Buscar
Mostrando ítems 1-10 de 21
What Kinds of Various Wireless Attacks can Occur in Mobile and Wireless-Driven Devices?
(Polytechnic University of Puerto Rico, 2012)
Abstract - Networks have been recently redefined by new devices in the market. These networks, comprised of a group of electronic devices, can be connected either using cables or using wireless technologies. Also, they ...
Web Attacks Analytics
(Polytechnic University of Puerto Rico, 2020)
Cyber-attacks are on the rise.
Information systems are constantly being attacked,
generating economic loss. Computer networks and
web technologies are the preferred places for
hackers to commit cybercrimes. Most computers ...
Security Issues Present in Cloud Computing
(Polytechnic University of Puerto Rico, 2012)
Abstract - Cloud computing has increasingly become part of day to day operations from large
government organizations to international level corporations as well as the common mobile smart phone user. The availability of ...
Implementing DNSSEC under the .pr ccTLD
(Polytechnic University of Puerto Rico, 2013)
When the Internet was developed it was
not designed with security in consideration. It
currently relies on the Domain Name System
protocol for name resolution which is home to
many types of exploits. The Internet ...
Securing HTTP Communication for Homemade IoT Projects
(Polytechnic University of Puerto Rico, 2019)
The Internet of Things (IoT) is a topic
in the Computer Science and Engineering field that
has rapidly grown in the last couple of years. The
popularity of the topic has made different
companies to make proprietary IoT ...
National Cyber League challenges as a way to teach Cybersecurity
(Polytechnic University of Puerto Rico, 2018)
Cybersecurity education is a relative new topic in most educational organizations today. This presents a problem to most educational institutions like universities who confront the challenge of teaching cybersecurity topics ...
Unified Threat Management
(Polytechnic University of Puerto Rico, 2018)
Unified Threat Management (UTM) is an information security term that refers to a security appliance as a combination of hardware, software and networking technologies in which the primary function is to integrate increased ...
Using Frequency Analysis to Decrypt Monoalphabetic Ciphers
(Polytechnic University of Puerto Rico, 2015)
Over the past few years’ technology
has taken over society. Everyone uses technology. It
makes everything easier, such as paying bills,
buying food or any stuff that you use in your daily
basis. People tend to store ...
The Design of a Risk and Vulnerability Assessment Procedure for a Banking Institution
(Polytechnic University of Puerto Rico, 2015)
Regulations in banks are changing
constantly and becoming stricter. Threats and
technologies are improving. Most antivirus software
update their virus definition when the malware is
released and attacking. Banks need ...
Portable HoneyPot & HoneyNet: Within a Closed Network
(Polytechnic University of Puerto Rico, 2015)
At any given time a business network
could be or has been compromised by a hacker or
its information been exposed or breach. This is why
building a honeypot and understanding how to use
it can help network security ...