Buscar
Mostrando ítems 1-10 de 21
The Design of a Risk and Vulnerability Assessment Procedure for a Banking Institution
(Polytechnic University of Puerto Rico, 2015)
Regulations in banks are changing
constantly and becoming stricter. Threats and
technologies are improving. Most antivirus software
update their virus definition when the malware is
released and attacking. Banks need ...
Portable HoneyPot & HoneyNet: Within a Closed Network
(Polytechnic University of Puerto Rico, 2015)
At any given time a business network
could be or has been compromised by a hacker or
its information been exposed or breach. This is why
building a honeypot and understanding how to use
it can help network security ...
Ethical Hacking: Network Protocol Analyzer Tool Comparison
(Polytechnic University of Puerto Rico, 2015)
The computer security industry spoke
about the term “ethical hacking” to describe a
hacker with authorization to, without any bad
intentions, attacks a network or other security
system – whether private or public – on ...
Desarrollo de la Política de Seguridad de la Información: Cabrera Auto
(Polytechnic University of Puerto Rico, 2016)
Actualmente las empresas de venta y
renta de autos enfrentan una serie de cambios que
las obliga a generar nuevas estrategias para la
protección de la información que custodian. El
aumento en casos de fraudes bancarios ...
Tutorials of how to use Metasploit, Nessus and Nmap
(Polytechnic University of Puerto Rico, 2012)
Abstract - This paper is in support of three newly created tutorials, focused on different Security and Penetration testing tools. The tutorials have been selected to cover three different areas in the security and penetration ...
Introduction to Forensics and the use of the Helix free Forensic Tool
(Polytechnic University of Puerto Rico, 2012)
Abstract - This paper was created to complement a helix tutorial that was created as an introduction into the world of forensics. For someone who would like to get started practicing computer forensics it might be a little ...
Analyzing Web Application Attacks: Understanding the Damages
(Polytechnic University of Puerto Rico, 2014)
This project will demonstrate the
damages that can occur by different web
application attacks to aid users with the knowledge
of disasters and let them know why security is so
important. If you don't know what the ...
Honeypots as Computer Forensics Tool
(Polytechnic University of Puerto Rico, 2015)
Cybercrimes were increase in last
years. In a near future majority of crime will be
cybercrimes. The new technologies like mobile
device and networks permit easy access to electronic
devices that have Electronic Stored ...
Centralized Device Independent Software Architecture for the Internet of Things
(Polytechnic University of Puerto Rico, 2015)
The Internet of Things (IoT) is growing
stronger every year, as developers we need to get
ready for the challenges ahead of us. It is getting
hard for software developers to have a starting point
for implementing new ...
Using Frequency Analysis to Decrypt Monoalphabetic Ciphers
(Polytechnic University of Puerto Rico, 2015)
Over the past few years’ technology
has taken over society. Everyone uses technology. It
makes everything easier, such as paying bills,
buying food or any stuff that you use in your daily
basis. People tend to store ...