{"id":1205,"date":"2012-11-19T12:17:52","date_gmt":"2012-11-19T14:17:52","guid":{"rendered":"http:\/\/efagundes.com\/openclass_networking\/?page_id=1205"},"modified":"2022-01-16T17:53:20","modified_gmt":"2022-01-16T20:53:20","slug":"seguranca-de-redes","status":"publish","type":"page","link":"https:\/\/efagundes.com\/networking\/seguranca-de-redes\/","title":{"rendered":"Seguran\u00e7a de Redes"},"content":{"rendered":"<p><a href=\"https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2012\/11\/Slide256.png\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"2695\" data-permalink=\"https:\/\/efagundes.com\/networking\/seguranca-de-redes\/slide256\/\" data-orig-file=\"https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2012\/11\/Slide256.png?fit=960%2C720&amp;ssl=1\" data-orig-size=\"960,720\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Slide256\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2012\/11\/Slide256.png?fit=960%2C720&amp;ssl=1\" class=\"alignnone size-full wp-image-2695\" src=\"https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2012\/11\/Slide256.png?resize=960%2C720\" alt=\"Slide256\" width=\"960\" height=\"720\" srcset=\"https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2012\/11\/Slide256.png?w=960&amp;ssl=1 960w, https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2012\/11\/Slide256.png?resize=300%2C225&amp;ssl=1 300w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/><\/a><\/p>\n<p><strong>T\u00f3picos do capitulo<\/strong><br \/>\n\n<!-- Page-list plugin v.5.9 wordpress.org\/plugins\/page-list\/ -->\n<ul class=\"page-list subpages-page-list \">\n<li class=\"page_item page-item-1209\"><a href=\"https:\/\/efagundes.com\/networking\/seguranca-de-redes\/os-penetras\/\">Os penetras<\/a><\/li>\n<li class=\"page_item page-item-1213\"><a href=\"https:\/\/efagundes.com\/networking\/seguranca-de-redes\/problema-de-seguranca-em-redes\/\">Problema de Seguran\u00e7a em Redes<\/a><\/li>\n<li class=\"page_item page-item-1218\"><a href=\"https:\/\/efagundes.com\/networking\/seguranca-de-redes\/criptografia\/\">Criptografia<\/a><\/li>\n<li class=\"page_item page-item-1221\"><a href=\"https:\/\/efagundes.com\/networking\/seguranca-de-redes\/cifras-de-substituicao\/\">Cifras de Substitui\u00e7\u00e3o<\/a><\/li>\n<li class=\"page_item page-item-1225\"><a href=\"https:\/\/efagundes.com\/networking\/seguranca-de-redes\/cifras-de-transposicao\/\">Cifras de transposi\u00e7\u00e3o<\/a><\/li>\n<li class=\"page_item page-item-1228\"><a href=\"https:\/\/efagundes.com\/networking\/seguranca-de-redes\/chave-unica\/\">Chave \u00fanica<\/a><\/li>\n<li class=\"page_item page-item-1232\"><a href=\"https:\/\/efagundes.com\/networking\/seguranca-de-redes\/des\/\">DES<\/a><\/li>\n<li class=\"page_item page-item-1235\"><a href=\"https:\/\/efagundes.com\/networking\/seguranca-de-redes\/triple-des\/\">Triple DES<\/a><\/li>\n<li class=\"page_item page-item-1239\"><a href=\"https:\/\/efagundes.com\/networking\/seguranca-de-redes\/chaves-publicas-e-privadas\/\">Chaves p\u00fablicas e privadas<\/a><\/li>\n<li class=\"page_item page-item-1243\"><a href=\"https:\/\/efagundes.com\/networking\/seguranca-de-redes\/o-algoritmo-rsa\/\">O Algoritmo RSA (I)<\/a><\/li>\n<li class=\"page_item page-item-1247\"><a href=\"https:\/\/efagundes.com\/networking\/seguranca-de-redes\/o-algoritmo-rsa-2\/\">O Algoritmo RSA (II)<\/a><\/li>\n<li class=\"page_item page-item-1251\"><a href=\"https:\/\/efagundes.com\/networking\/seguranca-de-redes\/o-algoritmo-rsa-3\/\">O Algoritmo RSA (III)<\/a><\/li>\n<li class=\"page_item page-item-1256\"><a href=\"https:\/\/efagundes.com\/networking\/seguranca-de-redes\/exemplo-do-algoritmo-rsa\/\">Exemplo do algoritmo RSA<\/a><\/li>\n<li class=\"page_item page-item-1259\"><a href=\"https:\/\/efagundes.com\/networking\/seguranca-de-redes\/protocolos-publicos-para-informacoes-privadas-1\/\">Protocolos P\u00fablicos (I)<\/a><\/li>\n<li class=\"page_item page-item-1262\"><a href=\"https:\/\/efagundes.com\/networking\/seguranca-de-redes\/protocolos-publicos-para-informacoes-privadas-2\/\">Protocolos