• Analyzing Web Application Attacks: Understanding the Damages 

      Meléndez Ortega, Javier (Polytechnic University of Puerto Rico, 2014)
      This project will demonstrate the damages that can occur by different web application attacks to aid users with the knowledge of disasters and let them know why security is so important. If you don't know what the ...
    • Computer Forensics Tutorial Disk File Systems (FAT16, FAT32, NTFS) 

      Rodríguez Justiniano, José M. (Polytechnic University of Puerto Rico, 2011)
      Abstract - This tutorial is intended as in-class laboratory exercise for computer forensics classes at the Polytechnic University of Puerto Rico. It’s specifically designed to provide basic understanding on the functionalities ...
    • Desarrollo de la Política de Seguridad de la Información: Cabrera Auto 

      Sevilla Maldonado, Jennifer (Polytechnic University of Puerto Rico, 2016)
      Actualmente las empresas de venta y renta de autos enfrentan una serie de cambios que las obliga a generar nuevas estrategias para la protección de la información que custodian. El aumento en casos de fraudes bancarios ...
    • The Design of a Risk and Vulnerability Assessment Procedure for a Banking Institution 

      Marrero Otero, Ludrián J. (Polytechnic University of Puerto Rico, 2015)
      Regulations in banks are changing constantly and becoming stricter. Threats and technologies are improving. Most antivirus software update their virus definition when the malware is released and attacking. Banks need ...
    • Ethical Hacking: Network Protocol Analyzer Tool Comparison 

      Vélez Villegas, Melvin (Polytechnic University of Puerto Rico, 2015)
      The computer security industry spoke about the term “ethical hacking” to describe a hacker with authorization to, without any bad intentions, attacks a network or other security system – whether private or public – on ...
    • Honeypots as Computer Forensics Tool 

      Avilés Lugo, Marcos (Polytechnic University of Puerto Rico, 2015)
      Cybercrimes were increase in last years. In a near future majority of crime will be cybercrimes. The new technologies like mobile device and networks permit easy access to electronic devices that have Electronic Stored ...
    • National Cyber League challenges as a way to teach Cybersecurity 

      Agosto Quiñones, André (Polytechnic University of Puerto Rico, 2018)
      Cybersecurity education is a relative new topic in most educational organizations today. This presents a problem to most educational institutions like universities who confront the challenge of teaching cybersecurity topics ...
    • Network Security Assessment using Bettercap: DNS Spoofing and How to Mitigate 

      Santiago Solivan, Rafael (Polytechnic University of Puerto Rico, 2023)
      In the ever-evolving landscape of cybersecurity, the demand for effective tools and techniques to safeguard networks from malicious actors is paramount. This master's degree final project proposes an investigation into the ...
    • Portable HoneyPot & HoneyNet: Within a Closed Network 

      Concepción Rivera, Héctor D. (Polytechnic University of Puerto Rico, 2015)
      At any given time a business network could be or has been compromised by a hacker or its information been exposed or breach. This is why building a honeypot and understanding how to use it can help network security ...
    • Securing HTTP Communication for Homemade IoT Projects 

      De la Vega López, Jose R. (Polytechnic University of Puerto Rico, 2019)
      The Internet of Things (IoT) is a topic in the Computer Science and Engineering field that has rapidly grown in the last couple of years. The popularity of the topic has made different companies to make proprietary IoT ...
    • Security Issues Present in Cloud Computing 

      Santos Crespo, Paulino III (Polytechnic University of Puerto Rico, 2012)
      Abstract - Cloud computing has increasingly become part of day to day operations from large government organizations to international level corporations as well as the common mobile smart phone user. The availability of ...
    • A Study in Wireless Attacks and its Tools 

      Flores, José J. (Polytechnic University of Puerto Rico, 2012)
      Abstract - Every day the world is becoming more connected through the use of networks, specifically wireless local area networks (WLANs). At the same time, the significance of wireless security continues to grow. Similar ...
    • Using Frequency Analysis to Decrypt Monoalphabetic Ciphers 

      Rodríguez Laborde, Omar (Polytechnic University of Puerto Rico, 2015)
      Over the past few years’ technology has taken over society. Everyone uses technology. It makes everything easier, such as paying bills, buying food or any stuff that you use in your daily basis. People tend to store ...
    • What Kinds of Various Wireless Attacks can Occur in Mobile and Wireless-Driven Devices? 

      Sanabria Andrade, Manuel (Polytechnic University of Puerto Rico, 2012)
      Abstract - Networks have been recently redefined by new devices in the market. These networks, comprised of a group of electronic devices, can be connected either using cables or using wireless technologies. Also, they ...