{"id":66020,"date":"2018-09-18T10:19:05","date_gmt":"2018-09-18T10:19:05","guid":{"rendered":"http:\/\/www.kriativ-tech.com\/?p=66020"},"modified":"2019-01-04T09:41:13","modified_gmt":"2019-01-04T09:41:13","slug":"cybersecurity-a-importancia-das-passwords","status":"publish","type":"post","link":"https:\/\/www.kriativ-tech.com\/?p=66020","title":{"rendered":"Cybersecurity: a import\u00e2ncia das passwords"},"content":{"rendered":"<p>[vc_row][vc_column width=&#8221;1\/2&#8243;][vc_custom_heading heading_semantic=&#8221;p&#8221; text_size=&#8221;h5&#8243; text_height=&#8221;fontheight-843833&#8243; text_font=&#8221;font-213936&#8243;]Kriativ-tech<br \/>\nVolume 1, Issue 7, April 2018, Pages: xxx<br \/>\nReceived: Nov. 28, 2017;<\/p>\n<p>Accepted: Dec. 8, 2017;<\/p>\n<p>Published: Feb. 24, 2018[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;h3&#8243;]Authors[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_size=&#8221;h5&#8243;]Pedro Ramos Brand\u00e3o,Professor Coordenador do ISTEC[\/vc_custom_heading][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_custom_heading]Media[\/vc_custom_heading][vc_button button_color=&#8221;accent&#8221; border_animation=&#8221;btn-ripple-out&#8221; border_width=&#8221;0&#8243; link=&#8221;url:http%3A%2F%2Fwww.kriativ-tech.com%2Fwp-content%2Fuploads%2F2018%2F02%2FPEDROBRANDAOEDICAO7.pdf||target:%20_blank|&#8221;]PDF[\/vc_button][vc_custom_heading heading_semantic=&#8221;h4&#8243; text_size=&#8221;h4&#8243;]To cite this article[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_size=&#8221;h6&#8243;]<\/p>\n<div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p>Pedro Ramos Brand\u00e3o, Cybersecurity: a import\u00e2ncia das passwords<\/p>\n<\/div>\n<\/div>\n<\/div>\n<p>DOI:10.31112\/kriativ-tech-2018-01-18[\/vc_custom_heading][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;1&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column column_width_percent=&#8221;100&#8243; override_padding=&#8221;yes&#8221; column_padding=&#8221;1&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;h3&#8243;]Abstract[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_size=&#8221;h5&#8243; text_height=&#8221;fontheight-843833&#8243; text_font=&#8221;font-213936&#8243;]The problem of simplifying passwords. The dangers of repeating the same password on multiple systems. Analysis of the main methods used by hackers to gain access to personal information. Solutions for password security. Secure Passwords[\/vc_custom_heading][vc_empty_space empty_h=&#8221;2&#8243;][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;h3&#8243;]Keywords[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_size=&#8221;h5&#8243;]<\/p>\n<div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p>Cybersecurity, passwords, hackers, security.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/vc_custom_heading][\/vc_column][\/vc_row][vc_row][vc_column column_width_percent=&#8221;100&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;h3&#8243;]References[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_size=&#8221;h5&#8243; text_height=&#8221;fontheight-843833&#8243; text_font=&#8221;font-213936&#8243;]<\/p>\n<div class=\"page\" title=\"Page 11\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p><em>Diogenes, Yuri (2028). Cybersecurity &#8211; Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics. Packt.<\/em><\/p>\n<p><em>Stallings, William (2018). Effective Cybersecurity: A Guide to Using Best Practices and Standards. Addison-Wesley.<\/em><\/p>\n<p><em>Maymi, Fernando (2018). CompTIA CySA+ Cybersecurity Analyst Certification. CompTIA.<\/em><\/p>\n<p><em>Hubbard, Douglas (2018). How to Measure Anything in Cybersecurity Risk. Wiley.<\/em><\/p>\n<p><em>Kohnke, Anne (2018). Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework. CRC Press.<\/em><\/p>\n<p><em>Behan, Maria (2018). Beginner&#8217;s Guide to Information Security: Kickstart your security career with insight from InfoSec experts. Peerlyst.<\/em><\/p>\n<p><em>Brooks, Charles (2018). Cybersecurity Essentials. Sybex.<\/em><\/p>\n<p><em>Arnold, Rob (2017). Cybersecurity. Threat Sketch, LLC.<\/em><\/p>\n<p><em>Kohnke, Anne (2016). The Complete Guide to Cybersecurity Risks and Controls. CRC Press.<\/em><\/p>\n<p><em>Guiora, Amos (2017). Cybersecurity: Geopolitics, Law, and Policy. Routledge.<\/em><\/p>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/vc_custom_heading][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Author: Pedro Ramos Brand\u00e3o<br \/>\nDOI: 10.31112\/kriativ-tech-2018-01-18<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[67],"tags":[],"_links":{"self":[{"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/posts\/66020"}],"collection":[{"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=66020"}],"version-history":[{"count":6,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/posts\/66020\/revisions"}],"predecessor-version":[{"id":66055,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/posts\/66020\/revisions\/66055"}],"wp:attachment":[{"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=66020"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=66020"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=66020"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}