P\u00fablicos (II)<\/a><\/li>\n<li class=\"page_item page-item-1265\"><a href=\"https:\/\/efagundes.com\/networking\/seguranca-de-redes\/ssl\/\">SSL<\/a><\/li>\n<li class=\"page_item page-item-1268\"><a href=\"https:\/\/efagundes.com\/networking\/seguranca-de-redes\/s-http\/\">S-HTTP<\/a><\/li>\n<li class=\"page_item page-item-1271\"><a href=\"https:\/\/efagundes.com\/networking\/seguranca-de-redes\/certificado-digital-1\/\">Certificado Digital (I)<\/a><\/li>\n<li class=\"page_item page-item-1274\"><a href=\"https:\/\/efagundes.com\/networking\/seguranca-de-redes\/certificado-digital-2\/\">Certificado Digital (II)<\/a><\/li>\n<li class=\"page_item page-item-1277\"><a href=\"https:\/\/efagundes.com\/networking\/seguranca-de-redes\/certificado-digital-3\/\">Certificado Digital (III)<\/a><\/li>\n<li class=\"page_item page-item-1280\"><a href=\"https:\/\/efagundes.com\/networking\/seguranca-de-redes\/assinatura-digital\/\">Assinatura Digital<\/a><\/li>\n<li class=\"page_item page-item-1284\"><a href=\"https:\/\/efagundes.com\/networking\/seguranca-de-redes\/x-509\/\">X.509<\/a><\/li>\n<li class=\"page_item page-item-1287\"><a href=\"https:\/\/efagundes.com\/networking\/seguranca-de-redes\/pki\/\">PKI<\/a><\/li>\n<li class=\"page_item page-item-1290\"><a href=\"https:\/\/efagundes.com\/networking\/seguranca-de-redes\/firewall\/\">Firewall<\/a><\/li>\n<li class=\"page_item page-item-1293\"><a href=\"https:\/\/efagundes.com\/networking\/seguranca-de-redes\/como-um-firewall-pode-proteger-uma-rede-interna-1\/\">Como um firewall pode proteger uma rede interna (I)<\/a><\/li>\n<li class=\"page_item page-item-1296\"><a href=\"https:\/\/efagundes.com\/networking\/seguranca-de-redes\/como-um-firewall-pode-proteger-uma-rede-interna-2\/\">Como um firewall pode proteger uma rede interna (II)<\/a><\/li>\n<li class=\"page_item page-item-1299\"><a href=\"https:\/\/efagundes.com\/networking\/seguranca-de-redes\/combinando-componentes-para-criar-um-firewall-1\/\">Combinando componentes para criar um firewall (I)<\/a><\/li>\n<li class=\"page_item page-item-1302\"><a href=\"https:\/\/efagundes.com\/networking\/seguranca-de-redes\/combinando-componentes-para-criar-um-firewall-2\/\">Combinando componentes para criar um firewall (II)<\/a><\/li>\n<li class=\"page_item page-item-1305\"><a href=\"https:\/\/efagundes.com\/networking\/seguranca-de-redes\/dmz\/\">DMZ<\/a><\/li>\n<li class=\"page_item page-item-1308\"><a href=\"https:\/\/efagundes.com\/networking\/seguranca-de-redes\/virtual-private-network\/\">Virtual Private Network<\/a><\/li>\n<li class=\"page_item page-item-1311\"><a href=\"https:\/\/efagundes.com\/networking\/seguranca-de-redes\/tunneling-1\/\">Tunneling (I)<\/a><\/li>\n<li class=\"page_item page-item-1314\"><a href=\"https:\/\/efagundes.com\/networking\/seguranca-de-redes\/tunneling-2\/\">Tunneling (II)<\/a><\/li>\n\n<\/ul><\/p>\n","protected":false},"excerpt":{"rendered":"<p>T\u00f3picos do capitulo<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":145,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-1205","page","type-page","status-publish","hentry"],"jetpack_shortlink":"https:\/\/wp.me\/P8yKGp-jr","jetpack-related-posts":[{"id":180,"url":"https:\/\/efagundes.com\/networking\/redes-locais\/","url_meta":{"origin":1205,"position":0},"title":"Redes locais","author":"Eduardo Fagundes","date":"16\/11\/2012","format":false,"excerpt":"T\u00f3picos do capitulo","rel":"","context":"Post similar","block_context":{"text":"Post similar","link":""},"img":{"alt_text":"Slide17","src":"https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide171.jpg?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide171.jpg?resize=350%2C200 1x, https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide171.jpg?resize=525%2C300 1.5x, https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide171.jpg?resize=700%2C400 2x"},"classes":[]},{"id":152,"url":"https:\/\/efagundes.com\/networking\/redes-geograficamente-distribuidas\/","url_meta":{"origin":1205,"position":1},"title":"Redes geograficamente distribu\u00eddas","author":"Eduardo Fagundes","date":"16\/11\/2012","format":false,"excerpt":"T\u00f3picos do capitulo","rel":"","context":"Post similar","block_context":{"text":"Post similar","link":""},"img":{"alt_text":"Slide6","src":"https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide61.jpg?