Banner Portal
University extension
PDF (Português (Brasil))

Keywords

University extension
Computer system
Cybercrimes

How to Cite

Schons, A. F. ., Henke, M., & Ceolin, S. R. (2022). University extension: a theoretical and practical approach to malicious activities in the home office, good practices and prevention. International Journal of Outreach and Community Engagement, 3(00), e022004. https://doi.org/10.20396/ijoce.v3i00.16021

Abstract

The extension project, Physical and logical security in the organizational environment, a theoretical and practical approach, created in 2016, has Information Technology as its extension line, meets the UFSM extension policy and the Institutional Development Plan (PDI - CTISM /UFSM). Its main goal is to strengthen the link between the Educational Institution and the corporate environment, bringing alerts and good practices to the community to mitigate malicious activities in the use of the Internet. During the years of application, it was seen that university extension plays a much greater role than that of democratizing knowledge, as well as bringing the general community closer to the educational institution, adapting the research to the context of the general population. Becoming a means of interconnecting teaching with research and practice in the community. This article addresses the main results of the project mentioning the university extension guidelines through its main objective.

https://doi.org/10.20396/ijoce.v3i00.16021
PDF (Português (Brasil))

References

A Revista Internacional de Extensão da Unicamp segue as normas da American Psychological Association (APA) para citações e referências.

Alcoforado, A., Ribeiro, E. & Cunha, J. (2012, janeiro). Condutas do fator humano: Alicerce da Segurança da Informação. Anais do 15° Encontro Regional De Estudantes De Biblioteconomia, Documentação, Ciência E Gestão Da Informação, Cariri, CE.

De Araújo, W., De Azevedo, P. M., Silva, N. B. X.. (2013) Engenharia social nas redes sociais online: um estudo de caso sobre a exposição de informações pessoais e a necessidade de estratégias de segurança da informação. Revista Ibero-americana de Ciência da Informação. vol. 6 (n. 2), p 37-55.

Moreira, E. S. O uso de ataques diretos e pessoais da engenharia social para a obtenção de informações de uma corporação. Revista Inteligência Competitiva (2019), v. 9 (n. 1), p. 55-72.

Nagli, L. S. D. (2020, novembro). Pandemia na Pandemia: A Escalada de Ataques Cibernéticos Pós COVID-19. Anais Congresso Transformação Digital 2020, São Paulo, SP.

Universidade Federal de Santa Maria. 2008. Política de Extensão da UFSM. Santa Maria, RS. Recuperado de http://jararaca.ufsm.br/websites/prex/download/Politica/Politica.pdf

Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

Copyright (c) 2022 International Journal of Outreach and Community Engagement

Downloads

Download data is not yet available.