Buscar
Mostrando ítems 1-9 de 9
“EZ Farm”
(Polytechnic University of Puerto Rico, 2015)
Por lo general muchos pequeños
negocios especialmente en el área de la Agronomía
de Puerto Rico tienen problemas llevando sus
cuentas al día ya sea por la falta de organización o
por falta de las herramientas necesarias; ...
Honeypots as Computer Forensics Tool
(Polytechnic University of Puerto Rico, 2015)
Cybercrimes were increase in last
years. In a near future majority of crime will be
cybercrimes. The new technologies like mobile
device and networks permit easy access to electronic
devices that have Electronic Stored ...
Assessing SQL Server User Vulnerability and Data Loss
(Polytechnic University of Puerto Rico, 2015)
By using the tools provided by SQL
server we are going to verify some parameters on the
database user accounts to determine their
vulnerabilities. Run scripts to check if the users have
their account passwords set to ...
Portable HoneyPot & HoneyNet: Within a Closed Network
(Polytechnic University of Puerto Rico, 2015)
At any given time a business network
could be or has been compromised by a hacker or
its information been exposed or breach. This is why
building a honeypot and understanding how to use
it can help network security ...
The Design of a Risk and Vulnerability Assessment Procedure for a Banking Institution
(Polytechnic University of Puerto Rico, 2015)
Regulations in banks are changing
constantly and becoming stricter. Threats and
technologies are improving. Most antivirus software
update their virus definition when the malware is
released and attacking. Banks need ...
Using Frequency Analysis to Decrypt Monoalphabetic Ciphers
(Polytechnic University of Puerto Rico, 2015)
Over the past few years’ technology
has taken over society. Everyone uses technology. It
makes everything easier, such as paying bills,
buying food or any stuff that you use in your daily
basis. People tend to store ...
Ethical Hacking: Network Protocol Analyzer Tool Comparison
(Polytechnic University of Puerto Rico, 2015)
The computer security industry spoke
about the term “ethical hacking” to describe a
hacker with authorization to, without any bad
intentions, attacks a network or other security
system – whether private or public – on ...
Using Wireshark in a Medical Office
(Polytechnic University of Puerto Rico, 2015)
This project is about sniffing the packets
in a secured network with electronic health record
(EHR) while using Wireshark. I suspect that the
packets and the network are going to be encrypted
and it won’t be possible ...
Florida Hospital Centra Care Provider Performance Data Mart
(Polytechnic University of Puerto Rico, 2015)
Querying a transactional database for
aggregates reports can result in poorly responding
queries and reports. Developing a data mart is a
highly effective solution to overcome these
limitations. This paper demonstrates ...