Suche
Anzeige der Dokumente 1-10 von 14
What Kinds of Various Wireless Attacks can Occur in Mobile and Wireless-Driven Devices?
(Polytechnic University of Puerto Rico, 2012)
Abstract - Networks have been recently redefined by new devices in the market. These networks, comprised of a group of electronic devices, can be connected either using cables or using wireless technologies. Also, they ...
Security Issues Present in Cloud Computing
(Polytechnic University of Puerto Rico, 2012)
Abstract - Cloud computing has increasingly become part of day to day operations from large
government organizations to international level corporations as well as the common mobile smart phone user. The availability of ...
Securing HTTP Communication for Homemade IoT Projects
(Polytechnic University of Puerto Rico, 2019)
The Internet of Things (IoT) is a topic
in the Computer Science and Engineering field that
has rapidly grown in the last couple of years. The
popularity of the topic has made different
companies to make proprietary IoT ...
National Cyber League challenges as a way to teach Cybersecurity
(Polytechnic University of Puerto Rico, 2018)
Cybersecurity education is a relative new topic in most educational organizations today. This presents a problem to most educational institutions like universities who confront the challenge of teaching cybersecurity topics ...
Using Frequency Analysis to Decrypt Monoalphabetic Ciphers
(Polytechnic University of Puerto Rico, 2015)
Over the past few years’ technology
has taken over society. Everyone uses technology. It
makes everything easier, such as paying bills,
buying food or any stuff that you use in your daily
basis. People tend to store ...
The Design of a Risk and Vulnerability Assessment Procedure for a Banking Institution
(Polytechnic University of Puerto Rico, 2015)
Regulations in banks are changing
constantly and becoming stricter. Threats and
technologies are improving. Most antivirus software
update their virus definition when the malware is
released and attacking. Banks need ...
Portable HoneyPot & HoneyNet: Within a Closed Network
(Polytechnic University of Puerto Rico, 2015)
At any given time a business network
could be or has been compromised by a hacker or
its information been exposed or breach. This is why
building a honeypot and understanding how to use
it can help network security ...
Honeypots as Computer Forensics Tool
(Polytechnic University of Puerto Rico, 2015)
Cybercrimes were increase in last
years. In a near future majority of crime will be
cybercrimes. The new technologies like mobile
device and networks permit easy access to electronic
devices that have Electronic Stored ...
Ethical Hacking: Network Protocol Analyzer Tool Comparison
(Polytechnic University of Puerto Rico, 2015)
The computer security industry spoke
about the term “ethical hacking” to describe a
hacker with authorization to, without any bad
intentions, attacks a network or other security
system – whether private or public – on ...
Computer Forensics Tutorial Disk File Systems (FAT16, FAT32, NTFS)
(Polytechnic University of Puerto Rico, 2011)
Abstract - This tutorial is intended as in-class laboratory exercise for computer forensics classes at the Polytechnic University of Puerto Rico. It’s specifically designed to provide basic understanding on the functionalities ...