Anzeige der Dokumente 81-100 von 112

    • Security Validation on WhatsApp and Facebook Messenger Mobile Applications against GIF Images that Incorporate Executable Code 

      Colón Martínez, Hilda (Polytechnic University of Puerto Rico, 2017)
      Communication; Every day the messaging applications on mobile devices such as WhatsApp and Facebook Messenger are more common in the life of each user. With this in mind, we ask ourselves the question, how safe are ...
    • A Study of Green IT Technology 

      Del Valle Caraballo, Fabián A. (Polytechnic University of Puerto Rico, 2017)
      Each year the global production and development of computer systems increases, this in turn increases the energy demand that these systems require to function. Information technology has a role to play in the ever-increasing ...
    • Using Network Forensic Tools for Analysis and Investigation at Polytechnic University of Puerto Rico 

      Murray Ortiz, Edgar A. (Polytechnic University of Puerto Rico, 2017)
      In the world of computer security. The security of networks has become a very important field. More importantly, the tools to provide security cannot guarantee a completely secure network. Is because of that situation ...
    • Algorithm for User-friendly Password Policy 

      Hernández Liang, Jorge (Polytechnic University of Puerto Rico, 2017)
      Password based security has become prevalent as the de facto measure against intrusion. Computer systems rarely focus on usability, and little research has been done to change the current, near universal method of ...
    • Jailbreak Vulnerability & Mobile Security Updates 

      Maldonado Burgos, Zedrick A. (Polytechnic University of Puerto Rico, 2018)
      In these modern times mobile devices are part of the everyday life of each individual. These devices contain a major part of each user information in comparison to their personal computers. On a mobile device people ...
    • Risk Assessment Practices 

      Vera Pujols, Wilfredo R. (Polytechnic University of Puerto Rico, 2018)
      To an enterprise, one of the most important assessment that should develop is the Risk Assessment. This practice includes identify the threats that can affect the business continuity. In addition, is necessary classify ...
    • Computer Forensics Tutorial Disk File Systems (FAT16, FAT32, NTFS) 

      Rodríguez Justiniano, José M. (Polytechnic University of Puerto Rico, 2011)
      Abstract - This tutorial is intended as in-class laboratory exercise for computer forensics classes at the Polytechnic University of Puerto Rico. It’s specifically designed to provide basic understanding on the functionalities ...
    • Empowering the Weakest Link in Today's Technology with: Cyber-security Protection by Means of Password Security 

      Serrano Malavé, Lázaro R. (Polytechnic University of Puerto Rico, 2018)
      No matter how expensive or how advanced the technology inside your organization is, there is always going to be the human factor. In this project I develop a program written in C++ that will help not only IT professionals ...
    • Blockchain for Nuclear Facilities 

      Morales García, John E. (Polytechnic University of Puerto Rico, 2018)
      Nuclear facilities are some of the most highly protected structures in the world. But rapid technological advances, terrorism and the cyberwarfare, has increased the threat of cybernetic attacks on nuclear facilities. ...
    • Capture-The-Flag Framework and Virtual Environment for Cyber Security Education 

      Colón Pérez, Jadiel A. (Polytechnic University of Puerto Rico, 2018)
      When studying cybersecurity or other computer-related technical careers, a problem among the students is the lack of hands-on experience. This can be solved by participating in internships, conferences, and ...
    • Customer Support Tool 

      Castillo Rivera, Francisco J (Polytechnic University of Puerto Rico, 2018)
      Small sales companies rely on their customers’ satisfaction after sale has been made. A big part of a customer satisfaction relies on the customer support given to them after the product has been sold. The problem with ...
    • Capture the Flag (CTF): Website Tutorial to Boost Cybersecurity Training 

      Santiago Lozada, Reinaldo E. (Polytechnic University of Puerto Rico, 2019)
      Cybersecurity is a new topic in many organizations, including educational organizations. This new field will have an increase, as new technologies emerged. For that reasons, in order to meet the cybersecurity personnel ...
    • Real Time Face Detection System 

      Nafi, Rushdi Nafi Hamdan (Polytechnic University of Puerto Rico, 2018)
      This paper presents details of a prototype for research project on face detection systems. The prototype uses Emgu CV cross platform .Net wrapper with the Intel OpenCV image processing library and C# .Net. The library ...
    • Increasing the Participation of Young Women in Cybersecurity 

      Berríos, Naileen (Polytechnic University of Puerto Rico, 2019)
      The gender disparity that affects cybersecurity is not new, but it is particularly discouraging for women, who represent only 11% of all cybersecurity professionals around the world. It is also reported that very few ...
    • Nutri-Fitness Tracker Web Application 

      Negrón Santiago, Josué J. (Polytechnic University of Puerto Rico, 2019)
      There are several health programs that intend to help people to drop weight in a natural manner. Novovida Health & Fitness is such a program, which promotes a better eating habit and physical activities in order to ...
    • Design of a Framework for the Best Practices in Computer Forensics within the Cybersecurity Infrastructure in the Regulated Industry 

      Vázquez Ruiz, Eduardo (Polytechnic University of Puerto Rico, 2019)
      We cannot ignore the fact that hackers have been evolving and growing to the level that there are more hackers with the attraction to do evil than Ethical Hackers. Cyber-attacks are a growing threat for companies, and ...
    • Implementation of a Cost Function to Model Travel Cost for Shortest Path Routing 

      Rivera López, Carlos (Polytechnic University of Puerto Rico, 2019)
      Many times, as we travel in a region from one place to another we start wondering if there’s a better, optimal path to travel from point A to point B. In order to figure this out, normally, we would seek for details ...
    • Data Mining Techniques for the Integrated Postsecondary Data System 

      Jiménez Vargas, Wilfredo (Polytechnic University of Puerto Rico, 2018)
      The Process of generating the necessary information for the Integrated Postsecondary Data System can be tedious; a standard way to collect the information for the different departments is needed. To process it, we use ...
    • Analysis of Alternatives for a Security Information and Event Management Tool in a Virtualized Environment 

      Sepúlveda Rodríguez, Roy A. (Polytechnic University of Puerto Rico, 2018)
      Security Information and Event Management is a software tool that increases the cyber-situational awareness of a system. Since many products are available in the market, there is a desire from companies and individuals ...
    • Tecnología Inteligente de Minería de Datos en Telecomunicaciones 

      Berrios Negrón, Edwin J. (Polytechnic University of Puerto Rico, 2018)
      Las compañías de telecomunicaciones generan una enorme cantidad de datos. Estos incluyen; los datos de detalles de llamadas, que describe las llamadas que atraviesan las redes de telecomunicaciones, aunado a la red de datos ...