavida. Firewalls: A Próxima Geração, 2018. (The Next Generation, 2018).

[27]. Shinder T.W., Shimonski R.J., Shinder D.L., 2003, The Best Damn Firewall Book Period" Syngress Publishing, Rockland.

[28] Y. Yongxin, 2011, The comparative study on network firewalls performance, 2011 IEEE 3rd International Conference on Communication Software and Networks.

[29] GARTNER Global Research and Advisory Company. www.gartner.com

[30] GARTNER Peer Insights. https://www.gartner.com/reviews/market/network-firewalls

[31] Palo Alto Networks. https://www.paloaltonetworks.com/resources/datasheets/pa-7000-series

[32] Fortinet. https://www.fortinet.com/content/dam/fortinet/assets/data-sheets/FortiGate_7000_Series_Bundle.pdf


Extended Detection and Response Importance of Events Context

Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.

Authors

Pedro Ramos Brandao, Coordinator Professor at Instituto Superior de Tecnologias Avançadas
João Nunes, Master Degree Student at Instituto Superior de Tecnologias Avançadas

Media

PDF

To cite this article

Pedro Ramos Brandao, João Nunes, Extended Detection and Response Importance of Events Context

DOI: 10.31112/kriativ-tech-2021-10-58

Abstract

In an increasingly dynamic and unpredictable world regarding IT security, it's essential to use adequate solutions that boost infrastructures protection, whether local, in the cloud, or hybrid. This article contextualizes the challenges of the new reality of remote work with traditional security solutions. Furthermore, it explains the importance of implementing a solution that has a holistic view of the infrastructure and correlates all suspicious or attack events. Thus, it enhances an improved and updated security to the current reality.

Keywords

XDR, EDR, SIEM, Correlation, Context, Cybersecurity

References

[1]       Kaspersky, "How COVID-19 changed the way people work," 2020.

[2]       W. U. Hassan, A. Bates, and D. Marino, "Tactical provenance analysis for endpoint detection and response systems," Proc. - IEEE Symp. Secur. Priv., vol. 2020-May, pp. 1172–1189, 2020, doi: 10.1109/SP40000.2020.00096.

[3]       G. Karantzas and C. Patsakis, "An Empirical Assessment of Endpoint Detection and Response Systems against Advanced Persistent Threats Attack Vectors," pp. 387–421, 2021, doi: 10.3390/jcp1030021.

[4]       S. Slate, "Endpoint Security: An Overview and a Look into the Future," Lat. Am. Polit. Hist., 2018, doi: 10.4324/9780429499340-15.

[5]       G. González-granadillo, S. González-zarzosa, and R. Diaz, “Trends, and Usage in Critical Infrastructures,” 2021.

[6]       M. Chopra and C. Mahapatra, "Significance of security information and event management (SIEM) in modern organizations," Int. J. Innov. Technol. Explor. Eng., vol. 8, no. 7, pp. 432–435, 2019.

[7]       M. Vielberth and G. Pernul, "A Security Information and Event Management Pattern," Fed. Minist. Educ. Res., vol. 1, no. November 2018, pp. 1–12, 2018.

[8]       H. Jauhiainen, "Designing End User Area Cybersecurity for Cloud-based Organization," no. February 2021.

[9]       A. Chuvakin, "Gartner Blog Network," 2013. https://blogs.gartner.com/anton-chuvakin/2013/07/26/named-endpoint-threat-detection-response/ (accessed July 2021).

[10]     Mcafee, "What is Endpoint Detection and Response (EDR)? " 2021.

[11]     "Endpoint Detection and Response - Global Market Outlook (2017-2026)," Stratistics Market Research Consulting, 2018. https://www.marketresearch.com/Stratistics-Market-Research-Consulting-v4058/Endpoint-Detection-Response-Global-Outlook-12066121/ (accessed July 2021).

[12]     L. Neely and A. Torres, "Endpoint Protection and Response: A SANS Survey," SANS Inst., no. June, p. 16, 2018.

[13]     J. Petters, "What is SIEM? A Complete Beginner's Guide - Varonis," 2020. https://www.varonis.com/blog/what-is-siem/ (accessed July 2021).

[14]     Cisco, “What is XDR? - Extended Detection and Response - Cisco,” 2021. https://www.cisco.com/c/en/us/products/security/what-is-xdr.html (accessed July 2021).

[15]     Mcafee, "What Is XDR? Extended Detection and Response l McAfee," 2021. https://www.mcafee.com/enterprise/en-us/security-awareness/endpoint/what-is-xdr.html (accessed July 2021).

[16]     "Endpoint Detection and Response (EDR): o caso do contexto | Security Report," 2019. https://www.securityreport.com.br/overview/endpoint-detection-and-response-edr-o-caso-do-contexto/#.YPc5kRNKj0p (accessed July 2021).


Detection and Prevention of TCP SYN Flood DoS Attacks: Concepts

Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.

Authors

Pedro Ramos Brandao, Coordinator Professor at Instituto Superior de Tecnologias Avançadas
Jeremias Tavares, Master Degree Student at Instituto Superior de Tecnologias Avançadas

Media

PDF

To cite this article

Pedro Ramos Brandao, Jeremias Tavares, Detection and Prevention of TCP SYN Flood DoS Attacks: Concepts

DOI: 10.31112/kriativ-tech-2021-10-57

Abstract

Internet security is a topic of high importance, and in recent years it has gained greater popularity with the growing wave of DoS attacks perpetuated through TCP SYN Flood. This kind of attack has several types of motivation: political, unfair competition, human evil. It is intended to deepen the concepts related to this type of attack architecture and which vulnerabilities are exploited that possibly facilitate the success of the SYN Flood. The central attack prevention systems, IDS and IPS, are presented conceptually. A simulation of the attack in a virtually recreated environment is depicted as proof of concept and execution. In contrast, there is evidence of the greater demand and growing sophistication of the means of detection and prevention using modern technologies.

Keywords

Cybersecurity, IDS, IPS, SYN Flood, DoS

References

[1] A. Verma, R. Saha, G. Kumar, and T. Kim, "The Security Perspectives of Vehicular Networks: A Taxonomical Analysis of Attacks and Solutions", Appl. Sci., vol. 11, no. 10, 2021, doi: 10.3390/app11104682.

[2] A. E. Ibor, F. A. Oladeji, O. B. Okunoye, and O. O. Ekabua, "Conceptualisation of Cyberattack prediction with deep learning", Cybersecurity, vol. 3, no. 1, 2020, doi: 10.1186/s42400-020-00053-7.

[3] Y. Shen, E. Mariconti, P. A. Vervier, and G. Stringhini, "Tiresias: Predicting Security Events Through Deep Learning", in Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018, pp. 592–605, doi: 10.1145/3243734.3243811.

[4] K. K. Nguyen, D. T. Hoang, D. Niyato, P. Wang, D. Nguyen, E. Dutkiewicz, "Cyberattack detection in mobile cloud computing: A deep learning approach", 2018 IEEE Wireless Communications and Networking Conference (WCNC), Barcelona, pp. 1-6 2018, http://hdl.handle.net/10453/131928.

[5] Q. Zhang, K. Liu, Y. Xia, & A. Ma, "Optimal Stealthy Deception Attack Against Cyber-Physical Systems", IEEE transactions on cybernetics, 50(9), 2019, 3963–3972. https://doi.org/10.1109/TCYB.2019.2912622

[6] M. Al-Qatf, Y. Lasheng, M. Al-Habib, K. Al-Sabahi, "Deep learning approach combining sparse autoencoder with SVM for network intrusion detection", IEEE Access 6, pp. 843–856, 2018.

[7] B. Bouyeddou, B. Kadri, F. Harrou, Y. Sun, "DDOS-attacks detection using an efficient measurement-based statistical mechanism", Eng. Sci. Technol. an Int. J., vol. 23, no. 4, pp. 870–878, 2020, doi: 10.1016/j.jestch.2020.05.002.

[8] S. Shin, V. Yegneswaran, P. Porras, G. Gu, "AVANT-GUARD: Scalable and Vigilant Switch Flow Management in Software-Defined Networks", in Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, 2013, pp. 413–424, doi: 10.1145/2508859.2516684.

[9] M. Junaid et al., "An Indigenous Solution for SYN Flooding", Rev. GEINTEC-GESTAO Inov. E Tecnol., vol. 11, no. 4, pp. 2998–3022, 2021

[10] M. Rahouti, K. Xiong, N. Ghani, F. Shaikh, "SYNGuard: Dynamic threshold-based SYN flood attack detection and mitigation in software-defined networks", IET Networks, vol. 10, no. 2, pp. 76–87, 2021, doi: https://doi.org/10.1049/ntw2.12009.

