Anzeige der Dokumente 61-80 von 112

    • Teaching Basic Cryptography Concepts through the Creation of a Cryptographic Learning Tool 

      Arroyo-Serrano, Celedonio (Polytechnic University of Puerto Rico, 2014)
      Cryptography is a common technique used to assure data confidentiality and integrity. With the development of a tool designed to provide basic information and capabilities of cryptography, we can reduce the time that ...
    • Ethical Hacking: Network Protocol Analyzer Tool Comparison 

      Vélez Villegas, Melvin (Polytechnic University of Puerto Rico, 2015)
      The computer security industry spoke about the term “ethical hacking” to describe a hacker with authorization to, without any bad intentions, attacks a network or other security system – whether private or public – on ...
    • Florida Hospital Centra Care Provider Performance Data Mart 

      Díaz Díaz, Marbin Noel (Polytechnic University of Puerto Rico, 2015)
      Querying a transactional database for aggregates reports can result in poorly responding queries and reports. Developing a data mart is a highly effective solution to overcome these limitations. This paper demonstrates ...
    • Using Wireshark in a Medical Office 

      Pesquera Marrero, Luis A. (Polytechnic University of Puerto Rico, 2015)
      This project is about sniffing the packets in a secured network with electronic health record (EHR) while using Wireshark. I suspect that the packets and the network are going to be encrypted and it won’t be possible ...
    • Using Frequency Analysis to Decrypt Monoalphabetic Ciphers 

      Rodríguez Laborde, Omar (Polytechnic University of Puerto Rico, 2015)
      Over the past few years’ technology has taken over society. Everyone uses technology. It makes everything easier, such as paying bills, buying food or any stuff that you use in your daily basis. People tend to store ...
    • The Design of a Risk and Vulnerability Assessment Procedure for a Banking Institution 

      Marrero Otero, Ludrián J. (Polytechnic University of Puerto Rico, 2015)
      Regulations in banks are changing constantly and becoming stricter. Threats and technologies are improving. Most antivirus software update their virus definition when the malware is released and attacking. Banks need ...
    • Portable HoneyPot & HoneyNet: Within a Closed Network 

      Concepción Rivera, Héctor D. (Polytechnic University of Puerto Rico, 2015)
      At any given time a business network could be or has been compromised by a hacker or its information been exposed or breach. This is why building a honeypot and understanding how to use it can help network security ...
    • “EZ Farm” 

      Lozada Fernández, Gilberto (Polytechnic University of Puerto Rico, 2015)
      Por lo general muchos pequeños negocios especialmente en el área de la Agronomía de Puerto Rico tienen problemas llevando sus cuentas al día ya sea por la falta de organización o por falta de las herramientas necesarias; ...
    • IoT Vulnerabilities in SCADA Systems 

      Rivera Barbosa, Jose (Polytechnic University of Puerto Rico, 2016)
      The emerging technologies like Internet of Things (IoT) is an infrastructure of interconnected objects, people, systems and information resources together with intelligent services to allow them to process information ...
    • “Inside-Pics” 

      Rivera Valentin, Sheila M. (Polytechnic University of Puerto Rico, 2016)
      The photography industry has grew and evolved through the times. Nowadays, cameras come with many features that allow users to adjust them as their preference with a minimum effort or knowledge. However, in the case ...
    • Assessing SQL Server User Vulnerability and Data Loss 

      Medina Ríos, Sergio G. (Polytechnic University of Puerto Rico, 2015)
      By using the tools provided by SQL server we are going to verify some parameters on the database user accounts to determine their vulnerabilities. Run scripts to check if the users have their account passwords set to ...
    • Honeypots as Computer Forensics Tool 

      Avilés Lugo, Marcos (Polytechnic University of Puerto Rico, 2015)
      Cybercrimes were increase in last years. In a near future majority of crime will be cybercrimes. The new technologies like mobile device and networks permit easy access to electronic devices that have Electronic Stored ...
    • Automated Data Acquisition using Microsoft Excel 

      Martínez González, Luis F. (Polytechnic University of Puerto Rico, 2016)
      The process of Web Scraping allows the automated extraction of data from an entire website and turn it into a tabular dataset that can be used for reporting and analysis. There are numerous techniques and tools for web ...
    • Desarrollo de la Política de Seguridad de la Información: Cabrera Auto 

      Sevilla Maldonado, Jennifer (Polytechnic University of Puerto Rico, 2016)
      Actualmente las empresas de venta y renta de autos enfrentan una serie de cambios que las obliga a generar nuevas estrategias para la protección de la información que custodian. El aumento en casos de fraudes bancarios ...
    • A Web Solution to Waiting Line Problem 

      Torres Carrera, José (Polytechnic University of Puerto Rico, 2012)
      Abstract – In this article I present an approach to solve the problem of wasting time waiting in a line for product or service. A solution is presented composed of a platform API and a mobile application. The solution ...
    • Off Site Database Management 

      Venegas Ríos, Jesús J. (Polytechnic University of Puerto Rico, 2012)
      Abstract― In today’s database systems there is a rise in security needs and Database redundancy procedures in order to keep information readily available and secure in the event of a catastrophe. There are different ways ...
    • SmartShop: A Merchandise Order and Deliver Application using Mobile Devices 

      Minaya Ruiz, Xavier (Polytechnic University of Puerto Rico, 2017)
      In our modern society, time management is very crucial. We spend most of our time on important events in which sometimes we put aside necessities such a going to the supermarket for our nutrition or pharmacy for ...
    • Breaking e-Discovery Barriers in Puerto Rico 

      Villanueva López, Marcos (Polytechnic University of Puerto Rico, 2017)
      Electronic discovery is the process of producing Electronically Stored Information (ESI) in the context of a legal process. ESI includes emails, files, social media, and website content among others. The different types ...
    • Mobile Digital Forensic Tool using Santoku Linux 

      Acevedo Rivera, Pedro J. (Polytechnic University of Puerto Rico, 2017)
      Santoku 0.5 is a free and Open Source Linux Distribution dedicated to mobile forensics, mobile security, and mobile malware analysis. Santoku provides tools for; analyzing and acquiring data including free versions of ...
    • Security on Government Websites 

      Oliveras Reyes, Luis M. (Polytechnic University of Puerto Rico, 2017)
      Given the advances in technology and the cyber-attacks; new viruses that affect networks, computers, servers and other principal elements within any infrastructure on government agencies, the following question should ...