<div id="pf1" class="pf w0 h0" data-page-no="1"><div class="pc pc1 w0 h0"><img class="bi x0 y0 w1 h1" alt="" src="https://files.passeidireto.com/fea750a8-3022-4755-8e54-9a7c17ed5078/bg1.png"></div><div class="pi" data-data='{"ctm":[1.000000,0.000000,0.000000,1.000000,0.000000,0.000000]}'></div></div> <div id="pf2" class="pf w2 h2" data-page-no="2"><div class="pc pc2 w2 h2"><img class="bi x0 y0 w3 h3" alt="" src="https://files.passeidireto.com/fea750a8-3022-4755-8e54-9a7c17ed5078/bg2.png"></div><div class="pi" data-data='{"ctm":[1.000000,0.000000,0.000000,1.000000,0.000000,0.000000]}'></div></div> <div id="pf3" class="pf w4 h4" data-page-no="3"><div class="pc pc3 w4 h4"><img fetchpriority="low" loading="lazy" class="bi x1 y1 w5 h5" alt="" src="https://files.passeidireto.com/fea750a8-3022-4755-8e54-9a7c17ed5078/bg3.png"><div class="t m0 x2 h6 y2 ff1 fs0 fc0 sc0 ls7 ws6"> </div><div class="t m0 x3 h6 y3 ff1 fs0 fc0 sc0 ls7 ws6"> </div><div class="t m0 x4 h7 y4 ff2 fs1 fc0 sc0 ls0">P<span class="fs2 ls8 ws6">EDRO </span><span class="ls7 ws0">T</span><span class="fs2 ls1 ws6">AVARES </span><span class="ls2">S<span class="fs2 ls9 ws1">ILVA</span><span class="ls7 ws6"> </span></span></div><div class="t m0 x5 h8 y5 ff2 fs1 fc0 sc0 ls3">H<span class="fs2 ls9 ws6 v0">UGO </span><span class="ls7 ws0 v0">C<span class="fs2 lsa ws2">ARVALHO</span><span class="ws6"> </span></span></div><div class="t m0 x6 h8 y6 ff2 fs1 fc0 sc0 ls7 ws0">C<span class="fs2 lsb ws6 v0">ATARINA </span><span class="v0">B<span class="fs2 ls4 ws6">OTELHO </span>T<span class="fs2 ls9 ws1">ORRES</span><span class="ws6"> </span></span></div><div class="t m0 x7 h9 y7 ff3 fs3 fc0 sc0 ls7 ws6"> </div><div class="t m0 x8 h9 y8 ff3 fs3 fc0 sc0 ls5">S<span class="fs4 lsc ws6">EGURANÇA </span><span class="ls7 ws6"> </span></div><div class="t m0 x9 h9 y9 ff3 fs4 fc0 sc0 ls6 ws3">DOS<span class="fs3 ls7 ws6"> </span></div><div class="t m0 xa h9 ya ff3 fs3 fc0 sc0 ls5">S<span class="fs4 lsc ws7">ISTEMAS DE </span><span class="ls7 ws4">I</span><span class="fs4 lsd ws5">NFORMAÇÃO</span><span class="ls7 ws6"> </span></div><div class="t m0 x7 h6 yb ff1 fs0 fc0 sc0 ls7 ws6"> </div><div class="t m0 xb ha yc ff1 fs5 fc0 sc0 lse ws8">Gestão Estratégica da Segurança Empresarial<span class="fs6 ls7 ws6"> </span></div><div class="t m0 x7 h6 yd ff1 fs0 fc0 sc0 ls7 ws6"> </div><div class="t m0 x7 h6 ye ff1 fs0 fc0 sc0 ls7 ws6"> </div><div class="t m0 x7 h6 yf ff1 fs0 fc0 sc0 ls7 ws6"> </div><div class="t m0 xc h6 y10 ff1 fs0 fc0 sc0 ls7 ws6"> </div><div class="t m0 xd hb y11 ff2 fs2 fc0 sc0 lsf ws6">Portugal/2003 </div></div><div class="pi" data-data='{"ctm":[1.000000,0.000000,0.000000,1.000000,-63.360000,-162.000000]}'></div></div> <div id="pf4" class="pf w4 h4" data-page-no="4"><div class="pc pc4 w4 h4"><div class="t m0 xe h6 y2 ff1 fs0 fc0 sc0 ls7 ws6"> </div><div class="t m0 xe hc y12 ff4 fs7 fc0 sc0 ls18 ws9">Reservados todo<span class="_0 blank"> </span>s os direitos por Centro Atlântico, <span class="_0 blank"> </span>Lda. </div><div class="t m0 xe hd y13 ff4 fs8 fc0 sc0 ls19 wsa">Qualquer reprodução, incluindo fo<span class="_1 blank"></span>tocópia, só pode ser feit<span class="_1 blank"></span>a com autorização </div><div class="t m0 xe hd y14 ff4 fs8 fc0 sc0 ls19 wsa">expressa dos editores da obra. </div><div class="t m0 xe hd y15 ff4 fs8 fc0 sc0 ls7 ws6"> </div><div class="t m0 xe hd y16 ff4 fs8 fc0 sc0 ls7 ws6"> </div><div class="t m0 xe hd y17 ff4 fs8 fc0 sc0 ls7 ws6"> </div><div class="t m0 xe he y18 ff3 fs0 fc0 sc0 ls1a wsb">Segurança dos Sistemas de Informação - Gestão Estratégica da </div><div class="t m0 xe he y19 ff3 fs0 fc0 sc0 ls10 ws6">Segurança Empresarial </div><div class="t m0 xe hf y1a ff4 fs9 fc0 sc0 ls7 ws6"> </div><div class="t m0 xe hf y1b ff4 fs9 