Search
Now showing items 31-40 of 77
The Design of a Risk and Vulnerability Assessment Procedure for a Banking Institution
(Polytechnic University of Puerto Rico, 2015)
Regulations in banks are changing
constantly and becoming stricter. Threats and
technologies are improving. Most antivirus software
update their virus definition when the malware is
released and attacking. Banks need ...
Portable HoneyPot & HoneyNet: Within a Closed Network
(Polytechnic University of Puerto Rico, 2015)
At any given time a business network
could be or has been compromised by a hacker or
its information been exposed or breach. This is why
building a honeypot and understanding how to use
it can help network security ...
Teaching Basic Cryptography Concepts through the Creation of a Cryptographic Learning Tool
(Polytechnic University of Puerto Rico, 2014)
Cryptography is a common technique
used to assure data confidentiality and integrity.
With the development of a tool designed to provide
basic information and capabilities of cryptography,
we can reduce the time that ...
Honeypots as Computer Forensics Tool
(Polytechnic University of Puerto Rico, 2015)
Cybercrimes were increase in last
years. In a near future majority of crime will be
cybercrimes. The new technologies like mobile
device and networks permit easy access to electronic
devices that have Electronic Stored ...
Assessing SQL Server User Vulnerability and Data Loss
(Polytechnic University of Puerto Rico, 2015)
By using the tools provided by SQL
server we are going to verify some parameters on the
database user accounts to determine their
vulnerabilities. Run scripts to check if the users have
their account passwords set to ...
Ethical Hacking: Network Protocol Analyzer Tool Comparison
(Polytechnic University of Puerto Rico, 2015)
The computer security industry spoke
about the term “ethical hacking” to describe a
hacker with authorization to, without any bad
intentions, attacks a network or other security
system – whether private or public – on ...
Florida Hospital Centra Care Provider Performance Data Mart
(Polytechnic University of Puerto Rico, 2015)
Querying a transactional database for
aggregates reports can result in poorly responding
queries and reports. Developing a data mart is a
highly effective solution to overcome these
limitations. This paper demonstrates ...
Crímenes del Nuevo Siglo: Crímenes Cibernéticos, Abuso Cibernético, Acecho Cibernético, Pornografía Infantil y otros
(Polytechnic University of Puerto Rico, 2014)
La tecnología ha acaparado la vida del
ser humano a pasos agigantados. Es un hecho que
la informática, como parte de dicho surgimiento,
también se ha vuelto parte de nosotros. Pero con tal
crecimiento, también han ...
Banking Customer Data Analysis
(Polytechnic University of Puerto Rico, 2014)
This paper focuses on making a Data
Mining analysis on customer data from a bank. We
try to apply different methodologies and prove some
concepts using data. Some of the goals of this
analysis is to produce results ...
Computer Forensics Tutorial Disk File Systems (FAT16, FAT32, NTFS)
(Polytechnic University of Puerto Rico, 2011)
Abstract - This tutorial is intended as in-class laboratory exercise for computer forensics classes at the Polytechnic University of Puerto Rico. It’s specifically designed to provide basic understanding on the functionalities ...