Applied computing professionals develop, create and modify computer applications and specialized utility programs. They often analyze user needs and develop software solutions to meet those needs, analyze and design databases within an application area and contribute to web development. Graduates will obtain positions as software developers, web developers, software engineers and android engineers.
Businesses across the world are facing an increasing threat from cyber-attacks. Therefore, they need new and innovative ways to combat these threat actors by identifying, tracking, and responding to their activities within the network. One such method to achieve this is with honeypots. Our group set out to provide a service that would let companies track proprietary data while maintaining a secure environment. We will use various technologies to track and discover who accesses the data, when they access it, and how it was accessed. This allows businesses to protect their data and be notified when their data is illegally accessed more easily. The approach we have decided to take is to create an Active Directory test environment with a firewall and a SIEM setup. We will then put fingerprinted data into this network. Any activity within this network involving that data will gather information and create an alert in the SIEM. This will allow the security team to be aware of malicious actors in the network. The final product will be an easily deployable virtual network. The virtual network will utilize fake, fingerprinted data that can be tracked inside and outside of the virtual network. The product will operate as a subscription service and will require very little technical setup from the customer. Overall, our project will allow businesses to quickly, easily, and inexpensively deploy and operate a honeynet in their environment. This honeynet will add another layer of protection to these organizations to protect their data and reputation.
https://youtu.be/U3W0YgRnNcw
Wireless networks continue to be a prominent attack vector in today鈥檚 threat landscape. Open Wi-Fi networks continue to be exploited by malicious actors, and wardriving is one aspect that is often overlooked by those attempting to protect their systems. Enterprise security teams will inevitably need to assess and secure their wireless infrastructure. The coverage provided by this design looks to solve this issue in a manner that supports modularity and concealability. Many different approaches were considered, such as a briefcase, backpack, or delivery robot. After investigation of each method, it was determined that the most crucial factor was adaptability. The idea is that the kit can be easily adapted to any situation that the security team needs. The final decision was the backpack design as it would be the most inconspicuous, versatile, and modular design. This was tested by running wardriving exercises and rating the effectiveness of these tests regarding efficiency and modularity of what was able to work within the kit. Presenting it to the customer yielded positive reactions, and with its improved modularity, the lifetime expectancy of the kit can be deemed near limitless. The wardriving toolkit will transform the way security teams assess wireless infrastructure. The adaptability and modularity of the design will allow quick, easy, and versatile use of the kit in a wide range of environments. Further improvements could be made regarding the medium of containment, such as an apparatus that allows for transport in more than just a backpack.
https://www.youtube.com/watch?v=x7ar2GiQL0Q
We are the Social Sentinels, and our aim is to better the way businesses or universities hold events and gather feedback from those events. We will be starting with WSU (成人头条 State University) Recruiting and Marketing, they will be the first to implement our Social Media Amplification Meter to receive feedback on their events and better them down the line. Our approach is to implement the APIs of Instagram and X with AWS geofencing location software to build a tool that aggregates data from social media to analyze the opinions of the event鈥檚 participants. The end goal of this project is to use X(Twitter) and Instagram as our subjects for aggregation. We intend to be able to access their API鈥檚 and connect them to a location service such as the AWS location services. All the data will then be streamlined to a database where it will then be ported to a web-based application so that our customers can perform their own analysis and draw their own conclusions that will help them in their business ventures. We hope businesses will use this tool to gain insight into how others view their events so they can improve in the future.
