Suche
Anzeige der Dokumente 1-10 von 14
The Design of a Risk and Vulnerability Assessment Procedure for a Banking Institution
(Polytechnic University of Puerto Rico, 2015)
Regulations in banks are changing
constantly and becoming stricter. Threats and
technologies are improving. Most antivirus software
update their virus definition when the malware is
released and attacking. Banks need ...
Portable HoneyPot & HoneyNet: Within a Closed Network
(Polytechnic University of Puerto Rico, 2015)
At any given time a business network
could be or has been compromised by a hacker or
its information been exposed or breach. This is why
building a honeypot and understanding how to use
it can help network security ...
Ethical Hacking: Network Protocol Analyzer Tool Comparison
(Polytechnic University of Puerto Rico, 2015)
The computer security industry spoke
about the term “ethical hacking” to describe a
hacker with authorization to, without any bad
intentions, attacks a network or other security
system – whether private or public – on ...
Desarrollo de la Política de Seguridad de la Información: Cabrera Auto
(Polytechnic University of Puerto Rico, 2016)
Actualmente las empresas de venta y
renta de autos enfrentan una serie de cambios que
las obliga a generar nuevas estrategias para la
protección de la información que custodian. El
aumento en casos de fraudes bancarios ...
Analyzing Web Application Attacks: Understanding the Damages
(Polytechnic University of Puerto Rico, 2014)
This project will demonstrate the
damages that can occur by different web
application attacks to aid users with the knowledge
of disasters and let them know why security is so
important. If you don't know what the ...
Honeypots as Computer Forensics Tool
(Polytechnic University of Puerto Rico, 2015)
Cybercrimes were increase in last
years. In a near future majority of crime will be
cybercrimes. The new technologies like mobile
device and networks permit easy access to electronic
devices that have Electronic Stored ...
Using Frequency Analysis to Decrypt Monoalphabetic Ciphers
(Polytechnic University of Puerto Rico, 2015)
Over the past few years’ technology
has taken over society. Everyone uses technology. It
makes everything easier, such as paying bills,
buying food or any stuff that you use in your daily
basis. People tend to store ...
A Study in Wireless Attacks and its Tools
(Polytechnic University of Puerto Rico, 2012)
Abstract - Every day the world is becoming more connected through the use of networks, specifically wireless local area networks (WLANs). At the same time, the significance of wireless security continues to grow. Similar ...
Securing HTTP Communication for Homemade IoT Projects
(Polytechnic University of Puerto Rico, 2019)
The Internet of Things (IoT) is a topic
in the Computer Science and Engineering field that
has rapidly grown in the last couple of years. The
popularity of the topic has made different
companies to make proprietary IoT ...
What Kinds of Various Wireless Attacks can Occur in Mobile and Wireless-Driven Devices?
(Polytechnic University of Puerto Rico, 2012)
Abstract - Networks have been recently redefined by new devices in the market. These networks, comprised of a group of electronic devices, can be connected either using cables or using wireless technologies. Also, they ...