Buscar
Mostrando ítems 1-10 de 77
The Design of a Risk and Vulnerability Assessment Procedure for a Banking Institution
(Polytechnic University of Puerto Rico, 2015)
Regulations in banks are changing
constantly and becoming stricter. Threats and
technologies are improving. Most antivirus software
update their virus definition when the malware is
released and attacking. Banks need ...
Portable HoneyPot & HoneyNet: Within a Closed Network
(Polytechnic University of Puerto Rico, 2015)
At any given time a business network
could be or has been compromised by a hacker or
its information been exposed or breach. This is why
building a honeypot and understanding how to use
it can help network security ...
The Structure of a Composite Galaxy Model
(Polytechnic University of Puerto Rico, 2014)
The algorithms and numerical methods
describes the way of implementing a composite
galaxy –bulge area, disk, and galaxy halo- which is
modeled as a full three-dimensional entity, using
spherical and disk models as ...
Aplicación de Gestión de Recursos Informáticos
(Polytechnic University of Puerto Rico, 2014)
Actualmente, tanto en Puerto Rico
como a nivel mundial, existe un auge en el uso de
equipo informático en pequeñas y medianas
organizaciones. Debido a esto, es necesario tener
un control de la existencia física de estos ...
“Easy Checkbook”
(Polytechnic University of Puerto Rico, 2014)
Por lo general muchas personas
tienen problemas llevando sus cuentas bancarias al
día ya que cuadrar una chequera es un poco
complicado y conlleva mucho tiempo. Este trabajo
puede ser más fácil para los clientes con ...
“EZ Farm”
(Polytechnic University of Puerto Rico, 2015)
Por lo general muchos pequeños
negocios especialmente en el área de la Agronomía
de Puerto Rico tienen problemas llevando sus
cuentas al día ya sea por la falta de organización o
por falta de las herramientas necesarias; ...
Ethical Hacking: Network Protocol Analyzer Tool Comparison
(Polytechnic University of Puerto Rico, 2015)
The computer security industry spoke
about the term “ethical hacking” to describe a
hacker with authorization to, without any bad
intentions, attacks a network or other security
system – whether private or public – on ...
Florida Hospital Centra Care Provider Performance Data Mart
(Polytechnic University of Puerto Rico, 2015)
Querying a transactional database for
aggregates reports can result in poorly responding
queries and reports. Developing a data mart is a
highly effective solution to overcome these
limitations. This paper demonstrates ...
Desarrollo de la Política de Seguridad de la Información: Cabrera Auto
(Polytechnic University of Puerto Rico, 2016)
Actualmente las empresas de venta y
renta de autos enfrentan una serie de cambios que
las obliga a generar nuevas estrategias para la
protección de la información que custodian. El
aumento en casos de fraudes bancarios ...
IoT Vulnerabilities in SCADA Systems
(Polytechnic University of Puerto Rico, 2016)
The emerging technologies like
Internet of Things (IoT) is an infrastructure of
interconnected objects, people, systems and
information resources together with intelligent
services to allow them to process information ...