Ferreira, Lucas Viniciusde Melo, Laerte2025-01-092017https://deposita.ibict.br/handle/deposita/737In a reality where the world is increasingly automated and connected to the internet, information security is an essential area for organizations because the exposure of sensitive data can cause financial losses and image of the company before society. Information security management is already a reality for large organizations that invest a lot of money with security policies, continuity plans, against cyber-attacks, systems, and security devices. In addition, they need to keep this whole structure up and running. However, it is already known that cyber-attacks are basically derived from exploiting vulnerabilities that malicious individuals are aware of in order to gain some advantage or commit some illicit. These vulnerabilities can be in hardware, software, or people who do not take proper precautions with company assets. This work makes a deep study of the topic of vulnerability management, exploring its fundamentals, concepts, characteristics, procedures as well as techniques and tools that can help organizations in general to perform an efficient vulnerability management. In addition, at the end of the day a practical approach is executed to implement a system that has the ability to go through all the steps of vulnerability management that can scan, issue reports, generate graphs, and perform automated ticket opening for the due treatment of the vulnerabilities are founded.application/pdfopenAccessSegurança da InformaçãoGestão de VulnerabilidadesGestão de AtivosGestão da DisponibilidadeGestão da ContinuidadeSistemas de ComputaçãoSolução para Gestão de Vulnerabilidades de Segurança da InformaçãoTrabalho de conclusão de curso