![]() The present work has its methodology based on bibliographic review, case study of success, and through free tool tests, through a scenario of experimentation.Īccording to Gonçalves (2007), proprietary software is one whose copy, redistribution or modification is to some extent prohibited by its owner. The conclusions and perspectives are discussed in section 7. ![]() Sections 5 and 6 present the results obtained and the analysis of the results. Section 4, "Scenario", presents the scenario description, the test methodologies, as well as the tests performed. In section 3, "Information Security in Business", addresses the objectives of information security, as well as encryption of data and communication networks and related work. ![]() In section 2, denominated "Methodology", the comparatives between the proprietary tools and the free tools are approached. This article is organized in six more sections. Many companies use unlicensed software and thus fall into the world of software piracy, being targets of audit bodies. The organizations have been seeking to migrate their systems as a business strategy, seeking a collaborative development model such as free software. In this sense, the importance of IT services and the use of tools that help the growth of a company grow considerably. Keywords: Free Software, Information Security, Proprietary Software.Įach day the business areas of organizations are using Information Technology (IT) services to support their strategic and operational activities. In the end, it was proven that the use of these free tools are vital for the survival of a company in order to protect the availability, integrity, and confidentiality of business information. The data used were collected from a trial scenario, from which four (4) free tools were tested: OPENLDAP, SQUID, ZIMBRA and CACTI. ![]() ![]() In this research, it is demonstrated that in addition to being more transparent, free software can be used in a practical way in companies instead of proprietary software. Free Software as a Secure Solution for Corporate Information Processing. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |