Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Hardware Systems

The University of Akron

Cybersecurity

Publication Year

Articles 1 - 2 of 2

Full-Text Articles in Computer Engineering

Comprehensive Network Redundancy Implementation And Cybersecurity Hardening Project: Ensuring Resilience And Defending Against Dhcp Starvation, Stp Man-In-The-Middle, And Brute Force Attacks, Seth Shaheen Jun 2024

Comprehensive Network Redundancy Implementation And Cybersecurity Hardening Project: Ensuring Resilience And Defending Against Dhcp Starvation, Stp Man-In-The-Middle, And Brute Force Attacks, Seth Shaheen

Williams Honors College, Honors Research Projects

I have created a network topology that contains three Cisco routers, three Cisco switches, and three endpoints. The network has been built using the software GNS-3. The endpoints on the topology include one VPC, one Kali Linux VM, and one Ubuntu Server VM. The main purpose of this network topology is to show the skills I have learned during my tenure at The University of Akron. This will be done by hardening this network to ensure that the network is impervious to cyber-attacks. The Kali Linux VM will act as the attacker on the network and conduct three attacks: STP …


Small Business Office Network, Michael Gerome Jan 2023

Small Business Office Network, Michael Gerome

Williams Honors College, Honors Research Projects

This project will emulate a small office network environment. The project will demonstrate the process of building and configuring the network to meet the requirements laid out in the project plan. This network includes four subnets with Windows 10 end devices and a Kali Linux device, it also includes five Cisco layer 2 switches and three Cisco routers. There are also three subnets connecting the routers to each other to enable routing between the subnets. After the network environment is set up, various penetration tests are performed from the Kali Linux device to gather information. The Nmap reconnaissance tool is …