Search
Now showing items 1-5 of 5
The Design of a Risk and Vulnerability Assessment Procedure for a Banking Institution
(Polytechnic University of Puerto Rico, 2015)
Regulations in banks are changing
constantly and becoming stricter. Threats and
technologies are improving. Most antivirus software
update their virus definition when the malware is
released and attacking. Banks need ...
Portable HoneyPot & HoneyNet: Within a Closed Network
(Polytechnic University of Puerto Rico, 2015)
At any given time a business network
could be or has been compromised by a hacker or
its information been exposed or breach. This is why
building a honeypot and understanding how to use
it can help network security ...
Honeypots as Computer Forensics Tool
(Polytechnic University of Puerto Rico, 2015)
Cybercrimes were increase in last
years. In a near future majority of crime will be
cybercrimes. The new technologies like mobile
device and networks permit easy access to electronic
devices that have Electronic Stored ...
Assessing SQL Server User Vulnerability and Data Loss
(Polytechnic University of Puerto Rico, 2015)
By using the tools provided by SQL
server we are going to verify some parameters on the
database user accounts to determine their
vulnerabilities. Run scripts to check if the users have
their account passwords set to ...
Evaluating Tools and Technologies used in Digital Forensics
(Polytechnic University of Puerto Rico, 2015)
The use of the Internet and digital
gadgets in our daily lives has increased significantly
in recent years. This explosive growth has impacted
society in both a positive and negative manner. With
the advancements of ...