{"id":4879,"date":"2023-04-24T12:39:03","date_gmt":"2023-04-24T15:39:03","guid":{"rendered":"https:\/\/ppee.unb.br\/?page_id=4879"},"modified":"2024-10-23T15:30:08","modified_gmt":"2024-10-23T18:30:08","slug":"linhas-de-pesquisa","status":"publish","type":"page","link":"https:\/\/ppee.unb.br\/?page_id=4879","title":{"rendered":"Linhas de pesquisa"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"4879\" class=\"elementor elementor-4879\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6537fbb e-flex e-con-boxed e-con\" data-id=\"6537fbb\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-909484e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"909484e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-539c6541\" data-id=\"539c6541\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3408d0a elementor-widget elementor-widget-text-editor\" data-id=\"3408d0a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.14.0 - 26-06-2023 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p><!-- wp:heading --><\/p>\n<p class=\"wp-block-heading\"><span style=\"text-decoration: underline;\"><strong>\u00c1rea de concentra\u00e7\u00e3o: Seguran\u00e7a Cibern\u00e9tica<\/strong><\/span><\/p>\n<p class=\"wp-block-heading\">\u00a0<\/p>\n<p><!-- \/wp:heading --><!-- wp:heading --><\/p>\n<p class=\"wp-block-heading\"><strong>LP1: Seguran\u00e7a de Infraestrutura, de Plataformas, de Software e de Sistemas<\/strong><\/p>\n<p><!-- \/wp:heading --><!-- wp:paragraph --><\/p>\n<p>Abrange seguran\u00e7a de hardware; seguran\u00e7a de rede; criptografia; sistemas operacionais e virtualiza\u00e7\u00e3o; sistemas distribu\u00eddos; autentica\u00e7\u00e3o, autoriza\u00e7\u00e3o e auditoria; seguran\u00e7a em sistemas distribu\u00eddos; seguran\u00e7a de software; seguran\u00e7a na web e mobile; seguran\u00e7a no ciclo de desenvolvimento.<\/p>\n<p><!-- \/wp:paragraph --><!-- wp:heading --><\/p>\n<p>\u00a0<\/p>\n<p class=\"wp-block-heading\"><strong>LP2: Seguran\u00e7a e intelig\u00eancia cibern\u00e9tica<\/strong><\/p>\n<p><!-- \/wp:heading --><!-- wp:paragraph --><\/p>\n<p>Abrange os softwares maliciosos e as tecnologias utilizadas para ataques; o estudo de comportamento de advers\u00e1rios; intelig\u00eancia cibern\u00e9tica; forense computacional; seguran\u00e7a de opera\u00e7\u00f5es; incidentes de seguran\u00e7a; OSINT (intelig\u00eancia de fontes abertas).<\/p>\n<p><!-- \/wp:paragraph --><!-- wp:heading --><\/p>\n<p>\u00a0<\/p>\n<p class=\"wp-block-heading\"><strong>LP3: Aspectos humanos, organizacionais, legais e regulat\u00f3rios em Seguran\u00e7a Cibern\u00e9tica<\/strong><\/p>\n<p><!-- \/wp:heading --><!-- wp:paragraph --><\/p>\n<p>Abrange a gest\u00e3o de riscos; a governan\u00e7a de tecnologia da informa\u00e7\u00e3o; os aspectos humanos em seguran\u00e7a cibern\u00e9tica; privacidade; aspetos legais e regulat\u00f3rios em seguran\u00e7a cibern\u00e9tica.<\/p>\n<p><!-- \/wp:paragraph --><!-- wp:heading --><\/p>\n<p>\u00a0<\/p>\n<p class=\"wp-block-heading\"><strong>LP4: Ci\u00eancia e engenharia de dados, e concep\u00e7\u00e3o e desenvolvimento de materiais estrat\u00e9gicos e cr\u00edticos para seguran\u00e7a cibern\u00e9tica<\/strong><\/p>\n<p><!-- \/wp:heading --><!-- wp:paragraph --><\/p>\n<p>Abrange os materiais concebidos computacionalmente para aplica\u00e7\u00f5es cr\u00edticas, constituindo os componentes de hardware computacional e de redes, de dispositivos de internet das coisas, de elementos sensores e atuadores em processos industriais e sistemas cr\u00edticos, como os de produ\u00e7\u00e3o de energia nuclear, limpeza de \u00e1gua, detec\u00e7\u00e3o de surtos epidemiol\u00f3gicos, defesa agropecu\u00e1ria, sistemas veiculares e de transporte, superf\u00edcies para aplica\u00e7\u00e3o em telecomunica\u00e7\u00f5es e assuntos similares, onde a seguran\u00e7a dos materiais semicondutores seja aspecto relevante, em diversas escalas, especialmente a dos nano-materiais. Tamb\u00e9m abrange a engenharia de dados e da intelig\u00eancia artificial para efeito de utiliza\u00e7\u00e3o na tomada de decis\u00e3o em seguran\u00e7a e intelig\u00eancia cibern\u00e9tica, com a cria\u00e7\u00e3o de processos e ferramentas de software para monitora\u00e7\u00e3o de amea\u00e7as e an\u00e1lise de risco, contramedidas de preven\u00e7\u00e3o, detec\u00e7\u00e3o, conten\u00e7\u00e3o, repara\u00e7\u00e3o, resposta passiva e ativa.<\/p>\n<p><!-- \/wp:paragraph --><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\u00c1rea de concentra\u00e7\u00e3o: Seguran\u00e7a Cibern\u00e9tica \u00a0 LP1: Seguran\u00e7a de Infraestrutura, de Plataformas, de Software e de Sistemas Abrange seguran\u00e7a de hardware; seguran\u00e7a de rede; criptografia; sistemas operacionais e virtualiza\u00e7\u00e3o; sistemas [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":5200,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/ppee.unb.br\/index.php?rest_route=\/wp\/v2\/pages\/4879"}],"collection":[{"href":"https:\/\/ppee.unb.br\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ppee.unb.br\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ppee.unb.br\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/ppee.unb.br\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4879"}],"version-history":[{"count":30,"href":"https:\/\/ppee.unb.br\/index.php?rest_route=\/wp\/v2\/pages\/4879\/revisions"}],"predecessor-version":[{"id":11516,"href":"https:\/\/ppee.unb.br\/index.php?rest_route=\/wp\/v2\/pages\/4879\/revisions\/11516"}],"up":[{"embeddable":true,"href":"https:\/\/ppee.unb.br\/index.php?rest_route=\/wp\/v2\/pages\/5200"}],"wp:attachment":[{"href":"https:\/\/ppee.unb.br\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4879"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}