fc0 sc0 ls7 ws6"> </div><div class="t m0 xe hf y1c ff4 fs9 fc0 sc0 ls7 wsc">Colecção: Sociedade da Informação </div><div class="t m0 xe hf y1d ff4 fs9 fc0 sc0 ls7 wsc">Autores: Pedro Tavares Silva, Hugo Carvalho e Cata<span class="_1 blank"></span>rina Botelho Torres </div><div class="t m0 xe hf y1e ff4 fs9 fc0 sc0 ls7 ws6"> </div><div class="t m0 xe hf y1f ff4 fs9 fc0 sc0 ls11 wsd">Direcção gráfica: Centro Atlântico </div><div class="t m0 xe hf y20 ff4 fs9 fc0 sc0 ls7 wsc">Revisão final: Centro Atlântico </div><div class="t m0 xe hf y21 ff4 fs9 fc0 sc0 ls12 wse">Capa: Paulo Buchinho </div><div class="t m0 xe hf y22 ff4 fs9 fc0 sc0 ls7 ws6"> </div><div class="t m0 xe hf y23 ff4 fs9 fc0 sc0 ls7 ws6"> </div><div class="t m0 xe hf y24 ff4 fs9 fc0 sc0 ls1b wsf">© Centro Atlântico, Lda., 2003 </div><div class="t m0 xe hf y25 ff4 fs9 fc0 sc0 ls1c ws10"> Av. Dr. Carlos Bacelar, 968 - Escr. 1 - A </div><div class="t m0 xe hf y26 ff4 fs9 fc0 sc0 ls1c ws11"> 4764-901 V. N. Famalicão </div><div class="t m0 xe hf y27 ff4 fs9 fc1 sc0 ls1b ws6">© <span class="fc0 ls7 wsc">Rua da Misericórdia, 76 - 1200-273 Lisboa </span></div><div class="t m0 xe hf y28 ff4 fs9 fc0 sc0 ls11 ws6">Portugal </div><div class="t m0 xe hf y29 ff4 fs9 fc0 sc0 ls11 wsd">Tel. 808 20 22 21 </div><div class="t m0 xe h10 y2a ff3 fs9 fc0 sc0 ls7 ws6"> </div><div class="t m0 xe h10 y2b ff3 fs9 fc0 sc0 ls1d ws6">geral@centroatlantico.pt </div><div class="t m0 xe h10 y2c ff3 fs9 fc0 sc0 ls11 ws6">www.centroatlantico.pt </div><div class="t m0 xe hf y2d ff4 fs9 fc0 sc0 ls7 ws6"> </div><div class="t m0 xe hf y2e ff4 fs9 fc0 sc0 ls7 ws6"> </div><div class="t m0 xe hf y2f ff4 fs9 fc0 sc0 ls7 ws6"> </div><div class="t m0 xe hf y30 ff4 fs9 fc0 sc0 ls7 ws6"> </div><div class="t m0 xe hf y31 ff4 fs9 fc0 sc0 ls7 ws6"> </div><div class="t m0 xe hf y32 ff4 fs9 fc0 sc0 ls11 wsd">Design e Paginação: Centro Atlântico </div><div class="t m0 xe hf y33 ff4 fs9 fc0 sc0 ls7 ws6"> </div><div class="t m0 xe hf y34 ff4 fs9 fc0 sc0 ls7 wsc">Impressão e acabamento: Rolo & Filho<span class="_1 blank"></span>s </div><div class="t m0 xe hf y35 ff4 fs9 fc0 sc0 ls13 ws12">1ª edição: Abril de 2003 </div><div class="t m0 xe hf y36 ff4 fs9 fc0 sc0 ls1e ws10">ISBN: 972-<span class="ls1f">84</span>26-66-6 </div><div class="t m0 xe hf y37 ff4 fs9 fc0 sc0 ls20">D<span class="ls21">e<span class="ls22">pó<span class="ls23">s<span class="ls24">i</span></span><span class="ws13">to legal: 193.992/03 </span></span></span></div><div class="t m0 xe h11 y38 ff4 fsa fc0 sc0 ls7 ws6"> </div><div class="t m0 xe h11 y39 ff4 fsa fc0 sc0 ls7 ws6"> </div><div class="t m0 xe h11 y3a ff4 fsa fc0 sc0 ls7 ws6"> </div><div class="t m0 xe h11 y3b ff4 fsa fc0 sc0 ls7 ws6"> </div><div class="t m0 xe hc y3c ff4 fs7 fc0 sc0 ls25 ws15">Marcas registadas: todos o<span class="_0 blank"> </span>s termos mencionado<span class="_0 blank"> </span><span class="ls26 ws16">s neste livro conhecidos com<span class="_0 blank"> </span>o sendo marcas </span></div><div class="t m0 xe hc y3d ff4 fs7 fc0 sc0 ls14 ws17">registadas de produtos e serviços, foram apropriadamente capitalizados. A utilização de um </div><div class="t m0 xe hc y3e ff4 fs7 fc0 sc0 ls15 ws18">termo neste livro não deve ser encarada <span class="_0 blank"> </span>como afectando a validade de alguma marca </div><div class="t m0 xe hc y3f ff4 fs7 fc0 sc0 ls7 ws19">registada de produto ou serviço. </div><div class="t m0 xe hc y40 ff4 fs7 fc0 sc0 ls16 ws1a">O Editor e os Autores não se responsabilizam por possíveis danos morais ou físicos </div><div class="t m0 xe hc y41 ff4 fs7 fc0 sc0 ls25 ws15">causados pelas instru<span class="_0 blank"> </span>ções contidas no livro nem por ende<span class="_0 blank"> </span>reços Internet que não </div><div class="t m0 xe hc y42 