https://www.youtube.com/watch?v=So5Z3g-iGAw
Cybraphy, an education firm specializing in cybersecurity training, offers a groundbreaking
phishing email simulation service aimed at assessing and enhancing organizational
cybersecurity posture. This project focuses on developing a comprehensive phishing
email simulation platform to determine the need for phishing prevention training among
clients' employees. https://www.youtube.com/watch?v=NMLE3AICicE |
The demand for innovative solutions continues to drive sports science and engineering. Our entry for Engineering Open House is a performance enhancing product: cooling insoles designed to increase the performance of endurance athletes. These insoles utilize phase change materials (PCMs) along with selected additives to create a new type of insole within the sports industry. Our cooling insoles' main objective is to address the critical need of effective temperature regulation during prolonged physical activity. Endurance athletes are constantly pushing their limits in demanding environments and often face challenges related to heat buildup, leading to discomfort and performance degradation. Our approach integrates advanced PCM technology from MicroTek Laboratories, known for its thermal energy storage properties, with additives to assist with durability, flexibility, and overall performance. The key innovation lies in the strategic incorporation of PCMs, which undergo phase transitions at specific temperatures, effectively absorbing excess heat from the athlete's feet during exercise from the pressure of the feet hitting the ground. This active cooling approach helps with the risk of heat-related injuries and allows athletes to maintain peak performance levels for extended amounts of time. There are scientific studies that support that cooling during activities more than 30 minutes has an exponential effect on increased performance. Our cooling insoles represent an advancement in sports engineering, utilizing the fusion of materials to elevate the performance and endurance of athletes in their search for optimal performance.
https://www.youtube.com/watch?v=8Ir2KyM39Q8
To create a device which can monitor network traffic, ie packet sniff, networks from a concealed location. This allows cybersecurity analysts to better perform their job as others in excersises will not be able to screen peak and thus patch vulnerabilities before their exploited. Our microcomputer has a 2 buisness day lifespan on mobile battery pack, a full desktop interface and makes no noise. Additionally, it can be hidden in bags, in drawers, or use our example fake book safe.
https://youtu.be/RCwL9EQapKM?si=D9g316I1hFEhe0Bk
In today鈥檚 information age, cybercrime is more rampant than ever, yet companies often find their employees lacking the necessary skills to defend against it. This is due to ineffective and outdated cybersecurity training 鈥 an issue that plagues IT departments across the world. A new style of training, one that is more engaging, is needed to ensure employees can protect themselves and their organizations against the threats of today. Our proposed solution works to solve this demand. Our new training software contains learning segments comprised of three main components: learning content, simulation activity, and real-world example. Through presenting these components in a gamified format, the software encourages the user to remain actively engaged with the training content. Gamification has been proven to increase user engagement by up to 48%. With an increase in user engagement, it鈥檚 believed increased retention of the learning material will follow. Additionally, the software will continually reinforce the importance of the content. Development of the software is currently in progress. Once completed, tests will be done comparing the software to traditional training programs to determine if the solution is an improvement in terms of engagement and retention and, if so, by what percentage. These tests will involve users partaking in both and completing surveys and tests based on the content and their experience with the training format. The expectation is that it will be enough of an improvement to warrant IT departments to switch to our solution.
https://youtu.be/BhDSzK_Bf98
The Carpacity project aims to tackle the common issue of finding parking on campus, which affects both students and faculty, especially during peak hours. This challenge often leads to traffic congestion and frustration due to high demand for parking spaces. Carpacity employs open-source software to monitor and analyze traffic within parking lots, using camera feeds to track the entrance and exits. This data helps determine real-time parking lot occupancy, enabling students to find parking more efficiently and allowing Parking Services to obtain valuable metrics for decision-making and resource allocation. Through heatmapping, the system can indicate the popularity of specific lots, aiding in better management of parking resources. Currently, Carpacity successfully monitors traffic flows and calculates the real-time capacity of parking lots, demonstrating the potential of image detection technology to enhance the parking search process and improve overall campus life.
https://www.youtube.com/watch?v=O8zrcK7_uDE
Sly Fox Camera Co. seeks to bridge the gap between security assessment and implementation, addressing a critical challenge faced by security teams worldwide: the need for discreet and accurate company badge capture. Through innovative technologies, the application will empower cyber penetration teams and law enforcement agencies to capture company identification badges while remaining discreet. It's not merely about capturing data; it's about enhancing the efficiency of security assessments by quantifiably reducing the manual effort required to obtain critical information. The project's key insights revolve around optimizing the ID data capture process, ensuring the application or physical device a stealthy operation, and quantifying the time savings it offers, while ideally keeping costs down. The next steps in this project include rigorous testing and refinement, aiming to establish the reliability, security, and effectiveness of the app in various security testing scenarios.
https://www.youtube.com/watch?v=6oywK__nIlk