Buscar
Mostrando ítems 11-20 de 33
Increasing the Participation of Young Women in Cybersecurity
(Polytechnic University of Puerto Rico, 2019)
The gender disparity that affects
cybersecurity is not new, but it is particularly
discouraging for women, who represent only 11%
of all cybersecurity professionals around the world.
It is also reported that very few ...
Implementation of real-time cybersecurity training through the integration of a hypervisor and an online CTF engine
(Polytechnic University of Puerto Rico, 2018)
During 2017 and 2018, undergraduate
and graduate students from the ECECS Department
at the PUPR have seen an academic improvement in
cybersecurity from their participation in Capture the
Flag (CTF) competitions. These ...
Data Analysis: Disasters, Possible Leverage for Cybercrime
(Polytechnic University of Puerto Rico, 2018)
This investigation explored the topic of
cybercrime and its relation to disaster events of natural
or man-made origin within the United States from the
years 2001 to 2016. By analyzing available public data
from both ...
Journey to becoming a hacker: from zero to cybersecurity ninja
(Polytechnic University of Puerto Rico, 2018)
Time to time technology changes and
the need for cyber security experts increases. While
is true that lots of universities prepare students on
this career, somehow students face trouble
understanding how to acquire the ...
System Breach: The Awareness and Vulnerability That People Face
(Polytechnic University of Puerto Rico, 2019)
The Cyber Force Support webpage will
educate the user to protect the system through the
correct use of tools associated to the cyber security.
This will help maintain, protect and support
properly the system and network ...
The Design of a Risk and Vulnerability Assessment Procedure for a Banking Institution
(Polytechnic University of Puerto Rico, 2015)
Regulations in banks are changing
constantly and becoming stricter. Threats and
technologies are improving. Most antivirus software
update their virus definition when the malware is
released and attacking. Banks need ...
Portable HoneyPot & HoneyNet: Within a Closed Network
(Polytechnic University of Puerto Rico, 2015)
At any given time a business network
could be or has been compromised by a hacker or
its information been exposed or breach. This is why
building a honeypot and understanding how to use
it can help network security ...
Honeypots as Computer Forensics Tool
(Polytechnic University of Puerto Rico, 2015)
Cybercrimes were increase in last
years. In a near future majority of crime will be
cybercrimes. The new technologies like mobile
device and networks permit easy access to electronic
devices that have Electronic Stored ...
Assessing SQL Server User Vulnerability and Data Loss
(Polytechnic University of Puerto Rico, 2015)
By using the tools provided by SQL
server we are going to verify some parameters on the
database user accounts to determine their
vulnerabilities. Run scripts to check if the users have
their account passwords set to ...
Computer Forensics Tutorial Disk File Systems (FAT16, FAT32, NTFS)
(Polytechnic University of Puerto Rico, 2011)
Abstract - This tutorial is intended as in-class laboratory exercise for computer forensics classes at the Polytechnic University of Puerto Rico. It’s specifically designed to provide basic understanding on the functionalities ...