Buscar
Mostrando ítems 11-20 de 21
Computer Forensics Tutorial Disk File Systems (FAT16, FAT32, NTFS)
(Polytechnic University of Puerto Rico, 2011)
Abstract - This tutorial is intended as in-class laboratory exercise for computer forensics classes at the Polytechnic University of Puerto Rico. It’s specifically designed to provide basic understanding on the functionalities ...
Introduction to Forensics and the use of the Helix free Forensic Tool
(Polytechnic University of Puerto Rico, 2012)
Abstract - This paper was created to complement a helix tutorial that was created as an introduction into the world of forensics. For someone who would like to get started practicing computer forensics it might be a little ...
Desarrollo de la Política de Seguridad de la Información: Cabrera Auto
(Polytechnic University of Puerto Rico, 2016)
Actualmente las empresas de venta y
renta de autos enfrentan una serie de cambios que
las obliga a generar nuevas estrategias para la
protección de la información que custodian. El
aumento en casos de fraudes bancarios ...
Tutorials of how to use Metasploit, Nessus and Nmap
(Polytechnic University of Puerto Rico, 2012)
Abstract - This paper is in support of three newly created tutorials, focused on different Security and Penetration testing tools. The tutorials have been selected to cover three different areas in the security and penetration ...
A Study in Wireless Attacks and its Tools
(Polytechnic University of Puerto Rico, 2012)
Abstract - Every day the world is becoming more connected through the use of networks, specifically wireless local area networks (WLANs). At the same time, the significance of wireless security continues to grow. Similar ...
Security Issues Present in Cloud Computing
(Polytechnic University of Puerto Rico, 2012)
Abstract - Cloud computing has increasingly become part of day to day operations from large
government organizations to international level corporations as well as the common mobile smart phone user. The availability of ...
Implementing DNSSEC under the .pr ccTLD
(Polytechnic University of Puerto Rico, 2013)
When the Internet was developed it was
not designed with security in consideration. It
currently relies on the Domain Name System
protocol for name resolution which is home to
many types of exploits. The Internet ...
What Kinds of Various Wireless Attacks can Occur in Mobile and Wireless-Driven Devices?
(Polytechnic University of Puerto Rico, 2012)
Abstract - Networks have been recently redefined by new devices in the market. These networks, comprised of a group of electronic devices, can be connected either using cables or using wireless technologies. Also, they ...
Web Attacks Analytics
(Polytechnic University of Puerto Rico, 2020)
Cyber-attacks are on the rise.
Information systems are constantly being attacked,
generating economic loss. Computer networks and
web technologies are the preferred places for
hackers to commit cybercrimes. Most computers ...
Securing HTTP Communication for Homemade IoT Projects
(Polytechnic University of Puerto Rico, 2019)
The Internet of Things (IoT) is a topic
in the Computer Science and Engineering field that
has rapidly grown in the last couple of years. The
popularity of the topic has made different
companies to make proprietary IoT ...