Now showing items 81-90 of 90

    • Tutorials of how to use Metasploit, Nessus and Nmap 

      Adames Méndez, Obed A. (Polytechnic University of Puerto Rico, 2012)
      Abstract - This paper is in support of three newly created tutorials, focused on different Security and Penetration testing tools. The tutorials have been selected to cover three different areas in the security and penetration ...
    • Unified Threat Management 

      Christenson Colón, Bernard J. (Polytechnic University of Puerto Rico, 2018)
      Unified Threat Management (UTM) is an information security term that refers to a security appliance as a combination of hardware, software and networking technologies in which the primary function is to integrate increased ...
    • Using a Supervised Learning Model: Two-Class Boosted Decision Tree Algorithm for Income Prediction 

      Ríos Canales, Victor (Polytechnic University of Puerto Rico, 2016)
      People always try to think or ponder about things in advance regarding the decisions they make, whether if it is a good idea or even if it is not a good idea. If the person has all the correct and necessary information, ...
    • Using Frequency Analysis to Decrypt Monoalphabetic Ciphers 

      Rodríguez Laborde, Omar (Polytechnic University of Puerto Rico, 2015)
      Over the past few years’ technology has taken over society. Everyone uses technology. It makes everything easier, such as paying bills, buying food or any stuff that you use in your daily basis. People tend to store ...
    • Using Network Forensic Tools for Analysis and Investigation at Polytechnic University of Puerto Rico 

      Murray Ortiz, Edgar A. (Polytechnic University of Puerto Rico, 2017)
      In the world of computer security. The security of networks has become a very important field. More importantly, the tools to provide security cannot guarantee a completely secure network. Is because of that situation ...
    • Using Wireshark in a Medical Office 

      Pesquera Marrero, Luis A. (Polytechnic University of Puerto Rico, 2015)
      This project is about sniffing the packets in a secured network with electronic health record (EHR) while using Wireshark. I suspect that the packets and the network are going to be encrypted and it won’t be possible ...
    • Validation of NMAP’s Network Behavior using Wireshark 

      Cruz Ramírez, Daniel (Polytechnic University of Puerto Rico, 2016)
      NMAP is used to actively scan networks using different ping techniques. There is not much information available on how NMAP works besides its website. Although the program states how it works, there is little validation ...
    • Vulnerability Assesment of Puerto Rico’s Health Department Web Application 

      Marrero Cabrera, Alondra (Polytechnic University of Puerto Rico, 2021)
      As technology progresses in the cyber environment, so do new threats; now, with the Covid-19, pandemic biosafety and biosecurity concerns are even more rigorously scrutinized. The cyber and biological ...
    • Working from Home and Data Protection 

      Pérez, Omar A. (Polytechnic University of Puerto Rico, 2020)
      Thanks to the pandemic the new order is working from home. When you work from the office the security of the data is responsibility of you as employee and the corporation to provide a safe network. Maybe you see it but ...
    • ZAP Proxy and OWASP Top 10 

      Ramos Flores, Eduard (Polytechnic University of Puerto Rico, 2023)
      The Zed Attack Proxy is a well-known and popular assessment tool in the cybersecurity community. The Open Web Application Security Project community offers, develops, and maintains the Zed Attack Proxy. The Open Web ...