ff4 fs7 fc0 sc0 ls17 ws6">correspondam às Home-Pages pretendida<span class="_0 blank"> </span>s. </div></div><div class="pi" data-data='{"ctm":[1.000000,0.000000,0.000000,1.000000,-63.360000,-162.000000]}'></div></div> <div id="pf5" class="pf w4 h4" data-page-no="5"><div class="pc pc5 w4 h4"><div class="t m0 x2 h6 y2 ff1 fs0 fc0 sc0 ls7 ws6"> </div><div class="t m0 x3 h12 y43 ff5 fs6 fc0 sc0 ls2b ws6">Agradecimentos </div><div class="t m0 x3 h6 y44 ff1 fs0 fc0 sc0 ls7 ws6"> </div><div class="t m0 x3 h6 y45 ff1 fs0 fc0 sc0 ls7 ws6"> </div><div class="t m0 x3 h6 y46 ff1 fs0 fc0 sc0 ls7 ws6"> </div><div class="t m0 x3 h6 y47 ff1 fs0 fc0 sc0 ls7 ws6"> </div><div class="t m0 x3 h6 y48 ff1 fs0 fc0 sc0 ls7 ws6"> </div><div class="t m0 x3 h6 y49 ff1 fs0 fc0 sc0 ls27 ws1b">Este e qualquer outro trabalho meu será sempre dedicado à Paula, </div><div class="t m0 x3 h6 y4a ff1 fs0 fc0 sc0 ls28 ws1c">ao Kukas e ao Kikas, pela extraordinária generosidade dela, que </div><div class="t m0 x3 h6 y4b ff1 fs0 fc0 sc0 ls29 ws1d">criou todo o tempo empregue neste projecto, e pela permanente e </div><div class="t m0 x3 h6 y4c ff1 fs0 fc0 sc0 ls29 ws1e">infinita compreensão, afecto e apoio de todos eles. </div><div class="t m0 xf h6 y4d ff1 fs0 fc0 sc0 ls2c ws6">Pedro </div><div class="t m0 x3 h6 y4e ff1 fs0 fc0 sc0 ls7 ws6"> </div><div class="t m0 x3 h6 y4f ff1 fs0 fc0 sc0 ls29 ws1f">À Filipa e ao Gugas, por tudo, ao Pedro pela energia e in<span class="_1 blank"></span>centivo, e </div><div class="t m0 x3 h6 y50 ff1 fs0 fc0 sc0 ls29 wsb">ao Fernando Almeida pela inspiração. </div><div class="t m0 x10 h6 y51 ff1 fs0 fc0 sc0 ls2c ws6">Hugo </div><div class="t m0 x3 h6 y52 ff1 fs0 fc0 sc0 ls7 ws6"> </div><div class="t m0 x3 h6 y53 ff1 fs0 fc0 sc0 ls29 ws20">Ao Nuno, à minha Mãe, à amiga Odete e em especial ao Diogo o </div><div class="t m0 x3 h6 y54 ff1 fs0 fc0 sc0 ls29 ws21">meu pequenote, por todo o apoio e carinho que me permitiram </div><div class="t m0 x3 h6 y55 ff1 fs0 fc0 sc0 ls2a ws22">participar neste projecto tão aliciante<span class="_1 blank"></span>. </div><div class="t m0 x11 h6 y56 ff1 fs0 fc0 sc0 ls1a ws6">Catarina </div><div class="t m0 x3 h6 y57 ff1 fs0 fc0 sc0 ls7 ws6"> </div><div class="t m0 x3 h6 y58 ff1 fs0 fc0 sc0 ls27 ws23">Ao Rui São Pedro, Lisete Figueiredo, Manuel Lopes Rocha, Carlos </div><div class="t m0 x3 h6 y59 ff1 fs0 fc0 sc0 ls27 ws24">Tomaz, Sandra Raimundo e Frederico Martins, muito obrigado por </div><div class="t m0 x3 h6 y5a ff1 fs0 fc0 sc0 ls28 ws25">toda a disponibilidade e empenho demonstrados. </div><div class="t m0 x12 h6 y5b ff1 fs0 fc0 sc0 ls27 wsb">Os Autores </div><div class="t m0 x7 h6 y5c ff1 fs0 fc0 sc0 ls7 ws6"> </div></div><div class="pi" data-data='{"ctm":[1.000000,0.000000,0.000000,1.000000,-63.360000,-162.000000]}'></div></div> <div id="pf6" class="pf w4 h4" data-page-no="6"><div class="pc pc6 w4 h4"></div><div class="pi" data-data='{"ctm":[1.000000,0.000000,0.000000,1.000000,-63.360000,-162.000000]}'></div></div> <div id="pf7" class="pf w4 h4" data-page-no="7"><div class="pc pc7 w4 h4"><div class="t m0 x2 h13 y5d ff1 fs9 fc0 sc0 ls7 ws6"> </div><div class="t m0 x3 h6 y2 ff1 fs0 fc0 sc0 ls7 ws6"> </div><div class="t m0 x13 h14 y5e ff5 fs3 fc0 sc0 ls7 ws4">Í<span class="fs4 ls30 ws26">NDICE</span><span class="ws6"> </span></div><div class="t m0 x3 h6 y5f ff1 fs0 fc0 sc0 ls7 ws6"> </div><div class="t m0 x3 h6 y60 ff1 fs0 fc0 sc0 ls7 ws6"> </div><div class="t m0 x3 h6 y61 ff1 fs0 fc0 sc0 ls29 ws27">Agradecimentos 5<span class="ff6 fs5 ls7 ws6 v0"> </span></div><div class="t m0 x3 h6 y62 ff1 fs0 fc0 sc0 ls28 ws28">Introdução 13<span class="fc2 ls7 ws6"> </span></div><div class="t m0 x3 h6 y63 ff1 fs0 fc0 sc0 ls7 ws6"> </div><div class="t m0 x3 h15 y64 ff5 fs0 fc0 sc0 ls2c ws29">Capítulo I - Teoria da Segurança <span class="_2 blank"> </span>17<span class="ff6 fs5 ls7 ws6 v0"> </span></div><div class="t m0 x3 h6 y65 ff1 fs0 fc0 sc0 ls29 ws1e">Princípios de Prevenção e Protecção <span class="_3 blank"> </span>17<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x14 h6 y66 ff1 fs0 fc0 sc0 ls1a ws6">Relação Custo/Benefício <span class="_4 blank"> </span>19<span class="ff6 fs5 ls7"> </span></div><div class="t m0 x14 h6 y67 ff1 fs0 fc0 sc0 ls2c ws2a">Concentração 19<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x14 h6 y68 ff1 fs0 fc0 sc0 ls27 wsb">Protecção em Profundidade <span class="_5 blank"> </span>19<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x14 h6 y69 ff1 fs0 fc0 sc0 ls27 ws2b">Consistência 20<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x14 h6 y6a ff1 fs0 fc0 sc0 ls2c ws2c">Redundância 20<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x3 h6 y6b ff1 fs0 fc0 sc0 ls27 wsb">Modelos de Segurança <span class="_6 blank"> </span>21<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x14 h6 y6c ff1 fs0 fc0 sc0 ls27 wsb">Fortaleza da Informação <span class="_7 blank"> </span>21<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x14 h6 y6d ff1 fs0 fc0 sc0 ls2c ws29">Sobrevivência da Informação <span class="_8 blank"> </span>23<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x14 h6 y6e ff1 fs0 fc0 sc0 ls1a ws6">Modelo de Maturidade <span class="_9 blank"> </span>25<span class="ff6 fs5 ls7"> </span></div><div class="t m0 x3 h6 y6f ff1 fs0 fc0 sc0 ls28 ws25">Os Actores da Segurança <span class="_a blank"> </span>26<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x14 h6 y70 ff1 fs0 fc0 sc0 ls28 ws25">Administração da Empresa <span class="_b blank"> </span>26<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x14 h6 y71 ff1 fs0 fc0 sc0 ls1a ws2d">Utilizadores 27<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x14 h6 y72 ff1 fs0 fc0 sc0 ls10 ws2e">Informáticos 29<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x14 h6 y73 ff1 fs0 fc0 sc0 ls10 ws2f">Clientes 31<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x14 h6 y74 ff1 fs0 fc0 sc0 ls2d ws30">Parceiros 32<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x14 h6 y75 ff1 fs0 fc0 sc0 ls27 wsb">Pessoal Temporário <span class="_c blank"> </span>33<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x3 h6 y76 ff1 fs0 fc0 sc0 ls2a ws31">Conclusão 33<span class="fc2 ls7 ws6"> </span></div><div class="t m0 x3 h6 y77 ff1 fs0 fc0 sc0 ls7 ws6"> </div><div class="t m0 x3 h15 y78 ff5 fs0 fc0 sc0 ls2c ws29">Capítulo II - Gestão do Risco <span class="_d blank"> </span>34<span class="ff6 fs5 ls7 ws6 v0"> </span></div><div class="t m0 x3 h6 y79 ff1 fs0 fc0 sc0 ls2e ws32">Identificação dos Riscos <span class="_e blank"> </span>34<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x14 h6 y7a ff1 fs0 fc0 sc0 ls29 ws33">Ameaças 36<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x14 h6 y7b ff1 fs0 fc0 sc0 ls2f ws34">Vulnerabilidades 38<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x14 h6 y7c ff1 fs0 fc0 sc0 ls28 ws35">Bens 39<span class="ff6 fs5 ls7 ws6"> </span></div></div><div class="pi" data-data='{"ctm":[1.000000,0.000000,0.000000,1.000000,-63.360000,-162.000000]}'></div></div> <div id="pf8" class="pf w4 h4" data-page-no="8"><div class="pc pc8 w4 h4"><div class="t m0 xe h16 y7d ff7 fs9 fc0 sc0 ls7 ws36">8<span class="ff8 fsb ls31 ws6"> <span class="fs7 ls32">S</span><span class="ls33 ws39">EGURANÇA DOS <span class="fs7 ls32">S</span><span class="ls34 ws3a">ISTEMAS DE <span class="fs7 ls7 ws37">I</span></span></span><span class="ls35">NFORMAÇÃO <span class="fs7 ls36">\u2013</span><span class="ls37"> <span class="fs7 ls38">C</span><span class="ls34">ENTRO <span class="fs7 ls32">A</span><span class="ls39 