Buscar
Mostrando ítems 1-6 de 6
The Design of a Risk and Vulnerability Assessment Procedure for a Banking Institution
(Polytechnic University of Puerto Rico, 2015)
Regulations in banks are changing
constantly and becoming stricter. Threats and
technologies are improving. Most antivirus software
update their virus definition when the malware is
released and attacking. Banks need ...
Portable HoneyPot & HoneyNet: Within a Closed Network
(Polytechnic University of Puerto Rico, 2015)
At any given time a business network
could be or has been compromised by a hacker or
its information been exposed or breach. This is why
building a honeypot and understanding how to use
it can help network security ...
Honeypots as Computer Forensics Tool
(Polytechnic University of Puerto Rico, 2015)
Cybercrimes were increase in last
years. In a near future majority of crime will be
cybercrimes. The new technologies like mobile
device and networks permit easy access to electronic
devices that have Electronic Stored ...
Centralized Device Independent Software Architecture for the Internet of Things
(Polytechnic University of Puerto Rico, 2015)
The Internet of Things (IoT) is growing
stronger every year, as developers we need to get
ready for the challenges ahead of us. It is getting
hard for software developers to have a starting point
for implementing new ...
Using Frequency Analysis to Decrypt Monoalphabetic Ciphers
(Polytechnic University of Puerto Rico, 2015)
Over the past few years’ technology
has taken over society. Everyone uses technology. It
makes everything easier, such as paying bills,
buying food or any stuff that you use in your daily
basis. People tend to store ...
Ethical Hacking: Network Protocol Analyzer Tool Comparison
(Polytechnic University of Puerto Rico, 2015)
The computer security industry spoke
about the term “ethical hacking” to describe a
hacker with authorization to, without any bad
intentions, attacks a network or other security
system – whether private or public – on ...