Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Computer Engineering

Alice In Cyberspace 2024, Stanley Mierzwa Jan 2024

Alice In Cyberspace 2024, Stanley Mierzwa

Center for Cybersecurity

‘Alice in Cyberspace’ Conference Nurtures Women’s Interest, Representation in Cybersecurity


Research Days Poster: A Study On Ransomware And Possible Mitigations, Robin Singh, Jing-Chiou Liou Apr 2023

Research Days Poster: A Study On Ransomware And Possible Mitigations, Robin Singh, Jing-Chiou Liou

Center for Cybersecurity

Ransomware is a quite violent attack that has been persistent throughout the industry for so many years. This malware doesn’t only affect the regular computer users but it has been targeting the big organizations and businesses also. Ransomware (ransom software) is a subset of malware designed to restrict access to a system or data until a requested ransom amount from the attacker is satisfied [2].In this poster, we will go over our findings on ransomware spreads, its actions, exploited vulnerabilities and few mitigation to reduce the impact of infection.


Research Days Poster: An Analysis Of Sql Injection Techniques, Uko Ebreso, Pankati Patel, Jing-Chiou Liou Apr 2023

Research Days Poster: An Analysis Of Sql Injection Techniques, Uko Ebreso, Pankati Patel, Jing-Chiou Liou

Center for Cybersecurity

Storing information in a database allows web applications to operate with users who have their information stored online. ● The retrieval of information from the database is done using Structured Query Language (SQL) - a language used by the database that allows for data manipulation. ● SQL Injection (SQLIi) is an attack on a susceptible system using SQl which results in a loss of confidentiality, authentication, authorization and integrity of the software/system.


Ransomware Incident Preparations With Ethical Considerations And Command System Framework Proposal, Stanley Mierzwa, James Drylie, Dennis Bogdan Apr 2022

Ransomware Incident Preparations With Ethical Considerations And Command System Framework Proposal, Stanley Mierzwa, James Drylie, Dennis Bogdan

Center for Cybersecurity

Concerns with cyber-attacks in the form of ransomware are on the mind of many executives and leadership staff in all industries. Inaction is not an option, and approaching the topic with real, honest, and hard discussions will be valuable ahead of such a possible devastating experience. This research note aims to bring thoughtfulness to the topics of ethics in the role of cybersecurity when dealing with ransomware events. Additionally, a proposed set of non-technical recovery preparation tasks are outlined to help organizations bring about cohesiveness and planning for dealing with the real potential of a ransomware event. Constraints from many …


On The Potential, Feasibility, And Effectiveness Of Chat Bots In Public Health Research Going Forward, Stanley Mierzwa, Samir Souidi, Tammy Allen Sep 2019

On The Potential, Feasibility, And Effectiveness Of Chat Bots In Public Health Research Going Forward, Stanley Mierzwa, Samir Souidi, Tammy Allen

Center for Cybersecurity

This paper will discuss whether bots, particularly chat bots, can be useful in public health research and health or pharmacy systems operations. Bots have been discussed for many years; particularly when coupled with artificial intelligence, they offer the opportunity of automating mundane or error-ridden processes and tasks by replacing human involvement. This paper will discuss areas where there are greater advances in the use of bots, as well as areas that may benefit from the use of bots, and will offer practical ways to get started with bot technology. Several popular bot applications and bot development tools along with practical …