ws38">TLÂNTICO</span><span class="ff9 fsa ls7"> </span></span></span></span></span></div><div class="t m0 xe h6 y2 ff1 fs0 fc0 sc0 ls7 ws6"> </div><div class="t m0 xe h6 y3 ff1 fs0 fc0 sc0 ls2a ws22">Análises de Risco e de Impacto <span class="_8 blank"> </span>40<span class="ff6 fs5 ls7 ws6 v0"> </span></div><div class="t m0 x15 h6 y7e ff1 fs0 fc0 sc0 ls27 wsb">Análise de Risco Quantitativa <span class="_f blank"> </span>40<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x15 h6 y7f ff1 fs0 fc0 sc0 ls27 wsb">Análise de Risco Qualitativa <span class="_10 blank"> </span>42<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x15 h6 y80 ff1 fs0 fc0 sc0 ls2f ws3b">Análise de Impacto no Negócio <span class="_11 blank"> </span>45<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 xe h6 y81 ff1 fs0 fc0 sc0 ls29 ws1e">Estratégia de Controlo <span class="_12 blank"> </span>49<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x15 h6 y82 ff1 fs0 fc0 sc0 ls27 ws3c">Arquitectura 49<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x15 h6 y83 ff1 fs0 fc0 sc0 ls1a ws6">Abordagens ao Controlo de Riscos <span class="_13 blank"> </span>51<span class="ff6 fs5 ls7"> </span></div><div class="t m0 x15 h6 y84 ff1 fs0 fc0 sc0 ls1a ws3d">Maturidade 52<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x15 h6 y85 ff1 fs0 fc0 sc0 ls29 ws1e">Análise Custo/Benefício <span class="_14 blank"> </span>53<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 xe h6 y86 ff1 fs0 fc0 sc0 ls2a ws31">Conclusão 55<span class="fc2 ls7 ws6"> </span></div><div class="t m0 xe h6 y87 ff1 fs0 fc0 sc0 ls7 ws6"> </div><div class="t m0 xe h15 y88 ff5 fs0 fc0 sc0 ls10 ws3e">Capítulo III - Áreas da Segurança Empresarial <span class="_15 blank"> </span>57<span class="ff6 fs5 ls7 ws6 v0"> </span></div><div class="t m0 xe h6 y89 ff1 fs0 fc0 sc0 ls29 ws1e">Segurança da Informação <span class="_16 blank"> </span>57<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x15 h6 y8a ff1 fs0 fc0 sc0 ls27 wsb">Política, Normas e Procedimentos <span class="_17 blank"> </span>57<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x15 h6 y8b ff1 fs0 fc0 sc0 ls29 ws1e">Propriedade da Informação <span class="_18 blank"> </span>58<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x15 h6 y8c ff1 fs0 fc0 sc0 ls27 wsb">Classificação da Informação <span class="_19 blank"> </span>58<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x15 h6 y8d ff1 fs0 fc0 sc0 ls29 ws3f">Confidencialidade 60<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x15 h6 y8e ff1 fs0 fc0 sc0 ls27 ws40">Integridade 60<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x15 h6 y8f ff1 fs0 fc0 sc0 ls29 ws41">Disponibilidade 61<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x15 h6 y90 ff1 fs0 fc0 sc0 ls28 ws25">Política de Dados <span class="_1a blank"> </span>62<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 xe h6 y91 ff1 fs0 fc0 sc0 ls2a ws22">Segurança Física <span class="_1b blank"> </span>64<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x15 h6 y92 ff1 fs0 fc0 sc0 ls27 ws42">Áreas 65<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x15 h6 y93 ff1 fs0 fc0 sc0 ls29 ws1e">Localização dos Centros de Dados <span class="_13 blank"> </span>66<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x15 h6 y94 ff1 fs0 fc0 sc0 ls1a ws6">Controlo de Acessos <span class="_6 blank"> </span>67<span class="ff6 fs5 ls7"> </span></div><div class="t m0 x15 h6 y95 ff1 fs0 fc0 sc0 ls28 ws25">Eliminação de Resíduos <span class="_1c blank"> </span>68<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x15 h6 y96 ff1 fs0 fc0 sc0 ls27 ws42">Rasto 69<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 xe h6 y97 ff1 fs0 fc0 sc0 ls29 ws1e">Segurança do Pessoal <span class="_1d