Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking

Williams Honors College, Honors Research Projects

Cybersecurity

Publication Year

Articles 1 - 4 of 4

Full-Text Articles in Engineering

Comprehensive Network Redundancy Implementation And Cybersecurity Hardening Project: Ensuring Resilience And Defending Against Dhcp Starvation, Stp Man-In-The-Middle, And Brute Force Attacks, Seth Shaheen Jun 2024

Comprehensive Network Redundancy Implementation And Cybersecurity Hardening Project: Ensuring Resilience And Defending Against Dhcp Starvation, Stp Man-In-The-Middle, And Brute Force Attacks, Seth Shaheen

Williams Honors College, Honors Research Projects

I have created a network topology that contains three Cisco routers, three Cisco switches, and three endpoints. The network has been built using the software GNS-3. The endpoints on the topology include one VPC, one Kali Linux VM, and one Ubuntu Server VM. The main purpose of this network topology is to show the skills I have learned during my tenure at The University of Akron. This will be done by hardening this network to ensure that the network is impervious to cyber-attacks. The Kali Linux VM will act as the attacker on the network and conduct three attacks: STP …


Defense Of A Small Network, Isabella Adkins Jan 2023

Defense Of A Small Network, Isabella Adkins

Williams Honors College, Honors Research Projects

A sample network will be virtually created consisting of three routers, one switch, and three hosts. The network will be secured using various methods such as enabling passwords and encryption. After the network has been properly secured, various attacks will be attempted with the goal of breaking into the network. These attacks include reconnaissance (gathering information), penetrating the network using the tool Metasploit, and attempting to get a credential phishing email to end users. If successful in the attacks, the network will be revisited and analyzed for any weaknesses or oversights.


Small Business Office Network, Michael Gerome Jan 2023

Small Business Office Network, Michael Gerome

Williams Honors College, Honors Research Projects

This project will emulate a small office network environment. The project will demonstrate the process of building and configuring the network to meet the requirements laid out in the project plan. This network includes four subnets with Windows 10 end devices and a Kali Linux device, it also includes five Cisco layer 2 switches and three Cisco routers. There are also three subnets connecting the routers to each other to enable routing between the subnets. After the network environment is set up, various penetration tests are performed from the Kali Linux device to gather information. The Nmap reconnaissance tool is …


Multifaceted Cybersecurity Analysis: Reconnaissance, Exploitation And Mitigation In A Controlled Network Environment, Austin Coontz Jan 2023

Multifaceted Cybersecurity Analysis: Reconnaissance, Exploitation And Mitigation In A Controlled Network Environment, Austin Coontz

Williams Honors College, Honors Research Projects

This report details a network penetration test in a simulated environment using GNS3, focusing on the configuration of routers, switches, and hosts. The project successfully identified and exploited network vulnerabilities, including FTP access, misconfigured sudo permissions, and SMB protocol weaknesses. The penetration testing process utilized tools like fping and nmap for reconnaissance and vulnerability scanning, revealing the importance of device configurations in network security. The project concluded with mitigation strategies, emphasizing the need for secure access, robust password policies, and security controls. The experience underscored the significance of continuous learning and adaptation in the ever-evolving field of cybersecurity. The project …