Analysis of computational vulnerabilities in digital repositories

0Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Objective: Demonstrates the results of research that aimed to analyze the computational vulnerabilities of digital directories in public Universities. Argues the relevance of information in contemporary societies like an invaluable resource, emphasizing scientific information as an essential element to constitute scientific progress. Characterizes the emergence of Digital Repositories and highlights its use in academic environment to preserve, promote, disseminate and encourage the scientific production. Describes the main software for the construction of digital repositories. Method: The investigation identified and analyzed the vulnerabilities that are exposed the digital repositories using Penetration Testing running. Discriminating the levels of risk and the types of vulnerabilities. Results: From a sample of 30 repositories, we could examine 20, identified that: 5% of the repositories have critical vulnerabilities, 85% high, 25% medium and 100% lowers. Conclusions: Which demonstrates the necessity to adapt actions for these environments that promote informational security to minimizing the incidence of external and/or internal systems attacks.

Cite

CITATION STYLE

APA

Belarmino, V. F., & De Araújo, W. J. (2014). Analysis of computational vulnerabilities in digital repositories. Biblios, (56), 1–18. https://doi.org/10.5195/biblios.2014.169

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free