[11] N. McKeown et al., "OpenFlow: Enabling innovation in campus networks", Comput. Commun. Rev., vol. 38, pp. 69-74, 2008, doi: 10.1145/1355734.1355746.

[12] E. Grimit, T. Gneiting, V. Berrocal, N.A. Johnson, "The continuously ranked probability score for circular variables and its application to mesoscale forecast ensemble verification", Quart. J. R. Meteorol. Soc. 132 (621C) 2006, https://doi.org/10.1256/qj.05.235.

[13] J. Matheson, R. Winkler, "Scoring rules for continuous probability distributions", Manage. Sci. 22 (10) 1087–1096, 1976, https://doi.org/10.1287/mnsc.22.10.1087.

[14] S. Fichera, L. Galluccio, S. Grancagnolo, G. Morabito, S. Palazzo, "Operetta: An OpenFlow-based remedy to mitigate TCP synflood attacks against web servers", Computer Networks, 92:89–100, 2015.

[15] R. Mohammadi, R. Javidan, M. Conti. "Slicots: An sdn-based lightweight countermeasure for TCP syn flooding attacks", IEEE Transactions on Network and Service Management, 2017.

[16] B. A. Khalaf et al., "A simulation study of syn flood attack in a cloud computing environment," AUS J., vol. 26, no. 1, pp. 188–197, 2019.


Technology, Empowerment and Economic Development

Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.

Authors

João Gonçalves, Assistant Professor at ISTEC

Media

PDF

To cite this article

João Gonçalves, Technology, Empowerment and Economic Development

DOI: 10.31112/kriativ-tech-2021-10-50

Abstract

This article is based on a research whose objective was to identify and analyze, in the current context of technological development related to new forms of production and organization of working times, the main impacts that are expected regarding the future of labor, the adequacy of resource qualification, and the challenges of society and economic activity.
The research has shown that technological progress, being fundamental to the sustainability of business and economy, requires adjustments at the level of resources, society and companies' empowerment, the State's crucial role in supporting and creating the conditions through public policies for development and economic recovery.

Keywords

Technology, empowerment, economic development, public policy

References

[1] Ferreira, Joana (2019). Which are the most demanded jobs by the employers in Portugal?
Eco online. August 13th - available at https://eco.sapo.pt/2019/08/13/quais-as-funcoes- mais-procuradas-pelos-empregadores-em-portugal/; accessed on 04-07-2021
[2] Nuñez, Jesus (2021). Digitalization: a path of opportunity or an inequality factor? Eco online. July 8 - available at
https://eco.sapo.pt/opiniao/digitalizacao-um-caminho-de-oportunidades-ou-um-fator-de-desigualdade/; accessed on10-07-2021
[3] European Court of Auditors (2020). European Industry Digitization: an ambitious initiative whose success depends on the continued commitment of the EU, governments, and companies. Luxembourg. EU Publications Services
[4] Teixeira, Sebastião (2013). Organizations Management. Escolar editora, 3rd edition, Lisbon
[5] Page, Michael (2021). The impact of robots on employment. Available at
https://www.michaelpage.pt/not%C3%ADcias-estudos/estudos/fw-o-trabalho-do-futuro/o-impacto-dos-rob%C3%B4s-no-emprego; accessed on 04.07.2021
[6] Mills, Corinne (2021). Fluid skills. In Michael Page. Available at https://www.michaelpage.pt/not%C3%ADcias-estudos/estudos/fw-o-trabalho-do-futuro/compet%C3%AAncias-flu%C3%ADdas; accessed on 11-07-2021
[7] OECD (2019). OECD Employment Outlook 2019: The Future of Work, OECD Publishing, Paris
[8] Portuguese Republic (2021). Green Paper on the Future of Work. Working draft, CPCS discussion
[9] Ministry of Planning (2021). Portugal 2030 Strategy. Strategic Framework Document
[10] International group that gathers the world's most ambitious digital governments, with the common goal of using digital capabilities to improve businesses and citizens' lives
[11] Informal group, created on October 5, 2020, gathering those European countries considered leaders in digital transformation
[12] D9+ members include Denmark, Finland, Sweden, the Netherlands, Luxembourg, Belgium, the United Kingdom, Ireland, and Estonia, joined by the Czech Republic, Poland, and Portugal
[13] European Commission (2020), Digital Economy and Society Index (DESI) 2020
[14] RCM no. 98/2020, of November 13
[15] Decree Law No. 13/2015, of January 26 - Article 3, paragraph 2, a)
[16] Moura, João (1986). Labor Economics. Oliveira Martins Foundation, Labor Studies collection


The (weak) involvement of women in ICT and IS: the case of ISTEC-Porto

Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.

