• Computer Forensic Laboratory for the Polytechnic University of Puerto Rico 

      González Acevedo, Carlos J. (Polytechnic University of Puerto Rico, 2011)
      Abstract ⎯ Computer Forensic is the discipline that combines elements of law and computer science to collect and analyze data from computer systems, networks, wireless communications, and storage devices in a way that is ...
    • Evaluating Tools and Technologies used in Digital Forensics 

      Bernard Milián, Raymond (Polytechnic University of Puerto Rico, 2015)
      The use of the Internet and digital gadgets in our daily lives has increased significantly in recent years. This explosive growth has impacted society in both a positive and negative manner. With the advancements of ...
    • Privacy in the Cyber Universe 

      Torres Rosa, Edshel (Polytechnic University of Puerto Rico, 2018)
      We live in a world where the internet is almost an essential part of our day to day. We are at a point where we cannot divorce humans from technology, or technology from humans, it is part of us. What is most valuable ...
    • Social Media Privacy and Security – Developing Guidelines 

      Santiago Bonilla, Carlos D. (Polytechnic University of Puerto Rico, 2019)
      Society over that years have seen an increase on how technology impact the user daily lives. The average user spends around 11 hours each day connected to any form online. Technology has become a basic need in the 21 ...
    • Steganography and Steganalysis in Digital Images 

      Cruz Vélez, Marcus D. (Polytechnic University of Puerto Rico, 2011)
      Abstract ⎯ Steganography (from the Greek for "covered writing") is the secret transmission of a message. Its main distinction from encryption relies on the capacity of making a message altogether invisible. A steganographic ...
    • System Breach: The Awareness and Vulnerability That People Face 

      Romero Pérez, Edwin (Polytechnic University of Puerto Rico, 2019)
      The Cyber Force Support webpage will educate the user to protect the system through the correct use of tools associated to the cyber security. This will help maintain, protect and support properly the system and network ...
    • Tutorials of how to use Metasploit, Nessus and Nmap 

      Adames Méndez, Obed A. (Polytechnic University of Puerto Rico, 2012)
      Abstract - This paper is in support of three newly created tutorials, focused on different Security and Penetration testing tools. The tutorials have been selected to cover three different areas in the security and penetration ...
    • Web Attacks Analytics 

      Sanchez Pardella, Luis O. (Polytechnic University of Puerto Rico, 2020)
      Cyber-attacks are on the rise. Information systems are constantly being attacked, generating economic loss. Computer networks and web technologies are the preferred places for hackers to commit cybercrimes. Most computers ...