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide61.jpg?resize=350%2C200 1x, https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide61.jpg?resize=525%2C300 1.5x, https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide61.jpg?resize=700%2C400 2x"},"classes":[]},{"id":602,"url":"https:\/\/efagundes.com\/networking\/exemplos-de-protocolos\/","url_meta":{"origin":1205,"position":2},"title":"Exemplos de Protocolos","author":"Eduardo Fagundes","date":"17\/11\/2012","format":false,"excerpt":"T\u00f3picos do capitulo","rel":"","context":"Post similar","block_context":{"text":"Post similar","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide174.jpg?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide174.jpg?resize=350%2C200 1x, https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide174.jpg?resize=525%2C300 1.5x, https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide174.jpg?resize=700%2C400 2x"},"classes":[]},{"id":721,"url":"https:\/\/efagundes.com\/networking\/a-camada-de-rede\/","url_meta":{"origin":1205,"position":3},"title":"A camada de rede","author":"Eduardo Fagundes","date":"18\/11\/2012","format":false,"excerpt":"T\u00f3picos do capitulo","rel":"","context":"Post similar","block_context":{"text":"Post similar","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide127.jpg?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide127.jpg?resize=350%2C200 1x, https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide127.jpg?resize=525%2C300 1.5x, https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide127.jpg?resize=700%2C400 2x"},"classes":[]},{"id":741,"url":"https:\/\/efagundes.com\/networking\/algoritmos-de-roteamento\/","url_meta":{"origin":1205,"position":4},"title":"Algoritmos de Roteamento","author":"Eduardo Fagundes","date":"18\/11\/2012","format":false,"excerpt":"T\u00f3picos do capitulo","rel":"","context":"Post similar","block_context":{"text":"Post similar","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide1111.jpg?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide1111.jpg?resize=350%2C200 1x, https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide1111.jpg?resize=525%2C300 1.5x, https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide1111.jpg?resize=700%2C400 2x"},"classes":[]},{"id":906,"url":"https:\/\/efagundes.com\/networking\/satelites-de-comunicacao\/","url_meta":{"origin":1205,"position":5},"title":"Sat\u00e9lites de Comunica\u00e7\u00e3o","author":"Eduardo Fagundes","date":"18\/11\/2012","format":false,"excerpt":"T\u00f3picos do capitulo","rel":"","context":"Post similar","block_context":{"text":"Post similar","link":""},"img":{"alt_text":"Slide81","src":"https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2012\/11\/Slide81.png?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2012\/11\/Slide81.png?resize=350%2C200 1x, https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2012\/11\/Slide81.png?resize=525%2C300 1.5x, https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2012\/11\/Slide81.png?resize=700%2C400 2x"},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/efagundes.com\/networking\/wp-json\/wp\/v2\/pages\/1205","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/efagundes.com\/networking\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/efagundes.com\/networking\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/efagundes.com\/networking\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/efagundes.com\/networking\/wp-json\/wp\/v2\/comments?post=1205"}],"version-history":[{"count":0,"href":"https:\/\/efagundes.com\/networking\/wp-json\/wp\/v2\/pages\/1205\/revisions"}],"wp:attachment":[{"href":"https:\/\/efagundes.com\/networking\/wp-json\/wp\/v2\/media?parent=1205"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}