blank"> </span>70<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x15 h6 y98 ff1 fs0 fc0 sc0 ls2c ws43">Recrutamento 71<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x15 h6 y99 ff1 fs0 fc0 sc0 ls29 ws44">Documentação 73<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x15 h6 y9a ff1 fs0 fc0 sc0 ls1a ws6">Boas Práticas <span class="_1e blank"> </span>74<span class="ff6 fs5 ls7"> </span></div><div class="t m0 x15 h6 y9b ff1 fs0 fc0 sc0 ls1a ws45">Formação 75<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x15 h6 y9c ff1 fs0 fc0 sc0 ls1a ws46">Sensibilização 76<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x15 h6 y9d ff1 fs0 fc0 sc0 ls29 ws1e">Segregação de Responsabilidades <span class="_13 blank"> </span>79<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 xe h6 y9e ff1 fs0 fc0 sc0 ls2a ws22">Segurança Lógica <span class="_1f blank"> </span>79<span class="ff6 fs5 ls7 ws6"> </span></div></div><div class="pi" data-data='{"ctm":[1.000000,0.000000,0.000000,1.000000,-63.360000,-162.000000]}'></div></div> <div id="pf9" class="pf w4 h4" data-page-no="9"><div class="pc pc9 w4 h4"><div class="t m0 xf h17 y7d ff8 fs7 fc0 sc0 ls7 ws37">Í<span class="fsb ls3a ws47">NDICE </span><span class="ff7 fs9 ws36">9<span class="ff8 ws6"> </span></span></div><div class="t m0 x3 h6 y2 ff1 fs0 fc0 sc0 ls7 ws6"> </div><div class="t m0 x14 h6 y3 ff1 fs0 fc0 sc0 ls2f ws3b">Autenticação e Controlo de Acesso <span class="_20 blank"> </span>80<span class="ff6 fs5 ls7 ws6 v0"> </span></div><div class="t m0 x14 h6 y7e ff1 fs0 fc0 sc0 ls29 ws48">Criptografia 85<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x14 h6 y7f ff1 fs0 fc0 sc0 ls3b ws49">IPv6 88<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x14 h6 y80 ff1 fs0 fc0 sc0 ls2c ws29">Infra-Estrutura de Chaves Públicas <span class="_13 blank"> </span>89<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x14 h6 y9f ff1 fs0 fc0 sc0 ls29 ws4a">Kerberos 93<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x14 h6 ya0 ff1 fs0 fc0 sc0 ls2f ws4b">VPN 94<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x14 h6 ya1 ff1 fs0 fc0 sc0 ls1a ws4c">Antivírus 97<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x14 h6 ya2 ff1 fs0 fc0 sc0 ls29 ws1e">Filtragem de Conteúdos <span class="_21 blank"> </span>100<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x14 h6 ya3 ff1 fs0 fc0 sc0 ls2c ws4d">Redundância 101<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x14 h6 ya4 ff1 fs0 fc0 sc0 ls29 ws4e">Armazenamento 102<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x14 h6 ya5 ff1 fs0 fc0 sc0 ls1a ws6">Salvaguarda da Informação <span class="_22 blank"> </span>105<span class="ff6 fs5 ls7"> </span></div><div class="t m0 x14 h6 ya6 ff1 fs0 fc0 sc0 ls29 ws1e">Detecção de Intrusões <span class="_23 blank"> </span>111<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x14 h6 ya7 ff1 fs0 fc0 sc0 ls28 ws25">Resposta a Ataques <span class="_24 blank"> </span>114<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x14 h6 ya8 ff1 fs0 fc0 sc0 ls2c ws29">Segurança no Desenvolvimento <span class="_25 blank"> </span>120<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x3 h6 ya9 ff1 fs0 fc0 sc0 ls2c ws4f">Conformidade 124<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x3 h6 yaa ff1 fs0 fc0 sc0 ls27 wsb">Testes e Auditorias <span class="_26 blank"> </span>124<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x14 h6 yab ff1 fs0 fc0 sc0 ls29 ws1e">Auditoria Completa aos Sistemas <span class="_27 blank"> </span>126<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x14 h6 yac ff1 fs0 fc0 sc0 ls2a ws22">Testes de Intrusão <span class="_28 blank"> </span>127<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x14 h6 yad ff1 fs0 fc0 sc0 ls1a ws6">Detecção de Vulnerabilidades <span class="_11 blank"> </span>128<span class="ff6 fs5 ls7"> </span></div><div class="t m0 x14 h6 yae ff1 fs0 fc0 sc0 ls28 ws25">Detecção de Pontos de Acesso Telefónico <span class="_29 blank"> </span>128<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x14 h6 yaf ff1 fs0 fc0 sc0 ls2f ws3b">Detecção de Pontos de Acesso WLAN <span class="_2a blank"> </span>129<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x14 h6 yb0 ff1 fs0 fc0 sc0 ls1a ws6">Engenharia Social <span class="_2b blank"> </span>129<span class="ff6 fs5 ls7"> </span></div><div class="t m0 x3 h6 yb1 ff1 fs0 fc0 sc0 ls2f ws50">Conclusão 130<span class="fc2 ls7 ws6"> </span></div><div class="t m0 x3 h6 yb2 ff1 fs0 fc0 sc0 ls7 ws6"> </div><div class="t m0 x3 h15 yb3 ff5 fs0 fc0 sc0 ls2c ws29">Capítulo IV - Segurança Face ao Desastre <span class="_2c blank"> </span>133<span class="ff6 fs5 ls7 ws6 v0"> </span></div><div class="t m0 x3 h6 y96 ff1 fs0 fc0 sc0 ls2c ws29">Anatomia de um Desastre <span class="_2d blank"> </span>133<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x14 h6 yb4 ff1 fs0 fc0 sc0 ls27 wsb">Tipos de Desastre <span class="_2b blank"> </span>134<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x14 h6 yb5 ff1 fs0 fc0 sc0 ls27 ws51">Cronologia 134<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x3 h6 y99 ff1 fs0 fc0 sc0 ls27 wsb">Planeamento da Recuperação ou Continuidade do Negócio <span class="_2e blank"> </span>136<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x3 h6 yb6 ff1 fs0 fc0 sc0 ls29 ws1e">Arranque do Projecto <span class="_c blank"> </span>137<span class="_0 blank"> </span><span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x14 h6 yb7 ff1 fs0 fc0 sc0 ls27 wsb">Objectivos, Âmbito, Pressupostos e Terminologia <span class="_2f blank"> </span>137<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x14 h6 yb8 ff1 fs0 fc0 sc0 ls29 ws1e">Modelo de Gestão do Projecto <span class="_30 blank"> </span>140<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x3 h6 yb9 ff1 fs0 fc0 sc0 ls27 wsb">Redução de riscos e avaliação do impacto <span class="_31 blank"> </span>142<span class="ff6 fs5 ls7 ws6"> </span></div></div><div class="pi" data-data='{"ctm":[1.000000,0.000000,0.000000,1.000000,-63.360000,-162.000000]}'></div></div> <div id="pfa" class="pf w4 h4" data-page-no="a"><div class="pc pca w4 h4"><div class="t m0 xe h16 y7d ff7 fs9 fc0 sc0 ls3d ws52">10<span class="ff8 fsb ls31 ws6"> <span class="fs7 ls32">S</span><span class="ls33 ws39">EGURANÇA DOS <span class="fs7 ls32">S</span><span class="ls34 ws3a">ISTEMAS DE <span class="fs7 ls7 ws37">I</span></span></span><span class="ls35">NFORMAÇÃO <span class="fs7 ls36">\u2013</span><span class="ls37"> <span class="fs7 ls38">C</span><span class="ls34">ENTRO <span class="fs7 ls32">A</span><span class="ls39 ws38">TLÂNTICO</span><span class="ff9 fsa ls7"> </span></span></span></span></span></div><div class="t m0 xe h6 y2 ff1 fs0 fc0 sc0 ls7 ws6"> </div><div class="t m0 x15 h6 y3 ff1 fs0 fc0 sc0 ls2a ws22">Análise de Risco <span class="_32 blank"> </span>143<span class="ff6 fs5 ls7 ws6 v0"> </span></div><div class="t m0 x15 h6 y7e ff1 fs0 fc0 sc0 ls2c ws29">Controlo de Riscos <span class="_1d blank"> </span>144<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x15 h6 y7f ff1 fs0 fc0 sc0 ls2f ws3b">Análise de Impacto no Negócio <span class="_33 blank"> </span>144<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 xe h6 yba ff1 fs0 fc0 sc0 ls3c ws53">Desenvolvimento do Plano <span class="_34 blank"> </span>145<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x15 h6 y81 ff1 fs0 fc0 sc0 ls2f ws54">Estratégias de Protecção <span class="_35 blank"> </span>146<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x15 h6 y82 ff1 fs0 fc0 sc0 ls28 ws25">Plano de Contingência <span class="_14 blank"> </span>151<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x15 h6 y83 ff1 fs0 fc0 sc0 ls28 ws25">Plano de Recuperação <span class="_36 blank"> </span>154<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x15 h6 y84 ff1 fs0 fc0 sc0 ls29 ws1e">Plano de Regresso à Normalidade <span class="_37 blank"> </span>155<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x15 h6 y85 ff1 fs0 fc0 sc0 ls1a ws6">Plano de Gestão de Crise <span class="_b blank"> </span>156<span class="ff6 fs5 ls7"> </span></div><div class="t m0 xe h6 y86 ff1 fs0 fc0 sc0 ls1a ws6">Implementação do Plano <span class="_38 blank"> </span>159<span class="ff6 fs5 ls7"> </span></div><div class="t m0 x15 h6 ybb ff1 fs0 fc0 sc0 ls2f ws3b">Aquisição de Meios <span class="_39 blank"> </span>159<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x15 h6 ybc ff1 fs0 fc0 sc0 ls2c ws29">Plano de Testes <span class="_3a blank"> </span>160<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x15 h6 ybd ff1 fs0 fc0 sc0 ls1a ws6">Sensibilização e Formação <span class="_19 blank"> </span>162<span class="ff6 fs5 ls7"> </span></div><div class="t m0 xe h6 ybe ff1 fs0 fc0 sc0 ls28 ws25">Manutenção e Actualização <span class="_3b blank"> </span>163<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x15 h6 ybf ff1 fs0 fc0 sc0 ls2f ws3b">Plano de Exercícios e Sensibilização <span class="_3c blank"> </span>163<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x15 h6 yc0 ff1 fs0 fc0 sc0 ls2f ws3b">Plano de Actualização <span class="_3d blank"> </span>163<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 xe h6 yc1 ff1 fs0 fc0 sc0 ls2f ws50">Conclusão 164<span class="fc2 ls7 ws6"> </span></div><div class="t m0 xe h6 yc2 ff1 fs0 fc0 sc0 ls7 ws6"> </div><div class="t m0 xe h15 yc3 ff5 fs0 fc0 sc0 ls2c ws29">Capítulo V - Padrões e Legislação <span class="_13 blank"> </span>165<span class="ff6 fs5 ls7 ws6 v0"> </span></div><div class="t m0 xe h6 yc4 ff1 fs0 fc0 sc0 ls2f ws54">Legislação nacional <span class="_3e blank"> </span>165<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x15 h6 yc5 ff1 fs0 fc0 sc0 ls1a ws6">Segurança Nacional <span class="_24 blank"> </span>166<span class="ff6 fs5 ls7"> </span></div><div class="t m0 x15 h6 yc6 ff1 fs0 fc0 sc0 ls29 ws1e">Criminalidade Informática <span class="_3f blank"> </span>167<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x15 h6 yc7 ff1 fs0 fc0 sc0 ls29 ws1e">Protecção de Dados Pessoais <span class="_40 blank"> </span>169<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x15 h6 yc8 ff1 fs0 fc0 sc0 ls27 wsb">Comércio Electrónico <span class="_41 blank"> </span>170<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x15 h6 yc9 ff1 fs0 fc0 sc0 ls27 ws55">Assinaturas Digitais <span class="_42 blank"> </span>171<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x15 h6 yca ff1 fs0 fc0 sc0 ls1a ws6">Licenciamento de Software <span class="_43 blank"> </span>173<span class="ff6 fs5 ls7"> </span></div><div class="t m0 xe h6 ycb ff1 fs0 fc0 sc0 ls28 ws25">Comissão Nacional de Protecção de Dados <span class="_44 blank"> </span>174<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 xe h6 ycc ff1 fs0 fc0 sc0 ls2d ws56">O Standard ISO/IEC 17799 <span class="_45 blank"> </span>176<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 x15 h6 ycd ff1 fs0 fc0 sc0 ls2f ws57">Certificação 177<span class="ff6 fs5 ls7 ws6"> </span></div><div class="t m0 xe h6 yce ff1 fs0 fc0 sc0 ls2f ws50">Conclusão 178<span class="fc2 ls7 ws6"> </span></div><div class="t m0 xe h6 ycf ff1 fs0 fc0 sc0 ls7 ws6"> </div><div class="t m0 xe h6 yd0 ff1 fs0 fc0 sc0 ls7 ws6"> </div></div><div class="pi" data-data='{"ctm":[1.000000,0.000000,0.000000,1.000000,-63.360000,-162.000000]}'></div></div>
Compartilhar