Authors

João Emílio Almeida, Assistant Professor at ISTEC-Porto
Mariana Carneiro, Student at ISTEC-Porto
Mariana Silva, Student at ISTEC-Porto

Media

PDF

To cite this article

João Emílio Almeida, Mariana Carneiro, Mariana Silva , The (weak) involvement of women in ICT and IS: the case of ISTEC-Porto 

DOI: 10.31112/kriativ-tech-2021-10-51

Abstract

The aim of this article is to point out some insight at the low female presence in higher education courses related with ICT/IS. What are the reasons that lead most students to seek courses linked to new technologies, such as computing, artificial intelligence, cybersecurity, internet, and cloud computing, to be male whilst fewer female students follow that direction? To better contextualize this issue, data from the last 15 years at ISTEC-Porto are presented, where gender inequality is evident. Some of the reasons found in the literature are indicated and possible solutions to reduce this gender imbalance are pointed out.

Keywords

Gender inequality, digital inclusion, higher education, information technologies.

References

[1] He, J.C., Kang, S.K., Tse, K., & Toh, S.M. (2019). Stereotypes at work: Occupational stereotypes predict race and gender segregation in the workforce. Journal of Vocational Behavior, 115 (2019), 1-17.
[2] Vainionpaa, F., Kinnula, M., Iivari, N., & Molin-Juustila, T. (2019). Gendering and segregation in girls’ perceptions of IT as a career choice – a nexus analytic inquiry. In Proceedings of the 28th International Conference on Information Systems Development, Toulon, France.
[3] Almeida, B. F. D. (2020). Participação feminina no setor de sistemas de informação/tecnologias de informação em Portugal: evidência empírica (in Portuguese, Master thesis, Instituto Superior de Economia e Gestão).
[4] O’Donnell, A., & Sweetman, C. (2018). Introduction: Gender, development and ICTs. Gender & Development, 26(2), 217-229.
[5] Lang, C., Craig, A., Fisher, J., Bennetts, K., & Forgasz, H. (2010). Dualisms: what women say about working in ICT. In Proceedings of the 21st Australasian Conference on Information Systems, Brisbane, Australia.
[6] Isaacson, W. (2014). The innovators: How a group of inventors, hackers, geniuses and geeks created the digital revolution. Simon and Schuster.
[7] Williams, Kathleen Broome (2001). Improbable Warriors: Women Scientists and the U.S. Navy in World War II. Annapolis, Maryland: Naval Institute Press. ISBN 978-1-55750-961-1.
[8] Naval Historical Center. https://web.archive.org/web/20000119173039/http://history.navy.mil/photos/images/h96000/h96566kc.htm (accessed Aug. 21, 2021).
[9] N. Salim, Meet the "Mother of the Internet [Women to Watch], in IEEE Women in Engineering Magazine, vol. 4, no. 2, pp. 10-12, Dec. 2010, doi: 10.1109/MWIE.2010.938214.
[10] Dr. Radia J. Perlman. NV Access Limited, NVDA Screen Reader. https://www.nae.edu/130123/Dr-Radia-J-Perlman (accessed Aug. 21, 2021).
[11] Leonel Morgado; et al. (2006). Radia Perlman – A pioneer of young children computer programming. Current Developments in Technology-Assisted Education: 1903–1908. doi: 10.1.1.99.8166
[12] The Shalvi / Hyman Encyclopedia of Jewish Women, https://jwa.org/encyclopedia/article/perlman-radia (accessed Aug. 23, 2021).
[13] National Academy of Engineering https://www.nae.edu/MembersSection/Directory20412/27854.aspx (accessed Aug. 23, 2021).
[14] Steele Jr., Guy (2011). “An interview with Frances E. Allen”.Communications of the ACM. 54:39–45. doi:10.1145/1866739.1866752
[15] Martins, P. S. M. (2011). Mulheres nas ciências e tecnologias: escolhas e constrangimentos (in Portuguese, Master thesis, Universidade do Minho). https://repositorium.sdum.uminho.pt/handle/1822/15823
[16] Corneliussen, H. G. (2021). Women empowering themselves to fit into ICT. In Technology and Women's Empowerment. Taylor & Francis.
[17] Portuguese Women {In Tech} https://www.portuguesewomenintech.com/awards2021 (accessed Sept. 9, 2021).